WorldWideScience

Sample records for users comparative analysis

  1. Institutional Repositories: Investigating User Groups and Comparative Evaluation Using Link Analysis

    Wells, Paul

    2009-01-01

    The aim of this investigation was to look at user groups of institutional repositories. Past research on repository users has focused on authors and depositors at the expense of other users, and little is known about what types of user groups are associated with institutional repositories. This investigation used the research techniques of link analysis and content analysis to investigate links to institutional repository websites and determine what types of user groups are using repositories...

  2. Bias in Observational Studies of Prevalent Users: Lessons for Comparative Effectiveness Research From a Meta-Analysis of Statins

    Danaei, Goodarz; Tavakkoli, Mohammad; Hernán, Miguel A.

    2012-01-01

    Randomized clinical trials (RCTs) are usually the preferred strategy with which to generate evidence of comparative effectiveness, but conducting an RCT is not always feasible. Though observational studies and RCTs often provide comparable estimates, the questioning of observational analyses has recently intensified because of randomized-observational discrepancies regarding the effect of postmenopausal hormone replacement therapy on coronary heart disease. Reanalyses of observational data that excluded prevalent users of hormone replacement therapy led to attenuated discrepancies, which begs the question of whether exclusion of prevalent users should be generally recommended. In the current study, the authors evaluated the effect of excluding prevalent users of statins in a meta-analysis of observational studies of persons with cardiovascular disease. The pooled, multivariate-adjusted mortality hazard ratio for statin use was 0.77 (95% confidence interval (CI): 0.65, 0.91) in 4 studies that compared incident users with nonusers, 0.70 (95% CI: 0.64, 0.78) in 13 studies that compared a combination of prevalent and incident users with nonusers, and 0.54 (95% CI: 0.45, 0.66) in 13 studies that compared prevalent users with nonusers. The corresponding hazard ratio from 18 RCTs was 0.84 (95% CI: 0.77, 0.91). It appears that the greater the proportion of prevalent statin users in observational studies, the larger the discrepancy between observational and randomized estimates. PMID:22223710

  3. A comparative analysis of user preference-based and existing knowledge management systems attributes in the aerospace industry

    Varghese, Nishad G.

    Knowledge management (KM) exists in various forms throughout organizations. Process documentation, training courses, and experience sharing are examples of KM activities performed daily. The goal of KM systems (KMS) is to provide a tool set which serves to standardize the creation, sharing, and acquisition of business critical information. Existing literature provides numerous examples of targeted evaluations of KMS, focusing on specific system attributes. This research serves to bridge the targeted evaluations with an industry-specific, holistic approach. The user preferences of aerospace employees in engineering and engineering-related fields were compared to profiles of existing aerospace KMS based on three attribute categories: technical features, system administration, and user experience. The results indicated there is a statistically significant difference between aerospace user preferences and existing profiles in the user experience attribute category, but no statistically significant difference in the technical features and system administration attribute categories. Additional analysis indicated in-house developed systems exhibit higher technical features and user experience ratings than commercial-off-the-self (COTS) systems.

  4. Non-Academic Service Quality: Comparative Analysis of Students and Faculty as Users

    Sharif, Khurram; Kassim, Norizan Mohd

    2012-01-01

    The research focus was a non-academic service quality assessment within higher education. In particular, non-academic service quality perceptions of faculty and students were evaluated using a service profit chain. This enabled a comparison which helped understanding of non-academic service quality orientation from a key users' perspective. Data…

  5. Comparing Methods for Involving Users in Ideation

    Nicolajsen, Hanne Westh; Scupola, Ada; Sørensen, Flemming

    2015-01-01

    In this paper we discuss how users may be involved in the ideation phase of innovation. The study compares the use of a blog and three future workshops (students, employees and a mix of the two) in a library. Our study shows that the blog is efficient in giving the users voice whereas the mixed...... workshop method (involving users and employees) is especially good at qualifying and further developing ideas. The findings suggest that methods for involving users in ideation should be carefully selected and combined to achieve optimum benefits and avoid potential disadvantages....

  6. Tree, funny, to_read, google: What are Tags Supposed to Achieve? A Comparative Analysis of User Keywords for Different Digital Resource Types

    Heckner, Markus; Neubauer, Tanja; Wolff, Christian

    2008-01-01

    Social tagging systems have become increasingly popular over the past years. Users' tagging practices have been little studied and understood so far. However, understanding tagging behaviour can contribute towards a thorough understanding of the tagging phenomenon from multiple perspectives. In the present paper, results of a comparative analysis of tag characteristics on the tagging platforms connotea.org (scientific articles), del.icio.us (bookmarks), flickr.com (photos), and youtube.com (v...

  7. Bias in Observational Studies of Prevalent Users: Lessons for Comparative Effectiveness Research From a Meta-Analysis of Statins

    Danaei, Goodarz; Tavakkoli, Mohammad; Hernán, Miguel A.

    2012-01-01

    Randomized clinical trials (RCTs) are usually the preferred strategy with which to generate evidence of comparative effectiveness, but conducting an RCT is not always feasible. Though observational studies and RCTs often provide comparable estimates, the questioning of observational analyses has recently intensified because of randomized-observational discrepancies regarding the effect of postmenopausal hormone replacement therapy on coronary heart disease. Reanalyses of observational data th...

  8. Comparative cytomorphometric analysis of oral mucosal cells in normal, tobacco users, oral leukoplakia and oral squamous cell carcinoma

    Mahadoon Nivia

    2015-01-01

    Conclusion: The cytomorphometric changes observed in samples from oral SCC and oral leukoplakia were consistent with the current diagnostic features. Hence, the semi-automated cytomorphometric analysis of oral mucosal cells can be used as an objective adjunct diagnostic tool in the diagnosis of these lesions.

  9. Trajectory analysis and optimization system (TAOS) user`s manual

    Salguero, D.E.

    1995-12-01

    The Trajectory Analysis and Optimization System (TAOS) is software that simulates point--mass trajectories for multiple vehicles. It expands upon the capabilities of the Trajectory Simulation and Analysis program (TAP) developed previously at Sandia National Laboratories. TAOS is designed to be a comprehensive analysis tool capable of analyzing nearly any type of three degree-of-freedom, point-mass trajectory. Trajectories are broken into segments, and within each segment, guidance rules provided by the user control how the trajectory is computed. Parametric optimization provides a powerful method for satisfying mission-planning constraints. Althrough TAOS is not interactive, its input and output files have been designed for ease of use. When compared to TAP, the capability to analyze trajectories for more than one vehicle is the primary enhancement, although numerous other small improvements have been made. This report documents the methods used in TAOS as well as the input and output file formats.

  10. Benefit beliefs about protein supplements: A comparative study of users and non-users.

    Hartmann, Christina; Siegrist, Michael

    2016-08-01

    The consumption of protein supplements among leisure time exercisers is growing. The present study aims to identify factors that motivate protein supplement consumption by comparing users' and non-users' underlying benefit beliefs about protein supplement. The study is based on an online survey of 813 Swiss adults (376 users of protein supplements and 437 non-users). Participants answered questions related to their benefit beliefs regarding protein supplement, their protein supplements consumption frequency, their activity level (GPAQ), and their reasons for taking protein supplement. In women, the most commonly cited reasons were to increase muscles (57.3%) and to regulate their weight (48.6%); and in men to increase muscles (83.7%) and to promote regeneration (53.7%). Furthermore, a principal component analysis revealed four benefit belief factors: (a) restore nutrients/avoid weakness; (b) fitness promotion; (c) health/well-being; (d) muscle modulation/competitive performance. The analysis showed that both users and non-users predominantly perceive protein supplements consumption as a strategy to modulate muscle mass, while beliefs in a health and well-being promoting effect was more prevalent among users (M = 3.2, SD = 1.3) than non-users (M = 2.7, SD = 1.3) (p < 0.001). Moreover, health and wellbeing-related beliefs were associated with an increased likelihood of a higher protein supplements intake frequency (OR = 1.5, 95% CI: 1.1-1.9), while physical activity level was not associated with protein supplements intake frequency. In addition, a negative correlation between physical activity level and beliefs in a fitness-promoting effect of protein supplements (r = -0.14, p < 0.001) was observed, indicating that for a subgroup, protein supplements might license lower activity levels. Despite a lack of scientific evidence, consumers of varying activity levels consume protein supplements and believe in its' various positive features. Users should be

  11. MAUS: MICE Analysis User Software

    CERN. Geneva

    2012-01-01

    The Muon Ionization Cooling Experiment (MICE) has developed the MICE Analysis User Software (MAUS) to simulate and analyse experimental data. It serves as the primary codebase for the experiment, providing for online data quality checks and offline batch simulation and reconstruction. The code is structured in a Map-Reduce framework to allow parallelization whether on a personal machine or in the control room. Various software engineering practices from industry are also used to ensure correct and maintainable physics code, which include unit, functional and integration tests, continuous integration and load testing, code reviews, and distributed version control systems. Lastly, there are various small design decisions like using JSON as the data structure, using SWIG to allow developers to write components in either Python or C++, or using the SCons python-based build system that may be of interest to other experiments.

  12. Comparative Analysis of Allocative Efficiency in Input use by Credit and Non Credit User Small Scale Poulty Farmers in Delta State, Nigeria

    P. C. Ike; I. Udeh

    2011-01-01

    This study examined the relative allocative efficiencies in input use by credit user and non credit user small scale poultry farmers in Delta State, Nigeria. Relative elasticities of production and returns to scale of the defined poultry farmers were examined. Primary data were collected from a random sample of 108 small scale poultry farmers consisting of 54 credit users and 54 non credit users. A stochastic frontier production function model was used to analyse the data. Results of the find...

  13. Comparative Analysis of Allocative Efficiency in Input use by Credit and Non Credit User Small Scale Poulty Farmers in Delta State, Nigeria

    P.C. Ike

    2011-11-01

    Full Text Available This study examined the relative allocative efficiencies in input use by credit user and non credit user small scale poultry farmers in Delta State, Nigeria. Relative elasticities of production and returns to scale of the defined poultry farmers were examined. Primary data were collected from a random sample of 108 small scale poultry farmers consisting of 54 credit users and 54 non credit users. A stochastic frontier production function model was used to analyse the data. Results of the findings indicate that none of the poultry farmer groups allocated any production input optimally. All the variables entered in the model were significant for credit and non credit users except drugs and veterinary services which was not significant for non credit user poultry farmers. On the whole, the credit user poultry farmers over utilized (Kij1 feed input as well as drugs and veterinary services. The non credit user farmers over utilized (Kij1 feed input. It is therefore the recommendation of this study that economic policies and programmes such as the Delta state microcredit programme should be strengthened so as to improve access to credit and enhance efficiency in the use of resources by small scale poultry farmers.

  14. Relative injury severity among vulnerable non-motorised road users: comparative analysis of injury arising from bicycle-motor vehicle and bicycle-pedestrian collisions.

    Chong, Shanley; Poulos, Roslyn; Olivier, Jake; Watson, Wendy L; Grzebieta, Raphael

    2010-01-01

    With the expansion of bicycle usage and limited funding and/or space for segregated pedestrian and bicycle paths, there is a need for traffic, road design and local government engineers to decide if it is more appropriate for space to be shared between either cyclists and pedestrians, or between cars and cyclists, and what restrictions need to be applied in such circumstances. To provide knowledge to aid engineers and policy makers in making these decisions, this study explored death and morbidity data for the state of New South Wales, Australia to examine rates and severity of injury arising from collisions between pedestrians and cyclists, and between cyclists and motor vehicles (MVs). An analysis of the severity of hospitalised injuries was conducted using International Classification of Diseases, Version 10, Australian Modification (ICD-10-AM) diagnosis-based Injury Severity Score (ICISS) and the Disability Adjusted Life Year (DALY) was used to measure burden of injury arising from collisions resulting in death or hospitalisation. The greatest burden of injury in NSW, for the studied collision mechanisms, is for cyclists who are injured in collisions with motor vehicles. Collisions between cyclists and pedestrians also result in significant injuries. For all collision mechanisms, the odds of serious injury on admission are greater for the elderly than for those in other age groups. The significant burden of injury arising from collisions of cyclists and MVs needs to be addressed. However in the absence of appropriate controls, increasing the opportunity for conflict between cyclists and pedestrians (through an increase in shared spaces for these users) may shift the burden of injury from cyclists to pedestrians, in particular, older pedestrians. PMID:19887170

  15. User analysis of LHCb data with Ganga

    GANGA (http://cern.ch/ganga) is a job-management tool that offers a simple, efficient and consistent user analysis tool in a variety of heterogeneous environments: from local clusters to global Grid systems. Experiment specific plug-ins allow GANGA to be customised for each experiment. For LHCb users GANGA is the officially supported and advertised tool for job submission to the Grid. The LHCb specific plug-ins allow support for end-to-end analysis helping the user to perform his complete analysis with the help of GANGA. This starts with the support for data selection, where a user can select data sets from the LHCb Bookkeeping system. Next comes the set up for large analysis jobs: with tailored plug-ins for the LHCb core software, jobs can be managed by the splitting of these analysis jobs with the subsequent merging of the resulting files. Furthermore, GANGA offers support for Toy Monte-Carlos to help the user tune their analysis. In addition to describing the GANGA architecture, typical usage patterns within LHCb and experience with the updated LHCb DIRAC workload management system are presented.

  16. ForAVis : explorative user forum analysis

    Wanner, Franz; Ramm, Thomas; Keim, Daniel

    2011-01-01

    User generated textual content on the internet has become increasingly valueable during the past few years. Forums, blogs, twitter and other social media websites are accessible for a huge amount of people all over the world. Hence, methods and tools are needed to handle this vast bulk of textual data. In this paper we present an explorative forum analysis system helping various stakeholders to cope with the task analyzing user generated content in online forums. The used mobile communication...

  17. Language workbench user interfaces for data analysis

    Victoria M. Benson

    2015-02-01

    Full Text Available Biological data analysis is frequently performed with command line software. While this practice provides considerable flexibility for computationally savy individuals, such as investigators trained in bioinformatics, this also creates a barrier to the widespread use of data analysis software by investigators trained as biologists and/or clinicians. Workflow systems such as Galaxy and Taverna have been developed to try and provide generic user interfaces that can wrap command line analysis software. These solutions are useful for problems that can be solved with workflows, and that do not require specialized user interfaces. However, some types of analyses can benefit from custom user interfaces. For instance, developing biomarker models from high-throughput data is a type of analysis that can be expressed more succinctly with specialized user interfaces. Here, we show how Language Workbench (LW technology can be used to model the biomarker development and validation process. We developed a language that models the concepts of Dataset, Endpoint, Feature Selection Method and Classifier. These high-level language concepts map directly to abstractions that analysts who develop biomarker models are familiar with. We found that user interfaces developed in the Meta-Programming System (MPS LW provide convenient means to configure a biomarker development project, to train models and view the validation statistics. We discuss several advantages of developing user interfaces for data analysis with a LW, including increased interface consistency, portability and extension by language composition. The language developed during this experiment is distributed as an MPS plugin (available at http://campagnelab.org/software/bdval-for-mps/.

  18. Analysis of the 2011 CERN Document Server User Satisfaction Survey

    Le Meur, J-Y

    2012-01-01

    This document analyses the results of the CDS User Satisfaction Survey that ran during Autumn 2011. It shows the feedback received relative to the Search engine, the Submission procedures and the Collaborative tools. It then describes the feedback received relative to the content of the CERN Document Server and general user impressions. The feedback is compared with some key statistics that were automatically extracted from the CDS user activity logs in 2011. A selection of the most useful free text comments that were made by the respondents of the survey is also listed. In the last part, an action list derived from the combined analysis of the survey, the statistics and the comments is being drafted. 150 answers have been received in total (some, with sections not completed). 2/3rd of these answers came from users working at CERN.

  19. CONPAS 1.0 (CONtainment Performance Analysis System). User's manual

    CONPAS (CONtainment Performance Analysis System) is a verified computer code package to integrate the numerical, graphical, and results-operation aspects of Level 2 probabilistic safety assessments (PSA) for nuclear power plants automatically under a PC window environment. Compared with the existing DOS-based computer codes for Level 2 PSA, the most important merit of the window-based computer code is that user can easily describe and quantify the accident progression models, and manipulate the resultant outputs in a variety of ways. As a main logic for accident progression analysis, CONPAS employs a concept of the small containment phenomenological event tree (CPET) helpful to trace out visually individual accident progressions and of the large supporting event tree (LSET) for its detailed quantification. For the integrated analysis of Level 2 PSA, the code utilizes four distinct, but closely related modules; (1) ET Editor for construction of several event tree models describing the accident progressions, (2) Computer for quantification of the constructed event trees and graphical display of the resultant outputs, (3) Text Editor for preparation of input decks for quanification and utilization of calculational results, and (4) Mechanistic Code Plotter for utilization of results obtained from severe accident analysis codes. Compared with other existing computer codes for Level 2 PSA, the CONPAS code provides several advanced features: computational aspects including systematic uncertainty analysis, importance analysis, sensitivity analysis and data interpretation, reporting aspects including tabling and graphic as well as user-friend interface. 10 refs. (Author) .new

  20. User controlled analysis of gamma ray spectra

    The program 'ANGES' was designed as a general purpose high-resolution γ ray spectrometry program. It offers all main features as commercial software packages except control of acquisition process. The program is able to perform automatic analysis of spectra but it is announced as 'user controlled' because it supplies all intermediate results and gives the opportunity these results to be analyzed and corrected by the user. ANGES offers: multi document Windows interface; detailed visualization of spectra; nuclide library based on another contribution to CRP; energy and FWHM calibrations calculated by means of orthonormal polynomial fitting; peak processing engine based on a non-linear LSQ method for fitting peaks; peak location engine, based on first derivative method is provided to ease the preparation of a spectrum for processing; two methods for efficiency calibration (an efficiency calibration curve and reference table); peak identification and activity calculation procedure; a number of corrections (true coincidence summing, background correction, pile up rejection and so on); an option for processing series of similar spectra. The fitting procedure can be applied to the whole spectrum or to a single Region-of-Interest (ROI). The assumed peak shape is pure Gaussian. All peaks in single ROI are assumed to have the same FWHM. The maximum number of peaks in a single ROI is restricted to 25, the maximum ROI length is 512 channels, and the baseline is described with a polynomial of a degree up to 4. As a result of the identification procedure a report file is issued containing spectrum processing results, list of identified and not identified peaks, list of identified nuclides and background nuclides. (author)

  1. Trajectory Based Behavior Analysis for User Verification

    Pao, Hsing-Kuo; Lin, Hong-Yi; Chen, Kuan-Ta; Fadlil, Junaidillah

    Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a general approach for user verification based on user trajectory inputs. The approach is labor-free for users and is likely to avoid the possible copy or simulation from other non-authorized users or even automatic programs like bots. Our study focuses on finding the hidden patterns embedded in the trajectories produced by account users. We employ a Markov chain model with Gaussian distribution in its transitions to describe the behavior in the trajectory. To distinguish between two trajectories, we propose a novel dissimilarity measure combined with a manifold learnt tuning for catching the pairwise relationship. Based on the pairwise relationship, we plug-in any effective classification or clustering methods for the detection of unauthorized access. The method can also be applied for the task of recognition, predicting the trajectory type without pre-defined identity. Given a trajectory input, the results show that the proposed method can accurately verify the user identity, or suggest whom owns the trajectory if the input identity is not provided.

  2. Comparative Analysis of Packet Scheduling Schemes for HSDPA Cellular Networks

    T. Janevski; K. Jakimoski

    2009-01-01

    In this paper we present comparison analysis for packet scheduling algorithms for HSDPA (High Speed Downlink Packet Networks). In particular, we analyze the round robin, max C/I and FCDS packet scheduling algorithms in HSDPA by comparing the average throughput, delay and fairness of the users, changing the number of the users in pedestrian and vehicular environment. The results have showed that the number of the users in a given coverage area is very important when choosing which packet sched...

  3. User Behavior and IM Topology Analysis

    Qiang Yan

    2008-07-01

    Full Text Available The use of Instant Messaging, or IM, has become widely adopted in private and corporate communication. They can provide instant, multi-directed and multi-types of communications which make the message spreading in IM different from those in WWW, Blog and email systems. Groups have great impacts on message spreading in IM. The research demonstrates the power law distribution of groups in MSN with parameter γ ranging from 0.76 to 1.22. Based on an online survey, IM user behavior is analyzed from the aspects of message sending/receiving and contacts maintaining. According to the results, degree distribution of users has a peak value and doesn't present power law character. This may indicate that social networks should be a prospective direction for the research on IM topology.

  4. Characteristics of Bitcoin Users: An Analysis of Google Search Data

    Wilson, Matthew; Yelowitz, Aaron

    2014-01-01

    The anonymity of Bitcoin prevents analysis of its users. We collect Google Trends data to examine determinants of interest in Bitcoin. Based on anecdotal evidence regarding Bitcoin users, we construct proxies for four possible clientele: computer programming enthusiasts, speculative investors, Libertarians, and criminals. Computer programming and illegal activity search terms are positively correlated with Bitcoin interest, while Libertarian and investment terms are not.

  5. CMS Configuration Editor: GUI based application for user analysis job

    We present the user interface and the software architecture of the Configuration Editor for the CMS experiment. The analysis workflow is organized in a modular way integrated within the CMS framework that organizes in a flexible way user analysis code. The Python scripting language is adopted to define the job configuration that drives the analysis workflow. It could be a challenging task for users, especially for newcomers, to develop analysis jobs managing the configuration of many required modules. For this reason a graphical tool has been conceived in order to edit and inspect configuration files. A set of common analysis tools defined in the CMS Physics Analysis Toolkit (PAT) can be steered and configured using the Config Editor. A user-defined analysis workflow can be produced starting from a standard configuration file, applying and configuring PAT tools according to the specific user requirements. CMS users can adopt this tool, the Config Editor, to create their analysis visualizing in real time which are the effects of their actions. They can visualize the structure of their configuration, look at the modules included in the workflow, inspect the dependences existing among the modules and check the data flow. They can visualize at which values parameters are set and change them according to what is required by their analysis task. The integration of common tools in the GUI needed to adopt an object-oriented structure in the Python definition of the PAT tools and the definition of a layer of abstraction from which all PAT tools inherit.

  6. CMS Configuration Editor: GUI based application for user analysis job

    de Cosa, A.

    2011-12-01

    We present the user interface and the software architecture of the Configuration Editor for the CMS experiment. The analysis workflow is organized in a modular way integrated within the CMS framework that organizes in a flexible way user analysis code. The Python scripting language is adopted to define the job configuration that drives the analysis workflow. It could be a challenging task for users, especially for newcomers, to develop analysis jobs managing the configuration of many required modules. For this reason a graphical tool has been conceived in order to edit and inspect configuration files. A set of common analysis tools defined in the CMS Physics Analysis Toolkit (PAT) can be steered and configured using the Config Editor. A user-defined analysis workflow can be produced starting from a standard configuration file, applying and configuring PAT tools according to the specific user requirements. CMS users can adopt this tool, the Config Editor, to create their analysis visualizing in real time which are the effects of their actions. They can visualize the structure of their configuration, look at the modules included in the workflow, inspect the dependences existing among the modules and check the data flow. They can visualize at which values parameters are set and change them according to what is required by their analysis task. The integration of common tools in the GUI needed to adopt an object-oriented structure in the Python definition of the PAT tools and the definition of a layer of abstraction from which all PAT tools inherit.

  7. ORMONTE, Uncertainty Analysis for User-Developed System Models

    1 - Description of program or function: ORMONTE is a generic multivariable uncertainty analysis driver which can be linked to any FORTRAN model supplied by the user. The user tells ORMONTE which variables in his model are uncertain and describes the associated probability distributions. The user also tells ORMONTE which outputs from his model are of interest and for which uncertainty profiles are desired. Given the uncertainties in the inputs, ORMONTE samples the user-defined input distributions and 'drives' or runs the users model enough times such that a probability histogram or profile is constructed for the user-defined outputs of interest. ORMONTE can also perform sequential one-variable-at-a-time sensitivity studies and elasticity analysis. The user-supplied model is not restricted to a shielding model. Any FORTRAN model where uncertain outputs can be represented as functions of uncertain, independent inputs can be used. The ORMONTE package includes a set of Probability Data Analysis (PDA) routines for converting raw probability data into probability distribution format suitable for input to ORMONTE. 2 - Method of solution: ORMONTE uses the Monte Carlo technique to sample user-defined input probability distributions. 3 - Restrictions on the complexity of the problem: None noted

  8. Preliminary analysis of GASIS user needs

    Vidas, E.H.; Hugman, R.H.

    1993-12-31

    The GASIS (Gas Information System) project is a three year effort to develop a personal computer-based (CD-ROM) natural gas database and information system for the United States. GASIS will have two components: a ``Source Directory`` documenting natural gas supply-related databases and information centers and a ``Reservoir Data System`` of information for individual gas reservoirs. The Source Directory will document the location, characteristics, and accessibility of natural gas supply information sources, such as bibliographic databases, engineering and/or geological data compilations, and natural gas information centers. The Data System will be the largest portion of GASIS and will contain geological and engineering data at the reservoir level. The GASIS project will involve the compilation of existing public domain data, excerpts from Dwight`s databases, and the collection of new reservoir data. Data assembly and collection will be prioritized by the User Needs study. A ``User Needs`` assessment for the planned GASIS data system has been underway since September of this year. It is designed to cover all major segments of the gas industry, including major and independent producers, state and federal agencies, pipelines, research organizations, banks, and service companies. The objectives of the evaluation are: To design GASIS to meet the needs of industry and the research community; to determine potential applications for GASIS in order to better design the database; to prioritize data categories and specific data collection activities; to evaluate industry software and data exchange requirements.

  9. Reinforcing user data analysis with Ganga in the LHC era: scalability, monitoring and user-support

    Ganga is a grid job submission and management system widely used in the ATLAS and LHCb experiments and several other communities in the context of the EGEE project. The particle physics communities have entered the LHC operation era which brings new challenges for user data analysis: a strong growth in the number of users and jobs is already noticeable. Current work in the Ganga project is focusing on dealing with these challenges. In recent Ganga releases the support for the pilot job based grid systems Panda and Dirac of the ATLAS and LHCb experiment respectively have been strengthened. A more scalable job repository architecture, which allows efficient storage of many thousands of jobs in XML or several database formats, was recently introduced. A better integration with monitoring systems, including the Dashboard and job execution monitor systems is underway. These will provide comprehensive and easy job monitoring. A simple to use error reporting tool integrated at the Ganga command-line will help to improve user support and debugging user problems. Ganga is a mature, stable and widely-used tool with long-term support from the HEP community. We report on how it is being constantly improved following the user needs for faster and easier distributed data analysis on the grid.

  10. The Radiological Safety Analysis Computer Program (RSAC-5) user's manual

    The Radiological Safety Analysis Computer Program (RSAC-5) calculates the consequences of the release of radionuclides to the atmosphere. Using a personal computer, a user can generate a fission product inventory from either reactor operating history or nuclear criticalities. RSAC-5 models the effects of high-efficiency particulate air filters or other cleanup systems and calculates decay and ingrowth during transport through processes, facilities, and the environment. Doses are calculated through the inhalation, immersion, ground surface, and ingestion pathways. RSAC+, a menu-driven companion program to RSAC-5, assists users in creating and running RSAC-5 input files. This user's manual contains the mathematical models and operating instructions for RSAC-5 and RSAC+. Instructions, screens, and examples are provided to guide the user through the functions provided by RSAC-5 and RSAC+. These programs are designed for users who are familiar with radiological dose assessment methods

  11. KEY analysis system user's guide. Version 2.0

    The KEY analysis system is a software program designed to process digital wave form data from the United States National Seismograph Network. The KEY system performs many data processing and scientific analysis functions. Detailed operating procedures for the KEY analysis system are provided in this User's Guide

  12. A User Requirements Analysis Approach Based on Business Processes

    ZHENG Yue-bin; HAN Wen-xiu

    2001-01-01

    Requirements analysis is the most important phase of information system development.Existing requirements analysis techniques concern little or no about features of different business processes.This paper presents a user requirements analysis approach which focuses business processes on the early stage of requirements analysis. It also gives an example of the using of this approach in the analysis of an enterprise information system.

  13. Uncertainty analysis in integrated assessment: the users' perspective

    Gabbert, S.G.M.; Ittersum, van M.K.; Kroeze, C.; Stalpers, S.I.P.; Ewert, F.; Alkan Olsson, J.

    2010-01-01

    Integrated Assessment (IA) models aim at providing information- and decision-support to complex problems. This paper argues that uncertainty analysis in IA models should be user-driven in order to strengthen science–policy interaction. We suggest an approach to uncertainty analysis that starts with

  14. Advanced space system analysis software. Technical, user, and programmer guide

    Farrell, C. E.; Zimbelman, H. F.

    1981-01-01

    The LASS computer program provides a tool for interactive preliminary and conceptual design of LSS. Eight program modules were developed, including four automated model geometry generators, an associated mass properties module, an appendage synthesizer module, an rf analysis module, and an orbital transfer analysis module. The existing rigid body controls analysis module was modified to permit analysis of effects of solar pressure on orbital performance. A description of each module, user instructions, and programmer information are included.

  15. Reliability of an Automated High-Resolution Manometry Analysis Program across Expert Users, Novice Users, and Speech-Language Pathologists

    Jones, Corinne A.; Hoffman, Matthew R.; Geng, Zhixian; Abdelhalim, Suzan M.; Jiang, Jack J.; McCulloch, Timothy M.

    2014-01-01

    Purpose: The purpose of this study was to investigate inter- and intrarater reliability among expert users, novice users, and speech-language pathologists with a semiautomated high-resolution manometry analysis program. We hypothesized that all users would have high intrarater reliability and high interrater reliability. Method: Three expert…

  16. Dairy Analytics and Nutrient Analysis (DANA) Prototype System User Manual

    Sam Alessi; Dennis Keiser

    2012-10-01

    This document is a user manual for the Dairy Analytics and Nutrient Analysis (DANA) model. DANA provides an analysis of dairy anaerobic digestion technology and allows users to calculate biogas production, co-product valuation, capital costs, expenses, revenue and financial metrics, for user customizable scenarios, dairy and digester types. The model provides results for three anaerobic digester types; Covered Lagoons, Modified Plug Flow, and Complete Mix, and three main energy production technologies; electricity generation, renewable natural gas generation, and compressed natural gas generation. Additional options include different dairy types, bedding types, backend treatment type as well as numerous production, and economic parameters. DANA’s goal is to extend the National Market Value of Anaerobic Digester Products analysis (informa economics, 2012; Innovation Center, 2011) to include a greater and more flexible set of regional digester scenarios and to provide a modular framework for creation of a tool to support farmer and investor needs. Users can set up scenarios from combinations of existing parameters or add new parameters, run the model and view a variety of reports, charts and tables that are automatically produced and delivered over the web interface. DANA is based in the INL’s analysis architecture entitled Generalized Environment for Modeling Systems (GEMS) , which offers extensive collaboration, analysis, and integration opportunities and greatly speeds the ability construct highly scalable web delivered user-oriented decision tools. DANA’s approach uses server-based data processing and web-based user interfaces, rather a client-based spreadsheet approach. This offers a number of benefits over the client-based approach. Server processing and storage can scale up to handle a very large number of scenarios, so that analysis of county, even field level, across the whole U.S., can be performed. Server based databases allow dairy and digester

  17. User-level sentiment analysis incorporating social networks

    Tan, Chenhao; Tang, Jie; Jiang, Long; Zhou, Ming; Li, Ping

    2011-01-01

    We show that information about social relationships can be used to improve user-level sentiment analysis. The main motivation behind our approach is that users that are somehow "connected" may be more likely to hold similar opinions; therefore, relationship information can complement what we can extract about a user's viewpoints from their utterances. Employing Twitter as a source for our experimental data, and working within a semi-supervised framework, we propose models that are induced either from the Twitter follower/followee network or from the network in Twitter formed by users referring to each other using "@" mentions. Our transductive learning results reveal that incorporating social-network information can indeed lead to statistically significant sentiment-classification improvements over the performance of an approach based on Support Vector Machines having access only to textual features.

  18. User`s manual of a support system for human reliability analysis

    Yokobayashi, Masao [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Tamura, Kazuo

    1995-10-01

    Many kinds of human reliability analysis (HRA) methods have been developed. However, users are required to be skillful so as to use them, and also required complicated works such as drawing event tree (ET) and calculation of uncertainty bounds. Moreover, each method is not so complete that only one method of them is not enough to evaluate human reliability. Therefore, a personal computer (PC) based support system for HRA has been developed to execute HRA practically and efficiently. The system consists of two methods, namely, simple method and detailed one. The former uses ASEP that is a simplified THERP-technique, and combined method of OAT and HRA-ET/DeBDA is used for the latter. Users can select a suitable method for their purpose. Human error probability (HEP) data were collected and a database of them was built to use for the support system. This paper describes outline of the HRA methods, support functions and user`s guide of the system. (author).

  19. Residence time distribution software analysis. User's manual

    Radiotracer applications cover a wide range of industrial activities in chemical and metallurgical processes, water treatment, mineral processing, environmental protection and civil engineering. Experiment design, data acquisition, treatment and interpretation are the basic elements of tracer methodology. The application of radiotracers to determine impulse response as RTD as well as the technical conditions for conducting experiments in industry and in the environment create a need for data processing using special software. Important progress has been made during recent years in the preparation of software programs for data treatment and interpretation. The software package developed for industrial process analysis and diagnosis by the stimulus-response methods contains all the methods for data processing for radiotracer experiments

  20. Meta-analysis of molecular imaging of serotonin transporters in ecstasy/polydrug users.

    Roberts, Carl Alexander; Jones, Andrew; Montgomery, Catharine

    2016-04-01

    We conducted a meta-analysis on the available data from studies investigating SERTs in ecstasy users and polydrug using controls. From 7 studies we compared data from 157 ecstasy users and 148 controls across 14 brain regions. The main effect suggested ecstasy/MDMA related SERT reductions (SMD=0.52, 95% CIs [0.40, 0.65]; Z=8.36, pMDMA use. PMID:26855234

  1. Meta-analysis of executive functioning in ecstasy/polydrug users

    Roberts, C A; Jones, A.; Montgomery, C.

    2016-01-01

    Ecstasy/3,4-methylenedioxymethamphetamine (MDMA) use is proposed to cause damage to serotonergic (5-HT) axons in humans. Therefore, users should show deficits in cognitive processes that rely on serotonin-rich, prefrontal areas of the brain. However, there is inconsistency in findings to support this hypothesis. The aim of the current study was to examine deficits in executive functioning in ecstasy users compared with controls using meta-analysis. We identified k = 39 studies, contributing 8...

  2. GRAFLAB 2.3 for UNIX - A MATLAB database, plotting, and analysis tool: User`s guide

    Dunn, W.N.

    1998-03-01

    This report is a user`s manual for GRAFLAB, which is a new database, analysis, and plotting package that has been written entirely in the MATLAB programming language. GRAFLAB is currently used for data reduction, analysis, and archival. GRAFLAB was written to replace GRAFAID, which is a FORTRAN database, analysis, and plotting package that runs on VAX/VMS.

  3. Experiences of Kratom Users: A Qualitative Analysis.

    Swogger, Marc T; Hart, Elaine; Erowid, Fire; Erowid, Earth; Trabold, Nicole; Yee, Kaila; Parkhurst, Kimberly A; Priddy, Brittany M; Walsh, Zach

    2015-01-01

    Kratom (Mitragyna speciosa) is a psychoactive plant that has been used since at least 1836 in folk medicine in Southeast Asian countries. More recently, kratom has become widely available in the West and is used for both recreational and medicinal purposes. There has, however, been little scientific research into the short- and long-term effects of kratom in humans, and much of the information available is anecdotal. To supplement the increasing scientific understanding of kratom's pharmacology and research into its effects in animals, we report the results of a qualitative analysis of first-hand descriptions of human kratom use that were submitted to, and published by, a psychoactive substance information website (Erowid.org). Themes that emerged from these experience reports indicate that kratom may be useful for analgesia, mood elevation, anxiety reduction, and may aid opioid withdrawal management. Negative response themes also emerged, indicating potential problems and unfavorable "side" effects, especially stomach upset and vomiting. Based on our analyses, we present preliminary hypotheses for future examination in controlled, quantitative studies of kratom. PMID:26595229

  4. Nuclear power ecology: comparative analysis

    Ecological effects of different energy sources are compared. Main actions for further nuclear power development - safety increase and waste management, are noted. Reasons of restrained public position to nuclear power and role of social and political factors in it are analyzed. An attempt is undertaken to separate real difficulties of nuclear power from imaginary ones that appear in some mass media. International actions of environment protection are noted. Risk factors at different energy source using are compared. The results of analysis indicate that ecological influence and risk for nuclear power are of minimum

  5. BANK RATING. A COMPARATIVE ANALYSIS

    Batrancea Ioan

    2015-07-01

    Full Text Available Banks in Romania offers its customers a wide range of products but which involves both risk taking. Therefore researchers seek to build rating models to help managers of banks to risk of non-recovery of loans and interest. In the following we highlight rating Raiffeisen Bank, BCR-ERSTE Bank and Transilvania Bank, based on the models CAAMPL and Stickney making a comparative analysis of the two rating models.

  6. Comparing user experiences in using Twiki & Mediawiki to facilitate collaborative learning

    Liang, M.; Siu, F; Zhou, A.; Chu, S.

    2009-01-01

    This research seeks to determine the perceived effectiveness of using TWiki and MediaWiki in collaborative work and knowledge management; and to compare the use of TWiki and MediaWiki in terms of user experiences in the master’s level of study at the University of Hong Kong. Through a multiple case study approach, the study adopted a mixed methods research design which used both quantitative and qualitative methods to analyze findings from specific user groups in two study programmes. In the ...

  7. Multiple-user data acquisition and analysis system

    Manzella, V.; Chrien, R.E.; Gill, R.L.; Liou, H.I.; Stelts, M.L.

    1981-01-01

    The nuclear physics program at the Brookhaven National Laboratory High Flux Beam Reactor (HFBR) employs a pair of PDP-11 computers for the dual functions of data acquisition and analysis. The data acquisition is accomplished through CAMAC and features a microprogrammed branch driver to accommodate various experimental inputs. The acquisition computer performs the functions of multi-channel analyzers, multiscaling and time-sequenced multichannel analyzers and gamma-ray coincidence analyzers. The data analysis computer is available for rapid processing of data tapes written by the acquisition computer. The ability to accommodate many users is facilitated by separating the data acquisition and analysis functions, and allowing each user to tailor the analysis to the specific requirements of his own experiment. The system is to be upgraded soon by the introduction of a dual port disk to allow a data base to be available to each computer.

  8. Multiple-user data acquisition and analysis system

    The nuclear physics program at the Brookhaven National Laboratory High Flux Beam Reactor (HFBR) employs a pair of PDP-11 computers for the dual functions of data acquisition and analysis. The data acquisition is accomplished through CAMAC and features a microprogrammed branch driver to accommodate various experimental inputs. The acquisition computer performs the functions of multi-channel analyzers, multiscaling and time-sequenced multichannel analyzers and gamma-ray coincidence analyzers. The data analysis computer is available for rapid processing of data tapes written by the acquisition computer. The ability to accommodate many users is facilitated by separating the data acquisition and analysis functions, and allowing each user to tailor the analysis to the specific requirements of his own experiment. The system is to be upgraded soon by the introduction of a dual port disk to allow a data base to be available to each computer

  9. User's operating procedures. Volume 2: Scout project financial analysis program

    Harris, C. G.; Haris, D. K.

    1985-01-01

    A review is presented of the user's operating procedures for the Scout Project Automatic Data system, called SPADS. SPADS is the result of the past seven years of software development on a Prime mini-computer located at the Scout Project Office, NASA Langley Research Center, Hampton, Virginia. SPADS was developed as a single entry, multiple cross-reference data management and information retrieval system for the automation of Project office tasks, including engineering, financial, managerial, and clerical support. This volume, two (2) of three (3), provides the instructions to operate the Scout Project Financial Analysis program in data retrieval and file maintenance via the user friendly menu drivers.

  10. Methamphetamine Users Have Increased Dental Disease: A Propensity Score Analysis.

    Shetty, V; Harrell, L; Clague, J; Murphy, D A; Dye, B A; Belin, T R

    2016-07-01

    Methamphetamine (MA) users are assumed to have a high burden of tooth decay. Less clear is how the distribution and severity of dental caries in MA users differ from the general population. Using a covariate-balancing propensity score strategy, we investigated the differential effects of MA use on dental caries by comparing the patterns of decayed, missing, and filled teeth in a community sample of 571 MA users with a subset of 2,755 demographically similar control individuals selected from a National Health and Nutrition Examination Survey (NHANES) cohort. Recruited over a 2-y period with a stratified sampling protocol, the MA users underwent comprehensive dental examinations by 3 trained and calibrated dentists using NHANES protocols. Propensity scores were estimated with logistic regression based on background characteristics, and a subset of closely matched subjects was stratified into quintiles for comparisons. MA users were twice as likely to have untreated caries (odds ratio [OR] = 2.08; 95% confidence interval [95% CI]: 1.55 to 2.78) and 4 times more likely to have caries experience (OR = 4.06; 95% CI: 2.24 to 7.34) than the control group of NHANES participants. Additionally, MA users were twice as likely to have 2 more decayed, missing, or filled teeth (OR = 2.08; 95% CI: 1.29 to 2.79) than the NHANES participants. The differential involvement of the teeth surfaces in MA users was quite distinctive, with carious surface involvement being highest for the maxillary central incisors, followed by maxillary posterior premolars and molars. Users injecting MA had significantly higher rates of tooth decay compared with noninjectors (P = 0.04). Although MA users experienced decayed and missing dental surfaces more frequently than NHANES participants, NHANES participants had more restored surfaces, especially on molars. The high rates and distinctive patterns of dental caries observed could be used 1) to alert dentists to covert MA use in their patients and 2) as

  11. Comparative Perspective of Human Behavior Patterns to Uncover Ownership Bias among Mobile Phone Users

    Ayumi Arai

    2016-06-01

    Full Text Available With the rapid spread of mobile devices, call detail records (CDRs from mobile phones provide more opportunities to incorporate dynamic aspects of human mobility in addressing societal issues. However, it has been increasingly observed that CDR data are not always representative of the population under study because it only includes device users alone. To understand the discrepancy between the population captured by CDRs and the general population, we profile principal populations of CDRs by analyzing routines based on time spent at key locations and compare these data with those of the general population. We employ a topic model to estimate typical routines of mobile phone users using CDRs as topics. The routines are extracted from field survey data and compared between those of the general population and mobile phone users. We found that there are two main population groups of mobile phone users in Dhaka: males engaged in an income-generating activity at a specific location other than home and females performing household tasks and spending most of their time at home. We determine that CDRs tend to omit students, who form a significant component of the Dhaka population.

  12. User's manual of a support system for human reliability analysis

    Many kinds of human reliability analysis (HRA) methods have been developed. However, users are required to be skillful so as to use them, and also required complicated works such as drawing event tree (ET) and calculation of uncertainty bounds. Moreover, each method is not so complete that only one method of them is not enough to evaluate human reliability. Therefore, a personal computer (PC) based support system for HRA has been developed to execute HRA practically and efficiently. The system consists of two methods, namely, simple method and detailed one. The former uses ASEP that is a simplified THERP-technique, and combined method of OAT and HRA-ET/DeBDA is used for the latter. Users can select a suitable method for their purpose. Human error probability (HEP) data were collected and a database of them was built to use for the support system. This paper describes outline of the HRA methods, support functions and user's guide of the system. (author)

  13. Development of output user interface software to support analysis

    Wahanani, Nursinta Adi; Natsir, Khairina; Hartini, Entin

    2014-09-01

    Data processing software packages such as VSOP and MCNPX are softwares that has been scientifically proven and complete. The result of VSOP and MCNPX are huge and complex text files. In the analyze process, user need additional processing like Microsoft Excel to show informative result. This research develop an user interface software for output of VSOP and MCNPX. VSOP program output is used to support neutronic analysis and MCNPX program output is used to support burn-up analysis. Software development using iterative development methods which allow for revision and addition of features according to user needs. Processing time with this software 500 times faster than with conventional methods using Microsoft Excel. PYTHON is used as a programming language, because Python is available for all major operating systems: Windows, Linux/Unix, OS/2, Mac, Amiga, among others. Values that support neutronic analysis are k-eff, burn-up and mass Pu239 and Pu241. Burn-up analysis used the mass inventory values of actinide (Thorium, Plutonium, Neptunium and Uranium). Values are visualized in graphical shape to support analysis.

  14. Development of output user interface software to support analysis

    Data processing software packages such as VSOP and MCNPX are softwares that has been scientifically proven and complete. The result of VSOP and MCNPX are huge and complex text files. In the analyze process, user need additional processing like Microsoft Excel to show informative result. This research develop an user interface software for output of VSOP and MCNPX. VSOP program output is used to support neutronic analysis and MCNPX program output is used to support burn-up analysis. Software development using iterative development methods which allow for revision and addition of features according to user needs. Processing time with this software 500 times faster than with conventional methods using Microsoft Excel. PYTHON is used as a programming language, because Python is available for all major operating systems: Windows, Linux/Unix, OS/2, Mac, Amiga, among others. Values that support neutronic analysis are k-eff, burn-up and mass Pu239 and Pu241. Burn-up analysis used the mass inventory values of actinide (Thorium, Plutonium, Neptunium and Uranium). Values are visualized in graphical shape to support analysis

  15. Ontology-Aided vs. Keyword-Based Web Searches: A Comparative User Study

    Kamel, Magdi; Lee, Ann; Powers, Ed

    2007-01-01

    Ontologies are formal explicit description of concepts in a domain of discourse, properties of these concepts, and restrictions on these properties that are specified by semantics that follow the “rules” of the domain of knowledge. As such, ontologies would be extremely useful as knowledge bases for an application attempting to add context to a particular Web search term. This paper describes such an application and reports the results of a user study designed to compare the effec...

  16. User`s Guide for the NREL Teetering Rotor Analysis Program (STRAP)

    Wright, A D

    1992-08-01

    The following report gives the reader an overview of instructions on the proper use of the National Renewable Energy Laboratory (formerly the Solar Energy Research Institute, or SERI) teetering Rotor Analysis Program (STRAP version 2.20). STRAP is a derivative of the Force and Loads Analysis program (FLAP). It is intended as a tool for prediction of rotor and blade loads and response for only two-bladed teetering hub wind turbines. The effects of delta-3, undersling, hub mass, and wind turbulence are accounted for. The objectives of the report are to give an overview of the code and also show the methods of data input and correct code execution steps in order to model an example two-bladed teetering hub turbine. A large portion of the discussion (Sections 6.0, 7.0, and 8.0) is devoted to the subject of inputting and running the code for wind turbulence effects. The ability to include turbulent wind effects is perhaps the biggest change in the code since the release of FLAP version 2.01 in 1988. This report is intended to be a user`s guide. It does not contain a theoretical discussion on equations of motion, assumptions, underlying theory, etc. It is intended to be used in conjunction with Wright, Buhl, and Thresher (1988).

  17. Comparative Analysis of Classifier Fusers

    Marcin Zmyslony

    2012-06-01

    Full Text Available There are many methods of decision making by an ensemble of classifiers. The most popular are methods that have their origin in voting method, where the decision of the common classifier is a combination of individual classifiers’ outputs. This work presents comparative analysis of some classifier fusion methods based on weighted voting of classifiers’ responses and combination of classifiers’ discriminant functions. We discus different methods of producing combined classifiers based on weights. We show that it is notpossible to obtain classifier better than an abstract model of committee known as an Oracle if it is based only on weighted voting but models based on discriminant function or classifier using feature values and class numbers could outperform the Oracle as well. Delivered conclusions are confirmed by the results of computer experiments carried out on benchmark and computer generated data.

  18. Comparative Analysis of Classifier Fusers

    Marcin Zmyslony

    2012-05-01

    Full Text Available There are many methods of decision making by an ensemble of classifiers. The most popular are methods that have their origin in voting method, where the decision of the common classifier is a combination of individual classifiers’ outputs. This work presents comparative analysis of some classifier fusion methods based on weighted voting of classifiers’ responses and combination of classifiers’ discriminant functions. We discus different methods of producing combined classifiers based on weights. We show that it is not possible to obtain classifier better than an abstract model of committee known as an Oracle if it is based only on weighted voting but models based on discriminant function or classifier using feature values and class numbers could outperform the Oracle as well. Delivered conclusions are confirmed by the results of computer experiments carried out on benchmark and computer generated data.

  19. Comparative analysis of collaboration networks

    In this paper we carry out a comparative analysis of the word network as the collaboration network based on the novel by M. Bulgakov 'Master and Margarita', the synonym network of the Russian language as well as the Russian movie actor network. We have constructed one-mode projections of these networks, defined degree distributions for them and have calculated main characteristics. In the paper a generation algorithm of collaboration networks has been offered which allows one to generate networks statistically equivalent to the studied ones. It lets us reveal a structural correlation between word network, synonym network and movie actor network. We show that the degree distributions of all analyzable networks are described by the distribution of q-type.

  20. A cytomorphometric analysis of oral mucosal changes in tobacco users

    Khot, Komal; Deshmane, Swati; Bagri-Manjarekar, Kriti; Warke, Darshana; Kotak, Keyuri

    2015-01-01

    Aim: Tobacco use is the major cause of oral cancer, which is the sixth most common form of malignancy globally. Even in the absence of clinical manifestations, early changes in the oral mucosa can be detected microscopically by exfoliative cytology. The present study aimed to study and compare the cellular changes in the oral mucosa of tobacco users using cytomorphometry. Materials and Methods: A total of 80 subjects were included: 20 without any tobacco use habits, 20 tobacco chewers, 20 smo...

  1. Reactor safety analysis computer program features that enhance user productivity

    This paper describes several design features of the MARY computer program that increase user productivity. The MARY program was used to analyze behavior of the Savannah River Site (SRS) K Reactor during postulated nuclear and thermal-hydraulic transients, such as overpower and underflow events, before K Reactor was placed in cold standby in 1993. These analyses provide the bases for portions of the accident chapter of the K-Reactor Safety Analysis Report

  2. User`s Guide for the NREL Force and Loads Analysis Program. Version 2.2

    Wright, A D

    1992-08-01

    The following report gives the reader an overview of and instructions on the proper use of the National Renewable Energy Laboratory Force and Loads Analysis Program (FLAP, version 2.2). It is intended as a tool for prediction of rotor and blade loads and response for two- or three-bladed rigid hub wind turbines. The effects of turbulence are accounted for. The objectives of the report are to give an overview of the code and also show the methods of data input and correct code execution steps in order to model an example two-bladed rigid hub turbine. A large portion of the discussion (Sections 6.0, 7.0, and 8.0) is devoted to the subject of inputting and running the code for wind turbulence effects. The ability to include turbulent wind effects is perhaps the biggest change in the code since the release of FLAP version 2.01 in 1988. This report is intended to be a user`s guide. It does not contain a theoretical discussion on equations of motion, assumptions, underlying theory, etc. It is intended to be used in conjunction with Wright, Buhl, and Thresher (1988).

  3. Comparative Analysis of Packet Scheduling Schemes for HSDPA Cellular Networks

    T. Janevski

    2009-06-01

    Full Text Available In this paper we present comparison analysis for packet scheduling algorithms for HSDPA (High Speed Downlink Packet Networks. In particular, we analyze the round robin, max C/I and FCDS packet scheduling algorithms in HSDPA by comparing the average throughput, delay and fairness of the users, changing the number of the users in pedestrian and vehicular environment. The results have showed that the number of the users in a given coverage area is very important when choosing which packet scheduling algorithm for HSDPA networks. These results will be very useful for choosing the adequate scheduling algorithm in HSDPA network with aim to satisfy the desired quality of service for the mobile users.

