WorldWideScience

Sample records for vhp computers include

  1. Mesh generation and computational modeling techniques for bioimpedance measurements: an example using the VHP data

    Science.gov (United States)

    Danilov, A. A.; Salamatova, V. Yu; Vassilevski, Yu V.

    2012-12-01

    Here, a workflow for high-resolution efficient numerical modeling of bioimpedance measurements is suggested that includes 3D image segmentation, adaptive mesh generation, finite-element discretization, and the analysis of simulation results. Using the adaptive unstructured tetrahedral meshes enables to decrease significantly a number of mesh elements while keeping model accuracy. The numerical results illustrate current, potential, and sensitivity field distributions for a conventional Kubicek-like scheme of bioimpedance measurements using segmented geometric model of human torso based on Visible Human Project data. The whole body VHP man computational mesh is constructed that contains 574 thousand vertices and 3.3 million tetrahedrons.

  2. Computational human model VHP-FEMALE derived from datasets of the national library of medicine.

    Science.gov (United States)

    Noetscher, Gregory M; Yanamadala, Janakinadh; Tankaria, Harshal; Louie, Sara; Prokop, Alexander; Nazarian, Ara; Makarov, Sergey N

    2016-08-01

    Simulation of the electromagnetic response of the human body relies upon efficient computational models. The objective of this paper is to describe a new platform-independent and computationally-efficient full-body electromagnetic model, the Visible Human Project® (VHP)-Female v.3.0 and to outline its distinct features. We also report model performance results using two leading commercial electromagnetic antenna simulation packages: ANSYS HFSS and CST MICROWAVE STUDIO®.

  3. New VHP-Female v. 2.0 full-body computational phantom and its performance metrics using FEM simulator ANSYS HFSS.

    Science.gov (United States)

    Yanamadala, Janakinadh; Noetscher, Gregory M; Rathi, Vishal K; Maliye, Saili; Win, Htay A; Tran, Anh L; Jackson, Xavier J; Htet, Aung T; Kozlov, Mikhail; Nazarian, Ara; Louie, Sara; Makarov, Sergey N

    2015-01-01

    Simulation of the electromagnetic response of the human body relies heavily upon efficient computational models or phantoms. The first objective of this paper is to present a new platform-independent full-body electromagnetic computational model (computational phantom), the Visible Human Project(®) (VHP)-Female v. 2.0 and to describe its distinct features. The second objective is to report phantom simulation performance metrics using the commercial FEM electromagnetic solver ANSYS HFSS.

  4. Dicty_cDB: VHP531 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available library) VHP531 (Link to dictyBase) - - - Contig-U12899-1 VHP531P (Link to Original site) VHP531F 691 VHP531Z...VHP531Z 706 VHP531P 1377 - - Show VHP531 Library VH (Link to library) Clone ID VHP531 (Link to dictyBase)...tsukuba.ac.jp/CSM/VH/VHP5-B/VHP531Q.Seq.d/ Representative seq. ID VHP531P (Link to Original site) Representative...Representative DNA sequence >VHP531 (VHP531Q) /CSM/VH/VHP5-B/VHP531Q.Seq.d/ GTACAACCCTAATGGATAGCACATTGG...significant alignments: (bits) Value VHP531 (VHP531Q) /CSM/VH/VHP5-B/VHP531Q.Seq.d/ 2666 0.0 VHP595 (VHP595Q)

  5. Dicty_cDB: VHP624 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP624 (Link to dictyBase) - - - Contig-U15307-1 VHP624P (Link to Original site) VHP...624F 449 VHP624Z 724 VHP624P 1153 - - Show VHP624 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP6-A/VHP624Q.Seq.d/ Representative seq. ID VHP...624P (Link to Original site) Representative DNA sequence >VHP624 (VHP624Q) /CSM/VH/VHP6-A/VHP...TRXLNRXYFVLXAGHGS MFLYSWLHLSGYDVSIEXXKNFXQLNSXTPGHPKFHDXPGVEATTGPLGQGIANAVGIAS PCKMAXGKFNTEQHQXFNQKVVVLV---

  6. Dicty_cDB: VHP870 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP870 (Link to dictyBase) - - - Contig-U16260-1 VHP870P (Link to Original site) VHP...870F 646 VHP870Z 763 VHP870P 1389 - - Show VHP870 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP8-C/VHP870Q.Seq.d/ Representative seq. ID VHP...870P (Link to Original site) Representative DNA sequence >VHP870 (VHP870Q) /CSM/VH/VHP8-C/VHP...*rffrw cfpmghqrrccl**kherypfqsl*chpph*chpqrwwsnhpncssctlcc*inclpnsl rtnllsrnycprkrywwyllctqss*rycyw*rtsyrfpi

  7. Dicty_cDB: VHP521 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP521 (Link to dictyBase) - - - Contig-U13887-1 VHP521P (Link to Original site) VHP...521F 677 VHP521Z 726 VHP521P 1383 - - Show VHP521 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP5-A/VHP521Q.Seq.d/ Representative seq. ID VHP...521P (Link to Original site) Representative DNA sequence >VHP521 (VHP521Q) /CSM/VH/VHP5-A/VHP...yhsfnq*nhs nstfiwylqrmvrn*pnqrfir*cw*fshfclcrsiqkrstq--- ---qekv*pmns*rlpskrkvvcklpif*plkppkrrtpskvtsmicvqnynhp

  8. Dicty_cDB: VHP458 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP458 (Link to dictyBase) - - - Contig-U15962-1 VHP458P (Link to Original site) VHP...458F 607 VHP458Z 785 VHP458P 1372 - - Show VHP458 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP4-C/VHP458Q.Seq.d/ Representative seq. ID VHP...458P (Link to Original site) Representative DNA sequence >VHP458 (VHP458Q) /CSM/VH/VHP4-C/VHP...: *fskvik*vlliksqkvlfqs*mtlein*nhskvqliivqrlgf*vqkqkilny**lssk eqlmlifnqesistkkmhqfskiltkkilytsmqqkt*pkklmkf*is*ntlfhihp

  9. Dicty_cDB: VHP461 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP461 (Link to dictyBase) - - - Contig-U16260-1 VHP461P (Link to Original site) VHP...461F 575 VHP461Z 767 VHP461P 1322 - - Show VHP461 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP4-C/VHP461Q.Seq.d/ Representative seq. ID VHP...461P (Link to Original site) Representative DNA sequence >VHP461 (VHP461Q) /CSM/VH/VHP4-C/VHP...SPGHVDF SSEVTAALRVTDGALVVIDCVEGVCVQTETVLRQAVAERIKPVLFVNKVDRFLLELQLNT EEAYLSFR--- ---hp

  10. Dicty_cDB: VHP283 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP283 (Link to dictyBase) - - - Contig-U16473-1 VHP283P (Link to Original site) VHP...283F 564 VHP283Z 762 VHP283P 1306 - - Show VHP283 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP2-D/VHP283Q.Seq.d/ Representative seq. ID VHP...283P (Link to Original site) Representative DNA sequence >VHP283 (VHP283Q) /CSM/VH/VHP2-D/VHP...iqnfiktkkfryfrreilgcfitkirklw*ifikrrn*fncctitkrc*scc*lvn*q wfike*ndrsl*fhps*nqcw*sfnfirnficsllikpycs*en*scrs

  11. Dicty_cDB: VHP571 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP571 (Link to dictyBase) - - - Contig-U16441-1 VHP571P (Link to Original site) VHP...571F 582 VHP571Z 765 VHP571P 1327 - - Show VHP571 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP5-C/VHP571Q.Seq.d/ Representative seq. ID VHP...571P (Link to Original site) Representative DNA sequence >VHP571 (VHP571Q) /CSM/VH/VHP5-C/VHP...qyqmmqvkhfqpqqffhiklyqfhhi*ilrv**lhvpiisf*lvkilv*hgtmh hpmvmfyshq--- ---**rmnmisvk*lvli*qmychllamipqcnliplvv

  12. Dicty_cDB: VHP622 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP622 (Link to dictyBase) - - - Contig-U16379-1 VHP622P (Link to Original site) VHP...622F 640 VHP622Z 775 VHP622P 1395 - - Show VHP622 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP6-A/VHP622Q.Seq.d/ Representative seq. ID VHP...622P (Link to Original site) Representative DNA sequence >VHP622 (VHP622Q) /CSM/VH/VHP6-A/VHP...VLALAPKEELVEKALNFALSPSVRSQD SYMVFFTLPNRVRQFAWAYLTKNFNQINETFKNSPLFGRIIGSCLTSKMDDSQYNEVVNF FKDHP

  13. Dicty_cDB: VHP703 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP703 (Link to dictyBase) - - - Contig-U15307-1 VHP703P (Link to Original site) VHP...703F 445 VHP703Z 700 VHP703P 1125 - - Show VHP703 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP7-A/VHP703Q.Seq.d/ Representative seq. ID VHP...703P (Link to Original site) Representative DNA sequence >VHP703 (VHP703Q) /CSM/VH/VHP7-A/VHP...0.25 Translated Amino Acid sequence NETRGLSMDAVAKAAXGHLGLPLGSAEIGAALFGNSLIYNPKDTRXLNRXYFVLXAGHGS MFLYSWLHLSGYDVSIEXXKNFXQLNSXTPGHP

  14. Dicty_cDB: VHP435 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP435 (Link to dictyBase) - - - Contig-U16260-1 VHP435P (Link to Original site) VHP...435F 601 VHP435Z 688 VHP435P 1269 - - Show VHP435 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP4-B/VHP435Q.Seq.d/ Representative seq. ID VHP...435P (Link to Original site) Representative DNA sequence >VHP435 (VHP435Q) /CSM/VH/VHP4-B/VHP...IDCVEGVCVQTETVLRQAVAERIKPVLFVNKVDRFLLELQLNTE EAYLSFRRAIESVNVIV--- ---srr*rcqsprqchqrcsife*n*rffrwcfpmghqrrccx**kherypfqsl*chpp h*chp

  15. Dicty_cDB: VHP758 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP758 (Link to dictyBase) - - - Contig-U11426-1 VHP758P (Link to Original site) VHP...758F 624 VHP758Z 707 VHP758P 1311 - - Show VHP758 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP7-C/VHP758Q.Seq.d/ Representative seq. ID VHP...758P (Link to Original site) Representative DNA sequence >VHP758 (VHP758Q) /CSM/VH/VHP7-C/VHP...lnqmkw*mmvff*n lthlkilvy*iamlnlk*fqsmilm*tcy*i*nylmlekipx**skfikffly*i Frame B: ftnyqimkivnslnfkqwiklvclyhwfikplpieivivsiiplnsshp

  16. Dicty_cDB: VHP546 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP546 (Link to dictyBase) - - - Contig-U11694-1 VHP546P (Link to Original site) VHP...546F 546 VHP546Z 712 VHP546P 1238 - - Show VHP546 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP5-B/VHP546Q.Seq.d/ Representative seq. ID VHP...546P (Link to Original site) Representative DNA sequence >VHP546 (VHP546Q) /CSM/VH/VHP5-B/VHP...SNLPAXLFTKQSQALIYNYKEAAXQRXLXFDNVSQRDTPSXGGLIHPGSDGGMYKA FFGFKELVIPVYNSVSXACXQCPN

  17. Dicty_cDB: VHP335 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP335 (Link to dictyBase) - - - Contig-U16260-1 VHP335P (Link to Original site) VHP...335F 609 VHP335Z 766 VHP335P 1355 - - Show VHP335 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP3-B/VHP335Q.Seq.d/ Representative seq. ID VHP...335P (Link to Original site) Representative DNA sequence >VHP335 (VHP335Q) /CSM/VH/VHP3-B/VHP...r*skssc*lsr*xprmg*k*chehlvfrsrr*rcqsprqchqrcsife*n*rffr wcfpmghqrrccl**kherypfqsl*chpph*chpqrwwsnhpncssctlcc

  18. Dicty_cDB: VHP132 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP132 (Link to dictyBase) - - - Contig-U16260-1 VHP132P (Link to Original site) VHP...132F 548 VHP132Z 636 VHP132P 1164 - - Show VHP132 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP1-B/VHP132Q.Seq.d/ Representative seq. ID VHP...132P (Link to Original site) Representative DNA sequence >VHP132 (VHP132Q) /CSM/VH/VHP1-B/VHP...tslirqqsrsflixtpik-- - ---rr*rcqsprqchqrcsife*n*rffrwcfpmghqrrccl**kherypfqsl*chpph *chpqrwwsnhpncssctlcc*in

  19. Dicty_cDB: VHP267 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP267 (Link to dictyBase) - - - Contig-U16260-1 VHP267P (Link to Original site) VHP...267F 528 VHP267Z 724 VHP267P 1232 - - Show VHP267 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP2-C/VHP267Q.Seq.d/ Representative seq. ID VHP...267P (Link to Original site) Representative DNA sequence >VHP267 (VHP267Q) /CSM/VH/VHP2-C/VHP...e*n*rffrwcfpmghqrrccl** kherypfqsl*chpph*chpqrwwsnhpncssctlcc*inclpnslrtnllsrnycprkr ywwyllctqss*rycyw*rtsyr

  20. Dicty_cDB: VHP284 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP284 (Link to dictyBase) - - - Contig-U12327-1 VHP284P (Link to Original site) VHP...284F 549 VHP284Z 759 VHP284P 1288 - - Show VHP284 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP2-D/VHP284Q.Seq.d/ Representative seq. ID VHP...284P (Link to Original site) Representative DNA sequence >VHP284 (VHP284Q) /CSM/VH/VHP2-D/VHP...IGDERKILNNKLSNQYYEFCSLLSLKLNPSDTELLSLAYYLLLQDRFDESIKIMKRI GKHPVSIPKLISSSTTTDSKSTHSSVISSSSSSNLSTTTDSSKDKKKLKK

  1. Dicty_cDB: VHP230 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP230 (Link to dictyBase) - - - Contig-U16260-1 VHP230P (Link to Original site) VHP...230F 531 VHP230Z 681 VHP230P 1192 - - Show VHP230 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP2-B/VHP230Q.Seq.d/ Representative seq. ID VHP...230P (Link to Original site) Representative DNA sequence >VHP230 (VHP230Q) /CSM/VH/VHP2-B/VHP...frsnccppcy*wcfsryrlrrrclrtnrncitssrr*tyqtslirqqsrsfli--- ---rmg*k*chehlvfrsrr*rcqsxrqchqrcsife*n*rffrwcfpmghqrrccl**k herypfqsl*chp

  2. Dicty_cDB: VHP157 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP157 (Link to dictyBase) - - - Contig-U16260-1 VHP157P (Link to Original site) VHP...157F 617 VHP157Z 723 VHP157P 1320 - - Show VHP157 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP1-C/VHP157Q.Seq.d/ Representative seq. ID VHP...157P (Link to Original site) Representative DNA sequence >VHP157 (VHP157Q) /CSM/VH/VHP1-C/VHP...h*r--- ---prmg*k*chehlvfrsrr*rcqsprqchqrcsife*n*rffrwcfpmghqrrccl** kherypfqsl*chpph*chpqrwwsnhpncssctlcc*in

  3. Dicty_cDB: VHP494 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP494 (Link to dictyBase) - - - Contig-U16433-1 VHP494P (Link to Original site) VHP...494F 539 VHP494Z 816 VHP494P 1335 - - Show VHP494 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP4-D/VHP494Q.Seq.d/ Representative seq. ID VHP...494P (Link to Original site) Representative DNA sequence >VHP494 (VHP494Q) /CSM/VH/VHP4-D/VHP...r--- ---qlqsiqlwsimvmvhmmlnlnqkkpvtmlsisl*mvttsmvsqrllplnqphplntl mlkvkv*skylimpqlnslfspltlkvllvpmvmihlkslsm

  4. Dicty_cDB: VHP592 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP592 (Link to dictyBase) - - - Contig-U16315-1 VHP592P (Link to Original site) VHP...592F 640 VHP592Z 778 VHP592P 1398 - - Show VHP592 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP5-D/VHP592Q.Seq.d/ Representative seq. ID VHP...592P (Link to Original site) Representative DNA sequence >VHP592 (VHP592Q) /CSM/VH/VHP5-D/VHP...tnnnnki Frame C: *ktvitkvilyfylfqylcistpyiyi*yiiifvisaiiitieiviqflgf*n*nkknny knckid*qtqkeyfkn*plfysniinhpyi

  5. Dicty_cDB: VHP496 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP496 (Link to dictyBase) - - - Contig-U15962-1 VHP496P (Link to Original site) VHP...496F 594 VHP496Z 809 VHP496P 1383 - - Show VHP496 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP4-D/VHP496Q.Seq.d/ Representative seq. ID VHP...496P (Link to Original site) Representative DNA sequence >VHP496 (VHP496Q) /CSM/VH/VHP4-D/VHP...tsmqqkt*pkklmkf*is*ntlfhihpl dikdi*hlmllllv*lvplllfytiqtm*qfkqvq*phllkwqlvmilpvwlvgnfqkkf qslitdmkrnflki---

  6. Dicty_cDB: VHP877 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP877 (Link to dictyBase) - - - Contig-U10840-1 VHP877P (Link to Original site) VHP...877F 597 VHP877Z 696 VHP877P 1273 - - Show VHP877 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP8-D/VHP877Q.Seq.d/ Representative seq. ID VHP...877P (Link to Original site) Representative DNA sequence >VHP877 (VHP877Q) /CSM/VH/VHP8-D/VHP...sifnsfilsitl*kcys*i*sif*l*inn iscsrrfl*ffklv**ksmvsirtycrwynlprfngnskfsslviefieyys*y*kcmci vitmvcikysngnl*--- ---xtlsivlgslvkpthlhp

  7. Dicty_cDB: VHP409 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP409 (Link to dictyBase) - - - Contig-U16531-1 VHP409P (Link to Original site) VHP...409F 620 VHP409Z 750 VHP409P 1350 - - Show VHP409 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP4-A/VHP409Q.Seq.d/ Representative seq. ID VHP...409P (Link to Original site) Representative DNA sequence >VHP409 (VHP409Q) /CSM/VH/VHP4-A/VHP...cifhi*nsflgyslhlycnssifnsksll*erlcl*ilflvsichfnchc*it fccsrwnnlfllffldsryllqw*i*flflynfhplpfhlcftwsscicllfqc

  8. Dicty_cDB: VHP791 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP791 (Link to dictyBase) - - - Contig-U16508-1 VHP791P (Link to Original site) VHP...791F 672 VHP791Z 427 VHP791P 1079 - - Show VHP791 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP7-D/VHP791Q.Seq.d/ Representative seq. ID VHP...791P (Link to Original site) Representative DNA sequence >VHP791 (VHP791Q) /CSM/VH/VHP7-D/VHP...w*lvvilcqvvdlnnwlmt--- ---shpllpmftxtqqxskrlefsisrclltidfsltxtkwfkdsnxtmvr*sr*yhtft yxkylsn*wsrftrstgvsl*ifq

  9. Dicty_cDB: VHP478 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP478 (Link to dictyBase) - - - Contig-U16260-1 VHP478P (Link to Original site) VHP...478F 646 VHP478Z 748 VHP478P 1374 - - Show VHP478 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP4-D/VHP478Q.Seq.d/ Representative seq. ID VHP...478P (Link to Original site) Representative DNA sequence >VHP478 (VHP478Q) /CSM/VH/VHP4-D/VHP...fnqsyrfprsr*fq frsnccppcy*wcfsryrlrrrclrtnrncitssrr*tyqtslirqqsrsflirtpikh* rslslfp*sy*irqchcw*h*r*gir*chci--- ---shp

  10. Dicty_cDB: VHP621 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP621 (Link to dictyBase) - - - Contig-U16260-1 VHP621P (Link to Original site) VHP...621F 616 VHP621Z 746 VHP621P 1342 - - Show VHP621 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP6-A/VHP621Q.Seq.d/ Representative seq. ID VHP...621P (Link to Original site) Representative DNA sequence >VHP621 (VHP621Q) /CSM/VH/VHP6-A/VHP...kpklyyvkpslnvsnqsysstksivsy*nsn*tl kklislsvellnpsmsllvtlk--- ---shpkmiqklvltislit

  11. Dicty_cDB: VHP206 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP206 (Link to dictyBase) - - - Contig-U16260-1 VHP206P (Link to Original site) VHP...206F 616 VHP206Z 744 VHP206P 1340 - - Show VHP206 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP2-A/VHP206Q.Seq.d/ Representative seq. ID VHP...206P (Link to Original site) Representative DNA sequence >VHP206 (VHP206Q) /CSM/VH/VHP2-A/VHP...rqqsrsflirtpikh* rslslfp*sy*irqchcw*h*--- ---hpkmiqklvltislittngikmmp*tfglsvqkvtvpisssmspkvfni*mklkils lvlsn

  12. Dicty_cDB: VHP523 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP523 (Link to dictyBase) - - - Contig-U13021-1 VHP523P (Link to Original site) VHP...523F 645 VHP523Z 783 VHP523P 1408 - - Show VHP523 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP5-A/VHP523Q.Seq.d/ Representative seq. ID VHP...523P (Link to Original site) Representative DNA sequence >VHP523 (VHP523Q) /CSM/VH/VHP5-A/VHP...hsmiimkc vcqlihkiqlfsihhrlitlhihykftmlvrglpsilcisyrkfqlpilvnkmvgtimli fiqvv*klvclqhpinynilkfvvimligwhlenlmly

  13. Dicty_cDB: VHP429 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP429 (Link to dictyBase) - - - Contig-U13887-1 VHP429P (Link to Original site) VHP...429F 597 VHP429Z 678 VHP429P 1255 - - Show VHP429 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP4-B/VHP429Q.Seq.d/ Representative seq. ID VHP...429P (Link to Original site) Representative DNA sequence >VHP429 (VHP429Q) /CSM/VH/VHP4-B/VHP...SFSSEAILGMLFGKLKKTTEAFVNNPVRDVVISVPVFWNDYQRRAILNAGSIAGLNIIRL INETTATALSYGIYK--- ---vvcklpif*plkppkrrtpskvtsmicvqnynhp

  14. Dicty_cDB: VHP670 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP670 (Link to dictyBase) - - - Contig-U12327-1 VHP670P (Link to Original site) VHP...670F 588 VHP670Z 780 VHP670P 1348 - - Show VHP670 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP6-C/VHP670Q.Seq.d/ Representative seq. ID VHP...670P (Link to Original site) Representative DNA sequence >VHP670 (VHP670Q) /CSM/VH/VHP6-C/VHP...YYEFCSLLSLKLNPSDTELLSLA YYLLLQDRFDESIKIMKRIGKHPVSIPKLISSSTTTDSKSTHSSVISSSSSSNLSTT

  15. Dicty_cDB: VHP405 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP405 (Link to dictyBase) - - - Contig-U16260-1 VHP405P (Link to Original site) VHP...405F 574 VHP405Z 733 VHP405P 1287 - - Show VHP405 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP4-A/VHP405Q.Seq.d/ Representative seq. ID VHP...405P (Link to Original site) Representative DNA sequence >VHP405 (VHP405Q) /CSM/VH/VHP4-A/VHP...irtpikh* rslslfp--- ---sr**prmg*k*chehlvfrsrr*rcqsprqchqrcsife*n*rffrwcfpmghqrrc cl**kherypfqsl*chpph*chp

  16. Dicty_cDB: VHP820 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP820 (Link to dictyBase) - - - Contig-U16379-1 VHP820P (Link to Original site) VHP...820F 243 VHP820Z 756 VHP820P 979 - - Show VHP820 Library VH (Link to library) Clone ID VHP... URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP8-A/VHP820Q.Seq.d/ Representative seq. ID VHP...820P (Link to Original site) Representative DNA sequence >VHP820 (VHP820Q) /CSM/VH/VHP8-A/VHP8...AYLTKNFNQINETFKNSPLFGRIIGSCLTSKMDDSQYNEVVNF FKDHPVPIADRSIKQDLEMVTINSNWFKAFNQDLSNWIQSK*k*nllqgkifvlixix*k kid

  17. Dicty_cDB: VHP357 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP357 (Link to dictyBase) - - - Contig-U16260-1 VHP357P (Link to Original site) VHP...357F 617 VHP357Z 764 VHP357P 1361 - - Show VHP357 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP3-C/VHP357Q.Seq.d/ Representative seq. ID VHP...357P (Link to Original site) Representative DNA sequence >VHP357 (VHP357Q) /CSM/VH/VHP3-C/VHP...prqchqrcsife*n*rffrw cfpmghqrrccl**kherypfqsl*chpph*chpqrwwsnhpncssctlcc*inclpnsl rtnllsrnycprkrywwyllctqss*

  18. Dicty_cDB: VHP589 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP589 (Link to dictyBase) - - - Contig-U16260-1 VHP589P (Link to Original site) VHP...589F 617 VHP589Z 690 VHP589P 1287 - - Show VHP589 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP5-D/VHP589Q.Seq.d/ Representative seq. ID VHP...589P (Link to Original site) Representative DNA sequence >VHP589 (VHP589Q) /CSM/VH/VHP5-D/VHP...r*rcqsprqchqrcsife*n*rffrwcfpmghqrrccl**kherypfqsl*chpph *chpqrwwsnhpncssctlcc*inclpnxxrtnxlsrnycprkrywwyllc

  19. Dicty_cDB: VHP542 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP542 (Link to dictyBase) - - - Contig-U16260-1 VHP542P (Link to Original site) VHP...542F 646 VHP542Z 729 VHP542P 1355 - - Show VHP542 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP5-B/VHP542Q.Seq.d/ Representative seq. ID VHP...542P (Link to Original site) Representative DNA sequence >VHP542 (VHP542Q) /CSM/VH/VHP5-B/VHP...cfpmghqrrccl**khe rypfqsl*chpph*chpqrwwsnhpncssctlcc*inclpnxxrtnxlsrnycprkryww yllctqss*rycyw*rtsyrfpiilcqss

  20. Dicty_cDB: VHP402 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP402 (Link to dictyBase) - - - Contig-U16260-1 VHP402P (Link to Original site) VHP...402F 616 VHP402Z 747 VHP402P 1343 - - Show VHP402 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP4-A/VHP402Q.Seq.d/ Representative seq. ID VHP...402P (Link to Original site) Representative DNA sequence >VHP402 (VHP402Q) /CSM/VH/VHP4-A/VHP...aykpklyyvkpslnvsnqsysstksivsy*nsn*tl kklislsvellnpsmsllvtlk--- ---shpkmiqklvltisl

  1. Dicty_cDB: VHP179 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP179 (Link to dictyBase) - - - Contig-U16441-1 VHP179P (Link to Original site) VHP...179F 666 VHP179Z 631 VHP179P 1277 - - Show VHP179 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP1-D/VHP179Q.Seq.d/ Representative seq. ID VHP...179P (Link to Original site) Representative DNA sequence >VHP179 (VHP179Q) /CSM/VH/VHP1-D/VHP...mylinkeilfmvmqdiikemiilwl*ishlmekpkf qyqmmqvkhfqpqqffhiklyqfhhi*ilrv**lhvpiisf*lvkilv*hgtmhhpmvmf yshqvvqafq

  2. Dicty_cDB: VHP453 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP453 (Link to dictyBase) - - - Contig-U16441-1 VHP453P (Link to Original site) VHP...453F 636 VHP453Z 742 VHP453P 1358 - - Show VHP453 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP4-C/VHP453Q.Seq.d/ Representative seq. ID VHP...453P (Link to Original site) Representative DNA sequence >VHP453 (VHP453Q) /CSM/VH/VHP4-C/VHP...khfqpqqffhiklyqfhhi*ilrv**lhvpiisf*lvkilv*hgtmhhpmvmfyshq vvqafqpthygihqrnlqcfsqf

  3. Dicty_cDB: VHP530 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available library) VHP530 (Link to dictyBase) - - - Contig-U11514-1 VHP530P (Link to Original site) VHP530F 643 VHP530Z...VHP530Z 783 VHP530P 1406 - - Show VHP530 Library VH (Link to library) Clone ID VHP530 (Link to dictyBase)...tsukuba.ac.jp/CSM/VH/VHP5-B/VHP530Q.Seq.d/ Representative seq. ID VHP530P (Link to Original site) Representative...Representative DNA sequence >VHP530 (VHP530Q) /CSM/VH/VHP5-B/VHP530Q.Seq.d/ GATTAGAAGAAGTTGGACCAAATGCAA...significant alignments: (bits) Value VHP530 (VHP530Q) /CSM/VH/VHP5-B/VHP530Q.Seq.d/ 2605 0.0 VHJ167 (VHJ167Q)

  4. Dicty_cDB: VHP539 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available library) VHP539 (Link to dictyBase) - - - Contig-U16438-1 VHP539P (Link to Original site) VHP539F 651 VHP539Z...VHP539Z 822 VHP539P 1453 - - Show VHP539 Library VH (Link to library) Clone ID VHP539 (Link to dictyBase)...tsukuba.ac.jp/CSM/VH/VHP5-B/VHP539Q.Seq.d/ Representative seq. ID VHP539P (Link to Original site) Representative...Representative DNA sequence >VHP539 (VHP539Q) /CSM/VH/VHP5-B/VHP539Q.Seq.d/ ATATACATAATTAAAATTTCATACAAT...significant alignments: (bits) Value VHP539 (VHP539Q) /CSM/VH/VHP5-B/VHP539Q.Seq.d/ 1980 0.0 VHM583 (VHM583Q)

  5. Dicty_cDB: VHP532 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available library) VHP532 (Link to dictyBase) - - - Contig-U15611-1 VHP532P (Link to Original site) VHP532F 399 VHP532Z...VHP532Z 723 VHP532P 1102 - - Show VHP532 Library VH (Link to library) Clone ID VHP532 (Link to dictyBase)...tsukuba.ac.jp/CSM/VH/VHP5-B/VHP532Q.Seq.d/ Representative seq. ID VHP532P (Link to Original site) Representative...Representative DNA sequence >VHP532 (VHP532Q) /CSM/VH/VHP5-B/VHP532Q.Seq.d/ ATTTTATATATTTTAATTTGCATTTTT...significant alignments: (bits) Value VHP532 (VHP532Q) /CSM/VH/VHP5-B/VHP532Q.Seq.d/ 1844 0.0 VHI789 (VHI789Q)

  6. Dicty_cDB: VHP538 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available library) VHP538 (Link to dictyBase) - - - Contig-U15033-1 VHP538P (Link to Original site) VHP538F 670 VHP538Z...VHP538Z 795 VHP538P 1445 - - Show VHP538 Library VH (Link to library) Clone ID VHP538 (Link to dictyBase)...tsukuba.ac.jp/CSM/VH/VHP5-B/VHP538Q.Seq.d/ Representative seq. ID VHP538P (Link to Original site) Representative...Representative DNA sequence >VHP538 (VHP538Q) /CSM/VH/VHP5-B/VHP538Q.Seq.d/ ATAGTTACAAATAAATAATGAAATTGT...significant alignments: (bits) Value VHP538 (VHP538Q) /CSM/VH/VHP5-B/VHP538Q.Seq.d/ 2819 0.0 VHC878 (VHC878Q)

  7. Dicty_cDB: VHP536 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available library) VHP536 (Link to dictyBase) - - - Contig-U15690-1 VHP536P (Link to Original site) VHP536F 589 VHP536Z...VHP536Z 760 VHP536P 1329 - - Show VHP536 Library VH (Link to library) Clone ID VHP536 (Link to dictyBase)...tsukuba.ac.jp/CSM/VH/VHP5-B/VHP536Q.Seq.d/ Representative seq. ID VHP536P (Link to Original site) Representative...Representative DNA sequence >VHP536 (VHP536Q) /CSM/VH/VHP5-B/VHP536Q.Seq.d/ AATTAATTTTATTTTAATATAAAACTC...significant alignments: (bits) Value VHP536 (VHP536Q) /CSM/VH/VHP5-B/VHP536Q.Seq.d/ 2369 0.0 CHM205 (CHM205Q)

  8. Dicty_cDB: VHP537 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available library) VHP537 (Link to dictyBase) - - - Contig-U16708-1 VHP537P (Link to Original site) VHP537F 147 VHP537Z...VHP537Z 185 VHP537P 312 - - Show VHP537 Library VH (Link to library) Clone ID VHP537 (Link to dictyBase)...tsukuba.ac.jp/CSM/VH/VHP5-B/VHP537Q.Seq.d/ Representative seq. ID VHP537P (Link to Original site) Representative...Representative DNA sequence >VHP537 (VHP537Q) /CSM/VH/VHP5-B/VHP537Q.Seq.d/ AGATTCGGTTTAAAGAAATTTTATTGG...significant alignments: (bits) Value VHP537 (VHP537Q) /CSM/VH/VHP5-B/VHP537Q.Seq.d/ 216 2e-55 VSE439 (VSE439Q)

  9. Dicty_cDB: VHP535 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available library) VHP535 (Link to dictyBase) - - - - VHP535P (Link to Original site) VHP535F 183 VHP535Z 688 VHP535P 851...851 - - Show VHP535 Library VH (Link to library) Clone ID VHP535 (Link to dictyBase) Atlas ID - NBRP...tsukuba.ac.jp/CSM/VH/VHP5-B/VHP535Q.Seq.d/ Representative seq. ID VHP535P (Link to Original site) Representative...Representative DNA sequence >VHP535 (VHP535Q) /CSM/VH/VHP5-B/VHP535Q.Seq.d/ TATAAAANGTTNTTAAATAAATAAATA...significant alignments: (bits) Value VHP535 (VHP535Q) /CSM/VH/VHP5-B/VHP535Q.Seq.d/ 1318 0.0 CFK127 (CFK127Q)

  10. Dicty_cDB: VHP817 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP817 (Link to dictyBase) - - - Contig-U15309-1 - (Link to Original site) - - VHP...817Z 632 - - - - Show VHP817 Library VH (Link to library) Clone ID VHP817 (Link to dicty...iol.tsukuba.ac.jp/CSM/VH/VHP8-A/VHP817Q.Seq.d/ Representative seq. ID - (Link to ...Original site) Representative DNA sequence >VHP817 (VHP817Q) /CSM/VH/VHP8-A/VHP817Q.Seq.d/ XXXXXXXXXXTTTGATC...kt*cpk**sic*dskrniryi**ttyftkcrlyhpksn*tqte*slqk*sc*n*sflkn ekqnktnnqiiysknlffnkifffnkiff Frame C: ---DHQVVT

  11. Dicty_cDB: VHP342 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP342 (Link to dictyBase) - - - Contig-U13473-1 - (Link to Original site) VHP...342F 452 - - - - - - Show VHP342 Library VH (Link to library) Clone ID VHP342 (Link to dicty...iol.tsukuba.ac.jp/CSM/VH/VHP3-B/VHP342Q.Seq.d/ Representative seq. ID - (Link to ...Original site) Representative DNA sequence >VHP342 (VHP342Q) /CSM/VH/VHP3-B/VHP342Q.Seq.d/ AAAAGACCATCATAATA...klhqih*vlcnixsyln itlhqmlmhqhpktlvkiyq*kynsn*--- Frame B: kdhhniiqyffff*nteslshkn

  12. Dicty_cDB: VHP646 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP646 (Link to dictyBase) - - - - VHP646P (Link to Original site) VHP646F 617 VHP...646Z 665 VHP646P 1262 - - Show VHP646 Library VH (Link to library) Clone ID VHP646 (Link... to dictyBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig - Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP...6-B/VHP646Q.Seq.d/ Representative seq. ID VHP646P (Link to... Original site) Representative DNA sequence >VHP646 (VHP646Q) /CSM/VH/VHP6-B/VHP646Q.Seq.d/ AACTCTCGAGTGCAAA

  13. Dicty_cDB: VHP339 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP339 (Link to dictyBase) - - - - VHP339P (Link to Original site) VHP339F 530 VHP...339Z 682 VHP339P 1192 - - Show VHP339 Library VH (Link to library) Clone ID VHP339 (Link... to dictyBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig - Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP...3-B/VHP339Q.Seq.d/ Representative seq. ID VHP339P (Link to... Original site) Representative DNA sequence >VHP339 (VHP339Q) /CSM/VH/VHP3-B/VHP339Q.Seq.d/ AACTCTCGAGTGCAAA

  14. Dicty_cDB: VHP407 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP407 (Link to dictyBase) - - - - VHP407P (Link to Original site) VHP407F 646 VHP...407Z 771 VHP407P 1397 - - Show VHP407 Library VH (Link to library) Clone ID VHP407 (Link... to dictyBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig - Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP...4-A/VHP407Q.Seq.d/ Representative seq. ID VHP407P (Link to... Original site) Representative DNA sequence >VHP407 (VHP407Q) /CSM/VH/VHP4-A/VHP407Q.Seq.d/ AACTCTCGAGTGCAAA

  15. Dicty_cDB: VHP154 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP154 (Link to dictyBase) - G23560 DDB0231372 Contig-U12088-1 | Contig-U13789-1 VHP...154P (Link to Original site) VHP154F 617 VHP154Z 715 VHP154P 1312 - - Show VHP154 Libr...ary VH (Link to library) Clone ID VHP154 (Link to dictyBase) Atlas ID - NBRP ID G23560 dictyBase ID DDB02313...ycdb.biol.tsukuba.ac.jp/CSM/VH/VHP1-C/VHP154Q.Seq.d/ Representative seq. ID VHP154P (Link to Original site) ...Representative DNA sequence >VHP154 (VHP154Q) /CSM/VH/VHP1-C/VHP154Q.Seq.d/ TACAACTGCAGCTAATTTATTCAAGAAAACCG

  16. Dicty_cDB: VHP524 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP524 (Link to dictyBase) - - - Contig-U11514-1 VHP524P (Link to Original site) VHP...524F 185 VHP524Z 287 VHP524P 452 - - Show VHP524 Library VH (Link to library) Clone ID VHP... URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP5-A/VHP524Q.Seq.d/ Representative seq. ID VHP...524P (Link to Original site) Representative DNA sequence >VHP524 (VHP524Q) /CSM/VH/VHP5-A/VHP5...anctfr*pwllvqlnslkrkp sslv*hplknwllwisyvpiklvlsl*if*pxmn Homology vs CSM-cDNA Score E Sequences producing si

  17. Dicty_cDB: VHP227 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP227 (Link to dictyBase) - - - - VHP227P (Link to Original site) VHP227F 553 VHP...227Z 683 VHP227P 1216 - - Show VHP227 Library VH (Link to library) Clone ID VHP227 (Link... to dictyBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig - Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP...2-B/VHP227Q.Seq.d/ Representative seq. ID VHP227P (Link to... Original site) Representative DNA sequence >VHP227 (VHP227Q) /CSM/VH/VHP2-B/VHP227Q.Seq.d/ GAGAAAGCCTCCGTAA

  18. Dicty_cDB: VHP695 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP695 (Link to dictyBase) - - - - VHP695P (Link to Original site) VHP695F 617 VHP...695Z 689 VHP695P 1286 - - Show VHP695 Library VH (Link to library) Clone ID VHP695 (Link... to dictyBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig - Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP...6-D/VHP695Q.Seq.d/ Representative seq. ID VHP695P (Link to... Original site) Representative DNA sequence >VHP695 (VHP695Q) /CSM/VH/VHP6-D/VHP695Q.Seq.d/ AAACTCTCGAGTGCAA

  19. Dicty_cDB: VHP874 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP874 (Link to dictyBase) - - - - VHP874P (Link to Original site) VHP874F 617 VHP...874Z 690 VHP874P 1287 - - Show VHP874 Library VH (Link to library) Clone ID VHP874 (Link... to dictyBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig - Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP...8-D/VHP874Q.Seq.d/ Representative seq. ID VHP874P (Link to... Original site) Representative DNA sequence >VHP874 (VHP874Q) /CSM/VH/VHP8-D/VHP874Q.Seq.d/ AACTCTCGAGTGCAAA

  20. Dicty_cDB: VHP594 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP594 (Link to dictyBase) - - - - VHP594P (Link to Original site) VHP594F 616 VHP...594Z 745 VHP594P 1341 - - Show VHP594 Library VH (Link to library) Clone ID VHP594 (Link... to dictyBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig - Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP...5-D/VHP594Q.Seq.d/ Representative seq. ID VHP594P (Link to... Original site) Representative DNA sequence >VHP594 (VHP594Q) /CSM/VH/VHP5-D/VHP594Q.Seq.d/ AACTCTCGAGTGCAAA

  1. Dicty_cDB: VHP647 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP647 (Link to dictyBase) - - - - VHP647P (Link to Original site) VHP647F 646 VHP...647Z 744 VHP647P 1370 - - Show VHP647 Library VH (Link to library) Clone ID VHP647 (Link... to dictyBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig - Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP...6-B/VHP647Q.Seq.d/ Representative seq. ID VHP647P (Link to... Original site) Representative DNA sequence >VHP647 (VHP647Q) /CSM/VH/VHP6-B/VHP647Q.Seq.d/ AACTCTCGAGTGCAAA

  2. Dicty_cDB: VHP134 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP134 (Link to dictyBase) - - - Contig-U16260-1 VHP134P (Link to Original site) VHP...134F 617 VHP134Z 769 VHP134P 1366 - - Show VHP134 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP1-B/VHP134Q.Seq.d/ Representative seq. ID VHP...134P (Link to Original site) Representative DNA sequence >VHP134 (VHP134Q) /CSM/VH/VHP1-B/VHP...VNVIVGNTE--- ---liqr*skssc*lsr**prmg*k*chehlvfrsrr*rcqsprqchqrcsife*n*rff rwcfpmghqrrccl**kherypfqsl*chpph*chpqrwwsnhp

