WorldWideScience

Sample records for 301-619-4934 fax e-mail

  1. E-mail marketing

    Jurnečková, Jana

    2014-01-01

    The thesis deals with e-mail marketing. It focuses on identifying factors that affect the behavior of users of e-mail and newsletter subscribers. It evaluates the role of e-mail marketing as a part of communication mix of companies and e-shops, current trends, e-mail campaigns, e-mail marketing software provider. To study the behavior of users of e-mail and newsletter subscribers a questionnaire survey was conducted on a sample of 610 respondents and in-depth interviews (n = 30). Content anal...

  2. E-mail marketing

    Tůmová, Kateřina

    2012-01-01

    The aim of this work is to specify the e-mail marketing and in the practical application to evaluate the pros and cons of e-mail marketing as a tool of targeted marketing communication.Based on personal interviews with representatives of the company was described their existing e-mail marketing.Through the survey it was found, how customers perceive the company's e-mail marketing.Based on the survey, changes were proposed at the end of the thesis.

  3. E-mail: Outlook Express

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu layanan Internet yang sangat penting adalah electronic mail atau sering hanya disebut sebagai e-mail. Untuk menggunakan e-mail, diperlukan piranti lunak khusus supaya pengguna dapat mengirim dan menerima e-mail. Jenis piranti lunak e-mail diantaranya adalah Outlook Express yang merupakan satu paket yang didistribusikan bersama Internet Explorer versi 4. Piranti lunak ini dijalankan pada PC yang mempunyai sistem operasi Windows 95 atau 98. Jenis piranti lunak e-mail yang lain adalah Eudora, Pegasus dan sebagainya. Bahkan ada yang diintegrasikan dengan Web Browser (alat untuk menelusuri situs Web misalnya IE,dan Netscape.Sebagai layaknya pelayanan pos, maka setiap pengguna e-mail mempunyai alamat tertentu yang tidak mungkin dipunyai oleh pengguna lainnya diseluruh dunia. Untuk keperluan pendistribusian, maka e-mail mempunyai semacam kantor pos yang ditempatkan dalam sebuah komputer server (mail server atau sering disebut sebagai host. 

  4. Business e-mail communication

    Bengin Senka

    2015-01-01

    Full Text Available This paper presents a discourse analysis in the business e-mail communication with the aim of determining formal and informal linquistic characteristics. Researched corpus has been based on 148 e-mails exchanged between a manager employed in a marketing agency and his clients. The research is based on Speech Act Theory and Theory of Politeness. It has been found that the analyzed business e-mail correspondence is mostly characterized as informal, even with the characteristics of colloquial communication, unlike the expected characteristics of formal business style.

  5. DETEKSI E-MAIL PALSU DENGAN MEMPERGUNAKAN HEADER E-MAIL

    Muhammad Didik Rochmad Wahyudi

    2009-01-01

    E-mail is a medium of communication to send and receive messages. As one of the media that is most commonly used to exchange information, e-mail is vulnerable to security threats. One of the security threat to e-mail is the aspect of the authenticity of e-mail received. Habits of users who receive e-mail read directly and trust where it came from the e-mail and any contents of the e-mail. E-mail that was sent using certain technique, can manipulate the original e-mail. Recipient of e-mail wil...

  6. Narrative E-Mail-Supervision

    Elisabeth Goebel-Krayer

    2007-09-01

    Full Text Available Online-Beratung In der Praxis der E-Mail-Supervision taucht immer wieder die Frage nach einer geeigneten Methode auf. Wie kann aufgrund des lediglich zur Verfügung stehenden Textes ein Antwortschreiben verfasst werden, das doch beratenden Charakter haben soll? Mit der narrativen E-Mail-Supervision wird nicht nur eine Methode vorgestellt, mit der es möglich ist, anhand des Textes die Sicht der SupervisandInnen zu rekonstruieren. Narrative E-Mail-Supervision ermöglicht es darüber hinaus, das berufliche Handeln in besonderer Weise zu reflektieren. Die SupervisandInnen werden mit Hilfe offener Fragestellungen dazu angeregt, von ihrem beruflichen Alltag Erzählungen aufzuschreiben. Dieses erzählende Schreiben wiederum führt dazu, dass die SupervisandInnen Situationen erneut erleben und aus der gegenwärtigen Perspektive ihr Handeln (neu bewerten. Die SupervisandInnen werden im Schreiben sich selbst zu SupervisorInnen.

  7. Netiquette: e-mail for group practices.

    O'Brien, Jennifer A

    2007-01-01

    E-mail is a relatively new tool in business and communication, and it has unique nuances. Effective use of e-mail and its features can enhance performance, interaction, even morale. Misuse of e-mail can be a legal liability and damage relationships within your practice. This article provides a guide to optimizing the use of e-mail within your practice. PMID:17425016

  8. Long E-mails and Internet Connections

    Merciadri, Luca

    2009-01-01

    Fetching e-mails is a daily task. However, when an e-mail size overcomes a given threshold, e-mail communication becomes more difficult, because slow. This is principally due to the outgoing speed of cheap Internet connections. We propose here a mechanism which limits this problem.

  9. Management and Archiving e-mail Messages in Governmental Organization

    Ashraf Mohamed A.Mohsen

    2006-06-01

    Full Text Available The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  10. Management and Archiving e-mail Messages in Governmental Organization

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  11. E-Mail in International Negotiation

    Bülow, Anne Marie

    2009-01-01

    This paper investigates the advantages and disadvantages of the use of e-mail to obtain agreement between two parties with overlapping but also conflicting interests. The literature on Media Richness suggests that e-mail is too lean to facilitate agreement; but all supporting evidence stems from homogenous populations. This paper, however, starts from the hypothesis that in connection with lingua franca interaction, the text format provides advantages for parties that need to think how to phr...

  12. Troubleshooting Requests e-mail Confirmation

    TS Department

    2004-01-01

    In an ongoing effort to improve quality of the repair requests, a new e-mail confirmation automatic system will be implemented starting from the 21st October. All repair requests transmitted to the TCR (72201) or the FM Helpdesk (77777) will be confirmed in an e-mail to the requestor, provided that the latter has a valid e-mail address in the HR database. The e-mail will contain a reference number, a brief description of the problem, the location and a contact where more information can be obtained. A second e-mail will be sent when the processing of the repair request is finished. We hope that this initiative will improve the transparency and quality of our service. Helpdesk Troubleshooting Requests (reminder) We remind you that all the repair requests and other communication concerning the CERN machine buildings have to be transmitted to the TCR via 72201, whereas the ones concerning tertiary buildings are handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equ...

  13. E-mail security a pocket guide

    Furnell, Steven

    2010-01-01

    This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.

  14. Who Owns Your E-mail?

    Panepinto, Joe

    1995-01-01

    Examines recent findings that could influence the use of e-mail on university campuses. National privacy legislation and the inviolability of student records are discussed. It is concluded that more effective safeguards are necessary, and that the current steps are inadequate for the protection of students' rights. (Author/LRW)

  15. E-mail to SMS service change

    IT Department

    2010-01-01

    If you have a CERN e-mail account, you have probably already used one of the popular services that CERN’s IT Department offers to CERN users: the mail2SMS service. It allows any CERN e-mail account holder to send short messages (SMS) free of charge to CERN GSM phone numbers. Further to recent negotiations with our GSM operator, this service has been extended. It is now possible to send short messages free of charge to any Swiss mobile number. This extension of service aims at replacing the similar service that was made available by SWITCH(1) to CERN users (address: mobilenumber@sms.switch.ch). Because of repeated abuse, this service will be definitively stopped for CERN users on 15th January 2010. Please keep in mind that CERN’s e-mail to SMS service still has some restrictions: messages can only be sent from CERN mail accounts, and not from personal ones, such as GMAIL, MSN, Yahoo; the maximum length of the message is 160 characters (standard maximum SMS length); and only Swiss mobile...

  16. Fluctuation in e-mail sizes weakens power-law correlations in e-mail flow

    Matsubara, Yoshitsugu; Tadaki, Shin-ichi

    2013-01-01

    Power-law correlations have been observed in packet flow over the Internet. The possible origin of these correlations includes demand for Internet services. We observe the demand for e-mail services in an organization, and analyze correlations in the flow and the sequence of send requests using a Detrended Fluctuation Analysis (DFA). The correlation in the flow is found to be weaker than that in the send requests. Four types of artificial flow are constructed to investigate the effects of fluctuations in e-mail sizes. As a result, we find that the correlation in the flow originates from that in the sequence of send requests. The strength of the power-law correlation decreases as a function of the ratio of the standard deviation of e-mail sizes to their average.

  17. How to Use E-Mails for Business

    N.J.Stirk

    2004-01-01

    @@ E-mail is a quick and convenient way of communicating. It is faster than a letter and often more convenient than a telephone call. You are probably used to exchanging e-mail with friends using highly informal language.In this article you will learn more about the form and language of e-mail in professional contexts.

  18. Teleradiology applications with DICOM-e-mail

    Weisser, G.; Ruggiero, S.; Runa, A. [University Hospital Mannheim, Department of Clinical Radiology, Mannheim (Germany); Engelmann, U. [German Cancer Research Center, Division of Medical and Biological Informatics, Heidelberg (Germany); Schroeter, A. [CHILI GmbH, Heidelberg (Germany); Baur, S. [Curagita AG, Heidelberg (Germany); Walz, M. [Medical Office for Quality Assurance in Radiology, Hessen (Germany)

    2007-05-15

    For the connection of several partners to a Dicom-e-mail based teleradiology network concepts were developed to allow the integration of different teleradiology applications. The organisational and technical needs for such an integration were analysed. More than 60 institutions including 23 hospitals in the Rhein-Neckar-Region, Germany were connected. The needed functionality was grouped in six teleradiology applications (emergency consultation, tele-guided examinations, expert consultations, cooperative work, scientific cooperations and homework with on call services) and their technical and organisational needs according to availability, speed of transfer, workflow definitions and data security needs was analysed. For the local integration of teleradiology services the setup and workflow is presented for a standalone teleradiology workstation and a server based teleradiology gateway. The line type needed for different groups of applications and users is defined. The security concept and fallback strategies are laid out, potential security problems and sources of errors are discussed. The specialties for the emergency teleradiology application are presented. The DICOM-e-mail protocol is a flexible and powerful protocol that can be used for a variety of teleradiology applications. It can meet the conditions for emergency applications but is limited if synchronous applications like teleconferences are needed. (orig.)

  19. Teleradiology applications with DICOM-e-mail.

    Weisser, G; Engelmann, U; Ruggiero, S; Runa, A; Schröter, A; Baur, S; Walz, M

    2007-05-01

    For the connection of several partners to a Dicom-e-mail based teleradiology network concepts were developed to allow the integration of different teleradiology applications. The organisational and technical needs for such an integration were analysed. More than 60 institutions including 23 hospitals in the Rhein-Neckar-Region, Germany were connected. The needed functionality was grouped in six teleradiology applications (emergency consultation, tele-guided examinations, expert consultations, cooperative work, scientific cooperations and homework with on call services) and their technical and organisational needs according to availability, speed of transfer, workflow definitions and data security needs was analysed. For the local integration of teleradiology services the setup and workflow is presented for a standalone teleradiology workstation and a server based teleradiology gateway. The line type needed for different groups of applications and users is defined. The security concept and fallback strategies are laid out, potential security problems and sources of errors are discussed. The specialties for the emergency teleradiology application are presented. The DICOM-e-mail protocol is a flexible and powerful protocol that can be used for a variety of teleradiology applications. It can meet the conditions for emergency applications but is limited if synchronous applications like teleconferences are needed. PMID:17031452

  20. Teleradiology applications with DICOM-e-mail

    For the connection of several partners to a Dicom-e-mail based teleradiology network concepts were developed to allow the integration of different teleradiology applications. The organisational and technical needs for such an integration were analysed. More than 60 institutions including 23 hospitals in the Rhein-Neckar-Region, Germany were connected. The needed functionality was grouped in six teleradiology applications (emergency consultation, tele-guided examinations, expert consultations, cooperative work, scientific cooperations and homework with on call services) and their technical and organisational needs according to availability, speed of transfer, workflow definitions and data security needs was analysed. For the local integration of teleradiology services the setup and workflow is presented for a standalone teleradiology workstation and a server based teleradiology gateway. The line type needed for different groups of applications and users is defined. The security concept and fallback strategies are laid out, potential security problems and sources of errors are discussed. The specialties for the emergency teleradiology application are presented. The DICOM-e-mail protocol is a flexible and powerful protocol that can be used for a variety of teleradiology applications. It can meet the conditions for emergency applications but is limited if synchronous applications like teleconferences are needed. (orig.)

  1. Techniques and Tools for Forensic Investigation of E-mail

    M. Tariq Banday

    2011-12-01

    Full Text Available E-mail has emerged as the most important application on Internet for communication of messages, delivery of documents and carrying out of transactions and is used not only from computers but many other electronic gadgets like mobile phones. Over a period of year’s e-mail protocols have been secured through several security extensions and producers, however, cybercriminals continue to misuse it for illegitimate purposes by sending spam, phishing e-mails, distributing child pornography, and hate emails besides propagating viruses, worms, hoaxes and Trojan horses. Further, Internet infrastructure misuse through denial of service, waste of storage space and computational resources are costing everyInternet user directly or indirectly. It is thus essential to identify and eliminate users and machines misusing e-mail service. E-mail forensic analysis is used to study the source and content of e-mail message as evidence, identifying the actual sender, recipient and date and time it was sent, etc. to collect credible evidence to bring criminals to justice. This paper is an attempt to illustrate e-mail architecture from forensics perspective. It describes roles and responsibilities of different e-mail actors and components, itemizes meta-data contained in e-mail headers, and lists protocols and ports used in it. It further describes various tools and techniques currently employed to carry out forensic investigation of an e-mail message.

  2. The Discourse of all.department e-mails

    Pogner, Karl-Heinz; Søderberg, Anne-Marie

    2001-01-01

    which social relations are expressed and constructed in the e-mail discourse and how the organizational world of the department is represented in the all.department e-mails. Our analyses of the e-mails show that the managerial voices are dominant as well as the perception of e-mail communication...... as a tool of information transmission. However, a few e-mails sent by employees without specific organizational functions differ significantly from the `managerial' mails. In these mails employee voices articulate a latent and unfulfilled need for a community and a forum for dialogue. The usage of the all.......department e-mail communication is also related to the ongoing change of managing university departments in Denmark....

  3. Fluctuation in e-mail sizes weakens power-law correlations in e-mail flow

    Matsubara, Yoshitsugu; Hieida, Yasuhiro; Tadaki, Shin-ichi

    2013-01-01

    Power-law correlations have been observed in packet flow over the Internet. The possible origin of these correlations includes demand for Internet services. We observe the demand for e-mail services in an organization, and analyze correlations in the flow and the sequence of send requests using a Detrended Fluctuation Analysis (DFA). The correlation in the flow is found to be weaker than that in the send requests. Four types of artificial flow are constructed to investigate the effects of flu...

  4. Techniques and Tools for Forensic Investigation of E-mail

    M. Tariq Banday

    2011-01-01

    E-mail has emerged as the most important application on Internet for communication of messages, delivery of documents and carrying out of transactions and is used not only from computers but many other electronic gadgets like mobile phones. Over a period of year’s e-mail protocols have been secured through several security extensions and producers, however, cybercriminals continue to misuse it for illegitimate purposes by sending spam, phishing e-mails, distributing child pornography, and ha...

  5. E-MAIL USAGE BEHAVIOR AT WORK: THE PORTUGUESE CASE

    Rui Filipe Cerqueira Quaresma; Sílvia Paula Rosa da Silva; Cristina Galamba Marreiros

    2013-01-01

    E-mail is one of the most used information and communication technologies by organizations. This technology has an enormous potential to transform the way organizations and their processes work. E-mail can speed-up processes and transaction, facilitate information exchange, improve quality, increase employees speed and productivity, and strengthen the relationship with stakeholders. The present paper analysis e-mail usage behavior at work, through empirical data collected in Portugal. The maj...

  6. ssignment's assessment and management of university students via e- mail

    Mostafa Ghaderi

    2013-12-01

    Full Text Available E-mail is one of online teaching means that has prospered recently in universities. That is to say that there is a short term background of using E-mail for assignments’ management and assessment. In this study, I investigated different dimensions of E- mail applicability and usefulness for assessing assignments and its strength and weaknesses among fresh students. For this intention, I based my case study on 158 students in three courses and one professor during a semester. By monitoring case studies and observing self-report checklists I investigated the behaviours of students and their E-mails. The results showed that speed of transmission and giving feedback is much higher than the other current methods. Possibility of electronic search for assignments, giving feedback to students without time and place restriction, group feedbacks and guidance, and reinforcement of teaching – learning in informal times are advantages of using E-mail as a tool for assignment management. However, using E- mail has some limitations, too. Restricting communication to writing, prolonged individual feedbacks, repetitive E- mails, misunderstanding and technical problems among novice students are weaknesses of using e- mail for assessing assignments. At the end I’ll offer some recommendations to make E- mail an effective means for assignments’ assessment.

  7. E-MAIL USAGE BEHAVIOR AT WORK: THE PORTUGUESE CASE

    Rui Filipe Cerqueira Quaresma

    2013-04-01

    Full Text Available E-mail is one of the most used information and communication technologies by organizations. This technology has an enormous potential to transform the way organizations and their processes work. E-mail can speed-up processes and transaction, facilitate information exchange, improve quality, increase employees speed and productivity, and strengthen the relationship with stakeholders. The present paper analysis e-mail usage behavior at work, through empirical data collected in Portugal. The majority of users reveal adequate e-mail usage behavior, in spite of some situations that might prove to be problematic to organizations.

  8. Teacher Talk on E-Mail. Current Conversations.

    Whitaker, Elaine; Hill, Elaine

    1996-01-01

    A high school and a university teacher converse via e-mail concerning their cooperative project in electronic literacy. The conversation highlights the frustrations of system crashes, student successes and failures, and the beginning of one teacher's dissertation. References to technology include experiences with e-mail, an LCD panel, and closed…

  9. E-Mail at Work: Is it Really Private?

    Rosenblum, Cindy

    This paper examines the controversy of e-mail privacy in the workplace. Once an employee uses an e-mail system that belongs to the employer, according to recent case law, their privacy rights are forfeited. Employers will now have to start creating policies to safeguard themselves from expensive litigation, and employees will have to be more…

  10. Technology Corner: Analysing E-mail Headers For Forensic Investigation

    M. Tariq Banday

    2011-06-01

    Full Text Available Electronic Mail (E-Mail, which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions.  A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies of clients and gateways, etc. Cyber forensic e-mail analysis is employed to collect credible evidence to bring criminals to justice. This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Further, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions.

  11. Save our inboxes! Use e-mail wisely

    Achintya Rao

    2013-01-01

    At CERN, with collaborators all over the world, e-mail is inevitably the primary means of communication: we use it for everything from coordinating projects to organising lunches. But e-mail can also be one of the most inefficient means of communication we have! Here's how to fix it.   Let’s get straight to the point: we receive too many e-mails. Think about all the e-mails that you deleted without a second thought. Think about the times you’ve unnecessarily been in CC. Take a look at the unread e-mails sitting in your inbox at this very moment, ones that you have no intention of ever looking at. You can, however, tame this overload with a few simple measures and turn e-mail into an important communication and productivity tool. Many recommendations for improving e-mail etiquette suggest an abrasive approach riddled with bullet points. In a vastly multi-cultural setting such as CERN, however this approach may fail. So, here are a few dos and don’ts based o...

  12. Consumers and Computer Software Advertisements in Spam E - mail

    Joshua Fogel

    2012-08-01

    Full Text Available Spam e - mail inundates inboxes. Little is known about consumer responses to spam e - mail advertising computer software products. We conducted a study among 200 college students to determine variables associated both with opening/reading spam e mail about computer software products and w ith purchasing these items. With regard to opening/reading, we found that increasing age (OR:1.22, 95% CI:1.02, 1.47; p=0.03, previously responding to fraudulent e - mail (OR:2.91, 95% CI:1.31, 6.46; p=0.01, and wanting to learn more information online ab out computer software (OR:1.72, 95% CI:1.12, 2.64; p=0.01 had significant associations. With regard to purchasing, we found that wanting to learn more information online about computer software had a significant association (OR:2.47, 95% CI:1.32, 4.60; p= 0.01 and previously responding to fraudulent e - mail approached significance (OR:2.55, 95% CI:0.99, 6.58; p=0.052. E thical e - mail advertisers would benefit when advertising computer software products to include in the e - mail relevant information about l e arn ing more information online about computer so ftware. This can encourage the recipient to click - through and purchase the advertised computer software product.

  13. E-mail Interaction in Foreign Language Learning

    任艳

    2007-01-01

    E-mail has been implemented in foreign langnage learning and teaching for many years.It is widely approved that language learners'communicative competence and intereuhural competence can be developed through e-mail interaction in spite of the problems and difficulties existing in the process of designing and carrying out ofan e-mail project.Hence,more and more language teachers from different countries are trying to search for the possibilities of integrating email interaction in their teaching context so as to improve the language-learning environment.

  14. Toward Parameterisation of E-mail Mediated Communication

    Mirta Galesic; Josip Stepanic

    2003-01-01

    E-mail mediated communication rapidly intensifies, both in quantity and quality and so does the need to understand its psycho-social context. In this article we formulated a model of psycho-social elements of the process of receiving an e-mail. The corresponding technique starts by recognising the relevant states of a human receiver and a received e-mail. The states are parameterised, paying special attention to the description of receiver's emotional states, as the event of receiving is more...

  15. IntegraTUM Teilprojekt E-Mail: Rezentralisierung von E-Mail-Services

    Diehn, Max; Haarer, Ado; Schreiner, Alexander; Storz, Michael

    Das Teilprojekt E-Mail hatte ursprünglich die Aufgabe einen zentralen Mailservice mit verteilter Administration der Mailadressen für die TUM aufzubauen und diesen durch Anti-Spam- und Anti-Viren-Maßnahmen zu schützen. Auf diesen Mailservice sollten sowohl die am LRZ gehosteten Maildomains als auch die vielen lokal betriebenen Mailserver - soweit von deren Betreibern gewünscht - migriert werden. Neben einigen Rückschlägen und Hindernissen kam es im Laufe des Projektes auch zu einer Änderung der Anforderungen, sodass zum Ende des Projektes statt eines reinen Mailsystems ein Doppelsystem mit "shared SMTP address space" bestehend aus einem klassischen Message-Store mit POP/IMAP-Zugriff auf Basis von Postfix + Dovecot und einem Groupware-System auf Basis von Microsoft Exchange in Produktion ging, wobei jeder Mitarbeiter und Student der TUM wählen kann, auf welchem der beiden Systeme sich seine Mailbox befindet.

  16. Servicii de referinţe prin e-mail

    Coravu, Robert

    2000-01-01

    Among the digital reference services category, e-mail reference services have known the most rapid spreading inside the library world. This study analyses the main aspects of e-mail reference services (service parameters, elements of a query form, the characteristics of electronic messages sent during the reference process). Also, the advantages and disadvantages of this reference services are presented, suggesting a few strategies for rising their efficiency.

  17. Machine Learning Methods for Spam E-Mail Classification

    W. A. Awad; S. M. Elseuofi

    2011-01-01

    The increasing volume of unsolicited bulk e-mail (also known as spam) has generated a need for reliable anti-spam filters. Machine learning techniques now days used to automatically filter the spam e-mail in avery successful rate. In this paper we review some of the most popular machine learning methods (Bayesian classification, k-NN, ANNs, SVMs, Artificial immune system and Rough sets) and of their applicability to the problem of spam Email classification. Descriptions of the algorithms are ...

  18. Discourse strategies in professional e-mail negotiation

    Jensen, Astrid

    2009-01-01

    The purpose of this article is to report on some of the preliminary results of an on-going study on the use of discourse strategies in e-mail negotiation. The analysis aims at showing how relations between the participants develop through the use of specific discourse strategies in their e......-mail communication which covers a period of three months, during which the relationship progresses from initial contact to on-going business. Drawing on Hyland's (2005) concept of metadiscourse combined with Charles' (1996) categories of ‘old and new relationship negotiations', this study provides insights...... into naturally occurring language in an e-mail communication between a Danish Company and its business contact in Taiwan. During the three-month period observed, the frequency in use of interpersonal strategies converges as the relationship progresses towards a more contextually stable and more personalised...

  19. BEWARE OF OPENING ATTACHMENTS IN E-MAIL

    2000-01-01

    Following the recent e-mail viruses you are asked to be cautious when opening e-mail attachments on your PC. Attachments that are apparently harmless might hide active content producing nasty effects as soon as they are opened. Some of these so called 'Trojan horses' can conceal themselves in very attractive pictures and funny slide shows.On the PC Windows infrastructure, CERN runs software to protect users from known viruses, but new ones can sometimes arrive before our software recognises them. They can enter your system when you open an attachment. To remove them it may be necessary to re-install the Windows software on your PC.

  20. Machine Learning Methods for Spam E-Mail Classification

    W.A. Awad

    2011-02-01

    Full Text Available The increasing volume of unsolicited bulk e-mail (also known as spam has generated a need for reliable anti-spam filters. Machine learning techniques now days used to automatically filter the spam e-mail in avery successful rate. In this paper we review some of the most popular machine learning methods (Bayesian classification, k-NN, ANNs, SVMs, Artificial immune system and Rough sets and of their applicability to the problem of spam Email classification. Descriptions of the algorithms are presented,and the comparison of their performance on the SpamAssassin spam corpus is presented.

  1. Hesitative introduction of E-mail consultations in general practice.

    Verheij, R.; Ton, C.; Tates, K.

    2008-01-01

    Introduction: The Dutch Council for Public Health and Health Care reported in 2005 that 70% of internet users would want to have the opportunity to consult their own general practitioner by e-mail [1]. Since January 1, 2006, general practitioners in the Netherlands are reimbursed 4.50 euro for e-mail consultations, on the condition that it does not concern a new health problem and that it substitutes for a normal practice consultation. In this presentation we will investigate how many doctors...

  2. Detecting Threat E-mails using Bayesian Approach

    Banday, M Tariq; Jan, Tariq R; Shah, Nisar A

    2011-01-01

    Fraud and terrorism have a close connect in terms of the processes that enables and promote them. In the era of Internet, its various services that include Web, e-mail, social networks, blogs, instant messaging, chats, etc. are used in terrorism not only for communication but also for i) creation of ideology, ii) resource gathering, iii) recruitment, indoctrination and training, iv) creation of terror network, and v) information gathering. A major challenge for law enforcement and intelligence agencies is efficient and accurate gathering of relevant and growing volume of crime data. This paper reports on use of established Na\\"ive Bayesian filter for classification of threat e-mails. Efficiency in filtering threat e-mail by use of three different Na\\"ive Bayesian filter approaches i.e. single keywords, weighted multiple keywords and weighted multiple keywords with keyword context matching are evaluated on a threat e-mail corpus created by extracting data from sources that are very close to terrorism.

  3. SPAM: Beware of e-mails asking for passwords

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake e-mails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake e-mail message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, but future cases may still occur. Users need to be vigilant regarding any requests for passwords or personal data. Fake e-mails should be immediately deleted. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN IT Department

  4. Keypals--E-mail Leads to New Friends.

    Durost, Dennis D.; Hutchinson, Sue L.

    1997-01-01

    Describes the Keypal Project, a project in which e-mail was introduced in two kindergarten classes with the intent to enrich children's literacy and communication skills and foster long-distance relationships. Found the project had great learning potential and was easily incorporated into constructivist programs which emphasize active learning.…

  5. Ratsuchende von E-Mail-Beratungsdiensten: Entwurf einer Typologie

    Marc Weinhardt

    2010-04-01

    Full Text Available KlientInnen von vier nach dem Prinzip der maximalen Variation ausgewählten E-Mail- Beratungsdiensten wurden mit einem standardisierten Onlinefragebogen zur Internetnutzung, der nachgesuchten Beratung, ihres Persönlichkeitsprofils und soziodemographischen Hintergrundvariablen befragt. Mit Hilfe von Faktoren- und Clusteranalyse konnten vier Gruppen von Ratsuchenden isoliert werden, die sich zu vier KliententInnentypen verdichten lassen.

  6. E-Mail as a Resource in Teacher Education.

    Maarof, Nooreiny

    Use of electronic mail (e-mail) as a resource in a Universiti Kebangsaen Malaysia (UKM) English-as-a-Second-Language (ESL) teacher education course in 1997-98 is described. The second-year undergraduate course, "The Teaching of Reading Skills in an ESL Context," enrolled 115 students with a range of experience with computers. One course project…

  7. PARTIAL IMAGE SPAM E-MAIL DETECTION USING OCR

    V. Sathiya*1 M.Divakar#2 T.S. Sumi*3

    2011-06-01

    Full Text Available Even though there a number of inbuilt E-mail filtering software associated with every e-mailservice providers like Gmail, Yahoo mail they identify only text spam and image spam. As a result they could not detect the mix image spam. So this paper concentrates on identifying and avoiding partial image spam whenever it is received to our email inbox by an unknown source across the Internet.

  8. E-mail Classification using Social Network Information

    Borg, Anton; Lavesson, Niklas

    2012-01-01

    A majority of E-mail is suspected to be spam. Traditional spam detection fails to differentiate between user needs and evolving social relationships. Online Social Networks (OSNs) contain more and more social information, contributed by users. OSN information may be used to improve spam detection. This paper presents a method that can use several social networks for detecting spam and a set of metrics for representing OSN data. The paper investigates the impact of using social network data ex...

  9. Detecting Threat E-mails using Bayesian Approach

    Banday, M. Tariq; Qadri, Jameel A.; Tariq .R. Jan; Shah, Nisar A.

    2011-01-01

    Fraud and terrorism have a close connect in terms of the processes that enables and promote them. In the era of Internet, its various services that include Web, e-mail, social networks, blogs, instant messaging, chats, etc. are used in terrorism not only for communication but also for i) creation of ideology, ii) resource gathering, iii) recruitment, indoctrination and training, iv) creation of terror network, and v) information gathering. A major challenge for law enforcement and intelligenc...

  10. Analyzing E-mail communication of prospective learners

    Anurag SAXENA

    2005-10-01

    Full Text Available Analyzing E-mail communication of prospective learners Vibha JOSHIAnurag SAXENA Reader School of Management IGNOU, New Delhi, INDIA ABSTRACT Today, computer has replaced all means of communication significantly. E-mail is the most popular means of communication through computers. It has vanished the boundaries between the cities, countries and continents. Earlier Studies that used this medium, had shown evidence of higher quality of responses and also significant cost savings feature of this method (mainly for convenience of dispatch for research purposes. In this communication, an attempt has been made to utilize email responses of prospective learners in education discipline based programs offered through open learning system. The inception of this study is linked to the creation of website (http://www.ignou.ac.in/ and availability of information related to all activated and prospective programs of studies, various school of studies, faculty email addresses and faculty vis-à-vis program coordinator in the University. The present study analyzed 65 email responses received from July 2002 to till date by the researcher on her email ID. These respondents got the email ID from the University website and due to their eagerness to attain qualifications in the field of education/guidance/educational management, sent an e-mail to the program coordinator(s. These email responses were analyzed in order to visualize the learner profiles and viability of the ongoing as well as prospective programs of studies. This paper tries to analyze the e-mail responses of the people who either by surfing IGNOU’s website or from other sources came to know about the various programs of studies offered by the School of Education. The study validates that there is an amount of hidden information even in the curiosity of the learners.

  11. Report on Climate Change E-mails Exonerates Scientists

    Showstack, Randy

    2010-07-01

    A new report commissioned by the University of East Anglia (UEA) has largely exonerated climate scientists from the university's Climatic Research Unit (CRU) who wrote a number of controversial e-mail messages that were made public without authorization in November 2009. Critics have argued that the e-mails indicate that scientists had tampered with scientific data—including data related to land station temperatures and temperature reconstructions from tree ring analysis—subverted the peer review process, misused the Intergovernmental Panel on Climate Change (IPCC) process, and withheld data from critics. At a 7 July news conference to release the “Independent climate change e-mails review,” report chair Muir Russell said, “Climate science is a matter of such global importance that the highest standards of honesty, rigor, and openness are needed in its conduct. On the specific allegations made against the behavior of CRU scientists, we find that their rigor and honesty as scientists are not in doubt.” He continued, “In addition, we do not find that their behavior has prejudiced the balance of advice given to policy makers. In particular, we did not find any evidence of behavior that might undermine the conclusions of the IPCC assessments.” Russell is chair of the Judicial Appointments Board for Scotland and formerly was principal and vice-chancellor of the University of Glasgow, in Scotland.

  12. Research on an E-mail Encryption Protocol Based on Quantum Teleportation

    Shufen, Xiao; Yumin, Dong; Hongyang, Ma; Libo, Chen

    2016-07-01

    With the rapid development of information technology (IT), E-mail has become an important communication tool between human beings. Meanwhile, E-mail safety becomes increasingly important because of its universal applications. In order to overcome shortages of classical E-mail encryption, an E-mail encryption protocol based on quantum teleportation was proposed. It makes quantum encryption of E-mails during sending and receiving processes by taking advantages of entanglement and nonclonability of quantum, thus ensuring safety and reliability of E-mail transmission.

  13. Demonstration of an E-mailed Worksite Nutrition Intervention Program

    Gladys Block

    2004-10-01

    Full Text Available Introduction Dietary fat and low fruit and vegetable intake are linked to many chronic diseases, and U.S. population intake does not meet recommendations. Interventions are needed that incorporate effective behavior-change principles and that can be delivered inexpensively to large segments of the population. Methods Employees at a corporate worksite were invited to participate in a program, delivered entirely by e-mail, to reduce dietary fat and increase fruit and vegetable intake. Behavior-change principles underlying the intervention included tailoring to the participant’s dietary lifestyle, baseline assessment and feedback about dietary intake, family participation, and goal setting. Assessment, tailoring, and delivery was fully automated. The program was delivered weekly to participants’ e-mail inboxes for 12 weeks. Each e-mail included information on nutrition or on the relationship between diet and health, dietary tips tailored to the individual, and small goals to try for the next week. In this nonrandomized pilot study, we assessed technical feasibility, acceptability to employees, improvement in Stage of Change, increase in fruit and vegetable consumption, and decrease in fat intake. Results Approximately one third (n = 84 of employees who were offered the 12-week program signed up for it, and satisfaction was high. There was significant improvement in Stage of Change: 74% of those not already at the top had forward movement (P < .001. In addition, results suggest significant increase in fruit and vegetable consumption (0.73 times/day, P < .001 and significant decrease in intake of fat sources (-0.39 times/day, P < .001. Conclusion This inexpensive program is feasible and appears to be effective. A randomized controlled trial is needed.

  14. Consumers with Sexual Performance Problems and Spam E - mail for Sexual Performance Products

    Joshua Fogel; Sam Shlivko

    2009-01-01

    Spam e - mail on sexual health topics arrive in e - mail inboxes. We study consumer responses to spam e - mail that advertise sexual performance products. Participants (n=200) with and without sexual performance problems were asked if they received, opened, and bought products from spam e - mail about sexual performance produ cts in the past year. Comparisons were performed between those with and without sexual performance problems. Psycho...

  15. Communicative In-Betweens of E-mail Communication

    Hansen, Ejvind

    2009-01-01

    In this paper I seek to deconstruct internet-based communication. I highlight Derrida’s focus on the margins and in-betweens of communication, and relate it to the genre of e-mail. I argue (i) that the silence between the dialogic turns becomes more marked, while (ii) the separation of present...... and previous statements becomes less marked. The visibility of the silence between the turns (i) can be a resource for increased awareness of how communicative exchanges are shaped by self-arrangements and -presentations. The dissolution of the separation between present and previous statements (ii) can...

  16. An AIS-Based E-mail Classification Method

    Qing, Jinjian; Mao, Ruilong; Bie, Rongfang; Gao, Xiao-Zhi

    This paper proposes a new e-mail classification method based on the Artificial Immune System (AIS), which is endowed with good diversity and self-adaptive ability by using the immune learning, immune memory, and immune recognition. In our method, the features of spam and non-spam extracted from the training sets are combined together, and the number of false positives (non-spam messages that are incorrectly classified as spam) can be reduced. The experimental results demonstrate that this method is effective in reducing the false rate.

  17. Unsolicited Commercial E-mails : A study of the consumer’s perceptions about unsolicited commercial e-mails and the implications it has for Internet user groups

    Trasobares, Mario; Tretjakova, Anna

    2010-01-01

    The rapid development of Internet technologies has led to the emergence of new communication means. E-mail has become a new powerful tool used by millions with the main purpose of exchanging information. Considering its large scope, marketers have been using the e-mail as an important direct marketing force and it has become a popular choice for many companies. The e-mail has therefore constituted a new form of on-line marketing coined “E-mail marketing”. However, the increasing use of the e-...

  18. The Application of E-Mail to College English Teaching in China

    Wang, Guofeng

    2010-01-01

    With the development of information technology in the past 10 years, e-mail has been widely used in the field of English teaching. This paper, based on an analysis of the ways of using e-mail in college English teaching in China, probes the feasibility and the benefits of application of e-mail to college English teaching.

  19. The Role of E-mail in Organizational Communication

    Lecturer Ph.D. Niculina Vârgolici

    2008-12-01

    Full Text Available The present article aims to briefly describe the advantages of the e-mail communication,the constraints of such communication means, as well as a set of rules which should be complied with inorder to ensure efficient organizational communication. The fact that communication is such a universal,normal, daily and natural can make us forget sometimes about its particular complexity. Every moment,people communicate with one another, meaning they exchange information, and for this they use variousmeans. Electronic message is an invention which makes our life easier, shatters distances and inhibitions,helps us rediscover and open ourselves to others, casts loneliness away, can bring us closer, but also can setus apart, because it has its rules and traps, of which we should be aware. We consider that nowadays knowingthe e-mail related conduit refers to more than simply avoiding long messages written in caps lock, assuch can really make a difference between profit and loss. Communication is indispensable, but we shouldcompare and view any information we receive and send with a critical sight.

  20. Ombuds' corner: Code of Conduct and e-mails

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Luke* holds a key position in the coordination of a large project. He is also a recognized expert in modeling complicated structures. Because of his expertise in the field, he receives a considerable number of e-mails every day which he has trouble responding to in addition to his responsibilities of management and development. Constantly interrupted, he tends to answer his emails quickly, sometimes even in an instinctive way, which leads to somewhat laconic messages. One day he receives an e-mail from Dave* challenging some of the decisions taken by the project’s management. Luke agrees with Dave’s remarks, which seem justified given his own expertise of the su...

  1. A novel approach against E-mail attacks derived from user-awareness based techniques

    Ojha, Gaurav; Tak, Gaurav Kumar

    2012-01-01

    A large part of modern day communications are carried out through the medium of E-mails, especially corporate communications. More and more people are using E-mail for personal uses too. Companies also send notifications to their customers in E-mail. In fact, in the Multinational business scenario E-mail is the most convenient and sought-after method of communication. Important features of E-mail such as its speed, reliability, efficient storage options and a large number of added facilities ...

  2. A Detection Method of FAQ Matching Inquiry E-mails by Automatic Generation of Characteristic Word Groups from Past Inquiry E-mails

    Sakumichi, Yuki; Akiyoshi, Masanori; Samejima, Masaki; Oka, Hironori

    This paper discusses how to detect the inquiry e-mails corresponding to pre-defined FAQs (Frequently Asked Questions). Web-based interactions such as order and registration form on a Web page are usually provided with their FAQ pages for helping a user. However, most users submit their inquiry e-mails without checking such pages. This causes a help desk operator to process lots of e-mails even if some contents match FAQs. Automatic detecting of such e-mails is proposed based on SVM (Support Vector Machine) and specific Jaccard coefficient based on positive and negative already-received inquiry e-mails. Experimental results show its effectiveness, and we also discuss future work to improve our method.

  3. FAX

    Burgoyne, Greig

    2014-01-01

    Greig Burgoyne was an invited artist for this international touring show organised by The Drawing Centre, New York. Artists included David Blandy, Paul Buck, Heman Chong, Jacob Dahl Jurgenson, Marko Mäetamm, Jacopo Miliani, Sladjan Nedeljkovic, Clunie Reid, Martha Rosler, Josef Strau, and Richard Wentworth. The exhibition was guest curated by João Ribas, in collaboration with Carl Slater, and co-organised by The Drawing Center, and Independent Curators International (ICI), New York. ...