  4. New indicators of illegal drug use to compare drug user populations for policy evaluation

    Francesco Fabi

    2013-11-01

    Full Text Available Background: New trends in drug consumption show a trend towards higher poly-use. Epidemiological indicators presently used are mostly based on the prevalence of users of the “main” substances and the ranking of harm caused by drug use is based on a single substance analysis.Methods: In this paper new indicators are proposed; the approach consider the segmentation of the population with respect to the frequency of use in the last 30 days and the harm score of the various substances used by a poly-user. Scoring is based on single substance score table reported in recent papers and principal component analysis is applied to reduce dimensionality. Any user ischaracterized by the two new scores: frequency of use score and poly-use score.Results: The method is applied to the drug user populations interviewed in Communities and Low Threshold Services within the Problem Drug Use 2012 survey in four different European countries. The comparison of the poly-use score cumulative distributions gives insight about behavioural trends of drug use and also evaluate the efficacy of the intervention services. Furthermore, the application of this method to School Population Survey 2011 data allows a definition of the expected behaviour of the poly-drug score for the General Population Survey to be representative.Conclusions: In general, the method is simply and intuitive, and could be applied to surveys containing questions about drug use. A possible limitations could be that the median is chosen for calculating the frequency of use score in questionnaires containing the frequency of drug use in classes.

  5. GPP user`s guide - a general-purpose postprocessor for wind turbine data analysis

    Buhl, Jr, M L

    1995-01-01

    GPP (pronounced {open_quotes}jeep{close_quotes}) is a General-Purpose Postprocessor for wind turbine data analysis. The author, a member of the Wind Technology Division (WTD) of the National Renewable Energy Laboratory (NREL), developed GPP to postprocess test data and simulation predictions. GPP reads data into large arrays and allows the user to run many types of analyses on the data stored in memory. It runs on inexpensive computers common in the wind industry. One can even use it on a laptop in the field. The author wrote the program in such a way as to make it easy to add new types of analyses and to port it to many types of computers. Although GPP is very powerful and feature-rich, it is still very easy to learn and to use. Exhaustive error trapping prevents one from losing valuable work due to input errors. GPP will, hopefully, make a significant impact on engineering productivity in the wind industry.

  6. Crianças usuárias de lente de contato nos serviços público e privado: análise comparativa Pediatric contact lens users in public and private services: comparative analysis

    Daniela Araújo Toscano

    2009-04-01

    Full Text Available OBJETIVOS: Analisar as indicações, tipo, complicações do uso de lentes de contato e acuidade visual em crianças de serviços de Oftalmologia público e privado. MÉTODOS: Os dados dos prontuários de 59 crianças usuárias de lentes de contato em serviço privado (Hospital de Olhos de Pernambuco - Grupo 1, e 43 no serviço público (Fundação Altino Ventura - Grupo 2, foram analisados. A coleta de dados incluiu características sociodemográficas, idade da primeira consulta, indicação do uso da lente, tipo de lente, complicações e acuidade visual. RESULTADOS: As mais comuns indicações do uso de lente de contato no grupo 1 foram: ametropia (55,9%, anisometropia (18,6% e esotropia (16,9%. Neste grupo o leucoma e phthisis não estavam presentes. No grupo 2, as indicações mais comuns foram: anisometropia (23,2%, ametropia e leucoma (18,6% cada, e phthisis (16,3%. A esotropia não apareceu no grupo 2. O tipo de lente de contato mais prescrita foi a gelatinosa de uso permanente (não descartável no grupo 1 (45,8% e no grupo 2 (32,6%. A complicação mais encontrada no grupo 1 foi desconforto (33,3% e no grupo 2 perda da lente (60%. CONCLUSÕES: A indicação de ametropia predominou nos pacientes privados e as anisometropias nos públicos. O tipo de lente de contato mais prescrita nos dois grupos foi a gelatinosa de uso permanente. A complicação mais frequente no grupo 1 foi desconforto e no grupo 2 perda da lente. A acuidade visual na maioria dos pacientes manteve-se.PURPOSE: To analyze the indications, type and complications of contact lens use and visual acuity in children, in ophthalmological, public and private, services. METHODS: The information from the medical records of 59 contact lens users at a private service (Hospital de Olhos de Pernambuco - Recife - PE- Brazil - group 1, and 43 at public service (Fundação Altino Ventura - Recife - PE - Brazil - group 2, was analyzed. The collected data included: demographic information

  7. User needs and requirements analysis for big data healthcare applications.

    Zillner, Sonja; Lasierra, Nelia; Faix, Werner; Neururer, Sabrina

    2014-01-01

    The realization of big data applications that allow improving the quality and efficiency of healthcare care delivery is challenging. In order to take advantage of the promising opportunities of big data technologies, a clear understanding of user needs and requirements of the various stakeholders of healthcare, such as patients, clinicians and physicians, healthcare provider, payors, pharmaceutical industry, medical product suppliers and government, is needed. Our study is based on internet, literature and market study research as well as on semi-structured interviews with major stakeholder groups of healthcare delivery settings. The analysis shows that big data technologies could be used to align the opposing user needs of improved quality with improved efficiency of care. However, this requires the integrated view of various heterogeneous data sources, legal frameworks for data sharing and incentives that foster collaboration. PMID:25160268

  8. Architecture of collaborating frameworks: simulation, visualisation, user interface and analysis

    In modern high energy and astrophysics experiments the variety of user requirements and the complexity of the problem domain often involve the collaboration of several software frameworks, and different components are responsible for providing the functionalities related to each domain. For instance, a common use case consists in studying the physics effects and the detector performance, resulting from primary events, in a given detector configuration, to evaluate the physics reach of the experiment or optimise the detector design. Such a study typically involves various components: Simulation, Visualisation, Analysis and (interactive) User Interface. The authors focus on the design aspects of the collaboration of these frameworks and on the technologies that help to simplify the complex process of software design

  9. Cultural Differences in User Privacy Behavior on Social Networking Sites : An Empirical Study comparing German and Swedish Facebook Users

    Falk, Sebastian; Riel, Nils

    2013-01-01

    Social Networking Sites (SNSs), such as Facebook, are becoming increasingly popular. Their worldwide accessibility is attracting billions of SNS users from all over the globe, which results in a variety of different cultures meeting on the respective platforms. Apart from their growing popularity, privacy issues represent a downside of SNSs attracting strong media and research attention. Considering SNS users’ cultural diversity, recent studies show that a culture influences the privacy conce...

  10. Meta-analysis of executive functioning in ecstasy/polydrug users.

    Roberts, C A; Jones, A; Montgomery, C

    2016-06-01

    Ecstasy/3,4-methylenedioxymethamphetamine (MDMA) use is proposed to cause damage to serotonergic (5-HT) axons in humans. Therefore, users should show deficits in cognitive processes that rely on serotonin-rich, prefrontal areas of the brain. However, there is inconsistency in findings to support this hypothesis. The aim of the current study was to examine deficits in executive functioning in ecstasy users compared with controls using meta-analysis. We identified k = 39 studies, contributing 89 effect sizes, investigating executive functioning in ecstasy users and polydrug-using controls. We compared function-specific task performance in 1221 current ecstasy users and 1242 drug-using controls, from tasks tapping the executive functions - updating, switching, inhibition and access to long-term memory. The significant main effect demonstrated overall executive dysfunction in ecstasy users [standardized mean difference (SMD) = -0.18, 95% confidence interval (CI) -0.26 to -0.11, Z = 5.05, p < 0.001, I 2 = 82%], with a significant subgroup effect (χ 2 = 22.06, degrees of freedom = 3, p < 0.001, I 2 = 86.4%) demonstrating differential effects across executive functions. Ecstasy users showed significant performance deficits in access (SMD = -0.33, 95% CI -0.46 to -0.19, Z = 4.72, p < 0.001, I 2 = 74%), switching (SMD = -0.19, 95% CI -0.36 to -0.02, Z = 2.16, p < 0.05, I 2 = 85%) and updating (SMD = -0.26, 95% CI -0.37 to -0.15, Z = 4.49, p < 0.001, I 2 = 82%). No differences were observed in inhibitory control. We conclude that this is the most comprehensive analysis of executive function in ecstasy users to date and provides a behavioural correlate of potential serotonergic neurotoxicity. PMID:26966023

  11. Development of a User Interface for a Regression Analysis Software Tool

    Ulbrich, Norbert Manfred; Volden, Thomas R.

    2010-01-01

    An easy-to -use user interface was implemented in a highly automated regression analysis tool. The user interface was developed from the start to run on computers that use the Windows, Macintosh, Linux, or UNIX operating system. Many user interface features were specifically designed such that a novice or inexperienced user can apply the regression analysis tool with confidence. Therefore, the user interface s design minimizes interactive input from the user. In addition, reasonable default combinations are assigned to those analysis settings that influence the outcome of the regression analysis. These default combinations will lead to a successful regression analysis result for most experimental data sets. The user interface comes in two versions. The text user interface version is used for the ongoing development of the regression analysis tool. The official release of the regression analysis tool, on the other hand, has a graphical user interface that is more efficient to use. This graphical user interface displays all input file names, output file names, and analysis settings for a specific software application mode on a single screen which makes it easier to generate reliable analysis results and to perform input parameter studies. An object-oriented approach was used for the development of the graphical user interface. This choice keeps future software maintenance costs to a reasonable limit. Examples of both the text user interface and graphical user interface are discussed in order to illustrate the user interface s overall design approach.

  12. Development of a task analysis tool to facilitate user interface design

    Scholtz, Jean C.

    1992-01-01

    A good user interface is one that facilitates the user in carrying out his task. Such interfaces are difficult and costly to produce. The most important aspect in producing a good interface is the ability to communicate to the software designers what the user's task is. The Task Analysis Tool is a system for cooperative task analysis and specification of the user interface requirements. This tool is intended to serve as a guide to development of initial prototypes for user feedback.

  13. CMS dashboard for monitoring of the user analysis activities

    Karavakis, Edward; Andreeva, Julia; Maier, Gerhild; Khan, Akram

    2012-12-01

    The CMS Virtual Organisation (VO) uses various fully distributed job submission methods and execution backends. The CMS jobs are processed on several middleware platforms such as the gLite, the ARC and the OSG. Up to 200,000 CMS jobs are submitted daily to the Worldwide LHC Computing Grid (WLCG) infrastructure and this number is steadily growing. These mentioned factors increase the complexity of the monitoring of the user analysis activities within the CMS VO. Reliable monitoring is an aspect of particular importance; it is a vital factor for the overall improvement of the quality of the CMS VO infrastructure.

  14. BWR plant dynamic analysis code BWRDYN user's manual

    Computer code BWRDYN has been developed for thermal-hydraulic analysis of a BWR plant. It can analyze the various types of transient caused by not only small but also large disturbances such as operating mode changes and/or system malfunctions. The verification of main analytical models of the BWRDYN code has been performed with measured data of actual BWR plant. Furthermore, the installation of BOP (Balance of Plant) model has made it possible to analyze the effect of BOP on reactor system. This report describes on analytical models and instructions for user of the BWRDYN code. (author)

  15. Architecture of collaborating frameworks simulation, visualisation, user interface and analysis

    Pfeier, A; Ferrero-Merlino, B; Giannitrapani, R; Longo, F; Nieminen, P; Pia, M G; Santin, G

    2001-01-01

    The Anaphe project is an ongoing effort to provide an Object Oriented software environment for data analysis in HENP experiments. A range of commercial and public domain libraries is used to cover basic functionalities; on top of these libraries a set of HENP-specific C++ class libraries for histogram management, fitting, plotting and ntuple-like data analysis has been developed. In order to comply with the user requirements for a command-line driven tool, we have chosen to use a scripting language (Python) as the front-end for a data analysis tool. The loose coupling provided by the consequent use of (AIDA compliant) Abstract Interfaces for each component in combination with the use of shared libraries for their implementation provides an easy integration of existing libraries into modern scripting languages thus allowing for rapid application development. This integration is simplified even further using a specialised toolkit (SWIG) to create "shadow classes" for the Python language, which map the definitio...

  16. Sociological analysis and comparative education

    Woock, Roger R.

    1981-12-01

    It is argued that comparative education is essentially a derivative field of study, in that it borrows theories and methods from academic disciplines. After a brief humanistic phase, in which history and philosophy were central for comparative education, sociology became an important source. In the mid-50's and 60's, sociology in the United States was characterised by Structural Functionalism as a theory, and Social Survey as a dominant methodology. Both were incorporated into the development of comparative education. Increasingly in the 70's, and certainly today, the new developments in sociology are characterised by an attack on Positivism, which is seen as the philosophical position underlying both functionalism and survey methods. New or re-discovered theories with their attendant methodologies included Marxism, Phenomenological Sociology, Critical Theory, and Historical Social Science. The current relationship between comparative education and social science is one of uncertainty, but since social science is seen to be returning to its European roots, the hope is held out for the development of an integrated social theory and method which will provide a much stronger basis for developments in comparative education.

  17. GCtool for fuel cell systems design and analysis : user documentation.

    Ahluwalia, R.K.; Geyer, H.K.

    1999-01-15

    GCtool is a comprehensive system design and analysis tool for fuel cell and other power systems. A user can analyze any configuration of component modules and flows under steady-state or dynamic conditions. Component models can be arbitrarily complex in modeling sophistication and new models can be added easily by the user. GCtool also treats arbitrary system constraints over part or all of the system, including the specification of nonlinear objective functions to be minimized subject to nonlinear, equality or inequality constraints. This document describes the essential features of the interpreted language and the window-based GCtool environment. The system components incorporated into GCtool include a gas flow mixer, splitier, heater, compressor, gas turbine, heat exchanger, pump, pipe, diffuser, nozzle, steam drum, feed water heater, combustor, chemical reactor, condenser, fuel cells (proton exchange membrane, solid oxide, phosphoric acid, and molten carbonate), shaft, generator, motor, and methanol steam reformer. Several examples of system analysis at various levels of complexity are presented. Also given are instructions for generating two- and three-dimensional plots of data and the details of interfacing new models to GCtool.

  18. Performance analysis of an opportunistic multi-user cognitive network with multiple primary users

    Khan, Fahd Ahmed

    2014-03-01

    Consider a multi-user underlay cognitive network where multiple cognitive users concurrently share the spectrum with a primary network with multiple users. The channel between the secondary network is assumed to have independent but not identical Nakagami-m fading. The interference channel between the secondary users (SUs) and the primary users is assumed to have Rayleigh fading. A power allocation based on the instantaneous channel state information is derived when a peak interference power constraint is imposed on the secondary network in addition to the limited peak transmit power of each SU. The uplink scenario is considered where a single SU is selected for transmission. This opportunistic selection depends on the transmission channel power gain and the interference channel power gain as well as the power allocation policy adopted at the users. Exact closed form expressions for the moment-generating function, outage performance, symbol error rate performance, and the ergodic capacity are derived. Numerical results corroborate the derived analytical results. The performance is also studied in the asymptotic regimes, and the generalized diversity gain of this scheduling scheme is derived. It is shown that when the interference channel is deeply faded and the peak transmit power constraint is relaxed, the scheduling scheme achieves full diversity and that increasing the number of primary users does not impact the diversity order. © 2014 John Wiley & Sons, Ltd.

  19. Analysis of the Navigation Behavior of the Users' using Grey Relational Pattern Analysis with Markov Chains

    BINDU MADHURI .Ch,; DR. ANAND CHANDULAL.J

    2010-01-01

    Generally user page visits are sequential in nature. The large number of Web pages on many Web sites has raised navigational problems. Markov chains have been used to model user sequential navigational behavior on the World Wide Web (WWW).The enormous growth in the number of documents in the WWW increases the need for improved link navigation and path analysis models. Link prediction and path analysis are important problems with a wide range of applications ranging from personalization to web...

  20. A RANDOMIZED COMPARATIVE STUDY OF MENSTRUAL PATTERNS IN MEGESTROL ACETATE IUD AND TCu220c IUD USERS

    YANJun-Hong; PANJia-Xiang; ZHANGYa-Qin; KANGJin-Fang; LINGXiu-Ying

    1989-01-01

    This is a randomized comparative study of menstrual patterns between 30 cases of megestrol acetate IUD users and 30 cases using TCu220c IUD before and at the Ist, 3rd, 6th and 12th cycles after insertion.

  1. Blog Content and User Engagement - An Insight Using Statistical Analysis.

    Apoorva Vikrant Kulkarni

    2013-06-01

    Full Text Available Since the past few years organizations have increasingly realized the value of social media in positioning, propagating and marketing the product/service and organization itself. Today every organization be it small or big has realized the essence of creating a space in the World Wide Web. Social Media through its multifaceted platforms has enabled the organizations to propagate their brands. There are a number of social media networks which are helpful in spreading the message to customers. Many organizations are having full time web analytics teams that are regularly trying to ensure that prospectivecustomers are visiting their organization through various forms of social media. Web analytics is foreseen as a tool for Business Intelligence by organizations and there are a large number of analytics tools available for monitoring the visibility of a particular brand on the web. For example, Google has its ownanalytic tool that is very widely used. There are number of free as well as paid analytical tools available on the internet. The objective of this paper is to study what content in a blog present in the social media creates a greater impact on user engagement. The study statistically analyzes the relation between content of the blog and user engagement. The statistical analysis was carried out on a blog of a reputed management institute in Pune to arrive at conclusions.

  2. User's guide for the REBUS-3 fuel cycle analysis capability

    REBUS-3 is a system of programs designed for the fuel-cycle analysis of fast reactors. This new capability is an extension and refinement of the REBUS-3 code system and complies with the standard code practices and interface dataset specifications of the Committee on Computer Code Coordination (CCCC). The new code is hence divorced from the earlier ARC System. In addition, the coding has been designed to enhance code exportability. Major new capabilities not available in the REBUS-2 code system include a search on burn cycle time to achieve a specified value for the multiplication constant at the end of the burn step; a general non-repetitive fuel-management capability including temporary out-of-core fuel storage, loading of fresh fuel, and subsequent retrieval and reloading of fuel; significantly expanded user input checking; expanded output edits; provision of prestored burnup chains to simplify user input; option of fixed-or free-field BCD input formats; and, choice of finite difference, nodal or spatial flux-synthesis neutronics in one-, two-, or three-dimensions

  3. Comparative performance analysis of nonorthogonal joint diagonalization algorithms

    Ammar, Mesloub; Abed-Meraim, Karim; Belouchrani, Adel

    2013-01-01

    Recently, many non orthogonal joint diagonalization (NOJD) algorithms have been developed and applied in several applications including blind source separation (BSS) problems. The aim of this paper is to provide an overview of major complex NOJD (CNOJD) algorithm and to study and compare their performance analysis reveals many interesting features that help the non expert user to select the CNOJD method depending on the application conditions.

  4. Usability and use reference in the social network facebook: a netnographic analysis of technological users

    Naiara Silva Ferreira

    2015-10-01

    Full Text Available This article presents a study about the preference of use in virtual social networks, using Facebook as object of study, to identify the motivational factors for the usability of this technology platform. The social network Facebook has been chosen to present a technological scenario of high sociability and virtual interaction. The methodology used was the netnography, being made through the collection of discussions in North American sites of news and forums online, where there is a large critical user participation on the internet, about the gains and frustrations in this context. The content analysis was performed comparing the categories of users found in the literature about values that motivate consumer technology, describing the hedonic, social, utilitarian values and perceptions of risk in consumption when related to lack of privacy. The results show two main groups of users of this technology and 7 subgroups. Therefore, the contribution of the study is that the formation of these groups may reflect technological usability of user groups around the world. The study also brings to the discussion issues related to the behaviors of the users of virtual networks which can be useful for businesses and their relationships with consumers and also the development of new knowledge from such criticism and demands that digital consumers expose about the technologies.

  5. International Reactor Physics Handbook Database and Analysis Tool (IDAT) - IDAT user manual

    The IRPhEP Database and Analysis Tool (IDAT) was first released in 2013 and is included on the DVD. This database and corresponding user interface allows easy access to handbook information. Selected information from each configuration was entered into IDAT, such as the measurements performed, benchmark values, calculated values and materials specifications of the benchmark. In many cases this is supplemented with calculated data such as neutron balance data, spectra data, k-eff nuclear data sensitivities, and spatial reaction rate plots. IDAT accomplishes two main objectives: 1. Allow users to search the handbook for experimental configurations that satisfy their input criteria. 2. Allow users to trend results and identify suitable benchmarks experiments for their application. IDAT provides the user with access to several categories of calculated data, including: - 1-group neutron balance data for each configuration with individual isotope contributions in the reactor system. - Flux and other reaction rates spectra in a 299-group energy scheme. Plotting capabilities were implemented into IDAT allowing the user to compare the spectra of selected configurations in the original fine energy structure or on any user-defined broader energy structure. - Sensitivity coefficients (percent changes of k-effective due to elementary change of basic nuclear data) for the major nuclides and nuclear processes in a 238-group energy structure. IDAT is actively being developed. Those approved to access the online version of the handbook will also have access to an online version of IDAT. As May 2013 marks the first release, IDAT may contain data entry errors and omissions. The handbook remains the primary source of reactor physics benchmark data. A copy of IDAT user's manual is attached to this document. A copy of the IRPhE Handbook can be obtained on request at http://www.oecd-nea.org/science/wprs/irphe/irphe-handbook/form.html

  6. SOR Users` Guide : How to Navigate Through the SOR Analysis.

    United States. Bonneville Power Administration.

    1996-08-01

    The Columbia River System Operation Review (SOR) gave river managers, users, and the general public a chance to examine system operations in detail, to study how each river use affects others, and to consider the consequences of changing the way the system works. The task was enormous, and it was a multiyear undertaking. In its wake, the SOR left a multitude of documents and six years of analysis that can and should be used broadly for other reference and research purposes. This catalog will introduce you to numerous SOR products to be found throughout the 20 appendices and the Final Environmental Impact Statement (EIS) Main Report. They include maps, models, data bases, current descriptions of Federal hydro projects and river resources, publications, and slide shows.

  7. RENT CONTROL: A COMPARATIVE ANALYSIS

    Sue-Mari Maass

    2012-11-01

    Full Text Available Recent case law shows that vulnerable, previously disadvantaged private sector tenants are currently facing eviction orders – and consequential homelessness – on the basis that their leases have expired. In terms of the case law it is evident that once their leases have expired, these households do not have access to alternative accommodation. In terms of the Constitution, this group of marginalised tenants have a constitutional right of access to adequate housing and a right to occupy land with legally secure tenure. The purpose of this article is to critically analyse a number of legislative interventions, and specifically rent control, that were imposed in various jurisdictions in order to provide strengthened tenure protection for tenants. The rationale for this analysis is to determine whether the current South African landlord-tenant regime is able to provide adequate tenure protection for vulnerable tenants and therefore in the process of transforming in line with the Constitution. The legal construction of rent control was adopted in pre-1994 South Africa, England and New York City to provide substantive tenure protection for tenants during housing shortages. These statutory interventions in the different private rental markets were justified on the basis that there was a general need to protect tenants against exploitation by landlords. However, the justification for the persistent imposition of rent control in New York City is different since it protects a minority group of financially weak tenants against homelessness. The English landlord-tenant regime highlights the importance of a well-structured social sector that can provide secure, long-term housing options for low-income households who are struggling to access the private rental sector. Additionally, the English rental housing framework shows that if the social sector is functioning as a "safety net" for low-income households, the private sector would be able to uphold

  8. User's manual for seismic analysis code 'SONATINA-2V'

    The seismic analysis code, SONATINA-2V, has been developed to analyze the behavior of the HTTR core graphite components under seismic excitation. The SONATINA-2V code is a two-dimensional computer program capable of analyzing the vertical arrangement of the HTTR graphite components, such as fuel blocks, replaceable reflector blocks, permanent reflector blocks, as well as their restraint structures. In the analytical model, each block is treated as rigid body and is restrained by dowel pins which restrict relative horizontal movement but allow vertical and rocking motions between upper and lower blocks. Moreover, the SONATINA-2V code is capable of analyzing the core vibration behavior under both simultaneous excitations of vertical and horizontal directions. The SONATINA-2V code is composed of the main program, pri-processor for making the input data to SONATINA-2V and post-processor for data processing and making the graphics from analytical results. Though the SONATINA-2V code was developed in order to work in the MSP computer system of Japan Atomic Energy Research Institute (JAERI), the computer system was abolished with the technical progress of computer. Therefore, improvement of this analysis code was carried out in order to operate the code under the UNIX machine, SR8000 computer system, of the JAERI. The users manual for seismic analysis code, SONATINA-2V, including pri- and post-processor is given in the present report. (author)

  9. Comparing the performance of expert user heuristics and an integer linear program in aircraft carrier deck operations.

    Ryan, Jason C; Banerjee, Ashis Gopal; Cummings, Mary L; Roy, Nicholas

    2014-06-01

    Planning operations across a number of domains can be considered as resource allocation problems with timing constraints. An unexplored instance of such a problem domain is the aircraft carrier flight deck, where, in current operations, replanning is done without the aid of any computerized decision support. Rather, veteran operators employ a set of experience-based heuristics to quickly generate new operating schedules. These expert user heuristics are neither codified nor evaluated by the United States Navy; they have grown solely from the convergent experiences of supervisory staff. As unmanned aerial vehicles (UAVs) are introduced in the aircraft carrier domain, these heuristics may require alterations due to differing capabilities. The inclusion of UAVs also allows for new opportunities for on-line planning and control, providing an alternative to the current heuristic-based replanning methodology. To investigate these issues formally, we have developed a decision support system for flight deck operations that utilizes a conventional integer linear program-based planning algorithm. In this system, a human operator sets both the goals and constraints for the algorithm, which then returns a proposed schedule for operator approval. As a part of validating this system, the performance of this collaborative human-automation planner was compared with that of the expert user heuristics over a set of test scenarios. The resulting analysis shows that human heuristics often outperform the plans produced by an optimization algorithm, but are also often more conservative. PMID:23934675

  10. Development of Point Kernel Shielding Analysis Computer Program Implementing Recent Nuclear Data and Graphic User Interfaces

    Kang, Sang Ho; Lee, Seung Gi; Chung, Chan Young [Korea Power Engineering Co, Ltd., Seoul (Korea, Republic of); Lee, Choon Sik; Lee, Jai Ki [Hanyang Univ., Seoul (Korea, Republic of)

    2001-09-15

    In order to comply with revised national regulationson radiological protection and to implement recent nuclear data and dose conversion factors, KOPEC developed a new point kernel gamma and beta ray shielding analysis computer program. This new code, named VisualShield, adopted mass attenuation coefficient and buildup factors from recent ANSI/ANS standards and flux-to-dose conversion factors from the International Commission on Radiological Protection (ICRP) Publication 74 for estimation of effective/equivalent dose recommended in ICRP 60. VisualShield utilizes graphical user interfaces and 3-D visualization of the geometric configuration for preparing input data sets and analyzing results, which leads users to error free processing with visual effects. Code validation and data analysis were performed by comparing the results of various calculations to the data outputs of previous programs such as MCNP 4B, ISOSHLD-II, QAD-CGGP, etc.

  11. Development of Point Kernel Shielding Analysis Computer Program Implementing Recent Nuclear Data and Graphic User Interfaces

    In order to comply with revised national regulationson radiological protection and to implement recent nuclear data and dose conversion factors, KOPEC developed a new point kernel gamma and beta ray shielding analysis computer program. This new code, named VisualShield, adopted mass attenuation coefficient and buildup factors from recent ANSI/ANS standards and flux-to-dose conversion factors from the International Commission on Radiological Protection (ICRP) Publication 74 for estimation of effective/equivalent dose recommended in ICRP 60. VisualShield utilizes graphical user interfaces and 3-D visualization of the geometric configuration for preparing input data sets and analyzing results, which leads users to error free processing with visual effects. Code validation and data analysis were performed by comparing the results of various calculations to the data outputs of previous programs such as MCNP 4B, ISOSHLD-II, QAD-CGGP, etc

  12. Analysis of user interfaces and interactions with computers

    PERČIČ, JAN

    2016-01-01

    The diploma thesis is a study of evolution of user interfaces and human interaction with computers. The thesis offers an overview of examples from history and mentions people that were important for the user interface development. At the same time it examines the current interaction principles and their potential evolution in the future. The goal was to define a potential ideal user interface, but because we are using different types of computers and in different situations, conclusion was re...

  13. Mobile Phone Usage for M-Learning: Comparing Heavy and Light Mobile Phone Users

    Suki, Norbayah Mohd; Suki, Norazah Mohd

    2007-01-01

    Purpose: Mobile technologies offer the opportunity to embed learning in a natural environment. The objective of the study is to examine how the usage of mobile phones for m-learning differs between heavy and light mobile phone users. Heavy mobile phone users are hypothesized to have access to/subscribe to one type of mobile content than light…

  14. Performance and security analysis of Gait-based user authentication

    2008-01-01

    Verifying the identity of a user, usually referred to as user authentication, before granting access to the services or objects is a very important step in many applications. People pass through some sorts of authentication process in their daily life. For example, to prove having access to the computer the user is required to know a password. Similarly, to be able to activate a mobile phone the owner has to know its PIN code, etc. Some user authentication techniques are based on human physio...

  15. Creation and documentation analysis of Mobile shopper guide system: administrative and user portal

    Charževskytė, Egidija

    2008-01-01

    Mobile shopper guide system consists of two parts mainly: mobile map, administrative and user portal. Mobile map consists of Vilnius city map and the points, which shows the location of the shops. Administrative and user portal supports mobile map. In the paper the analysis of documentation templates was done.During this work administrative and user portal was created and analyzed.

  16. Users, User-Friendliness and Projected Uses of Isichazamazwi SesiNdebele: An Analysis

    Langa Khumalo

    2011-01-01

    Abstract: This article discusses the first-ever monolingual general Ndebele dictionary, Isichazamazwi SesiNdebele (henceforth the ISN) within the context of the history of lexicography and the compilation of dic-tionaries in Ndebele. It further assesses the scope of the dictionary with regard to its structure. It also dis-cusses decisions taken by the editors during the writing of the ISN in an attempt to compile a user-friendly dictionary primarily aimed at secondary schools and the general ...

  17. Sentiment Detection of Web Users Using Probabilistic Latent Semantic Analysis

    Weijian Ren

    2014-10-01

    Full Text Available With the wide application of Internet in almost all fields, it has become the most important way for information publication, providing a large number of channels for spreading public opinion. Public opinions, as the response of Internet users to the information such as social events and government policies, reflect the status of both society and economics, which is highly valuable for the decision-making and public relations of enterprises. At present, the analysis methods for Internet public opinion are mainly based on discriminative approaches, such as Support Vector Machine (SVM and neural network. However, when these approaches analyze the sentiment of Internet public opinion, they are failed to exploit information hidden in text, e.g. topic. Motivated by the above observation, this paper proposes a detection method for public sentiment based on Probabilistic Latent Semantic Analysis (PLSA model. PLSA inherits the advantages of LSA, exploiting the semantic topic hidden in data. The procedure of detecting the public sentiment using this algorithm is composed of three main steps: (1 Chinese word segmentation and word refinement, with which each document is represented by a bag of words; (2 modeling the probabilistic distribution of documents using PLSA; (3 using the Z-vector of PLSA as the features of documents and delivering it to SVM for sentiment detection. We collect a set of text data from Weibo, blog, BBS etc. to evaluate our proposed approach. The experimental results shows that the proposed method in this paper can detect the public sentiment with high accuracy, outperforming the state-of-the-art approaches, i.e., word histogram based approach. The results also suggest that, text semantic analysis using PLSA could significantly boost the sentiment detection

  18. Earth Science Enterprise Solutions Network User Needs Analysis

    Mita, D.; Easson, G.; Anderson, D. J.

    2006-12-01

    The University of Mississippi and Mississippi State University are partnering with National Aeronautics and Space Administration (NASA) to develop a Research Projects Knowledge Base (RPKB) and a Partner Network Knowledge Base (PNKB) that will allow the user community to more easily locate the results of NASA funded research and be able to contact potential partners for future research. The RPKB and PNKB will also help NASA and the user community generate new topics for research projects that benefit society. The assessment of the needs of the user community for the RPKB and the PNKB was conducted through a combination of phone interviews with representatives of the user community, evaluations of existing data and tools currently employed by scientists, collaborations between NASA and the MRC, and the results of a November, 2006 workshop. This information was combined with an email survey, resulting in a report that describes how the users of the RPKB and the PNKB want to access the information in the knowledge bases, input new information into the RPKB and PNKB, and generate reports and diagrams, such as formulation reports. The compilation of the user's needs presented here is being used to design access and input tools for the user community. When fully developed the RPKB and the PNKB will use the NASA enterprise architecture modeling and viewing capability to provide NASA and the user community a more efficient way to identify potential research projects and partners.

  19. Analysis of Users Web Browsing Behavior Using Markov chain Model

    Diwakar Shukla

    2011-03-01

    Full Text Available In present days of growing information technology, many browsers available for surfing and web mining. A user has option to use any of them at a time to mine out the desired website. Every browser has pre-defined level of popularity and reputation in the market. This paper considers the setup of only two browsers in a computer system and a user prefers to any one, if fails, switches to the other one .The behavior of user is modeled through Markov chain procedure and transition probabilities are calculated. The quitting to browsing is treated as a parameter of variation over the popularity. Graphical study is performed to explain the inter relationship between user behavior parameters and browser market popularity parameters. If rate of a company is lowest in terms of browser failure and lowest in terms of quitting probability then company enjoys better popularity and larger user proportion

  20. Analysis of Factors for Incorporating User Preferences in Air Traffic Management: A system Perspective

    Sheth, Kapil S.; Gutierrez-Nolasco, Sebastian

    2010-01-01

    This paper presents an analysis of factors that impact user flight schedules during air traffic congestion. In pre-departure flight planning, users file one route per flight, which often leads to increased delays, inefficient airspace utilization, and exclusion of user flight preferences. In this paper, first the idea of filing alternate routes and providing priorities on each of those routes is introduced. Then, the impact of varying planning interval and system imposed departure delay increment is discussed. The metrics of total delay and equity are used for analyzing the impact of these factors on increased traffic and on different users. The results are shown for four cases, with and without the optional routes and priority assignments. Results demonstrate that adding priorities to optional routes further improves system performance compared to filing one route per flight and using first-come first-served scheme. It was also observed that a two-hour planning interval with a five-minute system imposed departure delay increment results in highest delay reduction. The trend holds for a scenario with increased traffic.

  1. Methodological proposal for the analysis of user participation mechanisms in online media

    Jaime Alonso, Ph.D.

    2012-01-01

    Full Text Available This paper presents the results of an analysis of user participation mechanisms, particularly those based in Web 2.0 technologies and applications, based on a sample of fourteen relevant Spanish online media, including the websites of newspapers, radio stations, and television channels. This analysis was conducted in October and November 2010 as part of the research subproject La evolución de los cibermedios en el marco de la convergencia digital. Tecnología y distribución (The evolution of online media in the context of digital convergence. Tecnology and distribution. The study is based on a taxonomy of the different user participation mechanisms, which distinguishes between those that are integrated within the media’s news sections and those that are independent spaces. The analysis also examines the form in which these mechanisms are managed by the media in function of the role they are assigned. Finally, the study aims to compare the different online media and to show examples and trends in the field of user participation.

  2. A generic analysis code of dynamic compartment model for evaluation of doses in terrestrial biosphere. GACOM user`s manual

    Takahashi, Tomoyuki [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1998-02-01

    A computer code GACOM (Generic Analysis code for dynamic COmpartment Model) has been developed to evaluate the behavior of radionuclides in terrestrial biosphere and the subsequent individual doses. In this code, the simultaneous ordinary differential equations are solved by using the sixth-step fifth-order Runge-Kutta method called Fehlberg formula. This principal characteristics of this code are shown as follows; (1) user definition of such as a number of compartments and transfer pathways of nuclides makes it possible to apply this code to various subjects of analysis, (2) various kinds of equations for evaluating doses in terrestrial biosphere are available for making input data of this code, (3) the units of time and nuclides can be defined flexibly, (4) probabilistic analysis by using the Monte-Carlo simulation is possible. This report describes the structure and user information for execution of GACOM code. (author)

  3. Model for Analysis of Energy Demand (MAED-2). User's manual

    The IAEA has been supporting its Member States in the area of energy planning for sustainable development. Development and dissemination of appropriate methodologies and their computer codes are important parts of this support. This manual has been produced to facilitate the use of the MAED model: Model for Analysis of Energy Demand. The methodology of the MAED model was originally developed by. B. Chateau and B. Lapillonne of the Institute Economique et Juridique de l'Energie (IEJE) of the University of Grenoble, France, and was presented as the MEDEE model. Since then the MEDEE model has been developed and adopted to be appropriate for modelling of various energy demand system. The IAEA adopted MEDEE-2 model and incorporated important modifications to make it more suitable for application in the developing countries, and it was named as the MAED model. The first version of the MAED model was designed for the DOS based system, which was later on converted for the Windows system. This manual presents the latest version of the MAED model. The most prominent feature of this version is its flexibility for representing structure of energy consumption. The model now allows country-specific representations of energy consumption patterns using the MAED methodology. The user can now disaggregate energy consumption according to the needs and/or data availability in her/his country. As such, MAED has now become a powerful tool for modelling widely diverse energy consumption patterns. This manual presents the model in details and provides guidelines for its application

  4. Cultural politics of user-generated encyclopaedias: comparing Chinese Wikipedia and Baidu Baike

    Liao, Han-Teng; Schroeder, Ralph

    2015-01-01

    The question of how the Internet affects existing geo-cultural or geo-linguistic communities in relation to nation-states has continued to receive attention among academics and policymakers alike. Language-based technologies and services that aggregate, index, and distribute materials online may reshape pre-existing boundaries of the relationship between users and content, for instance with different language versions of user-generated encyclopaedias or different local versions of search engi...

  5. Logatome Discrimination in Cochlear Implant Users: Subjective Tests Compared to the Mismatch Negativity

    Torsten Rahne; Michael Ziese; Dorothea Rostalski; Roland Mühler

    2010-01-01

    This paper describes a logatome discrimination test for the assessment of speech perception in cochlear implant users (CI users), based on a multilingual speech database, the Oldenburg Logatome Corpus, which was originally recorded for the comparison of human and automated speech recognition. The logatome discrimination task is based on the presentation of 100 logatome pairs (i.e., nonsense syllables) with balanced representations of alternating “vowel-replacement” and “consonant-replacement”...

  6. Comparing user acceptance of a computer system in two pediatric offices: a qualitative study.

    Travers, D. A.; Downs, S. M.

    2000-01-01

    The purpose of this qualitative study was to examine user acceptance of a clinical computer system in two pediatric practices in the southeast. Data were gathered through interviews with practice and IS staff, observations in the clinical area, and review of system implementation records. Five months after implementation, Practice A continued to use the system but Practice B had quit using it because it was unacceptable to the users. The results are presented here, in relation to a conceptual...

  7. Comparative Analysis of Virtual Education Applications

    Mehmet KURT

    2006-10-01

    Full Text Available The research was conducted in order to make comparative analysis of virtual education applications. The research is conducted in survey model. The study group consists of total 300 institutes providing virtual education in the fall, spring and summer semesters of 2004; 246 in USA, 10 in Australia, 3 in South Africa, 10 in India, 21 in UK, 6 in Japan, 4 in Turkey. The information has been collected by online questionnaire sent to the target mass by e-mail. The questionnaire has been developed in two information categories as personal information and institutes and their virtual education applications. The English web design of the online questionnaire and the database has been prepared by Microsoft ASP codes which is the script language of Microsoft Front Page editor and has been tested on personal web site. The questionnaire has been pre applied in institutions providing virtual education in Australia. The English text of the questionnaire and web site design have been sent to educational technology and virtual education specialists in the countries of the study group. With the feedback received, the spelling mistakes have been corrected and concept and language validity have been completed. The application of the questionnaire has taken 40 weeks during March-November 2004. Only 135 institutes have replied. Two of the questionnaires have been discharged because they included mistaken coding, names of the institutions and countries. Valid 133 questionnaires cover approximately 44% of the study group. Questionnaires saved in the online database have been transferred to Microsoft Excel and then to SPSS by external database connection. In regards of the research objectives, the data collected has been analyzed on computer and by using SPSS statistics package program. In data analysis frequency (f, percentage (% and arithmetic mean ( have been used. In comparisons of country, institute, year, and other variables, che-square test, independent t

  8. Consumption capability analysis for Micro-blog users based on data mining

    Yue Sun

    2013-07-01

    Full Text Available Data mining is an effective method of discovering useful information in a large amount of data. The capability of understanding the user’s consumption is vital for a company. Discovering the significant customers allows the company to focus on the most valuable customers. This paper uses micro-blog users’ check-in data and shop information for analysis and cluster method of data mining. We analyze user’s spending ability quantitatively based on user’s check-in actions. Compared with other clustering method, we choose DBSCAN clustering method of data mining to analyze the shop information and position. Users are divided into different categories according to their spending power. Discovering the users with high consumption level in large amounts of data, which is significant for a firm, can help the firm develop better strategies.

  9. Consumption capability analysis for Micro-blog users based on data mining

    Yue Sun

    2013-07-01

    Full Text Available Data mining is an effective method of discovering useful information in a large amount of data. Thecapability of understanding the user’s consumptionis vital for a company. Discovering the significantcustomers allows the company to focus on the most valuable customers. This paper uses micro-blog users’check-in data and shop information for analysis andcluster method of data mining. We analyze user’sspending ability quantitatively based on user’s check-in actions. Compared with other clustering method, wechoose DBSCAN clustering method of data mining to analyze the shop information and position. Users aredivided into different categories according to their spending power. Discovering the users with highconsumption level in large amounts of data, which is significant for a firm, can help the firm developbetterstrategies.

  10. [A comparative study of the incidence of Gardnerella vaginalis in users of IUD and oral contraceptives].

    Aleixo Neto, A; Peixoto, M L; Cabral, A C

    1987-07-01

    Leukorrhea constitutes one of the most frequent complaints by women visiting out-patient gynecological clinics. The most common etiological agents are Gardnerella vaginalis, Trichomonas vaginalis, Neisseria gonorrhoea and Candida albicans. Some authors have been able to verify an increased presence of certain pathogenic germs in the vaginal flora for users of contraceptive methods, e.g., for users of IUD, Kivijarvi et al. demonstrated a significantly increased presence of Gardnerella vaginalis considered responsible for a large number of inflammatory diseases of the pelvis in woman. In order to establish the frequency of colpo-cervicitis in users of contraceptive methods a study was initiated of women attending the Family Planning Clinic of the Department of Medicine at UFMG during the period January-December 1986. 305 cytological smears obtained from 111 users of oral hormonal contraceptives and from 194 users of IUD were studied by using the Papanicolaou staining method. A microscopic examination enabling the detection of cells that indicate the presence of Gardnerella vaginalis, trichomonas, Candida, papilloma, and dysplastic cells was performed. The results are listed in two tables. In 34.5% of cases a significant association was established between users of IUD and cells indicating the presence of Gardnerella vaginalis. For users of oral contraceptives that figure was lower, 28.8%. This circumstance has been attributed to probable epithelial lesions caused by incorrect insertion of the IUD and more abundant menstrual flux provoked b the IUD in combination with the hemophilic characteristics of Gardnerella vaginalis. A significant prevalence of papilloma and trichomonas was also noted for women using IUD as opposed to those oral contraceptives. The results demonstrate the necessity of frequent clinical attendance and laboratory tests for women using contraceptive methods, particularly the IUD. PMID:12282423

  11. User-Intention Based Program Analysis for Android Security

    Elish, Karim Omar Mahmoud

    2015-01-01

    The number of mobile applications (i.e., apps) is rapidly growing, as the mobile computing becomes an integral part of the modern user experience. Malicious apps have infiltrated open marketplaces for mobile platforms. These malicious apps can exfiltrate user's private data, abuse of system resources, or disrupting regular services. Despite the recent advances on mobile security, the problem of detecting vulnerable and malicious mobile apps with high detection accuracy remains an open problem...

  12. Analysis of the Navigation Behavior of the Users' using Grey Relational Pattern Analysis with Markov Chains

    BINDU MADHURI .Ch,

    2010-10-01

    Full Text Available Generally user page visits are sequential in nature. The large number of Web pages on many Web sites has raised navigational problems. Markov chains have been used to model user sequential navigational behavior on the World Wide Web (WWW.The enormous growth in the number of documents in the WWW increases the need for improved link navigation and path analysis models. Link prediction and path analysis are important problems with a wide range of applications ranging from personalization to websites. The complete size of the WWW coupled with the variation in users' navigation patterns makes this a very difficult sequence modeling problem. This paper generalizes the concept of grey relational analysis to develop a technique, called grey relational pattern analysis associated with Markov chains for sequential web data, for analyzing the similarity between given patterns. Based on this technique, a clustering algorithm” Grey Clustering algorithm for Sequential Data” is proposed to finding cluster of a given data set .The problem of determining the optimal number of clusters . We develop an evaluationframework in which the Sum of Squared Error (SSE is calculated to get the efficiency of proposed algorithm. The analyzed behavior of the users used in application areas for Web usage mining Personalization, System Improvement, Site Modification, Business Intelligence, and Usage Characterization.

  13. An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users

    Hong Zhong

    2015-01-01

    Full Text Available In a traditional network, server load balancing is used to satisfy the demand for high data volumes. The technique requires large capital investment while offering poor scalability and flexibility, which difficultly supports highly dynamic workload demands from massive mobile users. To solve these problems, this paper analyses the principle of software-defined networking (SDN and presents a new probabilistic method of load balancing based on variance analysis. The method can be used to dynamically manage traffic flows for supporting massive mobile users in SDN networks. The paper proposes a solution using the OpenFlow virtual switching technology instead of the traditional hardware switching technology. A SDN controller monitors data traffic of each port by means of variance analysis and provides a probability-based selection algorithm to redirect traffic dynamically with the OpenFlow technology. Compared with the existing load balancing methods which were designed to support traditional networks, this solution has lower cost, higher reliability, and greater scalability which satisfy the needs of mobile users.

  14. Large Scale Management of Physicists Personal Analysis Data Without Employing User and Group Quotas

    Norman, A.; Diesbug, M.; Gheith, M.; Illingworth, R.; Lyon, A.; Mengel, M.

    2015-12-01

    The ability of modern HEP experiments to acquire and process unprecedented amounts of data and simulation have lead to an explosion in the volume of information that individual scientists deal with on a daily basis. Explosion has resulted in a need for individuals to generate and keep large personal analysis data sets which represent the skimmed portions of official data collections, pertaining to their specific analysis. While a significant reduction in size compared to the original data, these personal analysis and simulation sets can be many terabytes or 10s of TB in size and consist of 10s of thousands of files. When this personal data is aggregated across the many physicists in a single analysis group or experiment it can represent data volumes on par or exceeding the official production samples which require special data handling techniques to deal with effectively. In this paper we explore the changes to the Fermilab computing infrastructure and computing models which have been developed to allow experimenters to effectively manage their personal analysis data and other data that falls outside of the typically centrally managed production chains. In particular we describe the models and tools that are being used to provide the modern neutrino experiments like NOvA with storage resources that are sufficient to meet their analysis needs, without imposing specific quotas on users or groups of users. We discuss the storage mechanisms and the caching algorithms that are being used as well as the toolkits are have been developed to allow the users to easily operate with terascale+ datasets.

  15. ERP Software Evaluation and Comparative Analysis

    Kalpic, Damir; Fertalj, Kresimir

    2004-01-01

    This paper presents the results of an investigation performed in 2001 under the title Comparative Analysis of Information Systems Software in Croatia. The focus was set on the comparative analysis of domestic and foreign Enterprise Resource Planning (ERP) software, which is present in Croatia. The investigation was performed from the standpoint of ERP applicability, regardless of the development methods and information technology. In other words, the evaluation was performed primarily from th...

  16. FISCAL DISCIPLINE WITHIN THE EU: COMPARATIVE ANALYSIS

    SORIN CELEA

    2013-12-01

    Full Text Available This paper focuses on the analysis of the convergence indicators relative to fiscal area in the EU; subsequent to a description of the main peculiarities of the convergence criteria, the reseach develops a critical analysis on a comparative perspective of the actual values of fiscal convergence indicators registered in EU countries compared with the reference values of the indicators, with emphasis on the differences between emerging and developed countries.

  17. SALOME. Software for the analysis of lines or multiplets from Extrap. User's guide

    This user's guide describes the centre piece of spectral analysis programs for Extrap-T1. The method for spectral analysis is presented theoretically. It also presents the actual use of the program PROBESCHUSS and how to work on the multiplet library. The present user's guide is about PROBESCHUSS 2.1 and MULTIFIT 2.0. 7 figs, 5 appendices

  18. Comparative Environmental Threat Analysis: Three Case Studies.

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  19. Analysis of payment cards in terms of user

    Čechová, Jana

    2012-01-01

    The main goal of this thesis is to assess people’s knowledge of payment cards for those that already have one or are considering getting one, and to establish a profile of a normal cardholder. Another goal of this thesis is to perform a comparative analysis of three banks on the Czech banking market from the perspective of selected types of fees billed for card services, and from these three, to select the bank with the most favourable fees from the perspective of the customer. Bibliograph...

  20. Analysis of diversified concept of users on the energy service

    Ono, Kenji; Morikiyo, Takashi

    1987-09-10

    On the basis of rapid environmental change in the electrical business, fine and delicate service on the user's side is desired to be adopted as well as the conventional abundunt, cheap, and stable power supply. By conducting a questionaire survey during 1986-1987 throughout the country, features of the concept and needs of the users concerning the energy service were clarified. The results of survey were as follows: (1) Determining factor for the image of energy is such benefit factors as comfort and cleanliness as such cost factors as economy and energy-saving. (2) Diversified life styles of the users were extracted to find concepts and needs of the respective life style. (3) Middle-aged housewives especially regard electicity as a costly energy than other energies although it is comfortable and clean. (7 figs, 3 tabs, 4 refs)

  1. Comparing writing style feature-based classification methods for estimating user reputations in social media.

    Suh, Jong Hwan

    2016-01-01

    In recent years, the anonymous nature of the Internet has made it difficult to detect manipulated user reputations in social media, as well as to ensure the qualities of users and their posts. To deal with this, this study designs and examines an automatic approach that adopts writing style features to estimate user reputations in social media. Under varying ways of defining Good and Bad classes of user reputations based on the collected data, it evaluates the classification performance of the state-of-art methods: four writing style features, i.e. lexical, syntactic, structural, and content-specific, and eight classification techniques, i.e. four base learners-C4.5, Neural Network (NN), Support Vector Machine (SVM), and Naïve Bayes (NB)-and four Random Subspace (RS) ensemble methods based on the four base learners. When South Korea's Web forum, Daum Agora, was selected as a test bed, the experimental results show that the configuration of the full feature set containing content-specific features and RS-SVM combining RS and SVM gives the best accuracy for classification if the test bed poster reputations are segmented strictly into Good and Bad classes by portfolio approach. Pairwise t tests on accuracy confirm two expectations coming from the literature reviews: first, the feature set adding content-specific features outperform the others; second, ensemble learning methods are more viable than base learners. Moreover, among the four ways on defining the classes of user reputations, i.e. like, dislike, sum, and portfolio, the results show that the portfolio approach gives the highest accuracy. PMID:27006870

  2. Data oriented job submission scheme for the PHENIX user analysis in CCJ

    The RIKEN Computing Center in Japan (CCJ) has been developed to make it possible analyzing huge amount of data corrected by the PHENIX experiment at RHIC. The corrected raw data or reconstructed data are transferred via SINET3 with 10 Gbps bandwidth from Brookheaven National Laboratory (BNL) by using GridFTP. The transferred data are once stored in the hierarchical storage management system (HPSS) prior to the user analysis. Since the size of data grows steadily year by year, concentrations of the access request to data servers become one of the serious bottlenecks. To eliminate this I/O bound problem, 18 calculating nodes with total 180 TB local disks were introduced to store the data a priori. We added some setup in a batch job scheduler (LSF) so that user can specify the requiring data already distributed to the local disks. The locations of data are automatically obtained from a database, and jobs are dispatched to the appropriate node which has the required data. To avoid the multiple access to a local disk from several jobs in a node, techniques of lock file and access control list are employed. As a result, each job can handle a local disk exclusively. Indeed, the total throughput was improved drastically as compared to the preexisting nodes in CCJ, and users can analyze about 150 TB data within 9 hours. We report this successful job submission scheme and the feature of the PC cluster.

  3. Transportation Routing Analysis Geographic Information System (TRAGIS) User's Manual

    Johnson, PE

    2003-09-18

    The Transportation Routing Analysis Geographic Information System (TRAGIS) model is used to calculate highway, rail, or waterway routes within the United States. TRAGIS is a client-server application with the user interface and map data files residing on the user's personal computer and the routing engine and network data files on a network server. The user's manual provides documentation on installation and the use of the many features of the model.