  3. Dicty_cDB: VHP177 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP177 (Link to dictyBase) - - - Contig-U16260-1 VHP177P (Link to Original site) VHP...177F 639 VHP177Z 631 VHP177P 1250 - - Show VHP177 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP1-D/VHP177Q.Seq.d/ Representative seq. ID VHP...177P (Link to Original site) Representative DNA sequence >VHP177 (VHP177Q) /CSM/VH/VHP1-D/VHP...y*wcfsryrlrrrclrtnrncitssrr*tyqtslirqqsrsflirtpikh* rslslfp*sy*irqchcw*h*r*gir*ch--- ---e*n*rffrwcfpmghqrrccl**kherypfqsl*chpph*chp

  4. Dicty_cDB: VHP702 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP702 (Link to dictyBase) - - - Contig-U16260-1 VHP702P (Link to Original site) VHP...702F 615 VHP702Z 734 VHP702P 1329 - - Show VHP702 Library VH (Link to library) Clone ID VHP...e URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP7-A/VHP702Q.Seq.d/ Representative seq. ID VHP...702P (Link to Original site) Representative DNA sequence >VHP702 (VHP702Q) /CSM/VH/VHP7-A/VHP...lslfp*sy*irqchcw*h*--- ---sr**prmg*k*chehlvfrsrr*rcqsprqchqrcsife*n*rffrwcfpmghqrrc cl**kherypfqsl*chpph*chpqrwwsnhp

  5. Dicty_cDB: VHP244 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP244 (Link to dictyBase) - G03062 DDB0216322 Contig-U12556-1 VHP...244P (Link to Original site) VHP244F 616 VHP244Z 781 VHP244P 1377 - - Show VHP244 Library VH (Link to library) Clone ID VHP...Contig-U12556-1 Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP2-B/VHP...244Q.Seq.d/ Representative seq. ID VHP244P (Link to Original site) Representative DNA sequence >VHP244 (VHP244Q) /CSM/VH/VHP...2-B/VHP244Q.Seq.d/ GTTCGTAATTATTTCAAAATTGGTGCGACACACTCGTATCCACAATGAAAAAATTAGTCC ATAAAGA

  6. Dicty_cDB: VHP793 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP793 (Link to dictyBase) - - - Contig-U12022-1 | Contig-U13798-1 VHP...793P (Link to Original site) VHP793F 566 VHP793Z 785 VHP793P 1331 - - Show VHP793 Library VH (Link to library) Clone ID VHP...022-1 | Contig-U13798-1 Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP7-D/VHP...793Q.Seq.d/ Representative seq. ID VHP793P (Link to Original site) Representative DNA sequence >VHP793 (VHP...793Q) /CSM/VH/VHP7-D/VHP793Q.Seq.d/ ATGAGCAGAACCAAAGGGTATTCGTATTGAAGTAGTCGATTCAAAGGATTTCAAATTCAC

  7. Dicty_cDB: VHP117 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP117 (Link to dictyBase) - - - Contig-U12100-1 | Contig-U13787-1 VHP...117P (Link to Original site) VHP117F 210 VHP117Z 824 VHP117P 1014 - - Show VHP117 Library VH (Link to library) Clone ID VHP...100-1 | Contig-U13787-1 Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP1-A/VHP...117Q.Seq.d/ Representative seq. ID VHP117P (Link to Original site) Representative DNA sequence >VHP117 (VHP...117Q) /CSM/VH/VHP1-A/VHP117Q.Seq.d/ ATTTTTTGTACATAAAACCGTGTTTATATTATCTTCATCTATATTCGTATTTAAAATATT

  8. Dicty_cDB: VHP204 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP204 (Link to dictyBase) - - - - VHP204P (Link to Original site) VHP204F 644 VHP...204Z 767 VHP204P 1391 - - Show VHP204 Library VH (Link to library) Clone ID VHP204 (Link... to dictyBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig - Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP...2-A/VHP204Q.Seq.d/ Representative seq. ID VHP204P (Link to... Original site) Representative DNA sequence >VHP204 (VHP204Q) /CSM/VH/VHP2-A/VHP204Q.Seq.d/ AACTCTCGAGTGCAAA

  9. Dicty_cDB: VHP408 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP408 (Link to dictyBase) - - - - VHP408P (Link to Original site) VHP408F 646 VHP...408Z 768 VHP408P 1394 - - Show VHP408 Library VH (Link to library) Clone ID VHP408 (Link... to dictyBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig - Original site URL http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP...4-A/VHP408Q.Seq.d/ Representative seq. ID VHP408P (Link to... Original site) Representative DNA sequence >VHP408 (VHP408Q) /CSM/VH/VHP4-A/VHP408Q.Seq.d/ AACTCTCGAGTGCAAA

  10. Dicty_cDB: VHP533 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available library) VHP533 (Link to dictyBase) - - - Contig-U16251-1 - (Link to Original site) VHP533F 648 - - -...- - - - Show VHP533 Library VH (Link to library) Clone ID VHP533 (Link to dictyBase) Atlas ID - NBRP...http://dictycdb.biol.tsukuba.ac.jp/CSM/VH/VHP5-B/VHP533Q.Seq.d/ Representative seq. ID - (Link to Original...site) Representative DNA sequence >VHP533 (VHP533Q) /CSM/VH/VHP5-B/VHP533Q.Seq.d/ TTTTGTTCAAAAGATTTTCAAAG...significant alignments: (bits) Value VHP533 (VHP533Q) /CSM/VH/VHP5-B/VHP533Q.Seq.d/ 1265 0.0 VHE329 (VHE329Q)

  11. Dicty_cDB: VHP548 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP548 (Link to dictyBase) - - - Contig-U15722-1 VHP548P (Link... to Original site) VHP548F 634 VHP548Z 937 VHP548P 1551 - - Show VHP548 Library VH (Link to library) Clone ID VHP548 (Link to dict...yBase) Atlas ID - NBRP ID - dictyBase ID - Link to Contig Contig-U15722-1 Original site URL http://dict...XTMPIMNILGNGCEFTRCPLDCSTPNGTCDNNTGNCTCHNEH FGNSCEFTRCPLDCSTPNGTCDNNTGNCTCHNEHFGNGCEFTQCPLYCSTPNGTCDINSG ICTC... ---LFDPPMVLGNNNTGNXTMPIMNILGNGCEFTRCPLDCSTPNGTCDNNTGNCTCHNEH FGNSCEFTRCPLDCSTPNGTCDNNTGNCTCHNEHFGNGCEFTQCPLYCSTPNGTCDINSG ICT

  12. Dicty_cDB: VHP417 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP417 (Link to dictyBase) - - - Contig-U16336-1 - (Link to Or...iginal site) VHP417F 553 - - - - - - Show VHP417 Library VH (Link to library) Clone ID VHP417 (Link to dicty...Base) Atlas ID - NBRP ID - dictyBase ID - Link to Contig Contig-U16336-1 Original site URL http://dictycdb.b...GYLAASQSFNEGTDVIVLATHQI RKDFLSSNQSEAYLALNCLSNICTTDLARELANDILTLLSTQKTHILKRAITVLYKIFLR --- Translated Amino Ac... VAVQKLTYIQMLGFDISWASFKIVEVMSCNKFSSKRIGYLAASQSFNEGTDVIVLATHQI RKDFLSSNQSEAYLALNCLSNICTTDLARELANDILTLLSTQKTHI

  13. VHP-Female full-body human CAD model for cross-platform FEM simulations: recent development and validations.

    Science.gov (United States)

    Tankaria, Harshal; Jackson, Xavier J; Borwankar, Raunak; Srichandhru, Goutham N K; Le Tran, Anh; Yanamadala, Janakinadh; Noetscher, Gregory M; Nazarian, Ara; Louie, Sara; Makarov, Sergey N

    2016-08-01

    Simulation of the electromagnetic response of the human body relies heavily upon efficient computational models or phantoms. The first objective of this paper is to present an improved platform-independent full-body electromagnetic computational model (computational phantom), the Visible Human Project® (VHP)-Female v. 3.1 and to describe its distinct features and enhancements compared to VHP-Female v. 2.0. The second objective is to report phantom simulation for electric stimulation studies using the commercial FEM electromagnetic solver ANSYS MAXWELL.

  14. Dicty_cDB: VHP243 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP243 (Link to dictyBase) - - - Contig-U16236-1 - (Link to Or...iginal site) VHP243F 134 - - - - - - Show VHP243 Library VH (Link to library) Clone ID VHP243 (Link to dicty...Base) Atlas ID - NBRP ID - dictyBase ID - Link to Contig Contig-U16236-1 Original site URL http://dictycdb.b...AXXXXXXXXXX sequence update 2002.10.25 Translated Amino Acid sequence CWPTGIXKTTICT...kilsif*ynfkyyqqpkkk--- Frame B: llaywyxqnnnlyqyyyyfyl*kyflsfniilniinnpkk--- Frame C: CWPTGIXKTTICTNTTIISICKN

  15. Dicty_cDB: VHP349 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available VH (Link to library) VHP349 (Link to dictyBase) - - - Contig-U16430-1 - (Link to Original site) - - VHP349Z...VHP349Z 219 - - - - Show VHP349 Library VH (Link to library) Clone ID VHP349 (Link to dictyBase) Atlas...AL110635 |AL110635.1 Botrytis cinerea strain T4 cDNA library under conditions of nitrogen deprivation. 90 1e-14...AL114542 |AL114542.1 Botrytis cinerea strain T4 cDNA library under conditions of nitrogen deprivation. 90 1e-14...AL112228 |AL112228.1 Botrytis cinerea strain T4 cDNA library under conditions of nitrogen deprivation. 90 1e-14

  16. ACCREDITATION FOR TECHNICAL ABILITIES INCLUDING COMPUTER SKILLS

    Directory of Open Access Journals (Sweden)

    Halit Hami OZ

    2013-01-01

    Full Text Available Sector Skills are defined by state-sponsored, employer-led organizations that cover specific economic sectors in the European Union and other countries in the world to reduce skills gaps and shortages, improve productivity, boost the skills of their sector workforces and improve learning supply. The accreditation and registration systems used by professional bodies raise the profile of the profession. In many countries including the European Union, professional associations are beginning to accept practice-based accreditation, generally as an alternative to their mainstream systems. Besides studying the certain agencies in the European Union for assessing/accreditating practical abilities , Accreditation for practical abilities of Information Communication Technology and Business Management/Language domains developed by Accreditation Council for Practical abilities are also studied in detail as an example to establish a similar agency in Turkey.

  17. Top 10 Threats to Computer Systems Include Professors and Students

    Science.gov (United States)

    Young, Jeffrey R.

    2008-01-01

    User awareness is growing in importance when it comes to computer security. Not long ago, keeping college networks safe from cyberattackers mainly involved making sure computers around campus had the latest software patches. New computer worms or viruses would pop up, taking advantage of some digital hole in the Windows operating system or in…

  18. Top 10 Threats to Computer Systems Include Professors and Students

    Science.gov (United States)

    Young, Jeffrey R.

    2009-01-01

    In this article, the author presents the top-10 list of campus computer-security risks he compiled based on several recent computing surveys and interviews with more than a dozen college-technology leaders. The list, ordered from least to most serious, is by no means scientific, but it gives a sense of where today's battle lines are--and why…

  19. NASA Trapezoidal Wing Computations Including Transition and Advanced Turbulence Modeling

    Science.gov (United States)

    Rumsey, C. L.; Lee-Rausch, E. M.

    2012-01-01

    Flow about the NASA Trapezoidal Wing is computed with several turbulence models by using grids from the first High Lift Prediction Workshop in an effort to advance understanding of computational fluid dynamics modeling for this type of flowfield. Transition is accounted for in many of the computations. In particular, a recently-developed 4-equation transition model is utilized and works well overall. Accounting for transition tends to increase lift and decrease moment, which improves the agreement with experiment. Upper surface flap separation is reduced, and agreement with experimental surface pressures and velocity profiles is improved. The predicted shape of wakes from upstream elements is strongly influenced by grid resolution in regions above the main and flap elements. Turbulence model enhancements to account for rotation and curvature have the general effect of increasing lift and improving the resolution of the wing tip vortex as it convects downstream. However, none of the models improve the prediction of surface pressures near the wing tip, where more grid resolution is needed.

  20. Human-computer interface including haptically controlled interactions

    Science.gov (United States)

    Anderson, Thomas G.

    2005-10-11

    The present invention provides a method of human-computer interfacing that provides haptic feedback to control interface interactions such as scrolling or zooming within an application. Haptic feedback in the present method allows the user more intuitive control of the interface interactions, and allows the user's visual focus to remain on the application. The method comprises providing a control domain within which the user can control interactions. For example, a haptic boundary can be provided corresponding to scrollable or scalable portions of the application domain. The user can position a cursor near such a boundary, feeling its presence haptically (reducing the requirement for visual attention for control of scrolling of the display). The user can then apply force relative to the boundary, causing the interface to scroll the domain. The rate of scrolling can be related to the magnitude of applied force, providing the user with additional intuitive, non-visual control of scrolling.

  1. 78 FR 1247 - Certain Electronic Devices, Including Wireless Communication Devices, Tablet Computers, Media...

    Science.gov (United States)

    2013-01-08

    ... COMMISSION Certain Electronic Devices, Including Wireless Communication Devices, Tablet Computers, Media... importation of certain electronic devices, including wireless communication devices, tablet computers, media... United States after importation of certain electronic devices, including wireless communication devices...

  2. 77 FR 34063 - Certain Electronic Devices, Including Mobile Phones and Tablet Computers, and Components Thereof...

    Science.gov (United States)

    2012-06-08

    ... COMMISSION Certain Electronic Devices, Including Mobile Phones and Tablet Computers, and Components Thereof... devices, including mobile phones and tablet computers, and components thereof by reason of infringement of... certain electronics devices, including mobile phones and tablet computers, and components thereof that...

  3. 77 FR 27078 - Certain Electronic Devices, Including Mobile Phones and Tablet Computers, and Components Thereof...

    Science.gov (United States)

    2012-05-08

    ... Trade Commission has received a complaint entitled Certain Electronic Devices, Including Mobile Phones... From the Federal Register Online via the Government Publishing Office INTERNATIONAL TRADE COMMISSION Certain Electronic Devices, Including Mobile Phones and Tablet Computers, and Components Thereof...

  4. CERN’s Computing rules updated to include policy for control systems

    CERN Multimedia

    IT Department

    2008-01-01

    The use of CERN’s computing facilities is governed by rules defined in Operational Circular No. 5 and its subsidiary rules of use. These rules are available from the web site http://cern.ch/ComputingRules. Please note that the subsidiary rules for Internet/Network use have been updated to include a requirement that control systems comply with the CNIC(Computing and Network Infrastructure for Control) Security Policy. The security policy for control systems, which was approved earlier this year, can be accessed at https://edms.cern.ch/document/584092 IT Department

  5. A method for the computation of turbulent polymeric liquids including hydrodynamic interactions and chain entanglements

    Energy Technology Data Exchange (ETDEWEB)

    Kivotides, Demosthenes, E-mail: demosthenes.kivotides@strath.ac.uk

    2017-02-12

    An asymptotically exact method for the direct computation of turbulent polymeric liquids that includes (a) fully resolved, creeping microflow fields due to hydrodynamic interactions between chains, (b) exact account of (subfilter) residual stresses, (c) polymer Brownian motion, and (d) direct calculation of chain entanglements, is formulated. Although developed in the context of polymeric fluids, the method is equally applicable to turbulent colloidal dispersions and aerosols. - Highlights: • An asymptotically exact method for the computation of polymer and colloidal fluids is developed. • The method is valid for all flow inertia and all polymer volume fractions. • The method models entanglements and hydrodynamic interactions between polymer chains.

  6. 48 CFR 1552.239-103 - Acquisition of Energy Star Compliant Microcomputers, Including Personal Computers, Monitors and...

    Science.gov (United States)

    2010-10-01

    ... Compliant Microcomputers, Including Personal Computers, Monitors and Printers. 1552.239-103 Section 1552.239... Star Compliant Microcomputers, Including Personal Computers, Monitors and Printers. As prescribed in... Personal Computers, Monitors, and Printers (APR 1996) (a) The Contractor shall provide computer products...

  7. Dose computation in conformal radiation therapy including geometric uncertainties: Methods and clinical implications

    Science.gov (United States)

    Rosu, Mihaela

    The aim of any radiotherapy is to tailor the tumoricidal radiation dose to the target volume and to deliver as little radiation dose as possible to all other normal tissues. However, the motion and deformation induced in human tissue by ventilatory motion is a major issue, as standard practice usually uses only one computed tomography (CT) scan (and hence one instance of the patient's anatomy) for treatment planning. The interfraction movement that occurs due to physiological processes over time scales shorter than the delivery of one treatment fraction leads to differences between the planned and delivered dose distributions. Due to the influence of these differences on tumors and normal tissues, the tumor control probabilities and normal tissue complication probabilities are likely to be impacted upon in the face of organ motion. In this thesis we apply several methods to compute dose distributions that include the effects of the treatment geometric uncertainties by using the time-varying anatomical information as an alternative to the conventional Planning Target Volume (PTV) approach. The proposed methods depend on the model used to describe the patient's anatomy. The dose and fluence convolution approaches for rigid organ motion are discussed first, with application to liver tumors and the rigid component of the lung tumor movements. For non-rigid behavior a dose reconstruction method that allows the accumulation of the dose to the deforming anatomy is introduced, and applied for lung tumor treatments. Furthermore, we apply the cumulative dose approach to investigate how much information regarding the deforming patient anatomy is needed at the time of treatment planning for tumors located in thorax. The results are evaluated from a clinical perspective. All dose calculations are performed using a Monte Carlo based algorithm to ensure more realistic and more accurate handling of tissue heterogeneities---of particular importance in lung cancer treatment planning.

  8. 31 CFR 351.66 - What book-entry Series EE savings bonds are included in the computation?

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What book-entry Series EE savings... DEBT OFFERING OF UNITED STATES SAVINGS BONDS, SERIES EE Book-Entry Series EE Savings Bonds § 351.66 What book-entry Series EE savings bonds are included in the computation? (a) We include all bonds that...

  9. Areal rainfall estimation using moving cars - computer experiments including hydrological modeling

    Science.gov (United States)

    Rabiei, Ehsan; Haberlandt, Uwe; Sester, Monika; Fitzner, Daniel; Wallner, Markus

    2016-09-01

    The need for high temporal and spatial resolution precipitation data for hydrological analyses has been discussed in several studies. Although rain gauges provide valuable information, a very dense rain gauge network is costly. As a result, several new ideas have emerged to help estimating areal rainfall with higher temporal and spatial resolution. Rabiei et al. (2013) observed that moving cars, called RainCars (RCs), can potentially be a new source of data for measuring rain rate. The optical sensors used in that study are designed for operating the windscreen wipers and showed promising results for rainfall measurement purposes. Their measurement accuracy has been quantified in laboratory experiments. Considering explicitly those errors, the main objective of this study is to investigate the benefit of using RCs for estimating areal rainfall. For that, computer experiments are carried out, where radar rainfall is considered as the reference and the other sources of data, i.e., RCs and rain gauges, are extracted from radar data. Comparing the quality of areal rainfall estimation by RCs with rain gauges and reference data helps to investigate the benefit of the RCs. The value of this additional source of data is not only assessed for areal rainfall estimation performance but also for use in hydrological modeling. Considering measurement errors derived from laboratory experiments, the result shows that the RCs provide useful additional information for areal rainfall estimation as well as for hydrological modeling. Moreover, by testing larger uncertainties for RCs, they observed to be useful up to a certain level for areal rainfall estimation and discharge simulation.

  10. CSS Need Analysis, Theory and Computation Procedures for the 1977-78 PCS and FAF, Including Sample Cases and Tables.

    Science.gov (United States)

    College Entrance Examination Board, New York, NY. Coll. Scholarship Service.

    The College Scholarship Service (CSS) need analysis system is described in this comprehensive guide. It includes information about the basic rationale, the economic principles, and the computational procedures used in the CSS system. The chapters deal with the following: principles and practices of student financial aid administration; the history…

  11. Multiscale approach including microfibril scale to assess elastic constants of cortical bone based on neural network computation and homogenization method

    CERN Document Server

    Barkaoui, Abdelwahed; Tarek, Merzouki; Hambli, Ridha; Ali, Mkaddem

    2014-01-01

    The complexity and heterogeneity of bone tissue require a multiscale modelling to understand its mechanical behaviour and its remodelling mechanisms. In this paper, a novel multiscale hierarchical approach including microfibril scale based on hybrid neural network computation and homogenisation equations was developed to link nanoscopic and macroscopic scales to estimate the elastic properties of human cortical bone. The multiscale model is divided into three main phases: (i) in step 0, the elastic constants of collagen-water and mineral-water composites are calculated by averaging the upper and lower Hill bounds; (ii) in step 1, the elastic properties of the collagen microfibril are computed using a trained neural network simulation. Finite element (FE) calculation is performed at nanoscopic levels to provide a database to train an in-house neural network program; (iii) in steps 2 to 10 from fibril to continuum cortical bone tissue, homogenisation equations are used to perform the computation at the higher s...

  12. A computer software system for the generation of global ocean tides including self-gravitation and crustal loading effects

    Science.gov (United States)

    Estes, R. H.

    1977-01-01

    A computer software system is described which computes global numerical solutions of the integro-differential Laplace tidal equations, including dissipation terms and ocean loading and self-gravitation effects, for arbitrary diurnal and semidiurnal tidal constituents. The integration algorithm features a successive approximation scheme for the integro-differential system, with time stepping forward differences in the time variable and central differences in spatial variables. Solutions for M2, S2, N2, K2, K1, O1, P1 tidal constituents neglecting the effects of ocean loading and self-gravitation and a converged M2, solution including ocean loading and self-gravitation effects are presented in the form of cotidal and corange maps.

  13. Computational Modeling of Open-Irrigated Electrodes for Radiofrequency Cardiac Ablation Including Blood Motion-Saline Flow Interaction

    Science.gov (United States)

    González-Suárez, Ana; Berjano, Enrique; Guerra, Jose M.; Gerardo-Giorda, Luca

    2016-01-01

    Radiofrequency catheter ablation (RFCA) is a routine treatment for cardiac arrhythmias. During RFCA, the electrode-tissue interface temperature should be kept below 80°C to avoid thrombus formation. Open-irrigated electrodes facilitate power delivery while keeping low temperatures around the catheter. No computational model of an open-irrigated electrode in endocardial RFCA accounting for both the saline irrigation flow and the blood motion in the cardiac chamber has been proposed yet. We present the first computational model including both effects at once. The model has been validated against existing experimental results. Computational results showed that the surface lesion width and blood temperature are affected by both the electrode design and the irrigation flow rate. Smaller surface lesion widths and blood temperatures are obtained with higher irrigation flow rate, while the lesion depth is not affected by changing the irrigation flow rate. Larger lesions are obtained with increasing power and the electrode-tissue contact. Also, larger lesions are obtained when electrode is placed horizontally. Overall, the computational findings are in close agreement with previous experimental results providing an excellent tool for future catheter research. PMID:26938638

  14. Development of a computer algorithm for the analysis of variable-frequency AC drives: Case studies included

    Science.gov (United States)

    Kankam, M. David; Benjamin, Owen

    1991-01-01

    The development of computer software for performance prediction and analysis of voltage-fed, variable-frequency AC drives for space power applications is discussed. The AC drives discussed include the pulse width modulated inverter (PWMI), a six-step inverter and the pulse density modulated inverter (PDMI), each individually connected to a wound-rotor induction motor. Various d-q transformation models of the induction motor are incorporated for user-selection of the most applicable model for the intended purpose. Simulation results of selected AC drives correlate satisfactorily with published results. Future additions to the algorithm are indicated. These improvements should enhance the applicability of the computer program to the design and analysis of space power systems.

  15. 20 CFR 229.43 - When a divorced spouse can no longer be included in computing an annuity under the overall minimum.

    Science.gov (United States)

    2010-04-01

    ... included in computing an annuity under the overall minimum. 229.43 Section 229.43 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM... included in computing an annuity under the overall minimum. A divorced spouse's inclusion in the...

  16. 75 FR 41522 - Novell, Inc., Including On-Site Leased Workers From Affiliated Computer Services, Inc., (ACS...

    Science.gov (United States)

    2010-07-16

    ... Computer Services, Inc., (ACS), Provo, UT; Amended Certification Regarding Eligibility To Apply for Worker... reports that workers leased from Affiliated Computer Services, Inc., (ACS) were employed on-site at the...., (ACS) working on-site at the Provo, Utah location of Novell, Inc. The amended notice applicable to TA-W...

  17. Three-dimensional computer model of the right atrium including the sinoatrial and atrioventricular nodes predicts classical nodal behaviours.

    Directory of Open Access Journals (Sweden)

    Jue Li

    Full Text Available The aim of the study was to develop a three-dimensional (3D anatomically-detailed model of the rabbit right atrium containing the sinoatrial and atrioventricular nodes to study the electrophysiology of the nodes. A model was generated based on 3D images of a rabbit heart (atria and part of ventricles, obtained using high-resolution magnetic resonance imaging. Segmentation was carried out semi-manually. A 3D right atrium array model (∼3.16 million elements, including eighteen objects, was constructed. For description of cellular electrophysiology, the Rogers-modified FitzHugh-Nagumo model was further modified to allow control of the major characteristics of the action potential with relatively low computational resource requirements. Model parameters were chosen to simulate the action potentials in the sinoatrial node, atrial muscle, inferior nodal extension and penetrating bundle. The block zone was simulated as passive tissue. The sinoatrial node, crista terminalis, main branch and roof bundle were considered as anisotropic. We have simulated normal and abnormal electrophysiology of the two nodes. In accordance with experimental findings: (i during sinus rhythm, conduction occurs down the interatrial septum and into the atrioventricular node via the fast pathway (conduction down the crista terminalis and into the atrioventricular node via the slow pathway is slower; (ii during atrial fibrillation, the sinoatrial node is protected from overdrive by its long refractory period; and (iii during atrial fibrillation, the atrioventricular node reduces the frequency of action potentials reaching the ventricles. The model is able to simulate ventricular echo beats. In summary, a 3D anatomical model of the right atrium containing the cardiac conduction system is able to simulate a wide range of classical nodal behaviours.

  18. Periradicular regenerative surgery in a maxillary central incisor: 7-year results including cone-beam computed tomography.

    Science.gov (United States)

    Kourkouta, Stella; Bailey, Graham C

    2014-07-01

    A case of a symptomatic maxillary central incisor that underwent periradicular regenerative surgery with a successful long-term clinical and radiographic outcome is presented. A 52-year old woman was referred to the Endodontology Clinic, UCL Eastman Dental Institute and Hospital, London, UK, in 2004 for swelling and discoloration of the maxillary right central incisor. There was a history of trauma 21 years previously. The tooth was endodontically treated 5 years before the referral. At presentation, there was diffuse facial swelling/erythema and a periodontal probing depth of 11 mm on the midfacial surface with bleeding on probing and purulent exudate. Endodontic retreatment was completed along with subgingival debridement. Reassessment at 6 weeks showed persistent purulent exudate and a probing depth up to 13 mm facially. Periradicular surgery was performed for the purposes of surgical exploration, apical resection and root-end filling with mineral trioxide aggregate, and guided tissue regeneration using a bone xenograft and collagen membrane. Histopathology confirmed the presence of a radicular cyst. Clinical and radiographic evaluation, including cone-beam computed tomographic imaging, at 7 years postoperatively showed a probing depth up to 3 mm and hard tissue formation apically, interproximally, and partly facially on the root surface. In this case of a combined endodontic-periodontic lesion in a maxillary central incisor, regenerative periradicular surgery led to the resolution of the defect, significant attachment gain, and a stable clinical and radiographic outcome after 7 years of follow-up. Copyright © 2014 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  19. 76 FR 81986 - Continuous Computing, Inc. (CCPU), A Subsidiary of RadiSys Corporation, Including On-Site Leased...

    Science.gov (United States)

    2011-12-29

    ... shows that worker separations have occurred involving employees of the subject firm who telework from... telework and report to the San Diego, California facility of Continuous Computing, Inc. (CCPU), a...

  20. Quantum wavepacket ab initio molecular dynamics: an approach for computing dynamically averaged vibrational spectra including critical nuclear quantum effects.

    Science.gov (United States)

    Sumner, Isaiah; Iyengar, Srinivasan S

    2007-10-18

    We have introduced a computational methodology to study vibrational spectroscopy in clusters inclusive of critical nuclear quantum effects. This approach is based on the recently developed quantum wavepacket ab initio molecular dynamics method that combines quantum wavepacket dynamics with ab initio molecular dynamics. The computational efficiency of the dynamical procedure is drastically improved (by several orders of magnitude) through the utilization of wavelet-based techniques combined with the previously introduced time-dependent deterministic sampling procedure measure to achieve stable, picosecond length, quantum-classical dynamics of electrons and nuclei in clusters. The dynamical information is employed to construct a novel cumulative flux/velocity correlation function, where the wavepacket flux from the quantized particle is combined with classical nuclear velocities to obtain the vibrational density of states. The approach is demonstrated by computing the vibrational density of states of [Cl-H-Cl]-, inclusive of critical quantum nuclear effects, and our results are in good agreement with experiment. A general hierarchical procedure is also provided, based on electronic structure harmonic frequencies, classical ab initio molecular dynamics, computation of nuclear quantum-mechanical eigenstates, and employing quantum wavepacket ab initio dynamics to understand vibrational spectroscopy in hydrogen-bonded clusters that display large degrees of anharmonicities.

  1. COMPUTING

    CERN Multimedia

    P. McBride

    The Computing Project is preparing for a busy year where the primary emphasis of the project moves towards steady operations. Following the very successful completion of Computing Software and Analysis challenge, CSA06, last fall, we have reorganized and established four groups in computing area: Commissioning, User Support, Facility/Infrastructure Operations and Data Operations. These groups work closely together with groups from the Offline Project in planning for data processing and operations. Monte Carlo production has continued since CSA06, with about 30M events produced each month to be used for HLT studies and physics validation. Monte Carlo production will continue throughout the year in the preparation of large samples for physics and detector studies ramping to 50 M events/month for CSA07. Commissioning of the full CMS computing system is a major goal for 2007. Site monitoring is an important commissioning component and work is ongoing to devise CMS specific tests to be included in Service Availa...

  2. COMPUTING

    CERN Multimedia

    P. McBride

    It has been a very active year for the computing project with strong contributions from members of the global community. The project has focused on site preparation and Monte Carlo production. The operations group has begun processing data from P5 as part of the global data commissioning. Improvements in transfer rates and site availability have been seen as computing sites across the globe prepare for large scale production and analysis as part of CSA07. Preparations for the upcoming Computing Software and Analysis Challenge CSA07 are progressing. Ian Fisk and Neil Geddes have been appointed as coordinators for the challenge. CSA07 will include production tests of the Tier-0 production system, reprocessing at the Tier-1 sites and Monte Carlo production at the Tier-2 sites. At the same time there will be a large analysis exercise at the Tier-2 centres. Pre-production simulation of the Monte Carlo events for the challenge is beginning. Scale tests of the Tier-0 will begin in mid-July and the challenge it...

  3. An Accurate and Dynamic Computer Graphics Muscle Model

    Science.gov (United States)

    Levine, David Asher

    1997-01-01

    A computer based musculo-skeletal model was developed at the University in the departments of Mechanical and Biomedical Engineering. This model accurately represents human shoulder kinematics. The result of this model is the graphical display of bones moving through an appropriate range of motion based on inputs of EMGs and external forces. The need existed to incorporate a geometric muscle model in the larger musculo-skeletal model. Previous muscle models did not accurately represent muscle geometries, nor did they account for the kinematics of tendons. This thesis covers the creation of a new muscle model for use in the above musculo-skeletal model. This muscle model was based on anatomical data from the Visible Human Project (VHP) cadaver study. Two-dimensional digital images from the VHP were analyzed and reconstructed to recreate the three-dimensional muscle geometries. The recreated geometries were smoothed, reduced, and sliced to form data files defining the surfaces of each muscle. The muscle modeling function opened these files during run-time and recreated the muscle surface. The modeling function applied constant volume limitations to the muscle and constant geometry limitations to the tendons.

  4. COMPUTING

    CERN Multimedia

    M. Kasemann

    CMS relies on a well functioning, distributed computing infrastructure. The Site Availability Monitoring (SAM) and the Job Robot submission have been very instrumental for site commissioning in order to increase availability of more sites such that they are available to participate in CSA07 and are ready to be used for analysis. The commissioning process has been further developed, including "lessons learned" documentation via the CMS twiki. Recently the visualization, presentation and summarizing of SAM tests for sites has been redesigned, it is now developed by the central ARDA project of WLCG. Work to test the new gLite Workload Management System was performed; a 4 times increase in throughput with respect to LCG Resource Broker is observed. CMS has designed and launched a new-generation traffic load generator called "LoadTest" to commission and to keep exercised all data transfer routes in the CMS PhE-DEx topology. Since mid-February, a transfer volume of about 12 P...

  5. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview In autumn the main focus was to process and handle CRAFT data and to perform the Summer08 MC production. The operational aspects were well covered by regular Computing Shifts, experts on duty and Computing Run Coordination. At the Computing Resource Board (CRB) in October a model to account for service work at Tier 2s was approved. The computing resources for 2009 were reviewed for presentation at the C-RRB. The quarterly resource monitoring is continuing. Facilities/Infrastructure operations Operations during CRAFT data taking ran fine. This proved to be a very valuable experience for T0 workflows and operations. The transfers of custodial data to most T1s went smoothly. A first round of reprocessing started at the Tier-1 centers end of November; it will take about two weeks. The Computing Shifts procedure was tested full scale during this period and proved to be very efficient: 30 Computing Shifts Persons (CSP) and 10 Computing Resources Coordinators (CRC). The shift program for the shut down w...

  6. 20 CFR 229.41 - When a spouse can no longer be included in computing an annuity rate under the overall minimum.

    Science.gov (United States)

    2010-04-01

    ... annuity rate under the overall minimum. A spouse's inclusion in the computation of the overall minimum... spouse's care, attains age 16 and is not disabled, or, if disabled, recovers from being disabled; or (d...

  7. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview During the past three months activities were focused on data operations, testing and re-enforcing shift and operational procedures for data production and transfer, MC production and on user support. Planning of the computing resources in view of the new LHC calendar in ongoing. Two new task forces were created for supporting the integration work: Site Commissioning, which develops tools helping distributed sites to monitor job and data workflows, and Analysis Support, collecting the user experience and feedback during analysis activities and developing tools to increase efficiency. The development plan for DMWM for 2009/2011 was developed at the beginning of the year, based on the requirements from the Physics, Computing and Offline groups (see Offline section). The Computing management meeting at FermiLab on February 19th and 20th was an excellent opportunity discussing the impact and for addressing issues and solutions to the main challenges facing CMS computing. The lack of manpower is particul...

  8. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction CMS distributed computing system performed well during the 2011 start-up. The events in 2011 have more pile-up and are more complex than last year; this results in longer reconstruction times and harder events to simulate. Significant increases in computing capacity were delivered in April for all computing tiers, and the utilisation and load is close to the planning predictions. All computing centre tiers performed their expected functionalities. Heavy-Ion Programme The CMS Heavy-Ion Programme had a very strong showing at the Quark Matter conference. A large number of analyses were shown. The dedicated heavy-ion reconstruction facility at the Vanderbilt Tier-2 is still involved in some commissioning activities, but is available for processing and analysis. Facilities and Infrastructure Operations Facility and Infrastructure operations have been active with operations and several important deployment tasks. Facilities participated in the testing and deployment of WMAgent and WorkQueue+Request...

  9. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing activity had ramped down after the completion of the reprocessing of the 2012 data and parked data, but is increasing with new simulation samples for analysis and upgrade studies. Much of the Computing effort is currently involved in activities to improve the computing system in preparation for 2015. Operations Office Since the beginning of 2013, the Computing Operations team successfully re-processed the 2012 data in record time, not only by using opportunistic resources like the San Diego Supercomputer Center which was accessible, to re-process the primary datasets HTMHT and MultiJet in Run2012D much earlier than planned. The Heavy-Ion data-taking period was successfully concluded in February collecting almost 500 T. Figure 3: Number of events per month (data) In LS1, our emphasis is to increase efficiency and flexibility of the infrastructure and operation. Computing Operations is working on separating disk and tape at the Tier-1 sites and the full implementation of the xrootd federation ...

  10. 20 CFR 229.42 - When a child can no longer be included in computing an annuity rate under the overall minimum.

    Science.gov (United States)

    2010-04-01

    ... annuity rate under the overall minimum. A child's inclusion in the computation of the overall minimum rate..., unless the child is disabled or a full-time student, as shown in part 216 of this chapter; or (d) The... secondary school, and not disabled; or (f) The month before the month the child becomes entitled to an...

  11. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion An activity that is still in progress is computing for the heavy-ion program. The heavy-ion events are collected without zero suppression, so the event size is much large at roughly 11 MB per event of RAW. The central collisions are more complex and...

  12. COMPUTING

    CERN Multimedia

    M. Kasemann P. McBride Edited by M-C. Sawley with contributions from: P. Kreuzer D. Bonacorsi S. Belforte F. Wuerthwein L. Bauerdick K. Lassila-Perini M-C. Sawley

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the comput...

  13. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

    Introduction Computing continued with a high level of activity over the winter in preparation for conferences and the start of the 2012 run. 2012 brings new challenges with a new energy, more complex events, and the need to make the best use of the available time before the Long Shutdown. We expect to be resource constrained on all tiers of the computing system in 2012 and are working to ensure the high-priority goals of CMS are not impacted. Heavy ions After a successful 2011 heavy-ion run, the programme is moving to analysis. During the run, the CAF resources were well used for prompt analysis. Since then in 2012 on average 200 job slots have been used continuously at Vanderbilt for analysis workflows. Operations Office As of 2012, the Computing Project emphasis has moved from commissioning to operation of the various systems. This is reflected in the new organisation structure where the Facilities and Data Operations tasks have been merged into a common Operations Office, which now covers everything ...

  14. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion The Tier 0 infrastructure was able to repack and promptly reconstruct heavy-ion collision data. Two copies were made of the data at CERN using a large CASTOR disk pool, and the core physics sample was replicated ...

  15. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the co...

  16. COMPUTING

    CERN Multimedia

    M. Kasemann

    CCRC’08 challenges and CSA08 During the February campaign of the Common Computing readiness challenges (CCRC’08), the CMS computing team had achieved very good results. The link between the detector site and the Tier0 was tested by gradually increasing the number of parallel transfer streams well beyond the target. Tests covered the global robustness at the Tier0, processing a massive number of very large files and with a high writing speed to tapes.  Other tests covered the links between the different Tiers of the distributed infrastructure and the pre-staging and reprocessing capacity of the Tier1’s: response time, data transfer rate and success rate for Tape to Buffer staging of files kept exclusively on Tape were measured. In all cases, coordination with the sites was efficient and no serious problem was found. These successful preparations prepared the ground for the second phase of the CCRC’08 campaign, in May. The Computing Software and Analysis challen...

  17. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction The first data taking period of November produced a first scientific paper, and this is a very satisfactory step for Computing. It also gave the invaluable opportunity to learn and debrief from this first, intense period, and make the necessary adaptations. The alarm procedures between different groups (DAQ, Physics, T0 processing, Alignment/calibration, T1 and T2 communications) have been reinforced. A major effort has also been invested into remodeling and optimizing operator tasks in all activities in Computing, in parallel with the recruitment of new Cat A operators. The teams are being completed and by mid year the new tasks will have been assigned. CRB (Computing Resource Board) The Board met twice since last CMS week. In December it reviewed the experience of the November data-taking period and could measure the positive improvements made for the site readiness. It also reviewed the policy under which Tier-2 are associated with Physics Groups. Such associations are decided twice per ye...

  18. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction During the past six months, Computing participated in the STEP09 exercise, had a major involvement in the October exercise and has been working with CMS sites on improving open issues relevant for data taking. At the same time operations for MC production, real data reconstruction and re-reconstructions and data transfers at large scales were performed. STEP09 was successfully conducted in June as a joint exercise with ATLAS and the other experiments. It gave good indication about the readiness of the WLCG infrastructure with the two major LHC experiments stressing the reading, writing and processing of physics data. The October Exercise, in contrast, was conducted as an all-CMS exercise, where Physics, Computing and Offline worked on a common plan to exercise all steps to efficiently access and analyze data. As one of the major results, the CMS Tier-2s demonstrated to be fully capable for performing data analysis. In recent weeks, efforts were devoted to CMS Computing readiness. All th...

  19. [The estimation of the efficacy of manual therapy included in the combined treatment of cochlear-vestibular disorders based on the results of computed stabilography].