  4. E-mail security: mail clients must use encrypted protocols

    2006-01-01

    In the coming weeks, users of mail clients other than Outlook (e.g. Pine, Mozilla, Mac Mail, etc.) may receive an e-mail from Mail-service@cern.ch with instructions to update the security settings of their mail client. The aim of this campaign is to enforce the use of encrypted and authenticated mail protocols in order to prevent the propagation of viruses and protect passwords from theft. As a first step, from 6 June 2006 onwards, access to mail servers from outside CERN will require a securely configured mail client as described in the help page http://cern.ch/mmmservices/Help/?kbid=191040. On this page most users will also find tools that will update their mail client settings automatically. Note that Outlook clients and WebMail access are not affected. The Mail Team

  5. E-mail netiquette for the medical practice employee: 50 do's and don'ts.

    Hills, Laura

    2011-01-01

    E-mail has at one and the same time become a primary communication tool for many medical practice employees and a source of untold frustration, misunderstandings, and stress. This article provides a total of 50 rules (25 do's and 25 don'ts) for e-mail netiquette to help medical practice employees use e-mail more effectively. It offers suggestions about the optimal format of e-mails, tips for writing concise e-mail texts, and guidance about the most pressing e-mail privacy and confidentiality concerns. Medical practice employees can use the practical tips presented in this article to help them save time and use their medical practices' e-mail system more productively and effectively. This article also offers suggestions for creating and using a medical practice e-mail disclaimer statement. It describes the six legal threats a disclaimer statement can prevent and the typical content for such disclaimers. Finally, this article includes guidance about creating and implementing a medical practice e-mail policy and provides an outline of typical e-mail policy content. PMID:22111286

  6. THE DEVELOPMENT OF E-MAIL LITERACY: FROM WRITING TO PEERS TO WRITING TO AUTHORITY FIGURES

    Chi-Fen Emily Chen

    2006-05-01

    Full Text Available Though e-mail has become a common interpersonal communication medium, it does not mean that this medium is used without difficulty. While people can write e-mails to peers in any manner they like, writing e-mails to authority figures requires higher pragmatic competence and critical language awareness of how discourse shapes and reflects power asymmetry in an institutional context. For L2 learners, the challenge of composing this type of e-mail can be greater due not only to their limited linguistic ability but also their unfamiliarity with the target culture's norms and values. To provide a deeper understanding of how an L2 learner develops e-mail literacy in the target language environment, this paper presents a longitudinal case study of a Taiwanese graduate student’s e-mail practice in English during her studies at a U.S. university for two and a half years. Using a critical discourse analysis approach, the study reveals the complexity of an L2 learner’s evolving e-mail practice and struggle for appropriateness, particularly in her e-mail communication with professors. Her development of e-mail literacy is discussed in relation to her evolving understanding of the e-mail medium, changing performance of student identity, increasing knowledge of student-professor interaction and realization of culture-specific politeness.

  7. E-mail Communication in the Management of Gastroenterology Patients: A Review

    Ian Plener; Andrew Hayward; Fred Saibil

    2014-01-01

    E-mail correspondence between physicians and patients can be a useful tool to improve communication efficiency, provide economic and ecological benefits, improve therapeutic interventions and adherence, and enhance self-management. The model of self-management in chronic disease has become an integral component of North American and British medicine. From a practical standpoint, the use of e-mail between physicians and patients can complement the self-management model.E-mail communication has...

  8. Digitale Kommunikation: Der Einfluss intramedialer Kontextinformationen auf den Aufwand im E-Mail-Management

    Heueis, Rainer

    2010-01-01

    An increasing appearance of E-Mails in corporations has led to augmented complaints whilst processing such E-Mails. This ‘E-Mail overload’ is experienced as a burden by those employees, since their individual timings, their psychic and their cognitive abilities and capacities are utilized. This burden, which is more or less an unsolicited additional work, is considered as the main reason for the research work done in this dissertation. The thesis addresses this issue wi...

  9. Consumers with Sexual Performance Problems and Spam E - mail for Sexual Performance Products

    Joshua Fogel

    2009-05-01

    Full Text Available Spam e - mail on sexual health topics arrive in e - mail inboxes. We study consumer responses to spam e - mail that advertise sexual performance products. Participants (n=200 with and without sexual performance problems were asked if they received, opened, and bought products from spam e - mail about sexual performance produ cts in the past year. Comparisons were performed between those with and without sexual performance problems. Psychological factors of self esteem and perceived stress were measured. Those with sexual performance problems had significantly greater percent ages than those without sexual performance problems for receiving (100.0% versus 73.5%, p=0.024, opening (66.7% versus 11.4%, p<0.001, and purchasing products (46.7% versus 5.4%, p<0.001 from spam e - mail. In the multivariate logistic regression analyse s adjusting for demographics, psychological factors, and attitudes, those with sexual performance problems were significantly associated with opening (OR: 8.33, 95% CI: 1.95, 35.71, and purchasing products (OR: 7.98, 95% CI: 1.74, 36.73 from spam e - mail. Spam e - mail about sexual performance products are opened and purchased from, especially among those with sexual performance problems. There is a need for e - mail marketing and advertising of sexual performance products that meet ethical standards for e - mail delivery to consumers

  10. Implementation of Personalized E-Mail Prioritization-A Content Based Social Network Analysis

    K. Harini; UPPE.NANAJI

    2011-01-01

    Now a Day’s, Email is one of the most prevalent personal and business communication tool, but it exhibits some significant drawbacks. One of the drawback of this is the portion of e-mail is that spam, has increased dramatically in the past few years. A recent study showed that 52 percent of e-mail users say spam has made them less trusting of e-mail, and 25 percent say that the volume of spam has reduced their e-mail use. This crisis has prompted proposals for a broad spectrum of potential so...

  11. Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

    Andri Zakariya

    2012-08-01

    Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

  12. Con Artists Attack Colleges with Fake Help-Desk E-Mail

    Young, Jeffrey R.

    2008-01-01

    An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…

  13. Composing Effective and Efficient E-mails: A Primer for Pharmacy Practitioners.

    Summerfield, Marc R; Feemster, Agnes Ann

    2015-09-01

    This primer describes the purpose and importance of e-mail as a key communication medium in the workplace. It emphasizes clarity as a primary modality to enhance efficiency and effectiveness. Finally, the primer reviews elements of grammar, punctuation, and style that contribute to each e-mail's ability to meet language standards, enhance the writer's image, and successfully transmit information. PMID:26715801

  14. The style of academic e-mails and conventional letters: contrastive analysis of four conversational routines

    Clyde Ancarno

    2005-04-01

    Full Text Available This paper presents the results of a corpus-based study which investigates the genre of academic email and more specifically its pragmatic dimension. Four conversational routines (thank yous, apologies, requests, offers are analysed and compared in two channels: academic e-mails and conventional print letters. In addition, data from both native and non-native speakers of English is considered, which sheds light on some of the differences found in the academic e-mail writing of learners of English. The findings indicate that academic e-mail is a relatively formal type of correspondence which is still largely influenced, as is to be expected, by the genre of the academic letter, and that as a genre, academic e-mail is in the process of formation or semi-formation. Finally, native speakers of English are found to be more informal than non-native speakers of English in academic e-mails.

  15. An Online Model on Evolving Phishing E-mail Detection and Classification Method

    Loai Bani Melhiml

    2011-01-01

    Full Text Available Phishing e-mails pose a serious threat to electronic commerce as they are used broadly to defraud both individuals and financial organizations on the Internet. Criminals lure online users into revealing their passwords or account numbers by sending e-mails as if they come legitimately from financial organizations; these users in turn update and/or provide their account and billing information. In the current study, propose a novel concept that adapts the Evolving Clustering Method for Classification (ECMC to build new model called the Phishing Evolving Clustering Method (PECM. PECM functions are based on the level of similarity between two groups of features of phishing e-mails. PECM model proved highly effective in terms of classifying e-mails into phishing e-mails or ham e-mails in online mode, speed and use of a one-pass algorithm. PECM also proved its capability to classify e-mail by decreasing the level of false positive and false negative rates while increasing the level of accuracy to 99.7%. The model was built to work in online mode and can learn continuously without consuming too much memory because it works on a one-pass algorithm. Therefore, data are accessed one time from the memory and then the rule is created depending on the evolution of the profile if the characteristics of the phishing e-mail have been changed. PECM is a clustering-based learning model that adaptive Evolving Clustering Method to distinguish between phishing e-mails and ham e-mails in online mode.

  16. Teleradiology with DICOM e-mail: recommendations of rate at GIT; Teleradiologie mit DICOM E-mail: Empfehlungen der rate at GIT

    Mildenberger, P.; Kaemmerer, M.; Klos, G.; Schuetze, B. [Klinik und Poliklinik fuer Radiologie, Johannes Gutenberg-Univ. Mainz (Germany); Engelmann, U. [Deutsches Krebsforschungszentrum, Abt. Medizinische und Biologische Informatik, Heidelberg (Germany); Ruggiero, S.; Runa, A.; Weisser, G. [Inst. fuer Klinische Radiologie, Universitaetsklinikum Mannheim (Germany); Schroeter, A. [CHILI GmbH, Heidelberg (Germany); Walz, M. [TUeV Industrie Service GmbH, TUeV-SUeD-Gruppe, Aerztliche Stelle fuer Qualitaetssicherung in der Radiologie, Eschborn (Germany)

    2005-05-01

    E-mail is ideal for ad-hoc connections in teleradiology. The DICOM standard offers the possibility to append DICOM data types as a MIME attachment to any e-mail, thus ensuring the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g. protection of data privacy) which must be obeyed. Because of the lack of given standards which would grant interoperability as well as manufacturer independence, teleradiology has not been established in Germany until today. Therefore, the IT-Team (Arbeitsgemeinschaft fuer Informationstechnologie, rate at GIT) of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) set up an initiative to standardise telemedicine by using e-mail. Its members agreed that an e-mail-based variant would be the most practicable way to a communication solution - as easy to implement as to use. In their opinion, e-mail represents the smallest common denominator for a safe data interchange that would fulfill the legal advantages for telemedicine in Germany. (orig.)

  17. Investigating e-mail overload in the South African banking industry

    E. Burger

    2007-11-01

    Full Text Available The information workers of today have a wide range of information sources available to make valuable decisions, so much so that it can lead to information overload. The purpose of this research was to investigate the extent of information overload in the South African banking industry. The empirical part of this study was done at the Standard Bank of South Africa, where 115 questionnaires were distributed to three categories of employees. It was found that e-mail is one of the most used computer-mediated applications and is used more than the World-Wide Web, instant messaging or peer-to-peer file sharing. Of the respondents, 65% felt overwhelmed by the amount of e-mails they received as 25% received more than 60 e-mails per day. A third of the respondents dedicated three hours or more to e-mails per day. Respondents agreed that the implementation of policies is important to ensure compliance with legislation, protection of privacy rights and copyright, and the filtering of spam. In conclusion, the respondents indicated that formal training in e-mail management should make a significant difference in the usage of e-mail within the organization and reduce e-mail overload.

  18. E-mail-marketing – a new tool of communication policy institutions of higher education

    Svitlana Semenyuk

    2015-05-01

    Full Text Available Article concerns the theoretical concept of formation and development e-mail-of marketing in the educational marketing particular analyzed approaches to the content of the concept «e-mail-marketing", determines the essence his nature and benefits of other means of communication. Determined that the e-mail-marketingis an inexpensive, but simultaneously quite effective and financially viable tool for promotingof educational services to market and necessity of its use in communication activities of higher education. The basic components of e-mail-marketing: customer needs (potential university entrants, higher education opportunities existing satisfy the needs of university entrants, explore the possibilities of higher education competitors. Proved that the instrument is-mail-marketing is the e-mail-sending. It's inexpensive and fairly simple variant push-technology, which today is widely use because pure commercial sending gives effect without major financial investments. The article deals with methods of forming database of e-mail addresses of applicants and requirements for e-mails.

  19. Consumers with Sexual Performance Problems and Spam E - mail for Pornography

    Joshua Fogel

    2010-04-01

    Full Text Available Pornography adverti sements arrive through spam e - mail advertising products online. We study consumer responses to these advertisements. College student participants (n=200 with and without sexual performance problems (SPP were asked if they received, opened/read, and bou ght pornography from spam e - mail. Those with SPP had significantly greater percentages than those without SPP for receiving (93.3% versus 68.1%, p=0.042, opening/reading (66.7% versus 14.1%, p<0.001, and purchasing (46.7% versus 4.9%, p<0.001 pornograp hy from spam e - mail. In the multivariate logistic regression analyses adjusting for demographic (age, sex, race/ethnicity, Internet (Internet use, number spam e - mails received, and psychological (self - esteem, perceived stress, sexual performance attitud es variables, those with SPP were significantly associated with opening/reading (OR: 4.51, 95% CI: 1.05, 19.33 and purchasing (OR: 8.76, 95% CI: 1.78, 43.27 pornography from spam e - mail. Also, increased sexual performance attitudes were associated with opening/reading (OR: 1.37, 95% CI: 1.21, 1.54 and purchasing (OR: 1.37, 95% CI: 1.15, 1.62 pornography from spam e - mail. None of the other demographic, Internet, or psychological variables had any associations. Pornography spam e - mail is opened/read a nd purchased, especially among those with SPP. T argeting those with SPP with e - mail advertisements has ethical implications, in addition to the general ethical issue of sending spam e - mail

  20. Machine Learning for E-mail Spam Filtering: Review,Techniques and Trends

    Bhowmick, Alexy; Hazarika, Shyamanta M.

    2016-01-01

    We present a comprehensive review of the most effective content-based e-mail spam filtering techniques. We focus primarily on Machine Learning-based spam filters and their variants, and report on a broad review ranging from surveying the relevant ideas, efforts, effectiveness, and the current progress. The initial exposition of the background examines the basics of e-mail spam filtering, the evolving nature of spam, spammers playing cat-and-mouse with e-mail service providers (ESPs), and the ...

  1. E-marketing, Unsolicited Commercial E-mail, and Legal Solutions

    Li Xingan

    2006-01-01

    The purpose of this paper is to explore the legal solutions to unsolicited commercial e-mail. The advantages of e-mail enable it to be one of the most important e-marketing instruments. Spammers are also motivated by potential profits in spamming. The low costs and high benefits of the spammers, and the high costs and low benefits of the spammed determine the illegal nature of the spamming. The spam poses challenges for e-mail recipients' property rights, fair trade, public morals, cybersecur...

  2. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    Antun Biloš; Davorin Turkalj; Ivan Kelić

    2016-01-01

    Purpose – The main purpose of this paper is to test the controlled experiment (A/B split) methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes o...

  3. A Novel Feature Selection Based on One-Way ANOVA F-Test for E-Mail Spam Classification

    Nadir Omer Fadl Elssied; Othman Ibrahim; Ahmed Hamza Osman

    2014-01-01

    Spam is commonly defined as unwanted e-mails and it became a global threat against e-mail users. Although, Support Vector Machine (SVM) has been commonly used in e-mail spam classification, yet the problem of high data dimensionality of the feature space due to the massive number of e-mail dataset and features still exist. To improve the limitation of SVM, reduce the computational complexity (efficiency) and enhancing the classification accuracy (effectiveness). In this study, feature selecti...

  4. [Research on testing the robustness of DICOM-e-mail secure teleradiology systems].

    Cao, O Li-ji; Zhao, Jun; Zhuang, Tian-ge

    2006-07-01

    DICOM-e-mail is a secure teleradiology protocol released by German Radiology Society and has already been applied clinically. To improve the robustness of the system, the protocol has been upgraded by adding some mechanisms such as system feedback. Moreover, a test method is also implemented by sending erroneous mails to application software that supports DICOM-e-mail. Through the tests for two different DICOM-e-mail teleradiology application, the validity of the new protocol is proved and at the same time some bugs are found. The implementation of the latest protocol and the general error tests can help to make the whole teleradiology system a better robustness. The implementation of DICOM-e-mail protocol in our country is also discussed in this paper. PMID:17039939

  5. Putting social context into text: The semiotics of e-mail interaction

    Tian, X; Menchik, DA

    2008-01-01

    E-mail excludes the multiple nonlinguistic cues and gestures that facilitate face-to-face communication. How, then, should interaction in a text-based context be understood? The authors analyze the problems and solutions experienced by a research panel that communicated over e-mail and face-to-face for 18 months, evaluating both kinds of exchanges alongside survey and interview data. Semiotic and linguistic theory is used to expose essential properties associated with the successful communica...

  6. Decision Support for Estimation of the Utility of Software and E-mail

    Borg, Anton

    2012-01-01

    Background: Computer users often need to distinguish between good and bad instances of software and e-mail messages without the aid of experts. This decision process is further complicated as the perception of spam and spyware varies between individuals. As a consequence, users can benefit from using a decision support system to make informed decisions concerning whether an instance is good or bad. Objective: This thesis investigates approaches for estimating the utility of e-mail and softwar...

  7. Consumers with Sexual Performance Problems and Spam E - mail for Pornography

    Joshua Fogel; Sam Shlivko

    2010-01-01

    Pornography adverti sements arrive through spam e - mail advertising products online. We study consumer responses to these advertisements. College student participants (n=200) with and without sexual performance problems (SPP) were asked if they received, opened/read, and bou ght pornography from spam e - mail. Those with SPP had significantly greater percentages than those without SPP for receiving (93.3% versus 68.1%, p=0.042), opening/reading (6...

  8. Test of the Behavioral Perspective Model in the Context of an E-Mail Marketing Experiment

    Sigurdsson, Valdimar; Menon, R. G. Vishnu; Sigurdarson, Johannes Pall; Kristjansson, Jon Skafti; Foxall, Gordon R.

    2013-01-01

    An e-mail marketing experiment based on the behavioral perspective model was conducted to investigate consumer choice. Conversion e-mails were sent to two groups from the same marketing database of registered consumers interested in children's books. The experiment was based on A-B-A-C-A and A-C-A-B-A withdrawal designs and consisted of…

  9. Legal and policy issues associated with monitoring employee E-mail

    Segura, M.A.; Rither, A.C.

    1997-01-01

    This paper examines the legal issues involved with employer monitoring of employee e-mail. In addition to identifying pertinent legal issues, the paper provides guidelines that will help the Pacific Northwest National Laboratory (PNNL) establish a program for monitoring outgoing e-mail to insure compliance with company policies, particularly those regarding protection of trade secrets and proprietary information, and to comply with the Department of Energy`s (DOE) procedures for protecting Export Controlled Information (ECI). Electronic communication has allowed companies to enhance efficiency, responsiveness and effectiveness. E-mail allows employees to transmit all types of data to other individuals inside and outside of their companies. The ease with which information can be transmitted by e-mail has placed trade secrets, proprietary information, and other sensitive data at risk from inadvertent disclosure by employees. As employers attempt to protect their interests through measures such as monitoring e-mail, they may expose themselves to liability under federal and state laws for violating employee privacy. Business use of e-mail has proliferated so rapidly that the federal and state legal systems have not been able to adequately address the issues arising out of its use in the workplace.

  10. A survey to evaluate patients' perspective concerning e-mail in an oncology practice

    Purpose: Use of e-mail to improve physician-patient communication is becoming increasingly widespread, however, little research has been done to evaluate patients' interest and concerns regarding this technology. The goals of this study were to (1) evaluate the effectiveness of e-mail for communication between patients and their oncologist and (2) assess from the perspective of the patient the accessibility and usefulness of e-mail to facilitate medical treatment and advice as compared to conventional mail and telephone. E-mail as a clinical tool is a new trend in medicine that is growing quickly, however, there are few reports to date that evaluate the patients' perspective concerning e-mail usage. The use of e-mail in doctor-patient communication is potentially faster and more efficient than conventional mail and may reduce 'telephone tag'. E-mail initiated by the physician also allows for potential follow-up after treatment. Our study evaluated the types of transactions (personal medical questions, referrals, etc.) for which patients' preferred using e-mail in place of conventional communication methods. Materials and Methods: A self-administered survey (8 pages; 50 items) was mailed to 65 patients who were treated within the previous three years for prostate cancer in a radiation oncology practice. This survey explored the opinions and behaviors of patients with regard to online communication about general healthcare issues. The items included: patients' interest in e-mail, comfort in using e-mail, concerns about confidentiality, and access to e-mail. Patients' interest in using e-mail for specific situations were also evaluated, such as, making appointments, following up on treatment, or asking general health related questions. Patients' concerns about using email to communicate with healthcare organizations also were assessed. Results: The response rate to the survey was 63%, with a median age of 68 years (range 53-82), and the majority of respondents were

  11. Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail.

    Wang, Jing; Madnick, Stuart; Li, Xitong; Alstott, Jeff; Velu, Chander

    2015-01-01

    Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media. There is increasing interest in understanding the factors that affect the speed of social mobilization. Based on the Langley Knights competition data set, we analyzed the differences in mobilization speed between users of Facebook and e-mail. We include other factors that may influence mobilization speed (gender, age, timing, and homophily of information source) in our model as control variables in order to isolate the effect of such factors. We show that, in this experiment, although more people used e-mail to recruit, the mobilization speed of Facebook users was faster than that of those that used e-mail. We were also able to measure and show that the mobilization speed for Facebook users was on average seven times faster compared to e-mail before controlling for other factors. After controlling for other factors, we show that Facebook users were 1.84 times more likely to register compared to e-mail users in the next period if they have not done so at any point in time. This finding could provide useful insights for future social mobilization efforts. PMID:26422171

  12. Do you feel you know how to write an e-mail?

    Leonova, Anna O.

    2003-10-01

    Computers have opened doors to the new era of telecommunication. Electronic mail is becoming very popular in different spheres of professional activity and everyday life of people all over the world as it provides people an excellent opportunity for real, natural communication. The use of e-mail and the Internet involves a whole range of skills including knowing how to use a personal computer, knowing how to navigate the immense resources of cyberspace, and becoming familiar with the special register of e-mail communication (which lies somewhere between the formality of traditional writing and the spontaneity of speech). Conferencing via e-mail, or communicating with partners through networked computers, offers many opportunities in the Scientific Community. E-mail allows us to collaborate easily with thousands of colleagues, sharing new ideas, resources, and materials. It can provide the information, contacts, and stimulation that can make our research work more effective and enjoyable. The English language is world-wide accepted as lingua-franca of the Internet and intercultural communication. This brings us to a necessity to introduce some ideas on e-mail writing.

  13. Teleradiology with DICOM e-mail: recommendations of rate at GIT

    E-mail is ideal for ad-hoc connections in teleradiology. The DICOM standard offers the possibility to append DICOM data types as a MIME attachment to any e-mail, thus ensuring the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g. protection of data privacy) which must be obeyed. Because of the lack of given standards which would grant interoperability as well as manufacturer independence, teleradiology has not been established in Germany until today. Therefore, the IT-Team (Arbeitsgemeinschaft fuer Informationstechnologie, rate at GIT) of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) set up an initiative to standardise telemedicine by using e-mail. Its members agreed that an e-mail-based variant would be the most practicable way to a communication solution - as easy to implement as to use. In their opinion, e-mail represents the smallest common denominator for a safe data interchange that would fulfill the legal advantages for telemedicine in Germany. (orig.)

  14. The Use of Verbs in Business E-Mail Communication – A Pragmalingu Istic Corpus Study

    Šiškovič Mojca Nidorfer

    2014-06-01

    Full Text Available Corpus analyses conducted with the help of special tools have become more widely used in all areas of linguistics, including discourse analysis, genre analysis and pragmatics. The paper presents a pragmalinguistic research study of verbs, carried out on a specialized corpus of authentic correspondence of (chains of Slovene business e-mails, Posle-pis. The corpus tools Oxford Wordsmith Tools 5.0 and Sketch Engine were used for analysis, and the research was followed by a comparison of language use with two Slovene reference corpora FidaPLUS and Gigafida. The study confirms the hypothesis that business discourse via e-mail has inherent characteristics that are shown through the frequency of use of certain verbs and verb forms. Certain forms were also identified which prove the conventionalized language use of business e-mail discourse.

  15. EVALUATION OF E-MAIL USAGE BY EXTENDED TECHNOLOGY ACCEPTANCE MODEL

    Savaş Mutlu

    2013-01-01

    Full Text Available This study is performed to evaluate E-mail usage by Extended Technology Acceptance Model (TAM2 and to test the moderation effects of Espoused National Cultural Values between Subjective Norm (SN and E-mail usage Behavioral Intention (BI/Perceived Usefulness (PU. Survey was conducted in Adana Branches of an important Turkish State-Run Bank including 151 participants who have E-mail access for work purposes. As the results of the study; PU and Perceived Ease Of Use (PEOU have positive effects on BI, PEOU and SN both effect PU, Femininity (F shows positive moderating effect on the relationship between SN and PU as well as the relation between SN and BI, Collectivism (C shows positive moderation effect between SN and PU, moderation effect of SN on PU is higher for people who have higher tolerance to uncertainty.

  16. No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large

    Mayer, Wilfried; Zauner, Aaron; Schmiedecker, Martin; Huber, Markus

    2015-01-01

    TLS is the most widely used cryptographic protocol on the Internet. While many recent studies focused on its use in HTTPS, none so far analyzed TLS usage in e-mail related protocols, which often carry highly sensitive information. Since end-to-end encryption mechanisms like PGP are seldomly used, today confidentiality in the e-mail ecosystem is mainly based on the encryption of the transport layer. A well-positioned attacker may be able to intercept plaintext passively and at global scale. In...

  17. Design and development of practical and secure e-mail system /

    Özcan, Mahmut; Ozcan, Mahmut

    2003-01-01

    Key distribution and management in applications that use public key cryptosystems generally rely on Public Key Infrastructures (PKI). In this thesis, the disadvantages of this approach are discussed and an e-mail system that performs public key distribution and management in a unique way is proposed. The name of this system is "Practical and Secure E-Mail System" ("PractiSES"). PractiSES does not use the certification mechanisms of PKIs. A central authority, which is trusted by all users, tak...

  18. E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm

    Ismaila Idris

    2011-01-01

    This paper apply neural network and spam model based on Negative selection algorithm for solving complex problems in spam detection. This is achieved by distinguishing spam from non-spam (self from non-self). We propose an optimized technique for e-mail classification; The e-mail are classified as self and non-self whose redundancy was removed from the detector set in the previous research to generate a self and non-self detector memory. A vector with an array of two element self and non-self...

  19. Measuring the Effectiveness of E-mail Direct Marketing in Building Customer Relationship

    Abdel Baset I. Hasouneh; Marzouq Ayed Alqeed

    2010-01-01

    The objective of the study is to examine how response data from direct marketing email campaigns could beutilized in measuring the development of a customer relationship in the context of an end-user loyalty program.The case analysed in the study is Club Sony Ericsson e-mail campaigns targeted at its registered members. Theprimary research problem covered in the study is “how can e-mail direct marketing results be measured by usingClub Sony Ericsson existing campaign response and customer dat...

  20. Electronic information exchange between NRC and licensees using Internet E-mail

    Roe, J.W.; Carpenter, C.E. Jr.

    1994-12-31

    One of the goals established in the U.S. Nuclear Regulatory Commission (NRC) Strategic Information Technology Plan was the development of high-performance computer networks that would allow users to have E-mail and document transfer capabilities with NRC staff, certain U.S. Department of Energy laboratories, and with outside users over the public Internet network. Subsequently, individual Internet E-mail accounts have been established for project managers in the Office of Nuclear Reactor Regulation (NRR), which allow informal communications with licensees that have access to the Internet.

  1. Endorsement of the New Ecological Paradigm in Systematic and E-Mail Samples of College Students

    Rideout, Bruce E.; Hushen, Katherine; McGinty, Dawn; Perkins, Stephanie; Tate, Jennifer

    2005-01-01

    As the initial phase of a longitudinal study of environmental perspective in college students, resident student opinion was sampled using the New Ecological Paradigm (NEP) scale administered through systematic alphabetical sampling. Sampling was also carried out by a blanket e-mail distribution of surveys for voluntary response. Results showed…

  2. "Dear Mr. Shawn": A Lesson in E-Mail Pragmatics (Netiquette).

    Ford, Shawn

    2003-01-01

    This tip provides information that will help English-as-a-Second-Language learners understand the rules of formal e-mail communication, also known as netiquette, and enable them to practice using these communication skills effectively for academic purposes. (Author/VWL)

  3. E-marketing, Unsolicited Commercial E-mail, and Legal Solutions

    Li Xingan

    2006-03-01

    Full Text Available The purpose of this paper is to explore the legal solutions to unsolicited commercial e-mail. The advantages of e-mail enable it to be one of the most important e-marketing instruments. Spammers are also motivated by potential profits in spamming. The low costs and high benefits of the spammers, and the high costs and low benefits of the spammed determine the illegal nature of the spamming. The spam poses challenges for e-mail recipients' property rights, fair trade, public morals, cybersecurity, personal data protection, and involves other concerns as well. In dealing with spam, technical and marketing solutions cannot work alone without the legal mechanisms. The legal regulation is justified by balancing the interest between senders, service providers and even users. Criminal sanctions, civil remedies, and international harmonization are alternative steps in establishing legal solutions. As a necessary part of the legislation, punishment for unsolicited commercial e-mails should be more severe. Still, there are a number of limitations to the effectiveness of law enforcement against spamming. Spam must be eliminated by comprehensive mechanisms.

  4. Identification and Disidentification in Organizational Discourse: A Metaphor Analysis of E-Mail Communication at Enron

    Turnage, Anna K.

    2010-01-01

    This project is situated within the interpretive tradition in organizational communication research, focusing on organizational discourse. It goes further by bringing the discussion into the 21st century through examining how communication technology--specifically e-mail--plays a role in the linguistic practices that help create, maintain and…

  5. E-Mail Bonding: Making the Most of Electronic Communication between Teacher and Student.

    Zolten, Jerry

    An instructor's idea of using required e-mail as a communication link with students in the basic public speaking course sprang from his work with Gerald M. Philips in the pioneering reticence program he developed at Penn State University in the 1970s and 1980s. The instructor's focus in teaching a basic communication course has always been more on…

  6. Principles and algorithms of information security maintenance for nuclear material protection in e-mail system

    The relevant component of protection of nuclear materials is the securing of only the authorized usage of the information about them and particular its safeguarding. One of channels of unauthorized usage of the information can arise at transferring on E-Mail with the conforming sanction of the proprietor of this information and its senders and also going through formalities adopted in the institute present the proprietary information. For detection and suppression of dispatch on a E-Mail of the reports contain items of information, the transfer of which requires the sanction of the proprietor of the information, the method of a selective filtration has been elaborated. For this method the principles and algorithms permitting a dispatch on a E-Mail without the filtration only those reports which went through the formalities established by the proprietor of the information. For scientific institutes it can be, for example, discussed at scientific recommended for publication or correspondence with collaborators on joint projects. The information for which listed above or similar requirements are not fulfilled subjects to the filtration. If this information contains the items on nuclear safety or other information, which can be transferred on E-Mail only upon the sanction of administration, the electronic letter does not depart and is transferred to the manager of information safety, who introduces it to the administration for the conforming consideration. The work was supported by the grant CST RUz P-20.56. (author)

  7. The effectiveness of personalized e-mail and the role of personal characteristics

    E. Maslowska; B. van den Putte; E.G. Smit

    2011-01-01

    Personalizing communication means creating persuasive messages that refer to aspects of a person's self. Although the use of personalization is increasing, research on its effectiveness is limited and the results are mixed. This study examined the persuasiveness of personalized e-mail newsletters in

  8. Implementation of Personalized E-Mail Prioritization-A Content Based Social Network Analysis

    K.HARINI

    2011-12-01

    Full Text Available Now a Day’s, Email is one of the most prevalent personal and business communication tool, but it exhibits some significant drawbacks. One of the drawback of this is the portion of e-mail is that spam, has increased dramatically in the past few years. A recent study showed that 52 percent of e-mail users say spam has made them less trusting of e-mail, and 25 percent say that the volume of spam has reduced their e-mail use. This crisis has prompted proposals for a broad spectrum of potential solutions, ranging from more efficient antispam software tools to antispam laws at both the federal and state levels. But Still there is a necessity, to overcome this, in this paper We propose a novel approach that combines unsupervised clustering, social network analysis, semi supervised feature induction, and supervised classification to model user priorities among incoming email messages. This article presents the first study on PEP with a fully personalized methodology, where only each user’s personal email data. Finally results show that this method somehow better compared to other methods

  9. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    Antun Biloš

    2016-06-01

    Full Text Available Purpose – The main purpose of this paper is to test the controlled experiment (A/B split methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes of spamming and progression of online communication clutter, some practitioners began to question the usability of e-mail as a marketing communication channel, while others embarked on working on improving the message itself. Efforts were invested into improving message quality, as well as into better understanding user expectations. One of the most commonly used techniques to test specific e-mail message elements is the controlled experiment. Findings and implications – This paper explores several types of controlled experiments in a specific Croatian B2C market. Tests were run to determine subscriber behavior towards several newsletter components, including sending time, sending day, sender’s name, and subject line. Open and click rates for tested campaigns, and several other metrics were investigated using MailChimp software. An N − 1 two-proportion test using an adjusted Wald confidence interval around the difference in the proportions was used for comparing the open-rate measure in the controlled experiments between subjects. Limitation – Controlled experiments (A/B split tests showed a lot of potential as a way of measuring behavior and preferences of subscribers, although several apparent limitations (the data-set scope, comparability issues indicated a clear need for standardization on a managerial and scientific level. Originality – This paper provides an up-to-date e-mail marketing effectiveness literature review, describes and tests the

  10. Using viral e-mails to distribute tobacco control advertisements: an experimental investigation.

    Carter, Owen B J; Donovan, Robert; Jalleh, Geoffrey

    2011-08-01

    The authors' objective was to conduct a trial of viral e-mail marketing as a distribution method for tobacco control advertisements. University students (n = 200) in the state of Western Australia were randomly allocated to receive 1 of 2 e-mails with hyperlinks to tobacco control advertisements ("Toilet" and "Rubbish") emphasizing the disgusting nature of smoking. Recipients followed a hyperlink to a Web page playing Toilet or Rubbish on endless loop. Viewers were encouraged to forward the e-mail to their friends and invited to complete an online survey about the advertisement. Unique downloads for each advertisement were identified by internet provider (IP) location and tallied by date and geographical location to assess subsequent dissemination beyond the initial 200 students. There were 826 unique viewings of the advertisements averaging 26.9 viewings per day for the first fortnight, followed by a lower average of 4.1 hits per day for the next 3.5 months. IP addresses identified hits from 3 other Australian states and 7 other countries. Online surveys were completed by 103 respondents (12.5% of total hits) but included few smokers (n = 9). Significantly more respondents rated Toilet as "funny" compared with Rubbish (40% vs. 11%; p < .05), likely explaining why the former accounted for significantly more viewings than the latter (487 vs. 339; p < .001). There was a greater than fourfold return in dissemination for each initial e-mail sent but daily hits rapidly deteriorated over time. Entertainment appears to facilitate viral e-mails being forwarded onwards but only exceptionally compelling tobacco control materials are ever likely to become self-perpetuating. PMID:21432712

  11. Predicted Outcome Value of E-Mail Communication: Factors that Foster Professional Relational Development between Students and Teachers

    Young, Stacy; Kelsey, Dawn; Lancaster, Alexander

    2011-01-01

    Using predicted outcome value theory as a guide, this study investigated the link between e-mail correspondence as a form of computer mediated extra class communication and how it may shape students' desire to foster student-teacher relational development. The findings revealed that when students believe their teacher e-mails the class frequently,…

  12. E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm

    Ismaila Idris

    2011-12-01

    Full Text Available This paper apply neural network and spam model based on Negative selection algorithm for solving complex problems in spam detection. This is achieved by distinguishing spam from non-spam (self from non-self. We propose an optimized technique for e-mail classification; The e-mail are classified as self and non-self whose redundancy was removed from the detector set in the previous research to generate a self and non-self detector memory. A vector with an array of two element self and non-self concentration vector are generated into a feature vector used as an input in neural network classifier to classify the self and non-self feature vector of self and nonself program. The hybridization of both neural network and our previous model will further enhance our spam detector by improving the false rate and also enable the two different detectors to have a uniform platform for effective performance rate.

  13. Notation for national and international telephone numbers, e-mail addresses and Web addresses

    International Telecommunication Union. Geneva

    2001-01-01

    Recommendation E.123 defines a standard way to write telephone numbers, e-mail addresses, and web addresses. It recommends the following formats (when dialing the area code is optional for local calling): Telephone number: National notation (042) 123 4567 International notation +31 (0)42 123 4567 E-mail address: name@provider.com Internet address / URL: www.company.com It also recommends that a hypen (-), space ( ), or period (.) can be used to visually separate groups of numbers. The parentheses are used to indicate digits that are sometimes not dialed. a slash (/) is used to indicate alternate numbers. This information is important if you want to make sure people know how to dail a phone number in a specific country.

  14. INVESTIGATION OF E-MAIL TRAFFIC BY USING ZERO-INFLATED REGRESSION MODELS

    Yılmaz KAYA

    2012-06-01

    Full Text Available Based on count data obtained with a value of zero may be greater than anticipated. These types of data sets should be used to analyze by regression methods taking into account zero values. Zero- Inflated Poisson (ZIP, Zero-Inflated negative binomial (ZINB, Poisson Hurdle (PH, negative binomial Hurdle (NBH are more common approaches in modeling more zero value possessing dependent variables than expected. In the present study, the e-mail traffic of Yüzüncü Yıl University in 2009 spring semester was investigated. ZIP and ZINB, PH and NBH regression methods were applied on the data set because more zeros counting (78.9% were found in data set than expected. ZINB and NBH regression considered zero dispersion and overdispersion were found to be more accurate results due to overdispersion and zero dispersion in sending e-mail. ZINB is determined to be best model accordingto Vuong statistics and information criteria.

  15. Evaluation of e-mail reference service in University Donja Gorica library

    Tomić, Tamara

    2015-01-01

    Reference service in academic libraries has been in use for a very long time. The University Donja Gorica Library (UDG) is the first library in Montenegro providing e-mail reference service. The purpose of this research is to examinee-mails containing reference questions at UDG. This evaluation discusses the first three years (2008-2011) of implementing this service at UDG and shows its importance and usability for library users. The thesis presents and evaluates this service, some improvemen...

  16. Dead Letters to Alice - Reachability of E-Mail Addresses in the PGP Web of Trust

    Leiding, Benjamin; Dähn, Andreas

    2016-01-01

    Over the last 25 years four million e-mail addresses have accumulated in the PGP web of trust. In a study each of them was tested for vitality with the result of 40% being unreachable. Of the mailboxes proven to be reachable, 46.77% turn out to be operated by one of three organizations. In this article, the authors share their results and challenges during the study.

  17. Heart murmurs recorded by a sensor based electronic stethoscope and e-mailed for remote assessment

    Wren, C; Dahl, L.; Hasvold, P; Arild, E; Hasvold, T.

    2002-01-01

    Background: Heart murmurs are common in children, and they are often referred to a specialist for examination. A clinically innocent murmur does not need further investigation. The referral area of the University Hospital is large and sparsely populated. A new service for remote auscultation (telemedicine) of heart murmurs in children was established where heart sounds and short texts were sent as an attachment to e-mails.

  18. New information technology and communication in health care: using e-mail for marketing services

    Jorge Iván Martínez Espitia

    2015-01-01

    Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email...

  19. An Improved AIS Based E-mail Classification Technique for Spam Detection

    Idris, Ismaila; Abdulhamid, Shafii Muhammad

    2014-01-01

    An improved email classification method based on Artificial Immune System is proposed in this paper to develop an immune based system by using the immune learning, immune memory in solving complex problems in spam detection. An optimized technique for e-mail classification is accomplished by distinguishing the characteristics of spam and non-spam that is been acquired from trained data set. These extracted features of spam and non-spam are then combined to make a single detector, therefore re...

  20. You've got e-mail: the impact of electronic communication technology on faculty productivity

    Elworthy, Sheila Frances Culver

    2008-01-01

    This qualitative case study explores the connection between electronic communication technology and faculty productivity. Despite the pervasive use of e-mail and other electronic communication media at educational institutions, few studies investigate the relationship of electronic communication to faculty productivity. In this study, sixteen faculty members from a public, medium-sized, and instruction-oriented college in Western Canada answered detailed questions about their professional on-...

  1. Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail

    Jing Wang; Stuart Madnick; Xitong Li; Jeff Alstott; Chander Velu

    2015-01-01

    Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media. There is increasing interest in understanding the factors that affect the speed of social mobilization. Based on the Langley Knights competition data set, we analyzed the differences in mobilization speed between users of Facebook and e-mail. We include other factors that may influence mobilization speed (gender, age, timing, and homophily...

  2. Compulsory registration of mail servers in order to accept e-mail from the Internet

    IT Department

    2008-01-01

    This announcement is intended only for administrators of a mail server (sendmail, postfix, etc.). It concerns e-mails sent from the Internet to addresses of the following type: somemailbox@somehost.cern.ch. Mail server managers are requested to register their servers so that they can accept e-mail from outside CERN. In future the CERN mail infrastructure will relay messages from outside CERN only to officially registered mail servers. This rule applies only to messages sent from the Internet. There will be NO change with respect to messages sent from inside CERN. If you are responsible for a mail server that accepts e-mails from outside CERN, please read the following page: http://cern.ch/mail/Help/?kbid=191090, where you can find information about the new rule and check if your host is already registered in the system. If you wish to register a mail server please send a message to: mailto:mail.support@cern.ch. This rule will be gradually enforced from 20 February 2008 onwards. Thank you for your cooperation...

  3. Health Literacy and Global Cognitive Function Predict E-Mail but Not Internet Use in Heart Failure Patients

    Jared P. Schprechman

    2013-01-01

    Full Text Available Background. The internet offers a potential for improving patient knowledge, and e-mail may be used in patient communication with providers. However, barriers to internet and e-mail use, such as low health literacy and cognitive impairment, may prevent patients from using technological resources. Purpose. We investigated whether health literacy, heart failure knowledge, and cognitive function were related to internet and e-mail use in older adults with heart failure (HF. Methods. Older adults (N=119 with heart failure (69.84±9.09 years completed measures of health literacy, heart failure knowledge, cognitive functioning, and internet use in a cross-sectional study. Results. Internet and e-mail use were reported in 78.2% and 71.4% of this sample of patients with HF, respectively. Controlling for age and education, logistic regression analyses indicated that higher health literacy predicted e-mail (P<.05 but not internet use. Global cognitive function predicted e-mail (P<.05 but not internet use. Only 45% used the Internet to obtain information on HF and internet use was not associated with greater HF knowledge. Conclusions. The majority of HF patients use the internet and e-mail, but poor health literacy and cognitive impairment may prevent some patients from accessing these resources. Future studies that examine specific internet and email interventions to increase HF knowledge are needed.