  4. User satisfaction-based quality evaluation model and survey analysis of network information service

    LEI; Xue; JIAO; Yuying

    2009-01-01

    On the basis of user satisfaction,authors made research hypotheses by learning from relevant e-service quality evaluation models.A questionnaire survey was then conducted on some content-based websites in terms of their convenience,information quality,personalization and site aesthetics,which may affect the overall satisfaction of users.Statistical analysis was also made to build a user satisfaction-based quality evaluation system of network information service.

  5. THE COMPARATIVE ANALYSIS OF ECOLOGICAL INDICATORS

    Bikova E.V.

    2006-04-01

    Full Text Available The comparative analysis of ecological indicators designed and specified for Moldova and similar indicators of the countries of CIS is made in the work. Some general items of information about power systems of the countries of CIS (the established capacities, manufacture of the electric power are given, the analysis of dynamics of emissions GHG- СО2, NOx, SO2 in Moldova and comparison with the emissions level in other countries of CIS is made.

  6. Comparative analysis of black carbon in soils

    Schmidt, Michael W I; Skjemstad, Jan O.; Czimczik, Claudia I.; Glaser, Bruno; Prentice, Ken M; Gelinas, Yves; Thomas A.J. Kuhlbusch

    2001-01-01

    Black carbon (BC), produced by incomplete combustion of fossil fuels and vegetation, occurs ubiquitously in soils and sediments. BC exists as a continuum from partly charred material to highly graphitized soot particles, with no general agreement on clear-cut boundaries of definition or analysis. In a comparative analysis, we measured BC forms in eight soil samples by six established methods. All methods involved removal of the non-BC components from the sample by thermal or chemical means or...

  7. Creating Awareness Through Personel Informatics Systems User Expectations Analysis

    Armağan Kuru

    2013-12-01

    Full Text Available In many publications, healthy diet and re-gular exercise are reported to be the biggest inhibitors of health problems. In recent years, with the developments in technology, health research has been one of the focal topics of interdisciplinary studies. Most of these are the research and design aim to encourage people to be healthy through creating awareness and behavioral change. The technologies that are new for users, and are in rapid improvement, are open to several unanswered questions. The aim of this article is to determine the criteria that are required to change people’s behavior through technology and put emphasis on the importance of related work. With the potentials of these systems which are new in our country, this article focuses on the current studies, the current state of technology and user expectations and all will be discussed from the point of view of the designers and medical doctors

  8. Creating Awareness Through Personel Informatics Systems User Expectations Analysis

    Armağan Kuru; Çiğdem Erbuğ; Mehmet Tümer

    2013-01-01

    In many publications, healthy diet and re-gular exercise are reported to be the biggest inhibitors of health problems. In recent years, with the developments in technology, health research has been one of the focal topics of interdisciplinary studies. Most of these are the research and design aim to encourage people to be healthy through creating awareness and behavioral change. The technologies that are new for users, and are in rapid improvement, are open to several unanswered questions. Th...

  9. User Movement Behavior Analysis in Mobile Service Environment

    Mohbey Krishna K.; Thakur G.S.

    2013-01-01

    Mobile services are very important and useful to users for accessing desired information as well as performing some transactions. There are different kinds of mobile services which are used using the mobile devices. These mobile services are capable to mine the required knowledge from the huge amount of data. In this paper, mobile access pattern generation approach is proposed, which has capability to generate strong patterns between the four different parameters called mobile use...

  10. Analysis and Improvement of a User Authentication Improved Protocol

    Zuowen Tan

    2010-05-01

    Full Text Available Remote user authentication always adopts the method of password to login the server within insecure network environments. Recently, Peyravin and Jeffries proposed a practical authentication scheme based on one-way collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. In order to remove the weakness, Hölbl, Welzer and Brumenn presented an improved secure password-based protocols for remote user authentication, password change and session key establishment.  Unfortunately, the remedies of their improved scheme cannot work. The improved scheme still suffers from the off-line attacks. And the password change protocol is insecure against Denial-of-Service attack. A proposed scheme is presented which overcomes these weaknesses. Detailed cryanalysis show that the proposed password-based protocols for remote user authentication, password change and session key establishment are immune against man-in-the-middle attacks, replay attacks, password guessing attacks, outsider attacks, denial-of-Service attacks and impersonation attacks.

  11. Risk analysis and user satisfaction after implementation of computerized physician order entry in Dutch hospitals

    van der Veen, Willem; de Gier, Han J. J.; van der Schaaf, Tjerk; Taxis, Katja; van den Bemt, Patricia M. L. A.

    2013-01-01

    Background Computerized physician order entry (CPOE) in hospitals is widely considered to be important for patient safety, but implementation is lagging behind and user satisfaction is often low. Risk analysis methods may improve the implementation process and thus user satisfaction. Objective The a

  12. It Leaks More Than You Think: Fingerprinting Users from Web Traffic Analysis

    Xujing Huang

    2015-12-01

    Full Text Available We show how, in real-world web applications, confidential information about user identities can be leaked through “non-intuitive communications”, in particular web traffic which appear to be not related to the user information. In fact, our experiments on Google users demonstrate that even Google accounts are vulnerable on traffic attacks against user identities, using packet sizes and directions. And this work shows this kind of non-intuitive communication can leak even more information about user identities than the traffic explicitly using confidential information. Our work highlights possible side-channel leakage through cookies and more generally discovers fingerprints in web traffic which can improve the probability of correctly guessing a user identity. Our analysis is motivated by Hidden Markov Model, distance metric and guessing probability to analyse and evaluate these side-channel vulnerabilities.

  13. Tracking and Analysis Framework (TAF) model documentation and user`s guide

    Bloyd, C.; Camp, J.; Conzelmann, G. [and others

    1996-12-01

    With passage of the 1990 Clean Air Act Amendments, the United States embarked on a policy for controlling acid deposition that has been estimated to cost at least $2 billion. Title IV of the Act created a major innovation in environmental regulation by introducing market-based incentives - specifically, by allowing electric utility companies to trade allowances to emit sulfur dioxide (SO{sub 2}). The National Acid Precipitation Assessment Program (NAPAP) has been tasked by Congress to assess what Senator Moynihan has termed this {open_quotes}grand experiment.{close_quotes} Such a comprehensive assessment of the economic and environmental effects of this legislation has been a major challenge. To help NAPAP face this challenge, the U.S. Department of Energy (DOE) has sponsored development of an integrated assessment model, known as the Tracking and Analysis Framework (TAF). This section summarizes TAF`s objectives and its overall design.

  14. Sentiment Analysis of User-Generated Content on Drug Review Websites

    Na, Jin-Cheon

    2015-03-01

    Full Text Available This study develops an effective method for sentiment analysis of user-generated content on drug review websites, which has not been investigated extensively compared to other general domains, such as product reviews. A clause-level sentiment analysis algorithm is developed since each sentence can contain multiple clauses discussing multiple aspects of a drug. The method adopts a pure linguistic approach of computing the sentiment orientation (positive, negative, or neutral of a clause from the prior sentiment scores assigned to words, taking into consideration the grammatical relations and semantic annotation (such as disorder terms of words in the clause. Experiment results with 2,700 clauses show the effectiveness of the proposed approach, and it performed significantly better than the baseline approaches using a machine learning approach. Various challenging issues were identified and discussed through error analysis. The application of the proposed sentiment analysis approach will be useful not only for patients, but also for drug makers and clinicians to obtain valuable summaries of public opinion. Since sentiment analysis is domain specific, domain knowledge in drug reviews is incorporated into the sentiment analysis algorithm to provide more accurate analysis. In particular, MetaMap is used to map various health and medical terms (such as disease and drug names to semantic types in the Unified Medical Language System (UMLS Semantic Network.

  15. National Launch System comparative economic analysis

    Prince, A.

    1992-01-01

    Results are presented from an analysis of economic benefits (or losses), in the form of the life cycle cost savings, resulting from the development of the National Launch System (NLS) family of launch vehicles. The analysis was carried out by comparing various NLS-based architectures with the current Shuttle/Titan IV fleet. The basic methodology behind this NLS analysis was to develop a set of annual payload requirements for the Space Station Freedom and LEO, to design launch vehicle architectures around these requirements, and to perform life-cycle cost analyses on all of the architectures. A SEI requirement was included. Launch failure costs were estimated and combined with the relative reliability assumptions to measure the effects of losses. Based on the analysis, a Shuttle/NLS architecture evolving into a pressurized-logistics-carrier/NLS architecture appears to offer the best long-term cost benefit.

  16. Chipster: user-friendly analysis software for microarray and other high-throughput data

    Scheinin Ilari

    2011-10-01

    Full Text Available Abstract Background The growth of high-throughput technologies such as microarrays and next generation sequencing has been accompanied by active research in data analysis methodology, producing new analysis methods at a rapid pace. While most of the newly developed methods are freely available, their use requires substantial computational skills. In order to enable non-programming biologists to benefit from the method development in a timely manner, we have created the Chipster software. Results Chipster (http://chipster.csc.fi/ brings a powerful collection of data analysis methods within the reach of bioscientists via its intuitive graphical user interface. Users can analyze and integrate different data types such as gene expression, miRNA and aCGH. The analysis functionality is complemented with rich interactive visualizations, allowing users to select datapoints and create new gene lists based on these selections. Importantly, users can save the performed analysis steps as reusable, automatic workflows, which can also be shared with other users. Being a versatile and easily extendable platform, Chipster can be used for microarray, proteomics and sequencing data. In this article we describe its comprehensive collection of analysis and visualization tools for microarray data using three case studies. Conclusions Chipster is a user-friendly analysis software for high-throughput data. Its intuitive graphical user interface enables biologists to access a powerful collection of data analysis and integration tools, and to visualize data interactively. Users can collaborate by sharing analysis sessions and workflows. Chipster is open source, and the server installation package is freely available.

  17. Aviation System Analysis Capability Quick Response System Report Server User's Guide

    Roberts, Eileen R.; Villani, James A.; Wingrove, Earl R., III

    1996-01-01

    This report is a user's guide for the Aviation System Analysis Capability Quick Response System (ASAC QRS) Report Server. The ASAC QRS is an automated online capability to access selected ASAC models and data repositories. It supports analysis by the aviation community. This system was designed by the Logistics Management Institute for the NASA Ames Research Center. The ASAC QRS Report Server allows users to obtain information stored in the ASAC Data Repositories.

  18. Dashboard Task Monitor for Managing ATLAS User Analysis on the Grid

    Sargsyan, L.; Andreeva, J.; Jha, M.; Karavakis, E.; Kokoszkiewicz, L.; Saiz, P.; Schovancova, J.; Tuckett, D.; Atlas Collaboration

    2014-06-01

    The organization of the distributed user analysis on the Worldwide LHC Computing Grid (WLCG) infrastructure is one of the most challenging tasks among the computing activities at the Large Hadron Collider. The Experiment Dashboard offers a solution that not only monitors but also manages (kill, resubmit) user tasks and jobs via a web interface. The ATLAS Dashboard Task Monitor provides analysis users with a tool that is independent of the operating system and Grid environment. This contribution describes the functionality of the application and its implementation details, in particular authentication, authorization and audit of the management operations.

  19. Dashboard Task Monitor for managing ATLAS user analysis on the Grid

    Sargsyan, L; The ATLAS collaboration; Jha, M; Karavakis, E; Kokoszkiewicz, L; Saiz, P; Schovancova, J; Tuckett, D

    2013-01-01

    The organization of the distributed user analysis on the Worldwide LHC Computing Grid (WLCG) infrastructure is one of the most challenging tasks among the computing activities at the Large Hadron Collider. The Experiment Dashboard offers a solution that not only monitors but also manages (kill, resubmit) user tasks and jobs via a web interface. The ATLAS Dashboard Task Monitor provides analysis users with a tool that is operating system and GRID environment independent. This contribution describes the functionality of the application and its implementation details, in particular authentication, authorization and audit of the management operations.

  20. Dashboard task monitor for managing ATLAS user analysis on the grid

    The organization of the distributed user analysis on the Worldwide LHC Computing Grid (WLCG) infrastructure is one of the most challenging tasks among the computing activities at the Large Hadron Collider. The Experiment Dashboard offers a solution that not only monitors but also manages (kill, resubmit) user tasks and jobs via a web interface. The ATLAS Dashboard Task Monitor provides analysis users with a tool that is independent of the operating system and Grid environment. This contribution describes the functionality of the application and its implementation details, in particular authentication, authorization and audit of the management operations.

  1. WASP (Wavelet Analysis of Secondary Particles Angular Distributions) package. Version 1.0. User's guide

    WASP package is a C++ program aimed to analyze angular distributions of secondary particles generated in nuclear interactions. (WASP is designed for data analysis of the STAR and ALICE experiments). It uses a wavelet analysis for this purpose and the vanishing momentum or gaussian wavelets are chosen for transformations. WASP provides an user-friendly Graphical User Interface (GUI) which makes it quite simple to use. WASP design, a brief description of the used wavelet transformation algorithm and GUI are presented in this user's guide

  2. Chronic illness and multimorbidity among problem drug users: a comparative cross sectional pilot study in primary care.

    Cullen, Walter

    2009-01-01

    BACKGROUND: Although multimorbidity has important implications for patient care in general practice, limited research has examined chronic illness and health service utilisation among problem drug users. This study aimed to determine chronic illness prevalence and health service utilisation among problem drug users attending primary care for methadone treatment, to compare these rates with matched \\'controls\\' and to develop and pilot test a valid study instrument. METHODS: A cross-sectional study of patients attending three large urban general practices in Dublin, Ireland for methadone treatment was conducted, and this sample was compared with a control group matched by practice, age, gender and General Medical Services (GMS) status. RESULTS: Data were collected on 114 patients. Fifty-seven patients were on methadone treatment, of whom 52(91%) had at least one chronic illness (other then substance use) and 39(68%) were prescribed at least one regular medication. Frequent utilisation of primary care services and secondary care services in the previous six months was observed among patients on methadone treatment and controls, although the former had significantly higher chronic illness prevalence and primary care contact rates. The study instrument facilitated data collection that was feasible and with minimal inter-observer variation. CONCLUSION: Multimorbidity is common among problem drug users attending general practice for methadone treatment. Primary care may therefore have an important role in primary and secondary prevention of chronic illnesses among this population. This study offers a feasible study instrument for further work on this issue. (238 words).

  3. Chronic illness and multimorbidity among problem drug users: a comparative cross sectional pilot study in primary care.

    Cullen, Walter

    2012-02-01

    BACKGROUND: Although multimorbidity has important implications for patient care in general practice, limited research has examined chronic illness and health service utilisation among problem drug users. This study aimed to determine chronic illness prevalence and health service utilisation among problem drug users attending primary care for methadone treatment, to compare these rates with matched \\'controls\\' and to develop and pilot test a valid study instrument. METHODS: A cross-sectional study of patients attending three large urban general practices in Dublin, Ireland for methadone treatment was conducted, and this sample was compared with a control group matched by practice, age, gender and General Medical Services (GMS) status. RESULTS: Data were collected on 114 patients. Fifty-seven patients were on methadone treatment, of whom 52(91%) had at least one chronic illness (other then substance use) and 39(68%) were prescribed at least one regular medication. Frequent utilisation of primary care services and secondary care services in the previous six months was observed among patients on methadone treatment and controls, although the former had significantly higher chronic illness prevalence and primary care contact rates. The study instrument facilitated data collection that was feasible and with minimal inter-observer variation. CONCLUSION: Multimorbidity is common among problem drug users attending general practice for methadone treatment. Primary care may therefore have an important role in primary and secondary prevention of chronic illnesses among this population. This study offers a feasible study instrument for further work on this issue. (238 words).

  4. Comparative analysis of twelve Dothideomycete plant pathogens

    Ohm, Robin; Aerts, Andrea; Salamov, Asaf; Goodwin, Stephen B.; Grigoriev, Igor

    2011-03-11

    The Dothideomycetes are one of the largest and most diverse groups of fungi. Many are plant pathogens and pose a serious threat to agricultural crops grown for biofuel, food or feed. Most Dothideomycetes have only a single host and related Dothideomycete species can have very diverse host plants. Twelve Dothideomycete genomes have currently been sequenced by the Joint Genome Institute and other sequencing centers. They can be accessed via Mycocosm which has tools for comparative analysis

  5. Comparative Analysis of Terrorists’ Communication Strategies

    Denis Alexandrovich Zhuravliev

    2015-01-01

    There is a wide-spread approach in a research literature to regard terrorism as a communicative process. From this point of view, the author offers a comparative analysis of the three most common communication strategies of terrorist groups, including transforming the role of the mass media, the Internet and a combined approach. The author also argues that a particular communication strategy determines a structure of a terrorist organization.

  6. Comparative Analysis of VNSA Complex Engineering Efforts

    Gary Ackerman

    2016-01-01

    The case studies undertaken in this special issue demonstrate unequivocally that, despite being forced to operate clandestinely and facing the pressures of security forces seeking to hunt them down and neutralize them, at least a subset of violent non-state actors (VNSAs) are capable of some genuinely impressive feats of engineering. At the same time, success in such endeavours is not guaranteed and VNSAs will undoubtedly face a number of obstacles along the way. A comparative analysis of the...

  7. ANALYSIS AND COMPARATIVE STUDY OF SEARCHING TECHNIQUES

    Yuvraj Singh Chandrawat*

    2015-01-01

    We live in the age of technolgy and it is quiet obvious that it is increasing day-by-day endlessly. In this technical era researchers are focusing on the development of the existing technologies. Software engineering is the dominant branch of Computer Science that deals with the development and analysis of the software. The objective of this study is to analyze and compare the existing searching algorithms (linear search and binary search). In this paper, we will discuss both thes...

  8. Comparative analysis of enterprise architecture frameworks

    Oblak, Danica

    2012-01-01

    Today's enterprises are facing a competitive power in the dynamically changing business environment. With increasing complexity of enterprise, enterprise architecture have become an important field. Creating an enterprise architecture can be complex task, so enterprise architecture framework were created to simplify the process and guide an architect through all areas of architecture development. This study concentrates on the comparative analysis of enterprise architecture frameworks. T...

  9. Fundus camera systems: a comparative analysis

    DeHoog, Edward; Schwiegerling, James

    2009-01-01

    Retinal photography requires the use of a complex optical system, called a fundus camera, capable of illuminating and imaging the retina simultaneously. The patent literature shows two design forms but does not provide the specifics necessary for a thorough analysis of the designs to be performed. We have constructed our own designs based on the patent literature in optical design software and compared them for illumination efficiency, image quality, ability to accommodate for patient refract...

  10. User Behavior Analysis from Web Log using Log Analyzer Tool

    Brijesh Bakariya

    2013-11-01

    Full Text Available Now a day, internet plays a role of huge database in which many websites, information and search engines are available. But due to unstructured and semi-structured data in webpage, it has become a challenging task to extract relevant information. Its main reason is that traditional knowledge based technique are not correct to efficiently utilization the knowledge, because it consist of many discover pattern, contains a lots of noise and uncertainty. In this paper, analyzing of web usage mining has been made with the help if web log data for which web log analyzer tool, “Deep Log Analyzer” to find out abstract information from particular server and also tried to find out the user behavior and also developed an ontology which consist the relation among efficient web apart of web usage mining.

  11. Premo and Kansei: A Comparative Analysis

    Anitawati Mohd Lokman; Khairul Khalil Ishak; Ana Hadiana

    2013-01-01

    Kansei Engineering is a technology that enables incorporation of human emotion in design requirements. It has in its perspective that Kansei is unique for different domain and unique for different target user group, and use mainly a verbal measurement instruments in its methodology. The technology is seen to have little shortcoming when there is a need to build universal design for universal target user. It will involve complexity when handling semantics since people do not speak the same lan...

  12. Vegetation Change Analysis User's Manual

    D. J. Hansen; W. K. Ostler

    2002-10-01

    Approximately 70 percent of all U.S. military training lands are located in arid and semi-arid areas. Training activities in such areas frequently adversely affect vegetation, damaging plants and reducing the resilience of vegetation to recover once disturbed. Fugitive dust resulting from a loss of vegetation creates additional problems for human health, increasing accidents due to decreased visibility, and increasing maintenance costs for roads, vehicles, and equipment. Diagnostic techniques are needed to identify thresholds of sustainable military use. A cooperative effort among U.S. Department of Energy, U.S. Department of Defense, and selected university scientists was undertaken to focus on developing new techniques for monitoring and mitigating military impacts in arid lands. This manual focuses on the development of new monitoring techniques that have been implemented at Fort Irwin, California. New mitigation techniques are described in a separate companion manual. This User's Manual is designed to address diagnostic capabilities needed to distinguish between various degrees of sustainable and nonsustainable impacts due to military training and testing and habitat-disturbing activities in desert ecosystems. Techniques described here focus on the use of high-resolution imagery and the application of image-processing techniques developed primarily for medical research. A discussion is provided about the measurement of plant biomass and shrub canopy cover in arid. lands using conventional methods. Both semiquantitative methods and quantitative methods are discussed and reference to current literature is provided. A background about the use of digital imagery to measure vegetation is presented.

  13. Inpatient care in Kazakhstan: A comparative analysis

    Ainur B Kumar

    2013-01-01

    Full Text Available Background: Reforms in inpatient care are critical for the enhancement of the efficiency of health systems. It still remains the main costly sector of the health system, accounting for more than 60% of all expenditures. Inappropriate and ineffective use of the hospital infrastructure is also a big issue. We aimed to analyze statistical data on health indices and dynamics of the hospital stock in Kazakhstan in comparison with those of developed countries. Materials and Methods: Study design is comparative quantitative analysis of inpatient care indicators. We used information and analytical methods, content analysis, mathematical treatment, and comparative analysis of statistical data on health system and dynamics of hospital stock in Kazakhstan and some other countries of the world [Organization for Economic Cooperation and Development (OECD, USA, Canada, Russia, China, Japan, and Korea] over the period 2001-2011. Results : Despite substantial and continuous reductions over the past 10 years, hospitalization rates in Kazakhstan still remain high compared to some developed countries, including those of the OECD. In fact, the hospital stay length for all patients in Kazakhstan in 2011 is around 9.9 days, hospitalization ratio per 100 people is 16.3, and hospital beds capacity is 100 per 10,000 inhabitants. Conclusion: The decreased level of beds may adversely affect both medical organization and health system operations. Alternatives to the existing inpatient care are now being explored. The introduction of the unified national healthcare system allows shifting the primary focus on primary care organizations, which can decrease the demand on inpatient care as a result of improving the health status of people at the primary care level.

  14. Comparative analysis of black carbon in soils

    Schmidt, Michael W. I.; Skjemstad, Jan O.; Czimczik, Claudia I.; Glaser, Bruno; Prentice, Ken M.; Gelinas, Yves; Kuhlbusch, Thomas A. J.

    2001-03-01

    Black carbon (BC), produced by incomplete combustion of fossil fuels and vegetation, occurs ubiquitously in soils and sediments. BC exists as a continuum from partly charred material to highly graphitized soot particles, with no general agreement on clear-cut boundaries of definition or analysis. In a comparative analysis, we measured BC forms in eight soil samples by six established methods. All methods involved removal of the non-BC components from the sample by thermal or chemical means or a combination of both. The remaining carbon, operationally defined as BC, was quantified via mass balance, elemental composition or by exploiting benzenecarboxylic acids as molecular markers or applying 13C MAS NMR (magic angle spinning nuclear magnetic resonance) spectroscopy. BC concentrations measured for individual samples vary over 2 orders of magnitude (up to a factor of 571). One possible explanation for this wide range of results is that the individual BC methods rely on operational definitions with clear-cut but different boundaries and developed for specific scientific questions, whereas BC represents a continuum of materials with widely contrasting physicochemical properties. Thus the methods are inherently designed to analytically determine different parts of the continuum, and it is crucial to know how measurements made by different techniques relate to each other. It is clear from this preliminary comparative analysis that a collection of BC reference materials should be established as soon as possible 1 ) to ensure long-term intralaboratory and interlaboratory data quality and 2) to facilitate comparative analyses between different analytical techniques and scientific approaches

  15. A Comparative Study on Error Analysis

    Wu, Xiaoli; Zhang, Chun

    2015-01-01

    of errors in the written and spoken production of L2 learners has a long tradition in L2 pedagogy. Yet, in teaching and learning Chinese as a foreign language (CFL), only handful studies have been made either to define the ‘error’ in a pedagogically insightful way or to empirically investigate the...... occurrence of errors either in linguistic or pedagogical terms. The purpose of the current study is to demonstrate the theoretical and practical relevance of error analysis approach in CFL by investigating two cases - (1) Belgian (L1) learners’ use of Chinese (L2) comparative sentences in written production...

  16. Comparative Analysis of Virtual Education Applications

    Kurt, Mehmet

    2006-01-01

    The research was conducted in order to make comparative analysis of virtual education applications. The research is conducted in survey model. The study group consists of total 300 institutes providing virtual education in the fall, spring and summer semesters of 2004; 246 in USA, 10 in Australia, 3 in South Africa, 10 in India, 21 in UK, 6 in Japan, 4 in Turkey. The information has been collected by online questionnaire sent to the target mass by e-mail. The questionnaire has been developed ...

  17. EXPOSURE ANALYSIS MODELING SYSTEM (EXAMS): USER MANUAL AND SYSTEM DOCUMENTATION

    The Exposure Analysis Modeling System, first published in 1982 (EPA-600/3-82-023), provides interactive computer software for formulating aquatic ecosystem models and rapidly evaluating the fate, transport, and exposure concentrations of synthetic organic chemicals - pesticides, ...

  18. Modelling User-Costs in Life Cycle Cost-Benefit (LCCB) analysis

    Thoft-Christensen, Palle

    2008-01-01

    The importance of including user's costs in Life-Cycle Cost-Benefit analysis of structures is discussed in this paper. This is especially for bridges of great importance. Repair or/and failure of a bridge will usually result in user costs greater than the repair or replacement costs of the bridge....... For the society (and the user's) it is therefore of great importance that maintenance or replacement of a bridge is performed in such a way that all costs are minimized - not only the owners cost....

  19. Exploratory factor analysis and reliability analysis with missing data: A simple method for SPSS users

    Bruce Weaver

    2014-09-01

    Full Text Available Missing data is a frequent problem for researchers conducting exploratory factor analysis (EFA or reliability analysis. The SPSS FACTOR procedure allows users to select listwise deletion, pairwise deletion or mean substitution as a method for dealing with missing data. The shortcomings of these methods are well-known. Graham (2009 argues that a much better way to deal with missing data in this context is to use a matrix of expectation maximization (EM covariances(or correlations as input for the analysis. SPSS users who have the Missing Values Analysis add-on module can obtain vectors ofEM means and standard deviations plus EM correlation and covariance matrices via the MVA procedure. But unfortunately, MVA has no /MATRIX subcommand, and therefore cannot write the EM correlations directly to a matrix dataset of the type needed as input to the FACTOR and RELIABILITY procedures. We describe two macros that (in conjunction with an intervening MVA command carry out the data management steps needed to create two matrix datasets, one containing EM correlations and the other EM covariances. Either of those matrix datasets can then be used asinput to the FACTOR procedure, and the EM correlations can also be used as input to RELIABILITY. We provide an example that illustrates the use of the two macros to generate the matrix datasets and how to use those datasets as input to the FACTOR and RELIABILITY procedures. We hope that this simple method for handling missing data will prove useful to both students andresearchers who are conducting EFA or reliability analysis.

  20. Understanding users

    Johannsen, Carl Gustav Viggo

    2014-01-01

    Segmentation of users can help libraries in the process of understanding user similarities and differences. Segmentation can also form the basis for selecting segments of target users and for developing tailored services for specific target segments. Several approaches and techniques have been te...... segmentation project using computer-generated clusters. Compared to traditional marketing texts, this article also tries to identify user segments or images or metaphors by the library profession itself.......Segmentation of users can help libraries in the process of understanding user similarities and differences. Segmentation can also form the basis for selecting segments of target users and for developing tailored services for specific target segments. Several approaches and techniques have been...... tested in library contexts and the aim of this article is to identify the main approaches and to discuss their perspectives, including their strenghts and weaknesses in, especially, public library contexts. The purpose is also to prsent and discuss the results of a recent - 2014 - Danish library user...

  1. User's guide for 10 CFR 61 impact analysis codes

    This document explains how to use the Impact Analysis Codes used in the Draft Environmental Impact Statement (DEIS) (NUREG-0782, Vol. 1-4) supporting 10 CFR 61, Licensing Requirements for Land Disposal of Radioactive Waste. The mathematical development of the impact Analysis Codes and other information necessary to understand the results of using the Codes is contained in the DEIS, and in a supporting document, Data Base for Radioactive Waste Management (NUREG/CR-1759, Vol. 1-3). This document was prepared with the intention of accompanying a computer magnetic tape containing the Impact Analysis Codes. A form is included at the end of this document which can be used to obtain such a tape

  2. HORECA. Hoger onderwijs reactor elementary core analysis system. User's manual

    HORECA is developed at IRI Delft for quick analysis of power distribution, burnup and safety for the HOR. It can be used for the manual search of a better loading of the reactor. HORECA is based on the Penn State Fuel Management Package and uses the MCRAC code included in this package as a calculation engine. (orig./HP)

  3. Comparative genome analysis of Basidiomycete fungi

    Riley, Robert; Salamov, Asaf; Henrissat, Bernard; Nagy, Laszlo; Brown, Daren; Held, Benjamin; Baker, Scott; Blanchette, Robert; Boussau, Bastien; Doty, Sharon L.; Fagnan, Kirsten; Floudas, Dimitris; Levasseur, Anthony; Manning, Gerard; Martin, Francis; Morin, Emmanuelle; Otillar, Robert; Pisabarro, Antonio; Walton, Jonathan; Wolfe, Ken; Hibbett, David; Grigoriev, Igor

    2013-08-07

    Fungi of the phylum Basidiomycota (basidiomycetes), make up some 37percent of the described fungi, and are important in forestry, agriculture, medicine, and bioenergy. This diverse phylum includes symbionts, pathogens, and saprotrophs including the majority of wood decaying and ectomycorrhizal species. To better understand the genetic diversity of this phylum we compared the genomes of 35 basidiomycetes including 6 newly sequenced genomes. These genomes span extremes of genome size, gene number, and repeat content. Analysis of core genes reveals that some 48percent of basidiomycete proteins are unique to the phylum with nearly half of those (22percent) found in only one organism. Correlations between lifestyle and certain gene families are evident. Phylogenetic patterns of plant biomass-degrading genes in Agaricomycotina suggest a continuum rather than a dichotomy between the white rot and brown rot modes of wood decay. Based on phylogenetically-informed PCA analysis of wood decay genes, we predict that that Botryobasidium botryosum and Jaapia argillacea have properties similar to white rot species, although neither has typical ligninolytic class II fungal peroxidases (PODs). This prediction is supported by growth assays in which both fungi exhibit wood decay with white rot-like characteristics. Based on this, we suggest that the white/brown rot dichotomy may be inadequate to describe the full range of wood decaying fungi. Analysis of the rate of discovery of proteins with no or few homologs suggests the value of continued sequencing of basidiomycete fungi.

  4. ATLAS user analysis on private cloud resources at GoeGrid

    Glaser, F.; Nadal Serrano, J.; Grabowski, J.; Quadt, A.

    2015-12-01

    User analysis job demands can exceed available computing resources, especially before major conferences. ATLAS physics results can potentially be slowed down due to the lack of resources. For these reasons, cloud research and development activities are now included in the skeleton of the ATLAS computing model, which has been extended by using resources from commercial and private cloud providers to satisfy the demands. However, most of these activities are focused on Monte-Carlo production jobs, extending the resources at Tier-2. To evaluate the suitability of the cloud-computing model for user analysis jobs, we developed a framework to launch an ATLAS user analysis cluster in a cloud infrastructure on demand and evaluated two solutions. The first solution is entirely integrated in the Grid infrastructure by using the same mechanism, which is already in use at Tier-2: A designated Panda-Queue is monitored and additional worker nodes are launched in a cloud environment and assigned to a corresponding HTCondor queue according to the demand. Thereby, the use of cloud resources is completely transparent to the user. However, using this approach, submitted user analysis jobs can still suffer from a certain delay introduced by waiting time in the queue and the deployed infrastructure lacks customizability. Therefore, our second solution offers the possibility to easily deploy a totally private, customizable analysis cluster on private cloud resources belonging to the university.

  5. Interactive user's application to Genie 2000 spectroscopy system for automation of hair neutron activation analysis

    reporting. Genie 2000 software is available in several variations and with several layered optional packages. Genie 2000 Basic Spectroscopy and Gamma Analysis Software, which available in RAC permitting us automatically obtain nuclide identification report with all needed parameters. Any applications of Genie 2000 software have not possibility to calculate analyzed elements concentration. For automation this step of INAA by using Canberra Genie 2000 Spectroscopy System we developed user's 'Human hair analysis Application' software for single comparator standard method of hair INAA. The work with the developed Application for GENIE-2000 begins with the menu, which contains four items. 1. Copying of the data. 2. Data input. 3. Viewing, editing and analyzing of the data. 4. EXIT. The item 'Copying of the data' makes copying the entered values of special user parameters from one data source into another. It is very user-friendly. It is enough to him once in one data source to enter values of necessary parameters (nuclides name, γ-lines value, factors of transformation for various times of an irradiation and cooling). Further, with the help of procedure 'Copying of the data' he can transfer them to any other data source. The item 'Data input' is carried out with the help of Graphical Batch Tools function GBTPARS and specially developed set of Form Design Specification (FDS) files for this function. This developed Application works in interactive environment as a dialogue system with user and allows calculating required nuclides concentration in analyzed samples, separately for long-lived, middle-lived and short-lived nuclides. Using the Nuclide Library Editor and comprehensive standard libraries of Genie package we created three custom libraries: Stdlib.HairL, Stdlib.HairM, Stdlib.HairS, accordingly for long-, middle- and short-lived nuclides. After processing of the next data source the Application returns the user to the menu. From here he can continue data processing, having

  6. CMS Configuration Editor: GUI based application for user analysis job definition

    De Cosa, Annapaola

    2010-01-01

    We present the user interface and the software architecture of the Configuration Editor that is used by CMS physicists to configure their physics analysis tasks. Analysis workflows typically involve execution of a sequence of algorithms, and these are implemented as software modules that are integrated within the CMS software framework (CMSSW). In particular, a set of common analysis tools is provided in the so-called CMS Physics Analysis Toolkit (PAT) and these need to be steered and configured during the execution of an analysis job. The Python scripting language is used to define the job configuration that drives the analysis workflow. Configuring analysis jobs can be quite a challenging task, particularly for newcomers, and therefore a graphical tool, called the Configuration Editor, has been developed to facilitate the creation and inspection of these configuration files. Typically, a user-defined analysis workflow can be produced starting from a standard configuration file, applying and configuring PAT ...

  7. A Methodology for Evaluating User Perceptions of the Delivery of ICT Services: a comparative study of six UK local authorities

    Les Worrall

    2000-11-01

    Full Text Available Evaluating and managing the effective delivery of ICT services is an issue that has been brought into sharper relief recently. This has been particularly prevalent in the UK public sector where the growing emphasis on formalised client-contractor relationships, outsourcing and benchmarking (both between local authorities and between local authorities and private sector organisations has meant that the definition of service standards and agreeing performance criteria has attracted considerable practitioner attention. This research is based on 295 interviews conducted in six UK local authorities. The investigation used both gap analysis and perceptual mapping techniques to develop an understanding of the aspects of ICT service delivery that users' value most in conjunction with an assessment of how well they perceive their ICT department is performing on these criteria. The paper exposes considerable differences in the relative performance of the six local authorities from both the gap analysis and the perceptual mapping elements of the investigation. The methodology is shown to provide an effective way of identifying key performance issues from the user perspective and benchmarking service performance across organisations.

  8. HERMES: A user-friendly connectivity analysis software

    Niso Galán, Julia Guiomar; Bruña Fernandez, Ricardo; Pereda, Ernesto; Gutierrez, Ricardo; Bajo Breton, Ricardo; Maestú, Fernando; Pozo Guerrero, Francisco del

    2012-01-01

    The analysis of the interdependence between time series has become an important field of research, mainly as a result of advances in the characterization of dynamical systems from the signals they produce, and the introduction of concepts such as Generalized (GS) and Phase synchronization (PS). This increase in the number of approaches to tackle the existence of the so-called functional (FC) and effective connectivity (EC) (Friston 1994) between two, (or among many) neural networks, along wit...

  9. Wisdom of the Crowd or Wisdom of a Few? An Analysis of Users' Content Generation

    Baeza-Yates, Ricardo

    2016-01-01

    In this paper we analyze how user generated content (UGC) is created, challenging the well known {\\it wisdom of crowds} concept. Although it is known that user activity in most settings follow a power law, that is, few people do a lot, while most do nothing, there are few studies that characterize well this activity. In our analysis of datasets from two different social networks, Facebook and Twitter, we find that a small percentage of active users and much less of all users represent 50\\% of the UGC. We also analyze the dynamic behavior of the generation of this content to find that the set of most active users is quite stable in time. Moreover, we study the social graph, finding that those active users are highly connected among them. This implies that most of the wisdom comes from a few users, challenging the independence assumption needed to have a wisdom of crowds. We also address the content that is never seen by any people, which we call digital desert, that challenges the assumption that the content o...

  10. Nigerian Power Sector: Comparative Analysis of Productivity

    Iwuamadi ObiomaChidiebere

    2015-06-01

    Full Text Available Undoubtedly, power instability in the Nigerian Power Sector despite several mitigative measures by the government has created some chocks in the national socio-economic wheel of development. Unfortunately, the conceptual objective of the power reforms to remedy inadequate power generation capacity, inefficient usage of capacity, ineffective regulation and high technical losses is tardily being achieved. This research comparatively analyzed the rate of productivity change in Nigeria’s power sector from 2005 – 2013. The analysis reveals that privatization improved the productivity index by 89%. It is expected that this work may assist the power policy makers and regulators to come up with abetter framework for the full realization of the noble goals envisaged in this reform act.

  11. Comparative Genome Analysis of Basidiomycete Fungi

    Riley, Robert; Salamov, Asaf; Morin, Emmanuelle; Nagy, Laszlo; Manning, Gerard; Baker, Scott; Brown, Daren; Henrissat, Bernard; Levasseur, Anthony; Hibbett, David; Martin, Francis; Grigoriev, Igor

    2012-03-19

    Fungi of the phylum Basidiomycota (basidiomycetes), make up some 37percent of the described fungi, and are important in forestry, agriculture, medicine, and bioenergy. This diverse phylum includes the mushrooms, wood rots, symbionts, and plant and animal pathogens. To better understand the diversity of phenotypes in basidiomycetes, we performed a comparative analysis of 35 basidiomycete fungi spanning the diversity of the phylum. Phylogenetic patterns of lignocellulose degrading genes suggest a continuum rather than a sharp dichotomy between the white rot and brown rot modes of wood decay. Patterns of secondary metabolic enzymes give additional insight into the broad array of phenotypes found in the basidiomycetes. We suggest that the profile of an organism in lignocellulose-targeting genes can be used to predict its nutritional mode, and predict Dacryopinax sp. as a brown rot; Botryobasidium botryosum and Jaapia argillacea as white rots.

  12. Deductive Evaluation: Formal Code Analysis With Low User Burden

    Di Vito, Ben. L

    2016-01-01

    We describe a framework for symbolically evaluating iterative C code using a deductive approach that automatically discovers and proves program properties. Although verification is not performed, the method can infer detailed program behavior. Software engineering work flows could be enhanced by this type of analysis. Floyd-Hoare verification principles are applied to synthesize loop invariants, using a library of iteration-specific deductive knowledge. When needed, theorem proving is interleaved with evaluation and performed on the fly. Evaluation results take the form of inferred expressions and type constraints for values of program variables. An implementation using PVS (Prototype Verification System) is presented along with results for sample C functions.

  13. Exploiting Formal Concept Analysis in a Customizing Recommendation for New User and Gray Sheep Problems

    Li, Xiaohui; Murata, Tomohiro

    Recommender systems are becoming an indispensable application and re-shaping the world in e-commerce scopes. This paper reviews the major problems in the existing recommender systems and presents a tracking recommendation approach based on information of user's behavior and two-level property of items. A new recommendation model based the synergistic use of knowledge from repository, which includes user's behavior, and items property was constructed and utilizes the Formal Concept Analysis (FCA) mapping to guide a personalized recommendation for user. We simulate a prototype recommender system that can make the quality recommendation by tracking user's behavior for implementing the proposed approach and testing its performance. Experiments using two datasets show our strategy was more robust against the drawbacks and preponderate over traditional recommendation approaches in cold-start conditions.

  14. Comparative Analysis of Students’ Media Competences Levels

    Alexander Fedorov

    2015-08-01

    Full Text Available This article analyzed the results of survey of university students’ media literacy competence (on the base of a classification of indicators of media literacy competence of the audience as an effective tool for comparative analysis of the levels of development of media competence of students of the control and experimental groups: the level of media competence of students who have a one-year training course in the framework of media literacy education courses four times higher than in similar indicators in the control group. Analysis of the results of this survey confirmed the general trend of media contacts of student audience – its orientation to entertainment genres of audiovisual media, visually appealing; positive, active, unmarried, childless, educated, highly qualified characters (primarily – male characters aged 19 to 35 years. These heroes are characteristic optimism, independence, intelligence, emotion. They have an excellent command of the life situation and have a positive impact on the development progress of the plot of a media text.

  15. CULTURE AND SOCIAL MEDIA USAGE: ANALYSIS OF JAPANESE TWITTER USERS

    Adam Acar

    2013-06-01

    Full Text Available Twitter, one of the most popular microblogging tools, has been used extensively all around the world. However, up to date, no study has addressed how culture influences the use of this communication platform. In order to close the literature gap and promote cross-cultural understandings, this paper content analyzed 4,000 tweets from 200 college students in Japan and the USA. The results showed that Japanese college students post more self-related messages and ask fewer questions compared to American college students. It was also found that tweets that refer to TV are more common in Japan, whereas sports and news tweets stand out in the USA. The evidence from this study suggests that there is a subtle and complicated relationship between culture and Twitter use.

  16. Following User Pathways: Cross Platform and Mixed Methods Analysis in Social Media Studies

    Hall, Margeret; Mazarakis, Athanasios; Peters, Isabella;

    2016-01-01

    Social media and the resulting tidal wave of available data have changed the ways and methods researchers analyze communities at scale. But the full potential for social scientists (and others) is not yet achieved. Despite the popularity of social media analysis in the past decade, few researchers...... is the mixed method approach (e.g. qualitative and quantitative methods) in order to better understand how users and society interacts online. The workshop 'Following User Pathways' brings together a community of researchers and professionals to address methodological, analytical, conceptual, and technological...... challenges and opportunities of cross-platform, mixed method analysis in social media ecosystems....

  17. Explicet: graphical user interface software for metadata-driven management, analysis and visualization of microbiome data.

    Robertson, Charles E; Harris, J Kirk; Wagner, Brandie D; Granger, David; Browne, Kathy; Tatem, Beth; Feazel, Leah M; Park, Kristin; Pace, Norman R; Frank, Daniel N

    2013-12-01

    Studies of the human microbiome, and microbial community ecology in general, have blossomed of late and are now a burgeoning source of exciting research findings. Along with the advent of next-generation sequencing platforms, which have dramatically increased the scope of microbiome-related projects, several high-performance sequence analysis pipelines (e.g. QIIME, MOTHUR, VAMPS) are now available to investigators for microbiome analysis. The subject of our manuscript, the graphical user interface-based Explicet software package, fills a previously unmet need for a robust, yet intuitive means of integrating the outputs of the software pipelines with user-specified metadata and then visualizing the combined data. PMID:24021386

  18. Which Users Should Be the Focus of Mobile Personal Health Records? Analysis of User Characteristics Influencing Usage of a Tethered Mobile Personal Health Record

    Lee, Guna; Park, Joong Yeol; Shin, Soo-Yong; Hwang, Jong Su; Ryu, Hyeon Jeong; Bates, David W.

    2016-01-01

    Abstract Background: This study was conducted to analyze the usage pattern of a hospital-tethered mobile personal health records (m-PHRs) application named My Chart in My Hand (MCMH) and to identify user characteristics that influence m-PHR usage. Materials and Methods: Access logs to MCMH and its menus were collected for a total of 18 months, from August 2011 to January 2013. Usage patterns between users without a patient identification number (ID) and users with a patient ID were compared. Users with a patient ID were divided into light and heavy user groups by the median number of monthly access. Multiple linear regression models were used to assess MCMH usage pattern by characteristics of MCMH user with a patient ID. Results: The total number of MCMH logins was 105,603, and the median number of accesses was 15 times. Users (n = 7,096) mostly accessed the “My Chart” menu, but “OPD [outpatient department] Service Support” and “Health Management” menus were also frequently used. Patients with chronic diseases, experience of hospital visits including emergency room and OPD, and age group of 0–19 years were more frequently found among users with a patient ID (n = 2,186) (p < 0.001). A similar trend was found in the heavy user group (n = 1,123). Submenus of laboratory result, online appointment, and medication lists that were accessed mostly by users with a patient ID were associated with OPD visit and chronic diseases. Conclusions: This study showed that focuses on patients with chronic disease and more hospital visits and empowerment functions in a tethered m-PHR would be helpful to pursue the extensive use. PMID:26447775

  19. NFAP: the nonlinear finite element analysis program. Users manual; Version 1977

    A brief outline of the analysis capability together with the input instructions are given for a nonlinear finite element analysis program called NFAP, which is an extended version of the NONSAP Program. Extensions include additional element types, material models and several user's features as further described in the report. Similar to NONSAP, the NFAP program can be used for conducting linear or nonlinear analysis of various structures under static or dynamic loadings. Nonlinearities involve both nonlinear materials and large deformations

  20. Neutron activation analysis at the Californium User Facility for Neutron Science

    The Californium User Facility (CUF) for Neutron Science has been established to provide 252Cf-based neutron irradiation services and research capabilities including neutron activation analysis (NAA). A major advantage of the CUF is its accessibility and controlled experimental conditions compared with those of a reactor environment The CUF maintains the world's largest inventory of compact 252Cf neutron sources. Neutron source intensities of ≤ 1011 neutrons/s are available for irradiations within a contamination-free hot cell, capable of providing thermal and fast neutron fluxes exceeding 108 cm-2 s-1 at the sample. Total flux of ≥109 cm-2 s-1 is feasible for large-volume irradiation rabbits within the 252Cf storage pool. Neutron and gamma transport calculations have been performed using the Monte Carlo transport code MCNP to estimate irradiation fluxes available for sample activation within the hot cell and storage pool and to design and optimize a prompt gamma NAA (PGNAA) configuration for large sample volumes. Confirmatory NAA irradiations have been performed within the pool. Gamma spectroscopy capabilities including PGNAA are being established within the CUF for sample analysis

  1. Exploratory analysis of user-generated photos and indicators that influence their appeal

    Urban Sedlar

    2014-07-01

    Full Text Available In this paper we analyze if simple indicators related to photo quality (brightness, sharpness, color palette and established content detection techniques (face detection can predict the success of photos in obtaining more “likes” from other users of photo-sharing social networks. This provides a unique look into the habits of users of such networks. The analysis was performed on 394.000 images downloaded from the social photo-sharing site Instagram, paired with a de-identified dataset of user liking activity, provided by a seller of a social-media mobile app. Two user groups were analyzed: all users in a two month period (N = 122.260 and a highly selective group (N = 3.982 of users that only like <10% of what they view. No correlation was found with any of the indicators using the whole (non-selective population, likely due to their bias towards earning virtual currency in exchange for liking. However, in selective group, small positive correlation was found between like ratio and image sharpness (r=0.09, p<0.0001 and small negative correlation between like ratio and the number of faces (r=-0.10, p<0.0001.

  2. Performance Analysis of Mean Value-Based Power Allocation with Primary User Interference in Spectrum Sharing Systems

    Duan, Ruifeng; Jäntti, Riku; Elmusrati, Mohammed S.

    2014-01-01

    In this paper, we provide an exact expression for the ergodic capacity of the secondary user, and a unified closed-form expression for its bounds with taking the consideration of the primary interference at the secondary receiver. In addition, a simple but accurate approximation of the the ergodic capacity of the primary user is presented. Moreover, a primary user capacity loss based power allocation scheme for the secondary user is also proposed. Finally, we compare the performance of the tw...

  3. Enabling Semantic Analysis of User Browsing Patterns in the Web of Data

    Hoxha, Julia; Agarwal, Sudhir

    2012-01-01

    A useful step towards better interpretation and analysis of the usage patterns is to formalize the semantics of the resources that users are accessing in the Web. We focus on this problem and present an approach for the semantic formalization of usage logs, which lays the basis for eective techniques of querying expressive usage patterns. We also present a query answering approach, which is useful to nd in the logs expressive patterns of usage behavior via formulation of semantic and temporal-based constraints. We have processed over 30 thousand user browsing sessions extracted from usage logs of DBPedia and Semantic Web Dog Food. All these events are formalized semantically using respective domain ontologies and RDF representations of the Web resources being accessed. We show the eectiveness of our approach through experimental results, providing in this way an exploratory analysis of the way users browse theWeb of Data.

  4. Comparative analysis of safety related site characteristics

    This document presents a comparative analysis of site characteristics related to long-term safety for the two candidate sites for a final repository for spent nuclear fuel in Forsmark (municipality of Oesthammar) and in Laxemar (municipality of Oskarshamn) from the point of view of site selection. The analyses are based on the updated site descriptions of Forsmark /SKB 2008a/ and Laxemar /SKB 2009a/, together with associated updated repository layouts and designs /SKB 2008b and SKB 2009b/. The basis for the comparison is thus two equally and thoroughly assessed sites. However, the analyses presented here are focussed on differences between the sites rather than evaluating them in absolute terms. The document serves as a basis for the site selection, from the perspective of long-term safety, in SKB's application for a final repository. A full evaluation of safety is made for a repository at the selected site in the safety assessment SR-Site /SKB 2011/, referred to as SR-Site main report in the following

  5. Comparative analysis of safety related site characteristics

    Andersson, Johan (ed.)

    2010-12-15

    This document presents a comparative analysis of site characteristics related to long-term safety for the two candidate sites for a final repository for spent nuclear fuel in Forsmark (municipality of Oesthammar) and in Laxemar (municipality of Oskarshamn) from the point of view of site selection. The analyses are based on the updated site descriptions of Forsmark /SKB 2008a/ and Laxemar /SKB 2009a/, together with associated updated repository layouts and designs /SKB 2008b and SKB 2009b/. The basis for the comparison is thus two equally and thoroughly assessed sites. However, the analyses presented here are focussed on differences between the sites rather than evaluating them in absolute terms. The document serves as a basis for the site selection, from the perspective of long-term safety, in SKB's application for a final repository. A full evaluation of safety is made for a repository at the selected site in the safety assessment SR-Site /SKB 2011/, referred to as SR-Site main report in the following

  6. User-centered design of a computerized HRQoL questionnaire : qualitative analysis of user needs and prototype evaluation

    Syropoulos, Nikolaos

    2014-01-01

    The digitalization of Health-Related Quality of Life instruments as well as the design of computerized systems according to user needs can improve the usability and fulfil the expectations of the end-users. The purpose of this study is to identify the features that a computerized Health-Related Quality of Life questionnaire, which has been designed through Questionnaire Service, should support, when it is being used from the patients and the healthcare providers. These features come from the ...

  7. Comparative Analysis of Different LIDAR System Calibration Techniques

    Miller, M.; Habib, A.

    2016-06-01

    With light detection and ranging (LiDAR) now being a crucial tool for engineering products and on the fly spatial analysis, it is necessary for the user community to have standardized calibration methods. The three methods in this study were developed and proven by the Digital Photogrammetry Research Group (DPRG) for airborne LiDAR systems and are as follows; Simplified, Quasi-Rigorous, and Rigorous. In lieu of using expensive control surfaces for calibration, these methods compare overlapping LiDAR strips to estimate the systematic errors. These systematic errors are quantified by these methods and include the lever arm biases, boresight biases, range bias and scan angle scale bias. These three methods comprehensively represent all of the possible flight configurations and data availability and this paper will test the limits of the method with the most assumptions, the simplified calibration, by using data that violates the assumptions it's math model is based on and compares the results to the quasi-rigorous and rigorous techniques. The overarching goal is to provide a LiDAR system calibration that does not require raw measurements which can be carried out with minimal control and flight lines to reduce costs. This testing is unique because the terrain used for calibration does not contain gable roofs, all other LiDAR system calibration testing and development has been done with terrain containing features with high geometric integrity such as gable roofs.

