Teaching Inpatient[taliem.ir]

Teaching Inpatient Medicine

Molly Harrod, PhD, is a trained medical anthropologist with the VA Ann Arbor Center for Clinical Management Research. She has been involved in numerous qualitative and mixed-methods studies focusing on such topics as clinician communication and teamwork, behavior change, patient safety, and implementation science. In addition, she has trained other health researchers in qualitative methods including semi-structured interviewing and the use of observation in research.
Suicide Among[taliem.ir]

Suicide Among Diverse Youth

Adolescent suicide is the most tragic experience for any society. The sudden loss of beautiful memories, a bright future, and growth of the individual and family is jarring and appalling. In 2012, suicide became the second leading cause of death in adolescents aged 15–24 years after unintended accidents and followed by homicide. In this age group, the deaths caused by suicide alone are greater than the combined deaths caused by cancer, heart disease, influenza, pneumonia, diabetes mellitus, human immunodefciency virus, and stroke . This is a remarkable increase from 1987 to 1997, when suicide was the third leading cause of death among adolescents 10–19 years old . This increase in the rate of suicide from the third leading cause of death to the second disproportionately impacts youth of ethnic/racial minority background. The rate of suicide increased from 1999 to 2014 in non-Hispanic White (NHW) 15–24 years old increased by 59% and by 17% in females and males, respectively. By comparison, among Hispanics, the increase was 89% and 16% among females and males, respectively. Additionally, there is an alarming rate of 35% increase among Asian males from 1999 to 2014 in the same age group . Figure 1.1 shows suicide deaths among youths as a function of gender and ethnicity . The group with highest risk is American Indian/Alaskan Native (AI/AN) adolescent males, while the lowest risk group is African-American (AA) females.
Semantic web service discovery system for road traffic information[taliem.ir]

Semantic web service discovery system for road traffic information services

We describe a multi-agent platform for a traveller information system, allowing travellers to find the road traffic information web service (WSs) that best fits their requirements. After studying existing proposals for discovery of semantic WS, we implemented a hybrid matching algorithm, which is described in detail here. Semantic WS profiles are annotated semantically as an OWL-S and also the traveller request is represented as a OWL-S profile. The algorithm assigns different weights and measures to each advertised WS profile parameter, depending on their relevance, type and nature. To do this we have extended Paolucci’s Algorithm and adapted it to our scenario. We have added new similarity measures, in particular, the use of the ‘sibling’ relationship, to improve the recall, allowing relevant services to be discovered by the users yet not retrieved by other algorithms. Although we have increased the similarity concept relations, we have improved the run-time using a pre-process filter step that reduces the set of potentially useful WS. This improves the scalability of the semantic matching algorithm.
HISC A computer architecture using operand descriptor[taliem.ir]

HISC: A computer architecture using operand descriptor

Computing has been evolved from number crunching to today’s cloud. Data are no longer numbers but information which needs to be appropriately guarded and easily transportable, but the original von Neumann instruction model does not support them architecturally. This led us to start a new architecture named HISC (High-level Instruction Set Computer), to attach attributes to individual operand on instruction for effective and efficient processing of today’s computing. HISC instruction consists of an operation code (opcode), and an index to source or destination operand referenced by an operand descriptor, which contains value and attributes for the operand. The value and attributes can be accessed and processed in parallel with execution stages, introducing zero or low clock cycle overheads. Object-oriented programming (OOP) requires strict access control for the data. The JAVA model, jHISC, executes Java object-oriented program not only faster than software JVMs but has less cycles-per-instruction than other hardware Java processors. We also propose future extensions for operand descriptor beyond OOP.
Stability analysis of heuristic dynamic programming algorithm[taliem.ir]

Stability analysis of heuristic dynamic programming algorithm for nonlinear systems

In this paper, a value-iteration based heuristic dynamic programming (HDP) algorithm is developed to solve the optimal control for the continuous time affine nonlinear systems. First, a rigorous convergence proof of the HDP algorithm is given. Second, stability issues of the HDP algorithm for nonlinear systems are investigated. It is commonly believed that the main drawback of the HDP algorithm is that only the limit function of the iterative control sequence is proved to be stabilized, thus infinite iterations are executed. To confront this problem, we present a novel stability result for the HDP algorithm, which indicates that the resulting iterative control laws after finite iterations can guarantee the closed-loop stability. A similar stability result is also obtained for the discrete time nonlinear systems. Therefore, the practicality of the HDP algorithm is greatly improved. Single neural network (NN) structure is employed to implement the algorithm. It should be pointed that the algorithm can be implemented without knowing the internal dynamics of the systems. Finally, two numerical examples are given to demonstrate the effectiveness of the developed methods.
An examination of the relation between architecture and compiler[taliem.ir]