  4. A Mixed-Methods Study of Patient-Provider E-Mail Content in a Safety-Net Setting.

    Mirsky, Jacob B; Tieu, Lina; Lyles, Courtney; Sarkar, Urmimala

    2016-01-01

    To explore the content of patient-provider e-mails in a safety-net primary care clinic, we conducted a content analysis using inductive and deductive coding of e-mail exchanges (n = 31) collected from January through November 2013. Participants were English-speaking adult patients with a chronic condition (or their caregivers) cared for at a single publicly funded general internal medicine clinic and their primary care providers (attending general internist physicians, clinical fellows, internal medicine residents, and nurse practitioners). All e-mails were nonurgent. Patients included a medical update in 19% of all e-mails. Patients requested action in 77% of e-mails, and the most common requests overall were for action regarding medications or treatment (29%). Requests for information were less common (45% of e-mails). Patient requests (n = 56) were resolved in 84% of e-mail exchanges, resulting in 63 actions. These results show that patients in safety-net clinics are capable of safely and effectively using electronic messaging for between-visit communication with providers. Safety-net systems should implement electronic communications tools as soon as possible to increase health care access and enhance patients' involvement in their care. PMID:26332306

  5. Impact of humor and gender in e-mail marketing : Case DefShop GmbH

    Sivén, Johanna

    2015-01-01

    This Bachelor’s thesis project was conducted for DefShop GmbH. In accordance to the commissioner’s interests towards customization of their e-mail newsletter service, a test campaign was administered in order to detect possible differences in the clicking behavior of male and female newsletter subscribers when receiving either neutral or humorous e-mails. The two test e-mails used for the campaign differed in their visual content, changing the message in either humorous or neutral direction. ...

  6. Polarity Determination using Opinion Mining in Stocks and Shares-advertising Unsolicited Bulk e-mails

    Dr. Jatinderkumar R. Saini

    2012-04-01

    Full Text Available e-mail has become an important means of electronic communication but the viability of its usage is marred by Un-solicited Bulk e-mail (UBE messages. UBE consists of many types like pornographic, virus infected messages, ‘cry-for-help’ messages as well as fake and fraudulent offers/advertisements/promotions of stocks and shares, jobs, winnings, and medicines. UBE poses technical and socio-economic challenges to usage of e-mails. To meet this challenge and combat this menace, we need to understand UBE. Towards this end, a content-based textual analysis of more than 3100 stocks and shares-advertising unstructured UBE documents is presented. The paper is aimed at polarity determination of such UBE through its sentiment analysis. Technically, this is an application of Opinion Mining approached with help of Text Parsing, Tokenization, BOW and VSDM techniques. Sentiment Analysis is used to determine the polarity of the document because such UBE contain opinion of the spammer about specific stock symbol of share market. The Sentiment-depicting words are analyzed in the UBE corpus, scaled and extremes of positive and negative opinions are identified. An attempt has been made for polarity-based distribution of such UBE. It has been found that for almost 50�0of cases, the opinions expressed through such UBE have positive polarity, almost 30�0cases are negatively opined whereas almost 20�0cases contain neutral opinion. To the best knowledge and based on review of related literature, determination of UBE polarity using Opinion Mining for understanding spammer behaviour is a new concept.

  7. E-Mail discussion Forums in Library and Information Services (LIS: A Study

    Dhanavandan S

    2012-08-01

    Full Text Available The email facilities are currently provided free service through many search engines groups. The discussion forums are discussed through e-mail groups in same professions. The terms discussion forum “Forum, Mailing list and List are using interchangeably. This paper made an attempt to analysis library and information services (LIS forum. This paper analysed the highlights definition, purpose of the study, groups available over the internet and features of the forum, .the number of members, the mode of hosting the messages among LIS forum.

  8. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  9. Increasing the efficiency of marketing e-mail in customer retention

    Gurbag, Ali; Morales Valuis, Guadalupe Katherine

    2016-01-01

    Technology development has changes many things in the way businesses are done nowadays. Compa-nies needed to readapt their processes to the new demands of the markets in order to be competitive in online platforms. To achieve this, companies need to focus on retaining customers. E-marketing has developed many tools for this purpose, e-mail marketing has proven to have advantages in this task; however, sometimes the outcome is not as good as expected, mainly because the content and struc-ture ...

  10. Health Literacy and Global Cognitive Function Predict E-Mail but Not Internet Use in Heart Failure Patients

    Schprechman, Jared P.; Gathright, Emily C.; Goldstein, Carly M.; Guerini, Kate A.; Dolansky, Mary A.; Redle, Joseph; Hughes, Joel W.

    2013-01-01

    Background. The internet offers a potential for improving patient knowledge, and e-mail may be used in patient communication with providers. However, barriers to internet and e-mail use, such as low health literacy and cognitive impairment, may prevent patients from using technological resources. Purpose. We investigated whether health literacy, heart failure knowledge, and cognitive function were related to internet and e-mail use in older adults with heart failure (HF). Methods. Older adults (N = 119) with heart failure (69.84 ± 9.09 years) completed measures of health literacy, heart failure knowledge, cognitive functioning, and internet use in a cross-sectional study. Results. Internet and e-mail use were reported in 78.2% and 71.4% of this sample of patients with HF, respectively. Controlling for age and education, logistic regression analyses indicated that higher health literacy predicted e-mail (P cognitive function predicted e-mail (P cognitive impairment may prevent some patients from accessing these resources. Future studies that examine specific internet and email interventions to increase HF knowledge are needed. PMID:24282634

  11. Online-Jugendberatung. Eine kommunikationswissenschaftliche Arbeit über eMail-, Chat- und Forenberatung

    Selina Englmayer

    2006-03-01

    Full Text Available Gegenstand dieser kommunikationswissenschaftlichen Diplomarbeit sind eMail-, Chat- und Foren-Beratung für Jugendliche in Österreich. Nach einer Auseinandersetzung mit herkömmlichen Formen von Beratung (face-to-face- und Telefonberatung sowie Ratgeberjournalismus geht es um Definition und Formen der Online-Beratung. Des weiteren werden u.a. spezifische Beratungsstrategien und -methoden aus Theorie und Praxis, AkteurInnen und Rollen, Vor- und Nachteile sowie Qualitätskriterien dieser Beratungsform thematisiert. Weiters setzt sich die Autorin mit Jugendlichen und Internet (Nutzungsverhalten, Mediensozialisation, soziale Beziehungen im Internet auseinander. In der Folge geht es um herkömmliche und computervermittelte Kommunikation (CvK: Kommunikationsformen und -typen, Mediencharakteristika und Spezifika, Modelle der CVK etc. sind in diesem Zusammenhang unter besonderer Berücksichtigung der Online-Jugendberatung Thema. Abschließend stellt die Autorin in Reflexion auf den vorangegangenen theoretischen Teil drei österreichische Fallbeispiele der Online-Beratung für Jugendliche vor. Dabei handelt es sich um eine eMail-Beratungseinrichtung (ChEck iT!, einen Beratungschat (Kinderschutzzentrum Wien sowie ein Online-Forum (wienXtra.

  12. Standardization of teleradiology using Dicom e-mail: recommendations of the German Radiology Society

    Until recently there has been no standard for an interoperable and manufacturer-independent protocol for secure teleradiology connections. This was one of the main reasons for the limited use of teleradiology in Germany. Various teleradiology solutions have been developed in the past, but the vast majority have not been interoperable. Therefore an ad hoc teleradiology connection was impossible even between partners who were already equipped with teleradiology workstations. Based on the evaluation of vendor-independent protocols in recent years the IT Working Group (AGIT) of the German Radiology Society set up an initiative to standardize basic teleradiology. An e-mail based solution using the Dicom standard for e-mail attachments with additional encryption according to the OpenPGP standard was found to be the common denominator. This protocol is easy to implement and safe for personalized patient data and fulfills the legal requirements for teleradiology in Germany and other countries. The first version of the recommendation was presented at the 85th German Radiology Convention in 2004. Eight commercial and three open-source implementations of the protocol are currently available; the protocol is in daily use in over 50 hospitals and institutions. (orig.)

  13. Standardization of teleradiology using Dicom e-mail: recommendations of the German Radiology Society.

    Weisser, G; Walz, M; Ruggiero, S; Kämmerer, M; Schröter, A; Runa, A; Mildenberger, P; Engelmann, U

    2006-03-01

    Until recently there has been no standard for an interoperable and manufacturer-independent protocol for secure teleradiology connections. This was one of the main reasons for the limited use of teleradiology in Germany. Various teleradiology solutions have been developed in the past, but the vast majority have not been interoperable. Therefore an ad hoc teleradiology connection was impossible even between partners who were already equipped with teleradiology workstations. Based on the evaluation of vendor-independent protocols in recent years the IT Working Group (AGIT) of the German Radiology Society set up an initiative to standardize basic teleradiology. An e-mail based solution using the Dicom standard for e-mail attachments with additional encryption according to the OpenPGP standard was found to be the common denominator. This protocol is easy to implement and safe for personalized patient data and fulfills the legal requirements for teleradiology in Germany and other countries. The first version of the recommendation was presented at the 85th German Radiology Convention in 2004. Eight commercial and three open-source implementations of the protocol are currently available; the protocol is in daily use in over 50 hospitals and institutions. PMID:16228213

  14. The effectiveness of personalized e-mail newsletters and the role of personal characteristics.

    Maslowska, Ewa; Putte, Bas van den; Smit, Edith G

    2011-12-01

    Personalizing communication means creating persuasive messages that refer to aspects of a person's self. Although the use of personalization is increasing, research on its effectiveness is limited and the results are mixed. This study examined the persuasiveness of personalized e-mail newsletters in terms of increased attention, cognitive activity, evaluation, attitude, intention, and behavior by means of an experiment (n=109). Participants randomly received either a personalized or a generic newsletter advertising a sports center. Personalization triggered a more positive evaluation of the message; however, it did not influence the other effect variables. The effects were moderated by consumers' need for uniqueness, trust, and privacy concerns, suggesting that personalization is a good strategy to increase message evaluation only among individuals who have a high need for uniqueness. PMID:21790275

  15. SMEmail - A New Protocol for the Secure E-mail in Mobile Environments

    Toorani, Mohsen

    2010-01-01

    The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabilities and attacks, it is essential to provide suitable security solutions regarding the limitations of resource restricted platforms. Although some solutions such as PGP and S/MIME are currently available for the secure e-mail over the Internet, they are based on traditional public key cryptography that involves huge computational costs. In this paper, a new secure application-layer protocol, called SMEmail, is introduced that provides several security attributes such as confidentiality, integrity, authentication, non-repudiation, and forward secrecy of message confidentiality for the electronic mails. SMEmail offers an elliptic curve-based public key solution that uses public keys for the secure key establishment of a symmetric encryption, and is so suitable for the resource restricted platforms such as mobile phones.

  16. Health literacy and global cognitive function predict e-mail but not internet use in heart failure patients.

    Schprechman, Jared P; Gathright, Emily C; Goldstein, Carly M; Guerini, Kate A; Dolansky, Mary A; Redle, Joseph; Hughes, Joel W

    2013-01-01

    Background. The internet offers a potential for improving patient knowledge, and e-mail may be used in patient communication with providers. However, barriers to internet and e-mail use, such as low health literacy and cognitive impairment, may prevent patients from using technological resources. Purpose. We investigated whether health literacy, heart failure knowledge, and cognitive function were related to internet and e-mail use in older adults with heart failure (HF). Methods. Older adults (N = 119) with heart failure (69.84 ± 9.09 years) completed measures of health literacy, heart failure knowledge, cognitive functioning, and internet use in a cross-sectional study. Results. Internet and e-mail use were reported in 78.2% and 71.4% of this sample of patients with HF, respectively. Controlling for age and education, logistic regression analyses indicated that higher health literacy predicted e-mail (P literacy and cognitive impairment may prevent some patients from accessing these resources. Future studies that examine specific internet and email interventions to increase HF knowledge are needed. PMID:24282634

  17. A Novel Feature Selection Based on One-Way ANOVA F-Test for E-Mail Spam Classification

    Nadir Omer Fadl Elssied

    2014-01-01

    Full Text Available Spam is commonly defined as unwanted e-mails and it became a global threat against e-mail users. Although, Support Vector Machine (SVM has been commonly used in e-mail spam classification, yet the problem of high data dimensionality of the feature space due to the massive number of e-mail dataset and features still exist. To improve the limitation of SVM, reduce the computational complexity (efficiency and enhancing the classification accuracy (effectiveness. In this study, feature selection based on one-way ANOVA F-test statistics scheme was applied to determine the most important features contributing to e-mail spam classification. This feature selection based on one-way ANOVA F-test is used to reduce the high data dimensionality of the feature space before the classification process. The experiment of the proposed scheme was carried out using spam base well-known benchmarking dataset to evaluate the feasibility of the proposed method. The comparison is achieved for different datasets, categorization algorithm and success measures. In addition, experimental results on spam base English datasets showed that the enhanced SVM (FSSVM significantly outperforms SVM and many other recent spam classification methods for English dataset in terms of computational complexity and dimension reduction.

  18. The Uses of E-mail as a Medium on the Contante Justitie Proceedings on the Courts in Indonesia

    Yasser S. Wahab

    2015-10-01

    Full Text Available This research aims to know how the contante justitie principle may be applied into the enforced legislation in Indonesia, and to investigate the synergy of proceedings by means of e-mail in realizing contante justitie. The research employed in this paper is normative research, using both primary and secondary legal sources. Primary sources obtained from compiling relevant rules on the research concerned, in addition to secondary sources taken from books, court decisions, newspapers, internet materials and others relevant with the issue; that is to oversee the contradictions of humanist and mechanical processes when utilizing the internet e-mail for the court proceedings. The use of internet media e-mail in the correspondence process is expected to cut down the time, cost and potential instability. Thus strongly supports the realization of the principle of contante justitie in court proceedings more effectively and efficiently.

  19. Providing cell phone numbers and e-mail addresses to patients: The patient’s perspective, a cross sectional study

    Peleg Roni

    2012-08-01

    Full Text Available Abstract Background Today patients can consult with their treating physician by cell phone or e-mail. These means of communication enhance the quality of medical care and increase patient satisfaction, but they can also impinge on physicians’ free time and their patient schedule while at work. The objective of this study is to assess the attitudes and practice of patients on obtaining the cell phone number or e-mail address of their physician for the purpose of medical consultation. Methods Personal interviews with patients, 18 years of age or above, selected by random sampling from the roster of adults insured by Clalit Health Services, Southern Division. The total response rate was 41%. The questionnaire included questions on the attitude and practice of patients towards obtaining their physician’s cell phone number or e-mail address. Comparisons were performed using Chi-square tests to analyze statistically significant differences of categorical variables. Two-tailed p values less than 0.05 were considered statistically significant, with a power of 0.8. Results The study sample included 200 patients with a mean age of 46.6 ± 17.1, of whom 110 were women (55%. Ninety-three (46.5% responded that they would be very interested in obtaining their physician’s cell phone number, and an additional 83 (41.5% would not object to obtaining it. Of the 171 patients (85.5% who had e-mail addresses, 25 (14.6% said they would be very interested in obtaining their physician’s e-mail address, 85 (49.7% said they would not object to getting it, and 61 (35.7% were not interested. In practice only one patient had requested the physician’s e-mail address and none actually had it. Conclusions Patients favored cell phones over e-mail for consulting with their treating physicians. With new technologies such as cell phones and e-mail in common use, it is important to determine how they can be best used and how they should be integrated into the flow

  20. E-Mail-Kommunikation als Form der Online-Beratung – Einzelfallstudie aus dem Fallmanagement eines SGB-II-Trägers

    Katharina Katz

    2009-04-01

    Full Text Available Die Autorin hat eine Einzelfallstudie über die E-Mail-Kommunikation einer Fallmanagerin mit ihren Beratungskunden im JobCenter angefertigt. Hierfür hat sie sowohl die grundsätzlichen Möglichkeiten in der Arbeitslosenberatung des JobCenters ergänzend zur persönlichen Beratung per E-Mail zu kommunizieren als auch den konkreten E-Mail-Verlauf binnen dreier Wochen ausgewertet. Ein Abdruck beispielhafter E-Mail-Kommunikationsverläufe rundet die Arbeit ab.

  1. A Knowledge Acquisition Method of Judgment Rules for Spam E-mail by using Self Organizing Map and Automatically Defined Groups by Genetic Programming

    Ichimura, Takumi; Mera, Kazuya; HARA, AKIRA

    2010-01-01

    In this paper, we propose a classification method for Spam E-mail based on the results of SpamAssassin. This method can learn patterns of Ham and Spam E-mails. First, SOM can classify many E-mails into the some categories. In this phase, we can see the characters of current received Spam E-mails. Second, ADG can extract the correct judgment rules of Hams misjudged as Spams. However, there are a few cases of Spam misjudged as Ham. In this experiment, ADG makes an over fitting to the characters...

  2. Assessing the Factors Affecting the Amount of E-Mail Spam Delivery in a Public School District

    Yasenchock, David A.

    2013-01-01

    Eighty to ninety percent of e-mail is considered unsolicited commercial communication, or spam. Not only does spam violate the privacy of users, but it also incurs societal costs associated with time-related losses, serves as a vehicle for cyber-crime, and threatens the success of e-commerce by lowering consumer confidence. This quantitative…

  3. Differences between chat room and e-mail sampling approaches in Chinese men who have sex with men.

    Wang, Quanyi; Ross, Michael W

    2002-10-01

    In a study to determine sampling differences between Internet sites, we obtained data on 353 men who have sex with men in Chinese gay chat rooms and through e-mail web sites. Respondents were approached by the investigator and agreed to fill out an anonymous questionnaire on their Internet use and sexual activity. All materials and contacts were in Chinese characters. Data indicated that there were few differences between the chat room and Internet samples, but that those using e-mail appear to be more isolated, more homosexually-identified (rather than bisexual), have more experience with casual partners on a number of sexual activities, and were less likely to carry condoms and to have safe sex. E-mail respondents were more likely to want to discuss HIV/AIDS prevention on a web site or other site. These data suggest that the two recruiting methods are largely comparable in respondent characteristics, but that e-mail respondents are likely to be more isolated and at higher HIV risk than chat room participants. PMID:12413182

  4. New information technology and communication in health care: using e-mail for marketing services

    Jorge Iván Martínez Espitia

    2015-01-01

    Full Text Available Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email marketing by independent health professionals was conducted in Colombia. Four variables, including tenure email account, receiving these email accounts marketing of products or services, read marketing emails and use by marketing professionals were measured with email. The result of this study showed that independent health professionals in Colombia are familiar with this type of marketing. Generally interested incorporate it as one of your marketing tools, but do not know how to do this activity, which is described in a simple way how to do a marketing campaign with the use of emails to the users of health services.

  5. Auto-Faxing imaging reports to referring physicians

    Robertson, Pauline; Day, Dennis; Leung, Desmond; Chien, Eugene; Lima-Simao, Fatima

    1997-01-01

    One of the major service issues within Medical Imaging is delivering reports quickly to referring physicians. As an effort to improve service, Mount Sinai Hospital’s Department of Medical Imaging implemented Auto-Fax to distribute imaging reports to physicians instead of the postal service. When a report is transcribed and then verified by the dictating radiologist, the radiology information system will automatically fax the result report to the referring physicians if subscribed to the Auto-...

  6. IntegraTUM Teilprojekt E-Mail: Aufbau eines mandantenfähigen Groupware-Services und seine Integration in Identity Management und E-Mail Infrastruktur der Technischen Universität München

    Diehn, Max

    Die E-Mail-Infrastruktur an der Technischen Universität München (TUM) ist historisch bedingt sehr heterogen und komplex. Viele Einrichtungen müssen wertvolle Arbeitskraft auf die Administration eigener Mailserver verwenden. Auf der anderen Seite wird bei einigen Einrichtungen der Ruf nach Groupware-Funktionalitäten wie z.B. gemeinsame Kalender immer lauter. Das Teilprojekt E-Mail stellt einen zentralen Mail- und Groupware-Service bereit, der den Einrichtungen ermöglichen soll, den Betrieb eigener Server und zugehöriger Systeme (etwa lokaler Benutzerverwaltungen) für diesen Zweck aufzugeben und diese Dienste an das Teilprojekt E-Mail zu migrieren, ohne ihre Verwaltungshoheit oder ihre Maildomains aufgeben zu müssen. Dieser Service versteht sich als eine Ergänzung zur bestehenden Grundversorgung der TUM mit den Maildiensten des myTUM-Mailers, ist mandantenfähig aufgebaut und kann daher künftig neben der TUM auch weiteren Organisationen im Münchner Wissenschaftsnetz zur Verfügung gestellt werden.

  7. Personal Media Producer: A System for Creating 3D CG Animation from Mobile Phone E-mail

    Koichi Emura

    2006-05-01

    Full Text Available Mobile phone e-mail is increasingly being chosen by consumers as their primary communication tool. Messages exchanged among mobile phone users frequently contain “emoticons (smileys” and “emoji (pictograms”. Some consumers have started to use services that add a relevant animated image to a message. Consumers will start to exchange animated messages if they are available. This paper proposes a method of generating animation sequences from plain text messages without an authoring process. This method utilizes information available in the consumer’s ubiquitous computing environment to obtain necessary information not included in the original e-mail. The results of the preliminary evaluation show that a user needs around two minutes to create a one-minute animation using this method, a 3.6 times improvement in creation efficiency over that of a prior method.

  8. The Uses of E-mail as a Medium on the Contante Justitie Proceedings on the Courts in Indonesia

    Yasser S. Wahab; Julianto J.J. Kalalo; Lisa Mery

    2015-01-01

    This research aims to know how the contante justitie principle may be applied into the enforced legislation in Indonesia, and to investigate the synergy of proceedings by means of e-mail in realizing contante justitie. The research employed in this paper is normative research, using both primary and secondary legal sources. Primary sources obtained from compiling relevant rules on the research concerned, in addition to secondary sources taken from books, court decisions, newspapers, internet ...

  9. Phone and e-mail counselling are effective for weight management in an overweight working population : A randomized controlled trial

    Dekkers J Caroline; Ariëns Geertje AM; van Wier Marieke F; Hendriksen Ingrid JM; Smid Tjabe; van Mechelen Willem

    2009-01-01

    Abstract Background The work setting provides an opportunity to introduce overweight (i.e., Body Mass Index ≥ 25 kg/m2) adults to a weight management programme, but new approaches are needed in this setting. The main purpose of this study was to investigate the effectiveness of lifestyle counselling by phone or e-mail on body weight, in an overweight working population. Secondary purposes were to establish effects on waist circumference and lifestyle behaviours, and to assess which communicat...

  10. Support Vector Machines Parameter Selection Based on Combined Taguchi Method and Staelin Method for E-mail Spam Filtering

    Wei-Chih Hsu; Tsan-Ying Yu

    2012-01-01

    Support vector machines (SVM) are a powerful tool for building good spam filtering models. However, the performance of the model depends on parameter selection. Parameter selection of SVM will affect classification performance seriously during training process. In this study, we use combined Taguchi method and Staelin method to optimize the SVM-based E-mail Spam Filtering model and promote spam filtering accuracy. We compare it with other parameters optimization methods, such as g...

  11. The Diagnostic Agreement of Original and Faxed Copies of Electrocardiograms

    Sadrihe Hajesmaeel-Gohari

    2013-02-01

    Full Text Available Background: General practitioners working in remote and rural areas sometimes need consultation with cardiologists. One practical and cost-effective way is transmission of patients’ electrocardiographic images via ordinary fax machine to the cardiologists, but there is an important question that how much agreement exists between the diagnoses made by reading an original electrocardiogram and its copy transmitted via fax.Materials and Methods: In this cross-sectional study, 60 original electrocardiographic images were given to cardiologists for diagnosis. In the next step those electrocardiographic images were faxed to the hospital through a simple cheap fax machine, one month later the same cardiologist was asked to put his diagnosis on the copied versions of electrocardiographs, and the results were compared. Results: In 59 studied cases, the two method of diagnoses were exactly the same and only in one case the diagnoses were different. Therefore, Kappa agreement coefficient was calculated as 96%.Conclusion: According to the results of this study, general practitioners working in deprived areas can be certainly recommended to send patients’ electrocardiographic images to the cardiologists via fax in the case of needing consultation.

  12. Phone and e-mail counselling are effective for weight management in an overweight working population: a randomized controlled trial

    Dekkers J Caroline

    2009-01-01

    Full Text Available Abstract Background The work setting provides an opportunity to introduce overweight (i.e., Body Mass Index ≥ 25 kg/m2 adults to a weight management programme, but new approaches are needed in this setting. The main purpose of this study was to investigate the effectiveness of lifestyle counselling by phone or e-mail on body weight, in an overweight working population. Secondary purposes were to establish effects on waist circumference and lifestyle behaviours, and to assess which communication method is the most effective. Methods A randomized controlled trial with three treatments: intervention materials with phone counselling (phone group; a web-based intervention with e-mail counselling (internet group; and usual care, i.e. lifestyle brochures (control group. The interventions used lifestyle modification and lasted a maximum of six months. Subjects were 1386 employees, recruited from seven companies (67% male; mean age 43 (SD 8.6 y; mean BMI 29.6 (SD 3.5 kg/m2. Body weight was measured by research personnel and by questionnaire. Secondary outcomes fat, fruit and vegetable intake, physical activity and waist circumference were assessed by questionnaire. Measurements were done at baseline and after six months. Missing body weight was multiply imputed. Results Body weight reduced 1.5 kg (95% CI -2.2;-0.8, p Conclusion Lifestyle counselling by phone and e-mail is effective for weight management in overweight employees and shows potential for use in the work setting. Trial registration ISCRTN04265725.

  13. Support Vector Machines Parameter Selection Based on Combined Taguchi Method and Staelin Method for E-mail Spam Filtering

    Wei-Chih Hsu

    2012-04-01

    Full Text Available Support vector machines (SVM are a powerful tool for building good spam filtering models. However, the performance of the model depends on parameter selection. Parameter selection of SVM will affect classification performance seriously during training process. In this study, we use combined Taguchi method and Staelin method to optimize the SVM-based E-mail Spam Filtering model and promote spam filtering accuracy. We compare it with other parameters optimization methods, such as grid search. Six real-world mail data sets are selected to demonstrate the effectiveness and feasibility of the method. The results show that our proposed methods can find the effective model with high classification accuracy

  14. Pros and Cons when Combining E-mail Marketing with Telemarketing in Business-to-Business Direct Marketing

    Ignatov, Sille

    2011-01-01

    The objective of this thesis is to find pros and cons for combining e-mail marketing with telemarketing in business-to-business direct marketing. This topic is current because more and more businesses want to properly use this combination but have no skills of doing it successfully. One of the example company is EcoTelematics Group, for whom this thesis has been written for. However, due to the general level of the content other businesses struggling with the same issues can find help from...

  15. 'Can you upload as soon as you can please?' A study of university student requests by e-mail in English Medium Instruction

    Lazarescu, Raluca Catalina

    2013-01-01

    In the last two decades, the use of Information and Communication Technology (ICT) has somewhat changed educational patterns. More specifically, e-mail communication in the academic setting has to some extent modified the student-teacher relationship (Economidou-Kogetsidis, 2011). Through electronic mail, students no longer need to wait until lesson time or advising sessions to have their queries and requests solved. The use of e-mail seems to have made possible a new kind of relationship bet...

  16. 1991 worldwide petroleum phone/fax/telex directory

    This book puts more than 34,000 worldwide locations just a phone call or fax or telex message away. The directory lists companies and their subsidiaries in locations from Alaska to Zaire, whether their operations are in exploration, production, refining, transportation, petrochemicals, etc., offshore or on land. The listings are organized by country, with the companies listed in alphabetical order. So if you happen to know the country you wish to reach, you simply choose the company listed under it. And if you happen to know only the company name, two company indices will help you find the specific location you want. The Company Index Hierarchical lists all subsidiaries, branches, divisions, etc., under their corporate names. The Company Index - Alphabetical lists all entries alphabetically. Country codes for telephone, fax or telex are provided

  17. 一种新的E-mail应用模式的研究%A New Model of E-mail Application

    马勤; 陶先平; 吕建

    2001-01-01

    E-mail has been the most mature and widely used way of mail exchanging on Internet. But its ability is far more than this. Virtually,it can be used as a basic facility for data exchanging and automatic processing in various domain applications. From this point of view,a new model of E-mail application is presented in this paper,and based on the new model,we advise a two-layer framework for implementation. In the framework a middleware system EAMS is desigened and implemented with well generality,flexibility and expandability. Also meeting notification is discussed as a typical application.

  18. E-mail marketing e a influência na intenção de compra do consumidor online : caso Clubefashion

    Silva, Marta Costa da

    2015-01-01

    Mestrado em Marketing O e-commerce é hoje um grande motor da economia mundial. O e-mail marketing continua a ser a ferramenta de comunicação mais poderosa na decisão de compra. Este projeto tem como objetivo perceber a influência do e-mail marketing na intenção de compra, analisando de que forma algumas das variáveis que caracterizam as campanhas, como linha de assunto, layout e segmentação, bem como as taxas de aberturas e cliques, contribuem para maior propensão para a compra. Para tal, ...

  19. E-mail og/eller SMS: 22 husholdningers erfaringer på baggrund af et års feedback om elforbruget

    Larsen, Anders

    Hovedresultatet er, at husholdningerne værdsætter on-line information (via sms og e-mail) om udviklingen i deres elforbrug. Husholdningerne værdsætter dette uafhængigt af deres holdninger i øvrigt til energibesparelser. Informationen giver husholdningerne en ønsket oplevelse af kontrol. Rapporten...

  20. Comparing Traditional Journal Writing with Journal Writing Shared over E-mail List Serves as Tools for Facilitating Reflective Thinking: A Study of Preservice Teachers

    Kaplan, Diane S.; Rupley, William H.; Sparks, Joanne; Holcomb, Angelia

    2007-01-01

    To determine the conditions that would best encourage reflection in journal writing of preservice teachers in field-based reading internships, the degree of reflective content found in self-contained traditional journals was compared to the reflective content found in journal entries shared over e-mail list serves. Participants were 56 preservice…

  1. Efficient information theoretic strategies for classifier combination, feature extraction and performance evaluation in improving false positives and false negatives for spam e-mail filtering.

    Zorkadis, V; Karras, D A; Panayotou, M

    2005-01-01

    Spam emails are considered as a serious privacy-related violation, besides being a costly, unsolicited communication. Various spam filtering techniques have been so far proposed, mainly based on Naïve Bayesian algorithms. Other Machine Learning algorithms like Boosting trees, or Support Vector Machines (SVM) have already been used with success. However, the number of False Positives (FP) and False Negatives (FN) resulting through applying various spam e-mail filters still remains too high and the problem of spam e-mail categorization cannot be solved completely from a practical viewpoint. In this paper, we propose a novel approach for spam e-mail filtering based on efficient information theoretic techniques for integrating classifiers, for extracting improved features and for properly evaluating categorization accuracy in terms of FP and FN. The goal of the presented methodology is to empirically but explicitly minimize these FP and FN numbers by combining high-performance FP filters with high-performance FN filters emerging from a previous work of the authors [Zorkadis, V., Panayotou, M., & Karras, D. A. (2005). Improved spam e-mail filtering based on committee machines and information theoretic feature extraction. Proceedings of the International Joint Conference on Neural Networks, July 31-August 4, 2005, Montreal, Canada]. To this end, Random Committee-based filters along with ADTree-based ones are efficiently combined through information theory, respectively. The experiments conducted are of the most extensive ones so far in the literature, exploiting widely accepted benchmarking e-mail data sets and comparing the proposed methodology with the Naive Bayes spam filter as well as with the Boosting tree methodology, the classification via regression and other machine learning models. It is illustrated by means of novel information theoretic measures of FP & FN filtering performance that the proposed approach is very favorably compared to the other rival methods

  2. Foreign language learning using e-mail in a task-oriented perspective: Interuniversity experiments in communication and collaboration

    Barson, John; Frommer, Judith; Schwartz, Michael

    1993-12-01

    From 1988 to 1990 several collaborative “cross-country” intermediate French classes at Harvard and Stanford became one class. Students combined their efforts and insights in the accomplishment of a semester-long task, in most cases the publication of a student newspaper or magazine, using the electronic mail (e-mail) network to contact each other, elaborate their plans, and bring their projects to successful conclusion. Additional experiments of a similar nature took place between Harvard and the University of Pittsburgh (in the spring of 1990) and between Stanford and the University of Pittsburgh during 1991 1993. This paper suggests that this type of task-oriented learning through distance-communication is applicable at many different course levels and has considerable merit as an approach to teaching and learning. The key phases of this task-based model are presented along with technological information regarding computers and networks, as a guide to colleagues interested in pursuing similar lines of experimental teaching. Also included are samples of student messages, with their varied and often highly colorful discourse features, which attest to the motivation of students and reveal the strong personal investment made by the participants as they join hands across the miles in a productive, communication-based enterprise. The language and learning styles generated by technology and computers fully deserve closer investigation by researchers and teaching practitioners alike. The authors summarize the experiments, discuss assessment, and present research issues, concluding that good pedagogy and quality technology must share a vision of what can be accomplished in this rapidly evolving educational work place.

  3. Faxing Structures to the Moon: Freeform Additive Construction System (FACS)

    Howe, A. Scott; Wilcox, Brian; McQuin, Christopher; Townsend, Julie; Rieber, Richard; Barmatz, Martin; Leichty, John

    2013-01-01

    Using the highly articulated All-Terrain Hex-Limbed Extra-Terrestrial Explorer (ATHLETE) robotic mobility system as a precision positioning tool, a variety of print head technologies can be used to 3D print large-scale in-situ structures on planetary surfaces such as the moon or Mars. In effect, in the same way CAD models can be printed in a 3D printer, large-scale structures such as walls, vaults, domes, berms, paving, trench walls, and other insitu derived elements can be FAXed to the planetary surface and built in advance of the arrival of crews, supplementing equipment and materials brought from earth. This paper discusses the ATHLETE system as a mobility / positioning platform, and presents several options for large-scale additive print head technologies, including tunable microwave "sinterator" approaches and in-situ concrete deposition. The paper also discusses potential applications, such as sintered-in-place habitat shells, radiation shielding, road paving, modular bricks, and prefabricated construction components.

  4. How can PT efficiently and effectvely align its e-mail and sms marketing efforts to drive channel migrations to online touchpoints?

    Almeida, Rodrigo

    2016-01-01

    This work studies the current Portugal Telecom’s Customer Journey, exploring opportunities to do channel migrations into online touchpoints by using E-mail and SMS as tools, as a way to be more efficient. In-depth interviews were conducted to access PT’s strategic aim, and 913 persons were surveyed about their path when contacting the company and its competitors. Statistical evidence was found for differences between the telecommunications operators in the use of some touchpoints, mainly Word...

  5. Motivation and identity in a class of young EFL students in Taiwan: Effects of participating in an e-mail exchange with native English speaking students.

    White, Simon

    2014-01-01

    Abstract This dissertation focuses on motivation and identity in language learning by studying a class of young (elementary school) EFL learners in Taiwan. The students participated in an e-mail exchange program with a group of similarly aged native speaking students in England. The exchange offered the students a more stimulating way of using their English than their conventional classes, and afforded them the opportunity of communicating with a group of native...

  6. Reklam i din bästa vän? : en jämförelse av uppfattningar av reklam genom E-mail respektive SMS

    Larsson, Josefin

    2012-01-01

    The work with this paper began with a belief that the permission aspect plays acrucial part when it comes to consumers perceptions of marketing through E-mailand SMS - especially when it comes to advertising that is received through a devicethat the consumer has a strong personal relationship with. The questions to beinvestigated was: "How do users of computers and mobile phones feel aboutadvertisement received through E-mail and SMS?" and "In what way does the usersrelationship to the comput...

  7. The 16 most common fossil groups from Danian found in Faxe Quarry

    Lauridsen, Bodil Wesenberg

    2009-01-01

    Twelve folders dealing with the 16 most common fossil groups from Danian found in Faxe Quarry. The folders are for sale at the museum and designated for visitor......Twelve folders dealing with the 16 most common fossil groups from Danian found in Faxe Quarry. The folders are for sale at the museum and designated for visitor...

  8. E-mail as the Appropriate Method of Communication for the Decision-Maker When Soliciting Advice for an Intellective Decision Task.

    Prahl, Andrew; Dexter, Franklin; Swol, Lyn Van; Braun, Michael T; Epstein, Richard H

    2015-09-01

    For many problems in operating room and anesthesia group management, there are tasks with optimal decisions, and yet experienced personnel tend to make decisions that are worse or no better than random chance. Such decisions include staff scheduling, case scheduling, moving cases among operating rooms, and choosing patient arrival times. In such settings, operating room management leadership decision-making should typically be autocratic rather than participative. Autocratic-style decision-making calls for managers to solicit and consider feedback from stakeholders in the decision outcome but to make the decision themselves using their expert knowledge and the facts received. For this to be effective, often the manager will obtain expert advice from outside the organization (e.g., health system). In this narrative review, we evaluate the advantages and disadvantages of using prompt asynchronous written communication (i.e., e-mail) as a communication channel for such interaction between a decision-maker (manager) and advisor. A detailed Appendix (Supplemental Digital Content, http://links.lww.com/AA/B72) lists each observational and experimental result. We find that the current ubiquitous role of e-mail for such communication is appropriate. Its benefits include improved time management via asynchronicity, low cognitive load (e.g., relative to Web conferencing), the ability to hide undesirable and irrelevant cues (e.g., physical appearance), the appropriateness of adding desirable cues (e.g., titles and degrees), the opportunity to provide written expression of confidence, and the ability for the advisor to demonstrate the answer for the decision-maker. Given that the manager is e-mailing an advisor whose competence the manager trusts, it is unnecessary to use a richer communication channel to develop trust. Finally, many of the limitations of e-mail can be rectified through training. We expect that decades from now, e-mail (i.e., asynchronous writing) between an

  9. Kurumsal Bilgi Kaynağı Olarak E-posta Yönetim Sistemleri = E-mail Management Systems as an Enterprise Information Resource

    Külcü, Özgür

    2012-01-01

    Full Text Available Çalışmada, e-posta kullanımı ve yönetimine ilişkin uluslararası koşullar incelenmekte, bu çerçevede Türkiye’de 28 kurum örneğinde gerçekleştirilen anket verileri değerlendirilmektedir. Betimleme yönteminin kullanıldığı çalışmada literatür incelemesi ve anket tekniklerine dayanarak gerekli veriler elde edilmiştir. Araştırmada e-posta kullanımına ilişkin elde edilen verilerin, ilgili alanda sistemler geliştirmeye çalışan araştırmacılara yardımcı olması beklenmektedir. Kurumsal e-posta yönetimine ilişkin temel sorunlar arasında mesajların üretimi, düzenlenmesi, ayıklanması ve uzun süre korunmasını içeren e-posta yönetim sistemlerinin geliştirilmesi yer almaktadır. Ayrıca insan kaynakları, mali ve idari konuların yönetimi ile belge ve arşiv yönetimi çalışmalarını kapsamına alan, içerisine e-posta yönetiminin de dâhil olduğu sistemlerin bütünleştirilmesi güncel araştırma konuları arasındadır. / This study examines the universal usage and management of e-mail communication and compares with the data, gathered from 28 Turkish institutions. This is a descriptive research in nature and the quantitative data were collected through surveys. It is expected that the results one-mail communication and its usage styles will shed a ligth into researcher who are working on system development. One of the basic problems of organizational e-mail management systems are lack of e-mail systems including message creation, maintenance, disposition, and long term preservation. Furthermore, the results indicate that integration of human resources management, financial and administrative management systems and archival management systems with e-mail managment system is another major problem.

  10. What a rude e-mail! Examining the differential effects of incivility versus support on mood, energy, engagement, and performance in an online context.

    Giumetti, Gary W; Hatfield, Andrea L; Scisco, Jenna L; Schroeder, Amber N; Muth, Eric R; Kowalski, Robin M

    2013-07-01

    Existing research on workplace incivility has demonstrated an association with a host of negative outcomes, including increased burnout, turnover intentions, and physical symptoms. With the rise in Internet communication over the last decade, interpersonal mistreatment has spilled over to the Internet, but little is known about the impact of incivility communicated via e-mail on employee psychological and performance outcomes. The current study presents a within-subjects experiment wherein incivility and support were manipulated in a laboratory-based simulated workplace setting. Eighty-four participants completed a series of math tasks while interacting with either an uncivil or a supportive supervisor via e-mail. Data were collected on energy, cardiac activity, mood, task performance, and engagement. Findings indicate that participants reported higher levels of negative affect and lower levels of energy after working with the uncivil supervisor than with the supportive supervisor. Additionally, participants performed significantly worse on the math tasks and had lower engagement in the uncivil condition than the supportive condition, and these relationships were mediated by energy. No differences were found in cardiac activity between the two conditions. Results are discussed in terms of their implications for the 21st century world of work. PMID:23834445

  11. UNIFYING AUTHENTICATION OF MOODLE AND E-MAIL SYSTEM BASED ON LDAP%Moodle及邮件系统基于LDAP的统一身份认证

    徐鹂; 王耀

    2011-01-01

    Moodle and e-mail system are two related,but separate applications,they have their own authentication system. Under the campus application environment, the practical problem we have encountered is how to realise the uniform authentication and management of both. Through learning and comprehending the authentication ways of two systems,and proceeding from the LDAP data model,we elaborately discuss the config uration of LDAP server as well as the process of LDAP configuration in regard to Moodle and e-mail system as the client sides.%Moodle和邮件系统是两个既相关又独立的应用系统,它们有各自的认证体系.在校园应用环境下,如何实现两者的统一认证和管理,这是在工作实际中遇到的一个问题.通过对两个系统的认证方式的认识和了解,从轻量级目录访问协议LDAP的数据模型入手,着重讨论LDAP服务器的配置以及作为客户端的Moodle与邮件系统的LDAP配置过程.