  8. Comparative analysis on flexibility requirements of typical cryogenic transfer lines

    The cryogenic systems and their applications, primarily in large Fusion devices, utilize multiple cryogen transfer lines of various sizes and complexities in terms of layout to transfer cryogenic fluids from plant to the various user/applications. These transfer lines are composed of various critical sections like tee sections, elbows, flexible components etc. The mechanical sustainability (under failure circumstances) of these transfer lines are primary requirement for safe operation of the system and applications. The transfer lines need to be designed for multiple design constraint conditions like line layout, support locations and space restrictions. The transfer lines are subjected to single load and multiple load combinations, such as operational loads, seismic loads, leak in insulation vacuum etc. The analytical calculations and flexibility analysis using CAESAR II software are performed for the typical transfer lines without any flexible component, the results were analysed for functional and mechanical load conditions. The failure modes were identified along the critical sections. The same transfer line was then refurbished with the flexible components and analysed for failure modes. Inclusion of these components provides additional flexibility to the transfer line system and makes it safe. The optimization was performed by selection of the appropriate flexible components to meet the design requirements as per ASME B31.3/EN 13480 codes. This paper describes the results obtained from the analytical calculations, which are compared and validated with those obtained from the flexibility analysis software calculations. (author)

  9. Inventory of activation analysis facilities available in the European Community to Industrial users

    This inventory includes lists of activation equipment produced in the European Community, facilities available for industrial users and activation laboratories existing in the European companies. The aim of this inventory is to provide all information that may be useful, to companies interested in activation analysis, as well as to give an idea on existing routine applications and on the European market in facilities

  10. Digital Avionics Information System (DAIS): Training Requirements Analysis Model Users Guide. Final Report.

    Czuchry, Andrew J.; And Others

    This user's guide describes the functions, logical operations and subroutines, input data requirements, and available outputs of the Training Requirements Analysis Model (TRAMOD), a computerized analytical life cycle cost modeling system for use in the early stages of system design. Operable in a stand-alone mode, TRAMOD can be used for the…

  11. The technique of creation of simulation systems with experiments design and analysis controlled by user's questions

    G. Magariu

    1999-01-01

    The article describes a technique of creation of simulation systems with elements of intellectual handle of experiments initiation and analysis results of experiments. The technique proposed is based on user question analyzing, determination of necessary simulation experiments for the question answering, initiation of these experiments running and obtaining the answer on the basis of experiments results.

  12. User-Centric Approach for Benchmark RDF Data Generator in Big Data Performance Analysis

    Purohit, Sumit; Paulson, Patrick R.; Rodriguez, Luke R.

    2016-02-05

    This research focuses on user-centric approach of building such tools and proposes a flexible, extensible, and easy to use framework to support performance analysis of Big Data systems. Finally, case studies from two different domains are presented to validate the framework.

  13. AUDITOR ROTATION - A CRITICAL AND COMPARATIVE ANALYSIS

    Mocanu Mihaela

    2011-12-01

    Full Text Available The present paper starts out from the challenge regarding auditor tenure launched in 2010 by the Green Paper of the European Commission Audit Policy: Lessons from the Crisis. According to this document, the European Commission speaks both in favor of the mandatory rotation of the audit firm, and in favor of the mandatory rotation of audit partners. Rotation is considered a solution to mitigate threats to independence generated by familiarity, intimidation and self-interest in the context of a long-term audit-client relationship. At international level, there are several studies on auditor rotation, both empirical (e.g. Lu and Sivaramakrishnan, 2009, Li, 2010, Kaplan and Mauldin, 2008, Jackson et al., 2008 and normative in nature (e.g. Marten et al., 2007, Muller, 2006 and Gelter, 2004. The objective of the present paper is to perform a critical and comparative analysis of the regulations on internal and external rotation in force at international level, in the European Union and in the United States of America. Moreover, arguments both in favor and against mandatory rotation are brought into discussion. With regard to the research design, the paper has a normative approach. The main findings are first of all that by comparison, all regulatory authorities require internal rotation at least in the case of public interest entities, while the external rotation is not in the focus of the regulators. In general, the most strict and detailed requirements are those issued by the Securities and Exchange Commission from the United States of America. Second of all, in favor of mandatory rotation speaks the fact that the auditor becomes less resilient in case of divergence of opinions between him and company management, less stimulated to follow his own interest, and more scrupulous in conducting the audit. However, mandatory rotation may also have negative consequences, thus the debate on the opportunity of this regulatory measure remains open-ended.

  14. A comparative analysis of influenza vaccination programs.

    Shweta Bansal

    2006-10-01

    Full Text Available BACKGROUND: The threat of avian influenza and the 2004-2005 influenza vaccine supply shortage in the United States have sparked a debate about optimal vaccination strategies to reduce the burden of morbidity and mortality caused by the influenza virus. METHODS AND FINDINGS: We present a comparative analysis of two classes of suggested vaccination strategies: mortality-based strategies that target high-risk populations and morbidity-based strategies that target high-prevalence populations. Applying the methods of contact network epidemiology to a model of disease transmission in a large urban population, we assume that vaccine supplies are limited and then evaluate the efficacy of these strategies across a wide range of viral transmission rates and for two different age-specific mortality distributions. We find that the optimal strategy depends critically on the viral transmission level (reproductive rate of the virus: morbidity-based strategies outperform mortality-based strategies for moderately transmissible strains, while the reverse is true for highly transmissible strains. These results hold for a range of mortality rates reported for prior influenza epidemics and pandemics. Furthermore, we show that vaccination delays and multiple introductions of disease into the community have a more detrimental impact on morbidity-based strategies than mortality-based strategies. CONCLUSIONS: If public health officials have reasonable estimates of the viral transmission rate and the frequency of new introductions into the community prior to an outbreak, then these methods can guide the design of optimal vaccination priorities. When such information is unreliable or not available, as is often the case, this study recommends mortality-based vaccination priorities.

  15. Three looks at users: a comparison of methods for studying digital library use. User studies, Digital libraries, Digital music libraries, Music, Information use, Information science, Contextual inquiry, Contextual design, User research, Questionnaires, Log file analysis

    Mark Notess

    2004-01-01

    Compares three user research methods of studying real-world digital library usage within the context of the Variations and Variations2 digital music libraries at Indiana University. After a brief description of both digital libraries, each method is described and illustrated with findings from the studies. User satisfaction questionnaires were used in two studies, one of Variations (n=30) and the other of Variations2 (n=12). Second, session activity log files were examined for 175 Variations2...

  16. Premo and Kansei: A Comparative Analysis

    Anitawati Mohd Lokman

    2013-04-01

    Full Text Available Kansei Engineering is a technology that enables incorporation of human emotion in design requirements. It has in its perspective that Kansei is unique for different domain and unique for different target user group, and use mainly a verbal measurement instruments in its methodology. The technology is seen to have little shortcoming when there is a need to build universal design for universal target user. It will involve complexity when handling semantics since people do not speak the same language across the planet. Hence, a non-verbal emotion measurement tool is assumed to enhance the capability of K.E. in managing universal Kansei. This study aims to investigate the possibility of integrating PrEmo, a non-verbal self-reporting tool which were developed based on studies across culture and demographical setting into Kansei Engineering. The objectives are to analyze the similarities and differences of Kansei structure resulted by two different measurement tools, non-verbal (PrEmo and verbal (Kansei checklist self-reporting instrument, to provide hypothetical evidence of the feasibility of PrEmo as a tool to measure Kansei. 10 websites with significant visual design differences were used as stimuli in the evaluation procedure involving 30 respondents, who provided their Kansei responses using both instruments. The result has shown that the Kansei structure by both instruments are mostly similar, thus provide hypothetical evidence that PrEmo could be used as non-verbal self-reporting instrument to measure Kansei. The findings provide insights into future research for integration of universal Kansei.

  17. A novel R-package graphic user interface for the analysis of metabonomic profiles

    Villa Palmira

    2009-10-01

    Full Text Available Abstract Background Analysis of the plethora of metabolites found in the NMR spectra of biological fluids or tissues requires data complexity to be simplified. We present a graphical user interface (GUI for NMR-based metabonomic analysis. The "Metabonomic Package" has been developed for metabonomics research as open-source software and uses the R statistical libraries. Results The package offers the following options: Raw 1-dimensional spectra processing: phase, baseline correction and normalization. Importing processed spectra. Including/excluding spectral ranges, optional binning and bucketing, detection and alignment of peaks. Sorting of metabolites based on their ability to discriminate, metabolite selection, and outlier identification. Multivariate unsupervised analysis: principal components analysis (PCA. Multivariate supervised analysis: partial least squares (PLS, linear discriminant analysis (LDA, k-nearest neighbor classification. Neural networks. Visualization and overlapping of spectra. Plot values of the chemical shift position for different samples. Furthermore, the "Metabonomic" GUI includes a console to enable other kinds of analyses and to take advantage of all R statistical tools. Conclusion We made complex multivariate analysis user-friendly for both experienced and novice users, which could help to expand the use of NMR-based metabonomics.

  18. E-learning interventions are comparable to user's manual in a randomized trial of training strategies for the AGREE II

    Durocher Lisa D

    2011-07-01

    Full Text Available Abstract Background Practice guidelines (PGs are systematically developed statements intended to assist in patient and practitioner decisions. The AGREE II is the revised tool for PG development, reporting, and evaluation, comprised of 23 items, two global rating scores, and a new User's Manual. In this study, we sought to develop, execute, and evaluate the impact of two internet interventions designed to accelerate the capacity of stakeholders to use the AGREE II. Methods Participants were randomized to one of three training conditions. 'Tutorial'--participants proceeded through the online tutorial with a virtual coach and reviewed a PDF copy of the AGREE II. 'Tutorial + Practice Exercise'--in addition to the Tutorial, participants also appraised a 'practice' PG. For the practice PG appraisal, participants received feedback on how their scores compared to expert norms and formative feedback if scores fell outside the predefined range. 'AGREE II User's Manual PDF (control condition'--participants reviewed a PDF copy of the AGREE II only. All participants evaluated a test PG using the AGREE II. Outcomes of interest were learners' performance, satisfaction, self-efficacy, mental effort, time-on-task, and perceptions of AGREE II. Results No differences emerged between training conditions on any of the outcome measures. Conclusions We believe these results can be explained by better than anticipated performance of the AGREE II PDF materials (control condition or the participants' level of health methodology and PG experience rather than the failure of the online training interventions. Some data suggest the online tools may be useful for trainees new to this field; however, this requires further study.

  19. Advanced Techniques in Web Intelligence-2 Web User Browsing Behaviour and Preference Analysis

    Palade, Vasile; Jain, Lakhmi

    2013-01-01

    This research volume focuses on analyzing the web user browsing behaviour and preferences in traditional web-based environments, social  networks and web 2.0 applications,  by using advanced  techniques in data acquisition, data processing, pattern extraction and  cognitive science for modeling the human actions.  The book is directed to  graduate students, researchers/scientists and engineers  interested in updating their knowledge with the recent trends in web user analysis, for developing the next generation of web-based systems and applications.

  20. Tool for Turbine Engine Closed-Loop Transient Analysis (TTECTrA) Users' Guide

    Csank, Jeffrey T.; Zinnecker, Alicia M.

    2014-01-01

    The tool for turbine engine closed-loop transient analysis (TTECTrA) is a semi-automated control design tool for subsonic aircraft engine simulations. At a specific flight condition, TTECTrA produces a basic controller designed to meet user-defined goals and containing only the fundamental limiters that affect the transient performance of the engine. The purpose of this tool is to provide the user a preliminary estimate of the transient performance of an engine model without the need to design a full nonlinear controller.

  1. Code development and analysis program. RELAP4/MOD7 (Version 2): user's manual

    None

    1978-08-01

    This manual describes RELAP4/MOD7 (Version 2), which is the latest version of the RELAP4 LPWR blowdown code. Version 2 is a precursor to the final version of RELAP4/MOD7, which will address LPWR LOCA analysis in integral fashion (i.e., blowdown, refill, and reflood in continuous fashion). This manual describes the new code models and provides application information required to utilize the code. It must be used in conjunction with the RELAP4/MOD5 User's Manual (ANCR-NUREG-1335, dated September 1976), and the RELAP4/MOD6 User's Manual (CDAP-TR-003, dated January 1978).

  2. Comparing Results from Constant Comparative and Computer Software Methods: A Reflection about Qualitative Data Analysis

    Putten, Jim Vander; Nolen, Amanda L.

    2010-01-01

    This study compared qualitative research results obtained by manual constant comparative analysis with results obtained by computer software analysis of the same data. An investigated about issues of trustworthiness and accuracy ensued. Results indicated that the inductive constant comparative data analysis generated 51 codes and two coding levels…

  3. Nestedness for Dummies (NeD): a User Friendly Web Interface for Exploratory Nestedness Analysis

    Giovanni Strona; Paolo Galli; Davide Seveso; Simone Montano; Simone Fattorini

    2014-01-01

    Recent theoretical advances in nestedness analysis have led to the introduction of several alternative metrics to overcome most of the problems biasing the use of matrix 'temperature' calculated by Atmar's Nestedness Temperature Calculator. However, all of the currently available programs for nestedness analysis lack the user friendly appeal that has made the Nestedness Temperature Calculator one of the most popular community ecology programs. The software package NeD is an intuitive open sou...

  4. AITRAC: Augmented Interactive Transient Radiation Analysis by Computer. User's information manual

    AITRAC is a program designed for on-line, interactive, DC, and transient analysis of electronic circuits. The program solves linear and nonlinear simultaneous equations which characterize the mathematical models used to predict circuit response. The program features 100 external node--200 branch capability; conversional, free-format input language; built-in junction, FET, MOS, and switch models; sparse matrix algorithm with extended-precision H matrix and T vector calculations, for fast and accurate execution; linear transconductances: beta, GM, MU, ZM; accurate and fast radiation effects analysis; special interface for user-defined equations; selective control of multiple outputs; graphical outputs in wide and narrow formats; and on-line parameter modification capability. The user describes the problem by entering the circuit topology and part parameters. The program then automatically generates and solves the circuit equations, providing the user with printed or plotted output. The circuit topology and/or part values may then be changed by the user, and a new analysis, requested. Circuit descriptions may be saved on disk files for storage and later use. The program contains built-in standard models for resistors, voltage and current sources, capacitors, inductors including mutual couplings, switches, junction diodes and transistors, FETS, and MOS devices. Nonstandard models may be constructed from standard models or by using the special equations interface. Time functions may be described by straight-line segments or by sine, damped sine, and exponential functions. 42 figures, 1 table

  5. Performance Analysis of New Binary User Codes for DS-CDMA Communication

    Usha, Kamle; Jaya Sankar, Kottareddygari

    2016-03-01

    This paper analyzes new binary spreading codes through correlation properties and also presents their performance over additive white Gaussian noise (AWGN) channel. The proposed codes are constructed using gray and inverse gray codes. In this paper, a n-bit gray code appended by its n-bit inverse gray code to construct the 2n-length binary user codes are discussed. Like Walsh codes, these binary user codes are available in sizes of power of two and additionally code sets of length 6 and their even multiples are also available. The simple construction technique and generation of code sets of different sizes are the salient features of the proposed codes. Walsh codes and gold codes are considered for comparison in this paper as these are popularly used for synchronous and asynchronous multi user communications respectively. In the current work the auto and cross correlation properties of the proposed codes are compared with those of Walsh codes and gold codes. Performance of the proposed binary user codes for both synchronous and asynchronous direct sequence CDMA communication over AWGN channel is also discussed in this paper. The proposed binary user codes are found to be suitable for both synchronous and asynchronous DS-CDMA communication.

  6. Comparative proteomic analysis of Clostridium difficile

    Chilton, Caroline Hazel

    2011-01-01

    The recent increase in availability of next generation sequencing methodologies has led to extensive analysis of the genome of Clostridium difficile. In contrast, protein expression analysis, crucial to the elucidation of mechanisms of disease, has severely lagged behind. In this study, in-depth proteomic analysis of three strains of varying virulence, demonstrated previously in an animal model, has been undertaken against a background of the sequenced genomes. Strain B-1 is ...

  7. Baby boomers as future care users--An analysis of expectations in print media.

    Jönson, Håkan; Jönsson, Anders

    2015-08-01

    The aim of the study was to investigate media presentations of baby boomers as future care users. The Swedish baby boomer generation, born in the 1940s, and known as the '40s generation, has been characterized as youthful and powerful, and a question investigated in the study was whether boomers are supposed to display these characteristics as care users. We analyzed 481 articles in Swedish newspapers, published between 1995 and 2012, with a qualitative content analysis. The results showed that the '40s generation was predicted to become a new breed of demanding, self-aware care users. These claims were supported by descriptions of the formative events and typical characteristics of these individuals, which were then projected onto their future behavior as care users. Such projections tended to portray contemporary care users as passive, submissive, and partly responsible for problems associated with elder care. Consequently, approaches that focus on differences between cohorts need to incorporate a constructionist dimension to highlight the problem of generationism. PMID:26162728

  8. Formal Model for Data Dependency Analysis between Controls and Actions of a Graphical User Interface

    SKVORC, D.

    2012-02-01

    Full Text Available End-user development is an emerging computer science discipline that provides programming paradigms, techniques, and tools suitable for users not trained in software engineering. One of the techniques that allow ordinary computer users to develop their own applications without the need to learn a classic programming language is a GUI-level programming based on programming-by-demonstration. To build wizard-based tools that assist users in application development and to verify the correctness of user programs, a computer-supported method for GUI-level data dependency analysis is necessary. Therefore, formal model for GUI representation is needed. In this paper, we present a finite state machine for modeling the data dependencies between GUI controls and GUI actions. Furthermore, we present an algorithm for automatic construction of finite state machine for arbitrary GUI application. We show that proposed state aggregation scheme successfully manages state explosion in state machine construction algorithm, which makes the model applicable for applications with complex GUIs.

  9. CORCON-MOD3: An integrated computer model for analysis of molten core-concrete interactions. User`s manual

    Bradley, D.R.; Gardner, D.R.; Brockmann, J.E.; Griffith, R.O. [Sandia National Labs., Albuquerque, NM (United States)

    1993-10-01

    The CORCON-Mod3 computer code was developed to mechanistically model the important core-concrete interaction phenomena, including those phenomena relevant to the assessment of containment failure and radionuclide release. The code can be applied to a wide range of severe accident scenarios and reactor plants. The code represents the current state of the art for simulating core debris interactions with concrete. This document comprises the user`s manual and gives a brief description of the models and the assumptions and limitations in the code. Also discussed are the input parameters and the code output. Two sample problems are also given.

  10. Human Capital Development: Comparative Analysis of BRICs

    Ardichvili, Alexandre; Zavyalova, Elena; Minina, Vera

    2012-01-01

    Purpose: The goal of this article is to conduct macro-level analysis of human capital (HC) development strategies, pursued by four countries commonly referred to as BRICs (Brazil, Russia, India, and China). Design/methodology/approach: This analysis is based on comparisons of macro indices of human capital and innovativeness of the economy and a…

  11. Following User Pathways: Cross Platform and Mixed Methods Analysis in Social Media Studies

    Hall, Margeret; Mazarakis, Athanasios; Peters, Isabella; Chorley, Martin; Simon, Simon; Mai, Jens-Erik; Strohmaier, Markus

    2016-01-01

    Social media and the resulting tidal wave of available data have changed the ways and methods researchers analyze communities at scale. But the full potential for social scientists (and others) is not yet achieved. Despite the popularity of social media analysis in the past decade, few researchers...... challenges and opportunities of crossplatform, mixed method analysis in social media ecosystems....... invest in cross-platform analyses. This is a major oversight as 42% of Online Social Media users have multiple social media accounts. Missing are the models and tools necessary to undertake analysis at scale across multiple platforms. Especially promising in support of cross-platform analysis is the...

  12. Discovery and Analysis of Intersecting Datasets: JMARS as a Comparative Science Platform

    Carter, S.; Christensen, P. R.; Dickenshied, S.; Anwar, S.; Noss, D.

    2014-12-01

    A great deal can be discovered from comparing and studying a chosen region or area on a planetary body. In this age, science has an enormous amount of instruments and data to study from; often the first obstacle can be finding the right information. Developed at Arizona State University, Java Mission-planning and Analysis for Remote Sensing (JMARS), enables users to easily find and study related datasets. JMARS supports a long list of planetary bodies in our solar system, including Earth, the Moon, Mars, and other planets, satellites, and asteroids. Within JMARS a user can start with a particular area and search for all datasets that have images/information intersecting that region of interest. Once a user has found data they are interested in comparing, they can view the image at once and see the numeric information at that location. This information can be analyzed in a few powerful ways. If the dataset of interest varies with time but the location stays constant, then the user may want to compare specific locations through time. This can be done the Investigate Tool in JMARS. Users can create a Data Spike and the information at that point will be plotted through time. If the region does not have a temporal dataset, then a different method would be suitable and involves a profile line. Also using the Investigate Tool, a user can create a Data Profile (a line which can contain as many vertices as necessary) and all numeric data underneath the line will be plotted on one graph for easy comparison. This can be used to compare differences between similar datasets - perhaps the same measurement but from different instruments - or to find correlations from one dataset to another. A third form of analysis is planned for future development. This method involves entire areas (polygons). Sampling of the different data sources beneath an area can reveal statistics like maximum, minimum, and average values, and standard deviation. These values can be compared to other data

  13. MANAGEMENT AND COMPARATIVE ANALYSIS OF DATASET ENSEMBLES

    Geveci, Berk [Senior Director, Scientific Computing

    2010-05-17

    The primary Phase I technical objective was to develop a prototype that demonstrates the functionality of all components required for an end-to-end meta-data management and comparative visualization system.

  14. Comparative Analysis of Competitive Strategy Implementation

    Maina A. S. Waweru

    2011-01-01

    This paper presents research findings on Competitive Strategy Implementation which compared the levels of strategy implementation achieved by different generic strategy groups, comprising firms inclined towards low cost leadership, differentiation or dual strategic advantage.  The study sought to determine the preferences for use of implementation armaments and compared how such armaments related to the level of implementation achieved.   Respondents comprised 71 top executives from 59 compan...

  15. Comparative Analysis of Competitive Strategy Implementation

    Maina A. S. Waweru

    2011-01-01

    This paper presents research findings on Competitive Strategy Implementation which compared the levels of strategy implementation achieved by different generic strategy groups, comprising firms inclined towards low cost leadership, differentiation or dual strategic advantage. The study sought to determine the preferences for use of implementation armaments and compared how such armaments related to the level of implementation achieved. Respondents comprised 71 top executives from 59 companies...

  16. Integrated Reliability and Risk Analysis System (IRRAS) Version 2.0 user's guide

    The Integrated Reliability and Risk Analysis System (IRRAS) is a state-of-the-art, microcomputer-based probabilistic risk assessment (PRA) model development and analysis tool to address key nuclear plant safety issues. IRRAS is an integrated software tool that gives the user the ability to create and analyze fault trees and accident sequences using a microcomputer. This program provides functions that range from graphical fault tree construction to cut set generation and quantification. Also provided in the system is an integrated full-screen editor for use when interfacing with remote mainframe computer systems. Version 1.0 of the IRRAS program was released in February of 1987. Since that time, many user comments and enhancements have been incorporated into the program providing a much more powerful and user-friendly system. This version has been designated IRRAS 2.0 and is the subject of this user's guide. Version 2.0 of IRRAS provides all of the same capabilities as Version 1.0 and adds a relational data base facility for managing the data, improved functionality, and improved algorithm performance. 9 refs., 292 figs., 4 tabs

  17. Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting

    Kumar, Arun; Uzun, Ersin

    2009-01-01

    When users want to establish wireless communication between/among their devices, the channel has to be bootstrapped first. To prevent any malicious control of or eavesdropping over the communication, the channel is desired to be authenticated and confidential. The process of setting up a secure communication channel between two previously unassociated devices is referred to as "Secure Device Pairing". When there is no prior security context, e.g., shared secrets, common key servers or public key certificates, device pairing requires user involvement into the process. The idea usually involves leveraging an auxiliary human-perceptible channel to authenticate the data exchanged over the insecure wireless channel. We observe that the focus of prior research has mostly been limited to pairing scenarios where a single user controls both the devices. In this paper, we consider more general and emerging "two-user" scenarios, where two different users establish pairing between their respective devices. Although a num...

  18. Comparison of three commercially available DIGE analysis software packages: minimal user intervention in gel-based proteomics.

    Kang, Yunyi; Techanukul, Tanasit; Mantalaris, Anthanasios; Nagy, Judit M

    2009-02-01

    The success of high-performance differential gel electrophoresis using fluorescent dyes (DIGE) depends on the quality of the digital image captured after electrophoresis, the DIGE enabled image analysis software tool chosen for highlighting the differences, and the statistical analysis. This study compares three commonly available DIGE enabled software packages for the first time: DeCyder V6.5 (GE-Healthcare), Progenesis SameSpots V3.0 (Nonlinear Dynamics), and Dymension 3 (Syngene). DIGE gel images of cell culture media samples conditioned by HepG2 and END2 cell lines were used to evaluate the software packages both quantitatively and subjectively considering ease of use with minimal user intervention. Consistency of spot matching across the three software packages was compared, focusing on the top fifty spots ranked statistically by each package. In summary, Progenesis SameSpots outperformed the other two software packages in matching accuracy, possibly being benefited by its new approach: that is, identical spot outline across all the gels. Interestingly, the statistical analysis of the software packages was not consistent on account of differences in workflow, algorithms, and default settings. Results obtained for protein fold changes were substantially different in each package, which indicates that in spite of using internal standards, quantification is software dependent. A future research goal must be to reduce or eliminate user controlled settings, either by automatic sample-to-sample optimization by intelligent software, or by alternative parameter-free segmentation methods. PMID:19133722

  19. Advertisement Analysis: A Comparative Critical Study

    Noureldin Mohamed Abdelaal

    2014-12-01

    Full Text Available This study aimed at analyzing two advertisements, and investigating how advertisers use discourse and semiotics to make people and customers buy into their ideas, beliefs, or simply their products. The two advertisements analyzed are beauty products which have been selected from internet magazines. The methodology adopted in this study is qualitative method. The first advertisement is analyzed qualitatively in terms of content; there was no focus on a specific theoretical frame work, while the second advertisement analysis is based on Fairclough’s framework, the critical discourse analysis framework.  

  20. Wellness Model of Supervision: A Comparative Analysis

    Lenz, A. Stephen; Sangganjanavanich, Varunee Faii; Balkin, Richard S.; Oliver, Marvarene; Smith, Robert L.

    2012-01-01

    This quasi-experimental study compared the effectiveness of the Wellness Model of Supervision (WELMS; Lenz & Smith, 2010) with alternative supervision models for developing wellness constructs, total personal wellness, and helping skills among counselors-in-training. Participants were 32 master's-level counseling students completing their…

  1. Comparative analysis of Orem's and King's theories.

    Hanucharurnkul, S

    1989-05-01

    Dorothea Orem and Imogene King are two nursing theorists who are contributing significantly to the development of nursing knowledge. This paper compares the similarities and differences in their strategies for theory development, their views of nursing metaparadigm concepts, and their theories of nursing system and goal attainment in terms of scope, usefulness, and their unique contribution to nursing science. PMID:2738232

  2. Corporate Social Responsibility: A Global Comparative Analysis

    Mikalsen, Maiken Foss

    2014-01-01

    The topic of the thesis is development of corporate social responsibility in a global context, and examines and compares the practice of CSR in different countries around the world. Furthermore, the question of whether or not CSR should be regulated by law is discussed.

  3. Analysis of chromosomal aberrations, micronuclei and hematological disorders among workers of wireless communication instruments and cell phone (Mobile) users

    This study was carried out to investigate the hazardous effect of electromagnetic radiation (EMR) such as chromosomal aberration, disturbed micronucleus formation and hematological disorders that may detected among workers of wireless communication instruments and mobile phone users. Seven individuals ( 3 males and 4 females) of a central workers in the microwave unit of the wireless station and 7 users of Mobil phone (4 males and 3 females ) were volunteered to give blood samples. Chromosomes and micronucleus were prepared for cytogenetic analysis as well as blood film for differential count. The results obtained in the microwave group indicated that, the total summation of all types of aberrations (chromosomes and chromatid aberrations) had a frequency of 6. 14% for the exposed group, whereas, the frequency in the control group amounted to 1.57%. In Mobil phone users, the total summation of all types of aberrations(chromosome and chromatid aberrations) had a frequency of 4.43% for the exposed group and 1.71% for the control group. The incidence of the total number of micronuclei in the exposed microwave group was increased 4.3 folds as compared with those of the control group The incidence of the total number of micronuclei in the exposed mobile phone group was increased 2 fold as compared with those in the control group. On the other hand, normal ranges of total white blood cells counts were determined for mobile phone users but abnormalities in the differential counts of the different types of the white blood cells such as neutropenia, eosinophilia and lymphocytosis were observed in the individuals number 1,2,3,7 in microwave group

  4. Comparative Distributions of Hazard Modeling Analysis

    Rana Abdul Wajid

    2006-07-01

    Full Text Available In this paper we present the comparison among the distributions used in hazard analysis. Simulation technique has been used to study the behavior of hazard distribution modules. The fundamentals of Hazard issues are discussed using failure criteria. We present the flexibility of the hazard modeling distribution that approaches to different distributions.

  5. General Education Requirements: A Comparative Analysis

    Warner, Darrell B.; Koeppel, Katie

    2009-01-01

    While "general education" is a phrase heavily used in higher education, Leskes and Wright note that it has multiple meanings: it can refer to those courses that a college or university requires all of its students must pass as a condition for graduation, a common curriculum, a distribution requirement, or even core texts. This analysis of general…

  6. Comparative study of FDMA, TDMA and hybrid 30/20 GHz satellite communications systems for small users

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    This study compares several satellite uplink and downlink accessing schemes for a Customer Premises Service. Four conceptual system designs are presented: Satellite-Routed FDMA, Frequency-Routed TDMA, Satellite-Switched TDMA, and Processor-Routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, power consumption, and cost. The system capacities are analyzed for a fixed multibeam coverage of CONUS. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  7. Towards for Analyzing Alternatives of Interaction Design Based on Verbal Decision Analysis of User Experience

    Marília Soares Mendes

    2010-04-01

    Full Text Available In domains (as digital TV, smart home, and tangible interfaces that represent a new paradigm of interactivity, the decision of the most appropriate interaction design solution is a challenge. HCI researchers have promoted in their works the validation of design alternative solutions with users before producing the final solution. User experience with technology is a subject that has also gained ground in these works in order to analyze the appropriate solution(s. Following this concept, a study was accomplished under the objective of finding a better interaction solution for an application of mobile TV. Three executable applications of mobile TV prototypes were built. A Verbal Decision Analysis model was applied on the investigations for the favorite characteristics in each prototype based on the user’s experience and their intentions of use. This model led a performance of a qualitative analysis which objectified the design of a new prototype.

  8. Industrialization Lessons from BRICS: A Comparative Analysis

    Naudé, Wim A.; Szirmai, Adam; Lavopa, Alejandro

    2013-01-01

    To date there has been few systematic and comparative empirical analyses of the nature of economic development in Brazil, Russia, India, China and South Africa (BRICS). We contribute to addressing this gap by exploring the patterns of structural change between 1980 and 2010, focusing on the manufacturing sector. We show that three of the BRICS are experiencing de-industrialization (Brazil, Russia and South Africa). China is the only country where an expanding manufacturing sector accounts for...

  9. Comparative Analysis of Frames with Varying Inertia

    Prerana Nampalli; Prakarsh Sangave

    2015-01-01

    This paper presents an elastic seismic response of reinforced concrete frames with 3 variations of heights, i.e. (G+2), (G+4), (G+6) storey models are compared for bare frame and frame with brick infill structures which have been analyzed for gravity as well as seismic forces and their response is studied as the geometric parameters varying from view point of predicting behavior of similar structures subjected to similar loads or load combinations. In this study, two different cas...

  10. Loss Given Default Modelling: Comparative Analysis

    Yashkir, Olga; Yashkir, Yuriy

    2013-01-01

    In this study we investigated several most popular Loss Given Default (LGD) models (LSM, Tobit, Three-Tiered Tobit, Beta Regression, Inflated Beta Regression, Censored Gamma Regression) in order to compare their performance. We show that for a given input data set, the quality of the model calibration depends mainly on the proper choice (and availability) of explanatory variables (model factors), but not on the fitting model. Model factors were chosen based on the amplitude of their correlati...

  11. Measuring Sustainability of Nations: a Comparative Analysis

    Priscilla Altili; Pietro Zoppoli

    2011-01-01

    Indicators are widely used tools to measure the sustainability of a nation. The definition of a concept conditions strictly its measurement. Therefore, the definition of sustainable development will determine the appropriateness of the variables selected for its measurement. The first part of this paper explores why it is impossible, at the present time, to have a univocal definition and measurement of sustainable development. The second part is devoted to the analysis of a set of synthetic i...

  12. Analysis and comparation of animation techniques

    Joštová, Barbora

    2015-01-01

    This thesis is focused on the analysis and comparison of animation techniques. In the theoretical part of the thesis I define key terms, the historical development and the basic principles of animation techniques. In the practical part I describe the comparison between classic and digital types of animation. Based on this research I chose the most suitable animations that are further used to verify my hypothesis. The provided hypothesis is the order of based on how demanding it is in terms of...

  13. An analysis of search-based user interaction on the semantic web

    Hildebrand, M; Ossenbruggen, van, Jacco; Hardman, HL Lynda

    2007-01-01

    Many Semantic Web applications provide access to their resources through text-based search queries, using explicit semantics to improve the search results. This paper provides an analysis of the current state of the art in semantic search, based on 35 existing systems. We identify different types of semantic search features that are used during query construction, the core search process, the presentation of the search results and user feedback on query and results. For each of these, we cons...

  14. Shape Analysis of 3D Head Scan Data for U.S. Respirator Users

    Stephanie Lynch; Viscusi, Dennis J.; Stacey Benson; Slice, Dennis E.; Ziqing Zhuang

    2010-01-01

    In 2003, the National Institute for Occupational Safety and Health (NIOSH) conducted a head-and-face anthropometric survey of diverse, civilian respirator users. Of the 3,997 subjects measured using traditional anthropometric techniques, surface scans and 26 three-dimensional (3D) landmark locations were collected for 947 subjects. The objective of this study was to report the size and shape variation of the survey participants using the 3D data. Generalized Procrustes Analysis (GPA) was con...

  15. Crawling Ajax-based Web Applications through Dynamic Analysis of User Interface State Changes

    Mesbah, A.; Van Deursen, A.; Lenselink, S.

    2011-01-01

    Using JavaScript and dynamic DOM manipulation on the client-side of web applications is becoming a widespread approach for achieving rich interactivity and responsiveness in modern web applications. At the same time, such techniques, collectively known as Ajax, shatter the metaphor of web ‘pages’ with unique URLs, on which traditional web crawlers are based. This paper describes a novel technique for crawling Ajax-based applications through automatic dynamic analysis of user interface state c...

  16. Knowledge Level Assessment in e-Learning Systems Using Machine Learning and User Activity Analysis

    Nazeeh Ghatasheh

    2015-01-01

    Electronic Learning has been one of the foremost trends in education so far. Such importance draws the attention to an important shift in the educational paradigm. Due to the complexity of the evolving paradigm, the prospective dynamics of learning require an evolution of knowledge delivery and evaluation. This research work tries to put in hand a futuristic design of an autonomous and intelligent e-Learning system. In which machine learning and user activity analysis play the role of an auto...

  17. Configuration Analysis Tool (CAT). System Description and users guide (revision 1)

    Decker, W.; Taylor, W.; Mcgarry, F. E.; Merwarth, P.

    1982-01-01

    A system description of, and user's guide for, the Configuration Analysis Tool (CAT) are presented. As a configuration management tool, CAT enhances the control of large software systems by providing a repository for information describing the current status of a project. CAT provides an editing capability to update the information and a reporting capability to present the information. CAT is an interactive program available in versions for the PDP-11/70 and VAX-11/780 computers.

  18. Radiological Safety Analysis Computer (RSAC) Program Version 7.0 Users Manual

    The Radiological Safety Analysis Computer (RSAC) Program Version 7.0 (RSAC-7) is the newest version of the RSAC legacy code. It calculates the consequences of a release of radionuclides to the atmosphere. A user can generate a fission product inventory from either reactor operating history or a nuclear criticality event. RSAC-7 models the effects of high-efficiency particulate air filters or other cleanup systems and calculates the decay and ingrowth during transport through processes, facilities, and the environment. Doses are calculated for inhalation, air immersion, ground surface, ingestion, and cloud gamma pathways. RSAC-7 can be used as a tool to evaluate accident conditions in emergency response scenarios, radiological sabotage events and to evaluate safety basis accident consequences. This users manual contains the mathematical models and operating instructions for RSAC-7. Instructions, screens, and examples are provided to guide the user through the functions provided by RSAC-7. This program was designed for users who are familiar with radiological dose assessment methods

  19. [Amaranth flour: characteristics, comparative analysis, application possibilities].

    Zharkov, I M; Miroshnichenko, L A; Zviagin, A A; Bavykina, I A

    2014-01-01

    Amaranth flour--a product of amaranth seeds processing--is a valuable industrial raw material that has an unique chemical composition and may be used for nutrition of people suffering from intolerance to traditional cereals protein, including celiac disease patients. The research aim was to study the composition of amaranth flour of two types compared with semolina which is traditionally used for nutrition by Russian population, as well as to compare the composition of milk amaranth flour porridge with milk semolina porridge. The composition of amaranth whole-ground flour and amaranth flour of premium grade processed from amaranth seeds grown in Voronezh region has been researched. It is to be noted that protein content in amaranth flour was 10.8-24.3% higher than in semolina, and its biological value and NPU-coefficient were higher by 22.65 and 46.51% respectively; lysine score in amaranth flour protein of premium grade came up to 107.54%, and in semolina protein only 40.95%. The level of digestible carbohydrates, including starch, was lower in amaranth flour than in semolina by 2.79-12.85 and 4.76-15.85% respectively, while fiber content was 15.5-30 fold higher. Fat content in amaranth flour of premium grade was 2,4 fold lower than in whole-ground amaranth flour but it was 45% higher than in semolina. The main advantage of amaranth flour protein compared to wheat protein is the predominance of albumins and globulins and a minimal content of prolamines and alpha-gliadin complete absence. The specifics of chemical composition allow the amaranth flour to be recommended for being included into nutrition of both healthy children and adults and also celiac disease patients. PMID:25059059

  20. Comparative analysis of some search engines

    Taiwo O. Edosomwan; Joseph Edosomwan

    2010-01-01

    We compared the information retrieval performances of some popular search engines (namely, Google, Yahoo, AlltheWeb, Gigablast, Zworks and AltaVista and Bing/MSN) in response to a list of ten queries, varying in complexity. These queries were run on each search engine and the precision and response time of the retrieved results were recorded. The first ten documents on each retrieval output were evaluated as being ‘relevant’ or ‘non-relevant’ for evaluation of the search engine’s precision. T...

  1. Comparative analysis of life insurance market

    Malynych, Anna Mykolayivna

    2011-05-01

    Full Text Available The article deals with the comprehensive analysis of statistic insight into development of the world and regional life insurance markets on the basis of macroeconomic indicators. The author located domestic life insurance market on the global scale, analyzed its development and suggested the methods to calculate the marketing life insurance index. There was also approbated the mentioned methods on database of 77 countries all over the world. The author also defined the national rating on the basis of marketing life insurance index.

  2. MONITORING POTENTIAL DRUG INTERACTIONS AND REACTIONS VIA NETWORK ANALYSIS OF INSTAGRAM USER TIMELINES.

    Correia, Rion Brattig; Li, Lang; Rocha, Luis M

    2016-01-01

    Much recent research aims to identify evidence for Drug-Drug Interactions (DDI) and Adverse Drug reactions (ADR) from the biomedical scientific literature. In addition to this "Bibliome", the universe of social media provides a very promising source of large-scale data that can help identify DDI and ADR in ways that have not been hitherto possible. Given the large number of users, analysis of social media data may be useful to identify under-reported, population-level pathology associated with DDI, thus further contributing to improvements in population health. Moreover, tapping into this data allows us to infer drug interactions with natural products-including cannabis-which constitute an array of DDI very poorly explored by biomedical research thus far. Our goal is to determine the potential of Instagram for public health monitoring and surveillance for DDI, ADR, and behavioral pathology at large. Most social media analysis focuses on Twitter and Facebook, but Instagram is an increasingly important platform, especially among teens, with unrestricted access of public posts, high availability of posts with geolocation coordinates, and images to supplement textual analysis. Using drug, symptom, and natural product dictionaries for identification of the various types of DDI and ADR evidence, we have collected close to 7000 user timelines spanning from October 2010 to June 2015.We report on 1) the development of a monitoring tool to easily observe user-level timelines associated with drug and symptom terms of interest, and 2) population-level behavior via the analysis of co-occurrence networks computed from user timelines at three different scales: monthly, weekly, and daily occurrences. Analysis of these networks further reveals 3) drug and symptom direct and indirect associations with greater support in user timelines, as well as 4) clusters of symptoms and drugs revealed by the collective behavior of the observed population. This demonstrates that Instagram

  3. A comparative analysis of capacity adequacy policies

    In this paper a stochastic dynamic optimization model is used to analyze the effect of different generation adequacy policies in restructured power systems. The expansion decisions of profit-maximizing investors are simulated under a number of different market designs: Energy Only with and without a price cap, Capacity Payment, Capacity Obligation, Capacity Subscription, and Demand Elasticity. The results show that the overall social welfare is reduced compared to a centralized social welfare optimization for all policies except Capacity Subscription and Demand Elasticity. In particular, an energy only market with a low price cap leads to a significant increase in involuntary load shedding. Capacity payments and obligations give additional investment incentives and more generating capacity, but also result in a considerable transfer of wealth from consumers to producers due to the capacity payments. Increased demand elasticity increases social welfare, but also results in a transfer from producers to consumers, compared to the theoretical social welfare optimum. In contrast, the capacity subscription policy increases the social welfare, and both producers and consumers benefit. This is possible because capacity subscription explicitly utilizes differences in consumers' preferences for uninterrupted supply. This advantage must be weighed against the cost of implementation, which is not included in the model.

  4. User`s manual for the data analysis system for monitoring the fuel oil spill at the Sandia National Laboratories installation in Livermore, California

    Widing, M.A.; Leser, C.C.

    1995-04-01

    This report describes the use of the data analysis software developed by Argonne National laboratory (ANL) and installed at the fuel oil spill site at Sandia National Laboratories. This software provides various programs for anlayzing the data from physical and chemical sensors. This manual provides basic information on the design and use of these user interfaces. Analysts use these interfaces to evaluate the site data. Four software programs included in the data analysis software suite provide the following capabilities; physical data analysis, chemical data entry, chemical data analysis, and data management.

  5. Comparing structural decomposition analysis and index

    To analyze and understand historical changes in economic, environmental, employment or other socio-economic indicators, it is useful to assess the driving forces or determinants that underlie these changes. Two techniques for decomposing indicator changes at the sector level are structural decomposition analysis (SDA) and index decomposition analysis (IDA). For example, SDA and IDA have been used to analyze changes in indicators such as energy use, CO2-emissions, labor demand and value added. The changes in these variables are decomposed into determinants such as technological, demand, and structural effects. SDA uses information from input-output tables while IDA uses aggregate data at the sector-level. The two methods have developed quite independently, which has resulted in each method being characterized by specific, unique techniques and approaches. This paper has three aims. First, the similarities and differences between the two approaches are summarized. Second, the possibility of transferring specific techniques and indices is explored. Finally, a numerical example is used to illustrate differences between the two approaches

  6. Resilience and electricity systems: A comparative analysis

    Electricity systems have generally evolved based on the natural resources available locally. Few metrics exist to compare the security of electricity supply of different countries despite the increasing likelihood of potential shocks to the power system like energy price increases and carbon price regulation. This paper seeks to calculate a robust measure of national power system resilience by analysing each step in the process of transformation from raw energy to consumed electricity. Countries with sizeable deposits of mineral resources are used for comparison because of the need for electricity-intensive metals processing. We find that shifts in electricity-intensive industry can be predicted based on countries' power system resilience. - Highlights: ► We establish a resilience index measure for major electricity systems. ► We examine a range of OECD and developing nations electricity systems and their ability to cope with shocks. ► Robustness measures are established to show resilience of electricity systems.

  7. Comparative analysis of some search engines

    Taiwo O. Edosomwan

    2010-10-01

    Full Text Available We compared the information retrieval performances of some popular search engines (namely, Google, Yahoo, AlltheWeb, Gigablast, Zworks and AltaVista and Bing/MSN in response to a list of ten queries, varying in complexity. These queries were run on each search engine and the precision and response time of the retrieved results were recorded. The first ten documents on each retrieval output were evaluated as being ‘relevant’ or ‘non-relevant’ for evaluation of the search engine’s precision. To evaluate response time, normalised recall ratios were calculated at various cut-off points for each query and search engine. This study shows that Google appears to be the best search engine in terms of both average precision (70% and average response time (2 s. Gigablast and AlltheWeb performed the worst overall in this study.

  8. Transportation Routing Analysis Georgraphic Information System (WebTRAGIS) User's Manual

    Michelhaugh, R.D.

    2000-04-20

    In the early 1980s, Oak Ridge National Laboratory (ORNL) developed two transportation routing models: HIGHWAY, which predicts truck transportation routes, and INTERLINE, which predicts rail transportation routes. Both of these models have been used by the U.S. Department of Energy (DOE) community for a variety of routing needs over the years. One of the primary uses of the models has been to determine population-density information, which is used as input for risk assessment with the RADTRAN model, which is available on the TRANSNET computer system. During the recent years, advances in the development of geographic information systems (GISs) have resulted in increased demands from the user community for a GIS version of the ORNL routing models. In April 1994, the DOE Transportation Management Division (EM-261) held a Baseline Requirements Assessment Session with transportation routing experts and users of the HIGHWAY and INTERLINE models. As a result of the session, the development of a new GIS routing model, Transportation Routing Analysis GIS (TRAGIS), was initiated. TRAGIS is a user-friendly, GIS-based transportation and analysis computer model. The older HIGHWAY and INTERLINE models are useful to calculate routes, but they cannot display a graphic of the calculated route. Consequently, many users have experienced difficulty determining the proper node for facilities and have been confused by or have misinterpreted the text-based listing from the older routing models. Some of the primary reasons for the development of TRAGIS are (a) to improve the ease of selecting locations for routing, (b) to graphically display the calculated route, and (c) to provide for additional geographic analysis of the route.

  9. Comparative Modal Analysis of Sieve Hardware Designs

    Thompson, Nathaniel

    2012-01-01

    The CMTB Thwacker hardware operates as a testbed analogue for the Flight Thwacker and Sieve components of CHIMRA, a device on the Curiosity Rover. The sieve separates particles with a diameter smaller than 150 microns for delivery to onboard science instruments. The sieving behavior of the testbed hardware should be similar to the Flight hardware for the results to be meaningful. The elastodynamic behavior of both sieves was studied analytically using the Rayleigh Ritz method in conjunction with classical plate theory. Finite element models were used to determine the mode shapes of both designs, and comparisons between the natural frequencies and mode shapes were made. The analysis predicts that the performance of the CMTB Thwacker will closely resemble the performance of the Flight Thwacker within the expected steady state operating regime. Excitations of the testbed hardware that will mimic the flight hardware were recommended, as were those that will improve the efficiency of the sieving process.

  10. Comparative Marketing: An Interdisciplinary Framework for Institutional Analysis

    Gopalkrishnan R Iyer

    1997-01-01

    Institutional analysis is proposed as an alternative theoretical methodology for the study of comparative marketing systems. This paper argues that institutional analysis offers considerable potential for understanding dynamics marketing systems and for the explicit study of change. Disciplinary insights of institutional analysis are reviewed and the richness of the conceptual apparatus of comparative institutional analysis, as applied to the study of comparative marketing systems, is explica...

  11. Comparative analysis of cystatin superfamily in platyhelminths.

    Aijiang Guo

    Full Text Available The cystatin superfamily is comprised of cysteine proteinase inhibitors and encompasses at least 3 subfamilies: stefins, cystatins and kininogens. In this study, the platyhelminth cystatin superfamily was identified and grouped into stefin and cystatin subfamilies. The conserved domain of stefins (G, QxVxG was observed in all members of platyhelminth stefins. The three characteristics of cystatins, the cystatin-like domain (G, QxVxG, PW, a signal peptide, and one or two conserved disulfide bonds, were observed in platyhelminths, with the exception of cestodes, which lacked the conserved disulfide bond. However, it is noteworthy that cestode cystatins had two tandem repeated domains, although the second tandem repeated domain did not contain a cystatin-like domain, which has not been previously reported. Tertiary structure analysis of Taenia solium cystatin, one of the cestode cystatins, demonstrated that the N-terminus of T. solium cystatin formed a five turn α-helix, a five stranded β-pleated sheet and a hydrophobic edge, similar to the structure of chicken cystatin. Although no conserved disulfide bond was found in T. solium cystatin, the models of T. solium cystatin and chicken cystatin corresponded at the site of the first disulfide bridge of the chicken cystatin. However, the two models were not similar regarding the location of the second disulfide bridge of chicken cystatin. These results showed that T. solium cystatin and chicken cystatin had similarities and differences, suggesting that the biochemistry of T. solium cystatin could be similar to chicken cystatin in its inhibitory function and that it may have further functional roles. The same results were obtained for other cestode cystatins. Phylogenetic analysis showed that cestode cystatins constituted an independent clade and implied that cestode cystatins should be considered to have formed a new clade during evolution.

  12. Hydrogen Financial Analysis Scenario Tool (H2FAST). Web Tool User's Manual

    Bush, B. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Penev, M. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Melaina, M. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Zuboy, J. [Independent Consultant, Golden, CO (United States)

    2015-05-11

    The Hydrogen Financial Analysis Scenario Tool (H2FAST) provides a quick and convenient indepth financial analysis for hydrogen fueling stations. This manual describes how to use the H2FAST web tool, which is one of three H2FAST formats developed by the National Renewable Energy Laboratory (NREL). Although all of the formats are based on the same financial computations and conform to generally accepted accounting principles (FASAB 2014, Investopedia 2014), each format provides a different level of complexity and user interactivity.

  13. Comparative Analysis of Frames with Varying Inertia

    Prerana Nampalli

    2015-01-01

    Full Text Available This paper presents an elastic seismic response of reinforced concrete frames with 3 variations of heights, i.e. (G+2, (G+4, (G+6 storey models are compared for bare frame and frame with brick infill structures which have been analyzed for gravity as well as seismic forces and their response is studied as the geometric parameters varying from view point of predicting behavior of similar structures subjected to similar loads or load combinations. In this study, two different cases are selected i.e. frames with prismatic members and frames with non-prismatic members. The structural response of various members when geometry changes physically, as in case of linear and parabolic haunches provided beyond the face of columns at beam column joints or step variations as in case of stepped haunches was also studied. Frames have been analyzed statically as well as dynamically using ETABS-9.7.4 software referring IS: 456-2000, IS: 1893 (Part-12002 and the results so obtained are grouped into various categories

  14. Comparative economic analysis: Anaerobic digester case study

    An economic guide is developed to assess the value of anaerobic digesters used on dairy farms. Two varieties of anaerobic digesters, a conventional mixed-tank mesophilic and an innovative earthen psychrophilic, are comparatively evaluated using a cost-effectiveness index. The two case study examples are also evaluated using three other investment merit statistics: simple payback period, net present value, and internal rate of return. Life-cycle savings are estimated for both varieties, with sensitivities considered for investment risk. The conclusion is that an earthen psychrophilic digester can have a significant economic advantage over a mixed-tank mesophilic digester because of lower capital cost and reduced operation and maintenance expenses. Because of this economic advantage, additional projects are being conducted in North Carolina to increase the rate of biogas utilization. The initial step includes using biogas for milk cooling at the dairy farm where the existing psychrophilic digester is located. Further, a new project is being initiated for electricity production with thermal reclaim at a swine operation

  15. LINGUISTIC AND POLITICAL ANALYSIS: COMPARATIVE ASPECTS

    V. M. Alpatov

    2015-07-01

    Full Text Available Abstract: The article analyses the book on political systems and processes in the East prepared by MGIMO-University authors and edited by Alexei D. Voskressenski in order to show the differences in approach and methods used in linguistics and political science. The author shows two significant differences in present-day stressing that linguistics of the XIX century was closer to the present-day political science? As he believes. The first difference includes monism of political science approach, since the book reveals monistic scale from totalitarianism to democracy, while linguistic has abandoned the monistic view on typology. The second difference is the value-addedness of the political science approach. The value-free norm in linguistics presupposes setting up of a single standard for all speakers in order to reach full mutual understanding. In political science subjective criteria are decisive for evaluation. The article gives examples from the book to prove that political science, compared to linguistics, is not aimed at overcoming contradictions, distinguishing between the terms, avoiding unproved statements and subjective evaluations.