    Science.gov (United States)

    Shempeleva, A É; Lopatin, A S; Morozova, S V; Gridin, L A

    2012-01-01

    The objective of the present study was to estimate the efficacy of the combined treatment of spondylogenic cochlear-vestibular disorders with the use of both medicamental and non-medicamental modalities. Computed static stabilometry was applied for diagnostics of postural disbalance and evaluation of the treatment outcomes. It was shown that the application of manual therapy for the management of 56 patients presenting with spondylogenic cochlear-vestibular disorders resulted in the decrease of tinnitus and the improvement of vestibular and cochlear functions.

  20. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing operation has been lower as the Run 1 samples are completing and smaller samples for upgrades and preparations are ramping up. Much of the computing activity is focusing on preparations for Run 2 and improvements in data access and flexibility of using resources. Operations Office Data processing was slow in the second half of 2013 with only the legacy re-reconstruction pass of 2011 data being processed at the sites.   Figure 1: MC production and processing was more in demand with a peak of over 750 Million GEN-SIM events in a single month.   Figure 2: The transfer system worked reliably and efficiently and transferred on average close to 520 TB per week with peaks at close to 1.2 PB.   Figure 3: The volume of data moved between CMS sites in the last six months   The tape utilisation was a focus for the operation teams with frequent deletion campaigns from deprecated 7 TeV MC GEN-SIM samples to INVALID datasets, which could be cleaned up...

  1. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

      Introduction Computing activity has been running at a sustained, high rate as we collect data at high luminosity, process simulation, and begin to process the parked data. The system is functional, though a number of improvements are planned during LS1. Many of the changes will impact users, we hope only in positive ways. We are trying to improve the distributed analysis tools as well as the ability to access more data samples more transparently.  Operations Office Figure 2: Number of events per month, for 2012 Since the June CMS Week, Computing Operations teams successfully completed data re-reconstruction passes and finished the CMSSW_53X MC campaign with over three billion events available in AOD format. Recorded data was successfully processed in parallel, exceeding 1.2 billion raw physics events per month for the first time in October 2012 due to the increase in data-parking rate. In parallel, large efforts were dedicated to WMAgent development and integrati...

  2. COMPUTING

    CERN Multimedia

    2010-01-01

    Introduction Just two months after the “LHC First Physics” event of 30th March, the analysis of the O(200) million 7 TeV collision events in CMS accumulated during the first 60 days is well under way. The consistency of the CMS computing model has been confirmed during these first weeks of data taking. This model is based on a hierarchy of use-cases deployed between the different tiers and, in particular, the distribution of RECO data to T1s, who then serve data on request to T2s, along a topology known as “fat tree”. Indeed, during this period this model was further extended by almost full “mesh” commissioning, meaning that RECO data were shipped to T2s whenever possible, enabling additional physics analyses compared with the “fat tree” model. Computing activities at the CMS Analysis Facility (CAF) have been marked by a good time response for a load almost evenly shared between ALCA (Alignment and Calibration tasks - highest p...

  3. COMPUTING

    CERN Multimedia

    Matthias Kasemann

    Overview The main focus during the summer was to handle data coming from the detector and to perform Monte Carlo production. The lessons learned during the CCRC and CSA08 challenges in May were addressed by dedicated PADA campaigns lead by the Integration team. Big improvements were achieved in the stability and reliability of the CMS Tier1 and Tier2 centres by regular and systematic follow-up of faults and errors with the help of the Savannah bug tracking system. In preparation for data taking the roles of a Computing Run Coordinator and regular computing shifts monitoring the services and infrastructure as well as interfacing to the data operations tasks are being defined. The shift plan until the end of 2008 is being put together. User support worked on documentation and organized several training sessions. The ECoM task force delivered the report on “Use Cases for Start-up of pp Data-Taking” with recommendations and a set of tests to be performed for trigger rates much higher than the ...

  4. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction A large fraction of the effort was focused during the last period into the preparation and monitoring of the February tests of Common VO Computing Readiness Challenge 08. CCRC08 is being run by the WLCG collaboration in two phases, between the centres and all experiments. The February test is dedicated to functionality tests, while the May challenge will consist of running at all centres and with full workflows. For this first period, a number of functionality checks of the computing power, data repositories and archives as well as network links are planned. This will help assess the reliability of the systems under a variety of loads, and identifying possible bottlenecks. Many tests are scheduled together with other VOs, allowing the full scale stress test. The data rates (writing, accessing and transfer¬ring) are being checked under a variety of loads and operating conditions, as well as the reliability and transfer rates of the links between Tier-0 and Tier-1s. In addition, the capa...

  5. COMPUTING

    CERN Multimedia

    Contributions from I. Fisk

    2012-01-01

    Introduction The start of the 2012 run has been busy for Computing. We have reconstructed, archived, and served a larger sample of new data than in 2011, and we are in the process of producing an even larger new sample of simulations at 8 TeV. The running conditions and system performance are largely what was anticipated in the plan, thanks to the hard work and preparation of many people. Heavy ions Heavy Ions has been actively analysing data and preparing for conferences.  Operations Office Figure 6: Transfers from all sites in the last 90 days For ICHEP and the Upgrade efforts, we needed to produce and process record amounts of MC samples while supporting the very successful data-taking. This was a large burden, especially on the team members. Nevertheless the last three months were very successful and the total output was phenomenal, thanks to our dedicated site admins who keep the sites operational and the computing project members who spend countless hours nursing the...

  6. COMPUTING

    CERN Multimedia

    P. MacBride

    The Computing Software and Analysis Challenge CSA07 has been the main focus of the Computing Project for the past few months. Activities began over the summer with the preparation of the Monte Carlo data sets for the challenge and tests of the new production system at the Tier-0 at CERN. The pre-challenge Monte Carlo production was done in several steps: physics generation, detector simulation, digitization, conversion to RAW format and the samples were run through the High Level Trigger (HLT). The data was then merged into three "Soups": Chowder (ALPGEN), Stew (Filtered Pythia) and Gumbo (Pythia). The challenge officially started when the first Chowder events were reconstructed on the Tier-0 on October 3rd. The data operations teams were very busy during the the challenge period. The MC production teams continued with signal production and processing while the Tier-0 and Tier-1 teams worked on splitting the Soups into Primary Data Sets (PDS), reconstruction and skimming. The storage sys...

  7. Short- and Medium-Term Efficacy of a Web-Based Computer-Tailored Nutrition Education Intervention for Adults Including Cognitive and Environmental Feedback: Randomized Controlled Trial

    Science.gov (United States)

    Lechner, Lilian; de Vries, Hein; Candel, Math JJM; Oenema, Anke

    2015-01-01

    Background Web-based, computer-tailored nutrition education interventions can be effective in modifying self-reported dietary behaviors. Traditional computer-tailored programs primarily targeted individual cognitions (knowledge, awareness, attitude, self-efficacy). Tailoring on additional variables such as self-regulation processes and environmental-level factors (the home food environment arrangement and perception of availability and prices of healthy food products in supermarkets) may improve efficacy and effect sizes (ES) of Web-based computer-tailored nutrition education interventions. Objective This study evaluated the short- and medium-term efficacy and educational differences in efficacy of a cognitive and environmental feedback version of a Web-based computer-tailored nutrition education intervention on self-reported fruit, vegetable, high-energy snack, and saturated fat intake compared to generic nutrition information in the total sample and among participants who did not comply with dietary guidelines (the risk groups). Methods A randomized controlled trial was conducted with a basic (tailored intervention targeting individual cognition and self-regulation processes; n=456), plus (basic intervention additionally targeting environmental-level factors; n=459), and control (generic nutrition information; n=434) group. Participants were recruited from the general population and randomly assigned to a study group. Self-reported fruit, vegetable, high-energy snack, and saturated fat intake were assessed at baseline and at 1- (T1) and 4-months (T2) postintervention using online questionnaires. Linear mixed model analyses examined group differences in change over time. Educational differences were examined with group×time×education interaction terms. Results In the total sample, the basic (T1: ES=–0.30; T2: ES=–0.18) and plus intervention groups (T1: ES=–0.29; T2: ES=–0.27) had larger decreases in high-energy snack intake than the control group. The

  8. Referencing of markerless CT data sets with cone beam subvolume including registration markers to ease computer-assisted surgery - a clinical and technical research.

    Science.gov (United States)

    Essig, Harald; Rana, Majeed; Kokemueller, Horst; Zizelmann, Christoph; von See, Constantin; Ruecker, Martin; Tavassol, Frank; Gellrich, Nils-Claudius

    2013-09-01

    As a prerequisite in navigation-assisted surgery, a three-dimensional image data set with registration marker is necessary. Often patients are presented, not being aware of facing a computer-assisted surgical intervention (CAS), with an already performed computed tomography (CT) data set without marker. The aim of this study was to evaluate the accuracy of a new method which allows performing CAS by enhancing the initial markerless data set with a marked subvolume gained by cone beam (CBCT) scan. Therefore four registration markers are inserted and afterwards the patient is strongly limited to the field of interest scanned by CBCT scan (marked data set). Superimposed with the initial data set, a data set with reference markers and with full information is obtained. Registration procedure was performed with group A (25 patients, superimposed marked CBCT scan) and group B (25 patients, initially marked CT scan) using BrainLab® navigation by two observers and overall system accuracy was measured using the registration landmarks and additional intraoperative landmarks (tooth cusps). Adequate image quality assumed, no significant difference between group A and B was detected. Enhancing an initially performed data set with registration marker by using a marked subvolume could improve the workflow for navigation-assisted surgery due to the availability of cone beam scan technology, provide excellent resolution with reduced metal artifacts nearby dental restorations, and reduce radiation dose for the patient. Regarding the advantages of the new method which allows performing CAS by enhancing the initial markerless data set with a marked subvolume gained by cone beam (CBCT) scan, this technique will play a major part in navigation-assisted surgery and will address widespread general methodological solutions that are of great interest in multidisciplinary treatment. Copyright © 2013 John Wiley & Sons, Ltd.

  9. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction The Computing Team successfully completed the storage, initial processing, and distribution for analysis of proton-proton data in 2011. There are still a variety of activities ongoing to support winter conference activities and preparations for 2012. Heavy ions The heavy-ion run for 2011 started in early November and has already demonstrated good machine performance and success of some of the more advanced workflows planned for 2011. Data collection will continue until early December. Facilities and Infrastructure Operations Operational and deployment support for WMAgent and WorkQueue+Request Manager components, routinely used in production by Data Operations, are provided. The GlideInWMS and components installation are now deployed at CERN, which is added to the GlideInWMS factory placed in the US. There has been new operational collaboration between the CERN team and the UCSD GlideIn factory operators, covering each others time zones by monitoring/debugging pilot jobs sent from the facto...

  10. Planned development and evaluation protocol of two versions of a web-based computer-tailored nutrition education intervention aimed at adults, including cognitive and environmental feedback

    Science.gov (United States)

    2014-01-01

    Background Despite decades of nutrition education, the prevalence of unhealthy dietary patterns is still high and inequalities in intake between high and low socioeconomic groups still exist. Therefore, it is important to innovate and improve existing nutrition education interventions. This paper describes the development, design and evaluation protocol of a web-based computer-tailored nutrition education intervention for adults targeting fruit, vegetable, high-energy snack and fat intake. This intervention innovates existing computer-tailored interventions by not only targeting motivational factors, but also volitional and self-regulation processes and environmental-level factors. Methods/design The intervention development was guided by the Intervention Mapping protocol, ensuring a theory-informed and evidence-based intervention. Two versions of the intervention were developed: a basic version targeting knowledge, awareness, attitude, self-efficacy and volitional and self-regulation processes, and a plus version additionally addressing the home environment arrangement and the availability and price of healthy food products in supermarkets. Both versions consist of four modules: one for each dietary behavior, i.e. fruit, vegetables, high-energy snacks and fat. Based on the self-regulation phases, each module is divided into three sessions. In the first session, feedback on dietary behavior is provided to increase awareness, feedback on attitude and self-efficacy is provided and goals and action plans are stated. In the second session goal achievement is evaluated, reasons for failure are explored, coping plans are stated and goals can be adapted. In the third session, participants can again evaluate their behavioral change and tips for maintenance are provided. Both versions will be evaluated in a three-group randomized controlled trial with measurements at baseline, 1-month, 4-months and 9-months post-intervention, using online questionnaires. Both versions will

  11. Spelling is just a click away – a user-centered brain-computer interface including auto-calibration and predictive text entry

    Directory of Open Access Journals (Sweden)

    Tobias eKaufmann

    2012-05-01

    Full Text Available Brain Computer Interfaces (BCI based on event-related potentials (ERP allow for selection of characters from a visually presented character-matrix and thus provide a communication channel for users with neurodegenerative disease. Although they have been topic of research for more than 20 years and were multiply proven to be a reliable communication method, BCIs are almost exclusively used in experimental settings, handled by qualified experts. This study investigates if ERP-BCIs can be handled independently by laymen without expert interference, which is inevitable for establishing BCIs in end-user’s daily life situations. Furthermore we compared the classic character-by-character text entry against a predictive text entry (PTE that directly incorporates predictive text into the character matrix. N=19 BCI novices handled a user-centred ERP-BCI application on their own without expert interference. The software individually adjusted classifier weights and control parameters in the background, invisible to the user (auto-calibration. All participants were able to operate the software on their own and to twice correctly spell a sentence with the auto-calibrated classifier (once with PTE, once without. Our PTE increased spelling speed and importantly did not reduce accuracy. In sum, this study demonstrates feasibility of auto-calibrating ERP-BCI use, independently by laymen and the strong benefit of integrating predictive text directly into the character-matrix.

  12. Computational Assessment of a 3-Stage Axial Compressor Which Provides Airflow to the NASA 11- by 11-Foot Transonic Wind Tunnel, Including Design Changes for Increased Performance

    Science.gov (United States)

    Kulkarni, Sameer; Beach, Timothy A.; Jorgenson, Philip C.; Veres, Joseph P.

    2017-01-01

    A 24 foot diameter 3-stage axial compressor powered by variable-speed induction motors provides the airflow in the closed-return 11- by 11-Foot Transonic Wind Tunnel (11-Foot TWT) Facility at NASA Ames Research Center at Moffett Field, California. The facility is part of the Unitary Plan Wind Tunnel, which was completed in 1955. Since then, upgrades made to the 11-Foot TWT such as flow conditioning devices and instrumentation have increased blockage and pressure loss in the tunnel, somewhat reducing the peak Mach number capability of the test section. Due to erosion effects on the existing aluminum alloy rotor blades, fabrication of new steel rotor blades is planned. This presents an opportunity to increase the Mach number capability of the tunnel by redesigning the compressor for increased pressure ratio. Challenging design constraints exist for any proposed design, demanding the use of the existing driveline, rotor disks, stator vanes, and hub and casing flow paths, so as to minimize cost and installation time. The current effort was undertaken to characterize the performance of the existing compressor design using available design tools and computational fluid dynamics (CFD) codes and subsequently recommend a new compressor design to achieve higher pressure ratio, which directly correlates with increased test section Mach number. The constant cross-sectional area of the compressor leads to highly diffusion factors, which presents a challenge in simulating the existing design. The CFD code APNASA was used to simulate the aerodynamic performance of the existing compressor. The simulations were compared to performance predictions from the HT0300 turbomachinery design and analysis code, and to compressor performance data taken during a 1997 facility test. It was found that the CFD simulations were sensitive to endwall leakages associated with stator buttons, and to a lesser degree, under-stator-platform flow recirculation at the hub. When stator button leakages were

  13. The Necessity and Desirability of Including Recipients of Federal Grants Other Than from the Veterans Administration in the 85-15 Ratio Computation. (Prepared in Compliance With Section 305, Public Law 95-202). House Committee Print No. 168.

    Science.gov (United States)

    Veterans Administration, Washington, DC.

    This report presents the findings and recommendations of a study by the Veterans Administration concerning the necessity for including in the computation of the 85-15 ratio those students in receipt of grants from federal agencies other than the Veterans Administration. The problems incurred by educational institutions in the implementation of the…

  14. On the non-linear spectroscopy including saturated absorption and four-wave mixing in two and multi-level atoms: a computational study

    Science.gov (United States)

    Patel, M.; De Jager, G.; Nkosi, Z.; Wyngaard, A.; Govender, K.

    2017-10-01

    In this paper we report on the study of two and multi-level atoms interacting with multiple laser beams. The semi-classical approach is used to describe the system in which the atoms are treated quantum mechanically via the density matrix operator, while the laser beams are treated classically using Maxwells equations. We present results of a two level atom interacting with single and multiple laser beams and demonstrate Rabi oscillations between the levels. The effects of laser modulation on the dynamics of the atom (atomic populations and coherences) are examined by solving the optical Bloch equations. Plots of the density matrix elements as a function of time are presented for various parameters such as laser intensity, detuning, modulation etc. In addition, phase-space plots and Fourier analysis of the density matrix elements are provided. The atomic polarization, estimated from the coherence terms of the density matrix elements, is used in the numerical solution of Maxwells equations to determine the behaviour of the laser beams as they propagate through the atomic ensemble. The effects of saturation and hole-burning are demonstrated in the case of two counter propagating beams with one being a strong beam and the other being very weak. The above work is extended to include four-wave mixing in four level atoms in a diamond configuration. Two co-propagating beams of different wavelengths drive the atoms from a ground state |1〉 to an excited state |3〉 via an intermediate state |2〉. The atoms then move back to the ground state via another intermediate state |4〉, resulting in the generation of two additional correlated photon beams. The characteristics of these additional photons are studied.

  15. ORCODE. 77: a computer routine to control a nuclear physics experiment by a PDP-15 + CAMAC system, written in assembler language and including many new routines of general interest

    Energy Technology Data Exchange (ETDEWEB)

    Dickens, J.K.; McConnell, J.W.

    1977-03-29

    ORCODE.77 is a versatile data-handling computer routine written in MACRO (assembler) language for a PDP-15 computer with EAE (extended arithmetic capability) connected to a CAMAC interface. The Interrupt feature of the computer is utilized. Although the code is oriented for a specific experimental problem, there are many routines of general interest, including a CAMAC Scaler handler, an executive routine to interpret and act upon three-character teletype commands, concise routines to type out double-precision integers (both octal and decimal) and floating-point numbers and to read in integers and floating-point numbers, a routine to convert to and from PDP-15 FORTRAN-IV floating-point format, a routine to handle clock interrupts, and our own DECTAPE handling routine. Routines having specific applications which are applicable to other very similar applications include a display routine using CAMAC instructions, control of external mechanical equipment using CAMAC instructions, storage of data from an Analog-to-digital Converter, analysis of stored data into time-dependent pulse-height spectra, and a routine to read the contents of a Nuclear Data 5050 Analyzer and to prepare DECTAPE output of these data for subsequent analysis by a code written in PDP-15-compiled FORTRAN-IV.

  16. An appraisal of the computed axial tomographic appearance of the human mesentery based on mesenteric contiguity from the duodenojejunal flexure to the mesorectal level

    Energy Technology Data Exchange (ETDEWEB)

    Coffey, J.C.; Culligan, Kevin; Walsh, Leon G.; Sehgal, Rishab; Dunne, Colum; McGrath, Deirdre; Walsh, Dara [University Hospital Limerick, Centre for Interventions in Infection, Inflammation and Immunity (4i), Graduate Entry Medical School and Department of Surgery, Limerick (Ireland); Moore, Michael [Cork University Hospital, Department of Radiology, Cork (Ireland); Staunton, Marie [Mercy University Hospital, Department of Radiology, Cork (Ireland); Scanlon, Timothy; Dewhurst, Catherine; Kenny, Bryan; O' Brien, Julie M. [University Hospital Limerick, Department of Radiology, Limerick (Ireland); O' Riordan, Conor [Kilkenny General Hospital, Department of Radiology, Kilkenny (Ireland); Quondamatteo, Fabio; Dockery, Peter [National University of Ireland Galway, Anatomy, School of Medicine, Galway (Ireland)

    2016-03-15

    The human mesentery is now regarded as contiguous from the duodenojejunal (DJ) to anorectal level. This interpretation prompts re-appraisal of computed tomography (CT) images of the mesentery. A digital model and reference atlas of the mesentery were generated using the full-colour data set of the Visible Human Project (VHP). Seventy one normal abdominal CT images were examined to identify mesenteric regions. CT appearances were correlated with cadaveric and histological appearances at corresponding levels. Ascending, descending and sigmoid mesocolons were identifiable in 75 %, 86 % and 88 % of the CTs, respectively. Flexural contiguity was evident in 66 %, 68 %, 71 % and 80 % for the ileocaecal, hepatic, splenic and rectosigmoid flexures, respectively. A posterior mesocolic boundary corresponding to the anterior renal fascia was evident in 40 % and 54 % of cases on the right and left, respectively. The anterior pararenal space (in front of the boundary) corresponded to the mesocolon. Using the VHP, a mesenteric digital model and reference atlas were developed. This enabled re-appraisal of CT images of the mesentery, in which contiguous flexural and non-flexural mesenteric regions were repeatedly identifiable. The anterior pararenal space corresponded to the mesocolon. (orig.)

  17. Non-driving intersegmental knee moments in cycling computed using a model that includes three-dimensional kinematics of the shank/foot and the effect of simplifying assumptions.

    Science.gov (United States)

    Gregersen, Colin S; Hull, M L

    2003-06-01

    Assessing the importance of non-driving intersegmental knee moments (i.e. varus/valgus and internal/external axial moments) on over-use knee injuries in cycling requires the use of a three-dimensional (3-D) model to compute these loads. The objectives of this study were: (1) to develop a complete, 3-D model of the lower limb to calculate the 3-D knee loads during pedaling for a sample of the competitive cycling population, and (2) to examine the effects of simplifying assumptions on the calculations of the non-driving knee moments. The non-driving knee moments were computed using a complete 3-D model that allowed three rotational degrees of freedom at the knee joint, included the 3-D inertial loads of the shank/foot, and computed knee loads in a shank-fixed coordinate system. All input data, which included the 3-D segment kinematics and the six pedal load components, were collected from the right limb of 15 competitive cyclists while pedaling at 225 W and 90 rpm. On average, the peak varus and internal axial moments of 7.8 and 1.5 N m respectively occurred during the power stroke whereas the peak valgus and external axial moments of 8.1 and 2.5 N m respectively occurred during the recovery stroke. However, the non-driving knee moments were highly variable between subjects; the coefficients of variability in the peak values ranged from 38.7% to 72.6%. When it was assumed that the inertial loads of the shank/foot for motion out of the sagittal plane were zero, the root-mean-squared difference (RMSD) in the non-driving knee moments relative to those for the complete model was 12% of the peak varus/valgus moment and 25% of the peak axial moment. When it was also assumed that the knee joint was revolute with the flexion/extension axis perpendicular to the sagittal plane, the RMSD increased to 24% of the peak varus/valgus moment and 204% of the peak axial moment. Thus, the 3-D orientation of the shank segment has a major affect on the computation of the non-driving knee

  18. 34 CFR 303.15 - Include; including.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Include; including. 303.15 Section 303.15 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION EARLY INTERVENTION PROGRAM FOR INFANTS AND TODDLERS WITH...

  19. Optical Computing

    Indian Academy of Sciences (India)

    tal computers are still some years away, however a number of devices that can ultimately lead to real optical computers have already been manufactured, including optical logic gates, optical switches, optical interconnections, and opti- cal memory. The most likely near-term optical computer will really be a hybrid composed ...

  20. Computational vision

    CERN Document Server

    Wechsler, Harry

    1990-01-01

    The book is suitable for advanced courses in computer vision and image processing. In addition to providing an overall view of computational vision, it contains extensive material on topics that are not usually covered in computer vision texts (including parallel distributed processing and neural networks) and considers many real applications.

  1. CASKS (Computer Analysis of Storage casKS): A microcomputer based analysis system for storage cask design review. User`s manual to Version 1b (including program reference)

    Energy Technology Data Exchange (ETDEWEB)

    Chen, T.F.; Gerhard, M.A.; Trummer, D.J.; Johnson, G.L.; Mok, G.C. [Lawrence Livermore National Lab., CA (United States)

    1995-02-01

    CASKS (Computer Analysis of Storage casKS) is a microcomputer-based system of computer programs and databases developed at the Lawrence Livermore National Laboratory (LLNL) for evaluating safety analysis reports on spent-fuel storage casks. The bulk of the complete program and this user`s manual are based upon the SCANS (Shipping Cask ANalysis System) program previously developed at LLNL. A number of enhancements and improvements were added to the original SCANS program to meet requirements unique to storage casks. CASKS is an easy-to-use system that calculates global response of storage casks to impact loads, pressure loads and thermal conditions. This provides reviewers with a tool for an independent check on analyses submitted by licensees. CASKS is based on microcomputers compatible with the IBM-PC family of computers. The system is composed of a series of menus, input programs, cask analysis programs, and output display programs. All data is entered through fill-in-the-blank input screens that contain descriptive data requests.

  2. Green Computing

    Directory of Open Access Journals (Sweden)

    K. Shalini

    2013-01-01

    Full Text Available Green computing is all about using computers in a smarter and eco-friendly way. It is the environmentally responsible use of computers and related resources which includes the implementation of energy-efficient central processing units, servers and peripherals as well as reduced resource consumption and proper disposal of electronic waste .Computers certainly make up a large part of many people lives and traditionally are extremely damaging to the environment. Manufacturers of computer and its parts have been espousing the green cause to help protect environment from computers and electronic waste in any way.Research continues into key areas such as making the use of computers as energy-efficient as Possible, and designing algorithms and systems for efficiency-related computer technologies.

  3. An investigation comparing traditional recitation instruction to computer tutorials which combine three-dimensional animation with varying levels of visual complexity, including digital video in teaching various chemistry topics

    Science.gov (United States)

    Graves, A. Palmer

    This study examines the effect of increasing the visual complexity used in computer assisted instruction in general chemistry. Traditional recitation instruction was used as a control for the experiment. One tutorial presented a chemistry topic using 3-D animation showing molecular activity and symbolic representation of the macroscopic view of a chemical phenomenon. A second tutorial presented the same topic but simultaneously presented students with a digital video movie showing the phenomena and 3-D animation showing the molecular view of the phenomena. This experimental set-up was used in two different experiments during the first semester of college level general chemistry course. The topics covered were the molecular effect of heating water through the solid-liquid phase change and the kinetic molecular theory used in explaining pressure changes. The subjects used in the experiment were 236 college students enrolled in a freshman chemistry course at a large university. The data indicated that the simultaneous presentation of digital video, showing the solid to liquid phase change of water, with a molecular animation, showing the molecular behavior during the phase change, had a significant effect on student particulate understanding when compared to traditional recitation. Although the effect of the KMT tutorial was not statistically significant, there was a positive effect on student particulate understanding. The use of computer tutorial also had a significant effect on student attitude toward their comprehension of the lesson.

  4. Optical modulator including grapene

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Ming; Yin, Xiaobo; Zhang, Xiang

    2016-06-07

    The present invention provides for a one or more layer graphene optical modulator. In a first exemplary embodiment the optical modulator includes an optical waveguide, a nanoscale oxide spacer adjacent to a working region of the waveguide, and a monolayer graphene sheet adjacent to the spacer. In a second exemplary embodiment, the optical modulator includes at least one pair of active media, where the pair includes an oxide spacer, a first monolayer graphene sheet adjacent to a first side of the spacer, and a second monolayer graphene sheet adjacent to a second side of the spacer, and at least one optical waveguide adjacent to the pair.

  5. Visual Impairment, Including Blindness

    Science.gov (United States)

    ... Who Knows What? (log-in required) Select Page Visual Impairment, Including Blindness Mar 31, 2017 Links updated, ... doesn’t wear his glasses. Back to top Visual Impairments in Children Vision is one of our ...

  6. Computer sciences

    Science.gov (United States)

    Smith, Paul H.

    1988-01-01

    The Computer Science Program provides advanced concepts, techniques, system architectures, algorithms, and software for both space and aeronautics information sciences and computer systems. The overall goal is to provide the technical foundation within NASA for the advancement of computing technology in aerospace applications. The research program is improving the state of knowledge of fundamental aerospace computing principles and advancing computing technology in space applications such as software engineering and information extraction from data collected by scientific instruments in space. The program includes the development of special algorithms and techniques to exploit the computing power provided by high performance parallel processors and special purpose architectures. Research is being conducted in the fundamentals of data base logic and improvement techniques for producing reliable computing systems.

  7. Listening to Include

    Science.gov (United States)

    Veck, Wayne

    2009-01-01

    This paper attempts to make important connections between listening and inclusive education and the refusal to listen and exclusion. Two lines of argument are advanced. First, if educators and learners are to include each other within their educational institutions as unique individuals, then they will need to listen attentively to each other.…

  8. Analytic device including nanostructures

    KAUST Repository

    Di Fabrizio, Enzo M.

    2015-07-02

    A device for detecting an analyte in a sample comprising: an array including a plurality of pixels, each pixel including a nanochain comprising: a first nanostructure, a second nanostructure, and a third nanostructure, wherein size of the first nanostructure is larger than that of the second nanostructure, and size of the second nanostructure is larger than that of the third nanostructure, and wherein the first nanostructure, the second nanostructure, and the third nanostructure are positioned on a substrate such that when the nanochain is excited by an energy, an optical field between the second nanostructure and the third nanostructure is stronger than an optical field between the first nanostructure and the second nanostructure, wherein the array is configured to receive a sample; and a detector arranged to collect spectral data from a plurality of pixels of the array.

  9. Analog and hybrid computing

    CERN Document Server

    Hyndman, D E

    2013-01-01

    Analog and Hybrid Computing focuses on the operations of analog and hybrid computers. The book first outlines the history of computing devices that influenced the creation of analog and digital computers. The types of problems to be solved on computers, computing systems, and digital computers are discussed. The text looks at the theory and operation of electronic analog computers, including linear and non-linear computing units and use of analog computers as operational amplifiers. The monograph examines the preparation of problems to be deciphered on computers. Flow diagrams, methods of ampl

  10. Being Included and Excluded

    DEFF Research Database (Denmark)

    Korzenevica, Marina

    2016-01-01

    Following the civil war of 1996–2006, there was a dramatic increase in the labor mobility of young men and the inclusion of young women in formal education, which led to the transformation of the political landscape of rural Nepal. Mobility and schooling represent a level of prestige that rural...... politics. It analyzes how formal education and mobility either challenge or reinforce traditional gendered norms which dictate a lowly position for young married women in the household and their absence from community politics. The article concludes that women are simultaneously excluded and included from...... people regard as a prerequisite for participating in local community politics. Based on a fieldwork in two villages of Panchthar district in eastern Nepal, this article explores how these changes strengthen or weaken women’s political agency and how this is reflected in their participation in community...

  11. Quantum Computing

    Science.gov (United States)

    Steffen, Matthias

    Solving computational problems require resources such as time, memory, and space. In the classical model of computation, computational complexity theory has categorized problems according to how difficult it is to solve them as the problem size increases. Remarkably, a quantum computer could solve certain problems using fundamentally fewer resources compared to a conventional computer, and therefore has garnered significant attention. Yet because of the delicate nature of entangled quantum states, the construction of a quantum computer poses an enormous challenge for experimental and theoretical scientists across multi-disciplinary areas including physics, engineering, materials science, and mathematics. While the field of quantum computing still has a long way to grow before reaching full maturity, state-of-the-art experiments on the order of 10 qubits are beginning to reach a fascinating stage at which they can no longer be emulated using even the fastest supercomputer. This raises the hope that small quantum computer demonstrations could be capable of approximately simulating or solving problems that also have practical applications. In this talk I will review the concepts behind quantum computing, and focus on the status of superconducting qubits which includes steps towards quantum error correction and quantum simulations.

  12. Organic Computing

    CERN Document Server

    Würtz, Rolf P

    2008-01-01

    Organic Computing is a research field emerging around the conviction that problems of organization in complex systems in computer science, telecommunications, neurobiology, molecular biology, ethology, and possibly even sociology can be tackled scientifically in a unified way. From the computer science point of view, the apparent ease in which living systems solve computationally difficult problems makes it inevitable to adopt strategies observed in nature for creating information processing machinery. In this book, the major ideas behind Organic Computing are delineated, together with a sparse sample of computational projects undertaken in this new field. Biological metaphors include evolution, neural networks, gene-regulatory networks, networks of brain modules, hormone system, insect swarms, and ant colonies. Applications are as diverse as system design, optimization, artificial growth, task allocation, clustering, routing, face recognition, and sign language understanding.

  13. Computational Pathology

    Science.gov (United States)

    Louis, David N.; Feldman, Michael; Carter, Alexis B.; Dighe, Anand S.; Pfeifer, John D.; Bry, Lynn; Almeida, Jonas S.; Saltz, Joel; Braun, Jonathan; Tomaszewski, John E.; Gilbertson, John R.; Sinard, John H.; Gerber, Georg K.; Galli, Stephen J.; Golden, Jeffrey A.; Becich, Michael J.

    2016-01-01

    Context We define the scope and needs within the new discipline of computational pathology, a discipline critical to the future of both the practice of pathology and, more broadly, medical practice in general. Objective To define the scope and needs of computational pathology. Data Sources A meeting was convened in Boston, Massachusetts, in July 2014 prior to the annual Association of Pathology Chairs meeting, and it was attended by a variety of pathologists, including individuals highly invested in pathology informatics as well as chairs of pathology departments. Conclusions The meeting made recommendations to promote computational pathology, including clearly defining the field and articulating its value propositions; asserting that the value propositions for health care systems must include means to incorporate robust computational approaches to implement data-driven methods that aid in guiding individual and population health care; leveraging computational pathology as a center for data interpretation in modern health care systems; stating that realizing the value proposition will require working with institutional administrations, other departments, and pathology colleagues; declaring that a robust pipeline should be fostered that trains and develops future computational pathologists, for those with both pathology and non-pathology backgrounds; and deciding that computational pathology should serve as a hub for data-related research in health care systems. The dissemination of these recommendations to pathology and bioinformatics departments should help facilitate the development of computational pathology. PMID:26098131

  14. Computation of Three-Dimensional Boundary Layers Including Separation

    Science.gov (United States)

    1987-02-01

    COUSTEIX J. "Calcul des lignes de courant a partir des pressions parietales sur un corps fusele " - La Recherche Aerospatiale N" 1984-3 GLEYZES C., COUSTEIX...34Calcul des lignes de courant ä partir des pressions parietales sur un corps fusele " La Recherche Aerospatiale N° 1984-3 (1984) 4-23 /64/ /65/ /66

  15. Computations of fluid mixtures including solid carbon at chemical equilibrium

    Science.gov (United States)

    Bourasseau, Emeric

    2013-06-01

    One of the key points of the understanding of detonation phenomena is the determination of equation of state of the detonation products mixture. Concerning carbon rich explosives, detonation products mixtures are composed of solid carbon nano-clusters immersed in a high density fluid phase. The study of such systems where both chemical and phase equilibriums occur simultaneously represents an important challenge and molecular simulation methods appear to be one of the more promising way to obtain some answers. In this talk, the Reaction Ensemble Monte Carlo (RxMC) method will be presented. This method allows the system to reach the chemical equilibrium of a mixture driven by a set of linearly independent chemical equations. Applied to detonation product mixtures, it allows the calculation of the chemical composition of the mixture and its thermodynamic properties. Moreover, an original model has been proposed to take explicitly into account a solid carbon meso-particle in thermodynamic and chemical equilibrium with the fluid. Finally our simulations show that the intrinsic inhomogeneous nature of the system (i.e. the fact that the solid phase is immersed in the fluid phase) has an important impact on the thermodynamic properties, and as a consequence must be taken into account.

  16. Computer interfacing

    CERN Document Server

    Dixey, Graham

    1994-01-01

    This book explains how computers interact with the world around them and therefore how to make them a useful tool. Topics covered include descriptions of all the components that make up a computer, principles of data exchange, interaction with peripherals, serial communication, input devices, recording methods, computer-controlled motors, and printers.In an informative and straightforward manner, Graham Dixey describes how to turn what might seem an incomprehensible 'black box' PC into a powerful and enjoyable tool that can help you in all areas of your work and leisure. With plenty of handy

  17. Computing methods

    CERN Document Server

    Berezin, I S

    1965-01-01

    Computing Methods, Volume 2 is a five-chapter text that presents the numerical methods of solving sets of several mathematical equations. This volume includes computation sets of linear algebraic equations, high degree equations and transcendental equations, numerical methods of finding eigenvalues, and approximate methods of solving ordinary differential equations, partial differential equations and integral equations.The book is intended as a text-book for students in mechanical mathematical and physics-mathematical faculties specializing in computer mathematics and persons interested in the

  18. [3D modeling of the female pelvis by Computer-Assisted Anatomical Dissection: Applications and perspectives].

    Science.gov (United States)

    Balaya, V; Uhl, J-F; Lanore, A; Salachas, C; Samoyeau, T; Ngo, C; Bensaid, C; Cornou, C; Rossi, L; Douard, R; Bats, A-S; Lecuru, F; Delmas, V

    2016-05-01

    To achieve a 3D vectorial model of a female pelvis by Computer-Assisted Anatomical Dissection and to assess educationnal and surgical applications. From the database of "visible female" of Visible Human Project(®) (VHP) of the "national library of medicine" NLM (United States), we used 739 transverse anatomical slices of 0.33mm thickness going from L4 to the trochanters. The manual segmentation of each anatomical structures was done with Winsurf(®) software version 4.3. Each anatomical element was built as a separate vectorial object. The whole colored-rendered vectorial model with realistic textures was exported in 3Dpdf format to allow a real time interactive manipulation with Acrobat(®) pro version 11 software. Each element can be handled separately at any transparency, which allows an anatomical learning by systems: skeleton, pelvic organs, urogenital system, arterial and venous vascularization. This 3D anatomical model can be used as data bank to teach of the fundamental anatomy. This 3D vectorial model, realistic and interactive constitutes an efficient educational tool for the teaching of the anatomy of the pelvis. 3D printing of the pelvis is possible with the new printers. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  19. Computer hardware fault administration

    Science.gov (United States)

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-09-14

    Computer hardware fault administration carried out in a parallel computer, where the parallel computer includes a plurality of compute nodes. The compute nodes are coupled for data communications by at least two independent data communications networks, where each data communications network includes data communications links connected to the compute nodes. Typical embodiments carry out hardware fault administration by identifying a location of a defective link in the first data communications network of the parallel computer and routing communications data around the defective link through the second data communications network of the parallel computer.

  20. Computers and data processing

    CERN Document Server

    Deitel, Harvey M

    1985-01-01

    Computers and Data Processing provides information pertinent to the advances in the computer field. This book covers a variety of topics, including the computer hardware, computer programs or software, and computer applications systems.Organized into five parts encompassing 19 chapters, this book begins with an overview of some of the fundamental computing concepts. This text then explores the evolution of modern computing systems from the earliest mechanical calculating devices to microchips. Other chapters consider how computers present their results and explain the storage and retrieval of

  1. Computer Viruses. Technology Update.

    Science.gov (United States)

    Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp.

    This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…

  2. Computational oncology.

    Science.gov (United States)

    Lefor, Alan T

    2011-08-01

    Oncology research has traditionally been conducted using techniques from the biological sciences. The new field of computational oncology has forged a new relationship between the physical sciences and oncology to further advance research. By applying physics and mathematics to oncologic problems, new insights will emerge into the pathogenesis and treatment of malignancies. One major area of investigation in computational oncology centers around the acquisition and analysis of data, using improved computing hardware and software. Large databases of cellular pathways are being analyzed to understand the interrelationship among complex biological processes. Computer-aided detection is being applied to the analysis of routine imaging data including mammography and chest imaging to improve the accuracy and detection rate for population screening. The second major area of investigation uses computers to construct sophisticated mathematical models of individual cancer cells as well as larger systems using partial differential equations. These models are further refined with clinically available information to more accurately reflect living systems. One of the major obstacles in the partnership between physical scientists and the oncology community is communications. Standard ways to convey information must be developed. Future progress in computational oncology will depend on close collaboration between clinicians and investigators to further the understanding of cancer using these new approaches.

  3. What is New in Computers?

    Indian Academy of Sciences (India)

    His areas of research interest are computer architecture, parallel and distributed computing, CAD for. VLSI , soft computing including neural networks and genetic algorithms, and mobile computing. Mobile Computing. LM Patnaik. This article discusses the recent trends in mobile computing and communication. The wireless.

  4. Computational engineering

    CERN Document Server

    2014-01-01

    The book presents state-of-the-art works in computational engineering. Focus is on mathematical modeling, numerical simulation, experimental validation and visualization in engineering sciences. In particular, the following topics are presented: constitutive models and their implementation into finite element codes, numerical models in nonlinear elasto-dynamics including seismic excitations, multiphase models in structural engineering and multiscale models of materials systems, sensitivity and reliability analysis of engineering structures, the application of scientific computing in urban water management and hydraulic engineering, and the application of genetic algorithms for the registration of laser scanner point clouds.

  5. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  6. Riemannian computing in computer vision

    CERN Document Server

    Srivastava, Anuj

    2016-01-01

    This book presents a comprehensive treatise on Riemannian geometric computations and related statistical inferences in several computer vision problems. This edited volume includes chapter contributions from leading figures in the field of computer vision who are applying Riemannian geometric approaches in problems such as face recognition, activity recognition, object detection, biomedical image analysis, and structure-from-motion. Some of the mathematical entities that necessitate a geometric analysis include rotation matrices (e.g. in modeling camera motion), stick figures (e.g. for activity recognition), subspace comparisons (e.g. in face recognition), symmetric positive-definite matrices (e.g. in diffusion tensor imaging), and function-spaces (e.g. in studying shapes of closed contours).   ·         Illustrates Riemannian computing theory on applications in computer vision, machine learning, and robotics ·         Emphasis on algorithmic advances that will allow re-application in other...