  12. SNG-log in borehole P7 in Faxe Chalk Quarry

    Korsbech, Uffe C C

    1996-01-01

    A spectral natural gamma-ray log in a 190 m borehole in Faxe chalk quarry confirms that Danish bryozoan and corallic limestones contain very low levels of natural radioactivity. Due to the low content of natural radioactivity it has been possible to observe the influence from cosmic radiation. The...

  13. COPROLITES FROM THE DANIAN LIMESTONE (LOWER PALEOCENE) OF FAXE QUARRY, DENMARK

    Milàn, Jesper

    2010-01-01

    attributed to sharks, and large, cylindrical coprolites with longitudinal striations on the surface are identified as crocodile coprolites. Fish and sharks are known from abundant finds of otoliths and teeth in Faxe Quarry, and crocodiles are known from finds of single bones and teeth....

  14. CyLaw-Report XXVII: Zu Art. 10 GG bei der "Beschlagnahme" von E-Mails auf dem Mailserver des Providers und beim Zugriff des Arbeitgebers auf E-Mails des Arbeitnehmers : Entscheidungen des Bundesverfassungsgerichts (BVerfG) vom 16.06.2009 - 2 BvR 902/06, des Verwaltungsgerichtshofs (VGH) Kassel vom 19.05.2009 - 6 A 2672/08.Z und des Verwaltungsgerichts (VG) Frankfurt vom 06.11.2008 - 1 K 628/08.F

    Schmid, Viola

    2009-01-01

    Im Sachverhalt der Entscheidung des BVerfG nehmen die Ermittlungsbehörden Zugriff auf E-Mails, die nicht auf einem Rechner des Durchsuchten, sondern nur beim Provider gespei-chert sind. Die Herrschaft des E-Mail-Account-Inhabers ist also nicht absolut, sondern von der Entscheidung des Diensteanbieters über die Preisgabe der Daten abhängig. Im Sach-verhalt der Entscheidung des VG Frankfurts verlangt die Bundesanstalt für Finanzdienstleis-tungsaufsicht (BaFin) von einem Arbeitgeber, der die Pri...

  15. Increasing Induction-Level Teachers' Positive-to-Negative Communication Ratio and Use of Behavior-Specific Praise through E-Mailed Performance Feedback and Its Effect on Students' Task Engagement

    Rathel, Jeanna M.; Drasgow, Erik; Brown, William H.; Marshall, Kathleen J.

    2014-01-01

    The purpose of this study was to examine the effects of e-mailed specific performance feedback that included progress monitoring graphs on induction-level teachers' ratios of positive-to-negative communication behaviors and their use of behavior-specific praise in classrooms for students with emotional and behavioral disorders, mild…

  16. A catalogue of Danian gastropods from the Baunekule facies, Faxe Formation, Denmark

    Lauridsen, B.W.

    2014-12-01

    Full Text Available This catalogue of 194 gastropod taxa is based on the collection of Danian gastropods from the Baunekule facies, Faxe Formation in eastern Denmark. The gastropod fauna is extremely rich and well preserved. Most of the gastropods (106 species are referred to genus level only, 9 morphotypes to even higher taxonomical levels and 79 gastropods are referred to species level. The gastropods are classified following Bouchet & Rocroi (2005 as 4 different clades: Vetigastropoda (represented by 26 species and 10 superfamilies, Caenogastropoda (represented by 142 species and 17 superfamilies, Heterobranchia (represented by 23 species and 5 superfamilies and Opisthobranchia (represented by 1 species and 1 superfamily. The new species Zaclys? nuetzeli n. sp. is introduced. The Faxe Formation is recognised as a cold-water coral ecosystem with interfingering smaller bryozoan mounds. The Baunekule facies is found in the upper part of the coral mound complex of the Faxe Formation, where it forms isolated lensoidal bodies in the flanks of some of the coral mounds. It is characterised by a high diversity invertebrate fauna that occurs in weakly consolidated coraldominated floatstone to rudstone. The diagenesis of the Baunekule facies is of special significance because a high proportion of the originally aragonite-shelled fauna is preserved by recrystallization to calcite during early burial diagenesis. Most of the gastropods are not known from other parts of the Faxe Fm. The fauna is very important for comparative evolutionary studies of fossil and modern gastropods on cold-water coral mounds. Many of the genera have not previously been recorded from Danian strata. None of the gastropod species found in the Baunekule facies are known for certain to range below the Cretaceous–Palaeogene boundary. The fauna is comparable to gastropods found on modern cold-water coral mounds in the North Atlantic. The gastropod fauna from the Baunekule facies is characterised by a

  17. Bite traces in a turtle carapace fragment from the middle Danian (Lower Paleocene) bryozoan limestone, Faxe, Denmark

    Milan, Jesper; Lindow, Bent Erik Kramer; Lauridsen, Bodil Wesenberg

    2011-01-01

    A fragment of a turtle carapace from the Middle Danian bryozoan limestone at the Faxe quarry, eastern Denmark, is identified as a partial costal plate from the carapace of a chelonioid turtle. The fragment bears traces of three separate acts of predation or scavenging. Two circular bite traces...... either alone or in a row of three, are either from sharks or fish. This is the first record of turtles from the Danian bryozoan limestone exposed in Faxe....

  18. Spam Collaborative Filtering in Enron E-mail Network%邮件网络协同过滤机制研究

    杨震; 赖英旭; 段立娟; 李玉鑑; 许昕

    2012-01-01

    基于 Enron邮件集合探索真实邮件网络,揭示出邮件网络的无标度特性和有限小世界特性.在此基础上,依据用户间交互强度设计出垃圾邮件协同过滤机制,通过调整参数λ,用户可以决定主要是依靠自己还是其他用户协同进行垃圾信息过滤.算法即使在没有对用户个人阅读习惯充分训练的情况下,也可以通过基于交互强度的网络协同方式实现良好过滤.同时为了解决Enron数据集缺乏标注的情况,基于训练样本集W和测试样本集T独立同分布的假设,利用改进的EM (Expectation maximization)算法最小化WUT集合上风险函数,给出了未知样本的一个良好标注.真实数据上的实验表明,同单.机过滤和集成过滤方法相比,协同过滤能够提高平均过滤精度且方法简单易行.%Social network analysis in Enron corpus found that the real e-mail network was a scale-free and small world in some degree. Then a spam collaborative filtering method was designed based on users' interaction. By adjusting the parameter A, users can decide filtering spam by themselves or others or trade-off between them. Even in the absence of reading habits of users, the collaborative filtering method could achieve good performance. Because the Enron corpus was unlabeled, by adding I.I.d. Assumption constraint to training data set W and test data set T, we labeled Enron corpus using improved EM (Expectation maximization) algorithm in a sense of minimum statistical risk in W ∪ T. Experiment results showed that the collaborative filtering method is simple and effective which can steadily increase average accuracy compared with single machine and ensemble filterings.

  19. MAX06 and FAX06: update of two adult human phantoms for radiation protection dosimetry

    The International Commission on Radiological Protection (ICRP) is currently preparing new recommendations which will replace those released in ICRP 1991, 1990 Recommendations of the ICRP ICRP Publication 60 (Oxford: Pergamon). The draft report previews a change for the effective dose with respect to the number of organs and tissues to be included in its calculation. In the future, adipose tissue, connective tissue, the extrathoracic airways, the gall bladder, the heart wall, the lymphatic nodes, the prostate and the salivary glands have to be taken into account for the determination of the effective dose. This study reports on a second segmentation of the recently introduced male adult voxel (MAX) and female adult voxel (FAX) phantoms with regard to the new organs and tissues, but also presents a revised representation of the skeletons, which had not been adjusted to ICRP-based volumes in the first release of the two phantoms

  20. E-mailed Evidence Based Summaries Impact Physician Learning More than Practice. A Review of: Grad, Roland M., Pierre Pluye, Jay Mercer, Bernard Marlow, Marie Eve Beauchamp, Michael Shulha, Janique Johnson-Lafleur and Sharon Wood-Dauphinee. “Impact of Research-based Synopses Delivered as Daily E-mail: A Prospective Observational Study.” Journal of the American Medical Informatics Association (2008)15.2: 240-5.

    Hannigan, Gale G.

    2009-01-01

    Objective – To determine the use and construct validity of a method to assess the cognitive impact of information derived from daily e-mail evidence based summaries (InfoPOEMs), and to describe the self-reported impact of these InfoPOEMs.Design – Prospective, observational study over a period of 150 days employing a questionnaire and rating scale.Setting – This study was conducted via the Internet between September 8, 2006 and February 4, 2007.Subjects – Canadian Medical Association (CMA) mem...

  1. The fate of a middle Danian (Lower Paleocene) turtle from the bryozoan limestone of Faxe Quarry, Denmark

    Milàn, Jesper; Lindow, Bent Erik Kramer; Lauridsen, Bodil Wesenberg

    A piece of turtle carapace from the Middle Danian bryozoan limestone at the Faxe quarry, eastern Denmark, is identified as a partial coastal plate from the carapace of a chelonioid turtle. In addition to being the first record of turtles from the Middle Danian of Denmark, the fragment bears...

  2. Implementing a fax referral program for quitline smoking cessation services in urban health centers: a qualitative study

    Cantrell Jennifer

    2009-12-01

    Full Text Available Abstract Background Fax referral services that connect smokers to state quitlines have been implemented in 49 U.S. states and territories and promoted as a simple solution to improving smoker assistance in medical practice. This study is an in-depth examination of the systems-level changes needed to implement and sustain a fax referral program in primary care. Methods The study involved implementation of a fax referral system paired with a chart stamp prompting providers to identify smoking patients, provide advice to quit and refer interested smokers to a state-based fax quitline. Three focus groups (n = 26 and eight key informant interviews were conducted with staff and physicians at two clinics after the intervention. We used the Chronic Care Model as a framework to analyze the data, examining how well the systems changes were implemented and the impact of these changes on care processes, and to develop recommendations for improvement. Results Physicians and staff described numerous benefits of the fax referral program for providers and patients but pointed out significant barriers to full implementation, including the time-consuming process of referring patients to the Quitline, substantial patient resistance, and limitations in information and care delivery systems for referring and tracking smokers. Respondents identified several strategies for improving integration, including simplification of the referral form, enhanced teamwork, formal assignment of responsibility for referrals, ongoing staff training and patient education. Improvements in Quitline feedback were needed to compensate for clinics' limited internal information systems for tracking smokers. Conclusions Establishing sustainable linkages to quitline services in clinical sites requires knowledge of existing patterns of care and tailored organizational changes to ensure new systems are prioritized, easily integrated into current office routines, formally assigned to specific

  3. Development of a Fax-Based System for Incorporating Nondigital Paper-Based Data into DICOM Imaging Examinations

    Rothpearl, Allen; Sanguinetti, Rafael; Killcommons, John

    2008-01-01

    We describe the development of software that allows and automates the routine inclusion of nondigital paper-based data directly into DICOM examinations. No human intervention is required. The software works by allowing the direct faxing of nondigital paper-based patient data directly into DICOM imaging examinations and is added as the first series in the examination. The software is effective in any typical PACS/DICOM server environment.

  4. Ratios between the effective doses for tomographic phantoms MAX and FAX

    In the last two decades, the coefficients for the equivalent dose in organs and tissues, as well as to the effective dose, recommended by the International Commission on Radiological Protection (ICRP) were determined using exposure models based on stylized phantoms type MIRD, representing the human body with its radiosensitive organs and tissues according to the ICRP 23 Reference Man, Monte Carlo codes that simulate in a simplified way radiation physics, fabric compositions from different sources, and sometimes applied in a no realistic way, and by the list of organs and tissues at risk with their corresponding weight factors, published in ICRP 60. In the meantime, the International Commission on radiation units and Measurements (ICRU) published reference data to human tissue compositions in ICRU 44 and ICRP launched new anatomical and physiological data of reference in the report number 89. In addition a draft report with recommendations to be released in 2005 (http://icrp.org/) advances significant changes in the list of radiosensitive organs and tissues as well as their corresponding weight factors. As a practical consequence, all components of the traditional stylized models of exposure should be replaced: Monte Carlo codes, human phantoms, the compositions of the fabric and the selection of the organs and tissues at risk with their respective weight factors to determine the effective dose. This article presents the results of comprehensive research into the dosimetric consequences of replacing the stylized models of exposure. The calculations were done using the EGS4 Monte Carlo and MCNP4C codes for external and internal exposure to photons and electrons with phantoms ADAM and EVA, as well as with tomographic phantoms MAX and FAX, for different compositions and tissue distributions. The ratios between effective doses for models of exposure based on phantoms of voxels and effective doses for the stylized models for external and internal exposure to photons and

  5. E-mailed Evidence Based Summaries Impact Physician Learning More than Practice. A Review of: Grad, Roland M., Pierre Pluye, Jay Mercer, Bernard Marlow, Marie Eve Beauchamp, Michael Shulha, Janique Johnson-Lafleur and Sharon Wood-Dauphinee. “Impact of Research-based Synopses Delivered as Daily E-mail: A Prospective Observational Study.” Journal of the American Medical Informatics Association (200815.2: 240-5.

    Gale G. Hannigan

    2009-06-01

    Full Text Available Objective – To determine the use and construct validity of a method to assess the cognitive impact of information derived from daily e-mail evidence based summaries (InfoPOEMs, and to describe the self-reported impact of these InfoPOEMs.Design – Prospective, observational study over a period of 150 days employing a questionnaire and rating scale.Setting – This study was conducted via the Internet between September 8, 2006 and February 4, 2007.Subjects – Canadian Medical Association (CMA members who received InfoPOEMs via e-mail as of September 2006 were invited to participate. For inclusion in the analyses, a participant was defined as a practising family physician or general practitioner who submitted at least five ratings of InfoPOEMS during the study period (n=1,007.Methods – Volunteers completed a demographic questionnaire and provided informed consent online. Each subsequent InfoPOEM delivered included a link to a “ten-item impact assessment scale” (241. Participants checked “all that apply” of descriptive statements such as: My practice was (will be improved; I learned something new; I think this information is potentially harmful. Each combination of selections made was considered a pattern of cognitive impact. College of Family Physicians of Canada received continuing medical education (CME credit for each InfoPOEM rated. Data were collected by the CMA and forwarded weekly to the investigators who used descriptive statistics, principal component analysis, and multilevel factor analysis to analyze the data.Main Results – 1,007 participants rated an average of 61 InfoPOEMs (ranging from five to 111. A total of 61,493 patterns of cognitive impact were submitted. Eighty-five different patterns were observed, i.e., there were 85 different combinations of the scale’s statements used. Ten patterns accounted for 89.4% of the reports. The top five patterns were: I learned something new (35.2%; No impact (17.1%; This

  6. Instalace, konfigurace a testování serverových služeb typu www, e-mail, DNS a SAMBA v prostředí IPv4 a IPv6

    Dosoudil, Petr

    2012-01-01

    Cílem práce je ukázat zprovoznění serverových služeb typu www, e-mail, DNS a SAMBA, v prostředích operačních systémů Microsoft Windows Server 2008 a Debian. Teoretická část práce se zaměřuje na popis jednotlivých služeb a princip jejich fungování. Dále je doplněna o problematiku modelu TCP/IP, včetně jeho vrstev a rozdílů mezi IPv4 a IPv6. V praktické části je pro každou službu navržena určitá realizace, zabývající se instalací a následnou konfigurací dané služby ve vybraných operačních systé...

  7. 基于WinPcap的邮件信息解析系统的实现与优化%Realize and optimize of E-mail information analysis system based on WinPcap

    吴鑫; 余飞

    2009-01-01

    随着互联网的迅速发展,利用电子邮件进行不良信息传播的情况越来越严重,给用户带来极大的困扰,因此对网络中的邮件信息进行有效获取已成为当务之急.根据WinPcap抓包原理,研究了基于简单邮件传输协议SMTP(Simple Message Transfer Protocol)及邮局协议POP3(Post Office Protocol 3)传输的邮件信息解析方法,实现了一个基于WinPcap的邮件信息解析系统EIAS(E-mail Information Analysis System) 并提出了系统的性能优化方案.本文的研究成果不仅填补了在高速网络环境下邮件正文及附件信息还原方案的空白,更为监控网络中的不良信息提供了参考.

  8. 图书馆邮件服务系统集成的设计与实现%Design and Implementation of Library E-mail Service System Integration

    秦志华

    2011-01-01

    利用电子邮件开展读者服务已经成为图书馆日常服务的基本手段。但如何将图书馆多个读者服务系统通过电子邮件集成起来,实现一站式电子邮件服务,通过采用Jmail组件与PowerBuilder开发平台。实现了图书馆多个信息服务系统间的集成,有效地提高了图书馆读者电子邮件服务的质量与效率。%Using E-mail in reader service has become the basic daily method of library. But how to integrate multiple reader service by Email system, and realize one-stop Email service, is the focus of this article. The article realized the integration of the multiple library information service systems by using Jmail component and PowerBuilder development platform, and then effectively improved the library reader Email service quality and efficiency.

  9. Bridging cultural diversity through e-mail

    Shachaf, Pnina

    2005-01-01

    The implementation of global virtual teams presents modern organizations with significant challenges, such as a multicultural workforce and the use of information and communication technology. Cultural diversity increases teamwork complexity and may weaken a team's effectiveness and jeopardize its viability. Selection and implementation of appropriate information technology may facilitate group processes and overcome potential barriers created by team heterogeneity. This study illustrates how...

  10. Virtual Racism Rears its Head: Uncovering Librarian Bias in E-mail Reference Services. A review of: Shachaf, Pnina, and Sarah Horowitz. “Are Virtual Reference Services Color Blind?” Library & Information Science Research 28.4 (Sept. 2006): 501‐20.

    Wendy Furlan

    2007-01-01

    Objective – To examine whether librarians provide equitable virtual reference services to diverse user groups.Design – Unobtrusive method of defined scenarios submitted via e-mail.Setting – Twenty‐three Association of Research Libraries (ARL) member libraries from across the United States. All ARL member libraries were invited to participate, with the 23 acceptances providing 19% participation.Subjects – Anonymous librarians from the 23 participating libraries’ virtual e‐mail reference servic...

  11. Evaluation of Prescriber Responses to Pharmacist Recommendations Communicated by Fax in a Medication Therapy Management Program (MTMP)

    Perera, Prasadini N.; Guy, Mignonne C.; Sweaney, Ashley M.; Boesen, Kevin P.

    2016-01-01

    BACKGROUND As defined by the Medicare Prescription Drug, Improvement, and Modernization Act of 2003, medication therapy management programs (MTMPs) must be designed to decrease adverse drug events and improve patient outcomes by promoting appropriate medication use. WellPoint Inc. contracted with the pharmacist-run University of Arizona College of Pharmacy Medication Management Center (UA MMC) to provide a pilot telephone-based MTMP to approximately 5,000 high-risk beneficiaries from among its nearly 2 million Medicare prescription drug plan (PDP) beneficiaries. Eligibility for the program was determined by a minimum of 2 of 6 chronic diseases (dyslipidemia, cardiovascular disease, depression, diabetes mellitus, congestive heart failure, and chronic obstructive pulmonary disease; at least 1 of the latter 2 diseases must be present), at least 3 Part-D covered medications, and greater than $4,000 per year in predicted drug spending. In addition to these criteria, WellPoint Inc. used the Johns Hopkins adjusted clinical groups (ACG) predictive model to identify the high-risk beneficiaries to be enrolled in the program. Medication therapy reviews were conducted for these patients. If any medication-related problems (MRPs) were identified, the patient’s prescribers were contacted via a fax communication with recommendation(s) to resolve these MRPs. The UA MMC fax interventions were categorized as cost saving, guideline adherence, or safety concerns. OBJECTIVES To (a) determine prescriber responses to pharmacist-initiated recommendations in an MTMP for the 3 intervention categories, (b) compare prescriber responses between intervention categories, and (c) compare prescriber response by prescriber type (primary care physician [PCP] vs. specialist) within each intervention category. METHODS A retrospective analysis of pharmacist-initiated interventions from August through December 2008 was performed using data collected from the UA MMC database. Data were collected on

  12. Provisional English Translation by the IAEA of Notification Faxes Sent by the Fukushima Daiichi NPP Site Superintendent to Off-Site Officials on 11 March 2011. Annex I of Technical Volume 3

    This annex contains a provisional English translation of the faxes sent by the Fukushima Daiichi NPP Site Superintendent to METI, the Governor of Fukushima Prefecture and the Mayors of Okuma and Futaba on 11 March 2011

  13. Estimation of past sea-level variations based on ground-penetrating radar mapping of beach-ridges - preliminary results from Feddet, Faxe Bay, eastern Denmark

    Hede, Mikkel Ulfeldt; Nielsen, Lars; Clemmensen, Lars B; Noe-Nygaard, Nanna

    2011-01-01

    Estimates of past sea-level variations based on different methods and techniques have been presented in a range of studies, including interpretation of beach ridge characteristics. In Denmark, Holocene beach ridge plains have been formed during the last c. 7700 years, a period characterised by both...... isostatic uplift and changes in eustatic sea-level, and therefore represent an archive of past relative sea-level variations. Here, we present preliminary results from investigation of beach ridges from Feddet, a small peninsula located in Faxe Bay (Baltic Sea) in the eastern part of Denmark. Feddet has...... architecture which may be used as a proxy of past relative sea-level. High-resolution GPR images with a vertical resolution of c. 0.1 m of the near-surface sediments resolve downlapping reflections along the GPR profiles, which are interpreted to mark the transition from the beach to the upper shoreface regime...

  14. E-Mail Server and Traffic Control Management in 2012

    Cosmin Catalin Olteanu

    2012-12-01

    Full Text Available Emails represents one of the most used communication system in world wide web for more than 15 years and “spam” messages are one of the most annoying and disturbing phenomena. All of us are aware that online marketers are trying to transmit their advertising messages to as many addresses they can. For such “unwanted” messages, adaptive systems must be assembled to review and mark what is wright and what is bad. Always these systems must adapt to consumers preferences to mark only that messages that are not in his white list. Surveys for more than 3000000 messages showed me that some criteria can be defined by start.

  15. Archiving Writers' Work in the Age of E-Mail

    Kolowich, Steve

    2009-01-01

    The job of literary archivist is changing as paper manuscripts yield to laptops, Blackberry's, and Facebook content, and digital preservation lets scholars learn more about authors' creative process than ever before. Personal computers and external storage devices have been around for more than a quarter-century, but only now, as the famous…

  16. Erfahrungsbericht: E-Mail-Beratung in der Jugendberatungsstelle Waggon

    Katharina Fidesser

    2006-09-01

    Full Text Available Wie in vielen anderen Einrichtungen auch, entstand die e-Mailberatung in der Beratungsstelle WAGGON in Mödling einfach deshalb, weil es die Nachfrage gab. Niemand ahnte, dass sich dieser Bereich so weiterentwickeln und die Nachfrage so ansteigen würde, doch genau das ist passiert. Diese Tatsache machte es erforderlich, neue Strukturen und Herangehensweisen zu erarbeiten, um weiterhin ein professionelles Beratungsangebot, angepasst an die Bedingungen des WAGGONs und den neuesten Entwicklungen im Bereich der Online-Beratung, garantieren zu können. Die e-Mailberatung im WAGGON ist immer noch in einem Entwicklungsstadium. Aber wir haben schon viel erreicht, verbessert, ausprobiert, verworfen und wieder eingeführt.

  17. Сlassification methodology e-mails using neural networks

    Терейковський, Ігор Анатолійович; Національний технічний університет України «Київський політехниічний інститут»

    2013-01-01

    The effectiveness of email security is largely dependent on the accuracy of spam detection in leaves and roots. Existing recognition methods based on statistical analysis of text information, which significantly limits their ability to detect new types of spam and leaks. To overcome this shortcoming proposed classification methodology sheets based on semantic analysis using an electronic neural networks. A used as input parameters of the neural network in the frequency of meeting the letter o...

  18. Integrating E-mail Service with Opportunistic Network

    Wang, Kunkun

    2011-01-01

    Haggle is a networking architecture for content-centric opportunistic communication. Legacy networks and legacy services are possible to be integrated into Haggle. A typical legacy service is email service. The key problem for integrating email service is that data is opportunistically transmitted to any node and any node which has Internet connection could be a potential email gateway. Therefore, one email may find many gateways in Haggle and duplicate emails will be sent to a destination. A...

  19. E-mail security: new restriction on attachments

    The Mail Team

    2006-01-01

    In order to further protect CERN mail users against viruses that spread using malicious files, from 1st March onwards dangerous file types already forbidden as mail attachments will also be forbidden as contents of an archive attachment (.zip and .rar compressed files). More details, including a list of blocked file types, can be found at http://cern.ch/mmmservices/Help/?kbid=171010 The Mail Team

  20. E-mail security: new restriction on attachments

    The Mail Team

    2006-01-01

    In order to further protect CERN mail users against viruses that spread using malicious files, from 1st March onwards dangerous file types already forbidden as mail attachments will also be forbidden as contents of an archive attachment (.zip and .rar compressed files). More details, including a list of blocked file types, can be found at http://cern.ch/mmmservices/Help/?kbid=171010. The Mail Team

  1. Elforbrug på e-mail & sms

    Christiansen, Ellen Tove; Kanstrup, Anne Marie; Grønhøj, Alice;

    electricity suppliers should focus on feedback about metering and billing as a service, which in the first place supports households' wish to sustain themselves. In the second place, this feedback also brings energy consumption issues more to the foreground, improves general energy literacy, and plays a role...... in storytelling to friends and family. Thereby it also becomes part of the social norm landscape and contributes to the fostering of both family identity and the education of children. Such a reframing of feedback information from a saving focus to a service focus may lead to the development of new...

  2. The Communicative Functions of Emoticons in Workplace E-Mails :-)

    Skovholt, Karianne; Grønning, Anette; Kankaanranta, Anne

    2014-01-01

    function as contextualization cues, which serve to organize interpersonal relations in written interaction. They serve 3 communicative functions. First, when following signatures, emoticons function as markers of a positive attitude. Second, when following utterances that are intended to be interpreted as...

  3. Clasificarea distribuita a mesajelor de e-mail

    Pop, Florin; Trauşan-Matu, Ştefan

    2011-01-01

    A basic component in Internet applications is the electronic mail and its various implications. The paper proposes a mechanism for automatically classifying emails and create dynamic groups that belong to these messages. Proposed mechanisms will be based on natural language processing techniques and will be designed to facilitate human-machine interaction in this direction.

  4. 75 FR 23747 - Notice of Availability (NOA) of the Draft Environmental Impact Statement for the Disposal and...

    2010-05-04

    ... writing either at the hearing or mailed or e-mailed to: Director, BRAC Program Management Office (PMO... (2) Written comments mailed to the BRAC PMO address in this notice; or (3) Written comments faxed to the BRAC PMO fax number in this notice; or (4) Comments submitted via e-mail using the BRAC PMO...

  5. 76 FR 10012 - Notice of Availability of the Draft Supplemental Environmental Impact Statement for the Disposal...

    2011-02-23

    ... 6:30 p.m. FOR FURTHER INFORMATION CONTACT: Director, BRAC PMO West, Attn: Mr. Ronald Bochenek, 1455... mailed to the BRAC PMO address in this notice; or (3) written comments faxed to the BRAC PMO fax number in this notice; or (4) comments submitted via e-mail using the BRAC PMO e-mail address in this...

  6. Assessments of conversion coefficients between equivalent dose and accumulated activity using pre-dose scanning images of patients subjected to radioiodine treatment and the Fax/Egs4 computational model

    The radioiodine is a technique for treatment of thyroid cancer. In this technique, the patients are submitted to the incorporation of the radioactive substance sodium iodide (Na131I), which reacts with physiologically metastasis, thyroid tissue remains of and other organs and tissues of the human body. The locations of these reactions are known as areas of highest concentration, hipercaptured areas, hiperconcentrator areas, ''hot areas'' or organ-sources and are viewed through images of nuclear medicine scan known as pre-dose (front and rear). To obtain these images, the patient receives, orally, a quantity of 131I with low activity (±74 MBq) and is positioned in the chamber of flicker. According to the attendance of hot areas shown in the images, the doctor determines the nuclear activity to be administered in treatment. This analysis is purely qualitative. In this study, the scanning images of pre-dose were adjusted to the dimensions of FAX voxel phantom, and the hot areas correspond to internal sources of the proposed model. Algorithms were developed to generate particles (photons and electrons) in these regions of the FAX. To estimate the coefficients of conversions between equivalent dose and accumulated activity in major radiosensitive organs, FAX and algorithms source were coupled to the Monte Carlo EGS4 code (Electron Gamma Shower, version 4). With these factors is possible to estimate the equivalent doses in the radiosensitive organs and tissues of patients as long as is know the activity administered and the half-life of organic sources. (author)

  7. Assessments of conversion coefficients between equivalent dose and accumulated activity using pre-dose scanning images of patients subjected to radioiodine treatment and the Fax/Egs4 computational model

    The radioiodine is a technique for treatment of thyroid cancer. In this technique, the patients are submitted to the incorporation of the radioactive substance sodium iodide (Na131I), which reacts with physiologically metastasis, thyroid tissue remains of and other organs and tissues of the human body. The locations of these reactions are known as areas of highest concentration, hipercaptured areas, hiperconcentrator areas, 'hot areas' or organ-sources and are viewed through images of nuclear medicine scan known as pre-dose (front and rear). To obtain these images, the patient receives, orally, a quantity of 131I with low activity (± 74 MBq) and is positioned in the chamber of flicker. According to the attendance of hot areas shown in the images, the doctor determines the nuclear activity to be administered in treatment. This analysis is purely qualitative. In this study, the scanning images of pre-dose were adjusted to the dimensions of FAX voxel phantom, and the hot areas correspond to internal sources of the proposed model. Algorithms were developed to generate particles (photons and electrons) in these regions of the FAX. To estimate the coefficients of conversions between equivalent dose and accumulated activity in major radiosensitive organs, FAX and algorithms source were coupled to the Monte Carlo EGS4 code (Electron Gamma Shower, version 4). With these factors is possible to estimate the equivalent doses in the radiosensitive organs and tissues of patients as long as is know the activity administered and the half-life of organic sources. (author)

  8. 基于ICT中间件的电信级网络传真运营系统%A Telecom-Grade Network Fax Operation System Based on ICT Mid-Ware Technology

    林晓勇; 糜正琨; 赵康; 张奇

    2011-01-01

    The faxing behaviors have been investigated and analyzed for conventional enterprises and individuals, A novel central-mode and telecom-level network fax operation system (FOS) is implemented for operator's valued-added service(VAS), the system is schemed by ICT (information communication technology)mid-ware technology which separate the specific upper applications from the complex lower driven devices, the varying applications can quickly be ordered by the ICT SCE (service creation environment) even for a short-time trainee, the ICT Flow solves the service flow and state scheduling, the ICT Engines drive the different devices of multi-venders in heterogeneous networks. The SIB (service independence block) are designed and classified, the GSL(general service logic) describes detailed logical relationship between SIB from the POI (point of initiation) to POR (point of return), FOS has a telecom-level redundancy deployment of load-sharing, key techniques also are interpreted including virtual fax number, online stamps and virtual print. The statistics proved it an efficient solution for the conventional and neglected fax service on a low-carbon and green earth under the summons of energy saving and emission reduction.%对传统企业和个人用户传真业务的行为进行了比较,为拓展运营商增值业务(VAS)设计了一种集中式的电信级网络传真运营系统(FOS).系统采用了将业务与设备分离的中间件技术,不同业务的定制由ICT SCE生成,业务的解析和调度ICTFIow完成,异构网络和多厂商设备的具体驱动由ICT Engine实现.ICT中间件解决了业务独立元件(SIB)的分类与通用业务逻辑(GSL)实现.设计了电信级的负荷分担的冗余保护方案,其创新点包括“虚拟传真号码”、“在线电子签章”和“虚拟打印技术”等关键技术.在当前号召“节能减排”、“绿色低碳”的社会中,FOS为传统的易忽视的传真业务提供了高效的解决方案.

  9. Virtual Racism Rears its Head: Uncovering Librarian Bias in E-mail Reference Services. A review of: Shachaf, Pnina, and Sarah Horowitz. “Are Virtual Reference Services Color Blind?” Library & Information Science Research 28.4 (Sept. 2006: 501‐20.

    Wendy Furlan

    2007-06-01

    Full Text Available Objective – To examine whether librarians provide equitable virtual reference services to diverse user groups.Design – Unobtrusive method of defined scenarios submitted via e-mail.Setting – Twenty‐three Association of Research Libraries (ARL member libraries from across the United States. All ARL member libraries were invited to participate, with the 23 acceptances providing 19% participation.Subjects – Anonymous librarians from the 23 participating libraries’ virtual e‐mail reference services. Up to 6 librarians from each library may have been involved. Six fictitious personas were developed to represent particular ethnic or religious groups, whereby the ethnic or religious affiliation was only indicated by the name chosen for each user and the correspondinge‐mail address. Names were selected from lists of names or baby names available online: Latoya Johnson (African‐American, Rosa Manuz (Hispanic, Chang Su (Asian ‐Chinese, Mary Anderson(Caucasian/Christian, Ahmed Ibrahim (Muslim, and Moshe Cohen(Caucasian/Jewish. These personas were used to submit reference queries via e‐mail to the virtual reference services taking part in the study.Methods – Five different types of reference queries were developed for use in this study. Three were based on prior published research as they were deemed to be answerable by the majority of libraries. They included a dissertation query, a sports team query, and a population query all designed to be tailored to the target institution. The other 2 queries were developed with participating institutions’ virtual reference guidelines in mind, and were thought to not be answered by the target institutions when submitted by unaffiliated users. They consisted of a subject query on a special collection topic that asked for copies of relevant articles to be sent out, and an article query requesting that a copy of a specific article be e‐mailed to the patron. The study was conducted over a 6 week

  10. 75 FR 20977 - Departmental Management; Advisory Committee on Minority Farmers

    2010-04-22

    ... may also be requested by telephone, fax, or e-mail. All inquiries about the nomination process and... membership on the Committee and may be in the form of a letter of nomination or a completed...

  11. 75 FR 78673 - Agency Information Collection Activities: Proposed Collection; Comment Request-Study To Assess...

    2010-12-16

    ... also be submitted via fax to the attention of Steven Carlson at 703-305-2576 or via e-mail to Steve... administering the program. The natural experiment offered by the ARRA's benefit increase will be used to...

  12. Social and Emotional Issues of Living with OI

    ... need information about intimacy, sexuality, and reproduction. While dating may be delayed for some people, teens still ... or 301-947-0083 Fax: 301-947-0456 Internet: www.oif.org E-mail: bonelink@oif.org ...

  13. 76 FR 31379 - Notice of Availability of Environmental Assessment and Finding of No Significant Impact for...

    2011-05-31

    ..., Pennsylvania, 19406. Telephone: 610-337-5236; fax number: 610-337-5269; e-mail: John.Nicholson@nrc.gov..., Pennsylvania this 18th day of May 2011. For the Nuclear Regulatory Commission. Judith A. Joustra,...

  14. 75 FR 69397 - Minnkota Power Cooperative, Inc.: Notice of Availability of an Environmental Assessment

    2010-11-12

    ... Independence Ave., SW., Room 2244-S, Stop 1571, Washington, DC 20250-1571, fax: (202) 690-0649, or e-mail... Auditor......... 115 West Main, 701-794-8777 Hensler, ND 58530. Sheridan County Auditor....... 215...

  15. The Characteristics ofEmailLanguage onInternet

    Wang Xiao-Hui; Ma Hao-Yan

    2014-01-01

    With the popular use of computer in our life and work, the E-mail has become the important medium of people’s communication insteadof letter, fax and telephone. The E-mail language has its own unique characteristics. On one hand it tends to be oral, informal,on the other hand it resemblesthetraditional letter which has the fixed structure of discourse .By analyzing the E-mail language features we can use the communication tool correctly.

  16. 75 FR 67697 - Privacy Act of 1974; Systems of Records

    2010-11-03

    ...: Title, full name, Social Security Number (SSN), current address, permanent address, phone number, cell phone number, e-mail address, office address, office phone number, office fax number, office e-mail... enrollment status at a Center for Academic Excellence (CAE) to include anticipated date of...

  17. 76 FR 1346 - Airworthiness Directives; Airbus Model A300, A300-600, A310, A318, A319, A320, A321, A330-300...

    2011-01-10

    ... 5 61 93 44 51; e-mail account.airworth-eas@airbus.com ; Internet http://www.airbus.com . For service... 96; fax +33 5 61 93 44 51; e-mail account.airworth-eas@airbus.com ; Internet http://www.airbus.com... ; Internet http://www.airbus.com . Examining the AD Docket You may examine the AD docket on the Internet...

  18. 75 FR 28103 - Indian Child Welfare Act; Designated Tribal Agents for Service of Notice

    2010-05-19

    ...; Fax: (907) 826-5526; E-mail: n/a. Crooked Creek, Village of, Evelyn Thomas, President and Lorraine... Xavier, ICWA Worker, P.O. 3551; E-mail: oxavier@avcp.org ; and Association of Village Council Presidents....cravalho@qira.org . Koyuk, Native Village of, Leo M. Charles Sr., Tribal Family Coordinator, P.O. Box...

  19. Analysis of E-mail Marketing%E-mail营销策略运用浅析

    李巍

    2005-01-01

    介绍了E-mail营销的概念、内容和特点,分析了实施E-mail营销所存在的优势和问题,针对性地分析应当如何获取用户的E-mail地址,并行之有效地实施E-mail营销,实现企业网络营销的成功.

  20. Spam and E-Mail Marketing%垃圾邮件与E-Mail营销

    杜运庆; 白人朴; 王瑞婷

    2005-01-01

    根据中国互联网信息中心(CNNIC)最新的第15次中国互联网络发展状况报告,截止到2004年12月31日,我国的上网计算机总数已达4160万台,同上一次调查结果相比,我国的上网计算机总数半年增加了530万台,增长率为14.6%,是1997年10月第一次调查结果29.9万台的139.1倍,上网用户总人数为 9400 万,而这些用户得知新网站的主要途径有28.3%是通过电子邮件,可见E-Mail在电子营销中起着举足轻重的作用.然而,被誉为小企业宣传法宝的E-Mail营销却往往跟"垃圾邮件"形影不离,为广大网民所诟病.

  1. E-mail营销方法探讨%The E-mail Marketing Method Study

    李燕

    2006-01-01

    随着互联网的进一步发展和普及,E-mail营销越来越成为商家进行营销的一个重要手段,但是E-mail营销的发展现状却并不客人乐观.因此,研究E-mil营销的策略应是商家的首要选择.

  2. Email营销面临的问题%Questions E-mail Marketing Faced With

    于兆河

    2003-01-01

    随着计算机网络的快速发展,也为企业的营销增加了新的渠道,Email营销逐渐的被企业所应用,而且市场潜力巨大.但Email营销存在着很多急需解决的问题,在很大程度上制约了Email营销的发展.与传统的营销方法相比,其已逐渐开始体现出其优势,随着网络经济的发展和完善,Email营销必然发挥更大的作用.

  3. Dynamic modeling of web purchase behavior and e-mailing impact by Petri net

    BALAGUE, Christine; LEE, Janghyuk

    2004-01-01

    In this article, the authors introduce Petri nets to model the dynamics of web site visits and purchase behaviors in the case of wish list systems. They describe web site activities and their transition with probability distributions and model the sequential impact of influential factors through links that better explain web purchase behavior dynamics. The basic model, which analyzes site connections and purchases to explain visit and purchase behavior, performs better than a classical negati...

  4. The Hispanic View of E-mail, Popup, and Banner Advertising

    Pradeep K. Korgaonkar; Ronnie Silverblatt; Enrique P. Becerra

    2010-01-01

    In this paper, the authors broadly investigate Hispanic consumer attitudes and their sociological behaviors toward online advertising. The study documents the correlation between Hispanic attitudes, behaviors, and three types of online advertising that have an effect on cultural distinctions. Additionally, the study compares the group’s attitudes toward TV advertising vis-Ã -vis the three types of online advertising to compare the two medium’s similarities and differences. Notably, Hispanics ...

  5. E-Alerts: Environmental pollution and control (water pollution and control). E-mail newsletter

    NONE

    1999-04-01

    Topics of discussion include the following: Pollution by municipal wastes, agricultural wastes, industrial wastes, mine wastes, radioactive contaminants; Chemistry and analysis of pollutants; Thermal pollution; Oil pollution; Control techniques and equipment; Sewage treatment; Industrial waste water pretreatment; Hydrology and limnology; Biological and ecological effects; Waste water reuse; Laws, legislation, and regulations; Public administration; Economics; Land use.

  6. Wissen, Intuition und Können in der E-Mail-Beratung

    Marc Weinhardt

    2014-04-01

    Full Text Available The article clears the concepts of knowledge, intuition and skills in the domain of e-mailcounseling. Along a competence model of psychosocial counseling differences are analyzed between knowledge, skills and intuition under a development and structure perspective and then explained with regard to her significance for education, supervision and case work.