An examination of the relation between architecture and compiler

The interactions between the design of a computer's instruction set and the design of compilers that generate code for that computer have serious implications for overall computational cost and efficiency. This article, which investigates those interactions, should ideally be based on comprehensive data; unfortunately, there is a paucity of such information. And while there is data on the use of instruction sets, the relation of this data to compiler design is lacking. This is, therefore, a frankly personal statement, but one which is based on extensive experience. My colleagues and I are in the midst ofa research effort aimed at automating the construction of productionquality compilers. (To limit the scope of what is already an ambitious project, we have considered only algebraic languages and conventional computers.) In brief, unlike many compiler- compiler efforts of the past, ours involves automatically generating all of the phases of a compiler-including the optimization and code generation phases found in optimizing compilers. The only input to this generation process is a formal definition of the source language and target computer. The formulation of compilation algorithms that, with suitable parameters, are effective across a broad class of computer architectures has been fundamental to this research. In turn, finding these algorithms has led us to critically examine many architectures and the problems they pose. Much of the opinion that follows is based on our experiences in trying to do this, with notes on the difficulties we encountered.
DISTRIBUTED SYSTEMS[taliem.ir]

DISTRIBUTED SYSTEMS PRINCIPLES AND PARADIGMS

Q: An alternative definition for a distributed system is that of a collection of independent computers providing the view of being a single system, that is, it is completely hidden from users that there even multiple computers. Give an example where this view would come in very handy. A: What immediately comes to mind is parallel computing. If one could design programs that run without any serious modifications on distributed systems that appear to be the same as nondistributed systems, life would be so much easier. Achieving a single-system view is by now considered virtually impossible when performance is in play. Q: What is the role of middleware in a distributed system? A: To enhance the distribution transparency that is missing in network operating systems. In other words, middleware aims at improving the single-system view that a distributed system should have. 3. Q: Many networked systems are organized in terms of a back office and a front office. How does organizations match with the coherent view we demand for a distributed system? A: A mistake easily made is to assume that a distributed system as operating in an organization, should be spread across the entire organization. In practice, we see distributed systems being installed along the way that an organization is split up. In this sense, we could have a distributed system supporting backoffice procedures and processes, as well as a separate front-office system. Of course, the two may be coupled, but there is no reason for letting this coupling be fully transparent.
Advanced Applications of Neural Networks and[taliem.ir]

Advanced Applications of Neural Networks and Artificial Intelligence: A Review

Artificial Neural Network is a branch of Artificial intelligence and has been accepted as a new computing technology in computer science fields. This paper reviews the field of Artificial intelligence and focusing on recent applications which uses Artificial Neural Networks (ANN‟s) and Artificial Intelligence (AI). It also considers the integration of neural networks with other computing methods Such as fuzzy logic to enhance the interpretation ability of data. Artificial Neural Networks is considers as major soft-computing technology and have been extensively studied and applied during the last two decades. The most general applications where neural networks are most widely used for problem solving are in pattern recognition, data analysis, control and clustering. Artificial Neural Networks have abundant features including high processing speeds and the ability to learn the solution to a problem from a set of examples. The main aim of this paper is to explore the recent applications of Neural Networks and Artificial Intelligence and provides an overview of the field, where the AI & ANN‟s are used and discusses the critical role of AI & NN played in different areas.
Modelling Hardware Verification Concerns Specified in the[taliem.ir]

Modelling Hardware Verification Concerns Specified in the e Language: An Experience Report

e is an aspect-oriented hardware verification language that is widely used to verify the design of electronic circuits through the development and execution of testbenches. In recent years, the continued growth of the testbenches developed at Infineon Technologies has resulted in their becoming difficult to understand, maintain and extend. Consequently, a decision was taken to document the testbenches at a higher level of abstraction. Accordingly, we attempted to model our legacy test suites with an existing aspect-oriented modelling approach. In this paper we describe our experience of applying Theme/UML, an aspectoriented modelling approach, to the representation of aspectoriented testbenches implemented in e. It emerged that the common aspect-oriented concepts supported by Theme/UML were not sufficient to adequately represent the e language, primarily due to e’s dynamic, temporal nature. Based on this experience we propose a number of requirements that must be addressed before aspect-oriented modelling approaches such as Theme/UML are capable of representing aspect-oriented systems implemented in e.
Database KID - an algorithm for fast and efficient text mining[taliem.ir]

Database KID – an algorithm for fast and efficient text mining used to automatically generate a database containing kinetic information of enzymes

The amount of available biological information is rapidly increasing and the focus of biological research has moved from single components to networks and even larger projects aiming at the analysis, modelling and simulation of biological networks as well as large scale comparison of cellular properties. It is therefore essential that biological knowledge is easily accessible. However, most information is contained in the written literature in an unstructured way, so that methods for the systematic extraction of knowledge directly from the primary literature have to be deployed. Description: Here we present a text mining algorithm for the extraction of kinetic information such as KM, Ki, kcat etc. as well as associated information such as enzyme names, EC numbers, ligands, organisms, localisations, pH and temperatures. Using this rule- and dictionary- based approach, it was possible to extract 514,394 kinetic parameters of 13 categories (KM, Ki, kcat, kcat/KM, Vmax, IC50, S0.5, Kd, Ka, t1/2, pI, nH, specific activity, Vmax/KM) from about 17 million PubMed abstracts and combine them with other data in the abstract. A manual verification of approx. 1,000 randomly chosen results yielded a recall between 51% and 84% and a precision ranging from 55% to 96%, depending of the category searched. The results were stored in a database and are available as "KID the KInetic Database" via the internet.