  7. Computational Psychiatry

    Science.gov (United States)

    Wang, Xiao-Jing; Krystal, John H.

    2014-01-01

    Psychiatric disorders such as autism and schizophrenia arise from abnormalities in brain systems that underlie cognitive, emotional and social functions. The brain is enormously complex and its abundant feedback loops on multiple scales preclude intuitive explication of circuit functions. In close interplay with experiments, theory and computational modeling are essential for understanding how, precisely, neural circuits generate flexible behaviors and their impairments give rise to psychiatric symptoms. This Perspective highlights recent progress in applying computational neuroscience to the study of mental disorders. We outline basic approaches, including identification of core deficits that cut across disease categories, biologically-realistic modeling bridging cellular and synaptic mechanisms with behavior, model-aided diagnosis. The need for new research strategies in psychiatry is urgent. Computational psychiatry potentially provides powerful tools for elucidating pathophysiology that may inform both diagnosis and treatment. To achieve this promise will require investment in cross-disciplinary training and research in this nascent field. PMID:25442941

  8. Algorithmically specialized parallel computers

    CERN Document Server

    Snyder, Lawrence; Gannon, Dennis B

    1985-01-01

    Algorithmically Specialized Parallel Computers focuses on the concept and characteristics of an algorithmically specialized computer.This book discusses the algorithmically specialized computers, algorithmic specialization using VLSI, and innovative architectures. The architectures and algorithms for digital signal, speech, and image processing and specialized architectures for numerical computations are also elaborated. Other topics include the model for analyzing generalized inter-processor, pipelined architecture for search tree maintenance, and specialized computer organization for raster

  9. Computer Intrusions and Attacks.

    Science.gov (United States)

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  10. Computational mechanics

    Energy Technology Data Exchange (ETDEWEB)

    Raboin, P J

    1998-01-01

    The Computational Mechanics thrust area is a vital and growing facet of the Mechanical Engineering Department at Lawrence Livermore National Laboratory (LLNL). This work supports the development of computational analysis tools in the areas of structural mechanics and heat transfer. Over 75 analysts depend on thrust area-supported software running on a variety of computing platforms to meet the demands of LLNL programs. Interactions with the Department of Defense (DOD) High Performance Computing and Modernization Program and the Defense Special Weapons Agency are of special importance as they support our ParaDyn project in its development of new parallel capabilities for DYNA3D. Working with DOD customers has been invaluable to driving this technology in directions mutually beneficial to the Department of Energy. Other projects associated with the Computational Mechanics thrust area include work with the Partnership for a New Generation Vehicle (PNGV) for ''Springback Predictability'' and with the Federal Aviation Administration (FAA) for the ''Development of Methodologies for Evaluating Containment and Mitigation of Uncontained Engine Debris.'' In this report for FY-97, there are five articles detailing three code development activities and two projects that synthesized new code capabilities with new analytic research in damage/failure and biomechanics. The article this year are: (1) Energy- and Momentum-Conserving Rigid-Body Contact for NIKE3D and DYNA3D; (2) Computational Modeling of Prosthetics: A New Approach to Implant Design; (3) Characterization of Laser-Induced Mechanical Failure Damage of Optical Components; (4) Parallel Algorithm Research for Solid Mechanics Applications Using Finite Element Analysis; and (5) An Accurate One-Step Elasto-Plasticity Algorithm for Shell Elements in DYNA3D.

  11. Computational Intelligence, Cyber Security and Computational Models

    CERN Document Server

    Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel

    2014-01-01

    This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

  12. The Computer Bulletin Board.

    Science.gov (United States)

    Batt, Russell H., Ed.

    1990-01-01

    Four applications of microcomputers in the chemical laboratory are presented. Included are "Mass Spectrometer Interface with an Apple II Computer,""Interfacing the Spectronic 20 to a Computer,""A pH-Monitoring and Control System for Teaching Laboratories," and "A Computer-Aided Optical Melting Point Device." Software, instrumentation, and uses are…

  13. Mixing Computations and Proofs

    Directory of Open Access Journals (Sweden)

    Michael Beeson

    2016-01-01

    Full Text Available We examine the relationship between proof and computation in mathematics, especially in formalized mathematics. We compare the various approaches to proofs with a significant computational component, including (i verifying  the algorithms, (ii verifying the results of the unverified algorithms, and (iii trusting an external computation.

  14. Mixing Computations and Proofs

    OpenAIRE

    Michael Beeson

    2016-01-01

    We examine the relationship between proof and computation in mathematics, especially in formalized mathematics. We compare the various approaches to proofs with a significant computational component, including (i) verifying  the algorithms, (ii) verifying the results of the unverified algorithms, and (iii) trusting an external computation.

  15. Computational Chemistry for Kids

    National Research Council Canada - National Science Library

    Naef, Olivier

    2000-01-01

    This article aims to show that computational chemistry is not exclusively restricted to molecular energy and structure calculations but also includes chemical process control and reaction simulation...

  16. Computational Combustion

    Energy Technology Data Exchange (ETDEWEB)

    Westbrook, C K; Mizobuchi, Y; Poinsot, T J; Smith, P J; Warnatz, J

    2004-08-26

    Progress in the field of computational combustion over the past 50 years is reviewed. Particular attention is given to those classes of models that are common to most system modeling efforts, including fluid dynamics, chemical kinetics, liquid sprays, and turbulent flame models. The developments in combustion modeling are placed into the time-dependent context of the accompanying exponential growth in computer capabilities and Moore's Law. Superimposed on this steady growth, the occasional sudden advances in modeling capabilities are identified and their impacts are discussed. Integration of submodels into system models for spark ignition, diesel and homogeneous charge, compression ignition engines, surface and catalytic combustion, pulse combustion, and detonations are described. Finally, the current state of combustion modeling is illustrated by descriptions of a very large jet lifted 3D turbulent hydrogen flame with direct numerical simulation and 3D large eddy simulations of practical gas burner combustion devices.

  17. Computers and Computer Cultures.

    Science.gov (United States)

    Papert, Seymour

    1981-01-01

    Instruction using computers is viewed as different from most other approaches to education, by allowing more than right or wrong answers, by providing models for systematic procedures, by shifting the boundary between formal and concrete processes, and by influencing the development of thinking in many new ways. (MP)

  18. Computational intelligence in optimization

    CERN Document Server

    Tenne, Yoel

    2010-01-01

    This volume presents a collection of recent studies covering the spectrum of computational intelligence applications with emphasis on their application to challenging real-world problems. Topics covered include: Intelligent agent-based algorithms, Hybrid intelligent systems, Cognitive and evolutionary robotics, Knowledge-Based Engineering, fuzzy sets and systems, Bioinformatics and Bioengineering, Computational finance and Computational economics, Data mining, Machine learning, and Expert systems. ""Computational Intelligence in Optimization"" is a comprehensive reference for researchers, prac

  19. COMPUTATIONAL SCIENCE CENTER

    Energy Technology Data Exchange (ETDEWEB)

    DAVENPORT,J.

    2004-11-01

    The Brookhaven Computational Science Center brings together researchers in biology, chemistry, physics, and medicine with applied mathematicians and computer scientists to exploit the remarkable opportunities for scientific discovery which have been enabled by modern computers. These opportunities are especially great in computational biology and nanoscience, but extend throughout science and technology and include for example, nuclear and high energy physics, astrophysics, materials and chemical science, sustainable energy, environment, and homeland security.

  20. Approximation and Computation

    CERN Document Server

    Gautschi, Walter; Rassias, Themistocles M

    2011-01-01

    Approximation theory and numerical analysis are central to the creation of accurate computer simulations and mathematical models. Research in these areas can influence the computational techniques used in a variety of mathematical and computational sciences. This collection of contributed chapters, dedicated to renowned mathematician Gradimir V. Milovanovia, represent the recent work of experts in the fields of approximation theory and numerical analysis. These invited contributions describe new trends in these important areas of research including theoretic developments, new computational alg

  1. Cloud Computing

    Indian Academy of Sciences (India)

    IAS Admin

    2014-03-01

    Mar 1, 2014 ... group of computers connected to the Internet in a cloud-like boundary (Box 1)). In essence computing is transitioning from an era of users owning computers to one in which users do not own computers but have access to computing hardware and software maintained by providers. Users access the ...

  2. Customizable computing

    CERN Document Server

    Chen, Yu-Ting; Gill, Michael; Reinman, Glenn; Xiao, Bingjun

    2015-01-01

    Since the end of Dennard scaling in the early 2000s, improving the energy efficiency of computation has been the main concern of the research community and industry. The large energy efficiency gap between general-purpose processors and application-specific integrated circuits (ASICs) motivates the exploration of customizable architectures, where one can adapt the architecture to the workload. In this Synthesis lecture, we present an overview and introduction of the recent developments on energy-efficient customizable architectures, including customizable cores and accelerators, on-chip memory

  3. Computer security for the computer systems manager

    OpenAIRE

    Helling, William D.

    1982-01-01

    Approved for public release; distribution is unlimited This thesis is a primer on the subject of computer security. It is written for the use of computer systems managers and addresses basic concepts of computer security and risk analysis. An example of the techniques employed by a typical military data processing center is included in the form of the written results of an actual on-site survey. Computer security is defined in the context of its scope and an analysis is made of those ...

  4. Quantum Computation

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 16; Issue 9. Quantum Computation - Particle and Wave Aspects of Algorithms. Apoorva Patel. General Article Volume 16 ... Keywords. Boolean logic; computation; computational complexity; digital language; Hilbert space; qubit; superposition; Feynman.

  5. Computer Music

    Science.gov (United States)

    Cook, Perry R.

    This chapter covers algorithms, technologies, computer languages, and systems for computer music. Computer music involves the application of computers and other digital/electronic technologies to music composition, performance, theory, history, and the study of perception. The field combines digital signal processing, computational algorithms, computer languages, hardware and software systems, acoustics, psychoacoustics (low-level perception of sounds from the raw acoustic signal), and music cognition (higher-level perception of musical style, form, emotion, etc.).

  6. Theory including future not excluded

    DEFF Research Database (Denmark)

    Nagao, K.; Nielsen, H.B.

    2013-01-01

    We study a complex action theory (CAT) whose path runs over not only past but also future. We show that, if we regard a matrix element defined in terms of the future state at time T and the past state at time TA as an expectation value in the CAT, then we are allowed to have the Heisenberg equation......, Ehrenfest's theorem, and the conserved probability current density. In addition,we showthat the expectation value at the present time t of a future-included theory for large T - t and large t - T corresponds to that of a future-not-included theory with a proper inner product for large t - T. Hence, the CAT...

  7. Dynamic Analyses Including Joints Of Truss Structures

    Science.gov (United States)

    Belvin, W. Keith

    1991-01-01

    Method for mathematically modeling joints to assess influences of joints on dynamic response of truss structures developed in study. Only structures with low-frequency oscillations considered; only Coulomb friction and viscous damping included in analysis. Focus of effort to obtain finite-element mathematical models of joints exhibiting load-vs.-deflection behavior similar to measured load-vs.-deflection behavior of real joints. Experiments performed to determine stiffness and damping nonlinearities typical of joint hardware. Algorithm for computing coefficients of analytical joint models based on test data developed to enable study of linear and nonlinear effects of joints on global structural response. Besides intended application to large space structures, applications in nonaerospace community include ground-based antennas and earthquake-resistant steel-framed buildings.

  8. Computer Tree

    Directory of Open Access Journals (Sweden)

    Onur AĞAOĞLU

    2014-12-01

    Full Text Available It is crucial that gifted and talented students should be supported by different educational methods for their interests and skills. The science and arts centres (gifted centres provide the Supportive Education Program for these students with an interdisciplinary perspective. In line with the program, an ICT lesson entitled “Computer Tree” serves for identifying learner readiness levels, and defining the basic conceptual framework. A language teacher also contributes to the process, since it caters for the creative function of the basic linguistic skills. The teaching technique is applied for 9-11 aged student level. The lesson introduces an evaluation process including basic information, skills, and interests of the target group. Furthermore, it includes an observation process by way of peer assessment. The lesson is considered to be a good sample of planning for any subject, for the unpredicted convergence of visual and technical abilities with linguistic abilities.

  9. COMPUTATIONAL SCIENCE CENTER

    Energy Technology Data Exchange (ETDEWEB)

    DAVENPORT, J.

    2005-11-01

    The Brookhaven Computational Science Center brings together researchers in biology, chemistry, physics, and medicine with applied mathematicians and computer scientists to exploit the remarkable opportunities for scientific discovery which have been enabled by modern computers. These opportunities are especially great in computational biology and nanoscience, but extend throughout science and technology and include, for example, nuclear and high energy physics, astrophysics, materials and chemical science, sustainable energy, environment, and homeland security. To achieve our goals we have established a close alliance with applied mathematicians and computer scientists at Stony Brook and Columbia Universities.

  10. Computing meaning v.4

    CERN Document Server

    Bunt, Harry; Pulman, Stephen

    2013-01-01

    This book is a collection of papers by leading researchers in computational semantics. It presents a state-of-the-art overview of recent and current research in computational semantics, including descriptions of new methods for constructing and improving resources for semantic computation, such as WordNet, VerbNet, and semantically annotated corpora. It also presents new statistical methods in semantic computation, such as the application of distributional semantics in the compositional calculation of sentence meanings. Computing the meaning of sentences, texts, and spoken or texted dialogue i

  11. Topology for computing

    CERN Document Server

    Zomorodian, Afra J

    2005-01-01

    The emerging field of computational topology utilizes theory from topology and the power of computing to solve problems in diverse fields. Recent applications include computer graphics, computer-aided design (CAD), and structural biology, all of which involve understanding the intrinsic shape of some real or abstract space. A primary goal of this book is to present basic concepts from topology and Morse theory to enable a non-specialist to grasp and participate in current research in computational topology. The author gives a self-contained presentation of the mathematical concepts from a comp

  12. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  13. Analog computing

    CERN Document Server

    Ulmann, Bernd

    2013-01-01

    This book is a comprehensive introduction to analog computing. As most textbooks about this powerful computing paradigm date back to the 1960s and 1970s, it fills a void and forges a bridge from the early days of analog computing to future applications. The idea of analog computing is not new. In fact, this computing paradigm is nearly forgotten, although it offers a path to both high-speed and low-power computing, which are in even more demand now than they were back in the heyday of electronic analog computers.

  14. Computational composites

    DEFF Research Database (Denmark)

    Vallgårda, Anna K. A.; Redström, Johan

    2007-01-01

    Computational composite is introduced as a new type of composite material. Arguing that this is not just a metaphorical maneuver, we provide an analysis of computational technology as material in design, which shows how computers share important characteristics with other materials used in design...... and architecture. We argue that the notion of computational composites provides a precise understanding of the computer as material, and of how computations need to be combined with other materials to come to expression as material. Besides working as an analysis of computers from a designer’s point of view......, the notion of computational composites may also provide a link for computer science and human-computer interaction to an increasingly rapid development and use of new materials in design and architecture....

  15. Prospective Evaluation of Magnetic Resonance Imaging and [(18)F]Fluorodeoxyglucose Positron Emission Tomography-Computed Tomography at Diagnosis and Before Maintenance Therapy in Symptomatic Patients With Multiple Myeloma Included in the IFM/DFCI 2009 Trial: Results of the IMAJEM Study.

    Science.gov (United States)

    Moreau, Philippe; Attal, Michel; Caillot, Denis; Macro, Margaret; Karlin, Lionel; Garderet, Laurent; Facon, Thierry; Benboubker, Lotfi; Escoffre-Barbe, Martine; Stoppa, Anne-Marie; Laribi, Kamel; Hulin, Cyrille; Perrot, Aurore; Marit, Gerald; Eveillard, Jean-Richard; Caillon, Florence; Bodet-Milin, Caroline; Pegourie, Brigitte; Dorvaux, Veronique; Chaleteix, Carine; Anderson, Kenneth; Richardson, Paul; Munshi, Nikhil C; Avet-Loiseau, Herve; Gaultier, Aurelie; Nguyen, Jean-Michel; Dupas, Benoit; Frampas, Eric; Kraeber-Bodere, Françoise

    2017-09-01

    Purpose Magnetic resonance imaging (MRI) and positron emission tomography-computed tomography (PET-CT) are important imaging techniques in multiple myeloma (MM). We conducted a prospective trial in patients with MM aimed at comparing MRI and PET-CT with respect to the detection of bone lesions at diagnosis and the prognostic value of the techniques. Patients and Methods One hundred thirty-four patients received a combination of lenalidomide, bortezomib, and dexamethasone (RVD) with or without autologous stem-cell transplantation, followed by lenalidomide maintenance. PET-CT and MRI were performed at diagnosis, after three cycles of RVD, and before maintenance therapy. The primary end point was the detection of bone lesions at diagnosis by MRI versus PET-CT. Secondary end points included the prognostic impact of MRI and PET-CT regarding progression-free (PFS) and overall survival (OS). Results At diagnosis, MRI results were positive in 127 of 134 patients (95%), and PET-CT results were positive in 122 of 134 patients (91%; P = .33). Normalization of MRI after three cycles of RVD and before maintenance was not predictive of PFS or OS. PET-CT became normal after three cycles of RVD in 32% of the patients with a positive evaluation at baseline, and PFS was improved in this group (30-month PFS, 78.7% v 56.8%, respectively). PET-CT normalization before maintenance was described in 62% of the patients who were positive at baseline. This was associated with better PFS and OS. Extramedullary disease at diagnosis was an independent prognostic factor for PFS and OS, whereas PET-CT normalization before maintenance was an independent prognostic factor for PFS. Conclusion There is no difference in the detection of bone lesions at diagnosis when comparing PET-CT and MRI. PET-CT is a powerful tool to evaluate the prognosis of de novo myeloma.

  16. Quantum computing

    OpenAIRE

    Traub, Joseph F.

    2014-01-01

    The aim of this thesis was to explain what quantum computing is. The information for the thesis was gathered from books, scientific publications, and news articles. The analysis of the information revealed that quantum computing can be broken down to three areas: theories behind quantum computing explaining the structure of a quantum computer, known quantum algorithms, and the actual physical realizations of a quantum computer. The thesis reveals that moving from classical memor...

  17. Discrete computational structures

    CERN Document Server

    Korfhage, Robert R

    1974-01-01

    Discrete Computational Structures describes discrete mathematical concepts that are important to computing, covering necessary mathematical fundamentals, computer representation of sets, graph theory, storage minimization, and bandwidth. The book also explains conceptual framework (Gorn trees, searching, subroutines) and directed graphs (flowcharts, critical paths, information network). The text discusses algebra particularly as it applies to concentrates on semigroups, groups, lattices, propositional calculus, including a new tabular method of Boolean function minimization. The text emphasize

  18. Intelligent distributed computing

    CERN Document Server

    Thampi, Sabu

    2015-01-01

    This book contains a selection of refereed and revised papers of the Intelligent Distributed Computing Track originally presented at the third International Symposium on Intelligent Informatics (ISI-2014), September 24-27, 2014, Delhi, India.  The papers selected for this Track cover several Distributed Computing and related topics including Peer-to-Peer Networks, Cloud Computing, Mobile Clouds, Wireless Sensor Networks, and their applications.

  19. Introduction to reversible computing

    CERN Document Server

    Perumalla, Kalyan S

    2013-01-01

    Few books comprehensively cover the software and programming aspects of reversible computing. Filling this gap, Introduction to Reversible Computing offers an expanded view of the field that includes the traditional energy-motivated hardware viewpoint as well as the emerging application-motivated software approach. Collecting scattered knowledge into one coherent account, the book provides a compendium of both classical and recently developed results on reversible computing. It explores up-and-coming theories, techniques, and tools for the application of rever

  20. Computational movement analysis

    CERN Document Server

    Laube, Patrick

    2014-01-01

    This SpringerBrief discusses the characteristics of spatiotemporal movement data, including uncertainty and scale. It investigates three core aspects of Computational Movement Analysis: Conceptual modeling of movement and movement spaces, spatiotemporal analysis methods aiming at a better understanding of movement processes (with a focus on data mining for movement patterns), and using decentralized spatial computing methods in movement analysis. The author presents Computational Movement Analysis as an interdisciplinary umbrella for analyzing movement processes with methods from a range of fi

  1. Electronics and computer acronyms

    CERN Document Server

    Brown, Phil

    1988-01-01

    Electronics and Computer Acronyms presents a list of almost 2,500 acronyms related to electronics and computers. The material for this book is drawn from a number of subject areas, including electrical, electronics, computers, telecommunications, fiber optics, microcomputers/microprocessors, audio, video, and information technology. The acronyms also encompass avionics, military, data processing, instrumentation, units, measurement, standards, services, organizations, associations, and companies. This dictionary offers a comprehensive and broad view of electronics and all that is associated wi

  2. Computational neurogenetic modeling

    CERN Document Server

    Benuskova, Lubica

    2010-01-01

    Computational Neurogenetic Modeling is a student text, introducing the scope and problems of a new scientific discipline - Computational Neurogenetic Modeling (CNGM). CNGM is concerned with the study and development of dynamic neuronal models for modeling brain functions with respect to genes and dynamic interactions between genes. These include neural network models and their integration with gene network models. This new area brings together knowledge from various scientific disciplines, such as computer and information science, neuroscience and cognitive science, genetics and molecular biol

  3. Computer Security Assistance Program

    Science.gov (United States)

    1997-09-01

    Information COMPUTER SECURITY ASSISTANCE PROGRAM OPR: HQ AFCA/SYS (CMSgt Hogan) Certified by: HQ USAF/SCXX (Lt Col Francis X. McGovern) Pages: 5...Distribution: F This instruction implements Air Force Policy Directive (AFPD) 33-2, Information Protection, establishes the Air Force Computer Security Assistance...Force single point of contact for reporting and handling computer security incidents and vulnerabilities including AFCERT advisories and Defense

  4. Computer science I essentials

    CERN Document Server

    Raus, Randall

    2012-01-01

    REA's Essentials provide quick and easy access to critical information in a variety of different fields, ranging from the most basic to the most advanced. As its name implies, these concise, comprehensive study guides summarize the essentials of the field covered. Essentials are helpful when preparing for exams, doing homework and will remain a lasting reference source for students, teachers, and professionals. Computer Science I includes fundamental computer concepts, number representations, Boolean algebra, switching circuits, and computer architecture.

  5. Computational dosimetry

    Energy Technology Data Exchange (ETDEWEB)

    Siebert, B.R.L.; Thomas, R.H.

    1996-01-01

    The paper presents a definition of the term ``Computational Dosimetry`` that is interpreted as the sub-discipline of computational physics which is devoted to radiation metrology. It is shown that computational dosimetry is more than a mere collection of computational methods. Computational simulations directed at basic understanding and modelling are important tools provided by computational dosimetry, while another very important application is the support that it can give to the design, optimization and analysis of experiments. However, the primary task of computational dosimetry is to reduce the variance in the determination of absorbed dose (and its related quantities), for example in the disciplines of radiological protection and radiation therapy. In this paper emphasis is given to the discussion of potential pitfalls in the applications of computational dosimetry and recommendations are given for their avoidance. The need for comparison of calculated and experimental data whenever possible is strongly stressed.

  6. Quantum computing

    OpenAIRE

    Li, Shu-shen; Long, Gui-Lu; Bai, Feng-Shan; Feng, Song-Lin; Zheng, Hou-Zhi

    2001-01-01

    Quantum computing is a quickly growing research field. This article introduces the basic concepts of quantum computing, recent developments in quantum searching, and decoherence in a possible quantum dot realization.

  7. National Educational Computing Conference '87.

    Science.gov (United States)

    Journal of Computers in Mathematics and Science Teaching, 1988

    1988-01-01

    Includes the abstracts of seven of the 191 papers presented at a recent educational computing conference. Topics include computer-based tutoring, computer-assisted instruction with low achieving students, education-industry collaboration, hypothesis testing, Western Carolina University MicroNet, the New Jersey Science Supervisors Electronic…

  8. Phenomenological Computation?

    DEFF Research Database (Denmark)

    Brier, Søren

    2014-01-01

    Open peer commentary on the article “Info-computational Constructivism and Cognition” by Gordana Dodig-Crnkovic. Upshot: The main problems with info-computationalism are: (1) Its basic concept of natural computing has neither been defined theoretically or implemented practically. (2. It cannot en...... cybernetics and Maturana and Varela’s theory of autopoiesis, which are both erroneously taken to support info-computationalism....

  9. Cognitive Computing

    OpenAIRE

    2015-01-01

    "Cognitive Computing" has initiated a new era in computer science. Cognitive computers are not rigidly programmed computers anymore, but they learn from their interactions with humans, from the environment and from information. They are thus able to perform amazing tasks on their own, such as driving a car in dense traffic, piloting an aircraft in difficult conditions, taking complex financial investment decisions, analysing medical-imaging data, and assist medical doctors in diagnosis and th...

  10. Computable models

    CERN Document Server

    Turner, Raymond

    2009-01-01

    Computational models can be found everywhere in present day science and engineering. In providing a logical framework and foundation for the specification and design of specification languages, Raymond Turner uses this framework to introduce and study computable models. In doing so he presents the first systematic attempt to provide computational models with a logical foundation. Computable models have wide-ranging applications from programming language semantics and specification languages, through to knowledge representation languages and formalism for natural language semantics. They are al

  11. Quantum information and computation

    OpenAIRE

    Bub, Jeffrey

    2005-01-01

    This article deals with theoretical developments in the subject of quantum information and quantum computation, and includes an overview of classical information and some relevant quantum mechanics. The discussion covers topics in quantum communication, quantum cryptography, and quantum computation, and concludes by considering whether a perspective in terms of quantum information sheds new light on the conceptual problems of quantum mechanics.

  12. Who Owns Computer Software?

    Science.gov (United States)

    Branscomb, Anne Wells

    1995-01-01

    Discusses the protection of intellectual property as it applies to computer software and its impact on private enterprise and the public good. Highlights include the role of patents, copyrights, and trade secrets; some court cases; and recommendations for alternatives to the existing legal framework for protecting computer software. (KRN)

  13. Quantum Computing for Computer Architects

    CERN Document Server

    Metodi, Tzvetan

    2011-01-01

    Quantum computers can (in theory) solve certain problems far faster than a classical computer running any known classical algorithm. While existing technologies for building quantum computers are in their infancy, it is not too early to consider their scalability and reliability in the context of the design of large-scale quantum computers. To architect such systems, one must understand what it takes to design and model a balanced, fault-tolerant quantum computer architecture. The goal of this lecture is to provide architectural abstractions for the design of a quantum computer and to explore

  14. Computing fundamentals introduction to computers

    CERN Document Server

    Wempen, Faithe

    2014-01-01

    The absolute beginner's guide to learning basic computer skills Computing Fundamentals, Introduction to Computers gets you up to speed on basic computing skills, showing you everything you need to know to conquer entry-level computing courses. Written by a Microsoft Office Master Instructor, this useful guide walks you step-by-step through the most important concepts and skills you need to be proficient on the computer, using nontechnical, easy-to-understand language. You'll start at the very beginning, getting acquainted with the actual, physical machine, then progress through the most common

  15. Computational Complexity

    Directory of Open Access Journals (Sweden)

    J. A. Tenreiro Machado

    2017-02-01

    Full Text Available Complex systems (CS involve many elements that interact at different scales in time and space. The challenges in modeling CS led to the development of novel computational tools with applications in a wide range of scientific areas. The computational problems posed by CS exhibit intrinsic difficulties that are a major concern in Computational Complexity Theory. [...

  16. Quantum Computing

    Indian Academy of Sciences (India)

    In the early 1980s Richard Feynman noted that quan- tum systems cannot be efficiently simulated on a clas- sical computer. Till then the accepted view was that any reasonable !{lodel of computation can be efficiently simulated on a classical computer. Hence, this observa- tion led to a lot of rethinking about the basic ...

  17. Pervasive Computing

    NARCIS (Netherlands)

    Silvis-Cividjian, N.

    This book provides a concise introduction to Pervasive Computing, otherwise known as Internet of Things (IoT) and Ubiquitous Computing (Ubicomp) which addresses the seamless integration of computing systems within everyday objects. By introducing the core topics and exploring assistive pervasive

  18. Cloud Computing

    Indian Academy of Sciences (India)

    Cloud computing; services on a cloud; cloud types; computing utility; risks in using cloud computing. Author Affiliations. V Rajaraman1. Supercomputer Education and Research Centre, Indian Institute of Science, Bangalore 560 012, India. Resonance – Journal of Science Education. Current Issue : Vol. 22, Issue 11. Current ...

  19. A survey of computational physics introductory computational science

    CERN Document Server

    Landau, Rubin H; Bordeianu, Cristian C

    2008-01-01

    Computational physics is a rapidly growing subfield of computational science, in large part because computers can solve previously intractable problems or simulate natural processes that do not have analytic solutions. The next step beyond Landau's First Course in Scientific Computing and a follow-up to Landau and Páez's Computational Physics, this text presents a broad survey of key topics in computational physics for advanced undergraduates and beginning graduate students, including new discussions of visualization tools, wavelet analysis, molecular dynamics, and computational fluid dynamics

  20. Demonstration of blind quantum computing.

    Science.gov (United States)

    Barz, Stefanie; Kashefi, Elham; Broadbent, Anne; Fitzsimons, Joseph F; Zeilinger, Anton; Walther, Philip

    2012-01-20

    Quantum computers, besides offering substantial computational speedups, are also expected to preserve the privacy of a computation. We present an experimental demonstration of blind quantum computing in which the input, computation, and output all remain unknown to the computer. We exploit the conceptual framework of measurement-based quantum computation that enables a client to delegate a computation to a quantum server. Various blind delegated computations, including one- and two-qubit gates and the Deutsch and Grover quantum algorithms, are demonstrated. The client only needs to be able to prepare and transmit individual photonic qubits. Our demonstration is crucial for unconditionally secure quantum cloud computing and might become a key ingredient for real-life applications, especially when considering the challenges of making powerful quantum computers widely available.

  1. Computer Games and Art

    Directory of Open Access Journals (Sweden)

    Anton Sukhov

    2015-10-01

    Full Text Available This article devoted to the search of relevant sources (primary and secondary and characteristics of computer games that allow to include them in the field of art (such as the creation of artistic games, computer graphics, active interaction with other forms of art, signs of spiritual aesthetic act, own temporality of computer games, “aesthetic illusion”, interactivity. In general, modern computer games can be attributed to commercial art and popular culture (blockbuster games and to elite forms of contemporary media art (author’s games, visionary games.

  2. Combinatorial scientific computing

    CERN Document Server

    Naumann, Uwe

    2012-01-01

    Combinatorial Scientific Computing explores the latest research on creating algorithms and software tools to solve key combinatorial problems on large-scale high-performance computing architectures. It includes contributions from international researchers who are pioneers in designing software and applications for high-performance computing systems. The book offers a state-of-the-art overview of the latest research, tool development, and applications. It focuses on load balancing and parallelization on high-performance computers, large-scale optimization, algorithmic differentiation of numeric

  3. Human Computation

    CERN Multimedia

    CERN. Geneva

    2008-01-01

    What if people could play computer games and accomplish work without even realizing it? What if billions of people collaborated to solve important problems for humanity or generate training data for computers? My work aims at a general paradigm for doing exactly that: utilizing human processing power to solve computational problems in a distributed manner. In particular, I focus on harnessing human time and energy for addressing problems that computers cannot yet solve. Although computers have advanced dramatically in many respects over the last 50 years, they still do not possess the basic conceptual intelligence or perceptual capabilities...

  4. Parallel computations

    CERN Document Server

    1982-01-01

    Parallel Computations focuses on parallel computation, with emphasis on algorithms used in a variety of numerical and physical applications and for many different types of parallel computers. Topics covered range from vectorization of fast Fourier transforms (FFTs) and of the incomplete Cholesky conjugate gradient (ICCG) algorithm on the Cray-1 to calculation of table lookups and piecewise functions. Single tridiagonal linear systems and vectorized computation of reactive flow are also discussed.Comprised of 13 chapters, this volume begins by classifying parallel computers and describing techn

  5. Computational modeling in biomechanics

    CERN Document Server

    Mofrad, Mohammad

    2010-01-01

    This book provides a glimpse of the diverse and important roles that modern computational technology is playing in various areas of biomechanics. It includes unique chapters on ab initio quantum mechanical, molecular dynamic and scale coupling methods..

  6. Theoretical Computer Science

    DEFF Research Database (Denmark)

    2002-01-01

    The proceedings contains 8 papers from the Conference on Theoretical Computer Science. Topics discussed include: query by committee, linear separation and random walks; hardness results for neural network approximation problems; a geometric approach to leveraging weak learners; mind change...

  7. Contribution to the algorithmic and efficient programming of new parallel architectures including accelerators for neutron physics and shielding computations; Contribution a l'algorithmique et a la programmation efficace des nouvelles architectures paralleles comportant des accelerateurs de calcul dans le domaine de la neutronique et de la radioprotection

    Energy Technology Data Exchange (ETDEWEB)

    Dubois, J.

    2011-10-13

    In science, simulation is a key process for research or validation. Modern computer technology allows faster numerical experiments, which are cheaper than real models. In the field of neutron simulation, the calculation of eigenvalues is one of the key challenges. The complexity of these problems is such that a lot of computing power may be necessary. The work of this thesis is first the evaluation of new computing hardware such as graphics card or massively multi-core chips, and their application to eigenvalue problems for neutron simulation. Then, in order to address the massive parallelism of supercomputers national, we also study the use of asynchronous hybrid methods for solving eigenvalue problems with this very high level of parallelism. Then we experiment the work of this research on several national supercomputers such as the Titane hybrid machine of the Computing Center, Research and Technology (CCRT), the Curie machine of the Very Large Computing Centre (TGCC), currently being installed, and the Hopper machine at the Lawrence Berkeley National Laboratory (LBNL). We also do our experiments on local workstations to illustrate the interest of this research in an everyday use with local computing resources. (author) [French] Les travaux de cette these concernent dans un premier temps l'evaluation des nouveaux materiels de calculs tels que les cartes graphiques ou les puces massivement multicoeurs, et leur application aux problemes de valeurs propres pour la neutronique. Ensuite, dans le but d'utiliser le parallelisme massif des supercalculateurs, nous etudions egalement l'utilisation de methodes hybrides asynchrones pour resoudre des problemes a valeur propre avec ce tres haut niveau de parallelisme. Nous experimentons ensuite le resultat de ces recherches sur plusieurs supercalculateurs nationaux tels que la machine hybride Titane du Centre de Calcul, Recherche et Technologies (CCRT), la machine Curie du Tres Grand Centre de Calcul (TGCC) qui

  8. Paraconsistent Computational Logic

    DEFF Research Database (Denmark)

    Jensen, Andreas Schmidt; Villadsen, Jørgen

    2012-01-01

    In classical logic everything follows from inconsistency and this makes classical logic problematic in areas of computer science where contradictions seem unavoidable. We describe a many-valued paraconsistent logic, discuss the truth tables and include a small case study.......In classical logic everything follows from inconsistency and this makes classical logic problematic in areas of computer science where contradictions seem unavoidable. We describe a many-valued paraconsistent logic, discuss the truth tables and include a small case study....

  9. An introduction to computer viruses

    Energy Technology Data Exchange (ETDEWEB)

    Brown, D.R.

    1992-03-01

    This report on computer viruses is based upon a thesis written for the Master of Science degree in Computer Science from the University of Tennessee in December 1989 by David R. Brown. This thesis is entitled An Analysis of Computer Virus Construction, Proliferation, and Control and is available through the University of Tennessee Library. This paper contains an overview of the computer virus arena that can help the reader to evaluate the threat that computer viruses pose. The extent of this threat can only be determined by evaluating many different factors. These factors include the relative ease with which a computer virus can be written, the motivation involved in writing a computer virus, the damage and overhead incurred by infected systems, and the legal implications of computer viruses, among others. Based upon the research, the development of a computer virus seems to require more persistence than technical expertise. This is a frightening proclamation to the computing community. The education of computer professionals to the dangers that viruses pose to the welfare of the computing industry as a whole is stressed as a means of inhibiting the current proliferation of computer virus programs. Recommendations are made to assist computer users in preventing infection by computer viruses. These recommendations support solid general computer security practices as a means of combating computer viruses.

  10. Computer programming and computer systems

    CERN Document Server

    Hassitt, Anthony

    1966-01-01

    Computer Programming and Computer Systems imparts a "reading knowledge? of computer systems.This book describes the aspects of machine-language programming, monitor systems, computer hardware, and advanced programming that every thorough programmer should be acquainted with. This text discusses the automatic electronic digital computers, symbolic language, Reverse Polish Notation, and Fortran into assembly language. The routine for reading blocked tapes, dimension statements in subroutines, general-purpose input routine, and efficient use of memory are also elaborated.This publication is inten

  11. Biological computation

    CERN Document Server

    Lamm, Ehud

    2011-01-01

    Introduction and Biological BackgroundBiological ComputationThe Influence of Biology on Mathematics-Historical ExamplesBiological IntroductionModels and Simulations Cellular Automata Biological BackgroundThe Game of Life General Definition of Cellular Automata One-Dimensional AutomataExamples of Cellular AutomataComparison with a Continuous Mathematical Model Computational UniversalitySelf-Replication Pseudo Code Evolutionary ComputationEvolutionary Biology and Evolutionary ComputationGenetic AlgorithmsExample ApplicationsAnalysis of the Behavior of Genetic AlgorithmsLamarckian Evolution Genet

  12. Computational Composites

    DEFF Research Database (Denmark)

    Vallgårda, Anna K. A.

    to understand the computer as a material like any other material we would use for design, like wood, aluminum, or plastic. That as soon as the computer forms a composition with other materials it becomes just as approachable and inspiring as other smart materials. I present a series of investigations of what...... Computational Composite, and Telltale). Through the investigations, I show how the computer can be understood as a material and how it partakes in a new strand of materials whose expressions come to be in context. I uncover some of their essential material properties and potential expressions. I develop a way...

  13. Computational thinking as an emerging competence domain

    NARCIS (Netherlands)

    Yadav, A.; Good, J.; Voogt, J.; Fisser, P.; Mulder, M.

    2016-01-01

    Computational thinking is a problem-solving skill set, which includes problem decomposition, algorithmic thinking, abstraction, and automation. Even though computational thinking draws upon concepts fundamental to computer science (CS), it has broad application to all disciplines. It has been

  14. COMPUTATIONAL SCIENCE CENTER

    Energy Technology Data Exchange (ETDEWEB)

    DAVENPORT, J.

    2006-11-01

    Computational Science is an integral component of Brookhaven's multi science mission, and is a reflection of the increased role of computation across all of science. Brookhaven currently has major efforts in data storage and analysis for the Relativistic Heavy Ion Collider (RHIC) and the ATLAS detector at CERN, and in quantum chromodynamics. The Laboratory is host for the QCDOC machines (quantum chromodynamics on a chip), 10 teraflop/s computers which boast 12,288 processors each. There are two here, one for the Riken/BNL Research Center and the other supported by DOE for the US Lattice Gauge Community and other scientific users. A 100 teraflop/s supercomputer will be installed at Brookhaven in the coming year, managed jointly by Brookhaven and Stony Brook, and funded by a grant from New York State. This machine will be used for computational science across Brookhaven's entire research program, and also by researchers at Stony Brook and across New York State. With Stony Brook, Brookhaven has formed the New York Center for Computational Science (NYCCS) as a focal point for interdisciplinary computational science, which is closely linked to Brookhaven's Computational Science Center (CSC). The CSC has established a strong program in computational science, with an emphasis on nanoscale electronic structure and molecular dynamics, accelerator design, computational fluid dynamics, medical imaging, parallel computing and numerical algorithms. We have been an active participant in DOES SciDAC program (Scientific Discovery through Advanced Computing). We are also planning a major expansion in computational biology in keeping with Laboratory initiatives. Additional laboratory initiatives with a dependence on a high level of computation include the development of hydrodynamics models for the interpretation of RHIC data, computational models for the atmospheric transport of aerosols, and models for combustion and for energy utilization. The CSC was formed to

  15. Power throttling of collections of computing elements

    Science.gov (United States)

    Bellofatto, Ralph E [Ridgefield, CT; Coteus, Paul W [Yorktown Heights, NY; Crumley, Paul G [Yorktown Heights, NY; Gara, Alan G [Mount Kidsco, NY; Giampapa, Mark E [Irvington, NY; Gooding,; Thomas, M [Rochester, MN; Haring, Rudolf A [Cortlandt Manor, NY; Megerian, Mark G [Rochester, MN; Ohmacht, Martin [Yorktown Heights, NY; Reed, Don D [Mantorville, MN; Swetz, Richard A [Mahopac, NY; Takken, Todd [Brewster, NY

    2011-08-16

    An apparatus and method for controlling power usage in a computer includes a plurality of computers communicating with a local control device, and a power source supplying power to the local control device and the computer. A plurality of sensors communicate with the computer for ascertaining power usage of the computer, and a system control device communicates with the computer for controlling power usage of the computer.