  7. The Language of Business E-Mail: An Opportunity to Bridge Theory and Practice

    Julio C. Gimenez

    2015-01-01

    The language of business email has attracted a great deal of attention in the last decade. Research studies on the language, style and register of business email have been published in many journals, books and other publications. However, many of these discussions have been theoretical in nature, failing to make a connection between theory and practice. It is then the task of the ESP teacher to make such a connection. This article argues that business communication lends itself well to bringi...

  8. Analysis of the Use of Linguistic Politeness Strategies in An E-mail

    屈厦沙

    2012-01-01

    I .Politeness in pragmatics The term "politeness" used by pragmaticis'ts is potentially misleading. It sounds as though it might be concerned with social etiquette, but it is not. Politeness in pragmatics describes the relationship between "how something is said and the addressee' s judgement as to how it should be said" (Grundy, 2000). In other words, politeness consists of strategies employed by participants in spoken and written discourse to best achieve their communicative goals in a particular context while attempting to maintain, or even enhance their relationship with the hearer or reader. To understand politeness in the .

  9. Measuring Organizational Consciousness Through E-Mail Based Social Network Analysis

    Gloor, Peter A.; Colladon, Andrea Fronzetti

    2015-01-01

    This paper describes first experiments measuring organizational consciousness by comparing six "honest signals" of interpersonal communication within organizations with organizational metrics of performance.

  10. Participation Rates in a Worksite Wellness Program Using E-Mail Wellness Messages

    Larry W. Anenson; Ardith Brunt; Donna J. Terbizan; Bryan Christensen

    2014-01-01

    The purpose of this study was to determine which days of the work week had the largest rate of opened e-health messages, whether detailed or basic e-health messages were more likely to be opened, if motivation influenced the rate of message opening, and if the rate of opening messages declined over time. Ninety-one city employees (52 male and 39 female) of a medium-sized Midwestern city in the United States participated in the study. Participants were divided into four groups accordin...

  11. The Language of Business E-Mail: An Opportunity to Bridge Theory and Practice

    Julio C. Gimenez

    2015-10-01

    Full Text Available The language of business email has attracted a great deal of attention in the last decade. Research studies on the language, style and register of business email have been published in many journals, books and other publications. However, many of these discussions have been theoretical in nature, failing to make a connection between theory and practice. It is then the task of the ESP teacher to make such a connection. This article argues that business communication lends itself well to bringing theory and practice closer together. To this end, the article first identifies relevant features which have started to emerge from main studies in the language of business email, a vital component in business communication. It then explores different possible pedagogical applications of these findings in the BE class. The article discusses the SAE (Selecting, Applying and Evaluating model which can be used to design and evaluate classroom activities. The article finally presents four activities which have been created following the main findings emerging from the research reviewed.

  12. Opportunities for reflection : e-mail and the web in the primary classroom

    Vries, de Bregje

    2004-01-01

    This thesis presents four design experiments in primary schools that address the following research problem: How can reflection be embedded in the learning process to improve the development of personal understanding of a domain and learning task?

  13. A NOVEL GRAPH MODEL FOR E-MAIL FORENSICS: EVIDENCE ACTIVITY ANALYSIS GRAPH

    Sridhar Neralla

    2013-10-01

    Full Text Available This work puts forward a novel technique for evidence analysis that assist cyber forensics expert for analyzing cyber crime episode in an effective manner. Novelty in Evidence Activity Analysis Graph is reflection of activities involved in the cyber crime that are represented as nodes along with stylometric analysis. In this pieceof work email based cyber crime incident is considered for study and that incident is represented in Evidence Activity Analysis Graph to fix the suspect. Comparisons between various graphs that are used in cyber forensics were also discussed in this paper. This model establishes relationships between various activities that were happened in the cyber crime.

  14. Finding Relationships between Socio-Technical Aspects and Personality Traits by Mining Developer E-mails

    Paruma-Pabón, Oscar Hernán; GONZÁLEZ, FABIO A.; Aponte, Jairo; Camargo, Jorge E.; Restrepo-Calle, Felipe

    2016-01-01

    Personality traits influence most, if not all, of the human activities, from those as natural as the way people walk, talk, dress and write to those most complex as the way they interact with others. Most importantly, personality influences the way people make decisions including, in the case of developers, the criteria they consider when selecting a software project they want to participate. Most of the works that study the influence of social, technical and human factors in software develop...

  15. Classification of Textual E-Mail Spam Using Data Mining Techniques

    Ramiz M. Aliguliyev; Rasim M. Alguliev; Nazirova, Saadat A.

    2011-01-01

    A new method for clustering of spam messages collected in bases of antispam system is offered. The genetic algorithm is developed for solving clustering problems. The objective function is a maximization of similarity between messages in clusters, which is defined by k-nearest neighbor algorithm. Application of genetic algorithm for solving constrained problems faces the problem of constant support of chromosomes which reduces convergence process. Therefore, for acceleration of convergence of...

  16. E-Alerts: Environmental pollution and control (radiation pollution and control). E-mail newsletter

    The paper discusses pollution of the environment by particle and electromagnetic radiation from natural and synthetic sources, including neutrons, X-rays, ultraviolet radiation, microwaves, alpha particles; Radon; Sampling and analytical techniques; Fallout; Biological and ecological effects; Laws, legislation, and regulations; Public administration; and Economics

  17. Chat, E-Mail, Web, and Chat Room Slang and Acronyms

    ... Shop AAP Find a Pediatrician Family Life Medical Home Health Insurance Pediatric Specialists Family Dynamics Adoption & Foster Care Communication & Discipline Types of Families Media Work & Play ...

  18. 76 FR 46853 - International Business Machines Corporation, ITD Business Unit, Division 7, E-mail and...

    2011-08-03

    ... Employment and Training Administration International Business Machines Corporation, ITD Business Unit... States Reporting to Armonk, NY; International Business Machines Corporation, Web Strategy and Enablement..., applicable to workers of International Business Machines Corporation (IBM), ITD Business Unit, Division 7,...

  19. Changes in the e-mail policy for people without CERN affiliation

    2012-01-01

    When affiliated with CERN, every computing account owner is entitled to have a CERN mail address (e.g. “John.Doe@cern.ch”). However, up to now, this mail address was still valid even after the end of a person's affiliation if the owner declared an external email address (e.g. “John.Doe@gmail.com”) to which all personal CERN emails (i.e. those sent to “John.Doe@cern.ch”) could be forwarded.*   As a result, to use our John Doe analogy, John could continue to write and receive emails ostensibly on behalf of CERN despite the fact that he is no longer a member of the personnel or subject to the CERN Staff Rules and Regulations and the Computing Rules. It is doubtful whether this makes sense. Therefore, in agreement with departments and LHC experiments at the last ITSRM meeting, all CERN email addresses of people whose affiliation has been terminated more than six months ago will be deactivated on 15 October 2012. For all others, incl...

  20. Fair exchange in e-commerce and certified e-mail, new scenarios and protocols

    Draper Gil, Gerard

    2013-01-01

    We are witnessing a steady growth in the use of Internet in the electronic commerce field. This rise is promoting the migration from traditional processes and applications (paper based) to an electronic model. But the security of electronic transactions continues to pose an impediment to its implementation. Traditionally, most business transactions were conducted in person. Signing a contract required the meeting of all interested parties, the postman delivered certified mail i...

  1. Classification of Textual E-Mail Spam Using Data Mining Techniques

    Rasim M. Alguliev

    2011-01-01

    Full Text Available A new method for clustering of spam messages collected in bases of antispam system is offered. The genetic algorithm is developed for solving clustering problems. The objective function is a maximization of similarity between messages in clusters, which is defined by k-nearest neighbor algorithm. Application of genetic algorithm for solving constrained problems faces the problem of constant support of chromosomes which reduces convergence process. Therefore, for acceleration of convergence of genetic algorithm, a penalty function that prevents occurrence of infeasible chromosomes at ranging of values of function of fitness is used. After classification, knowledge extraction is applied in order to get information about classes. Multidocument summarization method is used to get the information portrait of each cluster of spam messages. Classifying and parametrizing spam templates, it will be also possible to define the thematic dependence from geographical dependence (e.g., what subjects prevail in spam messages sent from certain countries. Thus, the offered system will be capable to reveal purposeful information attacks if those occur. Analyzing origins of the spam messages from collection, it is possible to define and solve the organized social networks of spammers.

  2. On Classification of N=2 Supersymmetric Theories, (e-mail uncorrupted version)

    Cecotti, S.; Vafa, C.

    1992-01-01

    We find a relation between the spectrum of solitons of massive $N=2$ quantum field theories in $d=2$ and the scaling dimensions of chiral fields at the conformal point. The condition that the scaling dimensions be real imposes restrictions on the soliton numbers and leads to a classification program for symmetric $N=2$ conformal theories and their massive deformations in terms of a suitable generalization of Dynkin diagrams (which coincides with the A--D--E Dynkin diagrams for minimal models)...

  3. A Game Theoretic Framework for E-Mail Detection and Forgery Analysis

    Long Chen

    2016-01-01

    Full Text Available In email forensic, the email detection and forgery conflict is an interdependent strategy selection process, and there exists complex dynamics between the detector and the forger, who have conflicting objectives and influence each other’s performance and decisions. This paper aims to study their dynamics from the perspective of game theory .We firstly analyze the email basic structure and header information, then discuss the email detection and forgery technologies. In this paper, we propose a Detection-Forgery Game (DFG model and make a classification of players’ strategy with the Operation Complexity (OC. In the DFG model, we regard the interactions between the detector and the forger as a two-player, non-cooperative, non-zero-sum and finite strategic game, and formulate the Nash Equilibrium. The optimal detection and forgery strategies with minimizing cost and maximizing reward will be found by using the model. Finally, we perform empirical experiments to verify the effectiveness and feasibility of the model.

  4. A Game Theoretic Framework for E-Mail Detection and Forgery Analysis

    Long Chen; Yuan Lou; Min Xiao; Zhen-Xing Dong

    2016-01-01

    In email forensic, the email detection and forgery conflict is an interdependent strategy selection process, and there exists complex dynamics between the detector and the forger, who have conflicting objectives and influence each other’s performance and decisions. This paper aims to study their dynamics from the perspective of game theory .We firstly analyze the email basic structure and header information, then discuss the email detection and forgery technologies. In this paper, we propose ...

  5. Wireless Controlled Methods via Voice and Internet (e-mail for Home Automation System

    R.A.Ramlee

    2013-08-01

    Full Text Available This paper presents a wireless Home Automation System (HAS that mainly performed by computer. The system is designed with several control methods in order to control the target electrical appliances. This various control methods implemented to fulfill the needs of users at home even at outside. The computer application is designed in Microsoft Windows OS that integrated with speech recognition voice control by using Microsoft Speech Application Programming Interface (SAPI. The voice control method provides more convenience especially to the blind and paralyzed users at home. This system is designed to perform short distance control by using wireless Bluetooth technology and long distance control by using Simple Mail Transfer Protocol (SMTP email control method. The short distance control is considered as the control that performed inside the house. Moreover, the long distance control can be performed at everywhere by devices that installed with browser or email application, and also with the internet access. The system intended to control electrical appliances at home with relatively low cost design, user-friendly interface and ease of installation.

  6. In e-mail to students, Annan urges communication to build understanding

    2003-01-01

    "Using the original computer on which the Internet was created, United Nations Secretary-General Kofi Annan today sent an electronic message to young people around the world urging them to keep communicating with each other to build bridges of understanding between cultures and societies" (1 page)

  7. Participation Rates in a Worksite Wellness Program Using E-Mail Wellness Messages

    Anenson, Larry W.; Brunt, Ardith; Terbizan, Donna J.; Christensen, Bryan

    2014-01-01

    The purpose of this study was to determine which days of the work week had the largest rate of opened e-health messages, whether detailed or basic e-health messages were more likely to be opened, if motivation influenced the rate of message opening, and if the rate of opening messages declined over time. Ninety-one city employees (52 male and 39…

  8. REDISAIN FAX COURT IN THE ENFORCEMENT FOR TAX LAW FRAMEWORK

    Muhammad Djafar Saidi; Ruslan Hambali; Muchsin Salnia; Eka Merdekawati Djafar

    2013-01-01

    The research located at legal region of municipality of Jakarta, with considered that tax court include in ministry of finance of Indonesia republic and court of law of Indonesia republic are located in Jakarta. Tax court include in manistry of finance of Indonesia republik and court of law of Indonesia republic were expected to have relation to efforts in design the tax court in the enforcement of tax law framewark. The aim of the research are 1) to identify the position of tax court in Indo...

  9. 海外推广善用邮件营销%E-mail marketing helps overseas sales

    丁芬

    2010-01-01

    @@ 低成本、高效率、容易控制都是邮件营销的优势所在.一直以来,邮件营销都是企业爱不释手的营销利器,尤其对外贸企业而言,邮件营销无疑是降低海外推广成本最行之有效的方法.虽然邮件营销的高性价比已被企业广泛认可,但是邮件的普遍应用难免会产生邮件营销的不规范行为.而这些问题应该引起外贸企业的足够重视,避害就利,学会善用邮件才是未来企业邮件营销的决胜之道.

  10. The E-mail Marketing of Publication Corporations%书业企业E-mail营销初探

    余世英; 傅文

    2004-01-01

    随着电子商务在书业领域的逐步推广,电子邮件在书业企业的营销策略中正发挥着越来越重要的作用.本文从E-mail营销的涵义及其特点出发,探讨了书业企业开展E-mail营销的意义及其策略.

  11. E-mail营销的症结和对策%The Countermeasure to the Problem of E-mail Marketing

    戴逸飞

    2006-01-01

    E-mail作为互联网上应用得最早、最受欢迎的服务,在营销上的应用却一直没有很大的起色.这关键在于E-mail营销市场的不成熟、垃圾邮件作祟和E-mail营销的专业化程度不高.因此,建立一个规范、理性、专业化的市场才是改变这一状况的根本出路.

  12. Analysis on Marketing Means of E-mail%电子邮件营销手段探析

    张福学

    2002-01-01

    在探讨如何建立电子邮件列表的基础上,分析了电子邮件营销目前所存在的困难、专业化趋势和实施过程中应注意的几个问题,最后给出了电子邮件营销效果的评价方法.

  13. The SWOT Analysis of E-mail Marketing%电子邮件营销SWOT分析

    陈玉山; 庄小将

    2007-01-01

    通过对电子邮件营销的SWOT分析,本文系统地阐述了电子邮件营销媒体的优势、劣势、机会和威胁.进而指出电子邮件营销媒体可与网络媒体及传统媒体相互融合、联合互动,进而实现营销沟通的全过程.

  14. 社交媒体与电子邮件礼仪%Social Media and E-mail Etiquette

    钟鸣(选编)

    2012-01-01

    I don't know about you, but lately I've been hearing about some pretty serious netiquette ( net etiquette, 网络礼仪) snafus ( 混乱 ) that have been so bad that people have lost their jobs over them. Here are some ways to make sure you are putting your best foot forward.%社交媒体与电子邮件已成为职场中最常用和最重要的交流手段。合理运用社交媒体、书写电子邮件的能力。与会话、交际能力是并驾齐驱的。本文列举的“互联网礼仪”,不仅能帮你“玩转”社交媒体,更能帮你预防职场中可能会遇到的窘境。掌握基本礼仪,让优秀成为职场达人的习惯!

  15. Phase 1 pilot study of e-mail support for people with long term conditions using the Internet

    Williamson Graham R; Jones Ray B; Sheaves Bryony; Chauhan Rohan

    2011-01-01

    Abstract Background Use of the Internet for people with Long Term Conditions (LTCs) can have a positive effect on knowledge, social support, behavioural and clinical outcomes, yet there is concern that a 'digital divide' prevents some patients from benefitting. While some patients do not have access to the Internet, others that do may still lack expertise or the confidence to make full use of it. The aim of this pilot study was to develop an intervention and test methods for a definitive rand...

  16. The power of online advertising : how hedonic and utilitarian appeals on e-mail : newsletters can impact consumer choices

    Neves, Ana Manuel

    2015-01-01

    Digital marketing has revolutionized the advertising industry. One of the areas it has had a meaningful impact is on the online shopping experiences, called e-commerce. To engage and retain customers to an online shop, one of the most popular and beneficial advertising tools is the e-newsletter. To better understand how to optimize such a tool, this dissertation focuses on one of the main differentiations between products (hedonic vs. utilitarian), The purpose is to understand ...

  17. Phase 1 pilot study of e-mail support for people with long term conditions using the Internet

    Williamson Graham R

    2011-04-01

    Full Text Available Abstract Background Use of the Internet for people with Long Term Conditions (LTCs can have a positive effect on knowledge, social support, behavioural and clinical outcomes, yet there is concern that a 'digital divide' prevents some patients from benefitting. While some patients do not have access to the Internet, others that do may still lack expertise or the confidence to make full use of it. The aim of this pilot study was to develop an intervention and test methods for a definitive randomised controlled trial (RCT of anonymous personal online email support for patients in this latter group. Methods Recruitment success was evaluated by the number and appropriateness of participants recruited. A personalised e-health support intervention was developed. The provisional primary outcome was the extent to which the Internet affected the participants' confidence in dealing with their LTC. Primary outcome, seven process measures and two secondary outcomes measures were evaluated for completeness of data and sensitivity to detect changes. Results Thirty nine participants were recruited, 29 after personally receiving a leaflet, seven via email advertising, and three via leaflets left in waiting areas. Most participants (61% were aged over 60. The majority (21/38 rated themselves as experienced Internet users although only 5/38 had used discussion forums for their LTC. Piloting the intervention identified support needed as: (i technical help with some websites, (ii advice about issues such as anonymity, (iii help in judging information quality, (iv identification of relevant information (via 'Information Prescriptions', (v motivational support to try new sites. Attrition was fairly high: 20/39 completed follow up questionnaires. Three process measures showed ceiling effects and two had too many missing values to be useable. Conclusion E-health support is a promising way of addressing the problems faced by older generation e-health seekers. Face-to-face leaflet distribution recruited sufficient numbers but additional locations other than hospital should be tried to recruit Internet novices with LTCs. An RCT is feasible and necessary to evaluate the potential benefits of anonymous email support. Our methods could be used by other researchers studying Internet use by people with LTCs.

  18. E-mail interview with Olaf Mertelsmann, Associate Professor in Contemporary History, University of Tartu, Estonia, conducted in June 2011

    Vanessa Voisin

    2011-12-01

    Full Text Available The Archives and the Historiography of the Second World War PIPSS.ORG - First, the editorial board is grateful to you for agreeing to answer a few questions about the state of war historiography in the Baltic states. Since the collapse of the Soviet Union, the archives of the newly independent states became accessible to researchers, as well as central archives in Moscow. However the declassification of documents was subject to a political agenda and may not be consistent or complete. How wou...

  19. HIPAA's Role in E-Mail Communications between Doctors and Patients: Privacy, Security, and Implications of the Bill

    Stephens, James H.; Parrillo, Anthony V.

    2011-01-01

    The confidentiality of a patient's information has been sacred since the days of Hippocrates, the Father of Medicine. Today, however, merely taking an oath to respect a patient's privacy has been overshadowed by regulations governing how certain healthcare establishments handle an individual's health information on the web. Consequently, if a…

  20. A content analysis of client e-mails in guided internet-based cognitive behavior therapy for depression

    Natalie Svartvatten; Mattias Segerlund; Inga Dennhag; Gerhard Andersson; Per Carlbring

    2015-01-01

    The relationship between what a client writes when communicating with an online therapist and treatment outcome in internet-based cognitive behavior therapy (ICBT) is largely unknown. The aim of this study was to address if written correspondence from the client to the therapist correlates with outcome and treatment completion. A total of 29 participants with mild to moderate depression were included from an ongoing randomized controlled trial targeting depression. Content analysis involving ...

  1. A content analysis of client e-mails in guided internet-based cognitive behavior therapy for depression

    Natalie Svartvatten

    2015-05-01

    Full Text Available The relationship between what a client writes when communicating with an online therapist and treatment outcome in internet-based cognitive behavior therapy (ICBT is largely unknown. The aim of this study was to address if written correspondence from the client to the therapist correlates with outcome and treatment completion. A total of 29 participants with mild to moderate depression were included from an ongoing randomized controlled trial targeting depression. Content analysis involving ten categories was performed on all emails and module responses sent by the participants to their internet therapist. A total of 3756 meaning units were identified and coded. Significant positive correlations were found between change in depression and statements in the two categories “observing positive consequences” (r = .49 and “alliance” (r = .42. Treatment module completion correlated with seven categories. The result suggests that text dealing with alliance and observing positive consequences can be used as indicators of how the treatment is progressing. This study suggests that written correspondence from an online client can be divided into ten categories and the frequency of those can be used by internet therapists to individualize treatment and perhaps make ICBT more effective.

  2. 76 FR 30707 - Information Collections Being Submitted for Review and Approval to the Office of Management and...

    2011-05-26

    ... personally identifiable information derived from a customer's relationship with a provider of... COMMISSION Information Collections Being Submitted for Review and Approval to the Office of Management and... Management and Budget, via fax at 202-395-5167 or via e-mail to Nicholas_A._Fraser@omb.eop.gov and to...

  3. 76 FR 31785 - Prevailing Rate Systems; Redefinition of the Madison, Wisconsin, and Southwestern Wisconsin...

    2011-06-02

    ..., (202) 606-2838; e- mail pay-leave-policy@opm.gov ; or FAX: (202) 606-4264. SUPPLEMENTARY INFORMATION: On November 18, 2010, the U.S. Office of Personnel Management (OPM) issued a proposed rule (75 FR... Grant Green Green Lake Iowa Jefferson Lafayette Marquette Rock Sauk Waushara * * * * *...

  4. 76 FR 65315 - Agency Information Collection Activities: Proposed Request and Comment Request

    2011-10-20

    ... technology. Mail, e-mail, or fax your comments and recommendations on the information collection(s) to the... history. The HA-4633 becomes part of the documentary evidence of record. The respondents are claimants for... ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social...

  5. 75 FR 77847 - Proposed Information Collection; Comment Request

    2010-12-14

    ..., Attention: Mr. Zach Rhein, Program Officer, Room 9408A; 1201 New York Avenue, NW., Washington, DC 20525. (2...) By fax to: (202) 606-3475, Attention: Mr. Zach Rhein, Program Officer. (4) Electronically through www...: Zach Rhein by e-mail at zrhein@cns.gov . SUPPLEMENTARY INFORMATION: The Corporation is...

  6. 75 FR 2880 - Homeland Security Advisory Council

    2010-01-19

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Committee management; Notice of partially closed federal advisory committee meeting. SUMMARY: The Homeland Security Advisory.... E-mail: HSAC@dhs.gov . Fax: 202-282-9207. Mail: Homeland Security Advisory Council, 1100...

  7. English for Business Occasions

    黄协安

    2000-01-01

    It sa custom to make an arrangement before meeting business partners. The meeting maybe arranged by means of letters, faxes. e-mail or phone calls. phone calls are the most popularmeans, whereby both parties may discuss and settle the date and place of meeting.

  8. 75 FR 64720 - DOE/Advanced Scientific Computing Advisory Committee

    2010-10-20

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF ENERGY DOE...: Melea.Baker@science.doe.gov ). SUPPLEMENTARY INFORMATION: Purpose of the Meeting: The purpose of this... Baker via FAX at 301-903-4846 or via e-mail ( Melea.Baker@science.doe.gov ). You must make your...

  9. 7th International Symposiun on Resistance Arteries

    2000-01-01

    @@2001 Jul 4 - 8, Muskoka Sands, Ontario, Canada Info: Secretariat 7ISRA Department of Anaesthesia (HSC-2UX) McMaster University Hamilton, Ontario L8N 3Z3 Phn + 1-905-521-2100, ext 75170 Fax + 1-905-523-1224 E-mail: isra7 @ ths. mcmaster. ca Web site: www. fls. mcmaster. ca/7isra

  10. 76 FR 15028 - Advisory Committee on International Postal and Delivery Services

    2011-03-18

    ... Committee on International Postal and Delivery Services AGENCY: Department of State. ACTION: Notice; FACA Committee meeting announcement. SUMMARY: As required by the Federal Advisory Committee Act, Public Law 92... list must be received in writing (letter, e-mail or fax) prior to the close of business on March...

  11. 75 FR 8425 - Advisory Committee on International Postal and Delivery Services

    2010-02-24

    ... Committee on International Postal and Delivery Services AGENCY: Department of State. ACTION: Notice; FACA Committee meeting announcement. SUMMARY: As required by the Federal Advisory Committee Act, Public Law 92... (letter, e-mail, or fax) prior to the close of business on March 4, 2010; written comments from members...

  12. 75 FR 1681 - Advisory Committee International Postal and Delivery Services

    2010-01-12

    ... Committee International Postal and Delivery Services AGENCY: Department of State. ACTION: Notice; FACA Committee meeting announcement. SUMMARY: As required by the Federal Advisory Committee Act, Public Law 92... writing (letter, e-mail, or fax) prior to the close of business on February 4, 2010; written comments...

  13. 76 FR 9742 - Agenda and Notice of Public Meeting of the Vermont Advisory Committee

    2011-02-22

    ... From the Federal Register Online via the Government Publishing Office COMMISSION ON CIVIL RIGHTS.... Telephone #: 202-376-7533. Fax #: 202-376-7548. E-mail address: ero@usccr.gov . TDD: Dial 711 for relay services and dial 202-376-7533. Dated in Washington, DC, on February 15, 2011. Peter Minarik, Acting...

  14. LIU Chang-xiao

    2013-01-01

    <正>Academician of Chinese Academy of Engineering Editor-in-chief of Chinese Herbal Medicines(CHM)Honorary president and director of Academic Committee of TianjinInstitute of Pharmaceutical Research,Tianjin300193,China Tel/Fax:+86-22-23006860 E-mail:liuchangxiao@163.com Professor LIU Chang-Xiao,

  15. 77 FR 16866 - Request of Recommendations for Membership for Directorate and Office Advisory Committees

    2012-03-22

    ... engineering; performance assessment; and business and operations. A primary consideration when formulating..., technology, engineering, and mathematics. Committee members serve for varying term lengths, depending on the...; e-mail: advisory.cfm. ezlensk@nsf.gov ; fax: (703) 292-9042. Advisory Committee for Business...

  16. 75 FR 76082 - Agency Information Collection (Credit Underwriting Standards and Procedures for Processing VA...

    2010-12-07

    ... collection of information through http://www.Regulations.gov or to VA's OMB Desk Officer, OMB Human Resources..., NW., Washington, DC 20420, (202) 461-7485, FAX (202) 273-0443 or e-mail denise.mclamb@.va.gov. Please... AFFAIRS Agency Information Collection (Credit Underwriting Standards and Procedures for Processing...

  17. 76 FR 44087 - Agency Information Collection (Supplement to VA Forms 21-526, 21-534, and 21-535 (For Philippine...

    2011-07-22

    ... collection of information through http://www.Regulations.gov or to VA's OMB Desk Officer, OMB Human Resources..., NW., Washington, DC 20420, (202) 461-7485, fax (202) 461-0966 or e-mail denise.mclamb@va.gov . Please... AFFAIRS Agency Information Collection (Supplement to VA Forms 21-526, 21- 534, and 21-535 (For...

  18. 75 FR 48413 - Agency Information Collection (HUD/VA Addendum to Uniform Residential Loan Application) Activity...

    2010-08-10

    ... information through www.Regulations.gov ; or to VA's OMB Desk Officer, OMB Human Resources and Housing Branch..., (202) 461-7485, FAX (202) 273-0443 or e-mail denise.mclamb@va.gov . Please refer to ``OMB Control No... AFFAIRS Agency Information Collection (HUD/VA Addendum to Uniform Residential Loan Application)...

  19. 75 FR 33898 - Agency Information Collection (VA Loan Electronic Reporting Interface (VALERI) System) Activity...

    2010-06-15

    ... through http://www.Regulations.gov ; or to VA's OMB Desk Officer, OMB Human Resources and Housing Branch..., (202) 461-7485, FAX (202) 273-0443 or e-mail denise.mclamb@va.gov . Please refer to ``OMB Control No... AFFAIRS Agency Information Collection (VA Loan Electronic Reporting Interface (VALERI) System)...

  20. 75 FR 71545 - Changes to NARA Facilities' Hours of Operation

    2010-11-24

    ... Register (75 FR 54543) for a 60-day public comment period. This proposed rule changed NARA's regulations... phone number is 866-JFK-1960 or 617-514-1600 and the fax number is 617-514-1652. The e-mail address...

  1. 76 FR 19121 - Notice of Submission of Proposed Information Collection to OMB Multifamily Project Applications...

    2011-04-06

    ... collection techniques or other forms of information technology, e.g., permitting electronic submission of... mortgage insurance. Project owners/sponsors may apply for permission to commence construction prior to... Executive Office Building, Washington, DC 20503; e-mail OIRA-Submission@omb.eop.gov fax: 202-395- 5806....

  2. 75 FR 38941 - Airworthiness Directives; Learjet Inc. Model 45 Airplanes

    2010-07-07

    ... rule'' under the DOT Regulatory Policies and Procedures (44 FR 11034, February 26, 1979), and 3. Will..., Wichita, Kansas 67209-2942; telephone 316-946-2000; fax 316-946-2220; e-mail ac.ict@aero.bombardier.com... docket on the Internet at http://www.regulations.gov ; or in person at the Docket Management...

  3. 75 FR 12667 - Airworthiness Directives; Learjet Inc. Model 45 Airplanes

    2010-03-17

    ... Executive Order 12866, (2) Is not a ``significant rule'' under DOT Regulatory Policies and Procedures (44 FR...; telephone 316-946- 2000; fax 316-946-2220; e-mail ac.ict@aero.bombardier.com ; Internet http://www....regulations.gov ; or in person at the Docket Management Facility between 9 a.m. and 5 p.m., Monday...

  4. 75 FR 60667 - Airworthiness Directives; Learjet Inc. Model 45 Airplanes

    2010-10-01

    ... rule'' under the DOT Regulatory Policies and Procedures (44 FR 11034, February 26, 1979), and 3. Will..., Wichita, Kansas 67209-2942; telephone 316-946-2000; fax 316-946-2220; e-mail ac.ict@aero.bombardier.com... docket on the Internet at http://www.regulations.gov ; or in person at the Docket Management...

  5. 76 FR 6584 - Airworthiness Directives; Bombardier, Inc. Model DHC-8-400 Series Airplanes

    2011-02-07

    ...) wiring and high level sensor wiring from other wiring, enhancing the electro-magnetic interference (EMI..., Canada; telephone 416-375-4000; fax 416-375- 4539; e-mail thd.qseries@aero.bombardier.com ; Internet http... and Maintenance and Inspection Requirements'' (66 FR 23086, May 7, 2001). In addition to...

  6. 75 FR 27660 - Loan Policies and Operations; Loan Purchases From FDIC

    2010-05-18

    ... Insurance Corporation in compliance with Sec. 614.4325(b)(3), provided: (1) Notice is given to the Farm..., commenters are encouraged to submit comments by e-mail or through the FCA's Web site. As facsimiles (fax) are... comment multiple times via different methods. FCA requests that comments to the proposed amendment...

  7. 75 FR 52347 - Agency Information Collection Activities: Proposed Collection; Comment Request

    2010-08-25

    ... collection project: ``Eisenberg Center Voluntary Customer Survey Generic Clearance for the Agency for... comments should be submitted to: AHRQ's OMB Desk Officer by fax at (202) 395-6974 (attention: AHRQ's desk officer) or by e-mail at OIRA_submission@omb.eop.gov (attention: AHRQ's desk officer). Copies of...

  8. 76 FR 17864 - Agency Information Collection Activities; Proposed Collection; Comment Request

    2011-03-31

    ... collection project: ``Voluntary Customer Survey Generic Clearance for the Agency for Healthcare Research and...: AHRQ's OMB Desk Officer by fax at (202) 395-6974 (attention: AHRQ's desk officer) or by e-mail at OIRA_submission@omb.eop.gov (attention: AHRQ's desk officer). Copies of the proposed collection plans,...

  9. Entwicklung eines FoIP-Gateways auf Basis von Open Source

    Seidel, Marcel

    2016-01-01

    Mit HylaFAX+ wurde eine gute Grundlage für eine neue Faxlösung an der Technischen Universität Chemnitz gefunden. Durch die vielen Schnittstellen, die HylaFAX+ bietet, konnte es um fehlende Funktionen erweitert werden, sodass es den gestellten Anforderungen entspricht. Auf Basis dieser Arbeit, kann unter Berücksichtigung der Richtlinien des URZ, eine neue Faxlösung implementiert werden, welche den XMediusFAX-Server ablöst. Das FoIP-Gateway nimmt E-Mails entgegen und verarbeitet diese inklusive...

  10. “网络名片”伴你生活e时代

    田野

    2003-01-01

    As an reporter, I always need to make appointments for my interviews. Upon the first contact with the intended person to be interviewed, I am always be asked by the public relationship manager of the entity to be interviewed to fax my business card to him/her. At first, I feel worried about this because business card is small and hard that cannot be faxed and it is not proper to fax by a copy or handwriting of it. But now, I am not worried any more because I now have a“digital business card”-by e-mail I can send my personal information and interview outline to my clients' e-mail boxes. You might want to know what is 'digital business card'? As its name suggests,it is the business card on the internet, which has parted from the conventional paper and ink, and is an effective“digital medial”.

  11. Sources of hydrocarbons in sediments of the Mandovi estuary and the Marmugoa harbour, west coast of India

    Harji, R.R.; Yvenat, A.; Bhosle, N.B.

    , National Institute of Oceanography, Dona Paula, 403 004, Goa, India. Tel.: +91832 2450234; fax: +91832 2450602, E-mail address: rharji@nio.org. * Manuscript Author version: Environment International (2008) Vol.34; 959-965 2... with those of standards (Supelco, USA). The peak areas were quantified relative to an internal standard (methyl nonadecanoate) added to the sample prior to GC- analysis. Based on the peak area of the internal standard and the areas of all n- alkanes...

  12. Risk assessment of heavy metal pollution in alluvial soils and sediments of the Grote Beek river (Belgium)

    Cappuyns, Valérie; Swennen, Rudy

    2003-01-01

    Consoil 2003 RISK ASSESSMENT OF HEAVY METAL POLLUTION IN ALLUVIAL SOILS AND SEDIMENTS OF THE GROTE BEEK RIVER (BELGIUM) Valérie Cappuyns, Rudy Swennen and Katrien De Nil Katholieke Universiteit Leuven, Fysico-chemische Geologie, Celestijnenlaan 200C, 3001 Heverlee, Belgium Tel. +3216327297, Fax. +3216327981, e-mail: 1. Introduction Wastewater discharge from the processing of phosphate ores has contributed to pollution by heavy metals ...

  13. China Fairs & Expos

    2008-01-01

    Commodity and Trade Fair Urnmqi Foreign Economic Relations and Trade Fair Date:September 1-September 5,2008 Venue:Xinjiang International Exhibition Center Sector:Exhibition of new products,new technology and new project,to negotiate on import & export trade and domestic commodity trade,etc Web:www.urmqifair.com Add:107,Xinhua South Road,Urumchi,China, 830049 Tel:86-991-2850497/2879890 Fax:86-991-2850497/2879890 E-mail:office@urumqifair.com

  14. Model-based immunization information routing.

    Wang, D.; Jenders, R. A.

    2000-01-01

    We have developed a model for clinical information routing within an immunization registry. Components in this model include partners, contents and mechanisms. Partners are classified into senders, receivers and intermediates. Contents are classified into core contents and management information. Mechanisms are classified into topological control, temporal control, process control and communication channel control. Immunization reminders, forecasts and recalls in e-mail, fax and regular mail ...

  15. Database Description - ClEST | LSDB Archive [Life Science Database Archive metadata

    Full Text Available [ Credits ] BLAST Search Image Search Home About Archive Update History Contact us ClEST Database... Description General information of database Database name ClEST Alternative name Cimex lectul...6812 (ext.222-36812) Fax: +81-29-861-6812 E-mail: Database classification Nucleotide Sequence Database...s Organism Taxonomy Name: Cimex lectularius Taxonomy ID: 79782 Database description Exp...ressed sequence tags (EST) database of unique organs and whole bodies of the bedbug, Cimex lectularius Featu

  16. The Expansion of Online Retailing as a Supplementary Shopping Channel for Customers

    TANASE, George Cosmin

    2012-01-01

    In online retailing or electronic retailing (or e-retailing, electronic commerce, Internet retailing, e-commerce), retailers offer their products and services over the Internet. Merchandise is thus presented in Internet shops. Customers usually place their orders via electronic checkouts or they can use e-mail or traditional modes of communication (e.g. mail, phone and fax). While, in most cases, customers pay through traditional systems (e.g. credit card, purchasing on account), some Interne...

  17. DESIGNING MOTIVATING ACTIVITIES FOR BUSINESS ENGLISH CORRESPONDENCE WITH/WITHOUT THE NEW TECHNOLOGIES

    Pop, Anisoara; Rudzinska, Ieva; Dredetianu, Mirela

    2012-01-01

    Business English correspondence (BEC) syllabus is essentially structured on the elements of a traditional writing course, students acquiring skills linked with formal letter, fax and e-mail writing, enquiries, complaints and reports, job ads and tourism leaflets as well as more indirect skills about graph interpretation, formality level and register, intercultural aspects. Traditional approaches to business correspondence (BC) teaching/learning make classes less motivating and attractive. Mor...

  18. PSAC directory company profiles

    This directory of Canadian expertise in all aspects of petroleum oil field services, ranging from exploration to land reclamation, is an annual compilation of the Petroleum Services Association of Canada and 'Oilweek' . The directory lists all members of the association alphabetically, providing names, addresses, telephone, fax and e-mail addresses, website locations, officers and key personnel at each location, a description of the business, and a list of all domestic service locations

  19. Company profiles

    The annual update to the directory of manufacturers and suppliers of equipment and services to the oil and gas industry is provided. Companies are listed in alphabetical order, with name, address, telephone and fax numbers and e-mail addresses given, where applicable. Nature of the services provided, or equipment offered, and names of officers and key contact personnel are also listed. The section has its own subject index

  20. Evaluative study of major Internet bookshops

    Hirwade, Mangala; Hirwade, Anil; Bherwani, Mohini

    2006-01-01

    Internet Bookshops are the online bookshops that allow the user to search the items of his interest, navigate, make a query, communicate, place an order, bargain and negotiate. At its simplest the Internet Bookshop or online bookshop list the products for sale or the services offered and invite the customer to phone, fax or e-mail their order. The present paper evaluates major ten Internet bookshops by using the evaluation criteria like Authority, variety of collection, help menu, shopping pr...

  1. It is more than personal: Development and validation of a multidimensional privacy orientation scale

    Baruh, Lemi; Cemalcılar, Zeynep

    2014-01-01

    Running Head: MULTIDIMENSIONAL PRIVACY ORIENTATION SCALE 1 It's More than Personal: Development and Validation of a Multidimensional Privacy Orientation Scale Lemi Baruh Department of Media and Visual Arts College of Social Sciences and Humanities Koç University Turkey E-Mail: Phone: +90 212 338 1133 Fax: +90 212 338 3760 Zeynep Cemalcılar Department of Psychology College of Social Sciences and Humanities Koç University Turkey ...

  2. Canadian wind energy industry directory

    The companies and organizations involved, either directly or indirectly, in the wind energy industry in Canada, are listed in this directory. Some U.S. and international companies which are active or interested in Canadian industry activities are also listed. The first section of the directory is an alphabetical listing which includes corporate descriptions, company logos, addresses, phone and fax numbers, e-mail addresses and contact names. The second section contains 54 categories of products and services associated with the industry

  3. 1999 who's who category index

    A classified index and alphabetical directory of Canadian corporate entities involved in the production, manufacturing, conversion, service, retail sales, research and development, transportation, insurance, legal and communications aspects of propane in Canada is provided. The alphabetical directory section provides the usual business information (name, postal address, phone, fax, e-mail and Internet addresses), names of principal officers, affiliations, products or services produced or marketed, and the category under which the company is listed in the classified index

  4. INFORMATION FOR CONTRIBUTORS TO PEDOSPHERE

    2004-01-01

    @@ Send manuscripts and address all editorial correspondence to the Editorial Office of PEDOSPHERE, Institute of Soil Science, Chinese Academy of Sciences, P. O. Box 821, Nanjing 210008, People's Republic of China. Tel.:+86-25-8688 1235, +86-25-8688 1256; Fax:+86-25-8688 1256; E-mail:pedos@issas.ac.cn, pedo@issas.ac.cn, rmdu@issas.ac.cn.

  5. Marine bioinvasion: Concern for ecology and shipping

    Anil, A.C.; Venkat, K.; Sawant, S.S.; DileepKumar, M.; Dhargalkar, V.K.; Ramaiah, N.; Harkantra, S.N.; Ansari, Z.A.

    and biopesticides; Microbial enzymes in industry and therapy; Micropropagation, transgenics and molecular markers; Free communications; and Prospects of biological research rel e vant to development of Chhattisgarh. Contact: Conference Secretariat... School of Life Sciences Pt. Ravishankar Shukla University Raipur 492 010 Tel. (O) 0771 - 262631; (R) 262171 Fax: 0771 - 262583; 262857 E - mail: mlnaikbio science@hotmail.com The 2nd International Conference on Sustainable Agri cul...