  16. A prescribed wake rotor inflow and flow field prediction analysis, user's manual and technical approach

    Egolf, T. A.; Landgrebe, A. J.

    1982-01-01

    A user's manual is provided which includes the technical approach for the Prescribed Wake Rotor Inflow and Flow Field Prediction Analysis. The analysis is used to provide the rotor wake induced velocities at the rotor blades for use in blade airloads and response analyses and to provide induced velocities at arbitrary field points such as at a tail surface. This analysis calculates the distribution of rotor wake induced velocities based on a prescribed wake model. Section operating conditions are prescribed from blade motion and controls determined by a separate blade response analysis. The analysis represents each blade by a segmented lifting line, and the rotor wake by discrete segmented trailing vortex filaments. Blade loading and circulation distributions are calculated based on blade element strip theory including the local induced velocity predicted by the numerical integration of the Biot-Savart Law applied to the vortex wake model.

  17. Comparative analysis of enterprise risk management models

    Nikolaev Igor V.

    2012-01-01

    The article is devoted to the analysis and the comparison of modern enterprise risk management models used in domestic and world practice. Some thesis to build such a model are proposed.Статья посвящена анализу и сравнению современных моделей управления рисками предприятий, которые используются в отечественной и зарубежной практике. Предложены некоторые положения, на которых должны базироваться такие модели....

  18. CARBON SEQUESTRATION: A METHODS COMPARATIVE ANALYSIS

    All human activities are related with the energy consumption. Energy requirements will continue to rise, due to the modern life and the developing countries growth. Most of the energy demand emanates from fossil fuels. Fossil fuels combustion has negative environmental impacts, with the CO2 production to be dominating. The fulfillment of the Kyoto protocol criteria requires the minimization of CO2 emissions. Thus the management of the CO2 emissions is an urgent matter. The use of appliances with low energy use and the adoption of an energy policy that prevents the unnecessary energy use, can play lead to the reduction of carbon emissions. A different route is the introduction of ''clean'' energy sources, such as renewable energy sources. Last but not least, the development of carbon sequestration methods can be promising technique with big future potential. The objective of this work is the analysis and comparison of different carbon sequestration and deposit methods. Ocean deposit, land ecosystems deposit, geological formations deposit and radical biological and chemical approaches will be analyzed

  19. Implementation of Hierarchical Task Analysis for User Interface Design in Drawing Application for Early Childhood Education

    Mira Kania Sabariah

    2016-05-01

    Full Text Available Draw learning in early childhood is an important lesson and full of stimulation of the process of growth and development of children which could help to train the fine motor skills. We have had a lot of applications that can be used to perform learning, including interactive learning applications. Referring to the observations that have been conducted showed that the experiences given by the applications that exist today are very diverse and have not been able to represent the model of learning and characteristics of early childhood (4-6 years. Based on the results, Hierarchical Task Analysis method generated a list of tasks that must be done in designing an user interface that represents the user experience in draw learning. Then by using the Heuristic Evaluation method the usability of the model has fulfilled a very good level of understanding and also it can be enhanced and produce a better model.

  20. Transversal analysis of public policies on user fees exemptions in six West African countries

    Ridde Valéry

    2012-11-01

    Full Text Available Abstract Background While more and more West African countries are implementing public user fees exemption policies, there is still little knowledge available on this topic. The long time required for scientific production, combined with the needs of decision-makers, led to the creation in 2010 of a project to support implementers in aggregating knowledge on their experiences. This article presents a transversal analysis of user fees exemption policies implemented in Benin, Burkina Faso, Mali, Niger, Togo and Senegal. Methods This was a multiple case study with several embedded levels of analysis. The cases were public user fees exemption policies selected by the participants because of their instructive value. The data used in the countries were taken from documentary analysis, interviews and questionnaires. The transversal analysis was based on a framework for studying five implementation components and five actors’ attitudes usually encountered in these policies. Results The analysis of the implementation components revealed: a majority of State financing; maintenance of centrally organized financing; a multiplicity of reimbursement methods; reimbursement delays and/or stock shortages; almost no implementation guides; a lack of support measures; communication plans that were rarely carried out, funded or renewed; health workers who were given general information but not details; poorly informed populations; almost no evaluation systems; ineffective and poorly funded coordination systems; low levels of community involvement; and incomplete referral-evacuation systems. With regard to actors’ attitudes, the analysis revealed: objectives that were appreciated by everyone; dissatisfaction with the implementation; specific tensions between healthcare providers and patients; overall satisfaction among patients, but still some problems; the perception that while the financial barrier has been removed, other barriers persist; occasionally a

  1. Comparative analysis of laparoscopic low rectal resections

    I. L. Chernikovsky

    2015-07-01

    to 9.3 versus 6.2 in Group1. ULAR required consumables costing an average of 45 000 rubles more than did ISR. Conclusion. Both surgical procedures are comparable in the duration of a surgical intervention, the volume of intraoperative blood loss, and the quality of TME. ULAR with a reservoir is functionally more preferential.  

  2. Analysis of User Need with CD-ROM Databases: A Case Study Based on Work Sampling at One University Library.

    Wells, Amy Tracy

    Analysis of the needs of users of Compact Disk-Read Only Memory (CD-ROM) was performed at the Tampa campus of the University of South Florida. A review of the literature indicated that problems associated with selecting the appropriate database, searching, and requiring technical assistance were the probable areas of user need. The library has 17…

  3. GUARDD: user-friendly MATLAB software for rigorous analysis of CPMG RD NMR data

    Molecular dynamics are essential for life, and nuclear magnetic resonance (NMR) spectroscopy has been used extensively to characterize these phenomena since the 1950s. For the past 15 years, the Carr-Purcell Meiboom-Gill relaxation dispersion (CPMG RD) NMR experiment has afforded advanced NMR labs access to kinetic, thermodynamic, and structural details of protein and RNA dynamics in the crucial μs-ms time window. However, analysis of RD data is challenging because datasets are often large and require many non-linear fitting parameters, thereby confounding assessment of accuracy. Moreover, novice CPMG experimentalists face an additional barrier because current software options lack an intuitive user interface and extensive documentation. Hence, we present the open-source software package GUARDD (Graphical User-friendly Analysis of Relaxation Dispersion Data), which is designed to organize, automate, and enhance the analytical procedures which operate on CPMG RD data (http://code.google.com/p/guardd/http://code.google.com/p/guardd/). This MATLAB-based program includes a graphical user interface, permits global fitting to multi-field, multi-temperature, multi-coherence data, and implements χ2-mapping procedures, via grid-search and Monte Carlo methods, to enhance and assess fitting accuracy. The presentation features allow users to seamlessly traverse the large amount of results, and the RD Simulator feature can help design future experiments as well as serve as a teaching tool for those unfamiliar with RD phenomena. Based on these innovative features, we expect that GUARDD will fill a well-defined gap in service of the RD NMR community.

  4. GUARDD: user-friendly MATLAB software for rigorous analysis of CPMG RD NMR data

    Kleckner, Ian R., E-mail: ian.kleckner@gmail.com [Biophysics Program, Ohio State University (United States); Foster, Mark P., E-mail: Foster.281@osu.edu [Ohio State University, Biochemistry Department (United States)

    2012-01-15

    Molecular dynamics are essential for life, and nuclear magnetic resonance (NMR) spectroscopy has been used extensively to characterize these phenomena since the 1950s. For the past 15 years, the Carr-Purcell Meiboom-Gill relaxation dispersion (CPMG RD) NMR experiment has afforded advanced NMR labs access to kinetic, thermodynamic, and structural details of protein and RNA dynamics in the crucial {mu}s-ms time window. However, analysis of RD data is challenging because datasets are often large and require many non-linear fitting parameters, thereby confounding assessment of accuracy. Moreover, novice CPMG experimentalists face an additional barrier because current software options lack an intuitive user interface and extensive documentation. Hence, we present the open-source software package GUARDD (Graphical User-friendly Analysis of Relaxation Dispersion Data), which is designed to organize, automate, and enhance the analytical procedures which operate on CPMG RD data (http://code.google.com/p/guardd/http://code.google.com/p/guardd/). This MATLAB-based program includes a graphical user interface, permits global fitting to multi-field, multi-temperature, multi-coherence data, and implements {chi}{sup 2}-mapping procedures, via grid-search and Monte Carlo methods, to enhance and assess fitting accuracy. The presentation features allow users to seamlessly traverse the large amount of results, and the RD Simulator feature can help design future experiments as well as serve as a teaching tool for those unfamiliar with RD phenomena. Based on these innovative features, we expect that GUARDD will fill a well-defined gap in service of the RD NMR community.

  5. Alkahest NuclearBLAST : a user-friendly BLAST management and analysis system

    Burke Mark

    2005-06-01

    Full Text Available Abstract Background - Sequencing of EST and BAC end datasets is no longer limited to large research groups. Drops in per-base pricing have made high throughput sequencing accessible to individual investigators. However, there are few options available which provide a free and user-friendly solution to the BLAST result storage and data mining needs of biologists. Results - Here we describe NuclearBLAST, a batch BLAST analysis, storage and management system designed for the biologist. It is a wrapper for NCBI BLAST which provides a user-friendly web interface which includes a request wizard and the ability to view and mine the results. All BLAST results are stored in a MySQL database which allows for more advanced data-mining through supplied command-line utilities or direct database access. NuclearBLAST can be installed on a single machine or clustered amongst a number of machines to improve analysis throughput. NuclearBLAST provides a platform which eases data-mining of multiple BLAST results. With the supplied scripts, the program can export data into a spreadsheet-friendly format, automatically assign Gene Ontology terms to sequences and provide bi-directional best hits between two datasets. Users with SQL experience can use the database to ask even more complex questions and extract any subset of data they require. Conclusion - This tool provides a user-friendly interface for requesting, viewing and mining of BLAST results which makes the management and data-mining of large sets of BLAST analyses tractable to biologists.

  6. Risk Analysis and Decision-Making Software Package (1997 Version) User Manual

    Chung, F.T.H.

    1999-02-11

    This manual provides instructions for using the U.S. Department of Energy's (DOE) risk analysis and decision making software (1997 version) developed at BDM Petroleum Technologies by BDM-Oklahoma, Inc. for DOE, under contract No. DE-AC22-94PC91OO8. This software provides petroleum producers with a simple, handy tool for exploration and production risk analysis and decision-making. It collects useful risk analysis tools in one package so that users do not have to use several programs separately. The software is simple to use, but still provides many functions. The 1997 version of the software package includes the following tools: (1) Investment risk (Gambler's ruin) analysis; (2) Monte Carlo simulation; (3) Best fit for distribution functions; (4) Sample and rank correlation; (5) Enhanced oil recovery method screening; and (6) artificial neural network. This software package is subject to change. Suggestions and comments from users are welcome and will be considered for future modifications and enhancements of the software. Please check the opening screen of the software for the current contact information. In the future, more tools will be added to this software package. This manual includes instructions on how to use the software but does not attempt to fully explain the theory and algorithms used to create it.

  7. Comparative analysis of equalization methods for SC-FDMA

    Dogadaev, Anton Konstantinovich; Kozlov, Alexander; Ukhanova, Ann

    2010-01-01

    In this paper we introduce comparative analysis for different types of equalization schemes, based on the minimum mean square error (MMSE) optimization. The following types of equalizers were compared: linear equalization, decision feedback equalization (DFE) and turbo equalization. Performance and...

  8. Who Are the Open Learners? A Comparative Study Profiling Non-Formal Users of Open Educational Resources

    Farrow, Robert; de los Arcos, Beatriz; Pitt, Rebecca; Weller, Martin

    2015-01-01

    Open educational resources (OER) have been identified as having the potential to extend opportunities for learning to non-formal learners. However, little research has been conducted into the impact of OER on non-formal learners. This paper presents the results of a systematic survey of more than 3,000 users of open educational resources (OER).…

  9. "I Want My Robot to Look for Food": Comparing Kindergartner's Programming Comprehension Using Tangible, Graphic, and Hybrid User Interfaces

    Strawhacker, Amanda; Bers, Marina U.

    2015-01-01

    In recent years, educational robotics has become an increasingly popular research area. However, limited studies have focused on differentiated learning outcomes based on type of programming interface. This study aims to explore how successfully young children master foundational programming concepts based on the robotics user interface (tangible,…

  10. AsyncStageOut: Distributed user data management for CMS Analysis

    Riahi, H.; Wildish, T.; Ciangottini, D.; Hernández, J. M.; Andreeva, J.; Balcas, J.; Karavakis, E.; Mascheroni, M.; Tanasijczuk, A. J.; Vaandering, E. W.

    2015-12-01

    AsyncStageOut (ASO) is a new component of the distributed data analysis system of CMS, CRAB, designed for managing users' data. It addresses a major weakness of the previous model, namely that mass storage of output data was part of the job execution resulting in inefficient use of job slots and an unacceptable failure rate at the end of the jobs. ASO foresees the management of up to 400k files per day of various sizes, spread worldwide across more than 60 sites. It must handle up to 1000 individual users per month, and work with minimal delay. This creates challenging requirements for system scalability, performance and monitoring. ASO uses FTS to schedule and execute the transfers between the storage elements of the source and destination sites. It has evolved from a limited prototype to a highly adaptable service, which manages and monitors the user file placement and bookkeeping. To ensure system scalability and data monitoring, it employs new technologies such as a NoSQL database and re-uses existing components of PhEDEx and the FTS Dashboard. We present the asynchronous stage-out strategy and the architecture of the solution we implemented to deal with those issues and challenges. The deployment model for the high availability and scalability of the service is discussed. The performance of the system during the commissioning and the first phase of production are also shown, along with results from simulations designed to explore the limits of scalability.

  11. AsyncStageOut: Distributed User Data Management for CMS Analysis

    Riahi, H. [CERN; Wildish, T. [Princeton U.; Ciangottini, D. [Perugia U.; Hernández, J. M. [Madrid, CIEMAT; Andreeva, J. [CERN; Balcas, J. [Vilnius U.; Karavakis, E. [CERN; Mascheroni, M. [INFN, Milan Bicocca; Tanasijczuk, A. J. [UC, San Diego; Vaandering, E. W. [Fermilab

    2015-12-23

    AsyncStageOut (ASO) is a new component of the distributed data analysis system of CMS, CRAB, designed for managing users' data. It addresses a major weakness of the previous model, namely that mass storage of output data was part of the job execution resulting in inefficient use of job slots and an unacceptable failure rate at the end of the jobs. ASO foresees the management of up to 400k files per day of various sizes, spread worldwide across more than 60 sites. It must handle up to 1000 individual users per month, and work with minimal delay. This creates challenging requirements for system scalability, performance and monitoring. ASO uses FTS to schedule and execute the transfers between the storage elements of the source and destination sites. It has evolved from a limited prototype to a highly adaptable service, which manages and monitors the user file placement and bookkeeping. To ensure system scalability and data monitoring, it employs new technologies such as a NoSQL database and re-uses existing components of PhEDEx and the FTS Dashboard. We present the asynchronous stage-out strategy and the architecture of the solution we implemented to deal with those issues and challenges. The deployment model for the high availability and scalability of the service is discussed. The performance of the system during the commissioning and the first phase of production are also shown, along with results from simulations designed to explore the limits of scalability.

  12. User's manual of a support system for human reliability analysis. JASPAHR Version 1.5

    Many kind of human reliability analysis (HRA) methods have been developed. However, analysts are required to be skillful so as to use them, and also required complicated works such as drawing event tree (ET) and calculation of uncertainty bounds. Moreover, each method is not so complete that only one method of them is not enough to evaluate human reliability. Therefore, a personal computer based support system JASPAHR for HRA has been developed to execute HRA practically and efficiently. The system supports HRAs with two different types of method, namely, simple method and detailed one. The former uses ASEP that is a simplified THERP-technique, and combined method of OAT and HRA-ET/DeBDA is used for the latter. Users can select a suitable method for their purpose. Human error probability data were collected and a database of them is provided to link with the support system. JASPAHR was improved such as the introduction of the INTENT method for misdiagnosis evaluation and the improvement of user interface. The report is a user's manual for modified JASPAHR (Ver. 1.5). (author)

  13. PCB/transformer techno-economic analysis model: User manual, volume 2

    Plum, Martin M.; Geimer, Ray M.

    1989-02-01

    This model is designed to evaluate the economic viability of replacing or retrofilling a PCB transformer with numerous non-PCB transformer options. Replacement options include conventional, amorphous, amorphous-liquid filled, or amorphous-liquid filled-high performance transformers. The retrofill option is the process that removes and disposes this with non-PCB dielectric. Depending on data available, the skills of the user, and the intent of the analysis, there are three model options available to the user. For practical purposes, Level 1 requires the least amount of input data from the user while Level 3 requires the greatest quantity of data. This manual is designed for people who have a minimum experience with Lotus 123 and are familiar with electric transformers. This manual covers system requirements, how to install the model on your system, how to get started, how to move around in the model, how to make changes in the model data, how to print information, how to save your work, and how to exit from the model.

  14. User's manual and analysis methodology of probabilistic fracture mechanics analysis code PASCAL3 for reactor pressure vessel (Contract research)

    As a part of the structural integrity research for aging LWR (Light Water Reactor) components, the probabilistic fracture mechanics (PFM) analysis code PASCAL (PFM Analysis of Structural Components in Aging LWR) has been developed in JAEA. The PASCAL code evaluates the conditional probabilities of crack initiation and fracture of a reactor pressure vessel (RPV) under transient conditions such as pressurized thermal shock (PTS). The continuous development of the code has been aimed to improve the accuracy and reliability of analysis by introducing new analysis methodologies and algorithms considering recent developments in the fracture mechanics and computer performance. Previous version of PASCAL (PASCAL Ver.2) that was released in 2007 has many functions including the evaluation method for an embedded crack and conditional probabilities of crack initiation and fracture of a RPV, PTS transient database, inspection crack detection probability model and others. Since 2007, the PASCAL Ver. 2 has been improved mainly considering the effects of weld-overlay cladding on the inner surface of RPV. A generalized analysis method is available on the basis of the development of PASCAL Ver.3 and sensitivity analysis results. Graphical user interface (GUI) including a generalized method and some functions of probabilistic fracture mechanics have been also updated for PASCAL3. This report provides the user's manual, examples of analysis and theoretical background of PASCAL Ver.3. (author)

  15. Thermal APU/hydraulics analysis program. User's guide and programmer's manual

    Deluna, T. A.

    1976-01-01

    The User's Guide information plus program description necessary to run and have a general understanding of the Thermal APU/Hydraulics Analysis Program (TAHAP) is described. This information consists of general descriptions of the APU/hydraulic system and the TAHAP model, input and output data descriptions, and specific subroutine requirements. Deck setups and input data formats are included and other necessary and/or helpful information for using TAHAP is given. The math model descriptions for the driver program and each of its supporting subroutines are outlined.

  16. Three looks at users: a comparison of methods for studying digital library use. User studies, Digital libraries, Digital music libraries, Music, Information use, Information science, Contextual inquiry, Contextual design, User research, Questionnaires, Log file analysis

    Mark Notess

    2004-01-01

    Full Text Available Compares three user research methods of studying real-world digital library usage within the context of the Variations and Variations2 digital music libraries at Indiana University. After a brief description of both digital libraries, each method is described and illustrated with findings from the studies. User satisfaction questionnaires were used in two studies, one of Variations (n=30 and the other of Variations2 (n=12. Second, session activity log files were examined for 175 Variations2 sessions using both quantitative and qualitative methods. The third method, contextual inquiry, is illustrated with results from field observations of four voice students' information usage patterns. The three methods are compared in terms of expertise required; time required to set up, conduct, and analyse resulting data; and the benefits derived. Further benefits are achieved with a mixed-methods approach, combining the strengths of the methods to answer questions lingering as a result of other methods.

  17. User's manual and analysis methodology of probabilistic fracture mechanics analysis code PASCAL Ver.2 for reactor pressure vessel (Contract research)

    As a part of the aging structural integrity research for LWR components, the probabilistic fracture mechanics (PFM) analysis code PASCAL (PFM Analysis of Structural Components in Aging LWR) has been developed in JAEA. This code evaluates the conditional probabilities of crack initiation and fracture of a reactor pressure vessel (RPV) under transient conditions such as pressurized thermal shock (PTS). The development of the code has been aimed to improve the accuracy and reliability of analysis by introducing new analysis methodologies and algorithms considering the recent development in the fracture mechanics and computer performance. PASCAL Ver.1 has functions of optimized sampling in the stratified Monte Carlo simulation, elastic-plastic fracture criterion of the R6 method, crack growth analysis models for a semi-elliptical crack, recovery of fracture toughness due to thermal annealing and so on. Since then, under the contract between the Ministry of Economy, Trading and Industry of Japan and JAEA, we have continued to develop and introduce new functions into PASCAL Ver.2 such as the evaluation method for an embedded crack, KI database for a semi-elliptical crack considering stress discontinuity at the base/cladding interface, PTS transient database, and others. A generalized analysis method is proposed on the basis of the development of PASCAL Ver.2 and results of sensitivity analyses. Graphical user interface (GUI) including a generalized method as default values has been also developed for PASCAL Ver.2. This report provides the user's manual and theoretical background of PASCAL Ver.2. (author)

  18. Comparing the Performance of Expert User Heuristics and an Integer Linear Program in Aircraft Carrier Deck Operations

    Ryan, Jason C.; Banerjee, Ashis; Roy, Nicholas; Cummings, M.L.

    2013-01-01

    Planning operations across a number of domains can be considered as resource allocation problems with timing constraints. An unexplored instance of such a problem domain is the aircraft carrier flight deck, where, in current operations, replanning is done without the aid of any computerized decision support. Rather, veteran operators employ a set of experience-based heuristics to quickly generate new operating schedules. These expert user heuristics are neither codified nor evaluated by the U...

  19. Comparing the capabilities and performance of the ultra high frequency follow-on system with the mobile user objective system

    Matassa, Christopher K.

    2011-01-01

    Approved for public release; distribution is unlimited. The Mobile User Objective System (MUOS) is the DoD's next generation military Ultra High Frequency (UHF) Satellite Communication (SATCOM) system being designed to augment and eventually replace the currently oversubscribed UHF Follow-On (UFO) System. MUOS adapts a commercial third generation (3G) Wideband Code Division Multiple Access (WCDMA) cellular phone network architecture and combines it with geosynchronous satellites (in place ...

  20. Comparative analysis from hydroelectric generation versus natural gas

    The aim of the work was to present a comparative analysis between hydroelectric generation and natural gas based on integrated resource planning and sustainable development. The introduced comparative analysis considers the financial aspects; the appropriated technology; and the social, environmental and political factors. The hydroelectric option it showed more advantageous than the thermoelectric. This result was independent of the enterprise scale

  1. Factors Affecting Collective Action for Forest Fire Management: A Comparative Study of Community Forest User Groups in Central Siwalik, Nepal

    Sapkota, Lok Mani; Shrestha, Rajendra Prasad; Jourdain, Damien; Shivakoti, Ganesh P.

    2015-01-01

    The attributes of social ecological systems affect the management of commons. Strengthening and enhancing social capital and the enforcement of rules and sanctions aid in the collective action of communities in forest fire management. Using a set of variables drawn from previous studies on the management of commons, we conducted a study across 20 community forest user groups in Central Siwalik, Nepal, by dividing the groups into two categories based on the type and level of their forest fire management response. Our study shows that the collective action in forest fire management is consistent with the collective actions in other community development activities. However, the effectiveness of collective action is primarily dependent on the complex interaction of various variables. We found that strong social capital, strong enforcement of rules and sanctions, and users' participation in crafting the rules were the major variables that strengthen collective action in forest fire management. Conversely, users' dependency on a daily wage and a lack of transparency were the variables that weaken collective action. In fire-prone forests such as the Siwalik, our results indicate that strengthening social capital and forming and enforcing forest fire management rules are important variables that encourage people to engage in collective action in fire management.

  2. ClimatePipes: User-Friendly Data Access, Manipulation, Analysis & Visualization of Community Climate Models

    Chaudhary, A.; DeMarle, D.; Burnett, B.; Harris, C.; Silva, W.; Osmari, D.; Geveci, B.; Silva, C.; Doutriaux, C.; Williams, D. N.

    2013-12-01

    The impact of climate change will resonate through a broad range of fields including public health, infrastructure, water resources, and many others. Long-term coordinated planning, funding, and action are required for climate change adaptation and mitigation. Unfortunately, widespread use of climate data (simulated and observed) in non-climate science communities is impeded by factors such as large data size, lack of adequate metadata, poor documentation, and lack of sufficient computational and visualization resources. We present ClimatePipes to address many of these challenges by creating an open source platform that provides state-of-the-art, user-friendly data access, analysis, and visualization for climate and other relevant geospatial datasets, making the climate data available to non-researchers, decision-makers, and other stakeholders. The overarching goals of ClimatePipes are: - Enable users to explore real-world questions related to climate change. - Provide tools for data access, analysis, and visualization. - Facilitate collaboration by enabling users to share datasets, workflows, and visualization. ClimatePipes uses a web-based application platform for its widespread support on mainstream operating systems, ease-of-use, and inherent collaboration support. The front-end of ClimatePipes uses HTML5 (WebGL, Canvas2D, CSS3) to deliver state-of-the-art visualization and to provide a best-in-class user experience. The back-end of the ClimatePipes is built around Python using the Visualization Toolkit (VTK, http://vtk.org), Climate Data Analysis Tools (CDAT, http://uv-cdat.llnl.gov), and other climate and geospatial data processing tools such as GDAL and PROJ4. ClimatePipes web-interface to query and access data from remote sources (such as ESGF). Shown in the figure is climate data layer from ESGF on top of map data layer from OpenStreetMap. The ClimatePipes workflow editor provides flexibility and fine grained control, and uses the VisTrails (http

  3. Appropriateness of antibiotic treatment in intravenous drug users, a retrospective analysis

    Fluckiger Ursula

    2008-04-01

    Full Text Available Abstract Background Infectious disease is often the reason for intravenous drug users being seen in a clinical setting. The objective of this study was to evaluate the appropriateness of treatment and outcomes for this patient population in a hospital setting. Methods Retrospective study of all intravenous drug users hospitalized for treatment of infectious diseases and seen by infectious diseases specialists 1/2001–12/2006 at a university hospital. Treatment was administered according to guidelines when possible or to alternative treatment program in case of patients for whom adherence to standard protocols was not possible. Outcomes were defined with respect to appropriateness of treatment, hospital readmission, relapse and mortality rates. For statistical analysis adjustment for multiple hospitalizations of individual patients was made by using a generalized estimating equation. Results The total number of hospitalizations for infectious diseases was 344 among 216 intravenous drug users. Skin and soft tissue infections (n = 129, 37.5% of hospitalizations, pneumonia (n = 75, 21.8% and endocarditis (n = 54, 15.7% were most prevalent. Multiple infections were present in 25%. Treatment was according to standard guidelines for 78.5%, according to an alternative recommended program for 11.3%, and not according to guidelines or by the infectious diseases specialist advice for 10.2% of hospitalizations. Psychiatric disorders had a significant negative impact on compliance (compliance problems in 19.8% of hospitalizations in multiple logistic regression analysis (OR = 2.4, CI 1.1–5.1, p = 0.03. The overall readmission rate and relapse rate within 30 days was 13.7% and 3.8%, respectively. Both non-compliant patient behavior (OR = 3.7, CI 1.3–10.8, p = 0.02 and non-adherence to treatment guidelines (OR = 3.3, CI 1.1–9.7, p = 0.03 were associated with a significant increase in the relapse rate in univariate analysis. In 590 person-years of follow

  4. PAPST, a User Friendly and Powerful Java Platform for ChIP-Seq Peak Co-Localization Analysis and Beyond.

    Paul W Bible

    Full Text Available Comparative co-localization analysis of transcription factors (TFs and epigenetic marks (EMs in specific biological contexts is one of the most critical areas of ChIP-Seq data analysis beyond peak calling. Yet there is a significant lack of user-friendly and powerful tools geared towards co-localization analysis based exploratory research. Most tools currently used for co-localization analysis are command line only and require extensive installation procedures and Linux expertise. Online tools partially address the usability issues of command line tools, but slow response times and few customization features make them unsuitable for rapid data-driven interactive exploratory research. We have developed PAPST: Peak Assignment and Profile Search Tool, a user-friendly yet powerful platform with a unique design, which integrates both gene-centric and peak-centric co-localization analysis into a single package. Most of PAPST's functions can be completed in less than five seconds, allowing quick cycles of data-driven hypothesis generation and testing. With PAPST, a researcher with or without computational expertise can perform sophisticated co-localization pattern analysis of multiple TFs and EMs, either against all known genes or a set of genomic regions obtained from public repositories or prior analysis. PAPST is a versatile, efficient, and customizable tool for genome-wide data-driven exploratory research. Creatively used, PAPST can be quickly applied to any genomic data analysis that involves a comparison of two or more sets of genomic coordinate intervals, making it a powerful tool for a wide range of exploratory genomic research. We first present PAPST's general purpose features then apply it to several public ChIP-Seq data sets to demonstrate its rapid execution and potential for cutting-edge research with a case study in enhancer analysis. To our knowledge, PAPST is the first software of its kind to provide efficient and sophisticated post

  5. Life-Cycle Cost-Benefit (LCCB) Analysis of Bridges from a User and Social Point of View

    Thoft-Christensen, Palle

    2009-01-01

    During the last two decades, important progress has been made in the life-cycle cost-benefit (LCCB) analysis of structures, especially offshore platforms, bridges and nuclear installations. Due to the large uncertainties related to the deterioration, maintenance, and benefits of such structures...... point of view. In the paper, negative benefits (user costs) are discussed in relation to the maintenance of concrete bridges. A limited number of excerpts from published reports that are related to the importance of estimating user costs when repairs of bridges are planned, and when optimized strategies...... are formulated, are shown. These excerpts clearly show that user costs in several cases completely dominate the total costs. In some cases, the user costs are more than ten times higher than the repair costs. A simple example of how to relate and estimate user costs to the repair of a single bridge is...

  6. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  7. arrayCGHbase: an analysis platform for comparative genomic hybridization microarrays

    Moreau Yves

    2005-05-01

    Full Text Available Abstract Background The availability of the human genome sequence as well as the large number of physically accessible oligonucleotides, cDNA, and BAC clones across the entire genome has triggered and accelerated the use of several platforms for analysis of DNA copy number changes, amongst others microarray comparative genomic hybridization (arrayCGH. One of the challenges inherent to this new technology is the management and analysis of large numbers of data points generated in each individual experiment. Results We have developed arrayCGHbase, a comprehensive analysis platform for arrayCGH experiments consisting of a MIAME (Minimal Information About a Microarray Experiment supportive database using MySQL underlying a data mining web tool, to store, analyze, interpret, compare, and visualize arrayCGH results in a uniform and user-friendly format. Following its flexible design, arrayCGHbase is compatible with all existing and forthcoming arrayCGH platforms. Data can be exported in a multitude of formats, including BED files to map copy number information on the genome using the Ensembl or UCSC genome browser. Conclusion ArrayCGHbase is a web based and platform independent arrayCGH data analysis tool, that allows users to access the analysis suite through the internet or a local intranet after installation on a private server. ArrayCGHbase is available at http://medgen.ugent.be/arrayCGHbase/.

  8. Latent Class Analysis of Polysubstance Use, Sexual Risk Behaviors, and Infectious Disease Among South African Drug Users

    Trenz, Rebecca C.; Scherer, Michael; Duncan, Alexandra; Harrell, Paul; Moleko, Anne Gloria; Latimer, William

    2013-01-01

    Background HIV transmission risk among non-injection drug users is high due to the co-occurrence of drug use and sexual risk behaviors. The purpose of the current study was to identify patterns of drug use among polysubstance users within a high HIV prevalence population. Methods The study sample included 409 substance users from the Pretoria region of South Africa. Substances used by 20% or more the sample included: cigarettes, alcohol, marijuana and heroin in combination, marijuana and cigarettes in combination, and crack cocaine. Latent class analysis was used to identify patterns of polysubstance use based on types of drugs used. Multivariate logistic regression analyses compared classes on demographics, sexual risk behavior, and disease status. Results Four classes of substance use were found: MJ+Cig (40.8%), MJ+Her (30.8%), Crack (24.7%), and Low Use (3.7%). The MJ+Cig class was 6.7 times more likely to use alcohol and 3 times more likely to use drugs before/during sex with steady partners than the Crack class. The MJ+Cig class was16 times more likely to use alcohol before/during sex with steady partners than the MJ+Her class. The Crack class was 6.1 times more likely to engage in transactional sex and less likely to use drugs before/during steady sex than the MJ+Her class. Conclusions Findings illustrate patterns of drug use among a polysubstance using population that differ in sexual risk behavior. Intervention strategies should address substance use, particularly smoking as a route of administration (ROA), and sexual risk behaviors that best fit this high-risk population. PMID:23562370

  9. BPO crude oil analysis data base user`s guide: Methods, publications, computer access correlations, uses, availability

    Sellers, C.; Fox, B.; Paulz, J.

    1996-03-01

    The Department of Energy (DOE) has one of the largest and most complete collections of information on crude oil composition that is available to the public. The computer program that manages this database of crude oil analyses has recently been rewritten to allow easier access to this information. This report describes how the new system can be accessed and how the information contained in the Crude Oil Analysis Data Bank can be obtained.

  10. [Regulating the internet: a comparative analysis of Brazil, Chile, Spain, the US, and France].

    Segurado, Rosemary; Lima, Carolina Silva Mandú de; Ameni, Cauê S

    2015-12-01

    Global governance is of key concern in the current debate over the workings of the world's computer network, and Brazil has played a notable role in this process, especially after approval of the Marco Civil da Internet (law 12.965, april 23, 2014), which defines Brazil's regulatory framework for the internet. Dubbed the internet bill of rights, this law sets out the principles, guarantees, rights, and duties of internet users and providers in Brazil. Based on the fundamental categories of net neutrality, internet users' right to privacy, and copyright discussions from the perspective of intellectual property, the article offers a comparative analysis of regulations in five countries: Brazil, Chile, Spain, the US, and France. PMID:25119248

  11. Qualitative analysis of end user computing strategy and experiences in promoting nursing informatics in Taiwan.

    Hou, I-Ching; Chang, Polun; Wang, Tsen-Yung

    2006-01-01

    The purpose of this study was to analyse end user computing strategy and experiences in promoting nursing informatics in Taiwan. In February 2004, an 8-day NI technology training campaign was held in Taipei for 60 clinical nurses. Excel VBA was used as the tool to teach the clinical nurses, who had never written any programs, but were very interested in informatics. Three projects were determined after detailed discussion and evaluation of clinical needs and technical feasibility between the nurses and the technical support team, which was composed of one experienced informatics professor and one clinical NI assistant. A qualitative analysis was used to interview the three pairs of programming clinical nurses and their direct supervisors with a structured but open questionnaire. Representative concepts were categorized from the data until all were categorized. The concepts were organized under three categories: the purposes, the benefits and the challenges of system development. According to this study, end user computing strategy with Excel VBA was successful so far. PMID:17102334

  12. User's guide for the REBUS-3 fuel cycle analysis capability

    Toppel, B.J.

    1983-03-01

    REBUS-3 is a system of programs designed for the fuel-cycle analysis of fast reactors. This new capability is an extension and refinement of the REBUS-3 code system and complies with the standard code practices and interface dataset specifications of the Committee on Computer Code Coordination (CCCC). The new code is hence divorced from the earlier ARC System. In addition, the coding has been designed to enhance code exportability. Major new capabilities not available in the REBUS-2 code system include a search on burn cycle time to achieve a specified value for the multiplication constant at the end of the burn step; a general non-repetitive fuel-management capability including temporary out-of-core fuel storage, loading of fresh fuel, and subsequent retrieval and reloading of fuel; significantly expanded user input checking; expanded output edits; provision of prestored burnup chains to simplify user input; option of fixed-or free-field BCD input formats; and, choice of finite difference, nodal or spatial flux-synthesis neutronics in one-, two-, or three-dimensions.

  13. "Quite a Profoundly Strange Experience": An Analysis of the Experiences of Salvia divinorum Users.

    Hutton, Fiona; Kivell, Bronwyn; Boyle, Otis

    2016-01-01

    Salvia divnorum (an intense hallucinogen) is currently illegal in New Zealand under the 2014 Psychoactive Substances Amendment Act. Despite this, there is a scarcity of research surrounding Salvia divinorum and its effects in a New Zealand context. To explore the experiences of Salvia divinorum users, an anonymous questionnaire was advertised through flyers placed in locations where young adults congregate. A total of 393 people took part in the online questionnaire in 2010-2011, while salvia was legally available in New Zealand; 167 respondents had used salvia. Thematic analysis was used to analyze the resulting open-ended questionnaire data and three key themes were identified: the effects of salvia; the importance of set and setting; salvia use and pleasure/not-pleasure. Recreational use of salvia was situated within a broader drug landscape, with participants being drug experienced and "drug wise" (Measham, Aldridge, and Parker 2001). Use of salvia also appeared to be intermittent, with its use referred to as a novel experience. Thus, the recent criminalization of salvia under the 2014 Act may see a significant decline in use as experienced drug users look elsewhere for novel drug experiences. PMID:27176133

  14. It Leaks More Than You Think: Fingerprinting Users from Web Traffic Analysis

    Xujing Huang

    2015-01-01

    We show how, in real-world web applications, confidential information about user identities can be leaked through “non-intuitive communications”, in particular web traffic which appear to be not related to the user information. In fact, our experiments on Google users demonstrate that even Google accounts are vulnerable on traffic attacks against user identities, using packet sizes and directions. And this work shows this kind of non-intuitive communication can leak even more information abou...

  15. What service users with psychotic disorders want in a mental health crisis or relapse: thematic analysis of joint crisis plans

    Farrelly, Simone; Brown, Gill; Rose, Diana; Doherty, Elizabeth, Anne; Henderson, R Claire; Birchwood, Max; Marshall, Max; Waheed, Waquas; Szmukler, George; Thornicroft, Graham

    2014-01-01

    Purpose Recent legislation and guidance in England emphasises the importance of service user choice in care planning. However, it is not obvious how best to facilitate choices in care planning, and some clinicians are concerned that service users may make ‘unwise’ decisions. This study aimed to examine mental health service users’ preferences and priorities in the event of a future mental health crisis or relapse. Method Thematic analysis of 221 joint crisis plans (JCP) developed by service u...

  16. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  17. Comparative analysis of myocardial revascularization methods for ischemic heart disease

    Sinkeev M.S.

    2012-09-01

    Full Text Available The review of literature is devoted to the comparative analysis of clinical researches of efficiency and frequency of complications after application of surgical and medicamentous methods of treatment of coronary heart disease.

  18. Reconceptualizing Early and Late Onset: A Life Course Analysis of Older Heroin Users

    Boeri, Miriam Williams; Sterk, Claire E.; Elifson, Kirk W.

    2008-01-01

    Purpose: Researchers' knowledge regarding older users of illicit drugs is limited despite the increasing numbers of users. In this article, we apply a life course perspective to gain a further understanding of older adult drug use, specifically contrasting early- and late-onset heroin users. Design and Methods: We collected qualitative data from…

  19. Standardization: using comparative maintenance costs in an economic analysis

    Clark, Roger Nelson

    1987-01-01

    This thesis investigates the use of comparative maintenance costs of functionally interchangeable equipments in similar U.S. Navy shipboard applications in an economic analysis of standardization. The economics of standardization, life-cycle costing, and the Navy 3-M System are discussed in general. An analysis of 3-M System maintenance costs for a selected equipment, diesel engines, is conducted. The potential use of comparative maintenance costs in determining an equipment standard and e...

  20. Bitmap indices for fast end-user physics analysis in ROOT

    Most physics analysis jobs involve multiple selection steps on the input data. These selection steps are called cuts or queries. A common strategy to implement these queries is to read all input data from files and then process the queries in memory. In many applications the number of variables used to define these queries is a relative small portion of the overall data set therefore reading all variables into memory takes unnecessarily long time. In this paper we describe an integration effort that can significantly reduce this unnecessary reading by using an efficient compressed bitmap index technology. The primary advantage of this index is that it can process arbitrary combinations of queries very efficiently, while most other indexing technologies suffer from the 'curse of dimensionality' as the number of queries increases. By integrating this index technology with the ROOT analysis framework, the end-users can benefit from the added efficiency without having to modify their analysis programs. Our performance results show that for multi-dimensional queries, bitmap indices outperform the traditional analysis method up to a factor of 10

  1. COMPARATIVE ANALYSIS OF CONGESTION CONTROL MODELS FOR CELLULAR WIRELESS NETWORK

    Falade A. J

    2015-08-01

    Full Text Available Cellular wireless systems like GSM suffer from congestion resulting in overall system degradation and poor service delivery. When the traffic demand in a geographical area is high, the input traffic rate will exceed thecapacity of the output lines. This work focused on homogenous wireless network (the network traffic and resource dimensioning that are statistically identical such that the network performance evaluation can be reduced to a system with single cell and a single traffic type. Such system can employa queuing model to evaluate the performance metric of a cell in terms of blocking probability. Five congestion control models were compared in the work to ascertain their peculiarities, they are Erlang B, Erlang C, Engset (cleared, Engset (buffered, and Bernoulli. To analyze the system, an aggregate onedimensional Markov chain wasderived, such that it describes a call arrival process under the assumption that it is Poisson distributed. The models were simulated and their results show varying performances, however the Bernoulli model (Pb5 tends to show a situation that allows more users access to the system and the congestion level remain unaffected despite increase in the number of users and the offered traffic into the system.

  2. GENLPLOT: An interactive program for display and analysis of data: User's manual

    GENLPLOT is an interactive program written in FORTRAN and running under VAX/VMS that enables technicians, scientists, engineers, and other users to quickly and accurately examine and analyze data. The current version utilizes the GRAPAC4 plot package, reads a standard input file or permits direct data entry, and is optimized for use with data stored in MDS databases. This program has been the principal interactive data analysis tool used on the Tara Tandem Mirror Experiment and on the Constance II Mirror Experiment. The program is menu driven with options selected on command lines distinguished by various prompts. Subsequent changes and additions to the program will be indicated by a version number greater than that appearing in the welcome message and will be documented in the appropriate menu(s)

  3. The Quantitative Analysis of User Behavior Online - Data, Models and Algorithms

    Raghavan, Prabhakar

    By blending principles from mechanism design, algorithms, machine learning and massive distributed computing, the search industry has become good at optimizing monetization on sound scientific principles. This represents a successful and growing partnership between computer science and microeconomics. When it comes to understanding how online users respond to the content and experiences presented to them, we have more of a lacuna in the collaboration between computer science and certain social sciences. We will use a concrete technical example from image search results presentation, developing in the process some algorithmic and machine learning problems of interest in their own right. We then use this example to motivate the kinds of studies that need to grow between computer science and the social sciences; a critical element of this is the need to blend large-scale data analysis with smaller-scale eye-tracking and "individualized" lab studies.

  4. Relationship between methamphetamine use history and segmental hair analysis findings of MA users.

    Han, Eunyoung; Lee, Sangeun; In, Sanghwan; Park, Meejung; Park, Yonghoon; Cho, Sungnam; Shin, Junguk; Lee, Hunjoo

    2015-09-01

    The aim of this study was to investigate the relationship between methamphetamine (MA) use history and segmental hair analysis (1 and 3cm sections) and whole hair analysis results in Korean MA users in rehabilitation programs. Hair samples were collected from 26 Korean MA users. Eleven of the 26 subjects used cannabis with MA and two used cocaine, opiates, and MDMA with MA. Self-reported single dose of MA from the 26 subjects ranged from 0.03 to 0.5g/one time. Concentrations of MA and its metabolite amphetamine (AP) in hair were determined by gas chromatography mass spectrometry (GC/MS) after derivatization. The method used was well validated. Qualitative analysis from all 1cm sections (n=154) revealed a good correlation between positive or negative results for MA in hair and self-reported MA use (69.48%, n=107). In detail, MA results were positive in 66 hair specimens of MA users who reported administering MA, and MA results were negative in 41 hair specimens of MA users who denied MA administration in the corresponding month. Test results were false-negative in 10.39% (n=16) of hair specimens and false-positive in 20.13% (n=31) of hair specimens. In false positive cases, it is considered that after MA cessation it continued to be accumulated in hair still, while in false negative cases, self-reported histories showed a small amount of MA use or MA use 5-7 months previously. In terms of quantitative analysis, the concentrations of MA in 1 and 3cm long hair segments and in whole hair samples ranged from 1.03 to 184.98 (mean 22.01), 2.26 to 89.33 (mean 18.71), and 0.91 to 124.49 (mean 15.24)ng/mg, respectively. Ten subjects showed a good correlation between MA use and MA concentration in hair. Correlation coefficient (r) of 7 among 10 subjects ranged from 0.71 to 0.98 (mean 0.85). Four subjects showed a low correlation between MA use and MA concentration in hair. Correlation coefficient (r) of 4 subjects ranged from 0.36 to 0.55. Eleven subjects showed a poor

  5. Light water reactor fuel analysis code FEMAXI-IV(Ver.2). Detailed structure and user's manual

    A light water reactor fuel behavior analysis code FEMAXI-IV(Ver.2) was developed as an improved version of FEMAXI-IV. Development of FEMAXI-IV has been already finished in 1992, though a detailed structure and input manual of the code have not been open to users yet. Here, the basic theories and structure, the models and numerical solutions applied to FEMAXI-IV(Ver.2), and the material properties adopted in the code are described in detail. In FEMAXI-IV(Ver.2), programming bugs in previous FEMAXI-IV were eliminated, renewal of the pellet thermal conductivity was performed, and a model of thermal-stress restraint on FP gas release was incorporated. For facilitation of effective and wide-ranging application of the code, methods of input/output of the code are also described in detail, and sample output is included. (author)

  6. Thermal Insulation System Analysis Tool (TISTool) User's Manual. Version 1.0.0

    Johnson, Wesley; Fesmire, James; Leucht, Kurt; Demko, Jonathan

    2010-01-01

    The Thermal Insulation System Analysis Tool (TISTool) was developed starting in 2004 by Jonathan Demko and James Fesmire. The first edition was written in Excel and Visual BasIc as macros. It included the basic shapes such as a flat plate, cylinder, dished head, and sphere. The data was from several KSC tests that were already in the public literature realm as well as data from NIST and other highly respectable sources. More recently, the tool has been updated with more test data from the Cryogenics Test Laboratory and the tank shape was added. Additionally, the tool was converted to FORTRAN 95 to allow for easier distribution of the material and tool. This document reviews the user instructions for the operation of this system.

  7. Customer service on the Czech mobile telecommunication market. Comparative Analysis

    Hanzlík, Radek

    2013-01-01

    The main goal of this thesis is to compare the quality of customer service between the Mobile Network Operators (MNOs) and Mobile Virtual Network Operators (MVNOs) on the Czech mobile telecommunication market. The mystery shopping method is used as the source of data for the comparative analysis.

  8. GATA: a graphic alignment tool for comparative sequence analysis

    Nix David A; Eisen Michael B

    2005-01-01

    Abstract Background Several problems exist with current methods used to align DNA sequences for comparative sequence analysis. Most dynamic programming algorithms assume that conserved sequence elements are collinear. This assumption appears valid when comparing orthologous protein coding sequences. Functional constraints on proteins provide strong selective pressure against sequence inversions, and minimize sequence duplications and feature shuffling. For non-coding sequences this collineari...

  9. Natural user interfaces in medical image analysis cognitive analysis of brain and carotid artery images

    Ogiela, Marek R

    2014-01-01

    This unique text/reference highlights a selection of practical applications of advanced image analysis methods for medical images. The book covers the complete methodology for processing, analysing and interpreting diagnostic results of sample CT images. The text also presents significant problems related to new approaches and paradigms in image understanding and semantic image analysis. To further engage the reader, example source code is provided for the implemented algorithms in the described solutions. Features: describes the most important methods and algorithms used for image analysis; e

  10. Daas: A Web-based System for User-specific Dietary Analysis and Advice for the Public Healthcare Domain

    Deirdre Nugent; Kudakwashe Dube; Wu Bing

    2003-01-01

    This paper presents a Dietary Analysis and Advice System (DAAS), a web-based system for providing, within the public healthcare domain, user-specific diet advice based on a preliminary analysis of current diet or eating habits and lifestyle, using knowledge from domain expertise and experts' interpretation of national dietary guidelines.

  11. MultiMetEval: comparative and multi-objective analysis of genome-scale metabolic models.

    Piotr Zakrzewski

    Full Text Available Comparative metabolic modelling is emerging as a novel field, supported by the development of reliable and standardized approaches for constructing genome-scale metabolic models in high throughput. New software solutions are needed to allow efficient comparative analysis of multiple models in the context of multiple cellular objectives. Here, we present the user-friendly software framework Multi-Metabolic Evaluator (MultiMetEval, built upon SurreyFBA, which allows the user to compose collections of metabolic models that together can be subjected to flux balance analysis. Additionally, MultiMetEval implements functionalities for multi-objective analysis by calculating the Pareto front between two cellular objectives. Using a previously generated dataset of 38 actinobacterial genome-scale metabolic models, we show how these approaches can lead to exciting novel insights. Firstly, after incorporating several pathways for the biosynthesis of natural products into each of these models, comparative flux balance analysis predicted that species like Streptomyces that harbour the highest diversity of secondary metabolite biosynthetic gene clusters in their genomes do not necessarily have the metabolic network topology most suitable for compound overproduction. Secondly, multi-objective analysis of biomass production and natural product biosynthesis in these actinobacteria shows that the well-studied occurrence of discrete metabolic switches during the change of cellular objectives is inherent to their metabolic network architecture. Comparative and multi-objective modelling can lead to insights that could not be obtained by normal flux balance analyses. MultiMetEval provides a powerful platform that makes these analyses straightforward for biologists. Sources and binaries of MultiMetEval are freely available from https://github.com/PiotrZakrzewski/MetEval/downloads.

  12. COMPARATIVE ANALYSIS OF CELEBRITY AND NON-CELEBRITY ADVERTISEMENT

    Ammar Asad; Muhammad Naseem Hayat; Shafaqat Mehmood

    2013-01-01

    This study is undertaken to make a comparative analysis of celebrity advertisement and non-celebrity advertisement with respect to attitude toward advertisement, attitude toward brand, purchase intentions, and advertising attributes. For this purpose, a simple random sample of 200 students studying four different disciplines was taken from the Private University in Lahore. For econometric proof, reliability analysis, descriptive analysis, and independent sample T-test was used to interpret th...