  16. Platform computing

    CERN Multimedia

    2002-01-01

    "Platform Computing releases first grid-enabled workload management solution for IBM eServer Intel and UNIX high performance computing clusters. This Out-of-the-box solution maximizes the performance and capability of applications on IBM HPC clusters" (1/2 page) .

  17. Cloud Computing

    DEFF Research Database (Denmark)

    Krogh, Simon

    2013-01-01

    with technological changes, the paradigmatic pendulum has swung between increased centralization on one side and a focus on distributed computing that pushes IT power out to end users on the other. With the introduction of outsourcing and cloud computing, centralization in large data centers is again dominating...

  18. Computational Deception

    NARCIS (Netherlands)

    Nijholt, Antinus; Acosta, P.S.; Cravo, P.

    2010-01-01

    In the future our daily life interactions with other people, with computers, robots and smart environments will be recorded and interpreted by computers or embedded intelligence in environments, furniture, robots, displays, and wearables. These sensors record our activities, our behaviour, and our

  19. Computational astrophysics

    Science.gov (United States)

    Miller, Richard H.

    1987-01-01

    Astronomy is an area of applied physics in which unusually beautiful objects challenge the imagination to explain observed phenomena in terms of known laws of physics. It is a field that has stimulated the development of physical laws and of mathematical and computational methods. Current computational applications are discussed in terms of stellar and galactic evolution, galactic dynamics, and particle motions.

  20. Distributing an executable job load file to compute nodes in a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Gooding, Thomas M.

    2016-08-09

    Distributing an executable job load file to compute nodes in a parallel computer, the parallel computer comprising a plurality of compute nodes, including: determining, by a compute node in the parallel computer, whether the compute node is participating in a job; determining, by the compute node in the parallel computer, whether a descendant compute node is participating in the job; responsive to determining that the compute node is participating in the job or that the descendant compute node is participating in the job, communicating, by the compute node to a parent compute node, an identification of a data communications link over which the compute node receives data from the parent compute node; constructing a class route for the job, wherein the class route identifies all compute nodes participating in the job; and broadcasting the executable load file for the job along the class route for the job.

  1. Distributing an executable job load file to compute nodes in a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Gooding, Thomas M.

    2016-09-13

    Distributing an executable job load file to compute nodes in a parallel computer, the parallel computer comprising a plurality of compute nodes, including: determining, by a compute node in the parallel computer, whether the compute node is participating in a job; determining, by the compute node in the parallel computer, whether a descendant compute node is participating in the job; responsive to determining that the compute node is participating in the job or that the descendant compute node is participating in the job, communicating, by the compute node to a parent compute node, an identification of a data communications link over which the compute node receives data from the parent compute node; constructing a class route for the job, wherein the class route identifies all compute nodes participating in the job; and broadcasting the executable load file for the job along the class route for the job.

  2. Computational Streetscapes

    Directory of Open Access Journals (Sweden)

    Paul M. Torrens

    2016-09-01

    Full Text Available Streetscapes have presented a long-standing interest in many fields. Recently, there has been a resurgence of attention on streetscape issues, catalyzed in large part by computing. Because of computing, there is more understanding, vistas, data, and analysis of and on streetscape phenomena than ever before. This diversity of lenses trained on streetscapes permits us to address long-standing questions, such as how people use information while mobile, how interactions with people and things occur on streets, how we might safeguard crowds, how we can design services to assist pedestrians, and how we could better support special populations as they traverse cities. Amid each of these avenues of inquiry, computing is facilitating new ways of posing these questions, particularly by expanding the scope of what-if exploration that is possible. With assistance from computing, consideration of streetscapes now reaches across scales, from the neurological interactions that form among place cells in the brain up to informatics that afford real-time views of activity over whole urban spaces. For some streetscape phenomena, computing allows us to build realistic but synthetic facsimiles in computation, which can function as artificial laboratories for testing ideas. In this paper, I review the domain science for studying streetscapes from vantages in physics, urban studies, animation and the visual arts, psychology, biology, and behavioral geography. I also review the computational developments shaping streetscape science, with particular emphasis on modeling and simulation as informed by data acquisition and generation, data models, path-planning heuristics, artificial intelligence for navigation and way-finding, timing, synthetic vision, steering routines, kinematics, and geometrical treatment of collision detection and avoidance. I also discuss the implications that the advances in computing streetscapes might have on emerging developments in cyber

  3. Computing architecture for autonomous microgrids

    Science.gov (United States)

    Goldsmith, Steven Y.

    2015-09-29

    A computing architecture that facilitates autonomously controlling operations of a microgrid is described herein. A microgrid network includes numerous computing devices that execute intelligent agents, each of which is assigned to a particular entity (load, source, storage device, or switch) in the microgrid. The intelligent agents can execute in accordance with predefined protocols to collectively perform computations that facilitate uninterrupted control of the .

  4. Computer games and prosocial behaviour.

    Science.gov (United States)

    Mengel, Friederike

    2014-01-01

    We relate different self-reported measures of computer use to individuals' propensity to cooperate in the Prisoner's dilemma. The average cooperation rate is positively related to the self-reported amount participants spend playing computer games. None of the other computer time use variables (including time spent on social media, browsing internet, working etc.) are significantly related to cooperation rates.

  5. The Need for Computer Science

    Science.gov (United States)

    Margolis, Jane; Goode, Joanna; Bernier, David

    2011-01-01

    Broadening computer science learning to include more students is a crucial item on the United States' education agenda, these authors say. Although policymakers advocate more computer science expertise, computer science offerings in high schools are few--and actually shrinking. In addition, poorly resourced schools with a high percentage of…

  6. Parallelism in matrix computations

    CERN Document Server

    Gallopoulos, Efstratios; Sameh, Ahmed H

    2016-01-01

    This book is primarily intended as a research monograph that could also be used in graduate courses for the design of parallel algorithms in matrix computations. It assumes general but not extensive knowledge of numerical linear algebra, parallel architectures, and parallel programming paradigms. The book consists of four parts: (I) Basics; (II) Dense and Special Matrix Computations; (III) Sparse Matrix Computations; and (IV) Matrix functions and characteristics. Part I deals with parallel programming paradigms and fundamental kernels, including reordering schemes for sparse matrices. Part II is devoted to dense matrix computations such as parallel algorithms for solving linear systems, linear least squares, the symmetric algebraic eigenvalue problem, and the singular-value decomposition. It also deals with the development of parallel algorithms for special linear systems such as banded ,Vandermonde ,Toeplitz ,and block Toeplitz systems. Part III addresses sparse matrix computations: (a) the development of pa...

  7. Philosophy of Computer Science

    Directory of Open Access Journals (Sweden)

    Aatami Järvinen

    2014-06-01

    Full Text Available The diversity and interdisciplinary of Computer Sciences, and the multiplicity of its uses in other sciences make it difficult to define them and prescribe how to perform them. Furthermore, also cause friction between computer scientists from different branches. Because of how they are structured, these sciences programs are criticized for not offer an adequate methodological training, or a deep understanding of different research traditions. To collaborate on a solution, some have decided to include in their curricula courses that enable students to gain awareness about epistemology and methodological issues in Computer Science, as well as give meaning to the practice of computer scientists. In this article the needs and objectives of the courses on the philosophy of Computer Science are analyzed, and its structure and management are explained.

  8. What do reversible programs compute?

    DEFF Research Database (Denmark)

    Axelsen, Holger Bock; Glück, Robert

    2011-01-01

    are not strictly classically universal, but that they support another notion of universality; we call this RTM-universality. Thus, even though the RTMs are sub-universal in the classical sense, they are powerful enough as to include a self-interpreter. Lifting this to other computation models, we propose r...... be the starting point of a computational theory of reversible computing. We provide a novel semantics-based approach to such a theory, using reversible Turing machines (RTMs) as the underlying computation model. We show that the RTMs can compute exactly all injective, computable functions. We find that the RTMs...

  9. Applications of Computer Algebra Conference

    CERN Document Server

    Martínez-Moro, Edgar

    2017-01-01

    The Applications of Computer Algebra (ACA) conference covers a wide range of topics from Coding Theory to Differential Algebra to Quantam Computing, focusing on the interactions of these and other areas with the discipline of Computer Algebra. This volume provides the latest developments in the field as well as its applications in various domains, including communications, modelling, and theoretical physics. The book will appeal to researchers and professors of computer algebra, applied mathematics, and computer science, as well as to engineers and computer scientists engaged in research and development.

  10. Chromatin computation.

    Directory of Open Access Journals (Sweden)

    Barbara Bryant

    Full Text Available In living cells, DNA is packaged along with protein and RNA into chromatin. Chemical modifications to nucleotides and histone proteins are added, removed and recognized by multi-functional molecular complexes. Here I define a new computational model, in which chromatin modifications are information units that can be written onto a one-dimensional string of nucleosomes, analogous to the symbols written onto cells of a Turing machine tape, and chromatin-modifying complexes are modeled as read-write rules that operate on a finite set of adjacent nucleosomes. I illustrate the use of this "chromatin computer" to solve an instance of the Hamiltonian path problem. I prove that chromatin computers are computationally universal--and therefore more powerful than the logic circuits often used to model transcription factor control of gene expression. Features of biological chromatin provide a rich instruction set for efficient computation of nontrivial algorithms in biological time scales. Modeling chromatin as a computer shifts how we think about chromatin function, suggests new approaches to medical intervention, and lays the groundwork for the engineering of a new class of biological computing machines.

  11. Compute Canada: Advancing Computational Research

    Science.gov (United States)

    Baldwin, Susan

    2012-02-01

    High Performance Computing (HPC) is redefining the way that research is done. Compute Canada's HPC infrastructure provides a national platform that enables Canadian researchers to compete on an international scale, attracts top talent to Canadian universities and broadens the scope of research.

  12. Collectively loading an application in a parallel computer

    Science.gov (United States)

    Aho, Michael E.; Attinella, John E.; Gooding, Thomas M.; Miller, Samuel J.; Mundy, Michael B.

    2016-01-05

    Collectively loading an application in a parallel computer, the parallel computer comprising a plurality of compute nodes, including: identifying, by a parallel computer control system, a subset of compute nodes in the parallel computer to execute a job; selecting, by the parallel computer control system, one of the subset of compute nodes in the parallel computer as a job leader compute node; retrieving, by the job leader compute node from computer memory, an application for executing the job; and broadcasting, by the job leader to the subset of compute nodes in the parallel computer, the application for executing the job.

  13. Introduction to computer networking

    CERN Document Server

    Robertazzi, Thomas G

    2017-01-01

    This book gives a broad look at both fundamental networking technology and new areas that support it and use it. It is a concise introduction to the most prominent, recent technological topics in computer networking. Topics include network technology such as wired and wireless networks, enabling technologies such as data centers, software defined networking, cloud and grid computing and applications such as networks on chips, space networking and network security. The accessible writing style and non-mathematical treatment makes this a useful book for the student, network and communications engineer, computer scientist and IT professional. • Features a concise, accessible treatment of computer networking, focusing on new technological topics; • Provides non-mathematical introduction to networks in their most common forms today;< • Includes new developments in switching, optical networks, WiFi, Bluetooth, LTE, 5G, and quantum cryptography.

  14. Cloud computing basics for librarians.

    Science.gov (United States)

    Hoy, Matthew B

    2012-01-01

    "Cloud computing" is the name for the recent trend of moving software and computing resources to an online, shared-service model. This article briefly defines cloud computing, discusses different models, explores the advantages and disadvantages, and describes some of the ways cloud computing can be used in libraries. Examples of cloud services are included at the end of the article. Copyright © Taylor & Francis Group, LLC

  15. Computational physics

    CERN Document Server

    Newman, Mark

    2013-01-01

    A complete introduction to the field of computational physics, with examples and exercises in the Python programming language. Computers play a central role in virtually every major physics discovery today, from astrophysics and particle physics to biophysics and condensed matter. This book explains the fundamentals of computational physics and describes in simple terms the techniques that every physicist should know, such as finite difference methods, numerical quadrature, and the fast Fourier transform. The book offers a complete introduction to the topic at the undergraduate level, and is also suitable for the advanced student or researcher who wants to learn the foundational elements of this important field.

  16. Computational Viscoelasticity

    CERN Document Server

    Marques, Severino P C

    2012-01-01

    This text is a guide how to solve problems in which viscoelasticity is present using existing commercial computational codes. The book gives information on codes’ structure and use, data preparation  and output interpretation and verification. The first part of the book introduces the reader to the subject, and to provide the models, equations and notation to be used in the computational applications. The second part shows the most important Computational techniques: Finite elements formulation, Boundary elements formulation, and presents the solutions of Viscoelastic problems with Abaqus.

  17. Teachers' Computer Anxiety: An International Perspective.

    Science.gov (United States)

    Yaghi, Hussein M.; Abu-Saba, Mary Bentley

    1998-01-01

    Describes a study that investigated computer anxiety among Lebanese teachers known to use computers in their regular educational programs. Highlights include use of the Computer Anxiety Rating Scale (CARS), international experiences, educational attributes including language of instruction, and computer experience. (Author/LRW)

  18. The NASA computer science research program plan

    Science.gov (United States)

    1983-01-01

    A taxonomy of computer science is included, one state of the art of each of the major computer science categories is summarized. A functional breakdown of NASA programs under Aeronautics R and D, space R and T, and institutional support is also included. These areas were assessed against the computer science categories. Concurrent processing, highly reliable computing, and information management are identified.

  19. Dicty_cDB: VHP688 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available 1e-05 1 X06413 |X06413.1 Yeast MET3 gene for ATP sulphurylase. 62 1e-05 1 AC131224 |AC131224.3 Rattus norvegicus...X06413_1( X06413 |pid:none) Yeast MET3 gene for ATP sulphurylase. ... 179 6e-44 protein update 2009. 7.21 PSORT

  20. Dicty_cDB: VHP816 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available 3E17 of library G from Tetraodon nigroviridis. 44 2.0 1 BF779874 |BF779874.1 3243-32 hindgut and Malpighian ....0 1 BD283035 |BD283035.1 Flea head, nerve cord, hindgut and malpighian tubule nucleic acid molecules, prote

  1. Dicty_cDB: VHP475 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available Achlya ambisexualis heat shock protein... 205 2e-51 U39047_1( U39047 |pid:none) Achlya ambisexualis heat...Achlya ambisexualis isolate JS855 ... 205 2e-51 AF402100_1( AF402100 |pid:none) Achlya ambisexualis isolate

  2. Dicty_cDB: VHP528 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available EDGKDYLLNLIDTPGHVDFSYEVSR SLMACQGALLVVDAVQGVQAQTMANYYLALD--- Translated Amino Acid sequence (All Frames)...EDGKDYLLNLIDTPGHVDFSYEVSR SLMACQGALLVVDAVQGVQAQTMANYYLALD--- Frame C: vit**nkcfldc*ieetvv*iki*hqdyy*

  3. Dicty_cDB: VHP725 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available ultured bacterial clone mtbe21... 115 2e-24 CP001110_2564( CP001110 |pid:none) Pelodictyon phaeoclathratifor...Desulfovibrio magneticus RS-1 D... 119 3e-25 FP312977_15( FP312977 |pid:none) unc

  4. Dicty_cDB: VHP470 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available EGAYSLPTRLNMKKNQERFELAFE-- - ---LIIXFKSFVISLIMPFRFIKVLPVPGVSH*llksi*krxkrnsipllkelkrslk*i gpmmsnhwklfiqhlkke...SFVISLIMPFRFIKVLPVPGVSH*llksi*krxkrnsipllkelkrslk*i gpmmsnhwklfiqhlkkeikkelvtyskrllnmsliislnvvkriwf*kvsskqlq

  5. Dicty_cDB: VHP414 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available i*krxkrnsipllkelkrs lk*igpmmsnhwklfiqhlkkeikkelvtyskrllnmsliislnvvkriwf*kvsskqlq ...LIVNEDAKNSSYWKYAFNGGQ LNLLF--- ---GGNLIIXFKSICNISDNANFDFIKSFQYQVFSH*llksi*krxkrnsipllkelkrs lk*igpmmsnhwklfiqh

  6. Dicty_cDB: VHP452 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available erikevtkvd wsydeqsletvypaleernkerigdlfqeiikyvadnivkrckedmvlesfleatsnaki vfrhnakangywnwsfenndlvitfksicnvs...qsletvypaleernkerigdlfqeiikyvadnivkrckedmvlesfleatsnaki vfrhnakangywnwsfenndlvitfksicnvsdnanfdfikilpspgvltla

  7. Dicty_cDB: VHP635 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available ments: (bits) Value N X98286 |X98286.1 D.discoideum mRNA for P-type ATPase. 702 0.0 2 CB980117 |CB980117.1 CAB70001_IaR_H03 Caberne... CB980047 |CB980047.1 CAB70001_IaF_H03 Cabernet Sauvignon Berry Post-Veraison - C...AB7 Vitis vinifera cDNA clone CAB70001_IaF_H03 5', mRNA sequence. 44 2.2 1 CB979848 |CB979848.1 CAB70001_IIcF_H03 Caberne

  8. Dicty_cDB: VHP305 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available bernet Sauvignon Flower bloom - CAB2 Vitis vinifera cDNA clone CAB20003_Ia_Ra_A08 3', mRNA sequence. 48 7e-0...VVB047G11 5, mRNA sequence. 48 6e-05 2 CF208808 |CF208808.1 CAB20003_Ia_Ra_A08 Ca

  9. Dicty_cDB: VHP380 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available PPPEYFTFSTRXPFFLQPSSSMGLLXKGLLLENLSL EQLEEIFPXFTNIKEDLALASQFWDTAFKIVTAIHXEGNIISKTIYEAXVXSRQRRREIX KTLIRXKI...PPPEYFTFSTRXPFFLQPSSSMGLLXKGLLLENLSL EQLEEIFPXFTNIKEDLALASQFWDTAFKIVTAIHXEGNIISKTIYEAXVXSRQRRREIX KTLIRXKI

  10. Dicty_cDB: VHP612 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available IFXXKK K--- ---QSEQDVYNVFASYCSGNIKRLPWNDSPLSLESENIKEQLVFLNKNGFLTINSQPAIN GLPSTDKQHGWGGKNGIVYKKAYIEXF...xfxxqk k--- ---QSEQDVYNVFASYCSGNIKRLPWNDSPLSLESENIKEQLVFLNKNGFLTINSQPAIN GLPSTDKQHGWGGKNGIVYKKAYIEXF

  11. Dicty_cDB: VHP679 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available AIAAILEDTERFDLALEFLKQTLKHQEFLFTP DHLMCSTTYHKMAIVCARATNFDDSIIHQKKSTDILEKELGEAHPRTKESLEFYTGLSQT ANQIKL...AIAAILEDTERFDLALEFLKQTLKHQEFLFTP DHLMCSTTYHKMAIVCARATNFDDSIIHQKKSTDILEKELGEAHPRTKESLEFYTGLSQT ANQIKL

  12. Dicty_cDB: VHP819 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available FKSINETFNQNVLFAYMISFALSSKMTDQQLQQVEDFFKQNP VAIADRSIKQDLEQIRNNTKWFNSFNKDLLNWIKK*ii*fnkdl*iwifi...NETFNQNVLFAYMISFALSSKMTDQQLQQVEDFFKQNP VAIADRSIKQDLEQIRNNTKWFNSFNKDLLNWIKK*ii*fnkdl*iwifi

  13. Dicty_cDB: VHP286 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available stercoralis cDNA 5' similar to WP:C41C4.8 CE05402 TRANSITIONAL ENDOPLASMIC RETICULUM ATPASE HOMOLOG 2 ;, mRNA...ratti cDNA 5' similar to SW:TER2_CAEEL P54812 TRANSITIONAL ENDOPLASMIC RETICULUM ATPASE HOMOLOG 2 ;, mRNA...mansoni cDNA clone SMNCG50 5' end similar to transitional endoplasmic reticulum ATPase, mRNA sequence...stercoralis cDNA 5' similar to WP:C41C4.8 CE05402 TRANSITIONAL ENDOPLASMIC RETICULUM ATPASE HOMOLOG 2 ;, mRNA...mansoni cDNA clone SMNAQ29 5' end similar to transitional endoplasmic reticulum ATPase, mRNA sequence

  14. Dicty_cDB: VHP717 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available sequence ---PKDICSKALAESFNTPFPFEDENARINHNLVDLSSISPTLKFDIKYATTDNFTGIQL YKQAKAFLNKDAAKCLLSAHNWLVENWNVGIIVFD...VGDFDEFSIRSHRSYFGGSELQRWYRKLLTI ALINNNFRPNEHEWWHFDIIVDKPLAVLNLQFDQIN*nik*nkinnyffyiq Translated Amino...Frame C: ---PKDICSKALAESFNTPFPFEDENARINHNLVDLSSISPTLKFDIKYATTDNFTGIQL YKQAKAFLNKDAAKCLLSAHNWLVENWNVGIIVFD...VGDFDEFSIRSHRSYFGGSELQRWYRKLLTI ALINNNFRPNEHEWWHFDIIVDKPLAVLNLQFDQIN*nik*nkinnyffyiq Homology vs CSM-cDNA

  15. Dicty_cDB: VHP856 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available DDFREAYRWIGQNTADDARI MSWWDYGYQLSAMANRTVLVDNNTWNNSHIAQVGKAFASTEEDAYIQMKALDVDYVLVIF GGLTGYSSDDINKFLWMV...DDFREAYRWIGQNTADDARI MSWWDYGYQLSAMANRTVLVDNNTWNNSHIAQVGKAFASTEEDAYIQMKALDVDYVLVIF GGLTGYSSDDINKFLWMV

  16. Dicty_cDB: VHP176 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available v* tvvrqvsftlllsivcviva*fstrgtvmpdhwsvglfdkivtcryhpldng*tplsqnp f*krkpnalececcr*h*vvgggplstlnhminrcytavsfrll...SAHSDAAF*sfdvgssyhceaeftkcwivhpltrnvswv* tvvrqvsftlllsivcviva*fstrgtvmpdhwsvglfdkivtcryhpldng*tplsqnp f*krkpnalecec

  17. Dicty_cDB: VHP605 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available nqrfss*swwct* ylii*fikw*sn*ngw*fr*i*ysfssflfwwfrtstlv*ktfnncinq**fqtk*trmv af*ync**tissfkftixqin*nik*nkinn*f...ytri*rsiccttnqrfss*swwct* ylii*fikw*sn*ngw*fr*i*ysfssflfwwfrtstlv*ktfnncinq**fqtk*trmv af*ync**tissfkftixqin

  18. Dicty_cDB: VHP812 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available YTNKLINEKSPYLLKHAHNPVDWLPWGEEAFKIARDNDK LIFLSVGYMACHWCNVMERECFENVEIAKVMNEYCVNIKIDREERPDIDKIYMTYLTEIS...YTNKLINEKSPYLLKHAHNPVDWLPWGEEAFKIARDNDK LIFLSVGYMACHWCNVMERECFENVEIAKVMNEYCVNIKIDREERPDIDKIYMTYLTEIS

  19. Dicty_cDB: VHP287 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available XYXGHHGEEFEMGXVFVH QVIHTIEFVXGAVSNXASHXRLWAXSLAXSEXXSVXXERIXIGQVXRGNPFLA Translated Amino Acid sequence...XYXGHHGEEFEMGXVFVH QVIHTIEFVXGAVSNXASHXRLWAXSLAXSEXXSVXXERIXIGQVXRGNPFLA Frame C: ---sfpfqlxwslnhcs*

  20. Dicty_cDB: VHP722 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available LGDRVPYVVIQGSKGAPIYEKAEDPLYALEHNILLDCQYYLDKQLKAPLIRIFKPIMSNP DLIFHGEHTRTIAQSTLSDNNKGFFGTLKKKKVCMNCPKELTDTESTTCINCQHKEASLY...LGDRVPYVVIQGSKGAPIYEKAEDPLYALEHNILLDCQYYLDKQLKAPLIRIFKPIMSNP DLIFHGEHTRTIAQSTLSDNNKGFFGTLKKKKVCMNCPKELTDTESTTCINCQHKEASLY

  1. Dicty_cDB: VHP638 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available LVQHTHELEVSHQLGSPXYFM PHVGQFFQGITLTXSMELKYPMTKEQVVERYQKFYQNEPLIKIDKDGIPEVKSNSGKH Translated Amino Acid...LVQHTHELEVSHQLGSPXYFM PHVGQFFQGITLTXSMELKYPMTKEQVVERYQKFYQNEPLIKIDKDGIPEVKSNSGKH Frame B: ---iqvnhqc

  2. Dicty_cDB: VHP866 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available equences: 97611 Number of extensions: 0 Number of successful extensions: 0 Number of sequences better than 1...845959 Number of Hits to DB: 0 Number of sequences better than 10.0: 0 Length of ...0.0: 0 Number of HSP's better than 10.0 without gapping: 0 Number of HSP's successfully gapped in prelim tes

  3. Dicty_cDB: VHP813 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available ELQKKYFGLVDKSIPVLSFCW*ncitkgcsfnfec r*ridwslsr*nsnfnwwygkyerslck*lclvnasiv*tiptiilg*p*filfrwsig* frlrfwfna...dwslsr*nsnfnwwygkyerslck*lclvnasiv*tiptiilg*p*filfrwsig* frlrfwfnafii*tkwccttrilccwytsyrfqnwwskrysfri*yqh*nw

  4. Dicty_cDB: VHP564 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available fqlft msnl*tsh*tsiienfnq*n*tys**nhs*g*tsyrisks**rpivigww*irrssr*lc fgsilllplfqm*ttlfrwsksvccccrftfkl*s*ridlw...tsh*tsiienfnq*n*tys**nhs*g*tsyrisks**rpivigww*irrssr*lc fgsilllplfqm*ttlfrwsksvccccrftfkl*s*ridlwwlflw**ssih

  5. Dicty_cDB: VHP768 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available fry stcrwls*fl**dlech*irsyeig*ffqtgii*clktfttikcyqslds*rcstcyhpl *rrfqrvrf**gyhcyl*flve*nv*clsrndqihfltrrrftn*tknqrnplhlyryws sfitsih...aiphrgvvsiittssrrchsnhyvmsiptisimlgqf*h*grkkqcqdiiksi rslratyt Homology vs CSM-cDNA

  6. Dicty_cDB: VHP387 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available i*nklil*QKKVEDRRAEYEIIEAREK L--- ---LISQQXAFEFTNYINYLKDQFLLLLQSFNLLNLQFI*nqitmnssinsmlnl*kkxp pppinsplkvxsls...frtn*yfnkkklkiveqnmkllkqekn *--- ---LISQQXAFEFTNYINYLKDQFLLLLQSFNLLNLQFI*nqitmnssinsmlnl*kkxp pppinsplkvxsls

  7. Dicty_cDB: VHP173 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available DKE DKVDFRTLKLDPETEHQYAHHIKEFRDKDAKGLISQQDAFEFTNYINYLKESSATSPIIQ SLKSSIHMKSNNNELIDQFNAESLEKDTTTTDKLS...DKE DKVDFRTLKLDPETEHQYAHHIKEFRDKDAKGLISQQDAFEFTNYINYLKESSATSPIIQ SLKSSIHMKSNNNELIDQFNAESLEKDTTTTDKLS

  8. Dicty_cDB: VHP607 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available gkicnyxscisfimci*ryqy*iwfikikd tkit*ifrrtx**srtrtinyk**yxvkknkik*kkkl Translated Amino Acid sequence...gkicnykscisfimci*ryqy*iwfikikdtki t*ifrrtt**srtrtinyi**ysvkknkik*kkklykkk--- ---RTKIKIKIDVY*nvkikdft...gkicnyxscisfimci*ryqy*iwfikikd tkit*ifrrtx**srtrtinyk**yxvkknkik*kkkl Frame C: elklk*k*tytrmlrskilpq

  9. Dicty_cDB: VHP876 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available lqt*tfthsvdhntilffl*iffl*kkinnsff*kgyf*KIFKIXKN--- ---ISTTPVNGSGNVGPNGTPLLSSVXSDXXPXSPVPXIVSXHGXVKALSLELATPTVPE...lqt*tfthsvdhntilffl*iffl*kkinnsff*kgyf*KIFKIXKN--- ---ISTTPVNGSGNVGPNGTPLLSSVXSDXXPXSPVPXIVSXHGXVKALSLELATPTVPE

  10. Dicty_cDB: VHP310 [Dicty_cDB

    Lifescience Database Archive (English)

    Full Text Available SKTVSIIDPLLIQA--- ---LSYAPKSDQLGSPKTTNEVQFGQKLPLIEIPSNNIARIFFRIASEAQPYQAQQVGIR FYSPAREAVVPATYSADAYSYTFTNKDAC...SKTVSIIDPLLIQA--- ---LSYAPKSDQLGSPKTTNEVQFGQKLPLIEIPSNNIARIFFRIASEAQPYQAQQVGIR FYSPAREAVVPATYSADAYSYTFTNKDAC

  11. Digital computers in action

    CERN Document Server

    Booth, A D

    1965-01-01

    Digital Computers in Action is an introduction to the basics of digital computers as well as their programming and various applications in fields such as mathematics, science, engineering, economics, medicine, and law. Other topics include engineering automation, process control, special purpose games-playing devices, machine translation and mechanized linguistics, and information retrieval. This book consists of 14 chapters and begins by discussing the history of computers, from the idea of performing complex arithmetical calculations to the emergence of a modern view of the structure of a ge

  12. Research in Computational Astrobiology

    Science.gov (United States)

    Chaban, Galina; Colombano, Silvano; Scargle, Jeff; New, Michael H.; Pohorille, Andrew; Wilson, Michael A.

    2003-01-01

    We report on several projects in the field of computational astrobiology, which is devoted to advancing our understanding of the origin, evolution and distribution of life in the Universe using theoretical and computational tools. Research projects included modifying existing computer simulation codes to use efficient, multiple time step algorithms, statistical methods for analysis of astrophysical data via optimal partitioning methods, electronic structure calculations on water-nuclei acid complexes, incorporation of structural information into genomic sequence analysis methods and calculations of shock-induced formation of polycylic aromatic hydrocarbon compounds.

  13. Testing Intelligently Includes Double-Checking Wechsler IQ Scores

    Science.gov (United States)

    Kuentzel, Jeffrey G.; Hetterscheidt, Lesley A.; Barnett, Douglas

    2011-01-01

    The rigors of standardized testing make for numerous opportunities for examiner error, including simple computational mistakes in scoring. Although experts recommend that test scoring be double-checked, the extent to which independent double-checking would reduce scoring errors is not known. A double-checking procedure was established at a…

  14. Essentials of cloud computing

    CERN Document Server

    Chandrasekaran, K

    2014-01-01

    ForewordPrefaceComputing ParadigmsLearning ObjectivesPreambleHigh-Performance ComputingParallel ComputingDistributed ComputingCluster ComputingGrid ComputingCloud ComputingBiocomputingMobile ComputingQuantum ComputingOptical ComputingNanocomputingNetwork ComputingSummaryReview PointsReview QuestionsFurther ReadingCloud Computing FundamentalsLearning ObjectivesPreambleMotivation for Cloud ComputingThe Need for Cloud ComputingDefining Cloud ComputingNIST Definition of Cloud ComputingCloud Computing Is a ServiceCloud Computing Is a Platform5-4-3 Principles of Cloud computingFive Essential Charact

  15. Computational Literacy

    DEFF Research Database (Denmark)

    Chongtay, Rocio; Robering, Klaus

    2016-01-01

    In recent years, there has been a growing interest in and recognition of the importance of Computational Literacy, a skill generally considered to be necessary for success in the 21st century. While much research has concentrated on requirements, tools, and teaching methodologies for the acquisit......In recent years, there has been a growing interest in and recognition of the importance of Computational Literacy, a skill generally considered to be necessary for success in the 21st century. While much research has concentrated on requirements, tools, and teaching methodologies...... for the acquisition of Computational Literacy at basic educational levels, focus on higher levels of education has been much less prominent. The present paper considers the case of courses for higher education programs within the Humanities. A model is proposed which conceives of Computational Literacy as a layered...

  16. Computing Religion

    DEFF Research Database (Denmark)

    Nielbo, Kristoffer Laigaard; Braxton, Donald M.; Upal, Afzal

    2012-01-01

    The computational approach has become an invaluable tool in many fields that are directly relevant to research in religious phenomena. Yet the use of computational tools is almost absent in the study of religion. Given that religion is a cluster of interrelated phenomena and that research...... concerning these phenomena should strive for multilevel analysis, this article argues that the computational approach offers new methodological and theoretical opportunities to the study of religion. We argue that the computational approach offers 1.) an intermediary step between any theoretical construct...... and its targeted empirical space and 2.) a new kind of data which allows the researcher to observe abstract constructs, estimate likely outcomes, and optimize empirical designs. Because sophisticated mulitilevel research is a collaborative project we also seek to introduce to scholars of religion some...

  17. COMPUTERS HAZARDS

    Directory of Open Access Journals (Sweden)

    Andrzej Augustynek

    2007-01-01

    Full Text Available In June 2006, over 12.6 million Polish users of the Web registered. On the average, each of them spent 21 hours and 37 minutes monthly browsing the Web. That is why the problems of the psychological aspects of computer utilization have become an urgent research subject. The results of research into the development of Polish information society carried out in AGH University of Science and Technology, under the leadership of Leslaw H. Haber, in the period from 2000 until present time, indicate the emergence dynamic changes in the ways of computer utilization and their circumstances. One of the interesting regularities has been the inverse proportional relation between the level of computer skills and the frequency of the Web utilization.It has been found that in 2005, compared to 2000, the following changes occurred:- A significant drop in the number of students who never used computers and the Web;- Remarkable increase in computer knowledge and skills (particularly pronounced in the case of first years student- Decreasing gap in computer skills between students of the first and the third year; between male and female students;- Declining popularity of computer games.It has been demonstrated also that the hazard of computer screen addiction was the highest in he case of unemployed youth outside school system. As much as 12% of this group of young people were addicted to computer. A lot of leisure time that these youths enjoyed inducted them to excessive utilization of the Web. Polish housewives are another population group in risk of addiction to the Web. The duration of long Web charts carried out by younger and younger youths has been another matter of concern. Since the phenomenon of computer addiction is relatively new, no specific therapy methods has been developed. In general, the applied therapy in relation to computer addition syndrome is similar to the techniques applied in the cases of alcohol or gambling addiction. Individual and group

  18. Computational sustainability

    CERN Document Server

    Kersting, Kristian; Morik, Katharina

    2016-01-01

    The book at hand gives an overview of the state of the art research in Computational Sustainability as well as case studies of different application scenarios. This covers topics such as renewable energy supply, energy storage and e-mobility, efficiency in data centers and networks, sustainable food and water supply, sustainable health, industrial production and quality, etc. The book describes computational methods and possible application scenarios.

  19. Computer viruses

    Energy Technology Data Exchange (ETDEWEB)

    Cohen, F.B.

    1986-01-01

    This thesis investigates a recently discovered vulnerability in computer systems which opens the possibility that a single individual with an average user's knowledge could cause widespread damage to information residing in computer networks. This vulnerability is due to a transitive integrity corrupting mechanism called a computer virus which causes corrupted information to spread from program to program. Experiments have shown that a virus can spread at an alarmingly rapid rate from user to user, from system to system, and from network to network, even when the best-availability security techniques are properly used. Formal definitions of self-replication, evolution, viruses, and protection mechanisms are used to prove that any system that allows sharing, general functionality, and transitivity of information flow cannot completely prevent viral attack. Computational aspects of viruses are examined, and several undecidable problems are shown. It is demonstrated that a virus may evolve so as to generate any computable sequence. Protection mechanisms are explored, and the design of computer networks that prevent both illicit modification and dissemination of information are given. Administration and protection of information networks based on partial orderings are examined, and probably correct automated administrative assistance is introduced.

  20. Chromatin Computation

    Science.gov (United States)

    Bryant, Barbara

    2012-01-01

    In living cells, DNA is packaged along with protein and RNA into chromatin. Chemical modifications to nucleotides and histone proteins are added, removed and recognized by multi-functional molecular complexes. Here I define a new computational model, in which chromatin modifications are information units that can be written onto a one-dimensional string of nucleosomes, analogous to the symbols written onto cells of a Turing machine tape, and chromatin-modifying complexes are modeled as read-write rules that operate on a finite set of adjacent nucleosomes. I illustrate the use of this “chromatin computer” to solve an instance of the Hamiltonian path problem. I prove that chromatin computers are computationally universal – and therefore more powerful than the logic circuits often used to model transcription factor control of gene expression. Features of biological chromatin provide a rich instruction set for efficient computation of nontrivial algorithms in biological time scales. Modeling chromatin as a computer shifts how we think about chromatin function, suggests new approaches to medical intervention, and lays the groundwork for the engineering of a new class of biological computing machines. PMID:22567109

  1. Proposal for grid computing for nuclear applications

    Energy Technology Data Exchange (ETDEWEB)

    Idris, Faridah Mohamad; Ismail, Saaidi; Haris, Mohd Fauzi B.; Sulaiman, Mohamad Safuan B.; Aslan, Mohd Dzul Aiman Bin.; Samsudin, Nursuliza Bt.; Ibrahim, Maizura Bt.; Ahmad, Megat Harun Al Rashid B. Megat; Yazid, Hafizal B.; Jamro, Rafhayudi B.; Azman, Azraf B.; Rahman, Anwar B. Abdul; Ibrahim, Mohd Rizal B. Mamat; Muhamad, Shalina Bt. Sheik; Hassan, Hasni [Malaysian Nuclear Agency, Bangi, 43000 Kajang, Selangor (Malaysia); Abdullah, Wan Ahmad Tajuddin Wan; Ibrahim, Zainol Abidin; Zolkapli, Zukhaimira; Anuar, Afiq Aizuddin; Norjoharuddeen, Nurfikri [Physics Department, University of Malaya, 56003 Kuala Lumpur (Malaysia); and others

    2014-02-12

    The use of computer clusters for computational sciences including computational physics is vital as it provides computing power to crunch big numbers at a faster rate. In compute intensive applications that requires high resolution such as Monte Carlo simulation, the use of computer clusters in a grid form that supplies computational power to any nodes within the grid that needs computing power, has now become a necessity. In this paper, we described how the clusters running on a specific application could use resources within the grid, to run the applications to speed up the computing process.

  2. Natural Computing in Computational Finance Volume 4

    CERN Document Server

    O’Neill, Michael; Maringer, Dietmar

    2012-01-01

    This book follows on from Natural Computing in Computational Finance  Volumes I, II and III.   As in the previous volumes of this series, the  book consists of a series of  chapters each of  which was selected following a rigorous, peer-reviewed, selection process.  The chapters illustrate the application of a range of cutting-edge natural  computing and agent-based methodologies in computational finance and economics.  The applications explored include  option model calibration, financial trend reversal detection, enhanced indexation, algorithmic trading,  corporate payout determination and agent-based modeling of liquidity costs, and trade strategy adaptation.  While describing cutting edge applications, the chapters are  written so that they are accessible to a wide audience. Hence, they should be of interest  to academics, students and practitioners in the fields of computational finance and  economics.  

  3. Computational colour science using MATLAB

    CERN Document Server

    Westland, Stephen; Cheung, Vien

    2012-01-01

    Computational Colour Science Using MATLAB 2nd Edition offers a practical, problem-based approach to colour physics. The book focuses on the key issues encountered in modern colour engineering, including efficient representation of colour information, Fourier analysis of reflectance spectra and advanced colorimetric computation. Emphasis is placed on the practical applications rather than the techniques themselves, with material structured around key topics. These topics include colour calibration of visual displays, computer recipe prediction and models for colour-appearance prediction. Each t

  4. Computational creativity

    Directory of Open Access Journals (Sweden)

    López de Mántaras Badia, Ramon

    2013-12-01

    Full Text Available New technologies, and in particular artificial intelligence, are drastically changing the nature of creative processes. Computers are playing very significant roles in creative activities such as music, architecture, fine arts, and science. Indeed, the computer is already a canvas, a brush, a musical instrument, and so on. However, we believe that we must aim at more ambitious relations between computers and creativity. Rather than just seeing the computer as a tool to help human creators, we could see it as a creative entity in its own right. This view has triggered a new subfield of Artificial Intelligence called Computational Creativity. This article addresses the question of the possibility of achieving computational creativity through some examples of computer programs capable of replicating some aspects of creative behavior in the fields of music and science.Las nuevas tecnologías y en particular la Inteligencia Artificial están cambiando de forma importante la naturaleza del proceso creativo. Los ordenadores están jugando un papel muy significativo en actividades artísticas tales como la música, la arquitectura, las bellas artes y la ciencia. Efectivamente, el ordenador ya es el lienzo, el pincel, el instrumento musical, etc. Sin embargo creemos que debemos aspirar a relaciones más ambiciosas entre los ordenadores y la creatividad. En lugar de verlos solamente como herramientas de ayuda a la creación, los ordenadores podrían ser considerados agentes creativos. Este punto de vista ha dado lugar a un nuevo subcampo de la Inteligencia Artificial denominado Creatividad Computacional. En este artículo abordamos la cuestión de la posibilidad de alcanzar dicha creatividad computacional mediante algunos ejemplos de programas de ordenador capaces de replicar algunos aspectos relacionados con el comportamiento creativo en los ámbitos de la música y la ciencia.