  6. Calendar of Conferences

    1996-08-01

    8 - 18 August 1996 International Summer School on Plasma Physics and Technology La Jolla, CA, USA Contact: Mr V Stefan, Institute for Advanced Physics Studies, PO Box 2964, La Jolla, CA 92038, USA. Tel +1-619-456-5737. 26 - 30 August 1996 Joint Varenna - Lausanne International Workshop on Theory of Fusion Plasmas Villa Monastero, Varenna, Italy Contact: Centro di Cultura Villa Monastero, 1 Piazza Venini, 22050 Varenna (Lecco), Italy. Tel +39-341-831261, Fax +39-341-831281. Application and abstract deadline: 15 June 1996. 2 - 5 September 1996 EU - US Workshop on Transport in Fusion Plasmas Villa Monastero, Varenna, Italy Further information: G Gorini, ISPP, 16 Via Celoria, I-20133 Milano, Italy. Tel +39-2-2392637, Fax +39-2-2392205, E-mail ggorini@mi.infn.it. Administrative contact: Centro di Cultura Villa Monastero, 1 Piazza Venini, 22050 Varenna (Lecco), Italy. Tel +39-341-831261, Fax +39-341-831281. Application and abstract deadline: 15 June 1996. 9 - 13 September 1996 International Conference on Plasma Physics Nagoya, Japan Contact: Conference Secretariat, c/o Prof. Hiromu Momota, National Institute for Fusion Science, Nagoya 464-01, Japan. Tel +81-52-789-4260, Fax +81-52-789-1037, E-mail icpp96@nifs.ac.jp. Abstract deadline: 31 March 1996. 16 - 20 September 1996 19th Symposium on Fusion Technology Lisbon, Portugal Contact: Professor Carlos Varandas, Centro de Fusão Nuclear, 1096 Lisboa Codex, Portugal. Fax +351-1-8417819, E-mail cvarandas@cfn.ist.utl.pt. General information will be available via WWW with URL http://www.cfn.ist.utl.pt. 25 - 29 September 1996 Summer University of Plasma Physics Garching, Germany Contact: Ms Ch Stahlberg, Max-Planck-Institut für PlasmaPhysik, Boltzmannstr 2, D-85748 Garching, Germany. Tel +49-89-3299-2232, Fax +49-89-3299-1001. 11 - 15 November 1996 38th Annual Meeting of the Division of Plasma Physics, APS Denver, CO, USA Contact: Dr Richard Hazeltine, University of Texas, Institute for Fusion Studies, RLM 11.314, Austin, TX

  7. 图书E-mail营销期待激情飞扬%Book Marketing through E-mail in Fledgeling Stage

    董明庆

    2003-01-01

    @@ 电子邮件从来都是在线营销的重要手段,但是通常只是辅助手段,而不是整个营销活动的中心.随着观念和技术的进步,这种情况将会彻底改变.事实也证明了这一点:电子邮件这一营销媒介在2002年继续升温,依然是在线广告和营销的主流.图书的营销如何更好地利用E-mail已经摆在了出版业界的面前.

  8. 浅析E-mail营销在酒店业中的应用%Shallow Analysis on the Application of E-mail Marketing in Hotel Industry

    窦璐

    2010-01-01

    在互联网迅速普及的形势下,E-mail营销以其成本低、简单高效等特点被越来越多的被众多企业所采用.在酒店业中正确实施E-mail营销将对降低酒店营销成本、提高营销效率、促进酒店产品的销售具有重要的战略意义.

  9. Talking about the CRM with E-mail marketing%浅谈E-mail营销中的客户关系管理

    武同青

    2008-01-01

    客户关系管理(CRM)是企业经营管理的重点,互联网时代如何利用网络营销进行客户关系管理是电子商务管理中的实际问题.本文从E-mail营销入手探讨了E-mail营销中的客户关系管理的策略和模式.有侧重地描述了在实际电子商务活动中进行E-mail营销与CRM的关系、常用的E-mail营销策略以及在实际运用中应当注意的问题--如何更好地发现客户、吸引客户、留住客户等.

  10. 电子商务模式与价值链理论应用%E - mail Pattern and the Application of the Theory of Value Chain

    壮文英; 苏勇

    2002-01-01

    @@ 1985年Michael E.Porter在其所著的一书中首次提出了价值链的概念.Porter从制造业的角度出发,把价值链看作一系列连续完成的活动,是原材料转换成一系列最终产品并不断实现价值增值的过程.后来Peter Hines把Porter的价值链扩展,重新定义为"集成物料价值的运输线",把顾客对产品的需求作为生产过程的终点,这样就将原材料和顾客均纳入价值链当中.

  11. “We make precedents, pushing the whole system and giving hope to society” – E-mail interview with Pavel Chikov, Agora Association, 7 July 2008

    Elisabeth Sieca-Kozlowski

    2009-03-01

    Full Text Available Introducing AgoraPIPSS.ORG - Could you please introduce yourself and describe your career (including what circumstances brought you to lead Agora and the history of the Agora Association? Pavel Chikov: My name is Pavel Chikov; I am the chairperson of the Agora Association (Russia Since 1999, I have been a chief human rights lawyer and a leader of a number of Russian human rights organizations in Moscow and Kazan (Russia. From 2001 to 2004,I was an initiator and first chairperson of the Kaz...

  12. Bericht am Feuer. Gespräche, E-Mails und Telefonate zum Werk von Christoph Ransmayr von Insa Wilke (Hg.

    Johanna Lenhart

    2014-09-01

    Full Text Available Christoph Ransmayr baut seine Bücher immer ausgehend von Gesprächen auf. Anlässlich seines 60. Geburtstags hat Insa Wilke einen Materialienband herausgegeben, den Johanna Lenhart für die MEDIENIMPULSE rezensiert hat …

  13. Effect of Dialogue Journal Writing through the Use of Conventional Tools and E-Mail on Writing Anxiety in the ESL Context

    Foroutan, Maryam; Noordin, Nooreen

    2012-01-01

    ESL/EFL Anxiety has been reported as one of the foremost factors affecting ESL learners' performance. Hence, identifying methods to assist language learners to alleviate their ESL anxiety deserve to be considered by the educators. This study compared the effect of dialogue journal writing (DJW) through two different modes of learning and teaching:…

  14. How to stop e-mail spam, spyware, malware, computer viruses, and hackers from ruining your computer or network the complete guide for your home and work

    Brown, Bruce

    2010-01-01

    It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than 712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between 100 million and 2 billion annually depending on how the total is calculated. This complete, revolutionary book has compiled all of the vital information you need to make sure that you are able to combat the risk

  15. 78 FR 21387 - Notice of Issuance of Final Determination Concerning Printer and Fax Machine

    2013-04-10

    ... paper, and fuses the image on the paper. The ITB is essential to the imaging function because it... distinct physical change was effected in the PROM by the opening or closing of the fuses, depending on...

  16. Information is mine

    This is a guidebook on Cheonrian, Pos-serve and Hitel, which introduces how to use each service with specific explanations. This is divided seven parts which are data communication with its application, Modem and access, pos-serve with communication service, information service, pos world service, E-mail, Fax service, shopping, studying and meeting others, Cheonrian with join, basic command, public information, guideline for basic service, posting, chatting, entertainment with this programs, taking hobby through Cheonrian and shopping, Hitel with news, advertisement, exchanging news by e-mail, etiquette for chatting room, upload and download of data. It also deals with banking, KT-MAIL in Korea communication, basic Network, Anonymous FTP, Use net News, Telnet and the effort to make great communication world.

  17. XIAO Pei-gen

    2013-01-01

    <正>Academician of Chinese Academy of Engineering Editor-in-chief of Chinese Herbal Medicines(CHM)Honorary director of Institute of Medicinal Plant Development,Chinese Academy of Medical Sciences,Beijing100193,China Tel/Fax:+86-10-62894462 E-mail:xiaopg@public.bta.net.cn Professor XIAO Pei-gen is the founder of the Institute of Medicinal Plant Development(IMPLAD),Chinese Academy of Medical Sciences(CAMS).He is also one of the founders and leading

  18. Entwicklung einer Suchmaschine unter Verwendung von Oracle 9iAS Portal und Oracle interMedia Text

    Matas Nobis, José

    2003-01-01

    Für effizient geführte Unternehmen ist ein schnelles Zugreifen auf eigene Informationen über Intra- und Internet ohne Frage überlebenswichtig. Viele Firmen haben mit großem Aufwand Text-Dokumente innerhalb von Datenbanken strukturiert abgelegt. Diese Dokumente sind aber oft nur ein kleiner Bruchteil der im Betrieb anfallenden Dokumente. Internet-Seiten, E-mails, Faxe und viele andere Dokumente bleiben außen vor. Teilweise sind die in Datenbanken abgelegte Dokumente auch statisch, sie werden n...

  19. Sup(10)Be variation in surficial sediments of the Central Indian Basin

    Nath, B.N.; Aldahan, A.; Possnert, G.; Selvaraj, K.; Mascarenhas-Pereira, M.B.L.; Chen, C.T.A.

    stream_size 23258 stream_content_type text/plain stream_name Nuclear_Instrum_Methods_Phys_Res_B_259_610.pdf.txt stream_source_info Nuclear_Instrum_Methods_Phys_Res_B_259_610.pdf.txt Content-Encoding UTF-8 Content-Type text....: +46 18 4713095; fax: +46 18 4712737. E-mail addresses: nagender@nio.org (B. Nagender Nath), ala. aldahan@geo.uu.se (A. Aldahan). Nuclear Instruments and Methods in Physics 1. Introduction The first measurements of 10 Be were made on deep-sea marine...

  20. Productivity fluctuations in the southeastern Arabian Sea during the last 140 ka

    Pattan, J.N.; Toshiyuki Masuzawab; Naidu, P.D.; Parthiban, G.; Mineko Yamamoto

    . Tel.: +91-832-2456700; Fax: +91-832-2456702. E-mail address: pattan@csnio.ren.nic.in (J.N. Pattan). PALAEO 3052 27-3-03 Palaeogeography, Palaeoclimatology, Palaeoecology 193 (2003) 575^590 www.elsevier.com/locate/palaeo column and upwelling promotes... carbonate content and in£uence of Indus discharge in two eastern Arabian sea cores. Palaeogeogr. Palaeoclimatol. Palaeoecol. 86, 255^263. Naidu, P.D., Malmgreen, B.A., 1995. Monsoon upwelling ef- fects on test size of some planktonic foraminiferal species...

  1. Antifouling activity of Indian marine invertebrate against the green mussel Perna viridis L.

    PrabhaDevi; Jayasree, V.; Naik, C.G.; Parameswaran, P.S.; Raveendran, T.V.; Kamat, S.Y.

    : Prabha Devi. Fax: 91-(0)832-223340, 229102; e-mail: kprabha@csnio.ven.nic.in J Mar Biotechnol (1998) 6:229–232 Journal of Marine Biotechnology © Springer-Verlag New York Inc. 1998 physically (Fig. 1a,b). After each test, the animal was placed in running... Haliclona sp. (1) (SP) b (Dendy) Karwar (14° 468N; 74° 068E) + Haliclona sp. (2) (SP) c Okha (22° 478N; 22° 508E) +++ Tedania anhelans (SP) (Lieberkuhn) Okha + Tedania sp. (SP) Okha + Coelenterata Sinularia granosa (SC) Tixier-Duriuault, 1970 c Kavratti (13...

  2. Structural analysis in real time using continuous monitoring

    Braunstein, Juergen; Viano, Charles; Hodac, Bernard

    2005-05-01

    OSMOS developed a completely automatic monitoring-system, which is ideal for the determination and monitoring of the structural state of civil engineering structures. Static and dynamic data are recorded as needed and are available via internet for further analysis. In case of bridges, automatic calculation of the axle load of the flowing traffic is implemented, a weigh in motion system (WIMS). When configurable thresholds are exceeded alarms are sent by SMS, e-mail, SNMP-trap for facility-management-systems or by fax.

  3. Database Description - DMPD | LSDB Archive [Life Science Database Archive metadata

    Full Text Available [ Credits ] BLAST Search Image Search Home About Archive Update History Contact us DMPD Database... Description General information of database Database name DMPD Alternative name Dynamic Macrophage Pathway CSML Databas...108-8639 Tel: +81-3-5449-5615 FAX: +83-3-5449-5442 E-mail: Database classification Metabolic and Signaling P...malia Taxonomy ID: 40674 Database description DMPD collects pathway models of transcriptional regulation and... signal transduction in CSML format for dymamic simulation based on the curation of descriptions about LPS a

  4. Cell motility and antibiotic tolerance of bacterial swarms

    Zuo, Wenlong

    Many bacteria species can move across moist surfaces in a coordinated manner known as swarming. It is reported that swarm cells show higher tolerance to a wide variety of antibiotics than planktonic cells. We used the model bacterium E. coli to study how motility affects the antibiotic tolerance of swarm cells. Our results provide new insights for the control of pathogenic invasion via regulating cell motility. Mailing address: Room 306 Science Centre North Block, The Chinese University of Hong Kong, Shatin, N.T. Hong Kong SAR. Phone: +852-3943-6354. Fax: +852-2603-5204. E-mail: zwlong@live.com.

  5. Collective motion in Proteus mirabilis swarms

    Haoran, Xu

    Proteus mirabilisis a Gram-negative, rod-shaped bacterium. It is widely distributed in soil and water, and it is well known for exhibiting swarming motility on nutrient agar surfaces. In our study, we focused on the collective motility of P. mirabilis and uncovered a range of interesting phenomena. Here we will present our efforts to understand these phenomena through experiments and simulation. Mailing address: Room 306 Science Centre North Block, The Chinese University of Hong Kong, Shatin, N.T. Hong Kong SAR. Phone: +852-3943-6354. Fax: +852-2603-5204. E-mail:xhrphx@gmail.com.

  6. 1997 Eleventh annual downstream suppliers directory

    An indexed directory of equipment and service suppliers to the oil and gas industry was provided. The index, preceding the directory, provides an alphabetic listing of companies grouped by major products or services, such as blowers, compressors, control systems, hauling, maintenance, pipes, pumps, valves, welding supplies, and many others. The directory itself is arranged in a single alphabet. Each entry provides brief, but adequate information about the products or services offered, distributed or manufactured, plant location, telephone, fax, E-mail/Internet addresses, and names of key personnel

  7. Do inverted depositional sequences and allochthonous foraminifers in sediments along the Coast of Kachchh, NW India, indicate palaeostorm and/or tsunami effects?

    Nigam, R.; Chaturvedi, S.K.

    : 42–50 DOI 10.1007/s00367-005-0014-y ORIGINAL R. Nigam . S. K. Chaturvedi Do inverted depositional sequences and allochthonous foraminifers in sediments along the Coast of Kachchh, NW India, indicate palaeostorm and/or tsunami effects? Received: 2... palaeostorms/tsunami effects in the region. R. Nigam (*) National Institute of Oceanography, Dona Paula, Goa 403 004, India e-mail: nigam@darya.nio.org Fax: +91-832-2450602 S. K. Chaturvedi National Centre for Antarctic and Ocean Research, Headland Sada, Vasco...

  8. A survey of perfluorinated compounds in surface water and biota including dolphins from the Ganges River and in other waterbodies in India

    Yeung, L.W.Y.; Yamashita, N.; Taniyasu, S.; Lam, P.K.S.; Sinha, R.K.; Borole, D.V.; Kannan, K.

    †,**, RAVINDRA K. SINHAǁ, DNYANDEV V. BOROLE§, KURUNTHACHALAM KANNAN┴ Centre for Coastal Pollution and Conservation, Department of Biology and Chemistry, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong SAR, People’s Republic of China....yamashita@aist.go.jp **Paul K. S. Lam Department of Biology and Chemistry, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon, Hong Kong SAR, People’s Republic of China. Tel: +852-2788-7681; Fax: +852-2788-7406; E-mail: bhpksl@cityu.edu.hk †City University...

  9. 基于顾客价值的整合型E-mail营销模式研究%Research of Mode of Integrated E-mail Marketing Based on Customer Value

    崔明; 马千里

    2010-01-01

    E-mail营销是互联网时代发展的产物,具有许多传统的营销手段不具备的优势.本文从顾客价值传递的角度出发,介绍了整合型E-mail营销的功能,构建了中小型企业整合型E-mail营销动态模型,在模型基础上分析了影响企业E-mail营销的诸多因素以及克服影响因素、提升绩效的方法,以期实现顾客价值最大化.

  10. An E- mail Secure Transmission Implementation Based on Diffie- Hellman Key Exchange Theory%一种基于D-H交换算法的电子邮件安全传输方式

    孟桂娥; 宋治平; 杨宇航

    2002-01-01

    提出一种基于ESMTP(Extended Simple Mail Transfer Protocol)和Diffie-Hellman密钥交换的电子邮件安全传输方式,通过交换扩展命令参数,实现了会话密钥的交换,并对密钥计算和缓存技术进行了改进,提高了系统的效率.

  11. 广州亚运会官方合作酒店的E-mail客户服务质量分析%The Quality of E-mail Customer Service among Guangzhou Asian Games Cooperative Hotels

    高明捷; 熊伟

    2010-01-01

    研究了广州亚运会官方合作酒店的E-mail客户服务情况,并从酒店的星级和管理模式两个方面具体探究了可能存在的差异.研究发现,广州亚运会官方合作酒店的E-mail客户服务在回复率和回复速度上,不同星级的酒店以及大型国际连锁酒店与本土酒店之间存在显著差异,但在服务质量上无明显差异,整体处于初级水平.其次,广州亚运会官方合作酒店的E-mail客户服务水平与酒店星级节点非完全正相关.最后,先进的对客E-mail处理方式在广州亚运会接待酒店中尚未得到有效应用.

  12. GUIDELINES FOR AUTHORS

    2012-01-01

    1 THE JOURNAL The Journal publishes original papers in all fields of sustainable development. Papers are peer-reviewed according to the generally accepted criteria for scientific work. 2 AUTHORS' RESPONSIBILITIES Authors are responsible for the originality of the work, permission to publish and permission to reproduce any cited figures, and proofreading. 3 MANUSCRIPT PREPARATION All papers must be in English. Papers are restricted to 5000 words in length. Papers with fewer than 1500 words will be considered as Short Notes. Manuscripts must be double-spaced, on one side of the paper only and on standard sized paper (e. g. European A4 - 21 by 29.6 cm). Each paper should consist of the following sections, in order: title, abstract, key words, text, acknowledgments, references, intemet references, figure captions, figures, table captions, tables and appendices (if any), photograph captions, photographs. Pages should be numbered. Author should provide e-mail of corresponding author. Title - The title should be brief but accurately descriptive of the contents. The title should be followed by authors' names,( as they are to appear in print) and institutional affiliations. The corresponding author's e-mail address should follow (or fax- number if no e-mail is available).

  13. Faxén relations in solids-a generalized approach to particle motion in elasticity and viscoelasticity.

    Norris, Andrew N

    2008-01-01

    A movable inclusion in an elastic material oscillates as a rigid body with six degrees of freedom. Displacement/rotation and force/moment tensors which express the motion of the inclusion in terms of the displacement and force at arbitrary exterior points are introduced. Using reciprocity arguments two general identities are derived relating these tensors. Applications of the identities to spherical particles provide several new results, including simple expressions for the force and moment on the particle due to plane wave excitation. PMID:18177142

  14. 76 FR 31468 - Division of Freedom of Information; Change of Office Name, Address, Telephone Number, and Fax...

    2011-06-01

    ... Administrative practice and procedure, News media. 21 CFR Part 14 Administrative practice and procedure, Advisory... Part 21 Privacy. 21 CFR Part 314 Administrative practice and procedure, Confidential business.... 21 CFR Part 516 Administrative practice and procedure, Animal drugs, Confidential...

  15. Europe goes to Mars - preparations are well under way

    2001-04-01

    meteorites on Earth, as the chances of contamination by biological specimens from Earth will be virtually eliminated. * What is the surface of Mars made of and what can its composition tell us about the history of the planet, in particular about the history of water there? OMEGA will map surface mineral composition more accurately than ever before. In particular, it will look for carbonates, which no previous mission has found, but which should be present if water was once abundant on Mars. * The thin Martian atmosphere is thought to be very oxidising - it turns the plentiful iron in the surface rocks and dust into rust, hence the planet's red colour. SPICAM will help to determine precisely how the atmosphere has this effect. Such understanding will ultimately have implications for designing space suits and life support system for visiting astronauts! * Was there an ancient ocean over the northern plains of Mars? The evidence revealed by previous missions has been ambiguous. The HRSC's contiguous 3D imaging in full colour has the best chance yet of revealing an ancient shoreline, if one exists. Over the next few months, the European Space Agency in collaboration with national organisations will be holding press conferences about Mars Express at different locations across Europe. Further information will follow as soon as it is available. In the meantime, background information and regular updates on the progress of the project are available at ESA's Mars Express website, at http://sci.esa.int/marsexpress Instrument and Principal Investigator ASPERA (Energetic Neutral Atoms Analyser) Rickard Lundin, Swedish Institute of Space Physics, Kiruna, Sweden (presently on sabbatical in Toulouse). Contact: Dr Stas Barabash (Co-PI), Swedish Institute of Space Physics, Box 812 98128, Kiruna, Sweden, tel. +46-980-79122, Fax: +46-980-79050, e-mail: stas@irf.se BEAGLE-2 (Geochemical Lander) Colin Pillinger, Open University, Milton Keynes, UK, tel. +44 1908 652119, fax.+44 1908 655910, e-mail

  16. a Passage to the Universe

    1995-11-01

    Brussel, Campus Ofenplein, Pleinlaan 2, B-1050 Brussels, Tel. 0032-2-6293469, Fax 0032-9-3623976, E-mail csterken@is1.vub.ac.be Denmark: Mr. B. F. Joergensen, Tycho Brahe Planetariet, Gl. Kongevej 10, DK-1610 Copenhagen V, Tel. 0045-33-144888, Fax 0045-33-142888, E-mail tycho@inet.uni-c.dk Finland: Mr. M. Hotakainen, Taehtitieteellinen Yhdistys Ursa, Laivanvarustajankatu 9C 54, FIN-00140 Helsinki, Tel. 00358-0-174048, Fax 00358-0-657728 France: Mr. B. Pellequer, Geospace d'Aniane, Boite Postale 22, F-34150 Aniane, Tel. 0033-6-7034949, Fax 0033-6-7752864 Germany: Dr. K.-H. Lotze, Friedrich-Schiller-Universitaet, Max-Wien-Platz 1, D-07743 Jena, Germany, Tel. +49-3641-635904/636654, Fax +49-3641-636728 Greece: Dr. D. Simopoulos, Eugenides Foundation, Astronomy Department, 387 Sygrou Avenue, Palaio Faliro, GR-175 64 Athens, Tel. 0030-1-941-1181, Fax 0030-1-941-7372 Ireland: Dr. I. Elliot, Dunsink Observatory (Dublin Institute for Advanced Studies), Castleknock, Dublin 15, Tel. 00353-1- 838-7911/7959, Fax 00353-1-8387090, E-mail ie@dunsink.dias.ie Italy: Dr. B. Monsignori Fossi, Osservatorio Astrofisico di Arcetri, Largo Enrico Fermi 5, I-50125 Florence, Tel. 0039-55-2752246, Fax 0039-55-220039, E-mail bmonsignori@arcetri.astro.it The Netherlands: Dr. M. Drummen, Stichting `De Koepel', Zonnenburg 2, NL-3512 NL Utrecht, Tel. 0031-30-311360, Fax 0031-30-342852, E-mail dekoepel@knoware.nl Spain: Dr. A. Sanchez/Dr. T. Fernandez, Planetario de Madrid, Parque Tierno Galvan, E-28045 Madrid, Tel. 0034-1-4673578, Fax 0034-1-4681154, E-mail tfc@vilspa.esa.es Sweden: Dr. K. Loden, Stockholms Observatorium, S-133 36 Saltsjoebaden, Tel. 0046-8-164454, Fax 0046-8-7174719, E-mail lodenk@astro.su.se United Kingdom: Dr. A. M. Cohen, c/o The Association for Astronomy Education, 9 Hurst Lane, Bollington, Macclesfield, Cheshire SK10 5LN, England Notes: [1] See ESO Press Releases 08/93 of 5 November 1993 and 17/94

  17. Natural gas survey, middle east and North Africa, 2005

    This book provides an exhaustive, unrivaled and quarterly updated analysis of the gas industry in the Arab countries and Iran. In addition to the country-by-country reports, it includes a regional overview section on the objectives and priorities of the national companies: ADNOC, EGAS, NIGC, NOC, PDO, QATARGAS, RASGAS, SAUDI ARAMCO, SONATRACH, etc... It includes: 18 country reports, 51 maps illustrating gas fields and facilities, as well as 62 tables and 87 graphs, and 2420 addresses of oil and gas companies operating in the Middle East and North Africa, with contact names, e-mail, phone and fax numbers. Each country report outlines the government policy, reserves, production, field development, foreign companies involved, export schemes, domestic consumption, etc

  18. Two-dimensional swimming behavior of bacteria

    Li, Ye; Zhai, He; Sanchez, Sandra; Kearns, Daniel; Wu, Yilin

    Many bacteria swim by flagella motility which is essential for bacterial dispersal, chemotaxis, and pathogenesis. Here we combined single-cell tracking, theoretical analysis, and computational modeling to investigate two-dimensional swimming behavior of a well-characterized flagellated bacterium Bacillus subtilis at the single-cell level. We quantified the 2D motion pattern of B. subtilis in confined space and studied how cells interact with each other. Our findings shed light on bacterial colonization in confined environments, and will serve as the ground for building more accurate models to understand bacterial collective motion. Mailing address: Room 306 Science Centre North Block, The Chinese University of Hong Kong, Shatin, N.T. Hong Kong SAR. Phone: +852-3943-6354. Fax: +852-2603-5204. E-mail: ylwu@phy.cuhk.edu.hk.

  19. Summaries of FY 1995 engineering research

    NONE

    1996-03-01

    The individual engineering project summaries follow the program overview. The summaries are ordered alphabetically by name of institution and so the table of contents lists all the institutions at which projects were sponsored in fiscal year 1995. Each project entry begins with an institutional-departmental heading. The names of investigators are listed immediately below the title. The funding level for fiscal year 1995 appears to the right of title; it is followed by the budget activity number. These numbers categorize the projects for budgetary purposes and the categories are described in the budget number index. A separate index of Principal Investigators includes phone number, fax number and e-mail address, where available. The fiscal year in which either the project began or was renewed and the anticipated duration in years are indicated respectively by the first two and last digits of the sequence directly below the budget activity number. The summary description of the project completes the entry.

  20. The Style of Business Letters

    Li Kai

    2008-01-01

    This study explores the application of Systemic Functional Granunar (SFG) to the analysis of English Business Letters (EBL). With China's opening up to the outside, especially its entrance into WTO, international business is becoming more and more popular. Most of the transactions in international business are discussed in detail through airmail letters, telegrams, telexes, faxes or E-mails.As a world language, English is used widely in the negotiation of international businesses. Writing a piece of effective English Business Letter is of great importance. As a medium between the business partners, EBL affects the interaction and negotiation between them. This article is intended to seek the linguistic characteristics of business letters and prove that the theories of SFG can be used to analyze EBL discourse and they are actually effective.

  1. Papers are welcome

    2000-01-01

    Acta Pharmacologica Sinica publishes monthly original researches on all life sciences, both experi mental and clinical. Reviews based primarily on the author's own research of intenational importance with 3- 10 key words are also welcome. Manuscripts in English of full-length articles from any part of the world are welcome. The article should be prepared in accordance with the "Information for authors" in Acta Pharmacol Sin 2000 Jan; 21 (1): I - Ⅷ or the "Uniform requirements for manuscripts submitted to biomedical jounals" in Ann Inten Med 1997 Jan 1; 126 ( 1 ): 36 - 47. For more information please visit http://www. c hinaphar. com Address: 294 Tai-yuan Road, Shanghai 200031, China E-mail aps @ mail. shcnc. ac. cn Fax 86-21-6474-2629 or 86-21-6437-0269 Phn 86-21-6474-2629 (direct) or 86-21-6431-1833, ext 200.

  2. SWISSFIRMS

    Suisse. Chamber de Commerce et de l'Industrie

    Published by the Swiss Chambers of Commerce and Industry, SWISSFIRMS is a precise, comprehensive and regularly updated databank of their member firms.SWISSFIRMS has more than 9'500 members covering all economic sectors, classified alphabetically, by and according to subcontracting capacity. Each firm is presented on its own pages which shows : - general information with address, phone and Fax numbers, e-mail, name of the executive team, number of employees, factory addresses and principal act - a precise description of the firm's activities (using the Swiss official nomenclature NOGA), products and services offered, their fields of applications and subcontracting capacity. - Separate sections on ISO-certification, specific know-how, areas of specific R&D interest or investment.

  3. The role of information systems in IDS-physician relationships.

    Kilbridge, P M

    1998-06-01

    The success of integrated delivery systems (IDSs) depends on their ability to develop collaborative relationships with affiliated physician practices. As a long-term strategy, IDSs should develop sophisticated information systems that help their physician practices to effectively manage wellness and disease across the continuum of care. These information systems eventually should include a broad range of features, including systemwide access to communications technologies, such as e-mail and groupware, computer-based alerts and reminders to support wellness management, immediate access to hospital data from physician offices, and automated care guidelines. To address the immediate needs of affiliated physicians, however, IDSs should attempt to optimize the functionality of their existing communications systems, such as fax links and manual processes. PMID:10179968

  4. VENTE EXCEPTIONNELLE DE GENEVE TIERS-MONDE - French version only

    GETM

    2002-01-01

    Mercredi 27 novembre au Foyer du CERN de 9h. à 14h. Vous pourrez acheter des paquets de 100 grammes d'ananas séchés pour 5 francs, et ainsi donner un coup de pouce à l'aide au développement. L'ananas séché est un aliment très sain, vitaminé, qui se prête à de nombreuses préparations, dont les recettes seront distribuées sur le stand. Les ananas ont été cultivés par des partenaires togolais de GETM selon des critères biologiques. Pour plus de renseignements : GETM, rue de Carouge 53, 1205 Genève, Tél. 022 329 67 68, fax 022 320 33 29 e-mail: getm@fgc.ch, site internet

  5. INFORMATION FOR CONTRIBUTORS TO PEDOSPHERE

    2001-01-01

    @@Send manuscripts and address all editorial correspondence to the Editorial Office of PEDOSPHERE,Institute of Soil Science,the Chinese Academy of Sciences,P.O.Box 821,Nanjing 21008,People's Republic of China,Tel:(025)3353934;Fax:(025)3353593;E-mail:rmdu@mail.issas.ac.cn. 1 Gerneral Requirements PEDOSPHERE publishes original research findings on soil sciences which are interpreted to mean the outcome of scholarly inquiry,investigation,or experimentation having as an objective the revision of existing concepts,the development of new concepts,or the development of new or improved techniques in some phase of soil sciences.Critical reviews are also considered.The article must be written in english and should have been neither published nor submitted for publication elswhere.

  6. CARLSON WAGONLIT TRAVEL

    CARLSON WAGONLIT TRAVEL

    2004-01-01

    CARLSON WAGONLIT TRAVEL would like to remind you of the entry formalities applicable to those travelling to the United States. Nationals of Switzerland and of the following countries : Andorra, Australia, Austria, Belgium, Brunei, Denmark, Finland, France, Germany, Iceland, Ireland, Italy, Japan, Liechtenstein, Luxemburg, Monaco, Netherlands, New Zealand, Norway, Portugal, San Marino, Singapore, Slovenia, Spain, Sweden and the United Kingdom, entering the United States under the Visa Waiver Program (no visa requirement), must be in possession of an machine-readable passport that is valid for at least six months after the date of the return trip. Children, including infants, must have their own passport. An entry in the parents' passport is not sufficient. For entry into the United States, an e-ticket (fax or e-mail confirmation or passenger receipt) or a return ticket to the departure point or a ticket to a subsequent onward destination (valid for 90 days) must be presented together with the green ...

  7. Non-manipulability in Walrasian cost games Marta Faias (1), Emma Moreno-García (1)(2), Mário Rui Páscoa (2) (1) Faculdade de Economia, Universidade Nova de Lisboa, Travessa Estevao Pinto, 1099-032 Lisboa, Portugal (e-mail: ; ) (2) Departamento de Economía e Historia Económica, Facultad de Economía y Empresa, Universidad de Salamanca, Edificio F.E.S., Campus Miguel de Unamuno, 37008 Salamanca, Spain (e-mail: ) Received: 24 December 1999 / Accepted: 18 October 2001 JEL classification: D41, D51 Key words: Perfect competition, monopolistic power, Walrasian equilibrium, thick markets

    Mário Rui Páscoa; Emma Moreno-García; Marta Faias

    2002-01-01

    In this paper, we propose a perfect competition test which checks whether arbitrarily small coalitions of firms, which behave strategically on costs, are able to manipulate prices in their own benefit. We apply this test to economies with a continuum of differentiated producers. We show that, under thickness conditions on preferences, implying a high degree of substitutability among commodities, there is no monopolistic power neither in economies with constant average costs nor in economies w...

  8. A Study on Work Ability Index and Physical Work Capacity on the Base of Fax Equation VO 2 Max in Male Nursing Hospital Staff in Isfahan, Iran

    Ehsanollah Habibi

    2012-01-01

    Conclusion : Average WAI in this research, like other studies on similar jobs is in the acceptable level of >36. Work ability index and PWC index in different age groups did not show a significant correlation and this suggests that there are essential discrepancies in work ability evaluations made by each index and it is not possible to predict PWC index using WAI values. Given the PWC results and the level of nursing staff′s activity (low, medium the WAI is a suitable instrument to establish the professionals′ abilities. This study revealed that 27.6% of individuals were subject to medium-low work ability risk (WAI<37, which was 1.8 times that of Finland′s professional health Institute, which could be caused by shift working and increased working hours.

  9. 佳讯飞鸿AnyFax智能传真系统%JiaXunFeiHong Intellgent AnyFax System

    白丽岩

    2007-01-01

    传真至今仍旧是一种尚未被管理起来的资源,AnyFax传真服务系统为企业、个人提供了一种专业解决方案.从系统功能、技术方案、软件架构、系统软件和业务软件功能特点等方面进行描述.

  10. "europe Towards the Stars"

    1995-06-01

    Headquarters in Garching near Munich (Germany) in mid-November 1995. Here they will experience front-line science and partake in the daily life of one of Europe's foremost scientific establishments. Assisted by professional astronomers, they will prepare and carry out real astronomical observations with the 1.4-metre CAT (Coude Auxiliary Telescope) and the very advanced 3.5-metre NTT (New Technology Telescope) from ESO's remote control centre. They will also begin the treatment of the registered data and, if possible, arrive at tentative interpretations. The week will undoubtedly be very hectic, but it will of course also include events of a more social character which will further emphasize the pan-European nature of this unique visit. ESO will provide more details about this programme in early November 1995, including the planned media coverage. ADDRESSES OF THE NATIONAL COMMITTEES For further information about the programme "Europe Towards The Stars", please contact the National Committee in your country. Austria: Prof. H. Mucke, Astronomisches Buero, Hasenwartgasse 32, A-1138 Vienna, Tel. 0043-1-8893541 Belgium: Dr. C. Sterken, Vrije Universiteit Brussel, Campus Ofenplein, Pleinlaan 2, B-1050 Brussels, Tel. 0032-2-6293469, Fax 0032-9-3623976, E-mail csterken@is1.vub.ac.be Denmark: Mr. B. F. Joergensen, Tycho Brahe Planetariet, Gl. Kongevej 10, DK-1610 Copenhagen V, Tel. 0045-33-144888, Fax 0045-33-142888, E-mail tycho@inet.uni-c.dk Finland: Mr. M. Hotakainen, Tahtitieteellinen Yhdistys Ursa Ry, Laivanvarustajankatu 9C 54, FIN-00140 Helsinki, Tel. 00358-0-174048, Fax 00358-0-657728 France: Mr. B. Pellequer, Geospace d'Aniane, Boîte Postale 22, F-34150 Aniane, Tel. 0033-6-7034949, Fax 0033-6-7752864 Germany: Dr. K.-H. Lotze, Friedrich-Schiller-Universitaet, Max-Wien-Platz 1, D-07743 Jena, Germany, Tel. +49-3641-635904/636654, Fax +49-3641-636728 Greece: Dr. D. Simopoulos, Eugenides Foundation, Astronomy Department, 387 Sygrou Avenue, Palaio Faliro, GR-175 64 Athens, Tel

  11. Analysis of the Questions Asked through Digital and Face-to-Face Reference Services

    Tsuji, Keita; Arai, Shunsuke; Suga, Reina; Ikeuchi, Atsushi; Yoshikane, Fuyuki

    2013-01-01

    In Japan, only a few public libraries provide e-mail reference services. To help public libraries start e-mail reference services, the authors investigated reference questions received by libraries via e-mail and traditional face-to-face services. The authors found that research questions are more frequently observed among e-mail questions and…

  12. Precancer: The Beginning and the End of Cancer. Edited by Jules J. Berman, MD, PhD (E-Mail: jjberman1@comcast.net with G. William Moore, MD, PhD. Jones & Bartlett Publishers: Sudbury, MA, USA, 2009; 186 pp; 42.95$; ISBN: 9780763777845

    Kara L. Kuntz-Melcavage

    2009-12-01

    Full Text Available This concisely written book makes a powerful argument that the focus of research in the cancer field should be shifted from full-stage cancer to the more promising area of precancer. The entire book encompasses less than 200 pages, including an extensive glossary aimed at clarifying terminology with which a person lacking a research background may be unfamiliar. Because explanations of scientific terminology are located in the glossary, Berman and Moore have prevented the book from being too elementary for an advanced scientist. The logical organization of the chapters results in this becoming quite an easy book to read. [...

  13. A SOFTWARE AUTHORIZATION CONTROL TECHNIQUE BASED ON E-MAIL SYSTEM AND MD5 ALGORITHM%基于电子邮件系统和MD5算法的软件授权控制技术研究与实现

    张建伟; 马庆华; 石立公

    2003-01-01

    本文在分析目前已有的软件保护技术不足的基础上,阐述了一种基于网络、E-mail系统和MD5加密算法的软件保护技术.利用网络和E-mail系统的分布性、灵活性,实现对软件授权的动态控制,以达到有效地保护软件知识产权的目的.

  14. Are ionic liquids extremophiles cell wall breakers? Esther Gutiérrez, M. Ángeles Sanromán, Ana Rodríguez, Francisco J. Deive * Department of Chemical Engineering, University of Vigo, 36310, Vigo, Spain * Corresponding author: Tel.: +34986818723; E-mail address: deive@uvigo.es

    Esther Gutiérrez

    2014-06-01

    Full Text Available The increasing interest in the development of more competitive biotechnological processes is demanding the development of new downstream strategies to maximize product recovery and foster the economic feasibility and robustness of any desired process. From a biotechnological point of view, lipase production is considered one of the three most important bioprocesses in terms of enzyme sales. During the last years, lipolytic enzymes applications have been broaden to sectors ranging from the petrochemical, pharmaceutical, food and paper to waste management industries, as a result of a close collaboration between academics and industry (Houde et al., 2004. The interest on triacylglycerol hydrolases or lipases (EC 3.1.1.3 lies in the fact that they play a crucial role in biocatalysis of a plethora of chemical reactions, such as hydrolysis, interesterification, esterification, alcoholysis, acidolysis and aminolysis. Their reputation is built largely on their distinctive features, namely, they are quite stable and active in organic solvents, they do not require cofactors, they exhibit a high degree of chemo-, enantio- and regioselectivity, and they possess a wide range of substrate specificity. These features make these enzymes trade to be a well-known billion dollar business (Jaeger and Reetz, 1998; Hasan et al., 2006. However, there are concerns related to the stability of these enzymes at the operating conditions usually employed in biocatalysis. This problem can be circumvented by using extremozymes, whose naturally developed resistance to drastic reaction conditions (like resistance to denaturalization by chemical agents and by extreme values of temperature, pH and salinity turns out to be their main appeal. One of the main limitations observed for the industrial implementation of the processes to produce this kind of enzymes lies in the high costs of downstream operations which represent more than 50-80% of the total processing cost. Surprisingly, downstream strategies are usually neglected until a later phase of process development. This is a major reason for increased processing cost and eventually the reason for process implementation failures at real scale (Datar and Rosen, 1990. In this line, one of the bottlenecks faced in this kind of biological process is placed in the recovery of the desired intracellular metabolites, which makes it necessary to apply cell lysis methods. With this purpose, conventional methods fall into two main categories: physical (agitation in the presence of glass and ceramic beads, ultrasonication, high pressure homogenization, cryogenic grinding and chemical (acid, alkali (Ulloa et al., 2012. In this sense, another chemical method that can be proposed could be the addition of ionic liquids. These are liquid salts at or close to room temperature that have posed a new inspiration for Green Chemistry. These neoteric solvents have been getting increasing attention from the scientific community and industry not only due to their green potential but also to their unique combination of properties (Earle et al., 2006; Rebelo et al., 2005; Smiglak et al., 2006; Baranyai et al., 2004; Wasserscheid and Welton, 2007. The most distinctive feature of these compounds is their negligible vapour pressure, which may reduce the air pollution with respect to the conventional volatile organic solvents. Due to this, ionic liquids have opened up new fields at the interface of many conventional disciplines such as green chemistry, electrochemistry, analytical chemistry, surface science, catalysis and nanotechnology (Plechkova and Seddon, 2008. Another appealing aspect of ionic liquids lies in their tunability, which eases the existence of a plethora of combinations cation-anion, leading to thousands of new compounds with unknown properties and environmental risks. Due to all these properties, they are already used in extant processes and their production per annum surpasses the tonne magnitude (BASF Patent, 2005; Institute Français Du Pétrole, 2001. In this work, we have exploited their structural modularity to apply them as thermophiles cell wall disruptor, hypothesizing that the variation in polarity or hydrophobicity are crucial to interact with the lipidic bilayer of the cell membranes, even up to a complete solubilization. We have bet in this study in the bacterium Thermus thermophilus HB27, whose lipolytic enzymes are mostly located intracellularly and attached to membrane. The interest of this new approach is supported by the fact that these enzymes are already being commercialized by top-companies such as Sigma-Aldrich but with very low levels of activity, as a consequence of the low levels of extracellular enzyme expression. First, flask cultures of Thermus thermophilus HB27 were cultivated for 24h at 70°C. Then, six different ionic liquids (C2MIMCl, C6MIMCl, C10MIMCl, C2MIMC2SO4, C2MIMHSO4 and C2MIM(C2H52PO4 were added to the culture medium at concentrations of 1g/L, and the effect of these molten salts pressure was analyzed by monitoring both the cell growth and the lipolytic enzyme distribution for 6 hours (from 24 to 30 h. The enzyme activity data were obtained from spectrometric measurement of the enzymatic hydrolysis of p-nitrophenyl laurate (Deive et al., 2009, and allowed concluding a great lytic effect of C10MIMCl, since a drastic increase of the extracellular activity of 308% was observed, to the detriment of the intracellular and membrane bound enzyme. In parallel, the cell growth was monitored by turbidimetric measurements at 600 nm and showed 43% of decay, thus confirming the excellent lytic effect provided by the ionic liquid.

