463 research outputs found
Recommended from our members
Novel, Inexpensive Portable Respiratory Protection Unit (PRPU) for Healthcare Workers
Introduction: Given concern for increased aerosolization during intubation of patients with severe acute respiratory syndrome coronavirus, we sought to create a portable, inexpensive, and easily constructed device to help protect healthcare workers.Methods: A respiratory protection unit can be constructed in approximately 30 minutes and for less than 50 United States dollars in materials, using polyvinylchloride pipe and automobile collision wrap.Conclusion: This device provides possible increased protection during video laryngoscopy and can easily be replicated
pony - The occam-pi Network Environment
Although concurrency is generally perceived to be a `hard' subject, it can in fact be very simple --- provided that the underlying model is simple. The occam-pi parallel processing language provides such a simple yet powerful concurrency model that is based on CSP and the pi-calculus. This paper presents pony, the occam-pi Network Environment. occam-pi and pony provide a new, unified, concurrency model that bridges inter- and intra-processor concurrency. This enables the development of distributed applications in a transparent, dynamic and highly scalable way. The first part of this paper discusses the philosophy behind pony, explains how it is used, and gives a brief overview of its implementation. The second part evaluates pony's performance by presenting a number of benchmarks
Process-Oriented Collective Operations
Distributing process-oriented programs across a cluster of machines requires careful attention to the effects of network latency. The MPI standard, widely used for cluster computation, defines a number of collective operations: efficient, reusable algorithms for performing operations among a group of machines in the cluster. In this paper, we describe our techniques for implementing MPI communication patterns in process-oriented languages, and how we have used them to implement collective operations in PyCSP and occam-pi on top of an asynchronous messaging framework. We show how to make use of collective operations in distributed processoriented applications. We also show how the process-oriented model can be used to increase concurrency in existing collective operation algorithms
Vulnerability anti-patterns:a timeless way to capture poor software practices (Vulnerabilities)
There is a distinct communication gap between the software engineering and cybersecurity communities when it comes to addressing reoccurring security problems, known as vulnerabilities. Many vulnerabilities are caused by software errors that are created by software developers. Insecure software development practices are common due to a variety of factors, which include inefficiencies within existing knowledge transfer mechanisms based on vulnerability databases (VDBs), software developers perceiving security as an afterthought, and lack of consideration of security as part of the software development lifecycle (SDLC). The resulting communication gap also prevents developers and security experts from successfully sharing essential security knowledge. The cybersecurity community makes their expert knowledge available in forms including vulnerability databases such as CAPEC and CWE, and pattern catalogues such as Security Patterns, Attack Patterns, and Software Fault Patterns. However, these sources are not effective at providing software developers with an understanding of how malicious hackers can exploit vulnerabilities in the software systems they create. As developers are familiar with pattern-based approaches, this paper proposes the use of Vulnerability Anti-Patterns (VAP) to transfer usable vulnerability knowledge to developers, bridging the communication gap between security experts and software developers. The primary contribution of this paper is twofold: (1) it proposes a new pattern template – Vulnerability Anti-Pattern – that uses anti-patterns rather than patterns to capture and communicate knowledge of existing vulnerabilities, and (2) it proposes a catalogue of Vulnerability Anti-Patterns (VAP) based on the most commonly occurring vulnerabilities that software developers can use to learn how malicious hackers can exploit errors in software
Using multiple GPUs to accelerate string searching for digital forensic analysis
String searching within a large corpus of data is an important component of digital forensic (DF) analysis techniques such as file carving. The continuing increase in capacity of consumer storage devices requires corresponding im-provements to the performance of string searching techniques. As string search-ing is a trivially-parallelisable problem, GPGPU approaches are a natural fit – but previous studies have found that local storage presents an insurmountable performance bottleneck. We show that this need not be the case with modern hardware, and demonstrate substantial performance improvements from the use of single and multiple GPUs when searching for strings within a typical forensic disk image
To boldly go:an occam-π mission to engineer emergence