  5. Accreditation of academic programmes in computing South Africa

    CSIR Research Space (South Africa)

    Gerber, A

    2012-05-01

    Full Text Available Over the past two decades, strong technical convergence has been observed between computing and engineering. Computing in this context includes Computer Engineering, Computer Science, Information Systems, Information Technology and Software...

  6. Computational mechanics

    Energy Technology Data Exchange (ETDEWEB)

    Goudreau, G.L.

    1993-03-01

    The Computational Mechanics thrust area sponsors research into the underlying solid, structural and fluid mechanics and heat transfer necessary for the development of state-of-the-art general purpose computational software. The scale of computational capability spans office workstations, departmental computer servers, and Cray-class supercomputers. The DYNA, NIKE, and TOPAZ codes have achieved world fame through our broad collaborators program, in addition to their strong support of on-going Lawrence Livermore National Laboratory (LLNL) programs. Several technology transfer initiatives have been based on these established codes, teaming LLNL analysts and researchers with counterparts in industry, extending code capability to specific industrial interests of casting, metalforming, and automobile crash dynamics. The next-generation solid/structural mechanics code, ParaDyn, is targeted toward massively parallel computers, which will extend performance from gigaflop to teraflop power. Our work for FY-92 is described in the following eight articles: (1) Solution Strategies: New Approaches for Strongly Nonlinear Quasistatic Problems Using DYNA3D; (2) Enhanced Enforcement of Mechanical Contact: The Method of Augmented Lagrangians; (3) ParaDyn: New Generation Solid/Structural Mechanics Codes for Massively Parallel Processors; (4) Composite Damage Modeling; (5) HYDRA: A Parallel/Vector Flow Solver for Three-Dimensional, Transient, Incompressible Viscous How; (6) Development and Testing of the TRIM3D Radiation Heat Transfer Code; (7) A Methodology for Calculating the Seismic Response of Critical Structures; and (8) Reinforced Concrete Damage Modeling.

  7. Transportation Research & Analysis Computing Center

    Data.gov (United States)

    Federal Laboratory Consortium — The technical objectives of the TRACC project included the establishment of a high performance computing center for use by USDOT research teams, including those from...

  8. Community Cloud Computing

    Science.gov (United States)

    Marinos, Alexandros; Briscoe, Gerard

    Cloud Computing is rising fast, with its data centres growing at an unprecedented rate. However, this has come with concerns over privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon and Microsoft. Our response is an alternative model for the Cloud conceptualisation, providing a paradigm for Clouds in the community, utilising networked personal computers for liberation from the centralised vendor model. Community Cloud Computing (C3) offers an alternative architecture, created by combing the Cloud with paradigms from Grid Computing, principles from Digital Ecosystems, and sustainability from Green Computing, while remaining true to the original vision of the Internet. It is more technically challenging than Cloud Computing, having to deal with distributed computing issues, including heterogeneous nodes, varying quality of service, and additional security constraints. However, these are not insurmountable challenges, and with the need to retain control over our digital lives and the potential environmental consequences, it is a challenge we must pursue.

  9. Data structures, computer graphics, and pattern recognition

    CERN Document Server

    Klinger, A; Kunii, T L

    1977-01-01

    Data Structures, Computer Graphics, and Pattern Recognition focuses on the computer graphics and pattern recognition applications of data structures methodology.This book presents design related principles and research aspects of the computer graphics, system design, data management, and pattern recognition tasks. The topics include the data structure design, concise structuring of geometric data for computer aided design, and data structures for pattern recognition algorithms. The survey of data structures for computer graphics systems, application of relational data structures in computer gr

  10. Computer science II essentials

    CERN Document Server

    Raus, Randall

    2012-01-01

    REA's Essentials provide quick and easy access to critical information in a variety of different fields, ranging from the most basic to the most advanced. As its name implies, these concise, comprehensive study guides summarize the essentials of the field covered. Essentials are helpful when preparing for exams, doing homework and will remain a lasting reference source for students, teachers, and professionals. Computer Science II includes organization of a computer, memory and input/output, coding, data structures, and program development. Also included is an overview of the most commonly

  11. Quantum computers.

    Science.gov (United States)

    Ladd, T D; Jelezko, F; Laflamme, R; Nakamura, Y; Monroe, C; O'Brien, J L

    2010-03-04

    Over the past several decades, quantum information science has emerged to seek answers to the question: can we gain some advantage by storing, transmitting and processing information encoded in systems that exhibit unique quantum properties? Today it is understood that the answer is yes, and many research groups around the world are working towards the highly ambitious technological goal of building a quantum computer, which would dramatically improve computational power for particular tasks. A number of physical systems, spanning much of modern physics, are being developed for quantum computation. However, it remains unclear which technology, if any, will ultimately prove successful. Here we describe the latest developments for each of the leading approaches and explain the major challenges for the future.

  12. Workshop on Computational Optimization

    CERN Document Server

    2016-01-01

    This volume is a comprehensive collection of extended contributions from the Workshop on Computational Optimization 2014, held at Warsaw, Poland, September 7-10, 2014. The book presents recent advances in computational optimization. The volume includes important real problems like parameter settings for controlling processes in bioreactor and other processes, resource constrained project scheduling, infection distribution, molecule distance geometry, quantum computing, real-time management and optimal control, bin packing, medical image processing, localization the abrupt atmospheric contamination source and so on. It shows how to develop algorithms for them based on new metaheuristic methods like evolutionary computation, ant colony optimization, constrain programming and others. This research demonstrates how some real-world problems arising in engineering, economics, medicine and other domains can be formulated as optimization tasks.

  13. GPU computing and applications

    CERN Document Server

    See, Simon

    2015-01-01

    This book presents a collection of state of the art research on GPU Computing and Application. The major part of this book is selected from the work presented at the 2013 Symposium on GPU Computing and Applications held in Nanyang Technological University, Singapore (Oct 9, 2013). Three major domains of GPU application are covered in the book including (1) Engineering design and simulation; (2) Biomedical Sciences; and (3) Interactive & Digital Media. The book also addresses the fundamental issues in GPU computing with a focus on big data processing. Researchers and developers in GPU Computing and Applications will benefit from this book. Training professionals and educators can also benefit from this book to learn the possible application of GPU technology in various areas.

  14. Computers boost structural technology

    Science.gov (United States)

    Noor, Ahmed K.; Venneri, Samuel L.

    1989-01-01

    Derived from matrix methods of structural analysis and finite element methods developed over the last three decades, computational structures technology (CST) blends computer science, numerical analysis, and approximation theory into structural analysis and synthesis. Recent significant advances in CST include stochastic-based modeling, strategies for performing large-scale structural calculations on new computing systems, and the integration of CST with other disciplinary modules for multidisciplinary analysis and design. New methodologies have been developed at NASA for integrated fluid-thermal structural analysis and integrated aerodynamic-structure-control design. The need for multiple views of data for different modules also led to the development of a number of sophisticated data-base management systems. For CST to play a role in the future development of structures technology and in the multidisciplinary design of future flight vehicles, major advances and computational tools are needed in a number of key areas.

  15. Encyclopedia of cloud computing

    CERN Document Server

    Bojanova, Irena

    2016-01-01

    The Encyclopedia of Cloud Computing provides IT professionals, educators, researchers and students with a compendium of cloud computing knowledge. Authored by a spectrum of subject matter experts in industry and academia, this unique publication, in a single volume, covers a wide range of cloud computing topics, including technological trends and developments, research opportunities, best practices, standards, and cloud adoption. Providing multiple perspectives, it also addresses questions that stakeholders might have in the context of development, operation, management, and use of clouds. Furthermore, it examines cloud computing's impact now and in the future. The encyclopedia presents 56 chapters logically organized into 10 sections. Each chapter covers a major topic/area with cross-references to other chapters and contains tables, illustrations, side-bars as appropriate. Furthermore, each chapter presents its summary at the beginning and backend material, references and additional resources for further i...

  16. Resilient computer system design

    CERN Document Server

    Castano, Victor

    2015-01-01

    This book presents a paradigm for designing new generation resilient and evolving computer systems, including their key concepts, elements of supportive theory, methods of analysis and synthesis of ICT with new properties of evolving functioning, as well as implementation schemes and their prototyping. The book explains why new ICT applications require a complete redesign of computer systems to address challenges of extreme reliability, high performance, and power efficiency. The authors present a comprehensive treatment for designing the next generation of computers, especially addressing safety-critical, autonomous, real time, military, banking, and wearable health care systems.   §  Describes design solutions for new computer system - evolving reconfigurable architecture (ERA) that is free from drawbacks inherent in current ICT and related engineering models §  Pursues simplicity, reliability, scalability principles of design implemented through redundancy and re-configurability; targeted for energy-,...

  17. Computational neurology and psychiatry

    CERN Document Server

    Bhattacharya, Basabdatta; Cochran, Amy

    2017-01-01

    This book presents the latest research in computational methods for modeling and simulating brain disorders. In particular, it shows how mathematical models can be used to study the relationship between a given disorder and the specific brain structure associated with that disorder. It also describes the emerging field of computational psychiatry, including the study of pathological behavior due to impaired functional connectivity, pathophysiological activity, and/or aberrant decision-making. Further, it discusses the data analysis techniques that will be required to analyze the increasing amount of data being generated about the brain. Lastly, the book offers some tips on the application of computational models in the field of quantitative systems pharmacology. Mainly written for computational scientists eager to discover new application fields for their model, this book also benefits neurologists and psychiatrists wanting to learn about new methods.

  18. Reconfigurable Computing

    CERN Document Server

    Cardoso, Joao MP

    2011-01-01

    As the complexity of modern embedded systems increases, it becomes less practical to design monolithic processing platforms. As a result, reconfigurable computing is being adopted widely for more flexible design. Reconfigurable Computers offer the spatial parallelism and fine-grained customizability of application-specific circuits with the postfabrication programmability of software. To make the most of this unique combination of performance and flexibility, designers need to be aware of both hardware and software issues. FPGA users must think not only about the gates needed to perform a comp

  19. Computational artifacts

    DEFF Research Database (Denmark)

    Schmidt, Kjeld; Bansler, Jørgen P.

    2016-01-01

    The key concern of CSCW research is that of understanding computing technologies in the social context of their use, that is, as integral features of our practices and our lives, and to think of their design and implementation under that perspective. However, the question of the nature...... of that which is actually integrated in our practices is often discussed in confusing ways, if at all. The article aims to try to clarify the issue and in doing so revisits and reconsiders the notion of ‘computational artifact’....

  20. Computer busses

    CERN Document Server

    Buchanan, William

    2000-01-01

    As more and more equipment is interface or'bus' driven, either by the use of controllers or directly from PCs, the question of which bus to use is becoming increasingly important both in industry and in the office. 'Computer Busses' has been designed to help choose the best type of bus for the particular application.There are several books which cover individual busses, but none which provide a complete guide to computer busses. The author provides a basic theory of busses and draws examples and applications from real bus case studies. Busses are analysed using from a top-down approach, helpin

  1. Computer viruses

    Science.gov (United States)

    Denning, Peter J.

    1988-01-01

    The worm, Trojan horse, bacterium, and virus are destructive programs that attack information stored in a computer's memory. Virus programs, which propagate by incorporating copies of themselves into other programs, are a growing menace in the late-1980s world of unprotected, networked workstations and personal computers. Limited immunity is offered by memory protection hardware, digitally authenticated object programs,and antibody programs that kill specific viruses. Additional immunity can be gained from the practice of digital hygiene, primarily the refusal to use software from untrusted sources. Full immunity requires attention in a social dimension, the accountability of programmers.

  2. Cloud Computing

    CERN Document Server

    Antonopoulos, Nick

    2010-01-01

    Cloud computing has recently emerged as a subject of substantial industrial and academic interest, though its meaning and scope is hotly debated. For some researchers, clouds are a natural evolution towards the full commercialisation of grid systems, while others dismiss the term as a mere re-branding of existing pay-per-use technologies. From either perspective, 'cloud' is now the label of choice for accountable pay-per-use access to third party applications and computational resources on a massive scale. Clouds support patterns of less predictable resource use for applications and services a

  3. 48 CFR 227.7203-2 - Acquisition of noncommercial computer software and computer software documentation.

    Science.gov (United States)

    2010-10-01

    ... practicable, solicitations and contracts— (1) Identify the types of computer software and the quantity of... documentation will be delivered; (2) Establish each type of computer software or computer software documentation... computer software or computer software documentation under a fixed-price type contract; (4) Include...

  4. Computational aspects of algebraic curves

    CERN Document Server

    Shaska, Tanush

    2005-01-01

    The development of new computational techniques and better computing power has made it possible to attack some classical problems of algebraic geometry. The main goal of this book is to highlight such computational techniques related to algebraic curves. The area of research in algebraic curves is receiving more interest not only from the mathematics community, but also from engineers and computer scientists, because of the importance of algebraic curves in applications including cryptography, coding theory, error-correcting codes, digital imaging, computer vision, and many more.This book cove

  5. Cloud computing.

    Science.gov (United States)

    Wink, Diane M

    2012-01-01

    In this bimonthly series, the author examines how nurse educators can use Internet and Web-based technologies such as search, communication, and collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes how cloud computing can be used in nursing education.

  6. Quantum Computers

    Science.gov (United States)

    2010-03-04

    be required. In 2001, a breakthrough known as the KLM (Knill–Laflamme– Milburn13) scheme showed that scalable quantum computing is possible using only...and single-photon detection to induce interactions nondeterministically. In the past five years, the KLM scheme has moved from a mathematical proof

  7. Computational Logistics

    DEFF Research Database (Denmark)

    Pacino, Dario; Voss, Stefan; Jensen, Rune Møller

    2013-01-01

    This book constitutes the refereed proceedings of the 4th International Conference on Computational Logistics, ICCL 2013, held in Copenhagen, Denmark, in September 2013. The 19 papers presented in this volume were carefully reviewed and selected for inclusion in the book. They are organized...... in topical sections named: maritime shipping, road transport, vehicle routing problems, aviation applications, and logistics and supply chain management....

  8. Computational Logistics

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the 4th International Conference on Computational Logistics, ICCL 2013, held in Copenhagen, Denmark, in September 2013. The 19 papers presented in this volume were carefully reviewed and selected for inclusion in the book. They are organized...... in topical sections named: maritime shipping, road transport, vehicle routing problems, aviation applications, and logistics and supply chain management....

  9. Quantum Computation

    Indian Academy of Sciences (India)

    can be represented using only n = log2 N bits, which is an exponential reduction in the required resources com- pared to the situation where every value is represented by a different physical state. Mathematically this struc- ture is known as a `tensor product', and I will refer to a similar break-up of computational algorithms ...

  10. Grid Computing

    Indian Academy of Sciences (India)

    IAS Admin

    global view and optimize the configuration and the use of all the computers, particularly high performance servers wherever they are. An enterprise grid is ... attributes: business model, architecture, resource management, security model, programming model, and applications [6]. Business Model. Grid is formed by 'not for ...

  11. Computing News

    CERN Multimedia

    McCubbin, N

    2001-01-01

    We are still five years from the first LHC data, so we have plenty of time to get the computing into shape, don't we? Well, yes and no: there is time, but there's an awful lot to do! The recently-completed CERN Review of LHC Computing gives the flavour of the LHC computing challenge. The hardware scale for each of the LHC experiments is millions of 'SpecInt95' (SI95) units of cpu power and tens of PetaBytes of data storage. PCs today are about 20-30SI95, and expected to be about 100 SI95 by 2005, so it's a lot of PCs. This hardware will be distributed across several 'Regional Centres' of various sizes, connected by high-speed networks. How to realise this in an orderly and timely fashion is now being discussed in earnest by CERN, Funding Agencies, and the LHC experiments. Mixed in with this is, of course, the GRID concept...but that's a topic for another day! Of course hardware, networks and the GRID constitute just one part of the computing. Most of the ATLAS effort is spent on software development. What we ...

  12. [Grid computing

    CERN Multimedia

    Wolinsky, H

    2003-01-01

    "Turn on a water spigot, and it's like tapping a bottomless barrel of water. Ditto for electricity: Flip the switch, and the supply is endless. But computing is another matter. Even with the Internet revolution enabling us to connect in new ways, we are still limited to self-contained systems running locally stored software, limited by corporate, institutional and geographic boundaries" (1 page).

  13. Quantum Computing

    Indian Academy of Sciences (India)

    start-up company at liT. Mumbai. Part 1. Building Blocks of Quan- tum Computers, Resonance, ..... by modeling the errors caused by decoherence. The interaction of a quantum system with the environment obstructs the unitary evolution of the system and causes dissipation of information, reducing coherence of information.

  14. Computational biology

    DEFF Research Database (Denmark)

    Hartmann, Lars Røeboe; Jones, Neil; Simonsen, Jakob Grue

    2011-01-01

    Computation via biological devices has been the subject of close scrutiny since von Neumann’s early work some 60 years ago. In spite of the many relevant works in this field, the notion of programming biological devices seems to be, at best, ill-defined. While many devices are claimed or proved t...

  15. Statistical Computing

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 4; Issue 10. Statistical Computing - Understanding Randomness and Random Numbers. Sudhakar Kunte. Series Article Volume 4 Issue 10 October 1999 pp 16-21. Fulltext. Click here to view fulltext PDF. Permanent link:

  16. Duality and Recycling Computing in Quantum Computers

    OpenAIRE

    Long, Gui Lu; Liu, Yang

    2007-01-01

    Quantum computer possesses quantum parallelism and offers great computing power over classical computer \\cite{er1,er2}. As is well-know, a moving quantum object passing through a double-slit exhibits particle wave duality. A quantum computer is static and lacks this duality property. The recently proposed duality computer has exploited this particle wave duality property, and it may offer additional computing power \\cite{r1}. Simply put it, a duality computer is a moving quantum computer pass...

  17. Internode data communications in a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Blocksome, Michael A.; Miller, Douglas R.; Parker, Jeffrey J.; Ratterman, Joseph D.; Smith, Brian E.

    2013-09-03

    Internode data communications in a parallel computer that includes compute nodes that each include main memory and a messaging unit, the messaging unit including computer memory and coupling compute nodes for data communications, in which, for each compute node at compute node boot time: a messaging unit allocates, in the messaging unit's computer memory, a predefined number of message buffers, each message buffer associated with a process to be initialized on the compute node; receives, prior to initialization of a particular process on the compute node, a data communications message intended for the particular process; and stores the data communications message in the message buffer associated with the particular process. Upon initialization of the particular process, the process establishes a messaging buffer in main memory of the compute node and copies the data communications message from the message buffer of the messaging unit into the message buffer of main memory.

  18. 8th International Workshop on Natural Computing

    CERN Document Server

    Hagiya, Masami

    2016-01-01

    This book highlights recent advances in natural computing, including biology and its theory, bio-inspired computing, computational aesthetics, computational models and theories, computing with natural media, philosophy of natural computing, and educational technology. It presents extended versions of the best papers selected from the “8th International Workshop on Natural Computing” (IWNC8), a symposium held in Hiroshima, Japan, in 2014. The target audience is not limited to researchers working in natural computing but also includes those active in biological engineering, fine/media art design, aesthetics, and philosophy.

  19. 24 CFR 1720.165 - Time computation.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Time computation. 1720.165 Section... Proceedings General Provisions § 1720.165 Time computation. Computation of any period of time prescribed or..., and national holidays shall be included in the computation of the prescribed or allowed period. ...

  20. BCS Glossary of Computing and ICT

    CERN Document Server

    Panel, BCS Education and Training Expert; Burkhardt, Diana; Cumming, Aline; Hunter, Alan; Hurvid, Frank; Jaworski, John; Ng, Thomas; Scheer, Marianne; Southall, John; Vella, Alfred

    2008-01-01

    A glossary of computing designed to support those taking computer courses or courses where computers are used, including GCSE, A-Level, ECDL and 14-19 Diplomas in Functional Skills, in schools and Further Education colleges. It helps the reader build up knowledge and understanding of computing.

  1. Amorphous Computing

    Science.gov (United States)

    Sussman, Gerald

    2002-03-01

    Digital computers have always been constructed to behave as precise arrangements of reliable parts, and our techniques for organizing computations depend upon this precision and reliability. Two emerging technologies, however, are begnning to undercut these assumptions about constructing and programming computers. These technologies -- microfabrication and bioengineering -- will make it possible to assemble systems composed of myriad information- processing units at almost no cost, provided: 1) that not all the units need to work correctly; and 2) that there is no need to manufacture precise geometrical arrangements or interconnection patterns among them. Microelectronic mechanical components are becoming so inexpensive to manufacture that we can anticipate combining logic circuits, microsensors, actuators, and communications devices integrated on the same chip to produce particles that could be mixed with bulk materials, such as paints, gels, and concrete. Imagine coating bridges or buildings with smart paint that can sense and report on traffic and wind loads and monitor structural integrity of the bridge. A smart paint coating on a wall could sense vibrations, monitor the premises for intruders, or cancel noise. Even more striking, there has been such astounding progress in understanding the biochemical mechanisms in individual cells, that it appears we'll be able to harness these mechanisms to construct digital- logic circuits. Imagine a discipline of cellular engineering that could tailor-make biological cells that function as sensors and actuators, as programmable delivery vehicles for pharmaceuticals, as chemical factories for the assembly of nanoscale structures. Fabricating such systems seem to be within our reach, even if it is not yet within our grasp Fabrication, however, is only part of the story. We can envision producing vast quantities of individual computing elements, whether microfabricated particles, engineered cells, or macromolecular computing

  2. Computers in Science Fiction.

    Science.gov (United States)

    Kurland, Michael

    1984-01-01

    Science fiction writers' perceptions of the "thinking machine" are examined through a review of Baum's Oz books, Heinlein's "Beyond This Horizon," science fiction magazine articles, and works about robots including Asimov's "I, Robot." The future of computers in science fiction is discussed and suggested readings are listed. (MBR)

  3. Computing Battery Lifetime Distributions

    NARCIS (Netherlands)

    Cloth, L.; Haverkort, Boudewijn R.H.M.; Jongerden, M.R.

    The usage of mobile devices like cell phones, navigation systems, or laptop computers, is limited by the lifetime of the included batteries. This lifetime depends naturally on the rate at which energy is consumed, however, it also depends on the usage pattern of the battery. Continuous drawing of a

  4. Copyright and Computer Software.

    Science.gov (United States)

    Haugness, C. A.

    1985-01-01

    Explores some of the difficult areas of copyright protection for computer software including legal and illegal copying; values imparted to students if illegal software copies are used; and teacher and administrator responsibility. A suggested school district policy on software copyright is presented. (MBR)

  5. [Biofeedback computer games].

    Science.gov (United States)

    Dzhafarov, O A; Donskaia, O G; Zubkov, A A

    2007-01-01

    Biofeedback systems for game training are reviewed. The origins, evolution, main principles, and specific features of biofeedback game training are considered. A line of novel biofeedback game systems is described. These game systems can be classified as game screens included into an integrated treating system or as individual computer games based on biological feedback.

  6. Computer/Information Science

    Science.gov (United States)

    Birman, Ken; Roughgarden, Tim; Seltzer, Margo; Spohrer, Jim; Stolterman, Erik; Kearsley, Greg; Koszalka, Tiffany; de Jong, Ton

    2013-01-01

    Scholars representing the field of computer/information science were asked to identify what they considered to be the most exciting and imaginative work currently being done in their field, as well as how that work might change our understanding. The scholars included Ken Birman, Jennifer Rexford, Tim Roughgarden, Margo Seltzer, Jim Spohrer, and…

  7. Science in Computational Sciences

    Directory of Open Access Journals (Sweden)

    Jameson Cerrosen

    2012-12-01

    Full Text Available The existing theory in relation to science presents the physics as an ideal, although many sciences not approach the same, so that the current philosophy of science-Theory of Science- is not much help when it comes to analyze the computer science, an emerging field of knowledge that aims investigation of computers, which are included in the materialization of the ideas that try to structure the knowledge and information about the world. Computer Science is based on logic and mathematics, but both theoretical research methods and experimental follow patterns of classical scientific fields. Modeling and computer simulation, as a method, are specific to the discipline and will be further developed in the near future, not only applied to computers but also to other scientific fields. In this article it is analyze the aspects of science in computer science, is presenting an approach to the definition of science and the scientific method in general and describes the relationships between science, research, development and technology.

  8. A programming approach to computability

    CERN Document Server

    Kfoury, A J; Arbib, Michael A

    1982-01-01

    Computability theory is at the heart of theoretical computer science. Yet, ironically, many of its basic results were discovered by mathematical logicians prior to the development of the first stored-program computer. As a result, many texts on computability theory strike today's computer science students as far removed from their concerns. To remedy this, we base our approach to computability on the language of while-programs, a lean subset of PASCAL, and postpone consideration of such classic models as Turing machines, string-rewriting systems, and p. -recursive functions till the final chapter. Moreover, we balance the presentation of un solvability results such as the unsolvability of the Halting Problem with a presentation of the positive results of modern programming methodology, including the use of proof rules, and the denotational semantics of programs. Computer science seeks to provide a scientific basis for the study of information processing, the solution of problems by algorithms, and the design ...

  9. NASA's computer science research program

    Science.gov (United States)

    Larsen, R. L.

    1983-01-01

    Following a major assessment of NASA's computing technology needs, a new program of computer science research has been initiated by the Agency. The program includes work in concurrent processing, management of large scale scientific databases, software engineering, reliable computing, and artificial intelligence. The program is driven by applications requirements in computational fluid dynamics, image processing, sensor data management, real-time mission control and autonomous systems. It consists of university research, in-house NASA research, and NASA's Research Institute for Advanced Computer Science (RIACS) and Institute for Computer Applications in Science and Engineering (ICASE). The overall goal is to provide the technical foundation within NASA to exploit advancing computing technology in aerospace applications.

  10. Visualizing a silicon quantum computer

    Science.gov (United States)

    Sanders, Barry C.; Hollenberg, Lloyd C. L.; Edmundson, Darran; Edmundson, Andrew

    2008-12-01

    Quantum computation is a fast-growing, multi-disciplinary research field. The purpose of a quantum computer is to execute quantum algorithms that efficiently solve computational problems intractable within the existing paradigm of 'classical' computing built on bits and Boolean gates. While collaboration between computer scientists, physicists, chemists, engineers, mathematicians and others is essential to the project's success, traditional disciplinary boundaries can hinder progress and make communicating the aims of quantum computing and future technologies difficult. We have developed a four minute animation as a tool for representing, understanding and communicating a silicon-based solid-state quantum computer to a variety of audiences, either as a stand-alone animation to be used by expert presenters or embedded into a longer movie as short animated sequences. The paper includes a generally applicable recipe for successful scientific animation production.

  11. Computational Electromagnetics

    CERN Document Server

    Rylander, Thomas; Bondeson, Anders

    2013-01-01

    Computational Electromagnetics is a young and growing discipline, expanding as a result of the steadily increasing demand for software for the design and analysis of electrical devices. This book introduces three of the most popular numerical methods for simulating electromagnetic fields: the finite difference method, the finite element method and the method of moments. In particular it focuses on how these methods are used to obtain valid approximations to the solutions of Maxwell's equations, using, for example, "staggered grids" and "edge elements." The main goal of the book is to make the reader aware of different sources of errors in numerical computations, and also to provide the tools for assessing the accuracy of numerical methods and their solutions. To reach this goal, convergence analysis, extrapolation, von Neumann stability analysis, and dispersion analysis are introduced and used frequently throughout the book. Another major goal of the book is to provide students with enough practical understan...

  12. Spatial Computation

    Science.gov (United States)

    2003-12-01

    2001), Las Vegas, June 2001. [BRM+99] Jonathan Babb, Martin Rinard, Csaba Andras Moritz, Walter Lee, Matthew Frank Rajeev Barua, and Saman...Springer Verlag. [CA88] David E. Culler and Arvind. Resource requirements of dataflow programs. In International Symposium on Computer Architecture...Rajeev Barua, Matthew Frank, Devabhaktuni Srikrishna, Jonathan Babb, Vivek Sarkar, and Saman Amarasinghe. Space-time scheduling of instruction-level

  13. Computational Introspection.

    Science.gov (United States)

    1983-02-01

    to a Theory of Formal Reasoning, by Richard Weyhrauch [Weyhrauch, 1978]; A Model for Deliberation, Action and Introspection, by Jon Doyle [Doyle...program’s progress through a "𔄁 task domain was in [Sussman & Stallman , 1975]. In this system, whenever an assumption was made, the supporting facts...Sussman, G. and Stallman , R. (1975) "Heuristic Techniques in Computer-Aided Circuit Analysis," IEEE Transactions on Circuits and Systems, CAS-22, 857

  14. Computer Game

    Science.gov (United States)

    1992-01-01

    Using NASA studies of advanced lunar exploration and colonization, KDT Industries, Inc. and Wesson International have developed MOONBASE, a computer game. The player, or team commander, must build and operate a lunar base using NASA technology. He has 10 years to explore the surface, select a site and assemble structures brought from Earth into an efficient base. The game was introduced in 1991 by Texas Space Grant Consortium.

  15. An Integrated Biochemistry Laboratory, Including Molecular Modeling

    Science.gov (United States)

    Hall, Adele J. Wolfson Mona L.; Branham, Thomas R.

    1996-11-01

    ) experience with methods of protein purification; (iii) incorporation of appropriate controls into experiments; (iv) use of basic statistics in data analysis; (v) writing papers and grant proposals in accepted scientific style; (vi) peer review; (vii) oral presentation of results and proposals; and (viii) introduction to molecular modeling. Figure 1 illustrates the modular nature of the lab curriculum. Elements from each of the exercises can be separated and treated as stand-alone exercises, or combined into short or long projects. We have been able to offer the opportunity to use sophisticated molecular modeling in the final module through funding from an NSF-ILI grant. However, many of the benefits of the research proposal can be achieved with other computer programs, or even by literature survey alone. Figure 1.Design of project-based biochemistry laboratory. Modules (projects, or portions of projects) are indicated as boxes. Each of these can be treated independently, or used as part of a larger project. Solid lines indicate some suggested paths from one module to the next. The skills and knowledge required for protein purification and design are developed in three units: (i) an introduction to critical assays needed to monitor degree of purification, including an evaluation of assay parameters; (ii) partial purification by ion-exchange techniques; and (iii) preparation of a grant proposal on protein design by mutagenesis. Brief descriptions of each of these units follow, with experimental details of each project at the end of this paper. Assays for Lysozyme Activity and Protein Concentration (4 weeks) The assays mastered during the first unit are a necessary tool for determining the purity of the enzyme during the second unit on purification by ion exchange. These assays allow an introduction to the concept of specific activity (units of enzyme activity per milligram of total protein) as a measure of purity. In this first sequence, students learn a turbidimetric assay

  16. Computer Spectrometers

    Science.gov (United States)

    Dattani, Nikesh S.

    2017-06-01

    Ideally, the cataloguing of spectroscopic linelists would not demand laborious and expensive experiments. Whatever an experiment might achieve, the same information would be attainable by running a calculation on a computer. Kolos and Wolniewicz were the first to demonstrate that calculations on a computer can outperform even the most sophisticated molecular spectroscopic experiments of the time, when their 1964 calculations of the dissociation energies of H_2 and D_{2} were found to be more than 1 cm^{-1} larger than the best experiments by Gerhard Herzberg, suggesting the experiment violated a strict variational principle. As explained in his Nobel Lecture, it took 5 more years for Herzberg to perform an experiment which caught up to the accuracy of the 1964 calculations. Today, numerical solutions to the Schrödinger equation, supplemented with relativistic and higher-order quantum electrodynamics (QED) corrections can provide ro-vibrational spectra for molecules that we strongly believe to be correct, even in the absence of experimental data. Why do we believe these calculated spectra are correct if we do not have experiments against which to test them? All evidence seen so far suggests that corrections due to gravity or other forces are not needed for a computer simulated QED spectrum of ro-vibrational energy transitions to be correct at the precision of typical spectrometers. Therefore a computer-generated spectrum can be considered to be as good as one coming from a more conventional spectrometer, and this has been shown to be true not just for the H_2 energies back in 1964, but now also for several other molecules. So are we at the stage where we can launch an array of calculations, each with just the atomic number changed in the input file, to reproduce the NIST energy level databases? Not quite. But I will show that for the 6e^- molecule Li_2, we have reproduced the vibrational spacings to within 0.001 cm^{-1} of the experimental spectrum, and I will

  17. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  18. Resource Management in Computing Systems

    OpenAIRE

    Amani, Payam

    2017-01-01

    Resource management is an essential building block of any modern computer and communication network. In this thesis, the results of our research in the following two tracks are summarized in four papers. The first track includes three papers and covers modeling, prediction and control for multi-tier computing systems. In the first paper, a NARX-based multi-step-ahead response time predictor for single server queuing systems is presented which can be applied to CPU-constrained computing system...

  19. Reflections on Behavioural Computer Science

    OpenAIRE

    Johansen, Christian; Pedersen, Tore; Jøsang, Audun

    2016-01-01

    The rapidly increasing pervasiveness and integration of computers in human and animal society calls for a broad discipline under which this development can be studied. We argue that to design and use technology one needs to develop and use models of humans/animals and machines in all their aspects, including cognitive and memory models, but also social influence and (artificial) emotions. We call this discipline Behavioural Computer Science, and propose that behaviour computer science models ...

  20. Article Including Environmental Barrier Coating System

    Science.gov (United States)

    Lee, Kang N. (Inventor)

    2015-01-01

    An enhanced environmental barrier coating for a silicon containing substrate. The enhanced barrier coating may include a bond coat doped with at least one of an alkali metal oxide and an alkali earth metal oxide. The enhanced barrier coating may include a composite mullite bond coat including BSAS and another distinct second phase oxide applied over said surface.

  1. Rare thoracic cancers, including peritoneum mesothelioma

    NARCIS (Netherlands)

    Siesling, Sabine; Zwan, J.M.V.D.; Izarzugaza, I.; Jaal, J.; Treasure, T.; Foschi, R.; Ricardi, U.; Groen, H.; Tavilla, A.; Ardanaz, E.

    2012-01-01

    Rare thoracic cancers include those of the trachea, thymus and mesothelioma (including peritoneum mesothelioma). The aim of this study was to describe the incidence, prevalence and survival of rare thoracic tumours using a large database, which includes cancer patients diagnosed from 1978 to 2002,

  2. Rare thoracic cancers, including peritoneum mesothelioma

    NARCIS (Netherlands)

    Siesling, Sabine; van der Zwan, Jan Maarten; Izarzugaza, Isabel; Jaal, Jana; Treasure, Tom; Foschi, Roberto; Ricardi, Umberto; Groen, Harry; Tavilla, Andrea; Ardanaz, Eva

    Rare thoracic cancers include those of the trachea, thymus and mesothelioma (including peritoneum mesothelioma). The aim of this study was to describe the incidence, prevalence and survival of rare thoracic tumours using a large database, which includes cancer patients diagnosed from 1978 to 2002,

  3. Static, Lightweight Includes Resolution for PHP

    NARCIS (Netherlands)

    M.A. Hills (Mark); P. Klint (Paul); J.J. Vinju (Jurgen)

    2014-01-01

    htmlabstractDynamic languages include a number of features that are challenging to model properly in static analysis tools. In PHP, one of these features is the include expression, where an arbitrary expression provides the path of the file to include at runtime. In this paper we present two

  4. Computers, Teaching, and Learning: An Introduction to Computers in Education.

    Science.gov (United States)

    Willis, Jerry W.; And Others

    Intended as an action guide, this book focuses on the issues, concepts, and facts relevant to the educator who wants to consider using computers to accomplish learning objectives. A short history of computers emphasizing microcomputers and their use in education is followed by a discussion of current educational uses which includes a more detailed…

  5. Gender Issues and Computers: College Computer Science Education in Taiwan

    Science.gov (United States)

    Fan, Tai-Sheng; Li, Yi-Ching

    2005-01-01

    This study investigated gender differences for college computer science majors in Taiwan. Subjects were college students enrolled in five universities offering computer science programs. A total of 940 valid questionnaires were collected, including 796 males (85%) and 144 females (15%). Significant gender differences were not found for most of the…

  6. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    Science.gov (United States)

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  7. 75 FR 4583 - In the Matter of: Certain Electronic Devices, Including Mobile Phones, Portable Music Players...

    Science.gov (United States)

    2010-01-28

    ... COMMISSION In the Matter of: Certain Electronic Devices, Including Mobile Phones, Portable Music Players, and... electronic devices, including mobile phones, portable music players, and computers, by reason of infringement... mobile phones, portable music players, or computers that infringe one or more of claims 1-12 of U.S...

  8. Computational Elastic Knots

    KAUST Repository

    Zhao, Xin

    2013-05-01

    Elastic rods have been studied intensively since the 18th century. Even now the theory of elastic rods is still developing and enjoying popularity in computer graphics and physical-based simulation. Elastic rods also draw attention from architects. Architectural structures, NODUS, were constructed by elastic rods as a new method of form-finding. We study discrete models of elastic rods and NODUS structures. We also develop computational tools to find the equilibria of elastic rods and the shape of NODUS. Applications of elastic rods in forming torus knot and closing Bishop frame are included in this thesis.

  9. Computers and conversation

    CERN Document Server

    Luff, Paul; Gilbert, Nigel G

    1986-01-01

    In the past few years a branch of sociology, conversation analysis, has begun to have a significant impact on the design of human*b1computer interaction (HCI). The investigation of human*b1human dialogue has emerged as a fruitful foundation for interactive system design.****This book includes eleven original chapters by leading researchers who are applying conversation analysis to HCI. The fundamentals of conversation analysis are outlined, a number of systems are described, and a critical view of their value for HCI is offered.****Computers and Conversation will be of interest to all concerne

  10. Simply computing for seniors

    CERN Document Server

    Clark, Linda

    2011-01-01

    Step-by-step instructions for seniors to get up and running on a home PC Answering the call for an up-to-date, straightforward computer guide targeted specifically for seniors, this helpful book includes easy-to-follow tutorials that escort you through the basics and shows you how to get the most out of your PC. Boasting an elegant, full-color interior with a clean, sophisticated look and feel, the layout makes it easy for you to find the information you need quickly. Author Linda Clark has earned her highly respected reputation through years of teaching computers at both the beginnin

  11. The computer graphics interface

    CERN Document Server

    Steinbrugge Chauveau, Karla; Niles Reed, Theodore; Shepherd, B

    2014-01-01

    The Computer Graphics Interface provides a concise discussion of computer graphics interface (CGI) standards. The title is comprised of seven chapters that cover the concepts of the CGI standard. Figures and examples are also included. The first chapter provides a general overview of CGI; this chapter covers graphics standards, functional specifications, and syntactic interfaces. Next, the book discusses the basic concepts of CGI, such as inquiry, profiles, and registration. The third chapter covers the CGI concepts and functions, while the fourth chapter deals with the concept of graphic obje

  12. Lighting at computer workstations.

    Science.gov (United States)

    Osterhaus, Werner; Hemphälä, Hillevi; Nylén, Per

    2015-01-01

    The visual conditions for computer work are complex and include several factors that need to be well controlled. These factors include the lighting system, the design of the computer and screen itself, the screens position and orientation within the room, the surface reflectances and colours of the room, and the visualability of the worker. The objective was to review the literature (including standards) on lighting for computer work in an accessible summary. This contribution focuses on lighting for computer work, but the reader is reminded of the fact that lighting continuously interacts with the other factors mentioned above. The combined visual conditions shall enable the worker to see and perform the work task without causing unnecessary strain for the eyes or the other parts of the body. The main lighting-related factors in the visual environment to evaluate are: illuminance, luminance, direction of light, glare, correlated colour temperature of the light source (CCT), colour rendering of the light source, and the non-visual effects (such as non-visual flicker). A visual ergonomics checklist is presented as a guide to analyse the visual environment.

  13. HETC-3STEP included fragmentation process

    Energy Technology Data Exchange (ETDEWEB)

    Shigyo, Nobuhiro; Iga, Kiminori; Ishibashi, Kenji [Kyushu Univ., Fukuoka (Japan). Faculty of Engineering

    1997-03-01

    High Energy Transport Code (HETC) based on the cascade-evaporation model is modified to calculate the fragmentation cross section. For the cascade process, nucleon-nucleon cross sections are used for collision computation; effective in-medium-corrected cross sections are adopted instead of the original free-nucleon collision. The exciton model is adopted for improvement of backward nucleon-emission cross section for low-energy nucleon-incident events. The fragmentation reaction is incorporated into the original HETC as a subroutine set by the use of the systematics of the reaction. The modified HETC (HETC-3STEP/FRG) reproduces experimental fragment yields to a reasonable degree. (author)

  14. Link failure detection in a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Blocksome, Michael A.; Megerian, Mark G.; Smith, Brian E.

    2010-11-09

    Methods, apparatus, and products are disclosed for link failure detection in a parallel computer including compute nodes connected in a rectangular mesh network, each pair of adjacent compute nodes in the rectangular mesh network connected together using a pair of links, that includes: assigning each compute node to either a first group or a second group such that adjacent compute nodes in the rectangular mesh network are assigned to different groups; sending, by each of the compute nodes assigned to the first group, a first test message to each adjacent compute node assigned to the second group; determining, by each of the compute nodes assigned to the second group, whether the first test message was received from each adjacent compute node assigned to the first group; and notifying a user, by each of the compute nodes assigned to the second group, whether the first test message was received.