  15. Are ionic liquids extremophiles cell wall breakers?
    Esther Gutiérrez, M. Ángeles Sanromán, Ana Rodríguez, Francisco J. Deive *

    Department of Chemical Engineering, University of Vigo, 36310, Vigo, Spain
    * Corresponding author: Tel.: +34986818723; E-mail address:

    Esther Gutiérrez; Ana Rodríguez

    2014-01-01

    The increasing interest in the development of more competitive biotechnological processes is demanding the development of new downstream strategies to maximize product recovery and foster the economic feasibility and robustness of any desired process. From a biotechnological point of view, lipase production is considered one of the three most important bioprocesses in terms of enzyme sales. During the last years, lipolytic enzymes applications have been broaden to sectors ranging from the...

  16. Special Issue: Very large eddy simulation. Issue Edited by Dimitris Drikakis.Copyright © 2002 John Wiley & Sons, Ltd.Save Title to My ProfileSet E-Mail Alert Previous Issue | Next Issue > Full Issue Listing-->Volume 39, Issue 9, Pages 763-864(30 July 2002)Research ArticleEmbedded turbulence model in numerical methods for hyperbolic conservation laws

    Drikakis, D.

    2002-07-01

    The paper describes the use of numerical methods for hyperbolic conservation laws as an embedded turbulence modelling approach. Different Godunov-type schemes are utilized in computations of Burgers' turbulence and a two-dimensional mixing layer. The schemes include a total variation diminishing, characteristic-based scheme which is developed in this paper using the flux limiter approach. The embedded turbulence modelling property of the above methods is demonstrated through coarsely resolved large eddy simulations with and without subgrid scale models. Copyright

  17. 2002年国际会议消息

    2001-01-01

    @@ JANUARY 23- 25, 4th International Conferencn FUSION OF EARTH DATA, Groupe Teledetection & Modelisa- tion. Sophia Antipolis. French Riviera, France. Contact: www. data-fusion. org/conf/fourth. 30-Feb l. Austin. Texas. 12th Annual Texas GIS Forum and Training Conference. Contact: Hugh Bender. TNRIS director, 1700N. Congress Ave. , Austin ,TX78711[512-463- 8337 ,fax, 512- 463- 7274 ,e -mail: hbender@tnris. state. tx. us, Web: http://www. tnris. state. tx. us/gisfestival] March 17-20, The Geospatial Information &Technology Association's (GITA) Annual Conference 25 :" Bringing IT To-gether: Charting the Course," Geospatial Information & Technology Association's (GI-TA), Tampa, FL. Contact: 303- 337- 0513, info @gita. org; http://www. gita. org. April 5-7. Remote Sensing and Photogrammetry Society 12th Thompson Symposium,loughborough, Eng-land Contact :The RSPSoc Office,School of Geography,University of Nottingham,Nottingham NG7 2RDTel. :+44 115 951 5435 website :www. rspsoc. org 8-11. CoLorado Springs. Colo. 18th National Space Symposium. Contact:The Space Foundation,2860 S. Circle Drive,Suite 2301,Colorado Springs, CO80906[800-691-4000,fax: 719-576-8801,e-mail: custserv@spacefoundation. org, Web: http ..//www. spacesymposium. org] 19-26. American Society for Photogrammetry and Remote Sensing ASPRS-ACSM Annual Confer-enee and XXII FIG Congreess,Washington D. C, USA Contact: 5410 Grosvenor Lane,Suite 210, Bethes-da,Maryland 20814-2160,USA,Tel.: +1 301 493 0290May 14-16, The New English GIS Conference, New England Chapters of GITA and ACSM, Boxborough. MA. Contact: 802-655-7769;www. negis. org. 15-18. Enschede, The Netherlands. Sixth Seminar on GIS and Developing Countries (GISDECO2002). Contact :GISDECO 2002, International Institute for Aerospace Sur-vey and Earth Sciences. POBox 6, 7500 AA Enschede, The NetherLands [e- mail .. GISDECO2002@itc. nl, Web: http://www. geog.uu. nl/gisdeco/gisdeco. html]June 11-13, Third International Symposium on: Remote Sensing of Urban

  18. The Internet - an information pipeline for petroleum

    Sharry, J. [Consultant, Garland, TX (United States)

    1995-06-01

    Telnet, Gopher, FTP, WWW, Mosaic, Archie, Usenet, Home Page, E-mail. These terms represent some of the services available to users of the Internet. Use Usenet to ask the world for comments on software or participate in a discussion on proposed regulations. With Gopher, search the card catalog at the Library of Congress, the University of Texas, or Oxford University. Find locations of USGS map files with Archie and download them directly to your PC, Macintosh, or workstation with FTP (file transfer protocol). Use the graphical interface of Mosaic to access the World Wide Web to view company information, new product announcements, data and more. Use of the Internet currently falls into three broad categories: data and program transmission, discussions between individuals or groups, and general information about companies, services, and products. Many government agencies and universities are making information such as USGS culture and topographic data available for free on the Internet. Numerous mapping, visualization, and coordinate transformation programs are available for downloading to your computer. Discussions and requests for information take place daily on the news groups. You can send E-mail and data files to many vendors to get help. You can actually send them the data that is causing the problem and they can load it and work with it directly, not a faxed copy. Many companies, universities, professional societies and government agencies have set up Home Pages describing products and services. You can even retrieve abstracts from some sources. There are numerous FAQs (Frequently Asked Questions Lists) that are posted monthly to help the new user. The Internet is an inexpensive new communications tool available to both large corporations and individuals alike. In this presentation I will demonstrate these and other ways the Internet can be used by the petroleum professional.

  19. Implementing a new reporting system to improve the security and the processing of accounting information

    Full text: The ARN receive the accounting reports by normal mail or by fax in papers form. This procedure has 2 main problem: a) practically there is no security of the information received. b) it is necessary retyping the reports to be introduced in the processing software, with the possibility of introducing errors. With the objective of solving these inconveniences, ARN decided that the accounting reports must be made in text files (ASCII format) and these files must be sent using the secure e-mail in order to improving its security level. In order to implement these new procedure was informed to all operator's that from May 2006 the only mean to receive the accounting reports is in the appropriate format by e-mail signed and encrypted. This obligation was distributed to the operator's in January in the Requirement RQ SV 01/06. During the ABACC/IAEA joint inspection, some accounting information (updating of inventories changes and itemized list) are requiring by the agencies in text files in format previously established to use in its auditing software with the objective to reduce as the time used as the mistakes in the auditing activities. From May of 2006 its mandatory for the operators to prepare this files and deliver them to the internationals agency inspectors. Also this obligation was distributed to the operator's in January in the Requirement RQ SV 02/06. With the objective to facilitate the redaction of the reports in the new formats and the auditing text files requiring by the agencies. a software was developed to automate the generation of the mentioned files, at the same time, diminished the quantity of errors contained in them. The software was installed in all Argentina's installation last February and a test period began with satisfactory results. To implement the secure e-mail is utilized the Certificate Authority of the National Government The test period also began in February. Finally, take into account the results of the tests period it is

  20. Analysis of timeliness of infectious disease reporting in the Netherlands

    Kretzschmar Mirjam EE

    2011-05-01

    Full Text Available Abstract Background Timely reporting of infectious disease cases to public health authorities is essential to effective public health response. To evaluate the timeliness of reporting to the Dutch Municipal Health Services (MHS, we used as quantitative measures the intervals between onset of symptoms and MHS notification, and between laboratory diagnosis and notification with regard to six notifiable diseases. Methods We retrieved reporting data from June 2003 to December 2008 from the Dutch national notification system for shigellosis, EHEC/STEC infection, typhoid fever, measles, meningococcal disease, and hepatitis A virus (HAV infection. For each disease, median intervals between date of onset and MHS notification were calculated and compared with the median incubation period. The median interval between date of laboratory diagnosis and MHS notification was similarly analysed. For the year 2008, we also investigated whether timeliness is improved by MHS agreements with physicians and laboratories that allow direct laboratory reporting. Finally, we investigated whether reports made by post, fax, or e-mail were more timely. Results The percentage of infectious diseases reported within one incubation period varied widely, between 0.4% for shigellosis and 90.3% for HAV infection. Not reported within two incubation periods were 97.1% of shigellosis cases, 76.2% of cases of EHEC/STEC infection, 13.3% of meningococcosis cases, 15.7% of measles cases, and 29.7% of typhoid fever cases. A substantial percentage of infectious disease cases was reported more than three days after laboratory diagnosis, varying between 12% for meningococcosis and 42% for shigellosis. MHS which had agreements with physicians and laboratories showed a significantly shorter notification time compared to MHS without such agreements. Conclusions Over the study period, many cases of the six notifiable diseases were not reported within two incubation periods, and many were

  1. Making Nuclear Malaysia Email Archives Portable

    Nuclear Malaysia e-mails can be accessed from any computer and anywhere, even worldwide, via web access. However, this mobility is lost when the e-mails are moved to a personal computer into archive files such as Microsoft Outlook data files. Outlook e-mail archives can only be read on the computer where it is stored. This removal has to be done because of storage space constraints on the e-mail server. This paper shows how e-mail archives can be made portable, brought and read anywhere using a free portable e-mail client application such as Mozilla Thunderbird, Portable Edition. (author)

  2. Plasma physics network newsletter. No. 5

    The fifth Plasma Physics Network Newsletter (IAEA, Vienna, August 1992) includes the following topics: (i) the availability of a list of the members of the Third World Plasma Research Network (TWPRN); (ii) the announcement of the fourteenth IAEA International Conference on Plasma Physics and Controlled Nuclear Fusion Research to be held in Wuerzburg, Germany, from September 30 to October 7, 1992; (iii) the announcement of a Technical Committee Meeting on research using small tokamaks, organized by the IAEA as a satellite meeting to the aforementioned fusion conference; (iv) IAEA Fellowships and Scientific Visits for the use of workers in developing member states, and for which plasma researchers are encouraged to apply through Dr. D. Banner, Head, Physics Section, IAEA, P.O. Box 100, A-1400 Vienna, Austria; (v) the initiation in 1993 of a new Coordinated Research Programme (CRP) on ''Development of Software for Numerical Simulation and Data Processing in Fusion Energy Research'', as well as a proposed CRP on ''Fusion Research in Developing Countries using Middle- and Small-Scale Plasma Devices''; (vi) support from the International Centre for Theoretical Physics (ICTP) for meetings held in Third World countries; (vii) a report by W. Usada on Fusion Research in Indonesia; (viii) News on ITER; (ix) the Technical Committee Meeting planned September 8-12, 1992, Canada, on Tokamak Plasma Biasing; (x) software made available for the study of tokamak transport; (xi) the electronic mail address of the TWPRN; (xii) and the FAX, e-mail and postal address for contributions to this plasma physics network newsletter (FAX: (43-1)-234564)

  3. Gestational Diabetes

    Full Text Available ... Home > Videos > Description | Related Videos | Most Played Videos E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  4. Gestational Hypertension and Preeclampsia

    Full Text Available ... Home > Videos > Description | Related Videos | Most Played Videos E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  5. Cesarean Section: The Operation

    Full Text Available ... Home > Videos > Description | Related Videos | Most Played Videos E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  6. Folic Acid

    Full Text Available ... Home > Videos > Description | Related Videos | Most Played Videos E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  7. Time to Eat! What Will You Feed Your Baby?

    Full Text Available ... Home > Baby > Feeding your baby Feeding your baby E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  8. Postpartum Blues

    Full Text Available ... Postpartum care > The postpartum blues The postpartum blues E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  9. Labor and Delivery: At the Hospital

    Full Text Available ... Home > Videos > Description | Related Videos | Most Played Videos E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  10. At Least 39 Weeks

    Full Text Available ... Home > Videos > Description | Related Videos | Most Played Videos E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  11. Cesarean Section: Recovering After Surgery

    Full Text Available ... Home > Videos > Description | Related Videos | Most Played Videos E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  12. Exercise during Pregnancy

    Full Text Available ... Home > Videos > Description | Related Videos | Most Played Videos E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  13. Alcohol and Pregnancy

    Full Text Available ... Home > Videos > Description | Related Videos | Most Played Videos E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  14. Beware of Products Promising Miracle Weight Loss

    Full Text Available ... Pin it Email Print Get Consumer Updates by E-mail Consumer Updates RSS Feed Download PDF (245 ... in a foreign language. products marketed through mass e-mails. products marketed as herbal alternatives to an ...

  15. Healthy Choices: What to Eat during Pregnancy

    Full Text Available ... Home > Videos > Description | Related Videos | Most Played Videos E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  16. Anterior Approach Total Hip Replacement

    Full Text Available ... the benefits of the Taperloc Microplasty stem and E-poly antioxidant-infused technology during a hip replacement ... to your questions that you send in by e-mail. The e- mail button is at the ...

  17. Postpartum Blues

    Full Text Available ... The postpartum blues The postpartum blues Now playing: E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  18. Time to Eat! What Will You Feed Your Baby?

    Full Text Available ... Feeding your baby Feeding your baby Now playing: E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  19. Sun Safety: Save Your Skin

    Full Text Available ... Pin it Email Print Get Consumer Updates by E-mail Consumer Updates RSS Feed Download PDF (333 ... for You Sign up for Consumer Updates by E-mail Consumer Updates RSS Feed Page Last Updated: ...

  20. 76 FR 43896 - Safety Zone; Kathleen Whelan Wedding Fireworks, Lake St. Clair, Grosse Pointe Farms, MI

    2011-07-22

    ... this temporary rule, call or e-mail LT Adrian Palomeque, Prevention Department, Sector Detroit, Coast Guard; telephone (313) 568-9523, e- mail Adrian.F.Palomeque@uscg.mil . If you have questions on...

  1. Craniofacial Procedure to Treat Encephalocele and an Arachnoid Cyst

    Full Text Available ... let me just say we have some interesting e-mails coming in already, and maybe we can ... an additional workup and then potentially coordinate over e-mail or phone or Internet with the staff ...

  2. Rapport om digitale oplysninger ved Aalborg Universitet

    Bønsing, Sten

    Rapport til Aalborg Universitets ledelse vedr. brug af digitale oplysninger i forbindelse med e-mailing, databaser, hjemmesider mv.......Rapport til Aalborg Universitets ledelse vedr. brug af digitale oplysninger i forbindelse med e-mailing, databaser, hjemmesider mv....

  3. Cesarean Section: The Operation

    Full Text Available ... The operation Description | Related videos | Most played video E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  4. Cesarean Section: Recovering After Surgery

    Full Text Available ... after surgery Description | Related videos | Most played video E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  5. Exercise during Pregnancy

    Full Text Available ... during pregnancy Description | Related videos | Most played video E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  6. At Least 39 Weeks

    Full Text Available ... 39 weeks Description | Related videos | Most played video E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  7. Alcohol and Pregnancy

    Full Text Available ... and pregnancy Description | Related videos | Most played video E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  8. Folic Acid

    Full Text Available ... Folic acid Description | Related videos | Most played video E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  9. Gestational Diabetes

    Full Text Available ... Gestational diabetes Description | Related videos | Most played video E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  10. Healthy Choices: What to Eat during Pregnancy

    Full Text Available ... during pregnancy Description | Related videos | Most played video E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  11. Gestational Hypertension and Preeclampsia

    Full Text Available ... and preeclampsia Description | Related videos | Most played video E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  12. Labor and Delivery: At the Hospital

    Full Text Available ... the hospital Description | Related videos | Most played video E-mail to a friend Please fill in all fields. Please enter a valid e-mail address. Your information: Your recipient's information: Your ...

  13. 76 FR 17622 - U.S. Education Mission to India

    2011-03-30

    ..., International Trade Specialist, Tel: 414-217-8333, E- mail: Koreen.Grube@trade.gov . Matt Baker, International Trade Specialist, Tel: 520-470-5809, E- mail: Matt.Baker@trade.gov . Elnora Moye, U.S. Department...

  14. Summary of Multi-location Experiments of Fax Varieties in Xinjiang Uygur Autonomous Region in 2011 -2012%2011-2012年新疆维吾尔自治区亚麻品种试验总结

    守合热提·牙地卡尔; 张正; 马红娟; 哈尼帕·哈再斯; 拉扎提

    2014-01-01

    In order to meet the development of flax industry in Xinjiang , it is very necessary to eval-uate the adaptability , resistance and high yield ability of the flax varieties either bred locally or intro-duced by multi-location experiments.4 traditional and representative regions including Yining , Zhaosu, Xinyuan and Nilka were chosen as the multi -point experiment places.The results showed that lines 2011-4 and N-22 had relative better comprehensive performances in 4 location experiments in 2011-2012.%为适应新疆亚麻生产发展的需要,有必要对我区自育和引进的优质亚麻品种,在不同生态条件、不同种植区域的适应性、抗逆性和丰产性进行鉴定。伊犁亚麻试验站在具有代表性的伊宁市、昭苏县、新源县和尼勒克县4个传统亚麻种植区进行多年多点区域试验。由2011及2012年的试验结果可看出:品系2011-4和N-22在两年四个点的综合评价较好,表现较突出。

  15. Spam Classification Using Machine Learning Techniques - Sinespam

    Norte Sosa, José

    2010-01-01

    Most e-mail readers spend a non-trivial amount of time regularly deleting junk e-mail (spam) messages, even as an expanding volume of such e-mail occupies server storage space and consumes network bandwidth. An ongoing challenge, therefore, rests within the development and refinement of automatic classifiers that can distinguish legitimate e-mail from spam. Some published studies have examined spam detectors using Naïve Bayesian approaches and large feature sets of binary attri...

  16. 6-[(2E-3,7-Dimethylocta-2,6-dien-1-yl]-5,7-dihydroxy-8-(2-methylbutanoyl-4-phenyl-2H-chromen-2-one–6-[(2E-3,7-dimethylocta-2,6-dien-1-yl]-5,7-dihydroxy-8-(3-methylbutanoyl-4-phenyl-2H-chromen-2-one (1/1 from Mesua elegansAdditional correspondence author, e-mail: khalijah@um.edu.my.

    Gomathi Chan

    2012-04-01

    Full Text Available The title co-crystal, C30H34O5·C30H34O5, comprises a 1:1 mixture of two mostly superimposed molecules with the same chemical formula that differ in the nature of the substituent (2-methylbutanoyl or 3-methylbutanoyl bound at the exocyclic ketone. The lactone ring is close to planar (r.m.s. deviation = 0.058 Å and the phenyl ring is twisted out of this plane [dihedral angle = 60.08 (9°]. The geranyl substituent is almost normal to benzene ring to which it is connected [C—C—Car—Car (ar = aromatic torsion angle = −87.8 (2°]. Intramolecular O—H...O and O—H...π interactions are formed. In the crystal, supramolecular chains are formed along the a axis owing to C—H...O contacts, with the lactone carbonyl atom accepting two such bonds.

  17. Discovery of the gene signature for acute lung injury in patients with sepsis Address for reprint requests and other correspondence: J. A. Howrylak, UPMC Montefiore NW 628, 3459 5th Ave., Pittsburgh, PA 15213 (e-mail: howrylakj@upmc.edu).The costs of publication of this article were defrayed in part by the payment of page charges. The article must therefore be hereby marked “advertisement” in accordance with 18 U.S.C. Section 1734 solely to indicate this fact.

    Howrylak, Judie A.; Dolinay, Tamas; Lucht, Lorrie; Wang, Zhaoxi; Christiani, David C.; Sethi, Jigme M.; Xing, Eric P.; Donahoe, Michael P.; Choi, Augustine M. K.

    2009-01-01

    The acute respiratory distress syndrome (ARDS)/acute lung injury (ALI) was described 30 yr ago, yet making a definitive diagnosis remains difficult. The identification of biomarkers obtained from peripheral blood could provide additional noninvasive means for diagnosis. To identify gene expression profiles that may be used to classify patients with ALI, 13 patients with ALI + sepsis and 20 patients with sepsis alone were recruited from the Medical Intensive Care Unit of the University of Pittsburgh Medical Center, and microarrays were performed on peripheral blood samples. Several classification algorithms were used to develop a gene signature for ALI from gene expression profiles. This signature was validated in an independently obtained set of patients with ALI + sepsis (n = 8) and sepsis alone (n = 1). An eight-gene expression profile was found to be associated with ALI. Internal validation found that the gene signature was able to distinguish patients with ALI + sepsis from patients with sepsis alone with 100% accuracy, corresponding to a sensitivity of 100%, a specificity of 100%, a positive predictive value of 100%, and a negative predictive value of 100%. In the independently obtained external validation set, the gene signature was able to distinguish patients with ALI + sepsis from patients with sepsis alone with 88.9% accuracy. The use of classification models to develop a gene signature from gene expression profiles provides a novel and accurate approach for classifying patients with ALI. PMID:19174476

  18. Computational Analysis of Pharmacokinetic Behavior of Ampicillin

    Mária Ďurišová

    2016-07-01

    Full Text Available orrespondence: Institute of Experimental Pharmacology and Toxicology, Slovak Academy of Sciences, 841 04 Bratislava, Slovak Republic. Phone + 42-1254775928; Fax +421254775928; E-mail: maria.durisova@savba.sk 84 RESEARCH ARTICLE The objective of this study was to perform a computational analysis of the pharmacokinetic behavior of ampicillin, using data from the literature. A method based on the theory of dynamic systems was used for modeling purposes. The method used has been introduced to pharmacokinetics with the aim to contribute to the knowledge base in pharmacokinetics by including the modeling method which enables researchers to develop mathematical models of various pharmacokinetic processes in an identical way, using identical model structures. A few examples of a successful use of the modeling method considered here in pharmacokinetics can be found in full texts articles available free of charge at the website of the author, and in the example given in the this study. The modeling method employed in this study can be used to develop a mathematical model of the pharmacokinetic behavior of any drug, under the condition that the pharmacokinetic behavior of the drug under study can be at least partially approximated using linear models.

  19. CPT 2004 BRISBANE

    2000-01-01

    Dear Colleagues, On behalf of the National Organizing Committee I am delighted to invite you to CPT2004 which will be hosted by the Australian Society of Clinical and Experimental Pharmacologists and Toxicologists (ASCEPT) and the Division of Clinical Pharmacology of IUPHAR. The South East Asian Western Pacific regional grouping of pharmacologists will be extensively involved. Major areas to be covered in an exciting scientific program will include drug discovery and development, the latest advances in therapeutic areas, clinical toxicology, pharmacogenomics, political and social pharmacology, education, quality use of medicines, pharmacoepidemiology and pharmacoeconomics. We will provide an outstanding social program and give your accompanying persons a personal welcome and sense of involvement. The 18th World Congress of the Intemational Society for Heart Research (ISHR) will be held at the same venue in Brisbane directly following CPT2004, and the programs will be coordinated to facilitate attendance at both meetings. Come to CPT2004 in Australia and enjoy our unique environment, and attractions that are as varied as skiing in August, Ulum (Ayers Rock) and the Great Barrier Reef. For any further enquiries, please contact: CPT2004 Secretariat, GPO Box 2609 Sydney NSW 2001 Australia Tel: +61-2-9241 1478 Fax: + 61-2-9521 3552 E-mail: reply@icmsaust. com. auIntemet: www. cpt @ icmsaust. com. au

  20. Assessment of the ethical aspects of boards dentist in jequié-ba

    Iane Souza Nery Silva

    2013-01-01

    Full Text Available The objective consisted in the evaluation of ethical violations present on the boards of dental clinics in the city of Jequié, according to CFO-Resolution 71 of 2006. Dental advertising boards were photographed, both laid down in front of the doctor's offices and clinics, and the advertising that made these. The photographs were examined by four judges, with use of a computer, whereas as must haves for the presence of the name and the registration number in the CRO and representative name of the profession of dental surgeon; optional items were the presence of areas of practice, if there is this inscription in CRO, academic qualifications, address, telephone number, fax number, e-mail address, work schedule, covenants, accreditations and the term general practitioner; and the items are price, listing offenders free services, payment arrangements, grooming of patients and artifices of advertisement to gain customers. It was found that only ads and plaques were 11,76% the must haves, 88,24% contained optional items and 11,76% were in disagreement with any item of Dental Ethics Code consideredas infringement. It can be concluded that most of the advertisements was not collected in accordance to the current legislation, since in addition to ethical violations have plates 11,76%, 88,24% lacked all items considered mandatory.

  1. Educator Resource Center for NASA Langley Research Center

    Bridgford, Todd; Koltun, Nick R.

    2003-01-01

    The goal of the ERCN is to provide expertise and facilities to help educators access and utilize science, mathematics, and technology instructional products aligned with national standards and appropriate state frameworks and based on NASA s unique mission and results. The NASA Langley s Office of Education has established the service area for this ERC to be the five states of Kentucky, North Carolina, South Carolina, Virginia and West Virginia. This educational grant activity is associated with NASA s Mission to inspire the next generation of explorers.. .as only NASA can. The communication of NASA s knowledge is the prime role of this ERC. Functioning as a dissemination system of instructional materials and support for pre-college education programs we have met the NASA Education ERCN Program's goal. The following ERCN objectives have been accomplished: Demonstrate and facilitate the use of NASA educational products and technologies in print, video and web based formats. Examples include but are not limited to NASA approved Educator s Guides with Activities based on national standards for appropriate subjects and grade levels. We have demonstrated the use videotape series in analogue format and the new digital video instructional systems along with the use of NASA TV. The promotion of web page based resources such as the new NASA Portal web and the ability to download print resources is continuously facilitated in workshops. This objective has been completed by educator contacts that include on-site visits, phone requests, postal mail requests, e-mail requests, fax requests and workshops offered.

  2. Automation as a strategic toll for service stations management; Automacao como ferramenta aliada a gestao de postos de servicos

    Garcia, Marcello Cyrino [GILBARCO do Brasil, Sao Paulo, SP (Brazil). Div. de Automacao

    2004-07-01

    The use of automation systems will be approached as fundamental tool in the control of sales in the pumps as well electronic management of stock in the tanks on a consolidated and integrated way, offering reliability and total control in the administration of fuel resale, no matter if the user be a one station owner, a group of dozens stations, or oil companies in general. These systems allow the local control in the gas station as well remotely through internet access or other kind of communication interface which be Also available. We will give some examples, as the possibility of remote stock management through a communication link between the oil company and gas station, in order to setup in the system a minimum stock level in each tank, that when being reached sends an automatic alarm for the oil company and another alarm for the station operator, so that the replenishment is programmed immediately without the need of sending purchase order by fax, e mail or telephone. This process brings a huge reduction of costs in the delivery logistics as well in the operational costs, reverting directly on a growth of the gas station and dealer's profit. Through this control, is also possible the remote management of fuel leak alarms in attendance to CONAMA 273, making possible a shared control and offering higher safety for both parts involved, considering the concept of environmental co-responsibility between gas station and oil company (dealer). (author)

  3. Information sources 2000

    Fogle, T. [American Society for Nondestructive Testing, Columbus, OH (United States)

    1995-12-31

    The demand for increased accessibility, more timely delivery of results, and international coverage of standards, technology, and business has made the information center look for more effective ways to serve its members. The current trend to meet demand in many technical settings is with a virtual library. While the definition may vary from library to library, a virtual library universally implies electronic integration of new services with traditional library services. Today, fax machines, on-line information systems, electronic bulletin boards, CD-ROM products, World Wide Web sites, and E-mail are vital in providing members cost and time saving services in their pursuit of quality and excellence. The purpose of this paper is to provide a clear vision of the information center and its integration of conventional and on-line services. The NDT database which was purchased from the Atomic Energy Commission located in the United Kingdom, maintains thousands of NDT related articles dating from 1967 to the present. It is searchable and can be accessed by subject, author, and title. Thanks to this informational tool one can now access information in minutes, disseminate it, and get it to the patron the same day requested. And while traditional printed materials such as textbooks, directories, and indexes are still consulted, with today`s technology even they can be disseminated faster.

  4. Events diary

    2000-01-01

    From 18 January until 28 March the 2000 IEE Faraday Lecture will be touring venues in the UK, aiming to inspire and encourage students to choose a career in science and engineering. The lecture tour is being supported by communications and IT company, Marconi, and it is being presented by University College London. Interactive experiments for the audience of 14 - 16 year-olds will combine with a multimedia presentation on the theme `Time and Place in the Communications Age', exploring our ability to make precise measurements of time, place and space and how these impact on our personal and business lives. Among the curious facts from the lecture is the discovery that Cornwall rises and falls by 20 cm every time the tide moves in and out. The whole of the UK rises and falls by 50 cm every time the Moon goes by and the UK is actually 20 m shorter than was thought ten years ago, before the Global Positioning Satellite system was in operation. Attendance at the lectures is free and schools interested in booking tickets should visit the Faraday website at www.faraday.org.uk . Further details of the tour are available from the Faraday Lecture Office, Institution of Electrical Engineers, Michael Faraday House, Six Hills Way, Stevenage, Herts SG1 2AY (tel: 01438 313311, fax: 01438 742856, e-mail: faraday@iee.org.uk ). Among the `Strands' on the programme at the 2000 Edinburgh international science festival on 2 - 18 April are: visions of the future; time; the natural world; new materials; science book festival; science film festival. Festival programmes should be available soon from the festival office at 8 Lochend Road, Edinburgh EH6 8BR (tel: 0131 530 2001, fax: 0131 530 2002, e-mail: esf@scifest.demon.co.uk ). BA2000 will be one of the key features of the `creating SPARKS' festival where the sciences meet the arts in London during 6 - 30 September. Centred on South Kensington, and led by the British Association, creating SPARKS will be staged at such famous institutions

  5. The Crazy Business of Internet Peeping, Privacy, and Anonymity.

    Van Horn, Royal

    2000-01-01

    Peeping software takes several forms and can be used on a network or to monitor a certain computer. E-Mail Plus, for example, hides inside a computer and sends exact copies of incoming or outgoing e-mail anywhere. School staff with monitored computers should demand e-mail privacy. (MLH)

  6. Research proposal on the relationship between Corporate Social Responsibility and Strategic Human Resource Management

    Barrena-Martínez, Jesús; López-Fernández, Macarena; Romero-Fernández, Pedro Miguel

    2011-01-01

    Jesús Barrena-Martínez*, Macarena López-Fernández and Pedro M. Romero-Fernández Department of Business Management, University of Cadiz, Glorieta Carlos Cano S/N, Cádiz 11002, Spain E-mail: E-mail: E-mail: *Corresponding author

  7. General Ultrasound Imaging

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Images × Image Gallery ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  8. Computed Tomography (CT) -- Head

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Images × Image Gallery ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  9. Children's (Pediatric) Nuclear Medicine

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Images × Image Gallery ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  10. Arthrography

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Images × Image Gallery ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  11. Children's (Pediatric) Abdominal Ultrasound Imaging

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Images × Image Gallery ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  12. Children's (Pediatric) CT (Computed Tomography)

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Images × Image Gallery ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  13. Computed Tomography (CT) -- Sinuses

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Images × Image Gallery ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  14. Ultrasound -- Pelvis

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Images × Image Gallery ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  15. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Images × Image Gallery ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  16. Magnetic Resonance Imaging (MRI) -- Head

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Images × Image Gallery ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  17. Total Knee Replacement for Women

    Full Text Available ... time during the broadcast, please feel free to e-mail us questions via the e-mail seen on your screen, and I’ll ... again, I want to remind our viewers to e-mail their questions that may arise, and we’ ...

  18. Magnetic Resonance Imaging (MRI) -- Head

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Please help us ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  19. Transjugular Intrahepatic Portosystemic Shunt (TIPS)

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Please help us ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  20. Computed Tomography (CT) -- Sinuses

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Please help us ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  1. Computed Tomography (CT) -- Head

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Please help us ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  2. Ultrasound -- Pelvis

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Please help us ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  3. Arthrography

    Full Text Available ... a comment, please complete the following form: Comment: E-mail: Area code: Phone no: Please help us ... Recommend RadiologyInfo to a friend Send to (friend's e-mail address): From (your name): Your e-mail ...

  4. Linguistic Symbol Intraference in Textese and E-Mailese: Implications for Teaching and Learning Standard English

    Bode Ekundayo, Omowumi Steve

    2014-01-01

    This paper examines how senders of text messages and informal e-mail redeploy linguistic symbols innovatively to communicate. Even a cursory look at an SMS text (textese) and informal e-mail (e-mailese) will show that its style is different from that of formal writing. Two thousand twenty text messages and five hundred informal e-mail were studied…

  5. Mass Communication and Journalism Faculty and Their Electronic Communication with College Students: A Nationwide Examination

    Brunner, Brigitta R.; Yates, Bradford L.; Adams, Jennifer Wood

    2008-01-01

    Nearly 700 U.S. journalism and mass communication faculty reported their perceptions of student e-mail use via a Web-based survey. This nationwide study focused on content of e-mail received by faculty and made comparisons based on faculty gender. Nearly half of the respondents reported that they occasionally receive e-mails from students before a…

  6. Local Heroes Live!

    1999-09-01

    , USA (fax: (1) 818 985 2466, e-mail: info@physlink.com).

  7. Letter from the Board of Directors of Astronomy & Astrophysics

    Meynet, Georges

    2005-07-01

    astrophysics and to have expertise in one of these two sub-fields. Candidates should have a strong record of published research in astronomy and astrophysics, should have experience as a referee and/or journal editor, and be prepared to commit the time needed to oversee the peer review of up to three hundred papers per year. Limited support for office equipment and secretarial help, as well as an annual indemnity, will be provided to the Associate Editors, and the initial term of appointment is three years. Applicants should submit a curriculum vitae, a list of publications, and a concise covering letter that summarizes the candidate's qualifications and the reasons for seeking an Associate Editor position. The likelihood of support from the home institute for the task should also be discussed in the application. Applications should preferably be e-mailed or sent/faxed to the Chairman of the Board of Directors: Dr. Georges Meynet, Geneva Observatory, 1290 Sauverny, Switzerland, email georges.meynet@obs.unige.ch, Fax:+41 22 37 92205. Applications received by 1 October 2005 will receive full consideration, while informal inquiries about the positions may be directed by e-mail to Georges Meynet. On behalf of the Board of Directors Georges Meynet

  8. DIAGNÓSTICO DO USO DA INTELIGÊNCIA COMPETITIVA EMPREENDEDORA EM PEQUENAS EMPRESAS DA INDÚSTRIA DE CONFECÇÕES DA CIDADE DE VILA VELHA – ES/DIAGNOSIS OF THE USE OF COMPETITIVE INTELLIGENCE ENTREPRENEURIAL IN SMALL BUSINESS THE CLOTHING INDUSTRY OF THE CITY OF VILA VELHA – ES

    Anderson Soncini Pelissari

    2012-08-01

    Full Text Available As organizações cujas estruturas, processos e tecnologias não estão alinhados com os negócios terão dificuldades em sobreviver. A fim de se manterem, estrategistas de gestão têm se apoiado em práticas como a Inteligência Competitiva (IC – que tem como base a informação e a velocidade de seu uso para melhor alinhar o negócio às estratégias, facilitando o processo de tomada de decisão. Posto isso, objetivou-se, com esta pesquisa, analisar a prática da inteligência competitiva de pequenas empresas do Município de Vila Velha/ES e a importância da aplicabilidade da Inteligência Competitiva Empreendedora – assumindo-se que a IC contribui para o alinhamento das informações ambientais às estratégias das organizações. Para a coleta de dados, utilizou-se o levantamento (survey, em que foi aplicado um questionário com perguntas fechadas a uma amostra não probabilística intencional, aplicado diretamente pelo próprio pesquisador, por e-mail e fax. Os resultados apontaram que, apesar de os administradores pesquisadosdemonstrarem interesse em estruturar suas informações com o objetivo de tomar decisões mais rápidas e assertivas, eles não desenvolvem um processo global de Inteligência Competitiva Empreendedora, vistonão gerenciarem de modo sistemático as informações do mercado.The organizations, whose structures, processes and technologies are not aligned with the businesses, they will have difficulties in surviving. In order to maintain, management strategists have reliedon practices such as Competitive Intelligence (CI - which is based on the information and the speed of its use to better align business strategies, facilitating the process of decision making. That said, the aim with this research, analyzing the practice of competitive intelligence for small businesses in the City of Vila Velha/ES, and the importance of applicability of Competitive Intelligence Entrepreneurship - assuming that, the IC contributes to

  9. Looking ahead ...

    1999-07-01

    social events, including the Physics Education lecture to be given this year by Institute of Physics Publishing's Journals Director, Professor Robert Brown. Programmes for the meeting will be available in September and full details can be obtained from the Conference Office, ASE, College Lane, Hatfield AL10 9AA (fax: +44 (0) 1707 266532, e-mail: mbrookman@ase.org.uk).

  10. NOTICE FOR CONTRIBUTORS

    2000-01-01

    Aim and Scope Cell Research is a journal devoted to the publication of the novel results in different areas of animal and plant cell biology and to the promotion of the scientific exchanges between China and all other parts of the world. It is edited by Shanghai Institute of Cell Biology, Chinese Academy of Sciences, published by Science Press, Beijing China, distributed by Chinese Post Office for local and New York Agency Ltd., USA for overseas. Cell Research is included in Index Medicus and MEDLINEon MEDLARS system and Science Citation Index Expandedtm (also known as SciSearchtm)and ISI Alerting Services.Article type Original articles, cormnentary, and short communications are all welcomed, reviews and minireviews should be in advance with the Editor-in-Chief.Submission of manuscripts Manuscript should be subniitted to the Editorial Office in Shanghai or three reginal editors closed to your location. Ms. Ai Lan CHANG, Editorial Office of Cell Research, Shanghia Institute of CellBiology, Chinese Academy of Sciences, 320 Yue-yang Road, Shanghai 200031, China, e-mai:cellres@sunm.shcnc.ac.cn Dr. Yun-Bo SHI, LME/NICHD/NIH, BUILDING 18t room 106, 18 Library RD MSC 5431, Bethesda, MD 20892-5431, USA, e-mail: shi@helix.nih.gov Dr. Yufang SHI, Scientist, Dept. of Immunology, Holland Laboratory of the American Red Cross, 15601 Crabbs Branch Way, Rockville, MD 20855, USA. Tel: 301 517 0392/Cell:301 706 0826, Fax: 301 517 0344/301 517 0395, e-mail: shiy@usa. redcross.org Jing De ZHU, CRC Dept,of Medical Oncology, Galsgow University, Glasgow G61,1BD. UK. E-mail: gpma66@udcf, gla.ac.ukOne original and two complete copies of the manuscript should be submitted. The final revised version of the paper should be submitted with the electronic version of the complete manuscript.Manuscript style The Language used is English. Manuscript should be doulble-spaced, with margins of approximately 2.5 cm all around and numbered. The text is organized as Abstract, Introduction, Materials and

  11. Statistical analysis concerning broad band measurements of radio frequency electromagnetic fields

    Electromagnetic fields (EMF) actually represents one of the most common and the fastest growing environmental factors influencing human life. The care of the public community for the so called electromagnetic pollution is continually increasing because of the booming use of mobile phones over the past decade in business, commerce and social life. Moreover the incumbent third generation mobile systems will increase the use of all communication technologies, including fax, e-mail and Internet accesses. This extensive use has been accompanied by public debate about possible adverse effects on human health. In particular there are concerns related to the emission of radiofrequency radiation from the cellular phones and from base stations. Due to this very fast and wide development of cellular telephony more and more data are becoming available from monitoring, measuring and predicting electromagnetic fields as requested by the laws in order to get the authorization to install antenna and apparatus size of the database is such consistent that statistics have been carried out with a high degree of confidence: in particular in this paper statistical analysis has been focussed on data collected during about 1000 check measurements of electromagnetic field values performed by a private company in 167 different located in almost all Italian regions. One of the aim set consist in to find the most critical factors for the measurements, besides the field conformation: position in space, logistic conditions, technology employed, distance from the centre of the antenna, etc. The first step of the study deals with the building of a database fulfilled with information relevant to the measurements. In a second step, by means of appropriate statistical procedures, the electromagnetic field is evaluated and then the different measurement procedures are critically reviewed

  12. [A trial of integrated telepathology (iTP) in Nagano prefecture].