Future systems will be too complex to design and implement explicitly. Instead, we will have to learn to engineer complex behaviours indirectly: through the discovery and application of local rules of behaviour, applied to simple process components, from which desired behaviours predictably emerge through dynamic interactions between massive numbers of instances. This paper describes a process-oriented architecture for fine-grained concurrent systems that enables experiments with such indirect engineering. Examples are presented showing the differing complex behaviours that can arise from minor (non-linear) adjustments to low-level parameters, the difficulties in suppressing the emergence of unwanted (bad) behaviour, the unexpected relationships between apparently unrelated physical phenomena (shown up by their separate emergence from the same primordial process swamp) and the ability to explore and engineer completely new physics (such as force fields) by their emergence from low-level process interactions whose mechanisms can only be imagined, but not built, at the current time
Understanding tissue morphology: model repurposing using the CoSMoS process
We present CoSMoS as a way of structuring thinking on how to reuse parts of an existing model and simulation in a new model and its implementation. CoSMoS provides a lens through which to consider, post-implementation, the assumptions made during the design and implementation of a software simulation of physical interactions in the formation of vascular structures from endothelial cells. We show how the abstract physical model and its software implementation can be adapted for a different problem: the growth of cancer cells under varying environmental perturbations. We identify the changes that must be made to adapt the model to its new context, along with the gaps in our knowledge of the domain that must be filled by wet-lab experimentation when recalibrating the model. Through parameter exploration, we identify the parameters that are critical to the dynamic physical structure of the modelled tissue, and we calibrate these parameters using a series of in vitro experiments. Drawing inspiration from the CoSMoS project structure, we maintain confidence in the repurposed model, and achieve a satisfactory degree of model reuse within our in silico experimental system
Reduced-rank spatio-temporal modeling of air pollution concentrations in the Multi-Ethnic Study of Atherosclerosis and Air Pollution
There is growing evidence in the epidemiologic literature of the relationship
between air pollution and adverse health outcomes. Prediction of individual air
pollution exposure in the Environmental Protection Agency (EPA) funded
Multi-Ethnic Study of Atheroscelerosis and Air Pollution (MESA Air) study
relies on a flexible spatio-temporal prediction model that integrates land-use
regression with kriging to account for spatial dependence in pollutant
concentrations. Temporal variability is captured using temporal trends
estimated via modified singular value decomposition and temporally varying
spatial residuals. This model utilizes monitoring data from existing regulatory
networks and supplementary MESA Air monitoring data to predict concentrations
for individual cohort members. In general, spatio-temporal models are limited
in their efficacy for large data sets due to computational intractability. We
develop reduced-rank versions of the MESA Air spatio-temporal model. To do so,
we apply low-rank kriging to account for spatial variation in the mean process
and discuss the limitations of this approach. As an alternative, we represent
spatial variation using thin plate regression splines. We compare the
performance of the outlined models using EPA and MESA Air monitoring data for
predicting concentrations of oxides of nitrogen (NO)-a pollutant of primary
interest in MESA Air-in the Los Angeles metropolitan area via cross-validated
. Our findings suggest that use of reduced-rank models can improve
computational efficiency in certain cases. Low-rank kriging and thin plate
regression splines were competitive across the formulations considered,
although TPRS appeared to be more robust in some settings.Comment: Published in at http://dx.doi.org/10.1214/14-AOAS786 the Annals of
Applied Statistics (http://www.imstat.org/aoas/) by the Institute of
Mathematical Statistics (http://www.imstat.org
Proximate Composition and Consumer Acceptability of Wheat-Soy Composite Rock Cake
Cookies are traditionally made from soft wheat, a cereal, which is cultivated mostly in temperate regions but imported by countries in the tropics with unfavorable climatic conditions to cultivate the cereal. The aim of the study was to determine the proximate composition and consumer acceptability of rock cakes developed from soy flour. Four different products were thus formulated viz., 0%, 20%, 25% and 75% being replaced with soy flour equivalence in each sample. Samples were examined for their proximate composition using AACC, 2000 methods. Sensory evaluation was also conducted under a 7-point hedonic scale, where 1 represented dislike extremely and 7 represented like extremely. Data was analyzed using SPSS v 20 at 95% confidence interval. Proximate composition analysis showed no significant difference between the means of the constituent nutrients measured. However, the proportionate increased percentage fat, fiber and protein; 26+2.45, 2.00+0.28 and 16.80+2.94 respectively, showed the potential effect of soybean flour in the production of rock cakes. The sensory analysis also showed no significant difference at P < 0.05 between the means and according to the hedonic scale evaluation, WSR11, WSR12 and WSR13 composite rock cakes compared to WSR10, the 100% wheat flour rock cake were “moderately liked” and “like very much” that is, between 5.3 to 6.6 by the fifteen semi-trained panelist. In effect, soybean flour could serve as a nutrient fortification raw product component and as well, to be accepted by consumers of pastries. Keywords: Rock cakes, proximate analysis, sensory analysis, consumer acceptability, hedoni
- …