  15. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  16. Multiparty Computations

    DEFF Research Database (Denmark)

    Dziembowski, Stefan

    papers [1,2]. In [1] we assume that the adversary can corrupt any set from a given adversary structure. In this setting we study a problem of doing efficient VSS and MPC given an access to a secret sharing scheme (SS). For all adversary structures where VSS is possible at all, we show that, up...... here and discuss other problems caused by the adaptiveness. All protocols in the thesis are formally specified and the proofs of their security are given. [1]Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, and Tal Rabin. Efficient multiparty computations with dishonest minority...

  17. Computer vision

    Science.gov (United States)

    Gennery, D.; Cunningham, R.; Saund, E.; High, J.; Ruoff, C.

    1981-01-01

    The field of computer vision is surveyed and assessed, key research issues are identified, and possibilities for a future vision system are discussed. The problems of descriptions of two and three dimensional worlds are discussed. The representation of such features as texture, edges, curves, and corners are detailed. Recognition methods are described in which cross correlation coefficients are maximized or numerical values for a set of features are measured. Object tracking is discussed in terms of the robust matching algorithms that must be devised. Stereo vision, camera control and calibration, and the hardware and systems architecture are discussed.

  18. Cloud Computing

    Science.gov (United States)

    2010-04-29

    campaigning to make it true. Richard   Stallman , founder of the GNU project and the Free  Software Foundation, quoted in The Guardian, September 29,  2008... Richard   Stallman , known for his advocacy of “free software”, thinks cloud computing is  a trap for users—if applications and data are managed “in the cloud

  19. Computational Finance

    DEFF Research Database (Denmark)

    Rasmussen, Lykke

    One of the major challenges in todays post-crisis finance environment is calculating the sensitivities of complex products for hedging and risk management. Historically, these derivatives have been determined using bump-and-revalue, but due to the increasing magnitude of these computations does...... this get increasingly dicult on available hardware. In this paper three alternative methods for evaluating derivatives are compared: the complex-step derivative approximation, the algorithmic forward mode and the algorithmic backward mode. These are applied to the price of the Credit Value Adjustment...

  20. Advanced computing in electron microscopy

    CERN Document Server

    Kirkland, Earl J

    2010-01-01

    This book features numerical computation of electron microscopy images as well as multislice methods High resolution CTEM and STEM image interpretation are included in the text This newly updated second edition will bring the reader up to date on new developments in the field since the 1990's The only book that specifically addresses computer simulation methods in electron microscopy

  1. Computational intelligence in medical informatics

    CERN Document Server

    Gunjan, Vinit

    2015-01-01

    This Brief highlights Informatics and related techniques to Computer Science Professionals, Engineers, Medical Doctors, Bioinformatics researchers and other interdisciplinary researchers. Chapters include the Bioinformatics of Diabetes and several computational algorithms and statistical analysis approach to effectively study the disorders and possible causes along with medical applications.

  2. Know your Personal Computer -48 ...

    Indian Academy of Sciences (India)

    SERIES I ARTICLE. Know your Personal Computer. 8. Basic Input - Output System (BIOS). Siddhartha Kumar. Ghoshal works with whatever goes on inside parallel computers. That includes hardware, system software, algorithms and appll~tions. From his early childhood he has designed and built electronic gadgets. One of.

  3. End-User Statistical Computing.

    Science.gov (United States)

    Crain, C. Ray

    End-user statistical computing is one way to improve the productivity of researchers; it does so by providing them with a statistical computing environment and with guidance on its appropriate use. Critical success factors include: (1) ease of use; (2) software correctness and robustness; (3) compatibility with system resources; (4) training and…

  4. Individual Differences, Computers, and Instruction.

    Science.gov (United States)

    Ayersman, David J.; Minden, Avril von

    1995-01-01

    Provides a conceptual foundation for the development of hypermedia as an instructional tool for addressing individual differences in learning styles. Highlights include a literature review; computers and instruction; individual differences, computers, and instruction; cognitive controls; cognitive styles and learning; personality types; and future…

  5. Computations in DEA

    Directory of Open Access Journals (Sweden)

    Dulá José H.

    2002-01-01

    Full Text Available DEA is a well-established, widely used, and powerful analytical resource in the toolbox of the OR/MS analyst. It is used to assess relative efficiency of many, functionally similar, entities. It has applications in diverse areas including finance and banking, education, and healthcare. DEA is computationally intensive and, as the scale of applications grows, this intensity rapidly becomes one of the limiting factors in its utility. In this paper, we explore computations in DEA. We investigate the theory behind schemes, procedures and algorithms used in performing a DEA study and we report on current practices ranging from the basic and standard to the advanced and sophisticated. Our objective is to give researchers and practitioners an appreciation for the computational aspects of DEA that will permit them to understand the performance, problems, complications, limitations, as well as the potential of this technique.

  6. Workshop on Computational Optimization

    CERN Document Server

    2015-01-01

    Our everyday life is unthinkable without optimization. We try to minimize our effort and to maximize the achieved profit. Many real world and industrial problems arising in engineering, economics, medicine and other domains can be formulated as optimization tasks. This volume is a comprehensive collection of extended contributions from the Workshop on Computational Optimization 2013. It presents recent advances in computational optimization. The volume includes important real life problems like parameter settings for controlling processes in bioreactor, resource constrained project scheduling, problems arising in transport services, error correcting codes, optimal system performance and energy consumption and so on. It shows how to develop algorithms for them based on new metaheuristic methods like evolutionary computation, ant colony optimization, constrain programming and others.

  7. Computational problems in engineering

    CERN Document Server

    Mladenov, Valeri

    2014-01-01

    This book provides readers with modern computational techniques for solving variety of problems from electrical, mechanical, civil and chemical engineering. Mathematical methods are presented in a unified manner, so they can be applied consistently to problems in applied electromagnetics, strength of materials, fluid mechanics, heat and mass transfer, environmental engineering, biomedical engineering, signal processing, automatic control and more.   • Features contributions from distinguished researchers on significant aspects of current numerical methods and computational mathematics; • Presents actual results and innovative methods that provide numerical solutions, while minimizing computing times; • Includes new and advanced methods and modern variations of known techniques that can solve difficult scientific problems efficiently.  

  8. Applied computational physics

    CERN Document Server

    Boudreau, Joseph F; Bianchi, Riccardo Maria

    2018-01-01

    Applied Computational Physics is a graduate-level text stressing three essential elements: advanced programming techniques, numerical analysis, and physics. The goal of the text is to provide students with essential computational skills that they will need in their careers, and to increase the confidence with which they write computer programs designed for their problem domain. The physics problems give them an opportunity to reinforce their programming skills, while the acquired programming skills augment their ability to solve physics problems. The C++ language is used throughout the text. Physics problems include Hamiltonian systems, chaotic systems, percolation, critical phenomena, few-body and multi-body quantum systems, quantum field theory, simulation of radiation transport, and data modeling. The book, the fruit of a collaboration between a theoretical physicist and an experimental physicist, covers a broad range of topics from both viewpoints. Examples, program libraries, and additional documentatio...

  9. Project plan for computing

    CERN Document Server

    Harvey, J

    1998-01-01

    The LHCB Computing Project covers both on- and off-line activities. Nine sub-projects are identified, six of which correspond to specific applications, such as Reconstruction, DAQ etc., one takes charge of developing components that can be classed as of common interest to the various applications, and two which take responsibility for supporting the software development environment and computing infrastructure respectively. A Steering Group, comprising the convenors of the nine subprojects and the overall Computing Co-ordinator, is responsible for project management and planning. The planning assumes four life-cycle phases; preparation, implementation, commissioning and operation. A global planning chart showing the timescales of each phase is included. A more detailed chart for the planning of the introduction of Object Technologies is also described. Manpower requirements are given for each sub-project in terms of task description and FTEs needed. The evolution of these requirements with time is also given....

  10. Mastering cloud computing foundations and applications programming

    CERN Document Server

    Buyya, Rajkumar; Selvi, SThamarai

    2013-01-01

    Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won't live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifical

  11. The Role of Grid Computing Technologies in Cloud Computing

    Science.gov (United States)

    Villegas, David; Rodero, Ivan; Fong, Liana; Bobroff, Norman; Liu, Yanbin; Parashar, Manish; Sadjadi, S. Masoud

    The fields of Grid, Utility and Cloud Computing have a set of common objectives in harnessing shared resources to optimally meet a great variety of demands cost-effectively and in a timely manner Since Grid Computing started its technological journey about a decade earlier than Cloud Computing, the Cloud can benefit from the technologies and experience of the Grid in building an infrastructure for distributed computing. Our comparison of Grid and Cloud starts with their basic characteristics and interaction models with clients, resource consumers and providers. Then the similarities and differences in architectural layers and key usage patterns are examined. This is followed by an in depth look at the technologies and best practices that have applicability from Grid to Cloud computing, including scheduling, service orientation, security, data management, monitoring, interoperability, simulation and autonomic support. Finally, we offer insights on how these techniques will help solve the current challenges faced by Cloud computing.

  12. Computational crystallization.

    Science.gov (United States)

    Altan, Irem; Charbonneau, Patrick; Snell, Edward H

    2016-07-15

    Crystallization is a key step in macromolecular structure determination by crystallography. While a robust theoretical treatment of the process is available, due to the complexity of the system, the experimental process is still largely one of trial and error. In this article, efforts in the field are discussed together with a theoretical underpinning using a solubility phase diagram. Prior knowledge has been used to develop tools that computationally predict the crystallization outcome and define mutational approaches that enhance the likelihood of crystallization. For the most part these tools are based on binary outcomes (crystal or no crystal), and the full information contained in an assembly of crystallization screening experiments is lost. The potential of this additional information is illustrated by examples where new biological knowledge can be obtained and where a target can be sub-categorized to predict which class of reagents provides the crystallization driving force. Computational analysis of crystallization requires complete and correctly formatted data. While massive crystallization screening efforts are under way, the data available from many of these studies are sparse. The potential for this data and the steps needed to realize this potential are discussed. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Tools for computational finance

    CERN Document Server

    Seydel, Rüdiger U

    2017-01-01

    Computational and numerical methods are used in a number of ways across the field of finance. It is the aim of this book to explain how such methods work in financial engineering. By concentrating on the field of option pricing, a core task of financial engineering and risk analysis, this book explores a wide range of computational tools in a coherent and focused manner and will be of use to anyone working in computational finance. Starting with an introductory chapter that presents the financial and stochastic background, the book goes on to detail computational methods using both stochastic and deterministic approaches. Now in its sixth edition, Tools for Computational Finance has been significantly revised and contains:    Several new parts such as a section on extended applications of tree methods, including multidimensional trees, trinomial trees, and the handling of dividends; Additional material in the field of generating normal variates with acceptance-rejection methods, and on Monte Carlo methods...

  14. Computer Registration Becoming Mandatory

    CERN Multimedia

    2003-01-01

    Following the decision by the CERN Management Board (see Weekly Bulletin 38/2003), registration of all computers connected to CERN's network will be enforced and only registered computers will be allowed network access. The implementation has started with the IT buildings, continues with building 40 and the Prevessin site (as of Tuesday 4th November 2003), and will cover the whole of CERN before the end of this year. We therefore recommend strongly that you register all your computers in CERN's network database including all network access cards (Ethernet AND wireless) as soon as possible without waiting for the access restriction to take force. This will allow you accessing the network without interruption and help IT service providers to contact you in case of problems (e.g. security problems, viruses, etc.) Users WITH a CERN computing account register at: http://cern.ch/register/ (CERN Intranet page) Visitors WITHOUT a CERN computing account (e.g. short term visitors) register at: http://cern.ch/regis...

  15. An introduction to digital computing

    CERN Document Server

    George, F H

    2014-01-01

    An Introduction to Digital Computing provides information pertinent to the fundamental aspects of digital computing. This book represents a major step towards the universal availability of programmed material.Organized into four chapters, this book begins with an overview of the fundamental workings of the computer, including the way it handles simple arithmetic problems. This text then provides a brief survey of the basic features of a typical computer that is divided into three sections, namely, the input and output system, the memory system for data storage, and a processing system. Other c

  16. Performing an allreduce operation on a plurality of compute nodes of a parallel computer

    Science.gov (United States)

    Faraj, Ahmad [Rochester, MN

    2012-04-17

    Methods, apparatus, and products are disclosed for performing an allreduce operation on a plurality of compute nodes of a parallel computer. Each compute node includes at least two processing cores. Each processing core has contribution data for the allreduce operation. Performing an allreduce operation on a plurality of compute nodes of a parallel computer includes: establishing one or more logical rings among the compute nodes, each logical ring including at least one processing core from each compute node; performing, for each logical ring, a global allreduce operation using the contribution data for the processing cores included in that logical ring, yielding a global allreduce result for each processing core included in that logical ring; and performing, for each compute node, a local allreduce operation using the global allreduce results for each processing core on that compute node.

  17. An efficient method for computing the time domain response of a floating ice block including hydrodynamics

    NARCIS (Netherlands)

    Keijdener, C.; Metrikine, A.

    2015-01-01

    When studying the dynamics of ice-structure interaction, hydrodynamic effects are often ignored to simplify the model. One of the challenges associated with the introduction of the hydrodynamic forces is that those introduce frequency dependent added mass and damping into the system. In order to

  18. 78 FR 63492 - Certain Electronic Devices, Including Mobile Phones and Tablet Computers, and Components Thereof...

    Science.gov (United States)

    2013-10-24

    ....gov , and will be available for inspection during official business hours (8:45 a.m. to 5:15 p.m.) in... if the Commission finds a violation it shall exclude the articles concerned from the United States... conditions in the United States economy, the production of like or directly competitive articles in the...

  19. Areal rainfall estimation using moving cars - computer experiments including hydrological modeling

    OpenAIRE

    Rabiei, Ehsan; Haberlandt, Uwe; Sester, Monika; Fitzner, Daniel; Wallner, Markus

    2016-01-01

    The need for high temporal and spatial resolution precipitation data for hydrological analyses has been discussed in several studies. Although rain gauges provide valuable information, a very dense rain gauge network is costly. As a result, several new ideas have been emerged to help estimating areal rainfall with higher temporal and spatial resolution. Rabiei et al. (2013) observed that moving cars, called RainCars (RCs), can potentially be a new source of data for measuring rainfall amounts...

  20. Areal rainfall estimation using moving cars – computer experiments including hydrological modeling

    OpenAIRE

    Rabiei, Ehsan; Haberlandt, Uwe; Sester, Monika; Fitzner, Daniel; Wallner, Markus

    2016-01-01

    The need for high temporal and spatial resolution precipitation data for hydrological analyses has been discussed in several studies. Although rain gauges provide valuable information, a very dense rain gauge network is costly. As a result, several new ideas have emerged to help estimating areal rainfall with higher temporal and spatial resolution. Rabiei et al. (2013) observed that moving cars, called RainCars (RCs), can potentially be a new source of data for measuring rai...

  1. Computer vision for an autonomous mobile robot

    CSIR Research Space (South Africa)

    Withey, Daniel J

    2015-10-01

    Full Text Available Computer vision systems are essential for practical, autonomous, mobile robots – machines that employ artificial intelligence and control their own motion within an environment. As with biological systems, computer vision systems include the vision...

  2. Computer controlled evaluation of binary images

    NARCIS (Netherlands)

    Schouten, Th.E.; van den Broek, Egon

    2010-01-01

    The present invention relates to computer controlled image processing and, in particular, to computer controlled evaluation of two dimensional, 2D, and three dimensional, 3D, binary images including sequences of images using a distance map.

  3. Computer Graphics for Multimedia and Hypermedia Development.

    Science.gov (United States)

    Mohler, James L.

    1998-01-01

    Discusses several theoretical and technical aspects of computer-graphics development that are useful for creating hypermedia and multimedia materials. Topics addressed include primary bitmap attributes in computer graphics, the jigsaw principle, and raster layering. (MSE)

  4. 7th International Workshop on Natural Computing

    CERN Document Server

    Hagiya, Masami

    2015-01-01

    This book highlights recent advances in natural computing, including biology and its theory, bio-inspired computing, computational aesthetics, computational models and theories, computing with natural media, philosophy of natural computing and educational technology. It presents extended versions of the best papers selected from the symposium “7th International Workshop on Natural Computing” (IWNC7), held in Tokyo, Japan, in 2013. The target audience is not limited to researchers working in natural computing but also those active in biological engineering, fine/media art design, aesthetics and philosophy.

  5. Human-computer interaction in multitask situations

    Science.gov (United States)

    Rouse, W. B.

    1977-01-01

    Human-computer interaction in multitask decisionmaking situations is considered, and it is proposed that humans and computers have overlapping responsibilities. Queueing theory is employed to model this dynamic approach to the allocation of responsibility between human and computer. Results of simulation experiments are used to illustrate the effects of several system variables including number of tasks, mean time between arrivals of action-evoking events, human-computer speed mismatch, probability of computer error, probability of human error, and the level of feedback between human and computer. Current experimental efforts are discussed and the practical issues involved in designing human-computer systems for multitask situations are considered.

  6. Numerical Acoustic Models Including Viscous and Thermal losses: Review of Existing and New Methods

    DEFF Research Database (Denmark)

    Andersen, Peter Risby; Cutanda Henriquez, Vicente; Aage, Niels

    2017-01-01

    This work presents an updated overview of numerical methods including acoustic viscous and thermal losses. Numerical modelling of viscothermal losses has gradually become more important due to the general trend of making acoustic devices smaller. Not including viscothermal acoustic losses...... in such numerical computations will therefore lead to inaccurate or even wrong results. Both, Finite Element Method (FEM) and Boundary Element Method (BEM), formulations are available that incorporate these loss mechanisms. Including viscothermal losses in FEM computations can be computationally very demanding, due...... and BEM method including viscothermal dissipation are compared and investigated....

  7. Syllabus Computer in Astronomy

    Science.gov (United States)

    Hojaev, Alisher S.

    2015-08-01

    One of the most important and actual subjects and training courses in the curricula for undergraduate level students at the National university of Uzbekistan is ‘Computer Methods in Astronomy’. It covers two semesters and includes both lecture and practice classes. Based on the long term experience we prepared the tutorial for students which contain the description of modern computer applications in astronomy.The main directions of computer application in field of astronomy briefly as follows:1) Automating the process of observation, data acquisition and processing2) Create and store databases (the results of observations, experiments and theoretical calculations) their generalization, classification and cataloging, working with large databases3) The decisions of the theoretical problems (physical modeling, mathematical modeling of astronomical objects and phenomena, derivation of model parameters to obtain a solution of the corresponding equations, numerical simulations), appropriate software creation4) The utilization in the educational process (e-text books, presentations, virtual labs, remote education, testing), amateur astronomy and popularization of the science5) The use as a means of communication and data transfer, research result presenting and dissemination (web-journals), the creation of a virtual information system (local and global computer networks).During the classes the special attention is drawn on the practical training and individual work of students including the independent one.

  8. Elliptic curves a computational approach

    CERN Document Server

    Schmitt, Susanne; Pethö, Attila

    2003-01-01

    The basics of the theory of elliptic curves should be known to everybody, be he (or she) a mathematician or a computer scientist. Especially everybody concerned with cryptography should know the elements of this theory. The purpose of the present textbook is to give an elementary introduction to elliptic curves. Since this branch of number theory is particularly accessible to computer-assisted calculations, the authors make use of it by approaching the theory under a computational point of view. Specifically, the computer-algebra package SIMATH can be applied on several occasions. However, the book can be read also by those not interested in any computations. Of course, the theory of elliptic curves is very comprehensive and becomes correspondingly sophisticated. That is why the authors made a choice of the topics treated. Topics covered include the determination of torsion groups, computations regarding the Mordell-Weil group, height calculations, S-integral points. The contents is kept as elementary as poss...

  9. Research on cloud computing solutions

    Directory of Open Access Journals (Sweden)

    Liudvikas Kaklauskas

    2015-07-01

    Full Text Available Cloud computing can be defined as a new style of computing in which dynamically scala-ble and often virtualized resources are provided as a services over the Internet. Advantages of the cloud computing technology include cost savings, high availability, and easy scalability. Voas and Zhang adapted six phases of computing paradigms, from dummy termi-nals/mainframes, to PCs, networking computing, to grid and cloud computing. There are four types of cloud computing: public cloud, private cloud, hybrid cloud and community. The most common and well-known deployment model is Public Cloud. A Private Cloud is suited for sensitive data, where the customer is dependent on a certain degree of security.According to the different types of services offered, cloud computing can be considered to consist of three layers (services models: IaaS (infrastructure as a service, PaaS (platform as a service, SaaS (software as a service. Main cloud computing solutions: web applications, data hosting, virtualization, database clusters and terminal services. The advantage of cloud com-puting is the ability to virtualize and share resources among different applications with the objective for better server utilization and without a clustering solution, a service may fail at the moment the server crashes.DOI: 10.15181/csat.v2i2.914

  10. Computational neuroscience

    CERN Document Server

    Blackwell, Kim L

    2014-01-01

    Progress in Molecular Biology and Translational Science provides a forum for discussion of new discoveries, approaches, and ideas in molecular biology. It contains contributions from leaders in their fields and abundant references. This volume brings together different aspects of, and approaches to, molecular and multi-scale modeling, with applications to a diverse range of neurological diseases. Mathematical and computational modeling offers a powerful approach for examining the interaction between molecular pathways and ionic channels in producing neuron electrical activity. It is well accepted that non-linear interactions among diverse ionic channels can produce unexpected neuron behavior and hinder a deep understanding of how ion channel mutations bring about abnormal behavior and disease. Interactions with the diverse signaling pathways activated by G protein coupled receptors or calcium influx adds an additional level of complexity. Modeling is an approach to integrate myriad data sources into a cohesiv...

  11. Social Computing

    CERN Multimedia

    CERN. Geneva

    2011-01-01

    The past decade has witnessed a momentous transformation in the way people interact with each other. Content is now co-produced, shared, classified, and rated by millions of people, while attention has become the ephemeral and valuable resource that everyone seeks to acquire. This talk will describe how social attention determines the production and consumption of content within both the scientific community and social media, how its dynamics can be used to predict the future and the role that social media plays in setting the public agenda. About the speaker Bernardo Huberman is a Senior HP Fellow and Director of the Social Computing Lab at Hewlett Packard Laboratories. He received his Ph.D. in Physics from the University of Pennsylvania, and is currently a Consulting Professor in the Department of Applied Physics at Stanford University. He originally worked in condensed matter physics, ranging from superionic conductors to two-dimensional superfluids, and made contributions to the theory of critical p...

  12. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  13. Computer Science Research at Langley

    Science.gov (United States)

    Voigt, S. J. (Editor)

    1982-01-01

    A workshop was held at Langley Research Center, November 2-5, 1981, to highlight ongoing computer science research at Langley and to identify additional areas of research based upon the computer user requirements. A panel discussion was held in each of nine application areas, and these are summarized in the proceedings. Slides presented by the invited speakers are also included. A survey of scientific, business, data reduction, and microprocessor computer users helped identify areas of focus for the workshop. Several areas of computer science which are of most concern to the Langley computer users were identified during the workshop discussions. These include graphics, distributed processing, programmer support systems and tools, database management, and numerical methods.

  14. ELEMENTS OF COMPUTER MATHEMATICS,

    Science.gov (United States)

    MATHEMATICS , COMPUTERS), (*COMPUTERS, MATHEMATICS ), (*NUMERICAL ANALYSIS, COMPUTERS), TABLES(DATA), FUNCTIONS( MATHEMATICS ), EQUATIONS, INTEGRALS, DIFFERENTIAL EQUATIONS, POLYNOMIALS, LEAST SQUARES METHOD, HARMONIC ANALYSIS, USSR

  15. Lung Disease Including Asthma and Adult Vaccination

    Science.gov (United States)

    ... Diseases Resources Lung Disease including Asthma and Adult Vaccination Language: English (US) Español (Spanish) Recommend on Facebook ... more about health insurance options. Learn about adult vaccination and other health conditions Asplenia Diabetes Heart Disease, ...

  16. Births and deaths including fetal deaths

    Data.gov (United States)

    U.S. Department of Health & Human Services — Access to a variety of United States birth and death files including fetal deaths: Birth Files, 1968-2009; 1995-2005; Fetal death file, 1982-2005; Mortality files,...

  17. Including Indigenous Minorities in Decision-Making

    DEFF Research Database (Denmark)

    Pristed Nielsen, Helene

    Based on theories of public sphere participation and deliberative democracy, this book presents empirical results from a study of experiences with including Aboriginal and Maori groups in political decision-making in respectively Western Australia and New Zealand......Based on theories of public sphere participation and deliberative democracy, this book presents empirical results from a study of experiences with including Aboriginal and Maori groups in political decision-making in respectively Western Australia and New Zealand...

  18. Computer loss experience and predictions

    Science.gov (United States)

    Parker, Donn B.

    1996-03-01

    The types of losses organizations must anticipate have become more difficult to predict because of the eclectic nature of computers and the data communications and the decrease in news media reporting of computer-related losses as they become commonplace. Total business crime is conjectured to be decreasing in frequency and increasing in loss per case as a result of increasing computer use. Computer crimes are probably increasing, however, as their share of the decreasing business crime rate grows. Ultimately all business crime will involve computers in some way, and we could see a decline of both together. The important information security measures in high-loss business crime generally concern controls over authorized people engaged in unauthorized activities. Such controls include authentication of users, analysis of detailed audit records, unannounced audits, segregation of development and production systems and duties, shielding the viewing of screens, and security awareness and motivation controls in high-value transaction areas. Computer crimes that involve highly publicized intriguing computer misuse methods, such as privacy violations, radio frequency emanations eavesdropping, and computer viruses, have been reported in waves that periodically have saturated the news media during the past 20 years. We must be able to anticipate such highly publicized crimes and reduce the impact and embarrassment they cause. On the basis of our most recent experience, I propose nine new types of computer crime to be aware of: computer larceny (theft and burglary of small computers), automated hacking (use of computer programs to intrude), electronic data interchange fraud (business transaction fraud), Trojan bomb extortion and sabotage (code security inserted into others' systems that can be triggered to cause damage), LANarchy (unknown equipment in use), desktop forgery (computerized forgery and counterfeiting of documents), information anarchy (indiscriminate use of

  19. Computer aided surface representation

    Energy Technology Data Exchange (ETDEWEB)

    Barnhill, R E

    1987-11-01

    The aims of this research are the creation of new surface forms and the determination of geometric and physical properties of surfaces. The full sweep from constructive mathematics through the implementation of algorithms and the interactive computer graphics display of surfaces is utilized. Both three-dimensional and multi- dimensional surfaces are considered. Particular emphasis is given to the scientific computing solution of Department of Energy problems. The methods that we have developed and that we are proposing to develop allow applications such as: Producing smooth contour maps from measured data, such as weather maps. Modeling the heat distribution inside a furnace from sample measurements. Terrain modeling based on satellite pictures. The investigation of new surface forms includes the topics of triangular interpolants, multivariate interpolation, surfaces defined on surfaces and monotone and/or convex surfaces. The geometric and physical properties considered include contours, the intersection of surfaces, curvatures as a interrogation tool, and numerical integration.

  20. To include or not to include: The Impact of Gene Filtering on Species Tree Estimation Methods.

    Science.gov (United States)

    Molloy, Erin K; Warnow, Tandy

    2017-09-15

    With the increasing availability of whole genome data, many species trees are being constructed from hundreds to thousands of loci. Although concatenation analysis using maximum likelihood is a standard approach for estimating species trees, it does not account for gene tree heterogeneity, which can occur due to many biological processes, such as incomplete lineage sorting. Coalescent species tree estimation methods, many of which are statistically consistent in the presence of incomplete lineage sorting, include Bayesian methods that co-estimate the gene trees and the species tree, summary methods that compute the species tree by combining estimated gene trees, and site-based methods that infer the species tree from site patterns in the alignments of different loci. Due to concerns that poor quality loci will reduce the accuracy of estimated species trees, many recent phylogenomic studies have removed or filtered genes on the basis of phylogenetic signal and/or missing data prior to inferring species trees; little is known about the performance of species tree estimation methods when gene filtering is performed.We examine how incomplete lineage sorting, phylogenetic signal of individual loci, and missing data affect the absolute and the relative accuracy of species tree estimation methods and show how these properties affect methods' responses to gene filtering strategies. In particular, summary methods (ASTRAL-II, ASTRID, and MP-EST), a site-based coalescent method (SVDquartets within PAUP*), and an unpartitioned concatenation analysis using maximum likelihood (RAxML) were evaluated on a heterogeneous collection of simulated multi-locus datasets, and the following trends were observed. Filtering genes based on gene tree estimation error improved the accuracy of the summary methods when levels of incomplete lineage sorting were low to moderate but did not benefit the summary methods under higher levels of incomplete lineage sorting, unless gene tree estimation

  1. Know Your Personal Computer

    Indian Academy of Sciences (India)

    Immediate. S I( Ghoshal. This article surveys the CPU chips of the IBM Personal. Computer using the Intel 80X86 family as the base. Introduction. In tel 80X86 CPUs are used in the IBM PC. 80X86 means all. CPUs in the family - (or should we call it a dynasty?) - the. 8086 (and that includes its shorter external data-bus width.

  2. Can Computers Create Art?

    OpenAIRE

    Hertzmann, Aaron

    2018-01-01

    This paper discusses whether computers, using Artifical Intelligence (AI), could create art. The first part concerns AI-based tools for assisting with art making. The history of technologies that automated aspects of art is covered, including photography and animation. In each case, we see initial fears and denial of the technology, followed by a blossoming of new creative and professional opportunities for artists. The hype and reality of Artificial Intelligence (AI) tools for art making is ...

  3. Universal computer interfaces

    CERN Document Server

    Dheere, RFBM

    1988-01-01

    Presents a survey of the latest developments in the field of the universal computer interface, resulting from a study of the world patent literature. Illustrating the state of the art today, the book ranges from basic interface structure, through parameters and common characteristics, to the most important industrial bus realizations. Recent technical enhancements are also included, with special emphasis devoted to the universal interface adapter circuit. Comprehensively indexed.

  4. Basics of Computer Networking

    CERN Document Server

    Robertazzi, Thomas

    2012-01-01

    Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

  5. Numerical computations with GPUs

    CERN Document Server

    Kindratenko, Volodymyr

    2014-01-01

    This book brings together research on numerical methods adapted for Graphics Processing Units (GPUs). It explains recent efforts to adapt classic numerical methods, including solution of linear equations and FFT, for massively parallel GPU architectures. This volume consolidates recent research and adaptations, covering widely used methods that are at the core of many scientific and engineering computations. Each chapter is written by authors working on a specific group of methods; these leading experts provide mathematical background, parallel algorithms and implementation details leading to

  6. Identifying complete RNA structural ensembles including pseudoknots.

    Science.gov (United States)

    Gupta, Aditi; Rahman, Reazur; Li, Kejie; Gribskov, Michael

    2012-02-01

    The close relationship between RNA structure and function underlines the significance of accurately predicting RNA structures from sequence information. Structural topologies such as pseudoknots are of particular interest due to their ubiquity and direct involvement in RNA function, but identifying pseudoknots is a computationally challenging problem and existing heuristic approaches usually perform poorly for RNA sequences of even a few hundred bases. We survey the performance of pseudoknot prediction methods on a data set of full-length RNA sequences representing varied sequence lengths, and biological RNA classes such as RNase P RNA, Group I Intron, tmRNA and tRNA. Pseudoknot prediction methods are compared with minimum free energy and suboptimal secondary structure prediction methods in terms of correct base-pairs, stems and pseudoknots and we find that the ensemble of suboptimal structure predictions succeeds in identifying correct structural elements in RNA that are usually missed in MFE and pseudoknot predictions. We propose a strategy to identify a comprehensive set of non-redundant stems in the suboptimal structure space of a RNA molecule by applying heuristics that reduce the structural redundancy of the predicted suboptimal structures by merging slightly varying stems that are predicted to form in local sequence regions. This reduced-redundancy set of structural elements consistently outperforms more specialized approaches.in data sets. Thus, the suboptimal folding space can be used to represent the structural diversity of an RNA molecule more comprehensively than optimal structure prediction approaches alone.

  7. Electrochemical cell structure including an ionomeric barrier

    Science.gov (United States)

    Lambert, Timothy N.; Hibbs, Michael

    2017-06-20

    An apparatus includes an electrochemical half-cell comprising: an electrolyte, an anode; and an ionomeric barrier positioned between the electrolyte and the anode. The anode may comprise a multi-electron vanadium phosphorous alloy, such as VP.sub.x, wherein x is 1-5. The electrochemical half-cell is configured to oxidize the vanadium and phosphorous alloy to release electrons. A method of mitigating corrosion in an electrochemical cell includes disposing an ionomeric barrier in a path of electrolyte or ion flow to an anode and mitigating anion accumulation on the surface of the anode.

  8. Electric Power Monthly, August 1990. [Glossary included

    Energy Technology Data Exchange (ETDEWEB)

    1990-11-29

    The Electric Power Monthly (EPM) presents monthly summaries of electric utility statistics at the national, Census division, and State level. The purpose of this publication is to provide energy decisionmakers with accurate and timely information that may be used in forming various perspectives on electric issues that lie ahead. Data includes generation by energy source (coal, oil, gas, hydroelectric, and nuclear); generation by region; consumption of fossil fuels for power generation; sales of electric power, cost data; and unusual occurrences. A glossary is included.

  9. Transmission line including support means with barriers

    Science.gov (United States)

    Cookson, Alan H.

    1982-01-01

    A gas insulated transmission line includes an elongated outer sheath, a plurality of inner conductors disposed within and extending along the outer sheath, and an insulating gas which electrically insulates the inner conductors from the outer sheath. A support insulator insulatably supports the inner conductors within the outer sheath, with the support insulator comprising a main body portion including a plurality of legs extending to the outer sheath, and barrier portions which extend between the legs. The barrier portions have openings therein adjacent the main body portion through which the inner conductors extend.

  10. Task-Driven Computing

    National Research Council Canada - National Science Library

    Wang, Zhenyu

    2000-01-01

    .... They will want to use the resources to perform computing tasks. Today's computing infrastructure does not support this model of computing very well because computers interact with users in terms of low level abstractions...

  11. Computed Tomography (CT) -- Sinuses

    Medline Plus

    Full Text Available ... News Physician Resources Professions Site Index A-Z Computed Tomography (CT) - Sinuses Computed tomography (CT) of the sinuses ... of CT of the Sinuses? What is CT (Computed Tomography) of the Sinuses? Computed tomography, more commonly known ...

  12. The principles of computer hardware

    CERN Document Server

    Clements, Alan

    2000-01-01

    Principles of Computer Hardware, now in its third edition, provides a first course in computer architecture or computer organization for undergraduates. The book covers the core topics of such a course, including Boolean algebra and logic design; number bases and binary arithmetic; the CPU; assembly language; memory systems; and input/output methods and devices. It then goes on to cover the related topics of computer peripherals such as printers; the hardware aspects of the operating system; and data communications, and hence provides a broader overview of the subject. Its readable, tutorial-based approach makes it an accessible introduction to the subject. The book has extensive in-depth coverage of two microprocessors, one of which (the 68000) is widely used in education. All chapters in the new edition have been updated. Major updates include: powerful software simulations of digital systems to accompany the chapters on digital design; a tutorial-based introduction to assembly language, including many exam...

  13. BIOLOGIC AND ECONOMIC EFFECTS OF INCLUDING DIFFERENT ...

    African Journals Online (AJOL)

    The biologic and economic effects of including three agro-industrial by-products as ingredients in turkey poult diets were investigated using 48 turkey poults in a completely randomised design experiment. Diets were formulated to contain the three by-products – wheat offal, rice husk and palm kernel meal, each at 20% level ...

  14. Numerical simulation of spark ignition including ionization

    NARCIS (Netherlands)

    Thiele, M; Selle, S; Riedel, U; Warnatz, J; Maas, U

    2000-01-01

    A detailed understanding of the processes associated Midi spark ignition, as a first step during combustion, is of great importance fur clean operation of spark ignition engines. In the past 10 years. a growing concern for environmental protection, including low emission of pollutants, has increased

  15. Extending flood damage assessment methodology to include ...

    African Journals Online (AJOL)

    Optimal and sustainable flood plain management, including flood control, can only be achieved when the impacts of flood control measures are considered for both the man-made and natural environments, and the sociological aspects are fully considered. Until now, methods/models developed to determine the influences ...

  16. Including Students with Visual Impairments: Softball

    Science.gov (United States)

    Brian, Ali; Haegele, Justin A.

    2014-01-01

    Research has shown that while students with visual impairments are likely to be included in general physical education programs, they may not be as active as their typically developing peers. This article provides ideas for equipment modifications and game-like progressions for one popular physical education unit, softball. The purpose of these…

  17. 46 CFR 289.2 - Vessels included.

    Science.gov (United States)

    2010-10-01

    ... CONSTRUCTION-DIFFERENTIAL SUBSIDY VESSELS, OPERATING-DIFFERENTIAL SUBSIDY VESSELS AND OF VESSELS SOLD OR ADJUSTED UNDER THE MERCHANT SHIP SALES ACT 1946 § 289.2 Vessels included. Vessels subject to the provisions of this part are: (a) All vessels which may in the future be constructed or sold with construction...

  18. 34 CFR 300.20 - Include.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Include. 300.20 Section 300.20 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION ASSISTANCE TO STATES FOR THE EDUCATION OF CHILDREN WITH DISABILITIES...

  19. Diversification of Smallholder Tobacco Systems to include ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Diversification of Smallholder Tobacco Systems to include Groundnut (Malawi). Tobacco is the mainstay of the economy of Malawi, accounting for over 70% of export earnings. Of the 100 000 members of the National Smallholder Farmers' Association of Malawi (NASFAM), 60% rely on tobacco for their sole source of ...

  20. Foil bearing lubrication theory including compressibility effects

    Science.gov (United States)

    Gorla, Rama Subba Reddy; Catalano, Daniel A.

    1987-01-01

    An analysis is presented to determine the film thickness in a foil bearing. Using the Reynolds equation and including the compressibility effects of the gas, an equation was developed applicable to the film thickness in a foil bearing. The bearing was divided into three regions, namely, the entrance region, middle region and exit region. Solutions are obtained for the film thickness in each region.

  1. Nuclear Chemistry: Include It in Your Curriculum.

    Science.gov (United States)

    Atwood, Charles H.; Sheline, R. K.

    1989-01-01

    Some of the topics that might be included in a nuclear chemistry section are explored. Offers radioactivity, closed shells in nuclei, energy of nuclear processes, nuclear reactions, and fission and fusion as topics of interest. Provided are ideas and examples for each. (MVL)

  2. 28 CFR 20.32 - Includable offenses.

    Science.gov (United States)

    2010-07-01

    ... Exchange of Criminal History Record Information § 20.32 Includable offenses. (a) Criminal history record... vehicular manslaughter, driving under the influence of drugs or liquor, and hit and run), when unaccompanied by a § 20.32(a) offense. These exclusions may not be applicable to criminal history records...

  3. Theories of computational complexity

    CERN Document Server

    Calude, C

    1988-01-01

    This volume presents four machine-independent theories of computational complexity, which have been chosen for their intrinsic importance and practical relevance. The book includes a wealth of results - classical, recent, and others which have not been published before.In developing the mathematics underlying the size, dynamic and structural complexity measures, various connections with mathematical logic, constructive topology, probability and programming theories are established. The facts are presented in detail. Extensive examples are provided, to help clarify notions and constructions. The lists of exercises and problems include routine exercises, interesting results, as well as some open problems.

  4. Cloud computing for comparative genomics.

    Science.gov (United States)

    Wall, Dennis P; Kudtarkar, Parul; Fusaro, Vincent A; Pivovarov, Rimma; Patil, Prasad; Tonellato, Peter J

    2010-05-18

    Large comparative genomics studies and tools are becoming increasingly more compute-expensive as the number of available genome sequences continues to rise. The capacity and cost of local computing infrastructures are likely to become prohibitive with the increase, especially as the breadth of questions continues to rise. Alternative computing architectures, in particular cloud computing environments, may help alleviate this increasing pressure and enable fast, large-scale, and cost-effective comparative genomics strategies going forward. To test this, we redesigned a typical comparative genomics algorithm, the reciprocal smallest distance algorithm (RSD), to run within Amazon's Elastic Computing Cloud (EC2). We then employed the RSD-cloud for ortholog calculations across a wide selection of fully sequenced genomes. We ran more than 300,000 RSD-cloud processes within the EC2. These jobs were farmed simultaneously to 100 high capacity compute nodes using the Amazon Web Service Elastic Map Reduce and included a wide mix of large and small genomes. The total computation time took just under 70 hours and cost a total of $6,302 USD. The effort to transform existing comparative genomics algorithms from local compute infrastructures is not trivial. However, the speed and flexibility of cloud computing environments provides a substantial boost with manageable cost. The procedure designed to transform the RSD algorithm into a cloud-ready application is readily adaptable to similar comparative genomics problems.