    Yoshizawa, Akihiko

    2013-01-01

    The shortage of pathologists is a major issue in Japan, and telepathology (TP) is considered one of the most innovative solutions to resolve this. About twenty years ago, robotic TP systems (RTS) were developed and are still used in Japan. Virtual slide (VS) systems appeared in the early 2000s and have being replacing RTS because of the ease of handling images, easy reference to previous images and synchronous discussion among pathologists. Both systems are currently used for intra-operative consultations, second opinions and consultations by specialists, and in education and research via the internet. With these systems, pathologists participating in consultations have to obtain a patient's clinical information by other methods, such as fax or e-mail, and they often make a diagnosis without this information and previous histological images. The author proposes an "integrated telepathology (iTP)" system in Nagano prefecture. This system is composed of an anatomic pathology information system (APIS) linking the VS system and is designed to connect all pathologists in community hospitals, including Shinshu University Hospital, using a virtual private network. Any registered pathologist can access APIS and view any pathological images of patients with the clinical information. Therefore, pathologists can make a diagnosis with substantial patient information at any time and from any location, and pathologists in different hospitals can consult one another in a secure network. Our iTP system will be able to streamline diagnosis duties in surgical pathology in Nagano prefecture, and may solve the shortage of pathologists by improving diagnosis efficiency. PMID:23672084

  13. Implementation of SAP Waste Management System

    The Y-12 National Security Complex (Y-12) assumed responsibility for newly generated waste on October 1, 2005. To ensure effective management and accountability of newly generated waste, Y-12 has opted to utilize SAP, Y-12's Enterprise Resource Planning (ERP) tool, to track low-level radioactive waste (LLW), mixed waste (MW), hazardous waste, and non-regulated waste from generation through acceptance and disposal. SAP Waste will include the functionality of the current waste tracking system and integrate with the applicable modules of SAP already in use. The functionality of two legacy systems, the Generator Entry System (GES) and the Waste Information Tracking System (WITS), and peripheral spreadsheets, databases, and e-mail/fax communications will be replaced by SAP Waste. Fundamentally, SAP Waste will promote waste acceptance for certification and disposal, not storage. SAP Waste will provide a one-time data entry location where waste generators can enter waste container information, track the status of their waste, and maintain documentation. A benefit of the new system is that it will provide a single data repository where Y-12's Waste Management organization can establish waste profiles, verify and validate data, maintain inventory control utilizing hand-held data transfer devices, schedule and ship waste, manage project accounting, and report on waste handling activities. This single data repository will facilitate the production of detailed waste generation reports for use in forecasting and budgeting, provide the data for required regulatory reports, and generate metrics to evaluate the performance of the Waste Management organization and its subcontractors. SAP Waste will replace the outdated and expensive legacy system, establish tools the site needs to manage newly generated waste, and optimize the use of the site's ERP tool for integration with related business processes while promoting disposition of waste. (authors)

  14. CERN: Accelerator school

    Full text: Jyvaskyla, a university town in central Finland, was the setting for last year's General Accelerator School organized by the CERN Accelerator School. Well over a hundred students - more than for some time - followed two weeks of lectures on a broad spectrum of accelerator topics, the first step en route to becoming the designers, builders and operators of the surprisingly large number of, accelerators of all kinds either built or planned throughout Europe and further afield. This was the fifth such school organized by CAS in a biennial cycle which alternates this introductory level with more advanced tuition. The next, advanced, school will be from 20 October - 1 November, hosted by Athens University on the Greek Island of Rhodes. (Application details will become available in Spring but would-be participants should already reserve the dates.) After Finland, the CAS caravan moved to Benalmadena near Malaga in Spain where, together with Seville University, they organized one of the joint US-CERN schools held every two years and focusing on frontier accelerator topics. This time the subject was electron-positron factories - machines for high luminosity experiments in phi, tau-charm, beauty and Z physics. Experts from both sides of the Atlantic and from Japan shared their knowledge with an equally representative audience and probed the many intensity related phenomena which must be mastered to reach design performance. A number of these topics will receive extended coverage in the next specialist CAS School which is a repeat - by public demand - of the highly successful radiofrequency course held in Oxford in 1991. This school will be in Capri, Italy, with the support of the University of Naples from 29 April to 5 May. Details and application forms are now available by e-mail (CASRF@CERNVM.CERN.CH), by fax (+41 22 7824836) or from Suzanne von Wartburg, CERN Accelerator School, 1211 Geneva 23, Switzerland

  15. A preliminary study of the nonlinearity of adhesive point-fixings in structural glass facades

    Jonas Dispersyn

    2014-06-01

    Full Text Available Corresponding author: Jonas Dispersyn, Laboratory for Research on Structural Models (LMO, Department of Structural Engineering, Faculty of Engineering and Architecture, Ghent University, Ghent, Belgium. Tel.: +32 9 264 54 84; Fax: +32 9 264 58 38; E-mail: jonas.dispersyn@UGent.be The recent demand for architectural transparency has drastically increased the use of glass material for structural purpose. However, connections between structural glass members represent one of the most critical aspects of glass engineering, due to the fragile behaviour of this material. In that respect, research activities on adhesive point-fixings are currently on-going. The mechanical behaviour of adhesive point-fixings is affected by large nonlinearities, which are usually investigated by nonlinear Finite Element Analysis (FEA. This paper focuses on the geometrical and the material nonlinearities of adhesive point-fixings for glass structures. Firstly, the nonlinear material behaviour of two selected adhesives are investigated by means of uniaxial tension and compression tests on the bulk material. The production of specimens, test methodology and displacement rate dependency are discussed. Secondly, the nonlinear stress distribution occurring in the adhesive and the joint stiffness is investigated by means of nonlinear FEA. The effects of several parameters on the mechanical behaviour of adhesive point-fixings, such as the connection dimensions and adhesive elastic properties, are studied. The adhesive stress-strain curves resulting from the experimental campaign show that the adhesives exhibit a large nonlinear behaviour. The results show that the stress and strain at failure reduce as the displacement rate is reduced. From the numerical investigations it is concluded that large nonlinearity involves the mechanical behaviour of adhesive point-fixing which cannot be neglected. The stress distribution within the adhesive deviates from uniform nominal stresses

  16. The VTLA System of Course Delivery and Faculty Development in Materials Education

    Berrettini, Robert; Roy, Rustum

    1996-01-01

    There is a national need for high-quality, upper division courses that address critical topics in materials synthesis, particularly those beyond the present expertise of the typical university department's faculty. A new project has been started to test a novel distance education and faculty development system, called Video Tape Live Audio (VTLA). This, if successful, would at once enlarge the national Materials Science and Engineering (MSE) student cohort studying material synthesis and develop faculty expertise at the receiving sites. The mechanics for the VTLA scheme are as follows: A course is designed in the field selected for emphasis and for which there is likely to be considerable demand, in this example 'Ceramic Materials Synthesis: Theory and Case Studies'. One of the very best researcher/teachers records lectures of TV studio quality with appropriate visuals. Universities and colleges which wish to offer the course agree to offer it at the same hour at least once a week. The videotaped lectures and accompanying text, readings and visuals are shipped to the professor in charge, who has an appropriate background. The professor arranges the classroom TV presentation equipment and supervises the course. Video lectures are played during regular course hours twice a week with time for discussion by the supervising professor. Typically the third weekly classroom period is scheduled by all sites at a common designated hour, during which the course author/presenter answers questions, provides greater depth, etc. on a live audio link to all course sites. Questions are submitted by fax and e-mail prior to the audio tutorial. coordinating professors at various sites have separate audio teleconferences at the beginning and end of the course, dealing with the philosophical and pedagogical approach to the course, content and mechanics. Following service once or twice as an 'apprentice' to the course, the coordinating professors may then offer it without the necessity

  17. Incident and Trafficking Database: New Systems for Reporting and Accessing State Information

    The IAEA's Incident and Trafficking Database (ITDB) is the Agency's authoritative source for information on incidents in which nuclear and other radioactive material is out of national regulatory control. It was established in 1995 and, as of June 2014, 126 States participate in the ITDB programme. Currently, the database contains over 2500 confirmed incidents, out of which 21% involve nuclear material, 62% radioactive source and 17% radioactively contaminated material. In recent years, the system for States to report incidents to the ITDB has been evolving — moving from fax-based to secure email and most recently to secure on-line reporting. A Beta version of the on-line system was rolled out this June, offering a simple, yet secure, communication channel for member states to provide information. In addition the system serves as a central hub for information related to official communication of the IAEA with Member States so some communication that is traditionally shared by e-mail does not get lost when ITDB counterparts change. In addition the new reporting system incorporates optional features that allow multiple Member State users to collaboratively contribute toward an INF. States are also being given secure on-line access to a streamlined version of the ITDB. This improves States' capabilities to retrieve and analyze information for their own purposes. In addition, on-line access to ITDB statistical information on incidents is available to States through an ITDB Dashboard. The dashboard contains aggregate information on number and types of incidents, material involved, as well some other statistics related to the ITDB that is typically provided in the ITDB Quarterly reports. (author)

  18. Embryonic and genetic manipulation in fish

    2000-01-01

    Fishes, the biggest and most diverse community in vertebrates are good experimental models for studies of cell and developmental biology by many favorable charac teristics. Nuclear transplantation in fish has been thor oughly studied in China since 1960s. Fish nuclei of em bryonic cells from different genera were transplanted into enucleated eggs generating nucleo-cytoplasmic hybrids of adults. Most importantly, nuclei of cultured goldfish kid ney cells had been reprogrammed in enucleated eggs to support embryogenesis and ontogenesis of a fertile fish. This was the first case of cloned fish with somatic cells. Based on the technique of microinjection, recombinant MThGH gene has been transferred into fish eggs and the first batch of transgenic fish were produced in 1984. The behavior of foreign gene was characterized and the onset of the foreign gene replication occurred between the blas tula to gastrula stages and random integration mainly oc curred at later stages of embryogenesis. This eventually led to the transgenlc mosaicism. The MThGH-transferred common carp enhanced growth rate by 2-4 times in the founder juveniles and doubled the body weight in the adults. The transgenic common carp were more efficient in utilizing dietary protein than the controls. An “all-fish” gene construct CAgcGH has been made by splicing the common carpβ-actin gene (CA) promoter onto the grass carp growth hormone gene (gcGH) coding sequence. The CAgcGH-transferred Yellow River Carp have also shown significantly fast-growth trait. Combination of techniques * Corresponding author, Fax: 0086-27-87876624 E-mail: zyzhu@ihb.ac.cn of fish cell culture, gene transformation with cultured cells and nuclear transplantation should be able to generate ho mogeneous strain of valuable transgenic fish to fulfil human requirement in 21st century.

  19. PR 2.0 and interaction of Turkish Brands in Terms of Brand Awareness

    Ece BABAN

    2012-11-01

    Full Text Available Today, under the affect of market conditions, companies prefer social media channel with the aim of reaching their target population, interacting with their customers directly and expressing their brands more powerfully in the market. Companies are trying to perform new strategies for creating close relationships between brand and customers, while the differentiation attempts of the companies. Nowadays, the Internet phenomenon is one of the most important factors in this regard. People spend most of their times at the computer and internet networks. In the 1990s, with the spread of internet and mobile phones, public relations activities moved to electronic and digital media of mass communication as a one-way by using e-mail, SMS and fax machine tools (Jalali, 2009:32. In the 2000s, by the development in web area, with the help of 2.0 patches, people can also edit the pages instead of just reading the written pages through the web pages. In today's competitive environment and the developments that followed the progress of technology companies and companies with a progressive web influenced by these developments and the opportunities created by social media, they introduce their products and services and increase customer satisfaction for better uses. PR activities which use Web 2.0 and technological developments in social media environment are called PR 2.0 (Jalali, 2009:45. Throughout the research, PR 2.0 activities within the scope of the contribution of brand awareness through social media, especially in comparison with traditional PR will be discussed. Brands will be examined regarding the brands which are actively using the social media in terms of the public relations and brand awareness. Brands can be listed in four different business sectors such as; Mavi Jeans, Anadolu Efes Pilsen, Garanti Bankası and ETI.

  20. Business Information Exchange System with Security, Privacy, and Anonymity

    Muftic, Sead; bin Abdullah, Nazri; Kounelis, Ioannis

    2016-01-01

    Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of priv...

  1. Email Mining: A Survey

    Pranjal S. Bogawar; Kishor K. Bhoyar

    2012-01-01

    E-mail is one of the most widely used ways of written communication over the internet, and its traffic has increased exponentially with the advent of World Wide Web. The increase in email traffic comes also with an increase in the use of emails for illegitimate purpose. Phishing, Spamming, email bombing, threatening, cyber bullying, racial vilification, terrorist activities, child pornography and sexual harassment are common examples of e-mail abuses. So, there is a need for e-mail mining. Va...

  2. PreciseMail anti-spam gateway allows users more control over spam definitions; unwanted email is eliminated with no false positives

    ten Bruggencate, J

    2003-01-01

    "PreciseMail Anti-Spam Gateway uses a combination of proven heuristic (rules-based) and artificial intelligence technologies that eliminates unwanted spam e-mail at an Internet gateway without filtering critical e-mail messages. Its highly effective filtering engine identifies spam and allows multiple levels of tuning and customization to meet each user's personal e-mail spam filtering requirements" (1 page).

  3. Symmetrical dialogue in investor relations

    Harold Hassink; Laury Bollen; Meinderd de Vries

    2008-01-01

    Purpose – Previous research shows that symmetrical dialogue between companies and their investors through e-mail does not match the quality of the asymmetrically provided information on investor relations websites. This paper seeks to further examine the quality of symmetrical dialogue and especially whether sender identity affects the corporate e-mail handling performance. Design/methodology/approach – A “mystery sender” approach is used to test whether companies answer similar e-mails from ...

  4. Prospects of Young Professionals in the Academic Labor Market: Global Comparison and Assessment

    Martin Finkelstein; Kevin Iglesias; Anna Panova; Maria Yudkevich

    2014-01-01

    Martin Finkelstein - PhD, Professor of Higher Education, Seton Hall University. E-mail: Kevin W. Iglesias - PhD candidate, Senior Research Associate, Center for College Readiness, Seton Hall University. E-mail: Address: Seton Hall University, South Orange, NJ.Anna Panova - Research Fellow, International Laboratory for Institutional Analysis of Economic Reforms, National Research University Higher School of Economics. E-mail: apanova@...

  5. Modul pro propojení eshopu s emailovým marketingem

    Kaštánek, David

    2014-01-01

    Diploma thesis analyses current methods of connecting an e-shop to e-mail marketing. A new application for said connection is proposed with its requirements based on this thesis. A complete design of this connection, containing a principle of connection and a form of rules for e-mail lists generation and transfer to specialized e-mail marketing applications are presented here. Proposed solution is implemented and fully documented.

  6. Electronic mail : attitudes, self-efficacy, and effective communication

    Kandies, Jerry T.

    1994-01-01

    The purpose of this study was (a) to investigate the functional use of e-mail in a university setting and the relationship of attitudes toward and self-efficacy with email technology, and (b) to evaluate writing effectiveness in an electronic medium. The study also sought to determine if certain personal characteristics could serve as predictor variables for explaining e-mail use, attitudes toward email, and self-efficacy with e-mail technology. The population of inter...

  7. Laparoscopy Training in United States Obstetric and Gynecology Residency Programs

    Stovall, Dale W.; Fernandez, Andrea S.; Cohen, Stephen A.

    2006-01-01

    Objectives: To assess laparoscopic training curriculums in US Obstetrics and Gynecology residency programs. Methods: A list of E-mail addresses was obtained for the accredited Obstetrics and Gynecology residency programs in the US from the CREOG Directory of ObstetricGynecologic Residency Programs and Directors. An E-mail survey containing 8 questions regarding laparoscopy training was sent to all residency directors with current E-mail addresses. Results: Seventy-four residency directors res...

  8. Microsoft Outlook 2010 for dummies

    Dyszel, Bill

    2011-01-01

    Gain a whole new outlook on e-mail Overwhelmed by e-mail and ready to simplify your inbox? You'll be surprised at all the things you can accomplish with this mini guide to effectively using Outlook 2010. From creating notes, managing e-mail, and maintaining your calendar to eliminating spam and tracking your schedule, you'll take back control of your inbox and stay organized with Outlook 2010 and help from For Dummies. Open the book and find:Tips for setting up the Navigation paneEasy e-mail essentialsSteps for storing names and addresses<

  9. Software Engineering-Based Design for a Bayesian Spam Filter

    Mumtaz Mohammed Ali AL-Mukhtar

    2010-01-01

    The rapid spread and the easy availability of a free e-mail service have made it the medium of choice for the sending of unsolicited advertising and bulk e-mail in general. These messages, known as junk e-mail or spam mail, are an increasing problem to both Internet users and Internet service providers (ISPs). The research resolves one aspect of the spam problem by developing an appropriate filter for the e-mail client. The proposed filter is a combination of three forms of filters: Whitelist...

  10. Germ line activation of the Tie2 and SMMHC promoters causes noncell-specific deletion of floxed alleles Address for reprint requests and other correspondence: C. D. Sigmund, Depts. of Internal Medicine and Physiology & Biophysics, 3181B Medical Education and Biomedical Research Facility, Roy J. and Lucille A. Carver Collage of Medicine, Univ. of Iowa, Iowa City, IA 52242 (e-mail: curt-sigmund@uiowa.edu). The costs of publication of this article were defrayed in part by the payment of page charges. The article must therefore be hereby marked “advertisement” in accordance with 18 U.S.C. Section 1734 solely to indicate this fact.

    de Lange, Willem J.; Halabi, Carmen M.; Beyer, Andreas M.; Sigmund, Curt D.

    2008-01-01

    Tissue-specific knockouts generated through Cre-loxP recombination have become an important tool to manipulate the mouse genome. Normally, two successive rounds of breeding are performed to generate mice carrying two floxed target-gene alleles and a transgene expressing Cre-recombinase tissue-specifically. We show herein that two promoters commonly used to generate endothelium-specific (Tie2) and smooth muscle-specific [smooth muscle myosin heavy chain (Smmhc)] knockout mice exhibit activity in the female and male germ lines, respectively. This can result in the inheritance of a null allele in the second generation that is not tissue specific. Careful experimental design is required therefore to ensure that tissue-specific knockouts are indeed tissue specific and that appropriate controls are used to compare strains. PMID:18612081

  11. Elevated expression of protein biosynthesis genes in liver and muscle of hibernating black bears (Ursus americanus) Address for reprint requests and other correspondence: V. B. Fedorov, Inst. of Arctic Biology, Univ. of Alaska Fairbanks, Fairbanks, AK 99775 (e-mail: fnvf@uaf.edu). The costs of publication of this article were defrayed in part by the payment of page charges. The article must therefore be hereby marked “advertisement” in accordance with 18 U.S.C. Section 1734 solely to indicate this fact.

    Fedorov, Vadim B.; Goropashnaya, Anna V.; Tøien, Øivind; Stewart, Nathan C.; Gracey, Andrew Y.; Chang, Celia; Qin, Shizhen; Pertea, Geo; Quackenbush, John; Showe, Louise C.; Showe, Michael K.; Boyer, Bert B.; Barnes, Brian M.

    2009-01-01

    We conducted a large-scale gene expression screen using the 3,200 cDNA probe microarray developed specifically for Ursus americanus to detect expression differences in liver and skeletal muscle that occur during winter hibernation compared with animals sampled during summer. The expression of 12 genes, including RNA binding protein motif 3 (Rbm3), that are mostly involved in protein biosynthesis, was induced during hibernation in both liver and muscle. The Gene Ontology and Gene Set Enrichment analysis consistently showed a highly significant enrichment of the protein biosynthesis category by overexpressed genes in both liver and skeletal muscle during hibernation. Coordinated induction in transcriptional level of genes involved in protein biosynthesis is a distinctive feature of the transcriptome in hibernating black bears. This finding implies induction of translation and suggests an adaptive mechanism that contributes to a unique ability to reduce muscle atrophy over prolonged periods of immobility during hibernation. Comparing expression profiles in bears to small mammalian hibernators shows a general trend during hibernation of transcriptional changes that include induction of genes involved in lipid metabolism and carbohydrate synthesis as well as depression of genes involved in the urea cycle and detoxification function in liver. PMID:19240299

  12. Postpartum Blues

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... educators. GO "My 9 Months" app Get free information about healthy pregnancies on your iPad. GO News ...

  13. Cesarean Section: Recovering After Surgery

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... Dr. Siobhan Dolan gives moms-to-be helpful information on what to expect when recovering from a ...

  14. 75 FR 14472 - NASA Advisory Council; Science Committee; Meeting

    2010-03-25

    ... 20771. FOR FURTHER INFORMATION CONTACT: Ms. Marian Norris, Science Mission Directorate, NASA... in advance of the meeting by contacting Marian Norris via e-mail at mnorris@nasa.gov or by telephone... contacting Marian Norris via e-mail at mnorris@nasa.gov or by telephone at (202) 358-4452. Public...

  15. Oral Cancer Exam

    Full Text Available ... 50 copies? Call 1-866-232-4528 or e-mail nidcrinfo@mail.nih.gov . Order Now Clinical ... LinkedIn External link – please review our disclaimer Print E-mail commonUtilitiesRightboxRadEditor commonRightboxRadEditor Connect: Subscribe Twitter LinkedIn YouTube ...

  16. Minimally Invasive Lumbar Discectomy

    Full Text Available ... any point during this operation, send us an e- mail with your questions right directly to the ... on that button you can send us an e-mail right to OR-Live. Let’s check in ...

  17. Clinical Perspectives: 7-Year-Old Girl Has 6 Organs Removed and Retransplanted

    Full Text Available ... viewers that you're more than welcome to e-mail your questions in, as we are progressing ... our Webcast tonight. You can just click the “e-mail question” button on your browser. So Dr. ...

  18. Robot-Assisted Prostatectomy

    Full Text Available ... a question” icon on the screen, you can e-mail us a question, and these questions will ... any of the viewers have questions, you can e-mail us questions. Just press the “Ask a ...

  19. Virginia Tech concludes test of VT Alerts system

    Owczarski, Mark

    2007-01-01

    Shortly after 11 a.m. yesterday, Virginia Tech initiated its first system-wide test of VT Alerts, an emergency notification system that can send text messages to cell phones, voice messages to non university telephones and cell phones, instant messages on the AOL, MSN, and Yahoo networks, and e-mail messages to non-Virginia Tech e-mail accounts.

  20. "Just Spoke to ...": The Types and Directionality of Intertextuality in Professional Discourse

    Warren, Martin

    2013-01-01

    E-mail communication in business and professional contexts has been analysed with a focus on textual and communicative complexity, stylistic conventions, and the relation between e-mails and professional culture. The purpose of the present study is to compare the professional literacy in two professions by studying the use of intertextuality in…

  1. 76 FR 23798 - Blue Ribbon Commission on America's Nuclear Future

    2011-04-28

    ... Ribbon Commission on America's Nuclear Future AGENCY: Office of Nuclear Energy, Department of Energy...- 0544; e-mail ] CommissionDFO@nuclear.energy.gov . Additional information will be available at http... Independence Avenue, SW., Washington DC 20585; e-mail to CommissionDFO@nuclear.energy.gov , or post comments...

  2. Electronic individual breakdown of pension rights and/or transfer value

    Pension Fund

    2011-01-01

    Commencing this year, members of the personnel will be notified by e-mail of their annual breakdown of pension rights and/or transfer value. Each person receiving the e-mail notification will be invited to consult this breakdown by clicking on a link protected by AISlogin and a password. Benefits Service of the Pension Fund pension-benefits@cern.ch  

  3. 75 FR 46924 - Notice of Receipt of Several Pesticide Petitions Filed for Residues of Pesticide Chemicals in or...

    2010-08-04

    ... factors, may have atypical or disproportionately high and adverse human health impacts or environmental... qualified by LC-MS/MS. Contact: Rose Mary Kearns, (703) 305-5611, e-mail address: kearns.rosemary@epa.gov... are qualified by LC-MS/MS. Contact: Rose Mary Kearns, (703) 305-5611, e-mail address:...

  4. Flame Retardant: Cyberbullies Torment Their Victims 24/7: Here's How to Stop the Abuse

    Willard, Nancy

    2006-01-01

    Cyberbullying is the use of electronic information such as e-mail and other digital age tools to bully or harass individuals. Cyberbullies post angry and vulgar messages in online "flaming" wars or hack into a peer's e-mail account to wreak havoc, assaulting the reputations and already fragile egos of their young victims. The devastating effects…

  5. Virtual First Impressions

    Bergren, Martha Dewey

    2005-01-01

    Frequently, a nurse's first and only contact with a graduate school, legislator, public health official, professional organization, or school nursing colleague is made through e-mail. The format, the content, and the appearance of the e-mail create a virtual first impression. Nurses can manage their image and the image of the profession by…

  6. Electronic Identities: The Strategic Use of Email for Impression Management.

    Kersten, Larry; Phillips, Stephen R.

    Traditionally, e-mail (electronic mail) has been seen as an efficient communications medium for the transmission of simple, routine, unambiguous messages. More recent research has argued that the simple, efficient view of e-mail is incomplete. Future research should be extended into the strategic and symbolic functions of email, such as the use of…

  7. Maximiser la communication famille-ecole: Quand les TIC font mouche = Maximizing Family-School Communication: When ICT Hits the Mark.

    Karsenti, Thierry; Garnier, Yves Daniel

    2002-01-01

    A pilot project that created a school Web site and e-mail service demonstrated the importance of information technology to Montreal (Quebec) 4th-grade students and their teachers. E-mail allowed teachers to have more efficient and less time-consuming communications with parents and allowed parents to more closely engage in their children's school…

  8. Teaching with Technology: Use of Telecommunications Technology by Postsecondary Instructional Faculty and Staff in Fall 1998.

    Warburton, Edward C.; Chen, Xianglei; Bradburn, Ellen M.

    2002-01-01

    Explored the use of e-mail by instructional faculty and staff, the quality of computing resources at their institutions, and the effects of technology use on workload. In fall 1998 Internet access was common for postsecondary faculty and staff, and 69% of full-time faculty and 46% of part-time faculty used e-mail to communicate with students in…

  9. Configurazione di filtri nei pi? diffusi client di Posta Elettronica

    Buzzi, Marina; Succurro, Giuseppe

    2002-01-01

    This document describes how to set up filtering rules in the most popular email client (such as Qualcomm Eudora, Netscape Messenger, Microsoft Outlook and Outlook Express, in Windows, Mac, and Linux Operating systems) in order to reduce problems provoked by Internet spam (i.e. Unsolicited Bulk E-mail or Unsolicited Commercial E-mail).

  10. Hodnocení jakosti vybraného software

    Krejčí, Jiří

    2014-01-01

    The aim of this bachelor thesis is to assess data security and evaluate the security of e- mails for selected e-mail agents. I used the norms created by SQuaRE project, named ISO/IEC 250xx. There were estimated three products, two from open source scope Mozilla Thunderbird, KDE KMail and Microsoft Outlook.

  11. Virtual Mobility in Reality: A Study of the Use of ICT in Finnish Leonardo da Vinci Mobility Projects.

    Valjus, Sonja

    An e-mail survey and interviews collected data on use of information and communications technology (ICT) in Finnish Leonardo da Vinci mobility projects from 2000-02. Findings showed that the most common ICT tools used were e-mail, digital tools, and the World Wide Web; ICT was used during all project phases; the most common problems concerned…

  12. Digital kommunikation med den offentlige sektor

    Berger, Jesper; Andersen, Kim Normann

    2013-01-01

    i front med at besvare e-mails, mens hver fjerde e-mail til staten ikke blev besvaret. Langt værre ser det dog ud med digital post. Kun godt halvdelen af kommunerne svarer på digital post. Ingen af ministerierne svarer på digital post. Alle regionerne svarer på digital post. Efter en dag havde 80...

  13. The h-Index in the Russian Science Citation Index

    Viktor Bolotov; Natela Kvelidze-Kuznetsova; Vladimir Laptev; Svetlana Morozova

    2014-01-01

    Viktor Bolotov - Professor, Academician of Russian Academy of Education, Academic Supervisor at the Russian Training Center, Institute of Management of Russian Academy of Education. E-mail: Kvelidze-Kuznetsova - Director of the Library at Herzen State Pedagogical University of Russia. Address: Naberezhnaya Reki Moyki, 48, St.Petersburg, 191186. E-mail: Laptev - Professor, Academician of Russian Academy of Education, Herzen State Pedagogi...

  14. 76 FR 22668 - Shasta-Trinity National Forest; California; I-5 Corridor Fuels Reduction Project

    2011-04-22

    ..., Project Manager, 1072 Casitas Pass Road, 288, Carpinteria, CA 93013. Comments may also be sent via e-mail... Pass Road, 288, Carpinteria, CA 93013. Phone: (805) 220-6388; e-mail address: mkadota@fs.fed.us... results in healthy forest stands, maintenance of wildlife habitat, good scenic quality and public...

  15. Design and development of mobile Email system based on brew and IMAP4

    In order to achieve IMAP4 support agreement in the mobile e-mail client application on the smart phone, using the Qualcomm introduced wireless devices designed for the BREW platform. Research on the BREW platform mobile and IMAP4 protocol, design and implement the 3G technology standard smart phone e-mail client based on the BREW platform. (authors)

  16. 32 CFR 806b.29 - Sending personal information over electronic mail.

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Sending personal information over electronic... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to ensure it is adequately safeguarded. Some information may be so sensitive and personal that e-mail...

  17. Cesarean Section: The Operation

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... healthy babies. If something goes wrong, we offer information and comfort to families. We research the reasons ...

  18. Healthy Choices: What to Eat during Pregnancy

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... healthy babies. If something goes wrong, we offer information and comfort to families. We research the reasons ...

  19. Folic Acid

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... healthy babies. If something goes wrong, we offer information and comfort to families. We research the reasons ...

  20. Exercise during Pregnancy

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... healthy babies. If something goes wrong, we offer information and comfort to families. We research the reasons ...

  1. Gestational Hypertension and Preeclampsia

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... healthy babies. If something goes wrong, we offer information and comfort to families. We research the reasons ...

  2. Gestational Diabetes

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... healthy babies. If something goes wrong, we offer information and comfort to families. We research the reasons ...

  3. Time to Eat! What Will You Feed Your Baby?

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... know GO "My 9 Months" app Get free information about healthy pregnancies on your iPad. GO donate ...

  4. At Least 39 Weeks

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... healthy babies. If something goes wrong, we offer information and comfort to families. We research the reasons ...

  5. Labor and Delivery: At the Hospital

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... healthy babies. If something goes wrong, we offer information and comfort to families. We research the reasons ...

  6. Alcohol and Pregnancy

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... healthy babies. If something goes wrong, we offer information and comfort to families. We research the reasons ...

  7. Cesarean Section: Recovering After Surgery

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... healthy babies. If something goes wrong, we offer information and comfort to families. We research the reasons ...

  8. Postpartum Blues

    Full Text Available ... Please enter a valid e-mail address. Your information: Your recipient's information: Your personal message: Thank you! Your e-mail ... healthy babies. If something goes wrong, we offer information and comfort to families. We research the reasons ...

  9. 76 FR 27895 - Safety Zone; 2011 Memorial Day Tribute Fireworks, Lake Charlevoix, Boyne City, MI

    2011-05-13

    ... rule, call or e-mail MST1 Aaron Woof, U.S. Coast Guard, Sector Sault Sainte Marie, telephone 906-253-2423, e-mail at Aaron.M.Woof@uscg.mil . If you have questions on viewing the docket, call Renee...

  10. 75 FR 14431 - Office of Postsecondary Education Overview Information; Fund for the Improvement of Postsecondary...

    2010-03-25

    ... FR 65764). For FY 2010 this priority is an absolute priority. Under 34 CFR 75.105(c)(3) we consider...-2389159, E-mail: aurum_fr@mail.ru . (4) Saint-Petersburg State University of Information Technologies...; POC: Tsurkan Alexey, Director of Institute, Ph. +7-383- 3302334, E-mail: gelberiets@ngs.ru . (9)...

  11. Webtool: WeTransfer

    Felix Studencki

    2011-12-01

    Full Text Available Eine einfache Möglichkeit, große Datenmengen per E-Mail zu verschicken. Jeder kennt sie aus dem täglichen Schulalltag, E-Mails die neben dem Text auch kleinere Dateien beinhalten. Diese einfache Art Daten zu versenden wird gern und oft verwendet da man sehr viele Menschen per E-Mail erreichen kann und kein Programm benötigt um die Dateien zu empfangen. Bis jetzt konnte man jedoch nur relativ kleine Dateien per E-Mail versenden. Medienproduktionen egal ob Audio oder Video sprengen gern schon einmal die Versende-Limits vieler E-Mail Anbieter. Es blieb einem nichts über als auf klassische Medien wie CDs oder DVDs zurückgreifen um seine Daten zu verbreiten. Als Alternative dazu bietet die Internetseite WeTranfer die Möglichkeit unkompliziert, kostenlos und ohne Anmeldung Dateien bis zu 2 GByte zu versenden.

  12. PERSPECTIVES ON FUTURE EFL COMMUNICATIVE ENVIRONMENTS BY E-MAlL AND INTERNET IN CHINESE UNIVERSITIES

    2000-01-01

    E-mail-assisted language teaching is at the fore-front of the advances in educational tools in EFLteaching.But is it possible to create EFL communica-tive environment by E-mail and Internet in Chineseuniversities?Can we totally adopt CA by E-mail andInternet in Western countries into Chinese universi-ties?It is evident that Completely transferring it toChinese educational context is irrational and will ulti-mately fail.Thus,success depends on reconciling E-mail-assisted EFL teaching with traditional Chineseapproaches.This paper is designed to make perspec-tives on this reconciliation,and presents some disad-vantages of using E-mail and Internet in teaching.

  13. Radiation protection in Qatar

    Full text: The State of Qatar has become a member State of IAEA since 1974. Later the Department of Industrial Development (DID) beam the focal point and the competent authority regarding all aspects of the peaceful application of Nuclear Technology. In July, 2000 the Supreme Council was established and charged with all matters related to environmental protection. The Supreme Council joined the IAEA Projects on upgrading protection infrastructure in West Asia region. A preliminary research was initiated to discover where radiation sources are being used, and the legal framework, if any, to regulate their use. The research indicated that radiation sources were being used in the industrial practices (well logging, industrial radiography and nuclear gauges) and in medical practices (mainly diagnostic radiology). The research also indicated that there was virtually no legal framework to regulate them. In less than five years, the State of Qatar was able to issue the radiation protection law, three sets of regulations, namely: Radiation Protection Regulations, Radioactive Waste Management Regulations and the Safe Transport of Radioactive Materials Regulations. In addition, several specific regulation work, dose limits and radiation protection officers were issued. A radiation Protection Department, comprising three sections was established. We are providing individual exposure monitoring for most of the radiation workers in the public sector and some in the private sector. We have set up a proper licensing and inspections procedures, where our inspectors are enforcing the law. More recently, we established an early warning network for nuclear of radiological emergencies, consisting of 6 transplantable stations, five mobile stations and two navigating stations. This year, the network was augmented with five fixed station and an advanced early warning centre, which provides early warning via multiple means (MMS, Fax, E-mail and audio alarms). Last year we signed a nuclear

  14. Public communication during events and threats involving radioactive releases

    One of the important goals in working with a regulatory authority responsible for acting in emergency situations is the maintenance of public confidence. The countermeasures to be taken in the event of an accident, terrorism or a threat depend on this confidence. The damage caused by radioactive sources used as a weapon could be less severe than the perception of the danger among the public, not only for those persons close to a release but for those distant from the scene of the release. Public authorities in all countries bear the task of protecting members of the public from all kinds of danger; sometimes this is an easy task, but at other times it is difficult and the authorities are met with distrust. Emergency preparedness in the event of a radioactive release always raises the question of communication and of channels of communication. Communication is the most important tool in the protection operations of the authorities to save life and protect health. The Nuclear Power Inspectorate and the Radiation Protection Agency in Sweden have established actions to be taken in the event of an emergency. Much is placed on communicating with co-operating authorities and neighbouring countries. In Sweden and the surrounding countries all national authorities involved in nuclear emergency preparedness have officers on duty who are available 24 hours a day on mobile phones or pagers, and in most cases information officers are also on duty. Emergency response and communication can thus be started immediately. Rumours of accidents in other countries are normally handled at this level, even if international contact has been established. The authorities responsible for radiation protection in the Nordic countries have established an e-mail and fax network through which information can be exchanged very quickly. In conclusion, speed, accuracy and co-ordinated messages are the essential elements of successful crisis management. Most importantly, though, in the Nordic

  15. Addressing Tobacco in Managed Care: Results of the 2002 Survey

    Carol McPhillips-Tangum

    2004-10-01

    Full Text Available Introduction In the United States, tobacco use is the leading preventable cause of death and disease. The health and cost consequences of tobacco dependence have made treatment and prevention of tobacco use a key priority among multiple stakeholders, including health plans, insurers, providers, employers, and policymakers. In 2002, the third survey of tobacco control practices and policies in health plans was conducted by America’s Health Insurance Plans’ technical assistance office as part of the Addressing Tobacco in Managed Care (ATMC program. Methods The ATMC survey was conducted in the spring of 2002 via mail, e-mail, and fax. A 19-item survey instrument was developed and pilot-tested. Of the 19 items, 12 were the same as in previous years, four were modified to collect more detailed data on areas of key interest, and three were added to gain information about strategies to promote smoking cessation. The sample for the survey was drawn from the 687 plans listed in the national directory of member and nonmember health plans in America's Health Insurance Plans. Results Of the 246 plans in the sample, 152 plans (62% representing more than 43.5 million health maintenance organization members completed the survey. Results show that health plans are using evidence-based programs and clinical guidelines to address tobacco use. Compared to ATMC survey data collected in 1997 and 2000, the 2002 ATMC survey results indicate that more health plans are providing full coverage for first-line pharmacotherapies and telephone counseling for smoking cessation. Plans have also shown improvement in their ability to identify at least some members who smoke. Similarly, a greater percentage of plans are employing strategies to address smoking cessation during the postpartum period to prevent smoking relapse and during pediatric visits to reduce or eliminate children’s exposure to environmental tobacco smoke. Conclusion The results of the 2002 ATMC survey

  16. Feasibility of prehospital teleconsultation in acute stroke--a pilot study in clinical routine.

    Sebastian Bergrath

    Full Text Available BACKGROUND: Inter-hospital teleconsultation improves stroke care. To transfer this concept into the emergency medical service (EMS, the feasibility and effects of prehospital teleconsultation were investigated. METHODOLOGY/PRINCIPAL FINDINGS: Teleconsultation enabling audio communication, real-time video streaming, vital data and still picture transmission was conducted between an ambulance and a teleconsultation center. Pre-notification of the hospital was carried out with a 14-item stroke history checklist via e-mail-to-fax. Beside technical assessments possible influences on prehospital and initial in-hospital time intervals, prehospital diagnostic accuracy and the transfer of stroke specific data were investigated by comparing telemedically assisted prehospital care (telemedicine group with local regular EMS care (control group. All prehospital stroke patients over a 5-month period were included during weekdays (7.30 a.m.-4.00 p.m.. In 3 of 18 missions partial dropouts of the system occurred; neurological co-evaluation via video transmission was conducted in 12 cases. The stroke checklist was transmitted in 14 cases (78%. Telemedicine group (n = 18 vs. control group (n = 47: Prehospital time intervals were comparable, but in both groups the door to brain imaging times were longer than recommended (median 59.5 vs. 57.5 min, p = 0.6447. The prehospital stroke diagnosis was confirmed in 61% vs. 67%, p = 0.8451. Medians of 14 (IQR 9 vs. 5 (IQR 2 stroke specific items were transferred in written form to the in-hospital setting, p<0.0001. In 3 of 10 vs. 5 of 27 patients with cerebral ischemia thrombolytics were administered, p = 0.655. CONCLUSIONS: Teleconsultation was feasible but technical performance and reliability have to be improved. The approach led to better stroke specific information; however, a superiority over regular EMS care was not found and in-hospital time intervals were unacceptably long in both groups. The

  17. Cavalry Greetings: The Geography of Advance Fee Fraud

    Boklund, Erik Jòhann

    2015-01-01

    The Advance Fee Fraud e-mail scam is a form of fraud that has increasingly become a problem since the turn if the Millennium. Evolved from an old confidence trick, ‘The Spanish Prisoner’, Advance Fee Fraud is commonly perceived as phenomenon mainly of West Africa, and particularly Nigerian, origin, because of a huge number of fraudulent e-mails sent from this region to the rest of the world. The thesis examines the geography of Advance Free Fraud through tracing IP addresses of e-mails rec...

  18. Business Information Exchange System with Security, Privacy, and Anonymity

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  19. Supervised Learning Approach for Spam Classification Analysis using Data Mining Tools

    R.Deepa Lakshmi; N.Radha

    2010-01-01

    E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing amount of electronic business and financial transactions directly contribute to the increase in e-mail-based threats. Email spam is one of the major problems of the today’s Internet, bringing financial damage to companies and annoying individual users. Among the approaches de...

  20. SPAM CLASSIFICATION BASED ON SUPERVISED LEARNING USING MACHINE LEARNING TECHNIQUES

    T. Hamsapriya; D. Karthika Renuka; M. Raja Chakkaravarthi

    2011-01-01

    E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing amount of electronic business and financial transactions directly contribute to the increase in e-mail-based threats. Email spam is one of the major problems of the today’s Internet, bringing financial damage to companies and annoying individual users. Spam emails are invadin...