  13. User's manual for seismic analysis code 'SONATINA-2V'

    Hanawa, Satoshi; Iyoku, Tatsuo [Japan Atomic Energy Research Inst., Oarai, Ibaraki (Japan). Oarai Research Establishment

    2001-08-01

    The seismic analysis code, SONATINA-2V, has been developed to analyze the behavior of the HTTR core graphite components under seismic excitation. The SONATINA-2V code is a two-dimensional computer program capable of analyzing the vertical arrangement of the HTTR graphite components, such as fuel blocks, replaceable reflector blocks, permanent reflector blocks, as well as their restraint structures. In the analytical model, each block is treated as rigid body and is restrained by dowel pins which restrict relative horizontal movement but allow vertical and rocking motions between upper and lower blocks. Moreover, the SONATINA-2V code is capable of analyzing the core vibration behavior under both simultaneous excitations of vertical and horizontal directions. The SONATINA-2V code is composed of the main program, pri-processor for making the input data to SONATINA-2V and post-processor for data processing and making the graphics from analytical results. Though the SONATINA-2V code was developed in order to work in the MSP computer system of Japan Atomic Energy Research Institute (JAERI), the computer system was abolished with the technical progress of computer. Therefore, improvement of this analysis code was carried out in order to operate the code under the UNIX machine, SR8000 computer system, of the JAERI. The users manual for seismic analysis code, SONATINA-2V, including pri- and post-processor is given in the present report. (author)

  14. C language program analysis system (CLAS) part 1: graphical user interface (GUI)

    CLAS (C Language Program Analysis System) is a reverse engineering tool intended for use in the verification and validation (V and V) phase of software programs developed in the ANSI C language. From the source code, CLAS generates data pertaining to two conceptual models of software programs viz., Entity-Relationship (E-R) model and Control Flow Graphs (CFG) model. Browsing tools within CLAS, make use of this data, to provide different graphical views of the project. Static analysis tools have been developed earlier for analysing assembly language programs. CLAS is a continuation of this work to provide automated support in analysis of ANSI C language programs. CLAS provides an integrated Graphical User Interface (GUI) based environment under which programs can be analysed into the above mentioned models and the analysed data can be viewed using the browsing tools. The GUI of CLAS is implemented using an OPEN LOOK compliant tool kit XVIEW on Sun SPARC IPC workstation running Sun OS 4.1.1 rev. B. This report describes the GUI of CLAS. CLAS is also expected to be useful in other contexts which may involve understanding architecture/structure of already developed C language programs. Such requirements can arise while carrying out activities like code modification, parallelising etc. (author). 5 refs., 13 figs., 1 appendix

  15. The analysis of wms management system: a multi case study in developer companies and users

    Felipe Furlan Soriano

    2014-02-01

    Full Text Available In recent years the number of companies that use WMS on its storage operation has increased. However, a great part of organizations that adopt this system has difficulties in the implementation process or in fully exploit its resources. In this context, this research aims to analyze the WMS system, identifying the key barriers inherent in its implementation process, the benefits and features curently offered to the market, as well as the trends to the tool development. This analysis was performed through the method of multicase study under the perspective of two system developers and three users. Based on the content analysis of the informations from literature review, the semi-structered interviews and the documentary analysis performed was possible to identify as the main difficulties in the process of system implementation the flaws in registration of products and addresses, mapping of logistics processes, the staff training and cultural work change. Regarding the system benefits, stands out the better operational control and the stock accuracy improvement. Finally the trends for the tool improvement involve linking the system with tablets and smartphones, integrations with RFID technology and customized reports generation.

  16. Is the contribution of community forest users financially efficient? A household level benefit-cost analysis of community forest management in Nepal

    Rajesh Kumar Rai

    2016-02-01

    Full Text Available Community forestry in Nepal is considered an exemplary forest management regime. However, the economics behind managing a community forest is not fully studied. This study examines whether the benefits generated from community forest management justify the contributions of forest users. The study is based on a survey of community forest users in Chitwan, Nepal. A household level benefit-cost analysis was performed to quantify and compare the costs and benefits from community forest management. Only direct benefits were included in the analysis. The study shows that older forest user groups derive more benefits to households compared to more recently established ones. The extent of timber harvesting also substantially influences the size of the household benefits. In addition, redistribution of benefits at the household level, in terms of income generating activities and payment for involvement in forest management activities, also enhances household benefits. Sensitivity analysis suggests that the current practice of community forest management enhances the welfare of rural households in this subsistence community. However, this finding is sensitive to assumptions regarding the opportunity cost of time. The study also found that the household costs of community forest management depend upon two factors – the area of community forest and the size of the forest area relative to the number of households.

  17. Recent national trends in Salvia divinorum use and substance-use disorders among recent and former Salvia divinorum users compared with nonusers

    Blazer DG

    2011-04-01

    .5%. Adjusted multinomial logistic analyses indicated polydrug use as the strongest determinant for recent and former S. divinorum use. An estimated 43.0% of past-year S. divinorum users and 28.9% of former S. divinorum users had an illicit or nonmedical drug-use disorder compared with 2.5% of nonusers. Adjusted logistic regression analyses showed that recent and former S. divinorum users had greater odds of having past-year depression and a substance-use disorder (alcohol or drugs than past-year alcohol or drug users who did not use S. divinorum.Conclusion: S. divinorum use is prevalent among recent or active drug users who have used other hallucinogens or stimulants. The high prevalence of substance use disorders among recent S. divinorum users emphasizes the need to study health risks of drug interactions.Keywords: alcohol-use disorders, drug-use disorders, ecstasy, lysergic acid diethylamide, major depression, multiple race, nicotine dependence, phencyclidine, prescription drug abuse

  18. Privacy - an Issue for eLearning? A Trend Analysis Reflecting the Attitude of European eLearning Users

    Borcea-Pfitzmann, Katrin

    2007-01-01

    Availing services provided via the Internet became a widely accepted means in organising one's life. Beside others, eLearning goes with this trend as well. But, while employing Internet service makes life more convenient, at the same time, it raises risks with respect to the protection of the users' privacy. This paper analyses the attitudes of eLearning users towards their privacy by, initially, pointing out terminology and legal issues connected with privacy. Further, the concept and implementation as well as a result analysis of a conducted study is presented, which explores the problem area from different perspectives. The paper will show that eLearning users indeed care for the protection of their personal information when using eLearning services. However, their attitudes and behaviour slightly differ. In conclusion, we provide first approaches of assisting possibilities for users how to resolve the difference of requirements and their actual activities with respect to privacy protection.

  19. Who are portal users vs. early e-Visit adopters? A preliminary analysis.

    Jung, C; Padman, R; Shevchik, G; Paone, S

    2011-01-01

    Patient portals and eVisits are gaining momentum due to increasing consumer demand for improved access to clinical information and services, availability of new technologies to deploy them and development of reimbursement initiatives by major payers. Despite increasing interest in online health consultation by consumers, adoption has been slow and little is known about the users of such services. In this study, we analyze the key features that distinguish early adopters of eVisits from portal consumers, in aggregate and in four distinct ambulatory practices, using data from a major healthcare provider in Western Pennsylvania. Preliminary results indicate that out of 10,532 portal users, the 336 patients who submitted 446 eVisits between April 1, 2009 and May 31, 2010 are younger on average, predominantly female, not retired, but in poorer health condition. They access the portal more frequently, indicating that they are potentially more involved in managing their health. Using fixed-effects logistic regression models to compare across practices, we note that practice indicator is a significant predictor of eVisit usage, perhaps due to the varying strategies used to build awareness and encourage adoption. Despite the small difference in out-of-pocket payment for eVisits covered by insurance vs. otherwise, insurance coverage for eVisits significantly contributes to increased usage. In ongoing work, additional characteristics of patients and practices that have access to the patient portal will be used to better delineate patients' choice of eVisit vs. the traditional office visit. PMID:22195168

  20. Comparative analysis of traditional and alternative energy sources

    The presented thesis with designation of Comparing analysis of traditional and alternative energy resources includes, on basis of theoretical information source, research in firm, internal data, trends in company development and market, description of the problem and its application. Theoretical information source is dedicated to the traditional and alternative energy resources, reserves of it, trends in using and development, the balance of it in the world, EU and in Slovakia as well. Analysis of the thesis is reflecting profile of the company and the thermal pump market evaluation using General Electric method. While the company is implementing, except other products, the thermal pumps on geothermal energy base and surround energy base (air), the mission of the comparing analysis is to compare traditional energy resources with thermal pump from the ecological, utility and economic side of it. The results of the comparing analysis are resumed in to the SWOT analysis. The part of the thesis includes t he questionnaire offer for effectiveness improvement and customer satisfaction analysis, and expected possibilities of alternative energy resources assistance (benefits) from the government and EU funds. (authors)

  1. CoVennTree: A new method for the comparative analysis of large datasets

    Steffen C. Lott

    2015-02-01

    Full Text Available The visualization of massive datasets, such as those resulting from comparative metatranscriptome analyses or the analysis of microbial population structures using ribosomal RNA sequences, is a challenging task. We developed a new method called CoVennTree (Comparative weighted Venn Tree that simultaneously compares up to three multifarious datasets by aggregating and propagating information from the bottom to the top level and produces a graphical output in Cytoscape. With the introduction of weighted Venn structures, the contents and relationships of various datasets can be correlated and simultaneously aggregated without losing information. We demonstrate the suitability of this approach using a dataset of 16S rDNA sequences obtained from microbial populations at three different depths of the Gulf of Aqaba in the Red Sea. CoVennTree has been integrated into the Galaxy ToolShed and can be directly downloaded and integrated into the user instance.

  2. Shape Analysis of 3D Head Scan Data for U.S. Respirator Users

    Zhuang, Ziqing; Slice, DennisE; Benson, Stacey; Lynch, Stephanie; Viscusi, DennisJ

    2010-12-01

    In 2003, the National Institute for Occupational Safety and Health (NIOSH) conducted a head-and-face anthropometric survey of diverse, civilian respirator users. Of the 3,997 subjects measured using traditional anthropometric techniques, surface scans and 26 three-dimensional (3D) landmark locations were collected for 947 subjects. The objective of this study was to report the size and shape variation of the survey participants using the 3D data. Generalized Procrustes Analysis (GPA) was conducted to standardize configurations of landmarks associated with individuals into a common coordinate system. The superimposed coordinates for each individual were used as commensurate variables that describe individual shape and were analyzed using Principal Component Analysis (PCA) to identify population variation. The first four principal components (PC) account for 49% of the total sample variation. The first PC indicates that overall size is an important component of facial variability. The second PC accounts for long and narrow or short and wide faces. Longer narrow orbits versus shorter wider orbits can be described by PC3, and PC4 represents variation in the degree of ortho/prognathism. Geometric Morphometrics provides a detailed and interpretable assessment of morphological variation that may be useful in assessing respirators and devising new test and certification standards.

  3. SYSMOD: user-interface for data processing, calculation codes and analysis of PWR lattices

    The task of the physical calculation of the reactor demand of the management of a great volume of information and inclose the stages for processing of data, calculations and analysis of their results. These stages are highly sensible to human mistakes, that's why is imprescindible that them undergo automatization, doing tracked all the process against mistake or unexpected result. The user-interface SYSMOD was developed over the platform IDE Delphi 3.0, visual language driven to events. It to consist in of the principal menu, which inclose between its options the preparation of the input data (File and Edit) to the pre-processors for the calculation codes of reactors. The output information may be showed in graphic and/or alphanumeric format (Data-Process). SYSMOD endures two applications for the management of the data base for the data during the preparation of the input for the pre-processors of the spectral calculation, so as for the organization, conservation and presentation for the obtained results. The carried out of the lattices and global codes, takes place from this application, over the platform MS-DOS (Run). SYSMOD regards the possibility for the debugging of the codes (Debugging), so as the benchmarks qualified to so effect (Benchmark). SYSMOD has been applied for the analysis of te WWER-440 of the first unity of Juragua Nuclear Power Plant. (author)

  4. Shape Analysis of 3D Head Scan Data for U.S. Respirator Users

    Slice DennisE

    2010-01-01

    Full Text Available In 2003, the National Institute for Occupational Safety and Health (NIOSH conducted a head-and-face anthropometric survey of diverse, civilian respirator users. Of the 3,997 subjects measured using traditional anthropometric techniques, surface scans and 26 three-dimensional (3D landmark locations were collected for 947 subjects. The objective of this study was to report the size and shape variation of the survey participants using the 3D data. Generalized Procrustes Analysis (GPA was conducted to standardize configurations of landmarks associated with individuals into a common coordinate system. The superimposed coordinates for each individual were used as commensurate variables that describe individual shape and were analyzed using Principal Component Analysis (PCA to identify population variation. The first four principal components (PC account for 49% of the total sample variation. The first PC indicates that overall size is an important component of facial variability. The second PC accounts for long and narrow or short and wide faces. Longer narrow orbits versus shorter wider orbits can be described by PC3, and PC4 represents variation in the degree of ortho/prognathism. Geometric Morphometrics provides a detailed and interpretable assessment of morphological variation that may be useful in assessing respirators and devising new test and certification standards.

  5. Model Based User's Access Requirement Analysis of E-Governance Systems

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  6. Integrating Actionable User-defined Faceted Rules into the Hybrid Science Data System for Advanced Rapid Imaging & Analysis

    Manipon, G. J. M.; Hua, H.; Owen, S. E.; Sacco, G. F.; Agram, P. S.; Moore, A. W.; Yun, S. H.; Fielding, E. J.; Lundgren, P.; Rosen, P. A.; Webb, F.; Liu, Z.; Smith, A. T.; Wilson, B. D.; Simons, M.; Poland, M. P.; Cervelli, P. F.

    2014-12-01

    The Hybrid Science Data System (HySDS) scalably powers the ingestion, metadata extraction, cataloging, high-volume data processing, and publication of the geodetic data products for the Advanced Rapid Imaging & Analysis for Monitoring Hazard (ARIA-MH) project at JPL. HySDS uses a heterogeneous set of worker nodes from private & public clouds as well as virtual & bare-metal machines to perform every aspect of the traditional science data system. For our science data users, the forefront of HySDS is the facet search interface, FacetView, which allows them to browse, filter, and access the published products. Users are able to explore the collection of product metadata information and apply multiple filters to constrain the result set down to their particular interests. It allows them to download these faceted products for further analysis and generation of derived products. However, we have also employed a novel approach to faceting where it is also used to apply constraints for custom monitoring of products, system resources, and triggers for automated data processing. The power of the facet search interface is well documented across various domains and its usefulness is rooted in the current state of existence of metadata. However, user needs usually extend beyond what is currently present in the data system. A user interested in synthetic aperture radar (SAR) data over Kilauea will download them from FacetView but would also want email notification of future incoming scenes. The user may even want that data pushed to a remote workstation for automated processing. Better still, these future products could trigger HySDS to run the user's analysis on its array of worker nodes, on behalf of the user, and ingest the resulting derived products. We will present our findings in integrating an ancillary, user-defined, system-driven processing system for HySDS that allows users to define faceted rules based on facet constraints and triggers actions when new SAR data

  7. Randomized Trial Comparing Two Treatment Strategies Using Prize-Based Reinforcement of Abstinence in Cocaine and Opiate Users

    Preston, Kenzie L.; Ghitza, Udi E.; Schmittner, John P.; Schroeder, Jennifer R.; Epstein, David H.

    2008-01-01

    We compared two strategies of prize-based contingency management (CM) in methadone-maintained outpatients. Urine was tested thrice weekly for 5 weeks pre-CM, 12 weeks CM, and 8 weeks post-CM. Participants were randomly assigned to a cocaine contingency (four prize draws for each cocaine-negative urine, N = 29) or an opiate-cocaine contingency (one…

  8. Informatics in Education and Koli Calling: a Comparative Analysis

    SIMON

    2009-04-01

    Full Text Available The journal Informatics in Education and the conference Koli Calling are compared, starting with Simon's system for the classification of computing education papers and going on to conduct a brief bibliometric analysis of the authors of papers in both publications, including their repeat rates and the countries from which they come. The analysis finds that despite their different natures, the Lithuanian journal and the Finnish conference are highly comparable in many respects. The broad conclusion is that the two publications work well together - but it would be good to see some Lithuanian authors contributing papers to Koli Calling.

  9. Evaluating experimental bias and completeness in comparative phosphoproteomics analysis.

    Jos Boekhorst

    Full Text Available Unraveling the functional dynamics of phosphorylation networks is a crucial step in understanding the way in which biological networks form a living cell. Recently there has been an enormous increase in the number of measured phosphorylation events. Nevertheless, comparative and integrative analysis of phosphoproteomes is confounded by incomplete coverage and biases introduced by different experimental workflows. As a result, we cannot differentiate whether phosphosites indentified in only one or two samples are the result of condition or species specific phosphorylation, or reflect missing data. Here, we evaluate the impact of incomplete phosphoproteomics datasets on comparative analysis, and we present bioinformatics strategies to quantify the impact of different experimental workflows on measured phosphoproteomes. We show that plotting the saturation in observed phosphosites in replicates provides a reproducible picture of the extent of a particular phosphoproteome. Still, we are still far away from a complete picture of the total human phosphoproteome. The impact of different experimental techniques on the similarity between phosphoproteomes can be estimated by comparing datasets from different experimental pipelines to a common reference. Our results show that comparative analysis is most powerful when datasets have been generated using the same experimental workflow. We show this experimentally by measuring the tyrosine phosphoproteome from Caenorhabditis elegans and comparing it to the tyrosine phosphoproteome of HeLa cells, resulting in an overlap of about 4%. This overlap between very different organisms represents a three-fold increase when compared to dataset of older studies, wherein different workflows were used. The strategies we suggest enable an estimation of the impact of differences in experimental workflows on the overlap between datasets. This will allow us to perform comparative analyses not only on datasets specifically

  10. BLAT-Based Comparative Analysis for Transposable Elements: BLATCAT

    Sangbum Lee; Sumin Oh; Keunsoo Kang; Kyudong Han

    2014-01-01

    The availability of several whole genome sequences makes comparative analyses possible. In primate genomes, the priority of transposable elements (TEs) is significantly increased because they account for ~45% of the primate genomes, they can regulate the gene expression level, and they are associated with genomic fluidity in their host genomes. Here, we developed the BLAST-like alignment tool (BLAT) based comparative analysis for transposable elements (BLATCAT) program. The BLATCAT program ca...

  11. Sequence and comparative analysis of Leuconostoc dairy bacteriophages

    Kot, Witold; Hansen, Lars Henrik; Neve, Horst;

    2014-01-01

    mesenteroides or Leuconostoc pseudomesenteroides strains. The phages have dsDNA genomes with sizes ranging from 25.7 to 28.4kb. Comparative genomics analysis helped classify the 9 phages into two classes, which correlates with the host species. High percentage of similarity within the classes on both nucleotide...... modification, respectively. No lysogeny modules were detected. To our knowledge this report provides the first comparative genomic work done on Leuconostoc dairy phages....

  12. Vertical Guidance Performance Analysis of the L1-L5 Dual-Frequency GPS/WAAS User Avionics Sensor

    Shau-Shiun Jan

    2010-03-01

    Full Text Available This paper investigates the potential vertical guidance performance of global positioning system (GPS/wide area augmentation system (WAAS user avionics sensor when the modernized GPS and Galileo are available. This paper will first investigate the airborne receiver code noise and multipath (CNMP confidence (σair. The σair will be the dominant factor in the availability analysis of an L1-L5 dual-frequency GPS/WAAS user avionics sensor. This paper uses the MATLAB Algorithm Availability Simulation Tool (MAAST to determine the required values for the σair, so that an L1-L5 dual-frequency GPS/WAAS user avionics sensor can meet the vertical guidance requirements of APproach with Vertical guidance (APV II and CATegory (CAT I over conterminous United States (CONUS. A modified MAAST that includes the Galileo satellite constellation is used to determine under what user configurations WAAS could be an APV II system or a CAT I system over CONUS. Furthermore, this paper examines the combinations of possible improvements in signal models and the addition of Galileo to determine if GPS/WAAS user avionics sensor could achieve 10 m Vertical Alert Limit (VAL within the service volume. Finally, this paper presents the future vertical guidance performance of GPS user avionics sensor for the United States’ WAAS, Japanese MTSAT-based satellite augmentation system (MSAS and European geostationary navigation overlay service (EGNOS.

  13. Vertical guidance performance analysis of the L1-L5 dual-frequency GPS/WAAS user avionics sensor.

    Jan, Shau-Shiun

    2010-01-01

    This paper investigates the potential vertical guidance performance of global positioning system (GPS)/wide area augmentation system (WAAS) user avionics sensor when the modernized GPS and Galileo are available. This paper will first investigate the airborne receiver code noise and multipath (CNMP) confidence (σair). The σair will be the dominant factor in the availability analysis of an L1-L5 dual-frequency GPS/WAAS user avionics sensor. This paper uses the MATLAB Algorithm Availability Simulation Tool (MAAST) to determine the required values for the σair, so that an L1-L5 dual-frequency GPS/WAAS user avionics sensor can meet the vertical guidance requirements of APproach with Vertical guidance (APV) II and CATegory (CAT) I over conterminous United States (CONUS). A modified MAAST that includes the Galileo satellite constellation is used to determine under what user configurations WAAS could be an APV II system or a CAT I system over CONUS. Furthermore, this paper examines the combinations of possible improvements in signal models and the addition of Galileo to determine if GPS/WAAS user avionics sensor could achieve 10 m Vertical Alert Limit (VAL) within the service volume. Finally, this paper presents the future vertical guidance performance of GPS user avionics sensor for the United States' WAAS, Japanese MTSAT-based satellite augmentation system (MSAS) and European geostationary navigation overlay service (EGNOS). PMID:22319263

  14. Gap Analysis Comparing LLNL ISMS and ISO 14001

    Doerr, T B

    2004-08-09

    A gap analysis was conducted comparing the Lawrence Livermore National Laboratory (LLNL) Integrated Safety Management System (ISMS) with the international standard ISO 14001 Environmental Management System and with Department of Energy (DOE) Order 450.1. This analysis was accomplished as part of LLNL's assessment of the impacts of adopting DOE Order 450.1 and comprises a portion of its continuous improvement efforts under ISMS.

  15. Project risk simulation methods – a comparative analysis

    Constanța-Nicoleta BODEA; Augustin PURNUȘ

    2012-01-01

    Effective risk management provides a solid basis for decisionmaking in projects, bringing important benefits. While the financial and economical crisis is present at the global level and the competition in the market is more and more aggressive, the interest in project risk management increases. The paper presents a comparative analysis of the effectiveness of two quantitative risk analysis methods, Monte Carlo simulation and the Three Scenario approach. Two experiments are designed based on ...

  16. Computational Methods for the Analysis of Array Comparative Genomic Hybridization

    Raj Chari

    2006-01-01

    Full Text Available Array comparative genomic hybridization (array CGH is a technique for assaying the copy number status of cancer genomes. The widespread use of this technology has lead to a rapid accumulation of high throughput data, which in turn has prompted the development of computational strategies for the analysis of array CGH data. Here we explain the principles behind array image processing, data visualization and genomic profile analysis, review currently available software packages, and raise considerations for future software development.

  17. HOW CAN ELECTRONIC COMMERCE IN DEVELOPING COUNTRIES ATTRACT USERS FROM DEVELOPED COUNTRIES? A COMPARATIVE STUDY OF THAILAND AND JAPAN

    Tetsuro Kobayashi; Hitoshi Okada; Nagul Cooharojananone; Vanessa Bracamonte; Takahisa Suzuki

    2013-01-01

    A comparative study of Thailand and Japan investigated how electronic commerce (EC) in developing countries can be used to attract customers from developed countries. Thai and Japanese participants were shown language-appropriate versions of a hotel booking website in Thailand. Perceptions of and trust in the website were assessed, as was the willingness to book a room in the hotel using the website. The Thai participants tended to evaluate the quality of the website more highly and to trust ...

  18. Evaluation of a gene information summarization system by users during the analysis process of microarray datasets

    Cohen Aaron

    2009-02-01

    Full Text Available Abstract Background Summarization of gene information in the literature has the potential to help genomics researchers translate basic research into clinical benefits. Gene expression microarrays have been used to study biomarkers for disease and discover novel types of therapeutics and the task of finding information in journal articles on sets of genes is common for translational researchers working with microarray data. However, manually searching and scanning the literature references returned from PubMed is a time-consuming task for scientists. We built and evaluated an automatic summarizer of information on genes studied in microarray experiments. The Gene Information Clustering and Summarization System (GICSS is a system that integrates two related steps of the microarray data analysis process: functional gene clustering and gene information gathering. The system evaluation was conducted during the process of genomic researchers analyzing their own experimental microarray datasets. Results The clusters generated by GICSS were validated by scientists during their microarray analysis process. In addition, presenting sentences in the abstract provided significantly more important information to the users than just showing the title in the default PubMed format. Conclusion The evaluation results suggest that GICSS can be useful for researchers in genomic area. In addition, the hybrid evaluation method, partway between intrinsic and extrinsic system evaluation, may enable researchers to gauge the true usefulness of the tool for the scientists in their natural analysis workflow and also elicit suggestions for future enhancements. Availability GICSS can be accessed online at: http://ir.ohsu.edu/jianji/index.html

  19. Elimination of User-Fees in Tertiary Education: A Distributive Analysis for Ecuador

    Ponce, Juan; Loayza, Yessenia

    2012-01-01

    This paper offers new evidence and methods for understanding the distributive effect of a universal government policy to eliminate user fees in public universities in Ecuador. The main argument to eliminate user fees in higher education is that it will increase enrollment among the poor. In this regard, eliminating tuition fees is supposed to be a…

  20. An Explanatory Analysis of the Relationship between Facebook Usage and Social Capital (Research Subjects: Tehrani Users

    Hamid Abdollahyan

    2014-01-01

    The results of the focus group discussions and participatory observations (Abdollahyan and Sheykhansari, 2012 indicate that working within Facebook environment leads to the generation of new vocabulary (lingo which is then introduced to new generations of Facebook users. Also, the information turnover and its extent among Facebook users is so much, so that every time that users login in their account they have to face new information about various events. In contrast, those who are not Facebook users, would use other tools of mass media to update their information, based on personal interests. This comparison drags our attention to a very critical phenomenon, i.e., the rate of information exchanged among Facebook users about various socio-political events have grown drastically. The friendship circle of Facebook users becomes expanded because it includes all people that such a user might know during his/her course of life. Whereas the friendship circle of a non-Facebook-user is limited to those with whom the individual is acquainted with in his/her real life and can have a face to face interaction. The level of trust among Facebook users for promoting friendship is high and they accept friendship invitations very easily. They do not have to go through a lot of evaluations to choose their virtual friends. The non-Facebook-users, on the other hand, protect their private spheres and are cautious about new friendships, if they are to choose new friends. We also discovered that there is a prominent difference between Facebook users and non-Facebook users in terms of getting intimate or close with a friend. Nevertheless, taking maintaining family relations as criteria, we noticed that almost all family members in the same age had a tendency to get connected through Facebook. It is possible therefore that if a familial connection is somehow cut off in the real life, reconnection happens through same-age groups in Facebook. Generally, Facebook functions in two ways for

  1. A Comparative Analysis of Three Unique Theories of Organizational Learning

    Leavitt, Carol C.

    2011-01-01

    The purpose of this paper is to present three classical theories on organizational learning and conduct a comparative analysis that highlights their strengths, similarities, and differences. Two of the theories -- experiential learning theory and adaptive -- generative learning theory -- represent the thinking of the cognitive perspective, while…

  2. Comparative Analysis and Evaluation of Existing Risk Management Software

    2007-01-01

    Full Text Available The focus of this article lies on the specific features of the existing software packages for risk management differentiating three categories. Representative for these categories we consider the Crystal Ball, Haufe Risikomanager and MIS - Risk Management solutions, outlining the strenghts and weaknesses in a comparative analysis.

  3. THE COMPARATIVE ANALYSIS OF IPIDACRIN AND PIRIDOXIN INFLUENCE ON THE

    Sharova E.V; Zaitsev O.S; Cheliapina M.V; Korotaeva M.V; Lifshits M.Yu.

    2008-01-01

    The comparative analysis of neuromedin and piridoksin psichophysiological effects attwo examinees – volunteers is lead. Neuromedin (unlike nonspecific influencepiridoksin) causes: A) similar influence in both supervision on cortical-subcortical brainstructures and B) individual changes (cortical lateralization), dependent on an initialcondition of the cortex.

  4. THE COMPARATIVE ANALYSIS OF IPIDACRIN AND PIRIDOXIN INFLUENCE ON THE

    Sharova E.V

    2008-03-01

    Full Text Available The comparative analysis of neuromedin and piridoksin psichophysiological effects attwo examinees – volunteers is lead. Neuromedin (unlike nonspecific influencepiridoksin causes: A similar influence in both supervision on cortical-subcortical brainstructures and B individual changes (cortical lateralization, dependent on an initialcondition of the cortex.

  5. QUALITATIVE COMPARATIVE ANALYSIS OF NOOSPHERE DEVELOPMENT AND KNOWLEDGE ECONOMY

    Yermolenko V. V.; Lanskaya D. V.

    2014-01-01

    The article, based on the total problems of formation and development of the knowledge economy, we highlighted the environmental aspect and the comparative analysis of the fundamental ideas of the knowledge economy and the noosphere concept development in terms of their complementarity

  6. Development Of The Computer Code For Comparative Neutron Activation Analysis

    The qualitative and quantitative chemical analysis with Neutron Activation Analysis (NAA) is an importance utilization of a nuclear research reactor, and this should be accelerated and promoted in application and its development to raise the utilization of the reactor. The application of Comparative NAA technique in GA Siwabessy Multi Purpose Reactor (RSG-GAS) needs special (not commercially available yet) soft wares for analyzing the spectrum of multiple elements in the analysis at once. The application carried out using a single spectrum software analyzer, and comparing each result manually. This method really degrades the quality of the analysis significantly. To solve the problem, a computer code was designed and developed for comparative NAA. Spectrum analysis in the code is carried out using a non-linear fitting method. Before the spectrum analyzed, it was passed to the numerical filter which improves the signal to noise ratio to do the deconvolution operation. The software was developed using the G language and named as PASAN-K The testing result of the developed software was benchmark with the IAEA spectrum and well operated with less than 10 % deviation

  7. SHEAT: a computer code for probabilistic seismic hazard analysis, user's manual

    The SHEAT code developed at Japan Atomic Energy Research Institute is for probabilistic seismic hazard analysis which is one of the tasks needed for seismic Probabilistic Safety Assessment (PSA) of a nuclear power plant. Seismic hazard is defined as an annual exceedance frequency of occurrence of earthquake ground motions at various levels of intensity at a given site. With the SHEAT code, seismic hazard is calculated by the following two steps: (1) Modeling of earthquake generation around a site. Future earthquake generation (locations, magnitudes and frequencies of postulated earthquakes) is modelled based on the historical earthquake records, active fault data and expert judgement. (2) Calculation of probabilistic seismic hazard at the site. An earthquake ground motion is calculated for each postulated earthquake using an attenuation model taking into account its standard deviation. Then the seismic hazard at the site is calculated by summing the frequencies of ground motions by all the earthquakes. This document is the user's manual of the SHEAT code. It includes: (1) Outlines of the code, which include overall concept, logical process, code structure, data file used and special characteristics of the code, (2) Functions of subprograms and analytical models in them, (3) Guidance of input and output data, and (4) Sample run results. The code has widely been used at JAERI to analyze seismic hazard at various nuclear power plant sites in japan. (author)

  8. Knowledge Level Assessment in e-Learning Systems Using Machine Learning and User Activity Analysis

    Nazeeh Ghatasheh

    2015-04-01

    Full Text Available Electronic Learning has been one of the foremost trends in education so far. Such importance draws the attention to an important shift in the educational paradigm. Due to the complexity of the evolving paradigm, the prospective dynamics of learning require an evolution of knowledge delivery and evaluation. This research work tries to put in hand a futuristic design of an autonomous and intelligent e-Learning system. In which machine learning and user activity analysis play the role of an automatic evaluator for the knowledge level. It is important to assess the knowledge level in order to adapt content presentation and to have more realistic evaluation of online learners. Several classification algorithms are applied to predict the knowledge level of the learners and the corresponding results are reported. Furthermore, this research proposes a modern design of a dynamic learning environment that goes along the most recent trends in e-Learning. The experimental results illustrate an overall performance superiority of a support vector machine model in evaluating the knowledge levels; having 98.6%of correctly classified instances with 0.0069 mean absolute error.

  9. Comparative Analysis of Cryptography Library in IoT

    Kumar, Uday; Borgohain, Tuhin; Sanyal, Sugata

    2015-05-01

    The paper aims to do a survey along with a comparative analysis of the various cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half of the paper briefly introduces the various cryptography libraries available in the field of cryptography along with a list of all the algorithms contained within the libraries. The second half of the paper deals with cryptography libraries specifically aimed for application in the field of Internet of Things. The various libraries and their performance analysis listed down in this paper are consolidated from various sources with the aim of providing a single comprehensive repository for reference to the various cryptography libraries and the comparative analysis of their features in IoT.

  10. User centric approach to itemset utility mining in Market Basket Analysis

    Jyothi Pillai

    2011-01-01

    Full Text Available Business intelligence is information about a company's past performance that is used to help predict the company's future performance. It can reveal emerging trends from which the company might profit [31]. Data mining allows users to sift through the enormous amount of information available in data warehouses; it is from this sifting process that business intelligence gems may be found [31]. Within the area of data mining, the problem of deriving associations from data has received a great deal of attention. This problem is referred as “market-basket problem”. Association Rule Mining (ARM, a well-studied technique in the data mining field, identifies frequent itemsets from databases and generates association rules by assuming that all items have the same significance andfrequency of occurrence in a record. However, items are actually different in many aspects in a number of real applications such as retail marketing, nutritional pattern mining, etc [26]. Rare items are less frequent items [32]. For many real world applications, however, utility of rare itemsets based on cost, profit or revenue is of importance. For extracting rare itemsets, the equal frequency based approaches like Apriori approach suffer from “rare item problem dilemma”. Utility mining aims at identifying rare itemsets with high utility. The main objective of Utility Mining is to identify the itemsets with highest utilities, by considering profit, quantity, costor other user preferences [40]. Also valuable patterns cannot be discovered by traditional non-temporal data mining approaches that treat all the data as one large segment, with no attention paid to utilizing the time information of transactions. Now, as increasingly complex real-world problems are addressed, temporal rare itemset utility problem, are taking center stage. In many real-life applications, high-utility itemsets consist of rare items. Rare itemsets provide useful information in different decision

  11. An Empirical Study on User-oriented Association Analysis of Library Classification Schemes

    Hsiao-Tieh Pu

    2002-12-01

    Full Text Available Library classification schemes are mostly organized based on disciplines with a hierarchical structure. From the user point of view, some highly related yet non-hierarchical classes may not be easy to perceive in these schemes. This paper is to discover hidden associations between classes by analyzing users’ usage of library collections. The proposed approach employs collaborative filtering techniques to discover associated classes based on the circulation patterns of similar users. Many associated classes scattered across different subject hierarchies could be discovered from the circulation patterns of similar users. The obtained association norms between classes were found to be useful in understanding users' subject preferences for a given class. Classification schemes can, therefore, be made more adaptable to changes of users and the uses of different library collections. There are implications for applications in information organization and retrieval as well. For example, catalogers could refer to the ranked associated classes when they perform multi-classification, and users could also browse the associated classes for related subjects in an enhanced OPAC system. In future research, more empirical studies will be needed to validate the findings, and methods for obtaining user-oriented associations can still be improved.[Article content in Chinese

  12. TEXCAD: Textile Composite Analysis for Design. Version 1.0: User's manual

    Naik, Rajiv A.

    1994-01-01

    The Textile Composite Analysis for Design (TEXCAD) code provides the materials/design engineer with a user-friendly desktop computer (IBM PC compatible or Apple Macintosh) tool for the analysis of a wide variety of fabric reinforced woven and braided composites. It can be used to calculate overall thermal and mechanical properties along with engineering estimates of damage progression and strength. TEXCAD also calculates laminate properties for stacked, oriented fabric constructions. It discretely models the yarn centerline paths within the textile repeating unit cell (RUC) by assuming sinusoidal undulations at yarn cross-over points and uses a yarn discretization scheme (which subdivides each yarn not smaller, piecewise straight yarn slices) together with a 3-D stress averaging procedure to compute overall stiffness properties. In the calculations for strength, it uses a curved beam-on-elastic foundation model for yarn undulating regions together with an incremental approach in which stiffness properties for the failed yarn slices are reduced based on the predicted yarn slice failure mode. Nonlinear shear effects and nonlinear geometric effects can be simulated. Input to TEXCAD consists of: (1) materials parameters like impregnated yarn and resin properties such moduli, Poisson's ratios, coefficients of thermal expansion, nonlinear parameters, axial failure strains and in-plane failure stresses; and (2) fabric parameters like yarn sizes, braid angle, yarn packing density, filament diameter and overall fiber volume fraction. Output consists of overall thermoelastic constants, yarn slice strains/stresses, yarn slice failure history, in-plane stress-strain response and ultimate failure strength. Strength can be computed under the combined action of thermal and mechanical loading (tension, compression and shear).

  13. GProX, a User-Friendly Platform for Bioinformatics Analysis and Visualization of Quantitative Proteomics Data

    Rigbolt, Kristoffer T G; Vanselow, Jens T; Blagoev, Blagoy

    2011-01-01

    -friendly platform for comprehensive analysis, inspection and visualization of quantitative proteomics data we developed the Graphical Proteomics Data Explorer (GProX)(1). The program requires no special bioinformatics training, as all functions of GProX are accessible within its graphical user-friendly interface...... which will be intuitive to most users. Basic features facilitate the uncomplicated management and organization of large data sets and complex experimental setups as well as the inspection and graphical plotting of quantitative data. These are complemented by readily available high-level analysis options...... such as database querying, clustering based on abundance ratios, feature enrichment tests for e.g. GO terms and pathway analysis tools. A number of plotting options for visualization of quantitative proteomics data is available and most analysis functions in GProX create customizable high quality...

  14. A comparative analysis of the effects of economic policy instruments in promoting environmentally sustainable transport

    Elvik, Rune; Ramjerdi, Farideh

    2014-01-01

    This paper presents a comparative analysis of the effects of economic policy instruments in promoting environmentally sustainable transport. Promoting environmentally sustainable transport is defined as follows: (1) Reducing the volume of motorised travel; (2) Transferring travel to modes...... generating less external effects, and (3) Modifying road user behaviour in a way that will reduce external effects of transport. External effects include accidents, congestion, traffic noise and emissions to air. Four economic policy instruments are compared: (1) Prices of motor fuel; (2) Congestion charges......; (3) Toll schemes; (4) Reward systems giving incentives to reduce driving or change driver behaviour. The effects of these policy instruments are stated in terms of elasticities. All four economic policy instruments have negative elasticities, which means that they do promote environmentally...

  15. Supporting aspect-based video browsing - analysis of a user study

    Urruty, T.; Hopfgartner, F.; Hannah, D.; Elliott, D.; Jose, J.M.

    2009-01-01

    In this paper, we present a novel video search interface based on the concept of aspect browsing. The proposed strategy is to assist the user in exploratory video search by actively suggesting new query terms and video shots. Our approach has the potential to narrow the "Semantic Gap" issue by allowing users to explore the data collection. First, we describe a clustering technique to identify potential aspects of a search. Then, we use the results to propose suggestions to the user to help th...

  16. BLAT-Based Comparative Analysis for Transposable Elements: BLATCAT

    Sangbum Lee

    2014-01-01

    Full Text Available The availability of several whole genome sequences makes comparative analyses possible. In primate genomes, the priority of transposable elements (TEs is significantly increased because they account for ~45% of the primate genomes, they can regulate the gene expression level, and they are associated with genomic fluidity in their host genomes. Here, we developed the BLAST-like alignment tool (BLAT based comparative analysis for transposable elements (BLATCAT program. The BLATCAT program can compare specific regions of six representative primate genome sequences (human, chimpanzee, gorilla, orangutan, gibbon, and rhesus macaque on the basis of BLAT and simultaneously carry out RepeatMasker and/or Censor functions, which are widely used Windows-based web-server functions to detect TEs. All results can be stored as a HTML file for manual inspection of a specific locus. BLATCAT will be very convenient and efficient for comparative analyses of TEs in various primate genomes.

  17. BLAT-based comparative analysis for transposable elements: BLATCAT.

    Lee, Sangbum; Oh, Sumin; Kang, Keunsoo; Han, Kyudong

    2014-01-01

    The availability of several whole genome sequences makes comparative analyses possible. In primate genomes, the priority of transposable elements (TEs) is significantly increased because they account for ~45% of the primate genomes, they can regulate the gene expression level, and they are associated with genomic fluidity in their host genomes. Here, we developed the BLAST-like alignment tool (BLAT) based comparative analysis for transposable elements (BLATCAT) program. The BLATCAT program can compare specific regions of six representative primate genome sequences (human, chimpanzee, gorilla, orangutan, gibbon, and rhesus macaque) on the basis of BLAT and simultaneously carry out RepeatMasker and/or Censor functions, which are widely used Windows-based web-server functions to detect TEs. All results can be stored as a HTML file for manual inspection of a specific locus. BLATCAT will be very convenient and efficient for comparative analyses of TEs in various primate genomes. PMID:24959585

  18. HOW CAN ELECTRONIC COMMERCE IN DEVELOPING COUNTRIES ATTRACT USERS FROM DEVELOPED COUNTRIES? A COMPARATIVE STUDY OF THAILAND AND JAPAN

    Tetsuro Kobayashi

    2013-12-01

    Full Text Available A comparative study of Thailand and Japan investigated how electronic commerce (EC in developing countries can be used to attract customers from developed countries. Thai and Japanese participants were shown language-appropriate versions of a hotel booking website in Thailand. Perceptions of and trust in the website were assessed, as was the willingness to book a room in the hotel using the website. The Thai participants tended to evaluate the quality of the website more highly and to trust it more than did the Japanese participants. Furthermore, the Thai participants tended to think that the hotel was more responsible for their hotel reservations than was the EC service, and that the content of the website was developed by the hotel rather than by the EC service. Thai participants were more likely to express willingness to reserve a room if they thought that the hotel had developed the website content, whereas the Japanese participants’ willingness to book a room were greater when they thought that the EC service had developed the content. Based on these results, customization strategies for EC in developing countries to attract customers from developed countries are discussed.

  19. GProX, a User-Friendly Platform for Bioinformatics Analysis and Visualization of Quantitative Proteomics Data

    Rigbolt, K. T. G.; Vanselow, J. T.; Blagoev, B.

    2011-01-01

    Recent technological advances have made it possible to identify and quantify thousands of proteins in a single proteomics experiment. As a result of these developments, the analysis of data has become the bottleneck of proteomics experiment. To provide the proteomics community with a user-friendly platform for comprehensive analysis, inspection and visualization of quantitative proteomics data we developed the Graphical Proteomics Data Explorer (GProX)1. The program requires no special bioinf...

  20. Comparative secretome analysis of rat stomach under different nutritional status

    Lucia L. Senin

    2015-06-01

    Full Text Available The fact that gastric surgery is at the moment the most effective treatment to fight against obesity highlights the relevance of gastric derived proteins as potential targets to treat this pathology. Taking advantage of a previously established gastric explant model for endocrine studies, the proteomic analysis of gastric secretome was performed. To validate this gastric explant system for proteomic analysis, the identification of ghrelin, a classical gastric derived peptide, was performed by MS. In addition, the differential analysis of gastric secretomes under differential nutritional status (control feeding vs fasting vs re-feeding was performed. The MS identified proteins are showed in the present manuscript. The data supplied in this article is related to the research article entitled “Comparative secretome analysis of rat stomach under different nutritional status” [1].

  1. Real-time acquisition and data analysis of skeletal muscle contraction in a multi-user environment.

    Lieber, R L; Smith, D E; Campbell, R C; Hargens, A R

    1986-06-01

    A data acquisition system is described which acquires data from contracting skeletal muscle. The system is designed to run in a multi-user environment while acquiring contractile data in real-time. Time dedicated solely to laboratory experiments is thus eliminated. A menu-driver is included to allow users to enter experimental commands with or without command arguments. Error monitoring functions prevent operator errors from causing data loss. Data storage in both ASCII and binary formats maximizes file flexibility, readability and accessibility. Finally, an on-line tutorial and help facility is provided for user training. The system developed is applicable to any experimental environment involving data acquisition, storage and analysis. PMID:3637122

  2. User's Manual for HPTAM: a Two-Dimensional Heat Pipe Transient Analysis Model, Including the Startup from a Frozen State

    Tournier, Jean-Michel; El-Genk, Mohamed S.

    1995-01-01

    This report describes the user's manual for 'HPTAM,' a two-dimensional Heat Pipe Transient Analysis Model. HPTAM is described in detail in the UNM-ISNPS-3-1995 report which accompanies the present manual. The model offers a menu that lists a number of working fluids and wall and wick materials from which the user can choose. HPTAM is capable of simulating the startup of heat pipes from either a fully-thawed or frozen condition of the working fluid in the wick structure. The manual includes instructions for installing and running HPTAM on either a UNIX, MS-DOS or VMS operating system. Samples for input and output files are also provided to help the user with the code.

  3. PERFORMANCE ANALYSIS OF USER FAIR-BASED RELAY ADAPTIVE POWER ALLOCATION IN PHYSICAL-LAYER NETWORK CODING COOPERATION

    Cheng Yulun; Yang Longxiang

    2012-01-01

    Network Coding (NC) is an effective technology to enhance the cooperative system spectral efficiency.However,since it is network-oriented,the existing performance metric of single-user outage can not comprehensively evaluate its gain and the impact to the entire network,which affect the user fairness.This paper proposes two novel user fair-based adaptive relay power allocation algorithms in single-relay NC cooperative multiple access channels.Firstly,common outage probability is employed as the performance metric,and to minimize it,a specific condition is deduced.On this basis,the instantaneous channel information-based adaptive relay power allocation scheme and the channel statistic information-based one with lower complexity are designed respectively,which make users' signals superimposed at accurately calculated proportion to maintain fairness.Simulation results show that compared with other existing schemes,the proposed schemes can best maintain user fairness,and effectively improve the common outage performance of the whole system,at the expense of small spectral efficiency.

  4. Performance analysis of spectrum sensing with multiple status changes in primary user traffic

    Tang, Liang

    2012-06-01

    In this letter, the impact of primary user traffic with multiple status changes on the spectrum sensing performance is analyzed. Closed-form expressions for the probabilities of false alarm and detection are derived. Numerical results show that the multiple status changes of the primary user cause considerable degradation in the sensing performance. This degradation depends on the number of changes, the primary user traffic model, the primary user traffic intensity and the signal-to-noise ratio of the received signal. Numerical results also show that the amount of degradation decreases when the number of changes increases, and converges to a minimum sensing performance due to the limited sensing period and primary holding time. © 2012 IEEE.

  5. What is a non-user? An analysis of Danish surveys on cultural habits and participation

    Balling, Gitte; Kann-Christensen, Nanna

    2013-01-01

    constructed through the surveys from 1964 until today. This movement spans from a citizen to a customer perspective. Furthermore the article addresses the problem that the new concept of participatory culture does not necessarily take place within the institutions which is measured in surveys on cultural......The article analyses surveys of cultural participation and discusses how they convey certain concepts of users and culture. The article aims to develop a more nuanced and contemporary picture of cultural participation and notions of the non-user. The article shows a shift in how the user is...... participation. The concept of participation conveys different meanings, therefore culturally active and contributing citizens may count as non-users in the surveys. The article concludes that it might be worth considering measuring leisure time activities as it was done in the 1960s and 1970s instead of the...

  6. Does Price or Income Affect Organic Choice? Analysis of U.S. Fresh Produce Users

    Travis A. Smith; Chung L. Huang; Lin, Biing-Hwan

    2009-01-01

    This study analyzes consumer purchasing behavior of organic fresh fruits and vegetables using the 2006 Nielsen Homescan panel. An ordered logit model was estimated to quantify the impacts of economic and socio-demographic factors on the probability of a household belonging to a specific organic user group—devoted, casual, or nonuser. Results suggest that price and income, to some extent, affect consumer purchases of organic produce. Additionally, the profile of an organic produce user is mo...

  7. Web Users Session Analysis Using DBSCAN and Two Phase Utility Mining Algorithms

    Mr. G. Sunil Kumar; C.V.K Sirisha; Kanaka Durga.R; A.Devi

    2012-01-01

    One of the important issues in data mining is the interestingness problem. Typically, in a data mining process, the number of patterns discovered can easily exceed the capabilities of a human user to identify interesting results. To address this problem, utility measures have been used to reduce the patterns prior to presenting them to the user. A frequent itemset only reflects the statistical correlation between items, and it does not reflect the semantic significance of the items. This prop...

  8. Semantic modelling of user interests based on cross-folksonomy analysis

    Szomszor, Martin; Alani, Harith; Cantador, Iván; O’Hara, Kieron; Shadbolt, Nigel

    2008-01-01

    The continued increase in Web usage, in particular participation in folksonomies, reveals a trend towards a more dynamic and interactive Web where individuals can organise and share resources. Tagging has emerged as the de-facto standard for the organisation of such resources, providing a versatile and reactive knowledge management mechanism that users find easy to use and understand. It is common nowadays for users to have multiple profiles in various folksonomies, thus distributing their ta...

  9. An Explanatory Analysis of the Relationship between Facebook Usage and Social Capital (Research Subjects: Tehrani Users)

    Hamid Abdollahyan; Mahin Sheikh Ansari

    2014-01-01

    Introduction This paper examines the relationship between social capital and using Facebook social media. In order to tackle the issue, it should first be noted that according to the latest statistics the total number of Facebook users in the world has passed the threshold of one billion in September 2013. And, based on the latest statistics, Iran ranks 13th among all countries in terms of the total number of internet users in proportion to the total population. There is no official statis...

  10. Mapa-an object oriented code with a graphical user interface for accelerator design and analysis

    We developed a code for accelerator modeling which will allow users to create and analyze accelerators through a graphical user interface (GUI). The GUI can read an accelerator from files or create it by adding, removing and changing elements. It also creates 4D orbits and lifetime plots. The code includes a set of accelerator elements classes, C++ utility and GUI libraries. Due to the GUI, the code is easy to use and expand

  11. Mapa-an object oriented code with a graphical user interface for accelerator design and analysis

    We developed a code for accelerator modeling which will allow users to create and analyze accelerators through a graphical user interface (GUI). The GUI can read an accelerator from files or create it by adding, removing and changing elements. It also creates 4D orbits and lifetime plots. The code includes a set of accelerator elements classes, C++ utility and GUI libraries. Due to the GUI, the code is easy to use and expand. copyright 1997 American Institute of Physics

  12. Mapa-an object oriented code with a graphical user interface for accelerator design and analysis

    Shasharina, S.G.; Cary, J.R. [Tech-X Corporation 4588 Pussy Willow Court, Boulder, Colorado 80301 (United States)

    1997-02-01

    We developed a code for accelerator modeling which will allow users to create and analyze accelerators through a graphical user interface (GUI). The GUI can read an accelerator from files or create it by adding, removing and changing elements. It also creates 4D orbits and lifetime plots. The code includes a set of accelerator elements classes, C++ utility and GUI libraries. Due to the GUI, the code is easy to use and expand. {copyright} {ital 1997 American Institute of Physics.}

  13. Analysis of the inspections and abnormalities found users of radioactive material during, 1994, 1995, 1996

    The purpose of this work is to show the statistical results of the inspections, audits, verification or recognition tasks as well as the abnormalities found in users of radioactive materials in 1994, 1995 and the firsts six months of 1996, together with corrective actions that this commission has applied to users aiming at a full compliance with safety standards and , in this way, improving the protection to the occupationally exposed worker, the public, and the environment

  14. Simulation analysis of security performance of DPSKOCDMA network via virtual user scheme

    Vishav Jyoti

    2012-01-01

    A novel technique to enhance the security of an optical code division multipleaccess (OCDMA) system against eavesdropping is proposed. It has been observed that whena single user is active in the network, an eavesdropper can easily sift the data beingtransmitted without decoding. To increase the security, a virtual user scheme is proposed andsimulated on a differential phase shift keying (DPSK) OCDMA system. By using the virtualuser scheme, the security of the DPSK-OCDMA system can be effecti...

  15. Mycobacterial species as case-study of comparative genome analysis

    Zakham, F.; Belayachi, L.; Ussery, David; Akrim, M.; Benjouad, A.; El Aouad, R.; Ennaji, M. M.

    2011-01-01

    evolutionary events of these species and improving drugs, vaccines, and diagnostics tools for controlling Mycobacterial diseases. In this present study we aim to outline a comparative genome analysis of fourteen Mycobacterial genomes: M. avium subsp. paratuberculosis K—10, M. bovis AF2122/97, M. bovis BCG str...... genomes, GC content, number of genes in different data bases (Genbank, Refseq, and Prodigal). The BLAST matrix of these genomes has been figured to give a lot of information about the similarity between species in a simple scheme. As a result of multiple genome analysis, the pan and core genome have been...

  16. COMPARATIVE ANALYSIS OF EMPLOYMENT POLICY MODELS: RUSSIAN AND INTERNATIONAL EXPERIENCE

    Konstantin Khrabrov

    2016-04-01

    Full Text Available The article provides a comparative analysis of existing theoretical models for regulation of employment identified as a result of studying the experience of public administration of the EU countries, USA and Japan. In particular, paper shows that the international experience of employment includes various models that define the existing relationship in the labour market. The result is a substantial analysis of the models indicates the features of interdependence applied policy regulating the employment of the state of the institutional environment of the national economy.