  5. Future computing needs for Fermilab

    Energy Technology Data Exchange (ETDEWEB)

    1983-12-01

    The following recommendations are made: (1) Significant additional computing capacity and capability beyond the present procurement should be provided by 1986. A working group with representation from the principal computer user community should be formed to begin immediately to develop the technical specifications. High priority should be assigned to providing a large user memory, software portability and a productive computing environment. (2) A networked system of VAX-equivalent super-mini computers should be established with at least one such computer dedicated to each reasonably large experiment for both online and offline analysis. The laboratory staff responsible for mini computers should be augmented in order to handle the additional work of establishing, maintaining and coordinating this system. (3) The laboratory should move decisively to a more fully interactive environment. (4) A plan for networking both inside and outside the laboratory should be developed over the next year. (5) The laboratory resources devoted to computing, including manpower, should be increased over the next two to five years. A reasonable increase would be 50% over the next two years increasing thereafter to a level of about twice the present one. (6) A standing computer coordinating group, with membership of experts from all the principal computer user constituents of the laboratory, should

  6. Computing in Hydraulic Engineering Education

    Science.gov (United States)

    Duan, J. G.

    2011-12-01

    Civil engineers, pioneers of our civilization, are rarely perceived as leaders and innovators in modern society because of retardations in technology innovation. This crisis has resulted in the decline of the prestige of civil engineering profession, reduction of federal funding on deteriorating infrastructures, and problems with attracting the most talented high-school students. Infusion of cutting-edge computer technology and stimulating creativity and innovation therefore are the critical challenge to civil engineering education. To better prepare our graduates to innovate, this paper discussed the adaption of problem-based collaborative learning technique and integration of civil engineering computing into a traditional civil engineering curriculum. Three interconnected courses: Open Channel Flow, Computational Hydraulics, and Sedimentation Engineering, were developed with emphasis on computational simulations. In Open Channel flow, the focuses are principles of free surface flow and the application of computational models. This prepares students to the 2nd course, Computational Hydraulics, that introduce the fundamental principles of computational hydraulics, including finite difference and finite element methods. This course complements the Open Channel Flow class to provide students with in-depth understandings of computational methods. The 3rd course, Sedimentation Engineering, covers the fundamentals of sediment transport and river engineering, so students can apply the knowledge and programming skills gained from previous courses to develop computational models for simulating sediment transport. These courses effectively equipped students with important skills and knowledge to complete thesis and dissertation research.

  7. Transneptunian Orbit Computation

    Science.gov (United States)

    Virtanen, J.; Tancredi, G.; Bernstein, G. M.; Spahr, T.; Muinonen, K.

    We review the orbit computation problem for the transneptunian population. For these distant objects, the problem is characterized by their short observed orbital arcs, which are known to be coupled with large uncertainties in orbital elements. Currently, the observations of even the best observed objects, such as the first-ever transneptunian object (TNO), Pluto, cover only a fraction of their revolution. Furthermore, of the some 1200 objects discovered since 1992, roughly half have observations from only one opposition. To ensure realistic analyses of the population, e.g., in the derivation of unbiased orbital distributions or correlations between orbital and physical properties, realistic estimation of orbital uncertainties is important. We describe the inverse problem of orbit computation, emphasizing the short-arc problem and its statistical treatment. The complete solution to the problem can be given in terms of the orbital-element probability density function (p.d.f.), which then serves as a starting point for any further analysis, where knowledge of orbital uncertainties is required. We give an overview of the variety of computational techniques developed for TNO orbital uncertainty estimation in the recent years. After presenting the current orbital distribution, we demonstrate their application to several prediction problems, such as classification, ephemeris prediction, and dynamical analysis of objects. We conclude with some future prospects for TNO orbit computation concerning the forthcoming next-generation surveys, including the anticipated evolution of TNO orbital uncertainties over the coming decades.

  8. Computational technologies advanced topics

    CERN Document Server

    Vabishchevich, Petr N

    2015-01-01

    This book discusses questions of numerical solutions of applied problems on parallel computing systems. Nowadays, engineering and scientific computations are carried out on parallel computing systems, which provide parallel data processing on a few computing nodes. In constructing computational algorithms, mathematical problems are separated in relatively independent subproblems in order to solve them on a single computing node.

  9. Computing handbook computer science and software engineering

    CERN Document Server

    Gonzalez, Teofilo; Tucker, Allen

    2014-01-01

    Overview of Computer Science Structure and Organization of Computing Peter J. DenningComputational Thinking Valerie BarrAlgorithms and Complexity Data Structures Mark WeissBasic Techniques for Design and Analysis of Algorithms Edward ReingoldGraph and Network Algorithms Samir Khuller and Balaji RaghavachariComputational Geometry Marc van KreveldComplexity Theory Eric Allender, Michael Loui, and Kenneth ReganFormal Models and Computability Tao Jiang, Ming Li, and Bala

  10. International Conference on Computer, Communication and Computational Sciences

    CERN Document Server

    Mishra, Krishn; Tiwari, Shailesh; Singh, Vivek

    2017-01-01

    Exchange of information and innovative ideas are necessary to accelerate the development of technology. With advent of technology, intelligent and soft computing techniques came into existence with a wide scope of implementation in engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the ‘Advances in Computer and Computational Sciences’ from upcoming researchers and leading academicians across the globe. It contains high-quality peer-reviewed papers of ‘International Conference on Computer, Communication and Computational Sciences (ICCCCS 2016), held during 12-13 August, 2016 in Ajmer, India. These papers are arranged in the form of chapters. The content of the book is divided into two volumes that cover variety of topics such as intelligent hardware and software design, advanced communications, power and energy optimization, intelligent techniques used in internet of things, intelligent image processing, advanced software engineering, evolutionary and ...

  11. 1st International Conference on Computational Intelligence and Informatics

    CERN Document Server

    Prasad, V; Rani, B; Udgata, Siba; Raju, K

    2017-01-01

    The book covers a variety of topics which include data mining and data warehousing, high performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, image processing, computer networks, wireless networks, social networks, wireless sensor networks, information and network security, web security, internet of things, bioinformatics and geoinformatics. The book is a collection of best papers submitted in the First International Conference on Computational Intelligence and Informatics (ICCII 2016) held during 28-30 May 2016 at JNTUH CEH, Hyderabad, India. It was hosted by Department of Computer Science and Engineering, JNTUH College of Engineering in association with Division V (Education & Research) CSI, India. .

  12. 76 FR 45860 - In the Matter of Certain Electronic Devices, Including Wireless Communication Devices, Portable...

    Science.gov (United States)

    2011-08-01

    ... communication devices, portable music and data processing devices, and tablet computers by reason of... communication devices, portable music and data processing devices, and tablet computers that infringe one or... COMMISSION In the Matter of Certain Electronic Devices, Including Wireless Communication Devices, Portable...

  13. [Biophysical Characterization of Biopharmaceuticals, Including Antibody Drugs].

    Science.gov (United States)

    Uchiyama, Susumu

    2016-01-01

    Biopharmaceuticals, including antibody drugs, are now popular because of their high specificity with low adverse effects, especially in the treatment of cancer and autoimmune diseases. However, because the active pharmaceutical ingredients of biopharmaceuticals are proteins, biophysical characterization of these therapeutic proteins should be required. In this manuscript, methods of chemical and physical characterization of therapeutic proteins are described. In terms of chemical characterization, analysis of chemical modifications of the constituent amino acids is explained. Physical characterization includes higher order structural analysis and assessment of protein aggregates. Quantification methods of aggregates with different sizes, recently encouraged by the U.S. Food and Drug Administration (FDA), are introduced. As for the stability of therapeutic proteins, the importance of chemical and physical stability is explained. Finally, the contribution of colloidal and structural stability to the production of an antibody drug less prone to aggregation is introduced.

  14. Nuclear reactor shield including magnesium oxide

    Science.gov (United States)

    Rouse, Carl A.; Simnad, Massoud T.

    1981-01-01

    An improvement in nuclear reactor shielding of a type used in reactor applications involving significant amounts of fast neutron flux, the reactor shielding including means providing structural support, neutron moderator material, neutron absorber material and other components as described below, wherein at least a portion of the neutron moderator material is magnesium in the form of magnesium oxide either alone or in combination with other moderator materials such as graphite and iron.

  15. Electric power monthly, September 1990. [Glossary included

    Energy Technology Data Exchange (ETDEWEB)

    1990-12-17

    The purpose of this report is to provide energy decision makers with accurate and timely information that may be used in forming various perspectives on electric issues. The power plants considered include coal, petroleum, natural gas, hydroelectric, and nuclear power plants. Data are presented for power generation, fuel consumption, fuel receipts and cost, sales of electricity, and unusual occurrences at power plants. Data are compared at the national, Census division, and state levels. 4 figs., 52 tabs. (CK)

  16. 3D integrated HYDRA simulations of hohlraums including fill tubes

    Science.gov (United States)

    Marinak, M. M.; Milovich, J.; Hammel, B. A.; Macphee, A. G.; Smalyuk, V. A.; Kerbel, G. D.; Sepke, S.; Patel, M. V.

    2017-10-01

    Measurements of fill tube perturbations from hydro growth radiography (HGR) experiments on the National Ignition Facility show spoke perturbations in the ablator radiating from the base of the tube. These correspond to the shadow of the 10 μm diameter glass fill tube cast by hot spots at early time. We present 3D integrated HYDRA simulations of these experiments which include the fill tube. Meshing techniques are described which were employed to resolve the fill tube structure and associated perturbations in the simulations. We examine the extent to which the specific illumination geometry necessary to accommodate a backlighter in the HGR experiment contributes to the spoke pattern. Simulations presented include high resolution calculations run on the Trinity machine operated by the Alliance for Computing at Extreme Scale (ACES) partnership. This work was performed under the auspices of the Lawrence Livermore National Security, LLC, (LLNS) under Contract No. DE-AC52-07NA27344.

  17. Microfluidic System Simulation Including the Electro-Viscous Effect

    Science.gov (United States)

    Rojas, Eileen; Chen, C. P.; Majumdar, Alok

    2007-01-01

    This paper describes a practical approach using a general purpose lumped-parameter computer program, GFSSP (Generalized Fluid System Simulation Program) for calculating flow distribution in a network of micro-channels including electro-viscous effects due to the existence of electrical double layer (EDL). In this study, an empirical formulation for calculating an effective viscosity of ionic solutions based on dimensional analysis is described to account for surface charge and bulk fluid conductivity, which give rise to electro-viscous effect in microfluidics network. Two dimensional slit micro flow data was used to determine the model coefficients. Geometry effect is then included through a Poiseuille number correlation in GFSSP. The bi-power model was used to calculate flow distribution of isotropically etched straight channel and T-junction microflows involving ionic solutions. Performance of the proposed model is assessed against experimental test data.

  18. Computing Education in Korea--Current Issues and Endeavors

    Science.gov (United States)

    Choi, Jeongwon; An, Sangjin; Lee, Youngjun

    2015-01-01

    Computer education has been provided for a long period of time in Korea. Starting as a vocational program, the content of computer education for students evolved to include content on computer literacy, Information Communication Technology (ICT) literacy, and brand-new computer science. While a new curriculum related to computer science was…

  19. Digital Da Vinci computers in the arts and sciences

    CERN Document Server

    Lee, Newton

    2014-01-01

    Explores polymathic education through unconventional and creative applications of computer science in the arts and sciences Examines the use of visual computation, 3d printing, social robotics and computer modeling for computational art creation and design Includes contributions from leading researchers and practitioners in computer science, architecture and digital media

  20. 15 CFR 740.7 - Computers (APP).

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Computers (APP). 740.7 Section 740.7... Computers (APP). (a) Scope—(1) Commodities. License Exception APP authorizes exports and reexports of computers, including “electronic assemblies” and specially designed components therefor controlled by ECCN...

  1. Computer Virus Bibliography, 1988-1989.

    Science.gov (United States)

    Bologna, Jack, Comp.

    This bibliography lists 14 books, 154 journal articles, 34 newspaper articles, and 3 research papers published during 1988-1989 on the subject of computer viruses, software protection and 'cures', virus hackers, and other related issues. Some of the sources listed include Computers and Security, Computer Security Digest, PC Week, Time, the New…

  2. Cognitive engineering in mental health computing

    NARCIS (Netherlands)

    Brinkman, W.P.

    2011-01-01

    Computer applications in support of mental health care and rehabilitation are becoming more widely used. They include technologies such as virtual reality, electronic diaries, multimedia, brain computing and computer games. Research in this area is emerging, and focussing on a variety of issues,

  3. Ordinateur et communication (Computer and Communication).

    Science.gov (United States)

    Mangenot, Francois

    1994-01-01

    Because use of computers in second-language classrooms may tend to decrease interpersonal interaction, and therefore communication, ways to promote interaction are offered. These include small group computer projects, and suggestions are made for use with various computer functions and features: tutorials, word processing, voice recording,…

  4. Message-passing performance of various computers

    Energy Technology Data Exchange (ETDEWEB)

    Dongarra, J.J.; Dunigan, T.H.

    1996-02-01

    This report compares the performance of different computer systems message passing. Latency and bandwidth are measured on Convex, Cray, IBM, Intel, KSR, Meiko, nCUBE, NEC, SGI, and TMC multiprocessors. Communication performance is contrasted with the computational power of each system. The comparison includes both shared a memory computers as well as networked workstation cluster.

  5. Human-Computer Interaction in Tactical Operations: Designing for Effective Human-Computer Dialogue

    Science.gov (United States)

    1990-09-01

    editing. fraphical interaction (Report No. CW’-CS-R8718). Human Computer Interaction 1(3), 223-274. Washington, DC National Aeronautics and Space...Co - * r LLcOPY Research Product 90-31 j LL Human- Computer Interaction in Tactical Operations: Designing for Effective Human- Computer Dialogue DTIC...5600 62785A 790 1304 C2 LE (include Security Classification) i- Computer Interaction in Tactical Operations: Designing for Effective i- Computer

  6. Musculoskeletal ultrasound including definitions for ultrasonographic pathology

    DEFF Research Database (Denmark)

    Wakefield, RJ; Balint, PV; Szkudlarek, Marcin

    2005-01-01

    Ultrasound (US) has great potential as an outcome in rheumatoid arthritis trials for detecting bone erosions, synovitis, tendon disease, and enthesopathy. It has a number of distinct advantages over magnetic resonance imaging, including good patient tolerability and ability to scan multiple joints...... pathologies. This article presents the first report from the OMERACT ultrasound special interest group, which has compared US against the criteria of the OMERACT filter. Also proposed for the first time are consensus US definitions for common pathological lesions seen in patients with inflammatory arthritis....

  7. Drug delivery device including electrolytic pump

    KAUST Repository

    Foulds, Ian G.

    2016-03-31

    Systems and methods are provided for a drug delivery device and use of the device for drug delivery. In various aspects, the drug delivery device combines a “solid drug in reservoir” (SDR) system with an electrolytic pump. In various aspects an improved electrolytic pump is provided including, in particular, an improved electrolytic pump for use with a drug delivery device, for example an implantable drug delivery device. A catalytic reformer can be incorporated in a periodically pulsed electrolytic pump to provide stable pumping performance and reduced actuation cycle.

  8. Computer architecture a quantitative approach

    CERN Document Server

    Hennessy, John L

    2019-01-01

    Computer Architecture: A Quantitative Approach, Sixth Edition has been considered essential reading by instructors, students and practitioners of computer design for over 20 years. The sixth edition of this classic textbook is fully revised with the latest developments in processor and system architecture. It now features examples from the RISC-V (RISC Five) instruction set architecture, a modern RISC instruction set developed and designed to be a free and openly adoptable standard. It also includes a new chapter on domain-specific architectures and an updated chapter on warehouse-scale computing that features the first public information on Google's newest WSC. True to its original mission of demystifying computer architecture, this edition continues the longstanding tradition of focusing on areas where the most exciting computing innovation is happening, while always keeping an emphasis on good engineering design.

  9. Discrete mathematics using a computer

    CERN Document Server

    Hall, Cordelia

    2000-01-01

    Several areas of mathematics find application throughout computer science, and all students of computer science need a practical working understanding of them. These core subjects are centred on logic, sets, recursion, induction, relations and functions. The material is often called discrete mathematics, to distinguish it from the traditional topics of continuous mathematics such as integration and differential equations. The central theme of this book is the connection between computing and discrete mathematics. This connection is useful in both directions: • Mathematics is used in many branches of computer science, in applica­ tions including program specification, datastructures,design and analysis of algorithms, database systems, hardware design, reasoning about the correctness of implementations, and much more; • Computers can help to make the mathematics easier to learn and use, by making mathematical terms executable, making abstract concepts more concrete, and through the use of software tools su...

  10. Solving computationally expensive engineering problems

    CERN Document Server

    Leifsson, Leifur; Yang, Xin-She

    2014-01-01

    Computational complexity is a serious bottleneck for the design process in virtually any engineering area. While migration from prototyping and experimental-based design validation to verification using computer simulation models is inevitable and has a number of advantages, high computational costs of accurate, high-fidelity simulations can be a major issue that slows down the development of computer-aided design methodologies, particularly those exploiting automated design improvement procedures, e.g., numerical optimization. The continuous increase of available computational resources does not always translate into shortening of the design cycle because of the growing demand for higher accuracy and necessity to simulate larger and more complex systems. Accurate simulation of a single design of a given system may be as long as several hours, days or even weeks, which often makes design automation using conventional methods impractical or even prohibitive. Additional problems include numerical noise often pr...

  11. Planning Computer-Aided Distance Learning

    Directory of Open Access Journals (Sweden)

    Nadja Dobnik

    1996-12-01

    Full Text Available Didactics of autonomous learning changes under the influence of new technologies. Computer technology can cover all the functions that a teacher develops in personal contact with the learner. People organizing distance learning must realize all the possibilities offered by computers. Computers can take over and also combine the functions of many tools and systems, e. g. type­ writer, video, telephone. This the contents can be offered in form of classic media by means of text, speech, picture, etc. Computers take over data pro­cessing and function as study materials. Computer included in a computer network can also function as a medium for interactive communication.

  12. Computer science research. Computation and Information Services Directorate

    Energy Technology Data Exchange (ETDEWEB)

    McGraw, J.R.; Van Dyke, P.T. (eds.)

    1985-01-01

    Research activities in computer science and numerical analysis carried out within the Computation and Information Services Directorate of Lawrence Livermore National Laboratory are highlighted. A technical introduction to current areas of study is given, and recent progress is reported. Current research features a heavy emphasis on multiprocessing, which plays a major role in nearly every proposed new supercomputer system. In addition to multiprocessing, strong efforts continue in some of the more traditional areas of computer science, particularly numerical methods. Specific content of the report includes chapters on numerical algorithms, software interfaces, architectures and networks, future directions, project funding, and project contacts. (DWL)

  13. Computers as components principles of embedded computing system design

    CERN Document Server

    Wolf, Marilyn

    2012-01-01

    Computers as Components: Principles of Embedded Computing System Design, 3e, presents essential knowledge on embedded systems technology and techniques. Updated for today's embedded systems design methods, this edition features new examples including digital signal processing, multimedia, and cyber-physical systems. Author Marilyn Wolf covers the latest processors from Texas Instruments, ARM, and Microchip Technology plus software, operating systems, networks, consumer devices, and more. Like the previous editions, this textbook: Uses real processors to demonstrate both technology and tec

  14. Computing with Mathematica

    CERN Document Server

    Hoft, Margret H

    2002-01-01

    Computing with Mathematica, 2nd edition is engaging and interactive. It is designed to teach readers how to use Mathematica efficiently for solving problems arising in fields such as mathematics, computer science, physics, and engineering. The text moves from simple to complex, often following a specific example on a number of different levels. This gradual increase incomplexity allows readers to steadily build their competence without being overwhelmed. The 2nd edition of this acclaimed book features:* An enclosed CD for Mac and Windows that contains the entire text as acollection of Mathematica notebooks* Substantive real world examples* Challenging exercises, moving from simple to complex* A collection of interactive projects from a variety of applications "I really think this is an almost perfect text." -Stephen Brick, University of South Alabama* Substantive real world examples * Challenging exercises, moving from simple to complex examples * Interactive explorations (on the included CD-ROM) from a ...

  15. The Antares computing model

    Energy Technology Data Exchange (ETDEWEB)

    Kopper, Claudio, E-mail: claudio.kopper@nikhef.nl [NIKHEF, Science Park 105, 1098 XG Amsterdam (Netherlands)

    2013-10-11

    Completed in 2008, Antares is now the largest water Cherenkov neutrino telescope in the Northern Hemisphere. Its main goal is to detect neutrinos from galactic and extra-galactic sources. Due to the high background rate of atmospheric muons and the high level of bioluminescence, several on-line and off-line filtering algorithms have to be applied to the raw data taken by the instrument. To be able to handle this data stream, a dedicated computing infrastructure has been set up. The paper covers the main aspects of the current official Antares computing model. This includes an overview of on-line and off-line data handling and storage. In addition, the current usage of the “IceTray” software framework for Antares data processing is highlighted. Finally, an overview of the data storage formats used for high-level analysis is given.

  16. Spintronics-based computing

    CERN Document Server

    Prenat, Guillaume

    2015-01-01

    This book provides a comprehensive introduction to spintronics-based computing for the next generation of ultra-low power/highly reliable logic, which is widely considered a promising candidate to replace conventional, pure CMOS-based logic. It will cover aspects from device to system-level, including magnetic memory cells, device modeling, hybrid circuit structure, design methodology, CAD tools, and technological integration methods. This book is accessible to a variety of readers and little or no background in magnetism and spin electronics are required to understand its content.  The multidisciplinary team of expert authors from circuits, devices, computer architecture, CAD and system design reveal to readers the potential of spintronics nanodevices to reduce power consumption, improve reliability and enable new functionality.  .

  17. Final technical report for DOE Computational Nanoscience Project: Integrated Multiscale Modeling of Molecular Computing Devices

    Energy Technology Data Exchange (ETDEWEB)

    Cummings, P. T.

    2010-02-08

    This document reports the outcomes of the Computational Nanoscience Project, "Integrated Multiscale Modeling of Molecular Computing Devices". It includes a list of participants and publications arising from the research supported.

  18. Mobile Computing for Aerospace Applications

    Science.gov (United States)

    Alena, Richard; Swietek, Gregory E. (Technical Monitor)

    1994-01-01

    The use of commercial computer technology in specific aerospace mission applications can reduce the cost and project cycle time required for the development of special-purpose computer systems. Additionally, the pace of technological innovation in the commercial market has made new computer capabilities available for demonstrations and flight tests. Three areas of research and development being explored by the Portable Computer Technology Project at NASA Ames Research Center are the application of commercial client/server network computing solutions to crew support and payload operations, the analysis of requirements for portable computing devices, and testing of wireless data communication links as extensions to the wired network. This paper will present computer architectural solutions to portable workstation design including the use of standard interfaces, advanced flat-panel displays and network configurations incorporating both wired and wireless transmission media. It will describe the design tradeoffs used in selecting high-performance processors and memories, interfaces for communication and peripheral control, and high resolution displays. The packaging issues for safe and reliable operation aboard spacecraft and aircraft are presented. The current status of wireless data links for portable computers is discussed from a system design perspective. An end-to-end data flow model for payload science operations from the experiment flight rack to the principal investigator is analyzed using capabilities provided by the new generation of computer products. A future flight experiment on-board the Russian MIR space station will be described in detail including system configuration and function, the characteristics of the spacecraft operating environment, the flight qualification measures needed for safety review, and the specifications of the computing devices to be used in the experiment. The software architecture chosen shall be presented. An analysis of the

  19. Quantum computing from the ground up

    CERN Document Server

    Perry, Riley Tipton

    2012-01-01

    Quantum computing - the application of quantum mechanics to information - represents a fundamental break from classical information and promises to dramatically increase a computer's power. Many difficult problems, such as the factorization of large numbers, have so far resisted attack by classical computers yet are easily solved with quantum computers. If they become feasible, quantum computers will end standard practices such as RSA encryption. Most of the books or papers on quantum computing require (or assume) prior knowledge of certain areas such as linear algebra or quantum mechanics. The majority of the currently-available literature is hard to understand for the average computer enthusiast or interested layman. This text attempts to teach quantum computing from the ground up in an easily readable way, providing a comprehensive tutorial that includes all the necessary mathematics, computer science and physics.

  20. Models of bovine babesiosis including juvenile cattle.

    Science.gov (United States)

    Saad-Roy, C M; Shuai, Zhisheng; van den Driessche, P

    2015-03-01

    Bovine Babesiosis in cattle is caused by the transmission of protozoa of Babesia spp. by ticks as vectors. Juvenile cattle (Bovine Babesiosis, rarely show symptoms, and acquire immunity upon recovery. Susceptibility to the disease varies between breeds of cattle. Models of the dynamics of Bovine Babesiosis transmitted by the cattle tick that include these factors are formulated as systems of ordinary differential equations. Basic reproduction numbers are calculated, and it is proved that if these numbers are below the threshold value of one, then Bovine Babesiosis dies out. However, above the threshold number of one, the disease may approach an endemic state. In this case, control measures are suggested by determining target reproduction numbers. The percentage of a particular population (for example, the adult bovine population) needed to be controlled to eradicate the disease is evaluated numerically using Columbia data from the literature.

  1. CLIC expands to include the Southern Hemisphere

    CERN Multimedia

    Roberto Cantoni

    2010-01-01

    Australia has recently joined the CLIC collaboration: the enlargement will bring new expertise and resources to the project, and is especially welcome in the wake of CERN budget redistributions following the recent adoption of the Medium Term Plan.   The countries involved in CLIC collaboration With the signing of a Memorandum of Understanding on 26 August 2010, the ACAS network (Australian Collaboration for Accelerator Science) became the 40th member of in the multilateral CLIC collaboration making Australia the 22nd country to join the collaboration. “The new MoU was signed by the ACAS network, which includes the Australian Synchrotron and the University of Melbourne”, explains Jean-Pierre Delahaye, CLIC Study Leader. “Thanks to their expertise, the Australian institutes will contribute greatly to the CLIC damping rings and the two-beam test modules." Institutes from any country wishing to join the CLIC collaboration are invited to assume responsibility o...

  2. The surgery of peripheral nerves (including tumors).

    Science.gov (United States)

    Fugleholm, Kåre

    2013-01-01

    Surgical pathology of the peripheral nervous system includes traumatic injury, entrapment syndromes, and tumors. The recent significant advances in the understanding of the pathophysiology and cellular biology of peripheral nerve degeneration and regeneration has yet to be translated into improved surgical techniques and better outcome after peripheral nerve injury. Decision making in peripheral nerve surgery continues to be a complex challenge, where the mechanism of injury, repeated clinical evaluation, neuroradiological and neurophysiological examination, and detailed knowledge of the peripheral nervous system response to injury are prerequisite to obtain the best possible outcome. Surgery continues to be the primary treatment modality for peripheral nerve tumors and advances in adjuvant oncological treatment has improved outcome after malignant peripheral nerve tumors. The present chapter provides background knowledge of surgical peripheral nerve disease and some general and practical guidance toward its clinical management. Copyright © 2013 Elsevier B.V. All rights reserved.

  3. The surgery of peripheral nerves (including tumors)

    DEFF Research Database (Denmark)

    Fugleholm, Kåre

    2013-01-01

    Surgical pathology of the peripheral nervous system includes traumatic injury, entrapment syndromes, and tumors. The recent significant advances in the understanding of the pathophysiology and cellular biology of peripheral nerve degeneration and regeneration has yet to be translated into improved...... nervous system response to injury are prerequisite to obtain the best possible outcome. Surgery continues to be the primary treatment modality for peripheral nerve tumors and advances in adjuvant oncological treatment has improved outcome after malignant peripheral nerve tumors. The present chapter...... surgical techniques and better outcome after peripheral nerve injury. Decision making in peripheral nerve surgery continues to be a complex challenge, where the mechanism of injury, repeated clinical evaluation, neuroradiological and neurophysiological examination, and detailed knowledge of the peripheral...

  4. AMS at the ANU including biomedical applications

    Energy Technology Data Exchange (ETDEWEB)

    Fifield, L.K.; Allan, G.L.; Cresswell, R.G.; Ophel, T.R. [Australian National Univ., Canberra, ACT (Australia); King, S.J.; Day, J.P. [Manchester Univ. (United Kingdom). Dept. of Chemistry

    1993-12-31

    An extensive accelerator mass spectrometry program has been conducted on the 14UD accelerator at the Australian National University since 1986. In the two years since the previous conference, the research program has expanded significantly to include biomedical applications of {sup 26}Al and studies of landform evolution using isotopes produced in situ in surface rocks by cosmic ray bombardment. The system is now used for the measurement of {sup 10}Be, {sup 14}C, {sup 26}Al, {sup 36}Cl, {sup 59}Ni and {sup 129}I, and research is being undertaken in hydrology, environmental geochemistry, archaeology and biomedicine. On the technical side, a new test system has permitted the successful off-line development of a high-intensity ion source. A new injection line to the 14UD has been established and the new source is now in position and providing beams to the accelerator. 4 refs.

  5. CERN Technical Training: LABVIEW courses include RADE

    CERN Document Server

    HR Department

    2009-01-01

    The contents of the "LabView Basic I" and "LabView Intermediate II" courses have recently been changed to include, respectively, an introduction to and expert training in the Rapid Application Development Environment (RADE). RADE is a LabView-based application developed at CERN to integrate LabView in the accelerator and experiment control infrastructure. It is a suitable solution to developing expert tools, machine development analysis and independent test facilities. The course names have also been changed to "LabVIEW Basics I with RADE Introduction" and "LabVIEW Intermediate II with Advanced RADE Application". " LabVIEW Basics I with RADE Introduction" is designed for: Users preparing to develop applications using LabVIEW, or NI Developer Suite; users and technical managers evaluating LabVIEW or NI Developer Suite in purchasing decisions; users pursuing the Certified LabVIEW Developer certification. The course prepares participants to develop test and measurement, da...

  6. CERN Technical Training: LABVIEW courses include RADE

    CERN Multimedia

    HR Department

    2009-01-01

    The contents of the "LabView Basic I" and "LabView Intermediate II" courses have recently been changed to include, respectively, an introduction to and expert training in the Rapid Application Development Environment (RADE). RADE is a LabView-based application developed at CERN to integrate LabView in the accelerator and experiment control infrastructure. It is a suitable solution to developing expert tools, machine development analysis and independent test facilities. The course names have also been changed to "LabVIEW Basics I with RADE Introduction" and "LabVIEW Intermediate II with Advanced RADE Application". " LabVIEW Basics I with RADE Introduction" is designed for: Users preparing to develop applications using LabVIEW, or NI Developer Suite; users and technical managers evaluating LabVIEW or NI Developer Suite in purchasing decisions; users pursuing the Certified LabVIEW Developer certification. The course pr...

  7. CERN Technical Training: LABVIEW courses include RADE

    CERN Multimedia

    HR Department

    2009-01-01

    The contents of "LabView Basic I" and "LabView Intermediate II" trainings have been recently changed to include, respectively, an introduction and an expert training on the Rapid Application Development Environment (RADE). RADE is a LabView-based application developed at CERN to integrate LabView in the accelerator and experiment control infrastructure. It is a suitable solution to develop expert tools, machine development analysis and independent test facilities. The course names have also been changed to "LabVIEW Basics I with RADE Introduction" and "LabVIEW Intermediate II with Advanced RADE Application". " LabVIEW Basics I with RADE Introduction" is designed for: Users preparing to develop applications using LabVIEW, or NI Developer Suite; users and technical managers evaluating LabVIEW or NI Developer Suite in purchasing decisions; users pursuing the Certified LabVIEW Developer certification. The course prepare...

  8. Education Program on Fossil Resources Including Coal

    Science.gov (United States)

    Usami, Masahiro

    Fossil fuels including coal play a key role as crucial energies in contributing to economic development in Asia. On the other hand, its limited quantity and the environmental problems causing from its usage have become a serious global issue and a countermeasure to solve such problems is very much demanded. Along with the pursuit of sustainable development, environmentally-friendly use of highly efficient fossil resources should be therefore, accompanied. Kyushu-university‧s sophisticated research through long years of accumulated experience on the fossil resources and environmental sectors together with the advanced large-scale commercial and empirical equipments will enable us to foster cooperative research and provide internship program for the future researchers. Then, this program is executed as a consignment business from the Ministry of Economy, Trade and Industry from 2007 fiscal year to 2009 fiscal year. The lecture that uses the textbooks developed by this program is scheduled to be started a course in fiscal year 2010.

  9. Consanguinity and associated perinatal outcomes, including stillbirth.

    Science.gov (United States)

    Kapurubandara, Supuni; Melov, Sarah; Shalou, Evangeline; Alahakoon, Indika

    2016-12-01

    Consanguinity defined as the sexual union between two related individuals has been previously an infrequent practice in Australia, but recently there has been migration from countries with widespread practice of consanguinity. There is limited and conflicting evidence in the literature that suggests consanguinity to be associated with adverse obstetric outcomes. To assess the effect of consanguinity on perinatal outcomes. A retrospective analysis of singleton births over a ten-year period at an Australian tertiary hospital. The data were extracted from the hospital obstetric database and analysed for an association between consanguinity and perinatal outcomes, including stillbirth. Main outcome measures were stillbirth, threatened premature labour, fetal congenital abnormality, perinatal mortality and neonatal outcomes. There were 46 399 singleton births recorded over the ten-year study period, and 44 004 had consanguinity data available. The overall consanguinity rate was 5.5% (n = 2565), which remained consistent over the study period at our institution. Consanguinity was associated with higher rate of threatened premature labour (5.6% vs 4.7%, P = 0.003), fetal congenital abnormality (4.2% vs 3.1%, P = 0.004), perinatal mortality (2.4% vs 1.0%, P Consanguinity was an independent risk factor for stillbirth with a relative risk of 2.88 (P consanguineous relationships are at higher risk of adverse perinatal outcomes, including stillbirth. Given the 5% prevalence of consanguinity in our obstetric population, these findings have significant implications for preconception counselling, obstetric care and health resource allocation. © 2016 The Royal Australian and New Zealand College of Obstetricians and Gynaecologists.

  10. Advances in Computer Science and Engineering

    CERN Document Server

    Second International Conference on Advances in Computer Science and Engineering (CES 2012)

    2012-01-01

    This book includes the proceedings of the second International Conference on Advances in Computer Science and Engineering (CES 2012), which was held during January 13-14, 2012 in Sanya, China. The papers in these proceedings of CES 2012 focus on the researchers’ advanced works in their fields of Computer Science and Engineering mainly organized in four topics, (1) Software Engineering, (2) Intelligent Computing, (3) Computer Networks, and (4) Artificial Intelligence Software.

  11. Advanced in Computer Science and its Applications

    CERN Document Server

    Yen, Neil; Park, James; CSA 2013

    2014-01-01

    The theme of CSA is focused on the various aspects of computer science and its applications for advances in computer science and its applications and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of computer science and its applications. Therefore this book will be include the various theories and practical applications in computer science and its applications.

  12. A Framework for Heterotic Computing

    Directory of Open Access Journals (Sweden)

    Susan Stepney

    2012-10-01

    Full Text Available Computational devices combining two or more different parts, one controlling the operation of the other, for example, derive their power from the interaction, in addition to the capabilities of the parts. Non-classical computation has tended to consider only single computational models: neural, analog, quantum, chemical, biological, neglecting to account for the contribution from the experimental controls. In this position paper, we propose a framework suitable for analysing combined computational models, from abstract theory to practical programming tools. Focusing on the simplest example of one system controlled by another through a sequence of operations in which only one system is active at a time, the output from one system becomes the input to the other for the next step, and vice versa. We outline the categorical machinery required for handling diverse computational systems in such combinations, with their interactions explicitly accounted for. Drawing on prior work in refinement and retrenchment, we suggest an appropriate framework for developing programming tools from the categorical framework. We place this work in the context of two contrasting concepts of "efficiency": theoretical comparisons to determine the relative computational power do not always reflect the practical comparison of real resources for a finite-sized computational task, especially when the inputs include (approximations of real numbers. Finally we outline the limitations of our simple model, and identify some of the extensions that will be required to treat more complex interacting computational systems.

  13. GPU Computing Gems Emerald Edition

    CERN Document Server

    Hwu, Wen-mei W

    2011-01-01

    ".the perfect companion to Programming Massively Parallel Processors by Hwu & Kirk." -Nicolas Pinto, Research Scientist at Harvard & MIT, NVIDIA Fellow 2009-2010 Graphics processing units (GPUs) can do much more than render graphics. Scientists and researchers increasingly look to GPUs to improve the efficiency and performance of computationally-intensive experiments across a range of disciplines. GPU Computing Gems: Emerald Edition brings their techniques to you, showcasing GPU-based solutions including: Black hole simulations with CUDA GPU-accelerated computation and interactive display of

  14. Affective Computing and Sentiment Analysis

    CERN Document Server

    Ahmad, Khurshid

    2011-01-01

    This volume maps the watershed areas between two 'holy grails' of computer science: the identification and interpretation of affect -- including sentiment and mood. The expression of sentiment and mood involves the use of metaphors, especially in emotive situations. Affect computing is rooted in hermeneutics, philosophy, political science and sociology, and is now a key area of research in computer science. The 24/7 news sites and blogs facilitate the expression and shaping of opinion locally and globally. Sentiment analysis, based on text and data mining, is being used in the looking at news

  15. Capability-based computer systems

    CERN Document Server

    Levy, Henry M

    2014-01-01

    Capability-Based Computer Systems focuses on computer programs and their capabilities. The text first elaborates capability- and object-based system concepts, including capability-based systems, object-based approach, and summary. The book then describes early descriptor architectures and explains the Burroughs B5000, Rice University Computer, and Basic Language Machine. The text also focuses on early capability architectures. Dennis and Van Horn's Supervisor; CAL-TSS System; MIT PDP-1 Timesharing System; and Chicago Magic Number Machine are discussed. The book then describes Plessey System 25

  16. The High Performance Computing Initiative

    Science.gov (United States)

    Holcomb, Lee B.; Smith, Paul H.; Macdonald, Michael J.

    1991-01-01

    The paper discusses NASA High Performance Computing Initiative (HPCI), an essential component of the Federal High Performance Computing Program. The HPCI program is designed to provide a thousandfold increase in computing performance, and apply the technologies to NASA 'Grand Challenges'. The Grand Challenges chosen include integrated multidisciplinary simulations and design optimizations of aerospace vehicles throughout the mission profiles; the multidisciplinary modeling and data analysis of the earth and space science physical phenomena; and the spaceborne control of automated systems, handling, and analysis of sensor data and real-time response to sensor stimuli.

  17. Psychoco: Psychometric Computing in R

    Directory of Open Access Journals (Sweden)

    Florian Wickelmaier

    2012-05-01

    Full Text Available This special volume features eleven contributions to psychometric computing, a research area that integrates psychometrics and computational methods in statistics. Topics covered include structural equation modeling, item response theory, probabilistic choice modeling, and other modeling approaches prevalent in or useful for psychometric research. Each contributed paper is accompanied by a software package published on the Comprehensive R Archive Network. This introduction gives a brief overview of the volume.

  18. Full Boltzmann equations for leptogenesis including scattering

    CERN Document Server

    Hahn-Woernle, F; Wong, Y Y Y

    2009-01-01

    We study the evolution of a cosmological baryon asymmetry produced via leptogenesis by means of the full classical Boltzmann equations, without the assumption of kinetic equilibrium and including all quantum statistical factors. Beginning with the full mode equations we derive the usual equations of motion for the right-handed neutrino number density and integrated lepton asymmetry, and show explicitly the impact of each assumption on these quantities. For the first time, we investigate also the effects of scattering of the right-handed neutrino with the top quark to leading order in the Yukawa couplings by means of the full Boltzmann equations. We find that in our full Boltzmann treatment the final lepton asymmetry can be suppressed by as much as a factor of 1.5 in the weak wash-out regime (K1), the full Boltzmann treatment and the integrated approach give nearly identical final lepton asymmetries (within 10 % of each other at K>3). Finally, we show that the opposing effects of quantum statistics on decays/i...

  19. Extending Newtonian Dynamics to Include Stochastic Processes

    Science.gov (United States)

    Zak, Michail

    2009-01-01

    A paper presents further results of continuing research reported in several previous NASA Tech Briefs articles, the two most recent being Stochastic Representations of Chaos Using Terminal Attractors (NPO-41519), [Vol. 30, No. 5 (May 2006), page 57] and Physical Principle for Generation of Randomness (NPO-43822) [Vol. 33, No. 5 (May 2009), page 56]. This research focuses upon a mathematical formalism for describing post-instability motions of a dynamical system characterized by exponential divergences of trajectories leading to chaos (including turbulence as a form of chaos). The formalism involves fictitious control forces that couple the equations of motion of the system with a Liouville equation that describes the evolution of the probability density of errors in initial conditions. These stabilizing forces create a powerful terminal attractor in probability space that corresponds to occurrence of a target trajectory with probability one. The effect in configuration space (ordinary three-dimensional space as commonly perceived) is to suppress exponential divergences of neighboring trajectories without affecting the target trajectory. As a result, the post-instability motion is represented by a set of functions describing the evolution of such statistical quantities as expectations and higher moments, and this representation is stable.

  20. Applied Parallel Computing Industrial Computation and Optimization

    DEFF Research Database (Denmark)

    Madsen, Kaj; NA NA NA Olesen, Dorte

    Proceedings and the Third International Workshop on Applied Parallel Computing in Industrial Problems and Optimization (PARA96)......Proceedings and the Third International Workshop on Applied Parallel Computing in Industrial Problems and Optimization (PARA96)...