  17. EFL textbooks for young learners: a comparative analysis of vocabulary

    Nordlund, Marie

    2016-01-01

    This article reports the findings of a comparative analysis of two English teaching course book series which are widely used in school years 4–6 in Sweden: Good Stuffand New Champion. The analysis comprises comparisons of the vocabulary component in the teaching materials and examines the extent to which words – adjectives, nouns and verbs – recur in the books, whether there is a common core of words in the two series and, finally, whether vocabulary in the two teaching materials corresponds ...

  18. Comparative analysis of special preparedness young water-slalom

    Daria Okun

    2016-02-01

    Full Text Available Purpose: to identify indicators is specially trained water-slalom aged 10–12 years. Material & Methods: methods of theoretical analysis, synthesis and synthesis of information, pedagogical control tests (tests, methods of mathematical statistics. Results: presented materials research performance technical readiness of 60 young water-slalom groups of initial training. A comparative analysis of the results and regulatory requirements, the proposed curriculum for youth sports schools. Conclusions: the results of the study suggest lagging performance testing young athletes behind the standards of the program requirements, indicating insufficient specially trained water-slaloms.

  19. User-Centered Design for Interactive Maps: A Case Study in Crime Analysis

    Robert E. Roth

    2015-02-01

    Full Text Available In this paper, we address the topic of user-centered design (UCD for cartography, GIScience, and visual analytics. Interactive maps are ubiquitous in modern society, yet they often fail to “work” as they could or should. UCD describes the process of ensuring interface success—map-based or otherwise—by gathering input and feedback from target users throughout the design and development of the interface. We contribute to the expanding literature on UCD for interactive maps in two ways. First, we synthesize core concepts on UCD from cartography and related fields, as well as offer new ideas, in order to organize existing frameworks and recommendations regarding the UCD of interactive maps. Second, we report on a case study UCD process for GeoVISTA CrimeViz, an interactive and web-based mapping application supporting visual analytics of criminal activity in space and time. The GeoVISTA CrimeViz concept and interface were improved iteratively by working through a series of user→utility→usability loops in which target users provided input and feedback on needs and designs (user, prompting revisions to the conceptualization and functional requirements of the interface (utility, and ultimately leading to new mockups and prototypes of the interface (usability for additional evaluation by target users (user… and so on. Together, the background review and case study offer guidance for applying UCD to interactive mapping projects, and demonstrate the benefit of including target users throughout design and development.

  20. Analysis and Design of Multiple-Antenna Cognitive Radios With Multiple Primary User Signals

    Morales-Jimenez, David; Louie, Raymond H. Y.; McKay, Matthew R.; Chen, Yang

    2015-09-01

    We consider multiple-antenna signal detection of primary user transmission signals by a secondary user receiver in cognitive radio networks. The optimal detector is analyzed for the scenario where the number of primary user signals is no less than the number of receive antennas at the secondary user. We first derive exact expressions for the moments of the generalized likelihood ratio test (GLRT) statistic, yielding approximations for the false alarm and detection probabilities. We then show that the normalized GLRT statistic converges in distribution to a Gaussian random variable when the number of antennas and observations grow large at the same rate. Further, using results from large random matrix theory, we derive expressions to compute the detection probability without explicit knowledge of the channel, and then particularize these expressions for two scenarios of practical interest: 1) a single primary user sending spatially multiplexed signals, and 2) multiple spatially distributed primary users. Our analytical results are finally used to obtain simple design rules for the signal detection threshold.

  1. An Analysis of User Satisfaction of K University’s Library Service

    Younghee Noh

    2011-06-01

    Full Text Available This study purposed to discover whether or not academic libraries reflect these changing roles. We selected K University as the research target and surveyed user satisfaction of materials, staff services, facilities, electronic devices, media, and so on. The research findings are as follows: 1 the frequency of library visits of University K was on the high side, 2 the primary purpose of using the academic library was associated with learning or reading, therefore, the most used library spaces were related to that, 3 the most used library materials were 'general books', the most unused were 'reference books', 4 the most preferred way to obtain needed materials when failing to find wanted materials was 'Contact librarian'. A similar phenomenon occurred in terms of facility use, 5 university K's users were usually satisfied with the loan policy, 6 the rate of users who don't know whether there is user education was very high, the rate of users who have no experience with user education was extremely low. These research findings can be referenced by library management to improve libraries' service quality and take advantage of complex spatial configurations.

  2. Mammalian comparative sequence analysis of the Agrp locus.

    Christopher B Kaelin

    Full Text Available Agouti-related protein encodes a neuropeptide that stimulates food intake. Agrp expression in the brain is restricted to neurons in the arcuate nucleus of the hypothalamus and is elevated by states of negative energy balance. The molecular mechanisms underlying Agrp regulation, however, remain poorly defined. Using a combination of transgenic and comparative sequence analysis, we have previously identified a 760 bp conserved region upstream of Agrp which contains STAT binding elements that participate in Agrp transcriptional regulation. In this study, we attempt to improve the specificity for detecting conserved elements in this region by comparing genomic sequences from 10 mammalian species. Our analysis reveals a symmetrical organization of conserved sequences upstream of Agrp, which cluster into two inverted repeat elements. Conserved sequences within these elements suggest a role for homeodomain proteins in the regulation of Agrp and provide additional targets for functional evaluation.

  3. Comparative analysis of fungal protein kinases and associated domains

    Glaser Fabian; Mandel-Gutfreund Yael; Kosti Idit; Horwitz Benjamin A

    2010-01-01

    Abstract Background Protein phosphorylation is responsible for a large portion of the regulatory functions of eukaryotic cells. Although the list of sequenced genomes of filamentous fungi has grown rapidly, the kinomes of recently sequenced species have not yet been studied in detail. The objective of this study is to apply a comparative analysis of the kinase distribution in different fungal phyla, and to explore its relevance to understanding the evolution of fungi and their taxonomic class...

  4. Comparative analysis of fungal protein kinases and associated domains

    Kosti, Idit; Mandel-Gutfreund, Yael; Glaser, Fabian; Horwitz, Benjamin A.

    2010-01-01

    Background Protein phosphorylation is responsible for a large portion of the regulatory functions of eukaryotic cells. Although the list of sequenced genomes of filamentous fungi has grown rapidly, the kinomes of recently sequenced species have not yet been studied in detail. The objective of this study is to apply a comparative analysis of the kinase distribution in different fungal phyla, and to explore its relevance to understanding the evolution of fungi and their taxonomic classification...

  5. The regulation of television sports broadcasting: a comparative analysis

    Smith, P.; Evens, T.; Iosifidis, P.

    2015-01-01

    Based on seven different sports broadcasting markets (Australia, Brazil, Italy, India, South Africa, United Kingdom and the United States), this article provides a comparative analysis of the regulation of television sports broadcasting. The article examines how contrasting perspectives on television and sport – economic and sociocultural – have been reflected in two main approaches to the regulation of sports broadcasting, namely competition law and major events legislation. The results of t...

  6. Initial Implementation of a comparative Data Analysis Ontology

    Francisco Prosdocimi

    2009-01-01

    Full Text Available Comparative analysis is used throughout biology. When entities under comparison (e.g. proteins, genomes, species are related by descent, evolutionary theory provides a framework that, in principle, allows N-ary comparisons of entities, while controlling for non-independence due to relatedness. Powerful software tools exist for specialized applications of this approach, yet it remains under-utilized in the absence of a unifying informatics infrastructure. A key step in developing such an infrastructure is the definition of a formal ontology. The analysis of use cases and existing formalisms suggests that a significant component of evolutionary analysis involves a core problem of inferring a character history, relying on key concepts: “Operational Taxonomic Units” (OTUs, representing the entities to be compared; “character-state data” representing the observations compared among OTUs; “phylogenetic tree”, representing the historical path of evolution among the entities; and “transitions”, the inferred evolutionary changes in states of characters that account for observations. Using the Web Ontology Language (OWL, we have defined these and other fundamental concepts in a Comparative Data Analysis Ontology (CDAO. CDAO has been evaluated for its ability to represent token data sets and to support simple forms of reasoning. With further development, CDAO will provide a basis for tools (for semantic transformation, data retrieval, validation, integration, etc. that make it easier for software developers and biomedical researchers to apply evolutionary methods of inference to diverse types of data, so as to integrate this powerful framework for reasoning into their research.

  7. Overview and comparative analysis of digital airborne photogrammetric surveying systems

    Tamše, Mojca

    2010-01-01

    In the thesis, three the most important digital airborne photogrammetric systems are described, as well as their comparative analysis and the application of this technology in Slovenia are presented. Digital technology is being constantly developed and use of aerial images is being increased. Traditionally, aerial images were mostly used for digital topographic mapping, nowadays their use is focused on producing digital orthophoto, which is being used in different areas. First, main character...

  8. Comparative analysis of some brushless motors based on catalog data

    Anton Kalapish; Dimitar Sotirov; Dimitrina Koeva

    2005-01-01

    Brushless motors (polyphased AC induction, synchronous and brushless DC motors) have no alternatives in modern electric drives. They possess highly efficient and very wide range of speeds. The objective of this paper is to represent some relation between the basic parameters and magnitudes of electrical machines. This allows to be made a comparative analysis and a choice of motor concerning each particular case based not only on catalogue data or price for sale.

  9. Comparative visual analysis of 3D urban wind simulations

    Röber, Niklas; Salim, Mohamed; Grawe, David; Leitl, Bernd; Böttinger, Michael; Schlünzen, Heinke

    2016-04-01

    Climate simulations are conducted in large quantity for a variety of different applications. Many of these simulations focus on global developments and study the Earth's climate system using a coupled atmosphere ocean model. Other simulations are performed on much smaller regional scales, to study very small fine grained climatic effects. These microscale climate simulations pose similar, yet also different, challenges for the visualization and the analysis of the simulation data. Modern interactive visualization and data analysis techniques are very powerful tools to assist the researcher in answering and communicating complex research questions. This presentation discusses comparative visualization for several different wind simulations, which were created using the microscale climate model MITRAS. The simulations differ in wind direction and speed, but are all centered on the same simulation domain: An area of Hamburg-Wilhelmsburg that hosted the IGA/IBA exhibition in 2013. The experiments contain a scenario case to analyze the effects of single buildings, as well as examine the impact of the Coriolis force within the simulation. The scenario case is additionally compared with real measurements from a wind tunnel experiment to ascertain the accuracy of the simulation and the model itself. We also compare different approaches for tree modeling and evaluate the stability of the model. In this presentation, we describe not only our workflow to efficiently and effectively visualize microscale climate simulation data using common 3D visualization and data analysis techniques, but also discuss how to compare variations of a simulation and how to highlight the subtle differences in between them. For the visualizations we use a range of different 3D tools that feature techniques for statistical data analysis, data selection, as well as linking and brushing.

  10. COMPARATIVE ANALYSIS OF THE ORGANIZATIONAL STRUCTURES IN SOME EU COUNTRIES

    Ioana Raluca Goldbach

    2015-01-01

    The comparative analysis of organizational structures highlights similarities and differences between different factors influencing a company in its way of operation with the internal and/or external environment. The paper analyzes the organizational structures of some top companies from England, France and Romania that influence/determine the cultural organizational values and the norms elaborated and implemented, which, in time, become moral values and norms that acquire a social meaning, w...

  11. ORGANIZATIONAL CITIZENSHIP BEHAVIOR COMPARED ANALYSIS AT ROMANIAN SMEs LEVEL

    Alexandra Mihaela POPESCU; Alecxandrina DEACONU

    2013-01-01

    Finding new solutions that point out existing human potential in SMEs is an important element in reviving the national economy. Featured by diminished personnel, high flexibility and the possibility of a fast answer to external factors development, SMEs are based on human agent and on informal relations between organization’s members, Organizational Citizenship Behavior (OCB) being an important competitive advantage. Our study is a compared analysis of the Organizational Citizenship Behavior ...

  12. COMPETITIVE SOCIAL POSITION OF THE COUNTRY: A COMPARATIVE ANALYSIS

    I. Chornodid

    2014-01-01

    The article reveals the essence of the country's competitive position, a comparative analysis according to international indexes and indicators is provided. Also the competitive social benefits of the country are described. The real situation of the competitive social benefits is considered on international standards and assessments. The estimation of the position of Ukraine is given in terms of freedom, network readiness index, the index of competitiveness of travel and tourism.

  13. Comparative Analysis of Public Management in Romania and EU Countries

    Anca Jarmila Guţă

    2013-01-01

    The paper presents the essential co-ordonates of public management with the view of realization of comparative analysis of manner of carrying on of activities in the field of public management in E.U. countries and in our country. Also the main changes are presented which have marked this field of science and practice at world-wide level and the manner how these changes have conducted to effectiveness of public services of administrative system of our country.

  14. Comparative analysis of some brushless motors based on catalog data

    Anton Kalapish

    2005-10-01

    Full Text Available Brushless motors (polyphased AC induction, synchronous and brushless DC motors have no alternatives in modern electric drives. They possess highly efficient and very wide range of speeds. The objective of this paper is to represent some relation between the basic parameters and magnitudes of electrical machines. This allows to be made a comparative analysis and a choice of motor concerning each particular case based not only on catalogue data or price for sale.

  15. COMPETITIVE SOCIAL POSITION OF THE COUNTRY: A COMPARATIVE ANALYSIS

    I. Chornodid

    2014-01-01

    Full Text Available The article reveals the essence of the country's competitive position, a comparative analysis according to international indexes and indicators is provided. Also the competitive social benefits of the country are described. The real situation of the competitive social benefits is considered on international standards and assessments. The estimation of the position of Ukraine is given in terms of freedom, network readiness index, the index of competitiveness of travel and tourism.

  16. Massive comparative genomic analysis reveals convergent evolution of specialized bacteria

    Raoult Didier; Pontarotti Pierre; Royer-Carenzi Manuela; Merhej Vicky

    2009-01-01

    Abstract Background Genome size and gene content in bacteria are associated with their lifestyles. Obligate intracellular bacteria (i.e., mutualists and parasites) have small genomes that derived from larger free-living bacterial ancestors; however, the different steps of bacterial specialization from free-living to intracellular lifestyle have not been studied comprehensively. The growing number of available sequenced genomes makes it possible to perform a statistical comparative analysis of...

  17. Comparative Analysis on Two Accounting Systems of Rural Economic Originations

    Hu, Yu-ling

    2011-01-01

    In order to normalize the financial account of two kinds of economic organizations, the comparative analysis is conducted on the Accounting System of Village Collective Economic Organization and Accounting System of Farmers’ Cooperatives( Trial) issued by the Ministry of Finance . The comparison point out that application and accounting principles of the two kinds of accounting systems are different and analyzes the differences and similarities of the five accounting elements including ...

  18. Determinants of Banking Credit Default in Indonesia: A Comparative Analysis

    Muhammad Imaduddin

    2008-01-01

    This study aims to analyze the determinants of Islamic banking credit default compared with conventional banking in Indonesia. This study utilized timeseries analysis, by which ordinary least square method is adopted. 40 monthly data observations from January 2003 until April 2006 are used. The study is divided into two models, namely Islamic banking model and conventional banking model. The values of non-performing financing (NPF) in Islamic banking and non-performing loan (NPL) in conventio...

  19. Comparative Analysis of Cryptography Library in IoT

    Kumar, Uday; Borgohain, Tuhin; Sanyal, Sugata

    2015-01-01

    The paper aims to do a survey along with a comparative analysis of the various cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half of the paper briefly introduces the various cryptography libraries available in the field of cryptography along with a list of all the algorithms contained within the libraries. The second half of the paper deals with cryptography libraries specifically aimed for application in the field of Internet of Things. The va...

  20. HYDRA-II: A hydrothermal analysis computer code: Volume 2, User's manual

    HYDRA-II is a hydrothermal computer code capable of three-dimensional analysis of coupled conduction, convection, and thermal radiation problems. This code is especially appropriate for simulating the steady-state performance of spent fuel storage systems. The code has been evaluated for this application for the US Department of Energy's Commercial Spent Fuel Management Program. HYDRA-II provides a finite-difference solution in cartesian coordinates to the equations governing the conservation of mass, momentum, and energy. A cylindrical coordinate system may also be used to enclose the cartesian coordinate system. This exterior coordinate system is useful for modeling cylindrical cask bodies. The difference equations for conservation of momentum incorporate directional porosities and permeabilities that are available to model solid structures whose dimensions may be smaller than the computational mesh. The equation for conservation of energy permits modeling of orthotropic physical properties and film resistances. Several automated methods are available to model radiation transfer within enclosures and from fuel rod to fuel rod. The documentation of HYDRA-II is presented in three separate volumes. Volume 1 - Equations and Numerics describes the basic differential equations, illustrates how the difference equations are formulated, and gives the solution procedures employed. This volume, Volume 2 - User's Manual, contains code flow charts, discusses the code structure, provides detailed instructions for preparing an input file, and illustrates the operation of the code by means of a sample problem. The final volume, Volume 3 - Verification/Validation Assessments, provides a comparison between the analytical solution and the numerical simulation for problems with a known solution. 6 refs

  1. HYDRA-II: A hydrothermal analysis computer code: Volume 2, User's manual

    McCann, R.A.; Lowery, P.S.; Lessor, D.L.

    1987-09-01

    HYDRA-II is a hydrothermal computer code capable of three-dimensional analysis of coupled conduction, convection, and thermal radiation problems. This code is especially appropriate for simulating the steady-state performance of spent fuel storage systems. The code has been evaluated for this application for the US Department of Energy's Commercial Spent Fuel Management Program. HYDRA-II provides a finite-difference solution in cartesian coordinates to the equations governing the conservation of mass, momentum, and energy. A cylindrical coordinate system may also be used to enclose the cartesian coordinate system. This exterior coordinate system is useful for modeling cylindrical cask bodies. The difference equations for conservation of momentum incorporate directional porosities and permeabilities that are available to model solid structures whose dimensions may be smaller than the computational mesh. The equation for conservation of energy permits modeling of orthotropic physical properties and film resistances. Several automated methods are available to model radiation transfer within enclosures and from fuel rod to fuel rod. The documentation of HYDRA-II is presented in three separate volumes. Volume 1 - Equations and Numerics describes the basic differential equations, illustrates how the difference equations are formulated, and gives the solution procedures employed. This volume, Volume 2 - User's Manual, contains code flow charts, discusses the code structure, provides detailed instructions for preparing an input file, and illustrates the operation of the code by means of a sample problem. The final volume, Volume 3 - Verification/Validation Assessments, provides a comparison between the analytical solution and the numerical simulation for problems with a known solution. 6 refs.

  2. Overlap and Differences in Brain Networks Underlying the Processing of Complex Sentence Structures in Second Language Users Compared with Native Speakers.

    Weber, Kirsten; Luther, Lisa; Indefrey, Peter; Hagoort, Peter

    2016-05-01

    When we learn a second language later in life, do we integrate it with the established neural networks in place for the first language or is at least a partially new network recruited? While there is evidence that simple grammatical structures in a second language share a system with the native language, the story becomes more multifaceted for complex sentence structures. In this study, we investigated the underlying brain networks in native speakers compared with proficient second language users while processing complex sentences. As hypothesized, complex structures were processed by the same large-scale inferior frontal and middle temporal language networks of the brain in the second language, as seen in native speakers. These effects were seen both in activations and task-related connectivity patterns. Furthermore, the second language users showed increased task-related connectivity from inferior frontal to inferior parietal regions of the brain, regions related to attention and cognitive control, suggesting less automatic processing for these structures in a second language. PMID:26746708

  3. The Princeton Protein Orthology Database (P-POD): A Comparative Genomics Analysis Tool for Biologists

    Sven Heinicke; Livstone, Michael S.; Charles Lu; Rose Oughtred; Fan Kang; Angiuoli, Samuel V; Owen White; David Botstein; Kara Dolinski

    2007-01-01

    Many biological databases that provide comparative genomics information and tools are now available on the internet. While certainly quite useful, to our knowledge none of the existing databases combine results from multiple comparative genomics methods with manually curated information from the literature. Here we describe the Princeton Protein Orthology Database (P-POD, http://ortholog.princeton.edu), a user-friendly database system that allows users to find and visualize the phylogenetic r...

  4. Comparative analysis of the mitochondrial genomes in gastropods

    In this work we presented a comparative analysis of the mitochondrial genomes in gastropods. Nucleotide and amino acids composition was calculated and a comparative visual analysis of the start and termination codons was performed. The organization of the genome was compared calculating the number of intergenic sequences, the location of the genes and the number of reorganized genes (breakpoints) in comparison with the sequence that is presumed to be ancestral for the group. In order to calculate variations in the rates of molecular evolution within the group, the relative rate test was performed. In spite of the differences in the size of the genomes, the amino acids number is conserved. The nucleotide and amino acid composition is similar between Vetigastropoda, Ceanogastropoda and Neritimorpha in comparison to Heterobranchia and Patellogastropoda. The mitochondrial genomes of the group are very compact with few intergenic sequences, the only exception is the genome of Patellogastropoda with 26,828 bp. Start codons of the Heterobranchia and Patellogastropoda are very variable and there is also an increase in genome rearrangements for these two groups. Generally, the hypothesis of constant rates of molecular evolution between the groups is rejected, except when the genomes of Caenogastropoda and Vetigastropoda are compared.

  5. COMPARATIVE ANALYSIS OF CELEBRITY AND NON-CELEBRITY ADVERTISEMENT

    Ammar Asad

    2013-12-01

    Full Text Available This study is undertaken to make a comparative analysis of celebrity advertisement and non-celebrity advertisement with respect to attitude toward advertisement, attitude toward brand, purchase intentions, and advertising attributes. For this purpose, a simple random sample of 200 students studying four different disciplines was taken from the Private University in Lahore. For econometric proof, reliability analysis, descriptive analysis, and independent sample T-test was used to interpret the results. Our findings show that there is no significant difference between celebrity and non-celebrity advertisement with respect to attitude toward advertisement, attitude toward brand, purchasing intentions, and advertising attributes. The limitations and recommendations of this research are also given.

  6. Authors’ Rights and Audiences: Does Intellectual Property Protection Apply to User-Generated Content? A Comparative Legal Study of Online News.

    Javier Díaz Noci

    2015-11-01

    Full Text Available Audience participation in the production process is an increasing reality in all elds of cultural production, from fan ction to news commentary, from transmedia extensions to news items themselves. Author participation takes many shapes, and user-generated content is the most authorial of them. Whether by way of well-formulated strategies of personal authorship or collaborative strategies with other users, or through derivative or collaborative work, audiences are casting a wider shadow on collective work – newspapers or websites, for instance. They complete previous work or create new product. Regardless, audiences have now joined journalists, photographers and the media themselves as actors in news creation and circulation, and constitute a very real part of media business. In this paper, we propose a comparative analysis of the changes introduced by this reality on legal activity, which has implied the reform of the copyright laws in all countries of the two main juridical traditions – Common law and Civil law – and also in the concrete practices of the media, as re ected speci cally in their legal terms and conditions, copyright notices and more generally, in the licenses and contracts signed by the users when they enter a website. We aim to determine the characteristics of legal protection as it applies to news content, regardless of its authorship, so as to explain the contemporary tendencies in copyright on news reporting as a social activity. To this end we use comparative legal research techniques, and more precisely, deal with one of the big issues concerning copyright law with respect to news production: the balance between the protection granted individual authors, journalists or users, and the protection granted corporate entities responsible for the content of collective work. L’intervention des audiences dans les processus de production est une réalité de plus en plus présente dans tous les domaines de la production

  7. Analysis of user characteristics related to drop-off detection with long cane

    Dae Shik Kim, PhD

    2010-05-01

    Full Text Available This study examined how user characteristics affect drop-off detection with the long cane. A mixed-measures design with block randomization was used for the study, in which 32 visually impaired adults attempted to detect the drop-offs using different cane techniques. Younger cane users detected drop-offs significantly more reliably (mean +/- standard deviation = 74.2% +/- 11.2% of the time than older cane users (60.9% +/- 10.8%, p = 0.009. The drop-off detection threshold of the younger participants (5.2 +/- 2.1 cm was also statistically significantly smaller than that of the older participants (7.9 +/- 2.2 cm, p = 0.007. Those with early-onset visual impairment (78.0% +/- 9.0% also detected drop-offs significantly more reliably than those with later-onset visual impairment (67.3% +/- 12.4%, p = 0.01. No interaction occurred between examined user characteristics (age and age at onset of visual impairment and the type of cane technique used in drop-off detection. The findings of the study may help orientation and mobility specialists select appropriate cane techniques in accordance with the cane user's age and onset of visual impairment.

  8. The Effect of Transport Accessibility on the Social Inclusion of Wheelchair Users: A Mixed Method Analysis

    Raquel Velho

    2016-06-01

    Full Text Available In recent years the accessibility of London buses has improved with the introduction of ramps and wheelchair priority areas. These advances are meant to remove physical barriers to entering the bus, but new conflicts have arisen particularly over the physical space aboard. We aimed to research the barriers faced by wheelchair users in public transport using a mixed methods approach to establish the breadth of issues faced by wheelchair users. To this end we quantified the push-force used alight a bus and a study to understand the coping mechanisms used by people to propel up a ramp. This quantitative approach found push forces which resulted in a load of 2 to 3 times body weight being transferred through people’s shoulders, forces which can be directly linked to shoulder injury. This could disable the user further, preventing them from being able to push their wheelchair. Alongside the quantitative study, we conducted qualitative research comprising of a number of in-depth interviews with wheelchair users about the barriers they face in public transport. Our main claim, highlighted through this interdisciplinary collaboration, is that proposed ‘solutions’ to accessibility, such as ramps, often generate problems of their own. These barriers can affect the life of wheelchair users, impacting on their confidence and causing social isolation. These can be long-term in nature or immediate.

  9. A Comparative Analysis of Global Cropping Systems Models and Maps

    Anderson, W. B.; You, L.; Wood, S.; Wood-Sichra, U.; Wu, W.

    2013-12-01

    Agricultural practices have dramatically altered the land cover of the Earth, but the spatial extent and intensity of these practices is often difficult to catalogue. Cropland accounts for nearly 15 million km2 of the Earth's land cover - amounting to 12% of the Earth's ice-free land surface - yet information on the distribution and performance of specific crops is often available only through national or sub-national statistics. While remote sensing products offer spatially disaggregated information, those currently available on a global scale are ill-suited for many applications due to the limited separation of crop types within the area classified as cropland. Recently, however, there have been multiple independent efforts to incorporate the detailed information available from statistical surveys with supplemental spatial information to produce a spatially explicit global dataset specific to individual cropss for the year 2000. While these datasets provide analysts and decision makers with improved information on global cropping systems, the final global cropping maps differ from one another substantially. This study aims to explore and quantify systematic similarities and differences between four major global cropping systems products: the monthly irrigated and rainfed crop areas around the year 2000 (MIRAC2000) dataset, the spatial production allocation model (SPAM), the global agro-ecological zone (GAEZ) dataset, and the dataset developed by Monfreda et al., 2008. The analysis explores not only the final cropping systems maps but also the interdependencies of each product, methodological differences and modeling assumptions, which will provide users with information vital for discerning between datasets in selecting a product appropriate for each intended application.

  10. Consumption capability analysis for Micro-blog users based on data mining

    Yue Sun

    2013-01-01

    Data mining is an effective method of discovering useful information in a large amount of data. The capability of understanding the user’s consumption is vital for a company. Discovering the significant customers allows the company to focus on the most valuable customers. This paper uses micro-blog users’ check-in data and shop information for analysis and cluster method of data mining. We analyze user’s spending ability quantitatively based on user’s check-in actions. Compared wi...

  11. Virtual World Currency Value Fluctuation Prediction System Based on User Sentiment Analysis.

    Kim, Young Bin; Lee, Sang Hyeok; Kang, Shin Jin; Choi, Myung Jin; Lee, Jung; Kim, Chang Hun

    2015-01-01

    In this paper, we present a method for predicting the value of virtual currencies used in virtual gaming environments that support multiple users, such as massively multiplayer online role-playing games (MMORPGs). Predicting virtual currency values in a virtual gaming environment has rarely been explored; it is difficult to apply real-world methods for predicting fluctuating currency values or shares to the virtual gaming world on account of differences in domains between the two worlds. To address this issue, we herein predict virtual currency value fluctuations by collecting user opinion data from a virtual community and analyzing user sentiments or emotions from the opinion data. The proposed method is straightforward and applicable to predicting virtual currencies as well as to gaming environments, including MMORPGs. We test the proposed method using large-scale MMORPGs and demonstrate that virtual currencies can be effectively and efficiently predicted with it. PMID:26241496

  12. Virtual World Currency Value Fluctuation Prediction System Based on User Sentiment Analysis.

    Young Bin Kim

    Full Text Available In this paper, we present a method for predicting the value of virtual currencies used in virtual gaming environments that support multiple users, such as massively multiplayer online role-playing games (MMORPGs. Predicting virtual currency values in a virtual gaming environment has rarely been explored; it is difficult to apply real-world methods for predicting fluctuating currency values or shares to the virtual gaming world on account of differences in domains between the two worlds. To address this issue, we herein predict virtual currency value fluctuations by collecting user opinion data from a virtual community and analyzing user sentiments or emotions from the opinion data. The proposed method is straightforward and applicable to predicting virtual currencies as well as to gaming environments, including MMORPGs. We test the proposed method using large-scale MMORPGs and demonstrate that virtual currencies can be effectively and efficiently predicted with it.

  13. User Profiling and Re-identification: Case of University-Wide Network Analysis

    Kumpošt, Marek; Matyáš, Vašek

    In this paper we present our methodology for context information processing, modeling users’ behaviour and re-identification. Our primary interest is to what extent a user can be re-identified if we have his “user profile” and how much information is required for a successful re-identification. We operate with “user profiles” that reflect user’s behaviour in the past. We describe the input date we use for building behavioural characteristics; similarity searching procedure and an evaluation of the re-identification process. We discuss (and provide results of our experiments) how different initial conditions, as well as different approaches used in the similarity searching phase, influence the results and propose the optimal scenario where we obtain the most accurate results. We provide experimental results of re-identification of three protocols (SSH, HTTP and HTTPS).

  14. Comparative transcriptomic analysis of streptococcus pseudopneumoniae with viridans group streptococci

    Park Hee

    2012-07-01

    Full Text Available Abstract Background Streptococcus pseudopneumoniae, is a novel member of the genus Streptococcus, falling close to related members like S. pneumoniae, S. mitis, and S. oralis. Its recent appearance has shed light on streptococcal infections, which has been unclear till recently. In this study, the transcriptome of S. pseudopneumoniae CCUG 49455T was analyzed using the S. pneumoniae R6 microarray platform and compared with those of S. pneumoniae KCTC 5080T, S. mitis KCTC 3556T, and S. oralis KCTC 13048T strains. Results Comparative transcriptome analysis revealed the extent of genetic relatedness among the species, and implies that S. pseudopneumoniae is the most closely related to S. pneumoniae. A total of 489, 444 and 470 genes were upregulated while 347, 484 and 443 were downregulated relative to S. pneumoniae in S. pseudopneumoniae, S. oralis and S. mitis respectively. Important findings were the up-regulation of TCS (two component systems and transposase which were found to be specific to S. pseudopneumoniae. Conclusions This study provides insight to the current understanding of the genomic content of S. pseudopneumoniae. The comparative transcriptome analysis showed hierarchical clustering of expression data of S. pseudopneumoniae with S. pneumoniae and S. mitis with S. oralis. This proves that transcriptional profiling can facilitate in elucidating the genetic distance between closely related strains.

  15. [Comparative analysis of total cell protein electrophoregram of pathogenic Burkholderia].

    Budchenko, A A; Iliukhin, V I; Viktorov, D V

    2005-01-01

    Whole-cell proteins of 22 strain of Burkhoderia pseudomallei, including 13 B. mallei, 5 B. cepacia strains and 14 strains of opportunistically pathogenic Pseudomonas defined by 1D SDC-PAAG electrophoresis. Electrophoregrams contained 35 to 45 protein fractions sized 19 to 130 kDa, which were highly reproductive. On the basis of computer-aided comparative analysis of protein patterns the interspecies and intraspecies grouping of studied microorganisms was made. The cluster analysis of the similarity matrix of protein spectra made it possible to allocate two groups of strains at the level of similarity of 78%. Group I was formed by Burkholderia species that previously belonged to the II RNA-DNA homology group of Pseudomonas: B. pseudomallei, B. mallei, B. cepacia. All Pseudomonas species were added to the 2nd Group: P. aeruginosa, P. stutzeri, P. testosterone, P. fluorescens, P. putida, P. mendocina. Four phenons were isolated among the strains of B. pseudomallei and 2 phenons--among the strains of B. mallei at the threshold similarity level (89%). The authors conclude that the comparative analysis of electrophoregrams of whole-cell proteins can be useful in the identification and typing of pathogenic Burkholderia. PMID:15954473

  16. New Graphical User Interface for EXAFS analysis with the GNXAS suite of programs

    Hatada, Keisuke; Iesari, Fabio; Properzi, Leonardo; Minicucci, M.; di Cicco, Andrea

    2016-05-01

    GNXAS is a suite of programs based on multiple scattering calculations which performs a structural refinement of EXAFS spectra. It can be used for any system although it has been mainly developed to determine the local structure of disordered substances. We developed a user-friendly graphical user interface (GUI) to facilitate use of the codes by using wxPython. The developed GUI and the codes are multiplatform running on Windows, Macintosh and Linux systems, and are free shareware (http://gnxas.unicam.it). In this work we illustrate features and potentials of this newly developed version of GNXAS (w-GNXAS).

  17. Pro-Anorexia and Anti-Pro-Anorexia Videos on YouTube: Sentiment Analysis of User Responses

    Oksanen, Atte; Garcia, David; Sirola, Anu; Näsi, Matti; Kaakinen, Markus; Keipi, Teo; Räsänen, Pekka

    2015-01-01

    Background Pro-anorexia communities exist online and encourage harmful weight loss and weight control practices, often through emotional content that enforces social ties within these communities. User-generated responses to videos that directly oppose pro-anorexia communities have not yet been researched in depth. Objective The aim was to study emotional reactions to pro-anorexia and anti-pro-anorexia online content on YouTube using sentiment analysis. Methods Using the 50 most popular YouTu...

  18. Comparative and functional analysis of cardiovascular-related genes

    Cheng, Jan-Fang; Pennacchio, Len A.

    2003-09-01

    The ability to detect putative cis-regulatory elements in cardiovascular-related genes has been accelerated by the availability of genomic sequence data from numerous vertebrate species and the recent development of comparative genomic tools. This improvement is anticipated to lead to a better understanding of the complex regulatory architecture of cardiovascular (CV) genes and how genetic variants in these non-coding regions can potentially play a role in cardiovascular disease. This manuscript reviews a recently established database dedicated to the comparative sequence analysis of 250 human CV genes of known importance, 37 of which currently contain sequence comparison data for organisms beyond those of human, mouse and rat. These data have provided a glimpse into the variety of possible insights from deep vertebrate sequence comparisons and the identification of putative gene regulatory elements.

  19. Comparative analysis of vitamin status of schoolchildren in recreational period

    Podrigalo L.V.

    2013-10-01

    Full Text Available It is a comparative analysis of the characteristics of the vitamin status of schoolchildren during the summer recreation of 90th years of the last century and now. The study involved 167 schoolchildren aged 11-14 years. With the help of questionnaires developed by the authors assessed the severity of symptoms of vitamin deficiency, the prevalence of vitamin supplementation, frequency and volume of consumption of fruits and vegetables. It is confirmed that the saturation is the state of the vitamin in children is the best compared with data from 20 years ago, the state of multi-vitamin deficiency is replaced mono-vitamin deficit. The results, data evaluation and the availability of additional fortification of the diet of fruit and vegetables support the need for measures aimed at improving vitamin status. Using the questionnaire method is most appropriate for monitoring the vitamin status of schoolchildren.

  20. SILAC-based comparative analysis of pathogenic Escherichia coli secretomes

    Boysen, Anders; Borch, Jonas; Krogh, Thøger Jensen;

    2015-01-01

    this study, we grew the pathogenic strains ETEC H10407, AIEC LF82 and the non-pathogenic reference strain E. coli K-12 MG1655 in parallel and used SILAC to compare protein levels in OMVs and culture supernatant. We have identified well-known virulence factors from both AIEC and ETEC, thus validating......Comparative studies of pathogenic bacteria and their non-pathogenic counterparts has led to the discovery of important virulence factors thereby generating insight into mechanisms of pathogenesis. Protein-based antigens for vaccine development are primarily selected among unique virulence...... proteome analysis have the potential to discover both classes of proteins and hence form an important tool for discovering therapeutic targets. Adherent-invasive Escherichia coli (AIEC) and Enterotoxigenic E. coli (ETEC) are pathogenic variants of E. coli which cause intestinal disease in humans. AIEC is...

  1. Feature-level sentiment analysis by using comparative domain corpora

    Quan, Changqin; Ren, Fuji

    2016-06-01

    Feature-level sentiment analysis (SA) is able to provide more fine-grained SA on certain opinion targets and has a wider range of applications on E-business. This study proposes an approach based on comparative domain corpora for feature-level SA. The proposed approach makes use of word associations for domain-specific feature extraction. First, we assign a similarity score for each candidate feature to denote its similarity extent to a domain. Then we identify domain features based on their similarity scores on different comparative domain corpora. After that, dependency grammar and a general sentiment lexicon are applied to extract and expand feature-oriented opinion words. Lastly, the semantic orientation of a domain-specific feature is determined based on the feature-oriented opinion lexicons. In evaluation, we compare the proposed method with several state-of-the-art methods (including unsupervised and semi-supervised) using a standard product review test collection. The experimental results demonstrate the effectiveness of using comparative domain corpora.

  2. Peace Negotiations in the Third World: A Comparative Analysis

    Raúl Benítez Manaut

    1995-01-01

    Full Text Available In this article the negotiations and peace processes in the Third World are analized from a comparative viewpoint in order to focus in on the case of Centroamerica. Reference is made to the special features and common elements of those peace processes in otherregions of the Third World and they are compared to those which have taken place in Centroamerica. It is a retrospective and comparative analysis. For this reason, the author has decided to carry out a brief typology of those conflicts offered by Centroamerica: inNicaragua, El Salvador and Guatemala. Later, the author goes on to analyse the most relevant peace and negotiation processes involving the Third World including one or two from Latin America: the cases of Panama, Afghanistan, Iran-Iraq, Colombia, southern Africa (South Africa, Namibia and Angola and Cambodia. Later, the author goes overthe peace process periods in Centroamerica and the temporary contradictions which are presented by internal conflict, regional conflict and geopolitical conflict. Finally, a comparative methodological exercise is carried out which allows to focus on modes of implementation of the peace processes.

  3. Comparative analysis multiple criteria for the choice of a common transport system in Rabat (Morocco

    Badreddine EL GOUMI

    2015-11-01

    Full Text Available The choice of a transport system is a complex and difficult job. Different systems may seem to offer equivalent services to users while often lack the information necessary to better distinguish the differences between a particular systems. We present a comparative analysis of public transport systems in Rabat-Sale to better guide the selection of communities, in the context of promoting urban transport meeting the challenges of sustainable development. We analyzed, presented the criteria and characteristics of each system, proposed and discussed a multi-criteria method to the weighted sum to propose the best adapted system with knowledge and clarity. We close this work with the results showing the fact that the tram has a special place in relation to the bus in the majority of scenarios.

  4. The DNA sequence and comparative analysis of human chromosome 10.

    Deloukas, P; Earthrowl, M E; Grafham, D V; Rubenfield, M; French, L; Steward, C A; Sims, S K; Jones, M C; Searle, S; Scott, C; Howe, K; Hunt, S E; Andrews, T D; Gilbert, J G R; Swarbreck, D; Ashurst, J L; Taylor, A; Battles, J; Bird, C P; Ainscough, R; Almeida, J P; Ashwell, R I S; Ambrose, K D; Babbage, A K; Bagguley, C L; Bailey, J; Banerjee, R; Bates, K; Beasley, H; Bray-Allen, S; Brown, A J; Brown, J Y; Burford, D C; Burrill, W; Burton, J; Cahill, P; Camire, D; Carter, N P; Chapman, J C; Clark, S Y; Clarke, G; Clee, C M; Clegg, S; Corby, N; Coulson, A; Dhami, P; Dutta, I; Dunn, M; Faulkner, L; Frankish, A; Frankland, J A; Garner, P; Garnett, J; Gribble, S; Griffiths, C; Grocock, R; Gustafson, E; Hammond, S; Harley, J L; Hart, E; Heath, P D; Ho, T P; Hopkins, B; Horne, J; Howden, P J; Huckle, E; Hynds, C; Johnson, C; Johnson, D; Kana, A; Kay, M; Kimberley, A M; Kershaw, J K; Kokkinaki, M; Laird, G K; Lawlor, S; Lee, H M; Leongamornlert, D A; Laird, G; Lloyd, C; Lloyd, D M; Loveland, J; Lovell, J; McLaren, S; McLay, K E; McMurray, A; Mashreghi-Mohammadi, M; Matthews, L; Milne, S; Nickerson, T; Nguyen, M; Overton-Larty, E; Palmer, S A; Pearce, A V; Peck, A I; Pelan, S; Phillimore, B; Porter, K; Rice, C M; Rogosin, A; Ross, M T; Sarafidou, T; Sehra, H K; Shownkeen, R; Skuce, C D; Smith, M; Standring, L; Sycamore, N; Tester, J; Thorpe, A; Torcasso, W; Tracey, A; Tromans, A; Tsolas, J; Wall, M; Walsh, J; Wang, H; Weinstock, K; West, A P; Willey, D L; Whitehead, S L; Wilming, L; Wray, P W; Young, L; Chen, Y; Lovering, R C; Moschonas, N K; Siebert, R; Fechtel, K; Bentley, D; Durbin, R; Hubbard, T; Doucette-Stamm, L; Beck, S; Smith, D R; Rogers, J

    2004-05-27

    The finished sequence of human chromosome 10 comprises a total of 131,666,441 base pairs. It represents 99.4% of the euchromatic DNA and includes one megabase of heterochromatic sequence within the pericentromeric region of the short and long arm of the chromosome. Sequence annotation revealed 1,357 genes, of which 816 are protein coding, and 430 are pseudogenes. We observed widespread occurrence of overlapping coding genes (either strand) and identified 67 antisense transcripts. Our analysis suggests that both inter- and intrachromosomal segmental duplications have impacted on the gene count on chromosome 10. Multispecies comparative analysis indicated that we can readily annotate the protein-coding genes with current resources. We estimate that over 95% of all coding exons were identified in this study. Assessment of single base changes between the human chromosome 10 and chimpanzee sequence revealed nonsense mutations in only 21 coding genes with respect to the human sequence. PMID:15164054

  5. Initial sequencing and comparative analysis of the mouse genome

    Waterston, Robert H.; Lindblad-Toh, Kerstin; Birney, Ewan; Rogers, Jane; Abril, Josep F.; Agarwal, Pankaj; Agarwala, Richa; Ainscough, Rachel; Alexandersson, Marina; An, Peter; Antonarakis, Stylianos E.; Attwood, John; Baertsch, Robert; Bailey, Jonathon; Barlow, Karen; Beck, Stephan; Berry, Eric; Birren, Bruce; Bloom, Toby; Bork, Peer; Botcherby, Marc; Bray, Nicolas; Brent, Michael R.; Brown, Daniel G.; Brown, Stephen D.; Bult, Carol; Burton, John; Butler, Jonathan; Campbell, Robert D.; Carninci, Piero; Cawley, Simon; Chiaromonte, Francesca; Chinwalla, Asif T.; Church, Deanna M.; Clamp, Michele; Clee, Christopher; Collins, Francis S.; Cook, Lisa L.; Copley, Richard R.; Coulson, Alan; Couronne, Olivier; Cuff, James; Curwen, Val; Cutts, Tim; Daly, Mark; David, Robert; Davies, Joy; Delehaunty, Kimberly D.; Deri, Justin; Dermitzakis, Emmanouil T.; Dewey, Colin; Dickens, Nicholas J.; Diekhans, Mark; Dodge, Sheila; Dubchak, Inna; Dunn, Diane M.; Eddy, Sean R.; Elnitski, Laura; Emes, Richard D.; Eswara, Pallavi; Eyras, Eduardo; Felsenfeld, Adam; Fewell, Ginger A.; Flicek, Paul; Foley, Karen; Frankel, Wayne N.; Fulton, Lucinda A.; Fulton, Robert S.; Furey, Terrence S.; Gage, Diane; Gibbs, Richard A.; Glusman, Gustavo; Gnerre, Sante; Goldman, Nick; Goodstadt, Leo; Grafham, Darren; Graves, Tina A.; Green, Eric D.; Gregory, Simon; Guigo, Roderic; Guyer, Mark; Hardison, Ross C.; Haussler, David; Hayashizaki, Yoshihide; Hillier, LaDeana W.; Hinrichs, Angela; Hlavina, Wratko; Holzer, Timothy; Hsu, Fan; Hua, Axin; Hubbard, Tim; Hunt, Adrienne; Jackson, Ian; Jaffe, David B.; Johnson, L. Steven; Jones, Matthew; Jones, Thomas A.; Joy, Ann; Kamal, Michael; Karlsson, Elinor K.; Karolchik, Donna; Kasprzyk, Arkadiusz; Kawai, Jun; Keibler, Evan; Kells, Cristyn; Kent, W. James; Kirby, Andrew; Kolbe, Diana L.; Korf, Ian; Kucherlapati, Raju S.; Kulbokas III, Edward J.; Kulp, David; Landers, Tom; Leger, J.P.; Leonard, Steven; Letunic, Ivica; Levine, Rosie; et al.

    2002-12-15

    The sequence of the mouse genome is a key informational tool for understanding the contents of the human genome and a key experimental tool for biomedical research. Here, we report the results of an international collaboration to produce a high-quality draft sequence of the mouse genome. We also present an initial comparative analysis of the mouse and human genomes, describing some of the insights that can be gleaned from the two sequences. We discuss topics including the analysis of the evolutionary forces shaping the size, structure and sequence of the genomes; the conservation of large-scale synteny across most of the genomes; the much lower extent of sequence orthology covering less than half of the genomes; the proportions of the genomes under selection; the number of protein-coding genes; the expansion of gene families related to reproduction and immunity; the evolution of proteins; and the identification of intraspecies polymorphism.

  6. Establishing a framework for comparative analysis of genome sequences

    Bansal, A.K.

    1995-06-01

    This paper describes a framework and a high-level language toolkit for comparative analysis of genome sequence alignment The framework integrates the information derived from multiple sequence alignment and phylogenetic tree (hypothetical tree of evolution) to derive new properties about sequences. Multiple sequence alignments are treated as an abstract data type. Abstract operations have been described to manipulate a multiple sequence alignment and to derive mutation related information from a phylogenetic tree by superimposing parsimonious analysis. The framework has been applied on protein alignments to derive constrained columns (in a multiple sequence alignment) that exhibit evolutionary pressure to preserve a common property in a column despite mutation. A Prolog toolkit based on the framework has been implemented and demonstrated on alignments containing 3000 sequences and 3904 columns.

  7. A comparative analysis of Media Lengua and Quichua vowel production.

    Stewart, Jesse

    2014-01-01

    This study presents a comparative analysis of F1 and F2 vowel frequencies from Pijal Media Lengua (PML) and Imbabura Quichua. Mixed-effects models are used to test Spanish-derived high and low vowels against their Quichua-derived counterparts for statistical significance. Spanish-derived and Quichua-derived high vowels are also tested against Spanish-derived mid vowels. This analysis suggests that PML may be manipulating as many as eight vowels where Spanishderived high and low vowels coexist as near-mergers with their Quichua-derived counterparts, while high and mid vowels coexist with partial overlap. Quichua, traditionally viewed as a three-vowel system, shows similar results and may be manipulating as many as six vowels. PMID:25721292

  8. Comparative analysis of model assessment in community detection

    Kawamoto, Tatsuro

    2016-01-01

    Bayesian cluster inference with a flexible generative model allows us to detect various types of structures. However, it has problems stemming from computational complexity and difficulties in model assessment. We consider the stochastic block model with restricted hyperparameter space, which is known to correspond to modularity maximization. We show that it not only reduces computational complexity, but is also beneficial for model assessment. Using various criteria, we conduct a comparative analysis of the model assessments, and analyze whether each criterion tends to overfit or underfit. We also show that the learning of hyperparameters leads to qualitative differences in Bethe free energy and cross-validation errors.

  9. Comparative Analysis of Two Trigeneration Systems for a Rezidential Building

    Tofan, Bogdan-Andrei; Şerbănoiu, Ion; Hoblea, Alin-Enver

    2014-01-01

    Biomass is a global resource that is still being used in traditional ways almost all around the globe, resulting in a waste of its great potential in the production of energy. Romania is a part of those countries that aren’t improving the way some natural resources are used and this was one of the reasons for conducting the study. The study is proposing a comparative analysis of two trigeneration systems, one using biomass and internal combustion engine, and another system that uses micro-tur...

  10. Comparative Analysis of Transport Terminologyusage on the Internet

    Angelika Petrėtienė

    2011-04-01

    Full Text Available he paper deals with the comparative analysis of the usage of transport terminology on the Internet using the popular search engine www.google.lt. It analyses the frequency of correct and incorrect usage of lexis, word-building and pronominal forms. The charts show what mistakes are mostly made and that they are mainly term building mistakes. The usage of new loanwords can be justified because most of them are not considered as serious language mistakes. Although, mistakes of another kind can only be explained as the negligence of the authors of the Internet text.

  11. A Comparative Analysis on US Financial Stress Indicators

    Nimantha Manamperi

    2015-01-01

    This paper provides a comparative analysis on different fi nancial stress indexes (FSIs) available for the United States. The main objective of these stress indexes is to provide detailed insights about the fi nancial conditions in the U.S. economy. In general, all stress indexes indicated a very high fi nancial risk during the 2008 fi nancial crisis. Among all the Federal Reserve Bank FSIs, the Kansas city fed FSI and the St. Louis fed FSI show considerable similarities during 2008 fi nancia...

  12. Comparative Analysis of Measured and Predicted Shrinkage Strain in Concrete

    Kossakowski P. G.

    2014-06-01

    Full Text Available The article discusses the issues related to concrete shrinkage. The basic information on the phenomenon is presented as well as the factors that determine the contraction are pointed out and the stages of the process are described. The guidance for estimating the shrinkage strain is given according to Eurocode standard PN-EN 1992-1-1:2008. The results of studies of the samples shrinkage strain of concrete C25/30 are presented with a comparative analysis of the results estimated by the guidelines of the standard according to PN-EN 1992-1- 1:2008

  13. ONLINE SOCIAL NETWORKS - A COMPARATIVE ANALYSIS FOR THE MARKETING WORLD

    FUCIU Mircea; Hortensia GORSKI

    2012-01-01

    We are in an age of continuous change. The development of the Internet and of the information and communication technologies have led to important shifts in the way companies do business. This paper aims to present the concept and the evolution of a new internet-based instrument: the online social network (OSN). We underline the impact of these new changes on the marketing concept, and the importance of OSN for a company`s future development. We are presenting a comparative analysis, from the...

  14. The digital storytelling process: A comparative analysis from various experts

    Hussain, Hashiroh; Shiratuddin, Norshuhada

    2016-08-01

    Digital Storytelling (DST) is a method of delivering information to the audience. It combines narrative and digital media content infused with the multimedia elements. In order for the educators (i.e the designers) to create a compelling digital story, there are sets of processes introduced by experts. Nevertheless, the experts suggest varieties of processes to guide them; of which some are redundant. The main aim of this study is to propose a single guide process for the creation of DST. A comparative analysis is employed where ten DST models from various experts are analysed. The process can also be implemented in other multimedia materials that used the concept of DST.

  15. Comparative Analysis of the Value Added Tax Evolution

    Mirela Anca Postole

    2013-06-01

    Full Text Available The impact of indirect taxes is analysed in the study of evolution, especially the VAT for the economic activity of the company studied. During the reporting period, namely January 2009 – December 2011 the supporting documents were checked which records on VAT deductible and collected were based on, in compliance with legal norms and principles of financial accounting. Also the data processed were the basis for an analysis to compare the evolution of VAT. VAT shall be paid for the entire activity of the company.

  16. Explaining the judicial independence of international courts: a comparative analysis

    Beach, Derek

    condition. The paper first develops three sets of competing explanatory variables that potentially can explain variations in the judicial independence of ICs. The causal effects of these explanatory variables upon variance in judicial independence are investigated in a comparative analysis of the ACJ, ECJ......What factors allow some international courts (ICs) to rule against the express preferences of powerful member states, whereas others routinely defer to governments? While judicial independence is not the only factor explaining the strength of a given international institution, it is a necessary...

  17. Comparative Analysis of Measured and Predicted Shrinkage Strain in Concrete

    Kossakowski P. G.; Raczkiewicz W.

    2014-01-01

    The article discusses the issues related to concrete shrinkage. The basic information on the phenomenon is presented as well as the factors that determine the contraction are pointed out and the stages of the process are described. The guidance for estimating the shrinkage strain is given according to Eurocode standard PN-EN 1992-1-1:2008. The results of studies of the samples shrinkage strain of concrete C25/30 are presented with a comparative analysis of the results estimated by the guideli...

  18. Comparative proteomic analysis of floral color variegation in peach.

    Zhou, Yong; Wu, Xinxin; Zhang, Zhen; Gao, Zhihong

    2015-09-01

    Variegation in flower is a special trait in ornamental peach (Prunus persica L.). To investigate the mechanism of color variegation, we used a combination of two dimensional gel electrophoresis and mass spectrometry to explore the proteomic profiles between variegated flower (VF) and red flower (RF) buds of the peach cultivar 'Sahong Tao'. More than 500 highly reproducible protein spots (P peach flowers. Our study is the first comparative proteomic analysis of floral variegation and will contribute to further investigations into the molecular mechanism of flower petal coloration in ornamental peach. PMID:26192118

  19. Installing and maintaining CDAT (Climate Data Analysis Tools) in multi-user and multi-platform environments

    Peterschmitt, Jean-Yves

    2010-05-01

    CDAT is an extensible software environment for the climate scientist, based on the widely used python scripting language. Thanks to all the bundled python modules, CDAT can be used for a wide range of applications, from the powerful replacement of traditional shell scripts for automated data-processing to the interactive graphical analysis of scientific data (with an emphasis on climate data). CDAT is traditionally used as a single-user desktop tool (each user is responsible for his own version of CDAT). This poster will show how CDAT can be centrally installed, tested and maintained so that multiple users can easily and seamlessly use it in their laboratory and remote computing centers. We use the combination of standard initialization scripts (for the CDAT-manager and the end users) and of standard installation steps to deploy CDAT consistently on all the managed platforms (with the possible concurrent installation of different versions on the same platform). Reference: http://www2-pcmdi.llnl.gov/cdat

  20. Large-System Analysis of Multiuser Detection with an Unknown Number of Users: A High-SNR Approach

    Campo, Adrià Tauste; Biglieri, Ezio

    2010-01-01

    We analyze multiuser detection under the assumption that the number of users accessing the channel is unknown by the receiver. In this environment, users' activity must be estimated along with any other parameters such as data, power, and location. Our main goal is to determine the performance loss caused by the need for estimating the identities of active users, which are not known a priori. To prevent a loss of optimality, we assume that identities and data are estimated jointly, rather than in two separate steps. We examine the performance of multiuser detectors when the number of potential users is large. Statistical-physics methodologies are used to determine the macroscopic performance of the detector in terms of its multiuser efficiency. Special attention is paid to the fixed-point equation whose solution yields the multiuser efficiency of the optimal (maximum a posteriori) detector in the large signal-to-noise ratio regime. Our analysis yields closed-form approximate bounds to the minimum mean-squared...

  1. Comparation studies of uranium analysis method using spectrophotometer and voltammeter

    Comparation studies of uranium analysis method by spectrophotometer and voltammeter had been done. The objective of experiment is to examine the reliability of analysis method and instrument performance by evaluate parameters; linearity, accuracy, precision and detection limit. Uranyl nitrate hexahydrate is used as standard, and the sample is solvent mixture of tributyl phosphate and kerosene containing uranium (from phosphoric acid purification unit Petrokimia Gresik). Uranium (U) stripping in the sample use HN03 0,5 N and then was analyzed by using of both instrument. Analysis of standard show that both methods give a good linearity by correlation coefficient > 0,999. Spectrophotometry give accuration 99,34 - 101,05 % with ratio standard deviation (RSD) 1,03 %; detection limit (DL) 0,05 ppm. Voltammetry give accuration 95,63 -101,49 % with RSD 3,91 %; detection limit (DL) 0,509 ppm. On the analysis of sludge samples were given the significantly different in result; spectrophotometry give U concentration 4,445 ppm by RSD 6,74 % and voltammetry give U concentration 7,693 by RSD 19,53%. (author)

  2. Comparative study of analysis methods in biospeckle phenomenon

    da Silva, Emerson Rodrigo; Muramatsu, Mikiya

    2008-04-01

    In this work we present a review of main statistical properties of speckle patterns and accomplish a comparative study of the more used methods for analysis and extraction of information from optical grainy. The first and second order space-time statistics are dicussed in an overview perspective. The biospeckle phenomenon has detailed attention, specially in its application on monitoring of activity in tissues. The main techniques used to obtain information from speckle patterns are presented, with special prominence to autocorrelation function, co-occurrence matrices, Fujii's method, Briers' contrast and spatial and temporal contrast analisys (LASCA and LASTCA). An incipient method for analysis, based on the study of sucessive correlations contrast, is introduced. Numerical simulations, using diferent probability density functions for velocities of scatterers, were made with two objectives: to test the analysis methods and to give subsidies for interpretation of in vivo results. Vegetable and animal tissues are investigated, achieving the monitoring of senescence process and vascularization maps on leaves, the accompaniment of fungi contamined fruits, the mapping of activity in flowers and the analisys of healing in rats subjected to abdominal surgery. Experiments using the biospeckle phenomenon in microscopy are carried out. At last, it is evaluated the potentiality of biospeckle as diagnosis tool in chronic vein ulcer cared with low intensity laser therapy and the better analysis methods for each kind of tissue are pointed.

  3. The medicalisation of revolt: a sociological analysis of medical cannabis users.

    Pedersen, Willy; Sandberg, Sveinung

    2013-01-01

    In a qualitative study, we investigated the medical motives of 100 Norwegian cannabis users, none of whom had legal access to medical cannabis. Cannabis was used therapeutically for conditions such as multiple sclerosis, attention deficit hyperactivity disorder and rheumatism, as well as for quality of life conditions such as quality of sleep, relaxation and wellbeing. The borders between medical and recreational cannabis use were blurred. This article identifies strategies of medical cannabis users to gain social acceptance. Several respondents downplayed effects such as intoxication and euphoria. Others used the language of medicine and knowledge of current research in psychopharmacology. Cannabis was contrasted with the potential for abuse of prescription medicines. The medical cannabis movement has had little success in Norway. Medical professionals are unable to accept that users may be more knowledgeable than experts and medical users cannot discard the values of traditional cannabis culture. Calls for medical cannabis use are thus perceived as a gambit in attempts to have cannabis legalised. We argue that, despite having had little effect on health authorities, the medical cannabis movement may be having the unintended effect of medicalising cannabis use and using it as a cure for everyday problems. PMID:22827932

  4. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones.

    Shen, Chao; Yu, Tianwen; Yuan, Sheng; Li, Yunpeng; Guan, Xiaohong

    2016-01-01

    The growing trend of using smartphones as personal computing platforms to access and store private information has stressed the demand for secure and usable authentication mechanisms. This paper investigates the feasibility and applicability of using motion-sensor behavior data for user authentication on smartphones. For each sample of the passcode, sensory data from motion sensors are analyzed to extract descriptive and intensive features for accurate and fine-grained characterization of users' passcode-input actions. One-class learning methods are applied to the feature space for performing user authentication. Analyses are conducted using data from 48 participants with 129,621 passcode samples across various operational scenarios and different types of smartphones. Extensive experiments are included to examine the efficacy of the proposed approach, which achieves a false-rejection rate of 6.85% and a false-acceptance rate of 5.01%. Additional experiments on usability with respect to passcode length, sensitivity with respect to training sample size, scalability with respect to number of users, and flexibility with respect to screen size were provided to further explore the effectiveness and practicability. The results suggest that sensory data could provide useful authentication information, and this level of performance approaches sufficiency for two-factor authentication on smartphones. Our dataset is publicly available to facilitate future research. PMID:27005626

  5. Analysis of search and browsing behavior of young users on the web

    Duarte Torres, Sergio; Weber, Ingmar; Hiemstra, Djoerd; Najork, M.

    2014-01-01

    The Internet is increasingly used by young children for all kinds of purposes. Nonetheless, there are not many resources especially designed for children on the Internet and most of the content online is designed for grown up users. This situation is problematic if we consider the large differences

  6. Toward More Critical Reviewing and Analysis of CD-ROM User Software Interfaces.

    Zink, Steven D.

    1991-01-01

    Criticizes reviews of library CD-ROM products as being uncritical of the user interface and advocates a more rigorous evaluation, not only to aid potential buyers, but as a way to influence manufacturers. Congressional Information Services' Masterfile 2 is evaluated in the context of Heckel's "Principles of Friendly Software Design." (24…

  7. Can Money Buy Happiness? A Statistical Analysis of Predictors for User Satisfaction

    Hunter, Ben; Perret, Robert

    2011-01-01

    2007 data from LibQUAL+[TM] and the ACRL Library Trends and Statistics database were analyzed to determine if there is a statistically significant correlation between library expenditures and usage statistics and library patron satisfaction across 73 universities. The results show that users of larger, better funded libraries have higher…

  8. User-Centered Design Guidelines for Collaborative Software for Intelligence Analysis

    Scholtz, Jean; Endert, Alexander

    2014-07-01

    In this position paper we discuss the necessity of using User-Centered Design (UCD) methods in order to design collaborative software for the intelligence community. We discuss a number of studies of collaboration in the intelligence community and use this information to provide some guidelines for collaboration software.

  9. User-Centered Design Guidelines for Collaborative Software for Intelligence Analysis

    Scholtz, Jean; Endert, Alexander N.

    2014-08-01

    In this position paper we discuss the necessity of using User-Centered Design (UCD) methods in order to design collaborative software for the intelligence community. We present some standing issues in collaborative software based on existing work within the intelligence community. Based on this information we present opportunities to address some of these challenges.

  10. Comparative Pathway Analyzer--a web server for comparative analysis, clustering and visualization of metabolic networks in multiple organisms.

    Oehm, Sebastian; Gilbert, David; Tauch, Andreas; Stoye, Jens; Goesmann, Alexander

    2008-07-01

    In order to understand the phenotype of any living system, it is essential to not only investigate its genes, but also the specific metabolic pathway variant of the organism of interest, ideally in comparison with other organisms. The Comparative Pathway Analyzer, CPA, calculates and displays the differences in metabolic reaction content between two sets of organisms. Because results are highly dependent on the distribution of organisms into these two sets and the appropriate definition of these sets often is not easy, we provide hierarchical clustering methods for the identification of significant groupings. CPA also visualizes the reaction content of several organisms simultaneously allowing easy comparison. Reaction annotation data and maps for visualizing the results are taken from the KEGG database. Additionally, users can upload their own annotation data. This website is free and open to all users and there is no login requirement. It is available at https://www.cebitec.uni-bielefeld.de/groups/brf/software/cpa/index.html. PMID:18539612

  11. CRITICAL FACTORS AND COMPARATIVE ANALYSIS THAT INFLUENCING THE REGISTRATION OF DOMAIN NAME

    Norul Bahriyah Shaari

    2014-03-01

    Full Text Available Growth and increasing use worldwide domain is inconsistent with growth of world population. Although in terms of domain usage statistics across the world increased, but the distribution of the domain name registration unevenly between countries around the world. There are a number of users of the gap between the domain names countries around the world. The technologies domain name system (DNS, marketing strategic, domain names services and other factors such as economy in the country, culture, environment, educational, geographical location, political, internet activity trends and so on, are also influenced the use and registration of the domain name. Malaysia is also one of the countries categorized as a developing country that is still minimal use of domain names compared to the rate of population, consumer internet and social media. This paper also presents the comparative analysis is the item-by-item comparison critical factors that influence the registration of domain name. This paper shows how perspectives can be used for comparative analysis, summarizes a soundness proof for critical factors that influence the registration of domain name.

  12. COMPARATIVE ANALYSIS OF TOPSIS AND FUZZY TOPSIS FOR THE EVALUATION OF TRAVEL WEBSITE SERVICE QUALITY

    Golam Kabir

    2012-09-01

    Full Text Available The Internet revolution has led to significant changes in the way travel agencies interact with customers. Travel websites provide customers diverse services including travel information and products through the Internet. In practical envir onments, Internet users face a variety of travel website service quality (TWSQ that is vague from human beings' subjective judgments, and most criteria have some degree of interdependent or interactive characteristics. In the face of the strong competitio n environment, in order to profit by making customers proceed with transactions on the websites, travel websites should pay more attention to improve their service quality. This study discusses the major factors for travel agency websites quality from the viewpoint of users' perception and explores the use of multiple - attribute decision making (MADM approaches for the evaluation of TWSQ. A comparative analysis of Technique for Order Preference by Similarity to Ideal Solution (TOPSIS and Fuzzy TOPSIS metho ds are illustrated through a practical application from the websites of five travel agencies. Empirical results showed that the proposed methods are viable approaches in solving the evaluation problem of TWSQ.

  13. CIVIL LIABILITY FOR NUCLEAR DAMAGE: COMPARATIVE ANALYSIS OF INTERNATIONAL TREATIES

    Laura Rimšaitė

    2013-06-01

    Full Text Available It was widely accepted that nuclear damage might be extensive and spread to other countries. International civil liability for nuclear damage is embodied by two major instruments: International Atomic Energy Agency (IAEA 1963 Vienna Convention on Civil liability for Nuclear Damage and Paris Convention of 1960 on third party liability (OECD with its amending protocols. Major problem arises because of lack of coherence and for this reason supplementary conventions and protocols has been adopted but sufficient results has not been achieved. International treaties on civil liability for nuclear damage are mostly based upon principles of operator’s exclusive, channeling, strict liability for nuclear damage, mandatory financial coverage, compensation without discrimination. These principles set ground for the appropriate compensation standard thus minimizing the difficulty level of complicated legal cross-actions and identifies certain subjects in individual cases who are liable also allows a concentration of the insurance capacity. Although Conventions sets similar principles, Europe remains in two different liability regimes which cover differences of liability amounts, scope of application, rules of jurisdiction conflicts. Problem of legal coherence at European Union level also arises because Member States are either parties to the Paris Convention or Vienna Convention at different speeds. This research paper provides an in-depth analysis of international legal framework development and impetus to create trans-boundary compensation mechanisms thus to foster development of European Union nuclear energy market and to provide higher protection for victims inside and outside the country where the incident has occurred. Purpose – provide comparative analysis of international treaties which regulate civil liability for nuclear damage in the context of European Union nuclear energy market development. Design/methodology - paper is based on document

  14. Thermal buckling comparative analysis using Different FE (Finite Element) tools

    Banasiak, Waldemar; Labouriau, Pedro [INTECSEA do Brasil, Rio de Janeiro, RJ (Brazil); Burnett, Christopher [INTECSEA UK, Surrey (United Kingdom); Falepin, Hendrik [Fugro Engineers SA/NV, Brussels (Belgium)

    2009-12-19

    High operational temperature and pressure in offshore pipelines may lead to unexpected lateral movements, sometimes call lateral buckling, which can have serious consequences for the integrity of the pipeline. The phenomenon of lateral buckling in offshore pipelines needs to be analysed in the design phase using FEM. The analysis should take into account many parameters, including operational temperature and pressure, fluid characteristic, seabed profile, soil parameters, coatings of the pipe, free spans etc. The buckling initiation force is sensitive to small changes of any initial geometric out-of-straightness, thus the modeling of the as-laid state of the pipeline is an important part of the design process. Recently some dedicated finite elements programs have been created making modeling of the offshore environment more convenient that has been the case with the use of general purpose finite element software. The present paper aims to compare thermal buckling analysis of sub sea pipeline performed using different finite elements tools, i.e. general purpose programs (ANSYS, ABAQUS) and dedicated software (SAGE Profile 3D) for a single pipeline resting on an the seabed. The analyses considered the pipeline resting on a flat seabed with a small levels of out-of straightness initiating the lateral buckling. The results show the quite good agreement of results of buckling in elastic range and in the conclusions next comparative analyses with sensitivity cases are recommended. (author)

  15. 2004/2008 labour market information comparative analysis report

    The electricity sector has entered into a phase of both challenges and opportunities. Challenges include workforce retirement, labour shortages, and increased competition from other employers to attract and retain the skilled people required to deliver on the increasing demand for electricity in Canada. The electricity sector in Canada is also moving into a new phase, whereby much of the existing infrastructure is either due for significant upgrades, or complete replacement. The increasing demand for electricity means that increased investment and capital expenditure will need to be put toward building new infrastructure altogether. The opportunities for the electricity industry will lie in its ability to effectively and efficiently react to these challenges. The purpose of this report was to provide employers and stakeholders in the sector with relevant and current trend data to help them make appropriate policy and human resource decisions. The report presented a comparative analysis of a 2004 Canadian Electricity Association employer survey with a 2008 Electricity Sector Council employer survey. The comparative analysis highlighted trends and changes that emerged between the 2004 and 2008 studies. Specific topics that were addressed included overall employment trends; employment diversity in the sector; age of non-support staff; recruitment; and retirements and pension eligibility. Recommendations were also offered. It was concluded that the electricity sector could benefit greatly from implementing on-going recruitment campaigns. refs., tabs., figs

  16. Comparative analysis among sampling methods of underground water

    Fábio Augusto Gomes Vieira Reis

    2005-06-01

    Full Text Available The monitoring of the underground water quality assumes importance because of the increasing use of it for the different purposes of the contemporaneous society. Different methods for sampling and monitoring of underground water can take to very distinct results. In this way, the present work has as objective to carry out comparative studies among three methods of sampling of underground waters. Bailer, Electric pump of high flowing and pump of low flowing. Quantitative and qualitative sampling techniques of water quality were opted through monitoring wells. The research involved the identification and analysis of the differences in the results obtained by the methods of sampling of underground waters; the geologic and hydrologic description of the monitoring well, on which the sampling was taken from; and the comparative analysis among the three methods of sampling, determining which ones present the best efficiency. There were made mensurations at the site, collection of samples and interpretation of the chemical analyses. At the end of the works, with the integration of the geologic and hydrologic data and analytic results was possible to indicate that the most precise method of sampling of underground water is the low flowing one.

  17. Comparative Numerical Analysis Of Advertising Board Tower Using Adina And Autodesk Robot Structural Analysis

    Major Maciej

    2015-12-01

    Full Text Available In this paper the subject of comparative stress and displacement analysis for different computer aided design program environments is discussed. For the purposes of analysis ADINA and Autodesk ROBOT program were used. In both programs an advertising board tower was modeled. Static analysis was adopted for the computations. Obtained results allowed showing small differences and limitations between those two environments.

  18. Microarray Я US: a user-friendly graphical interface to Bioconductor tools that enables accurate microarray data analysis and expedites comprehensive functional analysis of microarray results

    Dai Yilin

    2012-06-01

    Full Text Available Abstract Background Microarray data analysis presents a significant challenge to researchers who are unable to use the powerful Bioconductor and its numerous tools due to their lack of knowledge of R language. Among the few existing software programs that offer a graphic user interface to Bioconductor packages, none have implemented a comprehensive strategy to address the accuracy and reliability issue of microarray data analysis due to the well known probe design problems associated with many widely used microarray chips. There is also a lack of tools that would expedite the functional analysis of microarray results. Findings We present Microarray Я US, an R-based graphical user interface that implements over a dozen popular Bioconductor packages to offer researchers a streamlined workflow for routine differential microarray expression data analysis without the need to learn R language. In order to enable a more accurate analysis and interpretation of microarray data, we incorporated the latest custom probe re-definition and re-annotation for Affymetrix and Illumina chips. A versatile microarray results output utility tool was also implemented for easy and fast generation of input files for over 20 of the most widely used functional analysis software programs. Conclusion Coupled with a well-designed user interface, Microarray Я US leverages cutting edge Bioconductor packages for researchers with no knowledge in R language. It also enables a more reliable and accurate microarray data analysis and expedites downstream functional analysis of microarray results.

  19. Comparative analysis of clicks and judgments for IR evaluation

    J. Kamps; M. Koolen; A. Trotman

    2009-01-01

    Queries and click-through data taken from search engine transaction logs is an attractive alternative to traditional test collections, due to its volume and the direct relation to end-user querying. The overall aim of this paper is to answer the question: How does click-through data differ from expl

  20. Analysis of RNAseq datasets from a comparative infectious disease zebrafish model using GeneTiles bioinformatics.

    Veneman, Wouter J; de Sonneville, Jan; van der Kolk, Kees-Jan; Ordas, Anita; Al-Ars, Zaid; Meijer, Annemarie H; Spaink, Herman P

    2015-03-01

    We present a RNA deep sequencing (RNAseq) analysis of a comparison of the transcriptome responses to infection of zebrafish larvae with Staphylococcus epidermidis and Mycobacterium marinum bacteria. We show how our developed GeneTiles software can improve RNAseq analysis approaches by more confidently identifying a large set of markers upon infection with these bacteria. For analysis of RNAseq data currently, software programs such as Bowtie2 and Samtools are indispensable. However, these programs that are designed for a LINUX environment require some dedicated programming skills and have no options for visualisation of the resulting mapped sequence reads. Especially with large data sets, this makes the analysis time consuming and difficult for non-expert users. We have applied the GeneTiles software to the analysis of previously published and newly obtained RNAseq datasets of our zebrafish infection model, and we have shown the applicability of this approach also to published RNAseq datasets of other organisms by comparing our data with a published mammalian infection study. In addition, we have implemented the DEXSeq module in the GeneTiles software to identify genes, such as glucagon A, that are differentially spliced under infection conditions. In the analysis of our RNAseq data, this has led to the possibility to improve the size of data sets that could be efficiently compared without using problem-dedicated programs, leading to a quick identification of marker sets. Therefore, this approach will also be highly useful for transcriptome analyses of other organisms for which well-characterised genomes are available. PMID:25503064

  1. In silico comparative genomic analysis of GABAA receptor transcriptional regulation

    Joyce Christopher J

    2007-06-01

    Full Text Available Abstract Background Subtypes of the GABAA receptor subunit exhibit diverse temporal and spatial expression patterns. In silico comparative analysis was used to predict transcriptional regulatory features in individual mammalian GABAA receptor subunit genes, and to identify potential transcriptional regulatory components involved in the coordinate regulation of the GABAA receptor gene clusters. Results Previously unreported putative promoters were identified for the β2, γ1, γ3, ε, θ and π subunit genes. Putative core elements and proximal transcriptional factors were identified within these predicted promoters, and within the experimentally determined promoters of other subunit genes. Conserved intergenic regions of sequence in the mammalian GABAA receptor gene cluster comprising the α1, β2, γ2 and α6 subunits were identified as potential long range transcriptional regulatory components involved in the coordinate regulation of these genes. A region of predicted DNase I hypersensitive sites within the cluster may contain transcriptional regulatory features coordinating gene expression. A novel model is proposed for the coordinate control of the gene cluster and parallel expression of the α1 and β2 subunits, based upon the selective action of putative Scaffold/Matrix Attachment Regions (S/MARs. Conclusion The putative regulatory features identified by genomic analysis of GABAA receptor genes were substantiated by cross-species comparative analysis and now require experimental verification. The proposed model for the coordinate regulation of genes in the cluster accounts for the head-to-head orientation and parallel expression of the α1 and β2 subunit genes, and for the disruption of transcription caused by insertion of a neomycin gene in the close vicinity of the α6 gene, which is proximal to a putative critical S/MAR.

  2. Mycobacterial species as case-study of comparative genome analysis.

    Zakham, F; Belayachi, L; Ussery, D; Akrim, M; Benjouad, A; El Aouad, R; Ennaji, M M

    2011-01-01

    The genus Mycobacterium represents more than 120 species including important pathogens of human and cause major public health problems and illnesses. Further, with more than 100 genome sequences from this genus, comparative genome analysis can provide new insights for better understanding the evolutionary events of these species and improving drugs, vaccines, and diagnostics tools for controlling Mycobacterial diseases. In this present study we aim to outline a comparative genome analysis of fourteen Mycobacterial genomes: M. avium subsp. paratuberculosis K—10, M. bovis AF2122/97, M. bovis BCG str. Pasteur 1173P2, M. leprae Br4923, M. marinum M, M. sp. KMS, M. sp. MCS, M. tuberculosis CDC1551, M. tuberculosis F11, M. tuberculosis H37Ra, M. tuberculosis H37Rv, M. tuberculosis KZN 1435 , M. ulcerans Agy99,and M. vanbaalenii PYR—1, For this purpose a comparison has been done based on their length of genomes, GC content, number of genes in different data bases (Genbank, Refseq, and Prodigal). The BLAST matrix of these genomes has been figured to give a lot of information about the similarity between species in a simple scheme. As a result of multiple genome analysis, the pan and core genome have been defined for twelve Mycobacterial species. We have also introduced the genome atlas of the reference strain M. tuberculosis H37Rv which can give a good overview of this genome. And for examining the phylogenetic relationships among these bacteria, a phylogenic tree has been constructed from 16S rRNA gene for tuberculosis and non tuberculosis Mycobacteria to understand the evolutionary events of these species. PMID:21396338

  3. Comparative analysis of EPA cost-benefit methodologies

    Poch, L.; Gillette, J.; Veil, J.

    1998-05-01

    In recent years, reforming the regulatory process has received much attention from diverse groups such as environmentalists, the government, and industry. A cost-benefit analysis can be a useful way to organize and compare the favorable and unfavorable impacts a proposed action night have on society. Since 1981, two Executive Orders have required the U.S. Environmental Protection Agency (EPA) and other regulatory agencies to perform cost-benefit analyses in support of regulatory decision making. At the EPA, a cost-benefit analysis is published as a document called a regulatory impact analysis (RIA). This report reviews cost-benefit methodologies used by three EPA program offices: Office of Air and Radiation, Office of Solid Waste, and Office of Water. These offices were chosen because they promulgate regulations that affect the policies of this study`s sponsor (U.S. Department of Energy, Office of Fossil Energy) and the technologies it uses. The study was conducted by reviewing 11 RIAs recently published by the three offices and by interviewing staff members in the offices. To draw conclusions about the EPA cost-benefit methodologies, their components were compared with those of a standard methodology (i.e., those that should be included in a comprehensive cost-benefit methodology). This study focused on the consistency of the approaches as well as their strengths and weaknesses, since differences in the cost-benefit methodologies themselves or in their application can cause confusion and preclude consistent comparison of regulations both within and among program offices.

  4. Rice fortification: a comparative analysis in mandated settings.

    Forsman, Carmen; Milani, Peiman; Schondebare, Jill A; Matthias, Dipika; Guyondet, Christophe

    2014-09-01

    Legal mandates can play an important role in the success of rice fortification programs that involve the private sector. However, merely enacting mandatory legislation does not guarantee success; it requires a coordinated, multidimensional cross-sector effort that addresses stewardship, develops an appropriate rice fortification technology, enables sustainable production and distribution channels through a range of private-sector players, ensures quality, generates consumer demand, and monitors progress. Furthermore, economic sustainability must be built into the supply chain and distribution network to enable the program to outlast government administrations and/or time-limited funding. Hence, mandates can serve as valuable long-term enablers of cross-sector mobilization and collaboration and as catalysts of civil society engagement in and ownership of fortification programs. This paper compares the rice fortification experiences of Costa Rica and the Philippines--two countries with mandates, yet distinctly different industry landscapes. Costa Rica has achieved national success through strong government stewardship and active market development--key elements of success regardless of industry structure. With a comparatively more diffuse rice industry structure, the Philippines has also had success in limited geographies where key stakeholders have played an active role in market development. A comparative analysis provides lessons that may be relevant to other rice fortification programs. PMID:24913356

  5. Comparative Analysis for Robust Penalized Spline Smoothing Methods

    Bin Wang

    2014-01-01

    Full Text Available Smoothing noisy data is commonly encountered in engineering domain, and currently robust penalized regression spline models are perceived to be the most promising methods for coping with this issue, due to their flexibilities in capturing the nonlinear trends in the data and effectively alleviating the disturbance from the outliers. Against such a background, this paper conducts a thoroughly comparative analysis of two popular robust smoothing techniques, the M-type estimator and S-estimation for penalized regression splines, both of which are reelaborated starting from their origins, with their derivation process reformulated and the corresponding algorithms reorganized under a unified framework. Performances of these two estimators are thoroughly evaluated from the aspects of fitting accuracy, robustness, and execution time upon the MATLAB platform. Elaborately comparative experiments demonstrate that robust penalized spline smoothing methods possess the capability of resistance to the noise effect compared with the nonrobust penalized LS spline regression method. Furthermore, the M-estimator exerts stable performance only for the observations with moderate perturbation error, whereas the S-estimator behaves fairly well even for heavily contaminated observations, but consuming more execution time. These findings can be served as guidance to the selection of appropriate approach for smoothing the noisy data.

  6. Subchannel Notching and Channel Bonding: Comparative Analysis of Opportunistic Spectrum OFDMA Designs

    Park, Jihoon; Grønsund, Pål; Čabrić, Danijela

    2010-01-01

    We present an analytical model that enables a comparison of multiple design options of Opportunistic Spectrum Orthogonal Frequency Division Multiple Access (OS-OFDMA). The model considers continuous and non-continuous subchannel allocation algorithms, as well as different ways to bond separate non-continuous frequency bands. Different user priorities and channel dwell times, for the Secondary Users and the Primary Users of the radio spectrum, are studied. Further, the model allows the inclusion of different types of Secondary User traffic. Finally, the model enables the study of multiple two-stage spectrum sensing algorithms. Analysis is based on a discrete time Markov chain model which allows for the computation of network characteristics such as the average throughput. From the analysis we conclude that OS-OFDMA with subchannel notching and channel bonding could provide, under certain network configurations, almost seven times higher throughput than the design without those options enabled.

  7. White matter degeneration in schizophrenia: a comparative diffusion tensor analysis

    Ingalhalikar, Madhura A.; Andreasen, Nancy C.; Kim, Jinsuh; Alexander, Andrew L.; Magnotta, Vincent A.

    2010-03-01

    Schizophrenia is a serious and disabling mental disorder. Diffusion tensor imaging (DTI) studies performed on schizophrenia have demonstrated white matter degeneration either due to loss of myelination or deterioration of fiber tracts although the areas where the changes occur are variable across studies. Most of the population based studies analyze the changes in schizophrenia using scalar indices computed from the diffusion tensor such as fractional anisotropy (FA) and relative anisotropy (RA). The scalar measures may not capture the complete information from the diffusion tensor. In this paper we have applied the RADTI method on a group of 9 controls and 9 patients with schizophrenia. The RADTI method converts the tensors to log-Euclidean space where a linear regression model is applied and hypothesis testing is performed between the control and patient groups. Results show that there is a significant difference in the anisotropy between patients and controls especially in the parts of forceps minor, superior corona radiata, anterior limb of internal capsule and genu of corpus callosum. To check if the tensor analysis gives a better idea of the changes in anisotropy, we compared the results with voxelwise FA analysis as well as voxelwise geodesic anisotropy (GA) analysis.

  8. Comparative Proteomic Analysis of Arabidopsis Mature Pollen and Germinated Pollen

    Junjie Zou; Lianfen Song; Wenzheng Zhang; Yi Wang; Songlin Ruan; Wei-Hua Wu

    2009-01-01

    Proteomic analysis was applied to generating the map of Arabidopsis mature pollen proteins and analyzing the differentially expressed proteins that are potentially involved in the regulation of Arabidopsis pollen germination. By applying 2-D electrophoresis and silver staining, we resolved 499 and 494 protein spots from protein samples extracted from pollen grains and pollen tubes, respectively. Using the matrix-assisted laser desorption ionization time-of-flight mass spectrometry method, we identified 189 distinct proteins from 213 protein spots expressed in mature pollen or pollen tubes, and 75 new identified proteins that had not been reported before in research into the Arabidopsis pollen proteome. Comparative analysis revealed that 40 protein spots exhibit reproducible significant changes between mature pollen and pollen tubes. And 21 proteins from 17 downregulated and six upregulated protein spots were identified. Functional category analysis indicated that these differentially expressed proteins mainly involved in signaling, cellular structure, transport, defense/stress responses, transcription, metabolism, and energy production. The patterns of changes at protein level suggested the important roles for energy metabolism-related proteins in pollen tube growth, accompanied by the activation of the stress response pathway and modifications to the cell wall.

  9. Comparative Analysis of Probabilistic Models for Activity Recognition with an Instrumented Walker

    Omar, Farheen; Sinn, Mathieu; Truszkowski, Jakub; Poupart, Pascal; Tung, James; Caine, Allen

    2012-01-01

    Rollating walkers are popular mobility aids used by older adults to improve balance control. There is a need to automatically recognize the activities performed by walker users to better understand activity patterns, mobility issues and the context in which falls are more likely to happen. We design and compare several techniques to recognize walker related activities. A comprehensive evaluation with control subjects and walker users from a retirement community is presented.

  10. Evaluating the use of uncertainty visualization for exploratory analysis of land cover change: A qualitative expert user study

    Kinkeldey, Christoph; Schiewe, Jochen; Gerstmann, Henning; Götze, Christian; Kit, Oleksandr; Lüdeke, Matthias; Taubenböck, Hannes; Wurm, Michael

    2015-11-01

    Extensive research on geodata uncertainty has been conducted in the past decades, mostly related to modeling, quantifying, and communicating uncertainty. But findings on if and how users can incorporate this information into spatial analyses are still rare. In this paper we address these questions with a focus on land cover change analysis. We conducted semi-structured interviews with three expert groups dealing with change analysis in the fields of climate research, urban development, and vegetation monitoring. During the interviews we used a software prototype to show change scenarios that the experts had analyzed before, extended by visual depiction of uncertainty related to land cover change. This paper describes the study, summarizes results, and discusses findings as well as the study method. Participants came up with several ideas for applications that could be supported by uncertainty, for example, identification of erroneous change, description of change detection algorithm characteristics, or optimization of change detection parameters. Regarding the aspect of reasoning with uncertainty in land cover change data the interviewees saw potential in better-informed hypotheses and insights about change. Communication of uncertainty information to users was seen as critical, depending on the users' role and expertize. We judge semi-structured interviews to be suitable for the purpose of this study and emphasize the potential of qualitative methods (workshops, focus groups etc.) for future uncertainty visualization studies.

  11. In-vessel source term analysis code TRACER version 1.0 user's manual

    To evaluate the species and quantities of fission products (FPs) released into the cover gas in an LMFBR during fuel pin failure accidents (In-vessel Source Term), the computer code TRACER (Transport phenomena of Radionuclides for Accident Consequence Evaluation of Reactor) has been developed. This report presents a description of the computational models, input and output as the user's manual of TRACER version 1.0. TRACER has the models for FPs release behavior from fuel pins, FPs transport behavior in inert gas bubbles and in coolant in primary system. The users of TRACER need to specify the fuel temperature, FPs inventory in fuel pins, the geometry of primary system, coolant temperature and coolant flow rate. TRACER calculates the time histories of FPs concentration in cover gas, coolant and bubbles. (author)

  12. A Qualitative Analysis of User Experiences With a Self-Tracker for Activity, Sleep, and Diet

    Kim, Jeongeun

    2014-01-01

    Background The recent increase in chronic diseases and an aging population warrant the necessity of health self-management. As small electronic devices that track one’s activity, sleep, and diet, called self-trackers, are being widely distributed, it is prudent to investigate the user experience and the effectiveness of these devices, and use the information toward engineering better devices that would result in increased efficiency and usability. Objective The aim of this study was to abstra...

  13. Internet language in user-generated comments : Linguistic analysis of data from four commenting groups

    Dahlström, Jenny

    2013-01-01

    The present study examines typical features of internet language found in user-generated comments collected from commenting groups from four online magazines aimed at different readerships: (1) adult women (Working Mother and Mothering), (2) adult men (Esquire), (3) young women (Seventeen) and (4) young men (Gameinformer). Approximately 5,000 words from each commenting group were collected, creating a 21,087 word corpus which was analyzed with regard to typographic (emoticons, nonstandard typ...

  14. Multilevel analysis of HIV related risk behaviors among heroin users in a low prevalence community

    Lee Shui; Goggins William; Li Huizhen

    2009-01-01

    Abstract Background Injecting drug users (IDU) are at increased risk of human immunodeficiency virus (HIV) infection. Their HIV prevalence however varies from place to place and may not be directly linked with the level of individual risk. This study explores the relative importance of individual and community level characteristics in the practice of HIV-related risk behaviors in IDU in Hong Kong where the HIV prevalence has remained low at below 1%. Methods Methadone clinics were used as the...

  15. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones

    Chao Shen

    2016-03-01

    Full Text Available The growing trend of using smartphones as personal computing platforms to access and store private information has stressed the demand for secure and usable authentication mechanisms. This paper investigates the feasibility and applicability of using motion-sensor behavior data for user authentication on smartphones. For each sample of the passcode, sensory data from motion sensors are analyzed to extract descriptive and intensive features for accurate and fine-grained characterization of users’ passcode-input actions. One-class learning methods are applied to the feature space for performing user authentication. Analyses are conducted using data from 48 participants with 129,621 passcode samples across various operational scenarios and different types of smartphones. Extensive experiments are included to examine the efficacy of the proposed approach, which achieves a false-rejection rate of 6.85% and a false-acceptance rate of 5.01%. Additional experiments on usability with respect to passcode length, sensitivity with respect to training sample size, scalability with respect to number of users, and flexibility with respect to screen size were provided to further explore the effectiveness and practicability. The results suggest that sensory data could provide useful authentication information, and this level of performance approaches sufficiency for two-factor authentication on smartphones. Our dataset is publicly available to facilitate future research.

  16. Comparative Genomics and Transcriptomic Analysis of Mycobacterium Kansasii

    Alzahid, Yara

    2014-04-01

    The group of Mycobacteria is one of the most intensively studied bacterial taxa, as they cause the two historical and worldwide known diseases: leprosy and tuberculosis. Mycobacteria not identified as tuberculosis or leprosy complex, have been referred to by ‘environmental mycobacteria’ or ‘Nontuberculous mycobacteria (NTM). Mycobacterium kansasii (M. kansasii) is one of the most frequent NTM pathogens, as it causes pulmonary disease in immuno-competent patients and pulmonary, and disseminated disease in patients with various immuno-deficiencies. There have been five documented subtypes of this bacterium, by different molecular typing methods, showing that type I causes tuberculosis-like disease in healthy individuals, and type II in immune-compromised individuals. The remaining types are said to be environmental, thereby, not causing any diseases. The aim of this project was to conduct a comparative genomic study of M. kansasii types I-V and investigating the gene expression level of those types. From various comparative genomics analysis, provided genomics evidence on why M. kansasii type I is considered pathogenic, by focusing on three key elements that are involved in virulence of Mycobacteria: ESX secretion system, Phospholipase c (plcb) and Mammalian cell entry (Mce) operons. The results showed the lack of the espA operon in types II-V, which renders the ESX- 1 operon dysfunctional, as espA is one of the key factors that control this secretion system. However, gene expression analysis showed this operon to be deleted in types II, III and IV. Furthermore, plcB was found to be truncated in types III and IV. Analysis of Mce operons (1-4) show that mce-1 operon is duplicated, mce-2 is absent and mce-3 and mce-4 is present in one copy in M. kansasii types I-V. Gene expression profiles of type I-IV, showed that the secreted proteins of ESX-1 were slightly upregulated in types II-IV when compared to type I and the secreted forms of ESX-5 were highly down

  17. EDGAR: A software framework for the comparative analysis of prokaryotic genomes

    Vorhölter Frank-Jörg

    2009-05-01

    Full Text Available Abstract Background The introduction of next generation sequencing approaches has caused a rapid increase in the number of completely sequenced genomes. As one result of this development, it is now feasible to analyze large groups of related genomes in a comparative approach. A main task in comparative genomics is the identification of orthologous genes in different genomes and the classification of genes as core genes or singletons. Results To support these studies EDGAR – "Efficient Database framework for comparative Genome Analyses using BLAST score Ratios" – was developed. EDGAR is designed to automatically perform genome comparisons in a high throughput approach. Comparative analyses for 582 genomes across 75 genus groups taken from the NCBI genomes database were conducted with the software and the results were integrated into an underlying database. To demonstrate a specific application case, we analyzed ten genomes of the bacterial genus Xanthomonas, for which phylogenetic studies were awkward due to divergent taxonomic systems. The resultant phylogeny EDGAR provided was consistent with outcomes from traditional approaches performed recently and moreover, it was possible to root each strain with unprecedented accuracy. Conclusion EDGAR provides novel analysis features and significantly simplifies the comparative analysis of related genomes. The software supports a quick survey of evolutionary relationships and simplifies the process of obtaining new biological insights into the differential gene content of kindred genomes. Visualization features, like synteny plots or Venn diagrams, are offered to the scientific community through a web-based and therefore platform independent user interface http://edgar.cebitec.uni-bielefeld.de, where the precomputed data sets can be browsed.

  18. Imaging hydrated microbial extracellular polymers: Comparative analysis by electron microscopy

    Dohnalkova, A.C.; Marshall, M. J.; Arey, B. W.; Williams, K. H.; Buck, E. C.; Fredrickson, J. K.

    2011-01-01

    Microbe-mineral and -metal interactions represent a major intersection between the biosphere and geosphere but require high-resolution imaging and analytical tools for investigating microscale associations. Electron microscopy has been used extensively for geomicrobial investigations and although used bona fide, the traditional methods of sample preparation do not preserve the native morphology of microbiological components, especially extracellular polymers. Herein, we present a direct comparative analysis of microbial interactions using conventional electron microscopy approaches of imaging at room temperature and a suite of cryogenic electron microscopy methods providing imaging in the close-to-natural hydrated state. In situ, we observed an irreversible transformation of the hydrated bacterial extracellular polymers during the traditional dehydration-based sample preparation that resulted in their collapse into filamentous structures. Dehydration-induced polymer collapse can lead to inaccurate spatial relationships and hence could subsequently affect conclusions regarding nature of interactions between microbial extracellular polymers and their environment.

  19. COMPUTER SIMULATION: COMPARATIVE ANALYSIS OF SOFTWARES ARENA® AND PROMODEL®

    Luiz Enéias Zanetti Cardoso

    2016-04-01

    Full Text Available The computer simulation is not exclusive areas of Logistics and Production, implementation takes place within the limits of technical expertise of professionals. Although not widespread at present, there is a rise of projection in use, as the numerous application possibilities, if properly modeled in reality presented face. This article proposes to present comparative and qualitative analysis of two computer simulation software, version Arena® 14,000 Student and ProModel® RunTimeSilve version - Demo, according to the following criteria: desktop, access to commands, ease in developing the software model and accessories, and can be seen the main features of each simulation software, as well as the differences between their interfaces, however, both were confirmed as great tools to support management processes.

  20. Comparative analysis of discrete exosome fractions obtained by differential centrifugation

    Jeppesen, Dennis Kjølhede; Hvam, Michael L; Primdahl-Bengtson, Bjarke;

    2014-01-01

    BACKGROUND: Cells release a mixture of extracellular vesicles, amongst these exosomes, that differ in size, density and composition. The standard isolation method for exosomes is centrifugation of fluid samples, typically at 100,000×g or above. Knowledge of the effect of discrete...... ultracentrifugation speeds on the purification from different cell types, however, is limited. METHODS: We examined the effect of applying differential centrifugation g-forces ranging from 33,000×g to 200,000×g on exosome yield and purity, using 2 unrelated human cell lines, embryonic kidney HEK293 cells and bladder...... of phenol red and cleared by 200,000×g overnight centrifugation. The centrifugation tube fill level impacted the sedimentation efficacy. Comparative analysis by NTA, protein quantification, and detection of exosomal and contamination markers identified differences in vesicle size, concentration...

  1. Phylogeny and comparative genome analysis of a Basidiomycete fungi

    Riley, Robert W.; Salamov, Asaf; Grigoriev, Igor; Hibbett, David

    2011-03-14

    Fungi of the phylum Basidiomycota, make up some 37percent of the described fungi, and are important from the perspectives of forestry, agriculture, medicine, and bioenergy. This diverse phylum includes the mushrooms, wood rots, plant pathogenic rusts and smuts, and some human pathogens. To better understand these important fungi, we have undertaken a comparative genomic analysis of the Basidiomycetes with available sequenced genomes. We report a phylogeny that sheds light on previously unclear evolutionary relationships among the Basidiomycetes. We also define a `core proteome? based on protein families conserved in all Basidiomycetes. We identify key expansions and contractions in protein families that may be responsible for the degradation of plant biomass such as cellulose, hemicellulose, and lignin. Finally, we speculate as to the genomic changes that drove such expansions and contractions.

  2. Urban street networks: a comparative analysis of ten European cities

    Strano, Emanuele; Cardillo, Alessio; Costa, Luciano Da Fontoura; Porta, Sergio; Latora, Vito

    2012-01-01

    We compare the structural properties of the street networks of ten different European cities using their primal representation. We investigate the properties of the geometry of the networks and a set of centrality measures highlighting differences and similarities among cases. In particular, we found that cities share structural similarities due to their quasi planarity but that there are also several distinctive geometrical proprieties. A Principal Component Analysis is also performed on the distributions of centralities and their respective moments, which is used to find distinctive characteristics by which we can classify cities into families. We believe that, beyond the improvement of the empirical knowledge on streets network proprieties, our findings can open new perspectives in the scientific relation between city planning and complex networks, stimulating the debate on the effectiveness of the set of knowledge that statistical physics can contribute for city planning and urban morphology studies.

  3. Comparative Analysis of Hydrogen Production Methods with Nuclear Reactors

    Hydrogen is highly effective and ecologically clean fuel. It can be produced by a variety of methods. Presently the most common are through electrolysis of water and through the steam reforming of natural gas. It is evident that the leading method for the future production of hydrogen is nuclear energy. Several types of reactors are being considered for hydrogen production, and several methods exist to produce hydrogen, including thermochemical cycles and high-temperature electrolysis. In the article the comparative analysis of various hydrogen production methods is submitted. It is considered the possibility of hydrogen production with the nuclear reactors and is proposed implementation of research program in this field at the IPPE sodium-potassium eutectic cooling high temperature experimental facility (VTS rig). (authors)

  4. Comparative Evaluation and Analysis of IAX and RSW

    Kolhar, Manjur S; Abouabdalla, Omar; Wan, Tat Chee; Manasrah, Ahmad M

    2010-01-01

    Voice over IP (VoIP) is a technology to transport media over IP networks such as the Internet. VoIP has the capability of connecting people over packet switched networks instead of traditional circuit switched networks. Recently, the InterAsterisk Exchange Protocol (IAX) has emerged as a new VoIP which is gaining popularity among VoIP products. IAX is known for its simplicity, NAT friendliness, efficiency, and robustness. More recently, the Real time Switching (RSW) control criterion has emerged as a multimedia conferencing protocol. In this paper, we made a comparative evaluation and analysis of IAX and RSW using Mean Opinion Score rating (MOS) and found that they both perform well under different network packet delays in ms.

  5. A Comparative Analysis of Privacy Impact Assessment in Six Countries

    David Wright

    2013-02-01

    Full Text Available he European Commission is revising the EU’s data protection framework. One of the changes concerns privacy impact assessment (PIA. This paper argues that the European Commission and the EU Member States should draw on the experience of other countries that have adopted PIA policies and methodologies to construct its own framework. There are similarities and differences in the approaches of Australia, Canada, Ireland, New Zealand, the UK and US, the countries with the most experience in PIA. Each has its strong points, but also shortcomings. Audits have identified some of the latter in the instance of Canada. This paper provides a comparative analysis of the six countries to identify some of the best elements that could be used to improve Article 33 in European Commission’s proposed Data Protection Regulation.

  6. Energy sources and nuclear energy. Comparative analysis and ethical reflections

    Under the authority of the episcopacy of Brugge in Belgium an independent working group Ethics and Nuclear Energy was set up. The purpose of the working group was to collect all the necessary information on existing energy sources and to carry out a comparative analysis of their impact on mankind and the environment. Also attention was paid to economical and social aspects. The results of the study are subjected to an ethical reflection. The book is aimed at politicians, teachers, journalists and every interested layman who wants to gain insight into the consequences of the use of nuclear energy and other energy sources. Based on the information in this book one should be able to objectively define one's position in future debates on this subject

  7. A COMPARATIVE ANALYSIS OF DISPUTE RESOLUTION DYNAMICS IN ASIA

    Pawel Voronin

    2014-01-01

    Full Text Available China’s rise to prominence in the international community following the end of the Cold War, the growth in economic power and population numbers project that China will become the leading world power within several decades, regardless of the course its government takes. The article aimes to contribute to answering the question whether this rise will be peaceful through a comparative analysis of resolved and unresolved territorial disputes between China and groups of neighbouring states between 1986 and 2013. While previous studies have focused rather exclusively on Chinese behaviour, this text will examine both sides of the dispute and the behavior of the parties in light of regional dynamics. 

  8. COMPARATIVE ANALYSIS OF VAT EVOLUTION IN THE EUROPEAN ECONOMIC SYSTEM

    Mihaela Andreea STROE

    2011-08-01

    Full Text Available In this paper we study a comparative analysis of VAT in different states of the world. I made some observation on this theme because I believe that VAT is very important in carrying out transactions and the increase or decrease of this tax has a major impact upon national economies and also on the quality of life in developing countries. The papers has to pourpose to make a comparison between the American and European system of taxation with its advantages and disadvantages and, in the end to render an economic model and its statistics components. VAT is a value added tax which appeared about 50 years, initially with two purposes: one to replace certain indirect taxes, and another to reduce the budget deficit according to the faith of that time. The first country that has adopted this model was France, calling it today as value-added tax.

  9. COMPARATIVE ANALYSIS OF VAT EVOLUTION IN THE EUROPEAN ECONOMIC SYSTEM

    MIHAELA ANDREEA STROE

    2011-04-01

    Full Text Available In this paper we study a comparative analysis of VAT in different states of the world. I made some observation on this theme because I believe that VAT is very important in carrying out transactions and the increase or decrease of this tax has a major impact upon national economies and also on the quality of life in developing countries. The papers has to pourpose to make a comparison between the American and European system of taxation with its advantages and disadvantages and, in the end to render an economic model and its statistics components. VAT is a value added tax which appeared about 50 years, initially with two purposes: one to replace certain indirect taxes, and another to reduce the budget deficit according to the faith of that time. The first country that has adopted this model was France, calling it today as value-added tax.

  10. Comparative analysis of cytogenetic manifestations of human genome instability

    The comparative analysis of cytogenetic manifestations of human genome instability was carried out. The studied parameters are the micronuclei rate (MNR), the level of single and double chromosome fragment and the level of premature chromatid division (PCD). PCD and chromosome fragments were chosen as anomalies that possibly result in MN formation. We analysed the MNR in buccal epithelium (BE) and peripheral blood lymphocytes (PBL), the level of single and double chromosome fragment as well as level PCD - in PBL only. Average MNR in BE was higher than in PBL. The studied parameters are independent ones and have to be considered altogether for more comprehensive evaluation of the level and peculiarities of manifestation of human genome instability

  11. Comparative Analysis of Partial Occlusion Using Face Recognition Techniques

    N.Nallammal

    2013-04-01

    Full Text Available This paper presents a comparison of partial occlusion using face recognition techniques that gives in which technique produce better result for total success rate. The partial occlusion of face recognition is especially useful for people where part of their face is scarred and defect thus need to be covered. Hence, either top part/eye region or bottom part of face will be recognized respectively. The partial face information are tested with Principle Component Analysis (PCA, Non-negative matrix factorization (NMF, Local NMF (LNMF and Spatially Confined NMF (SFNMF. The comparative results show that the recognition rate of 95.17% with r = 80 by using SFNMF for bottom face region. On the other hand, eye region achieves 95.12% with r = 10 by using LNMF.

  12. Comparative analysis of existing models for power-grid synchronization

    Nishikawa, Takashi

    2015-01-01

    The dynamics of power-grid networks is becoming an increasingly active area of research within the physics and network science communities. The results from such studies are typically insightful and illustrative, but are often based on simplifying assumptions that can be either difficult to assess or not fully justified for realistic applications. Here we perform a comprehensive comparative analysis of three leading models recently used to study synchronization dynamics in power-grid networks -- a fundamental problem of practical significance given that frequency synchronization of all power generators in the same interconnection is a necessary condition for a power grid to operate. We show that each of these models can be derived from first principles within a common framework based on the classical model of a generator, thereby clarifying all assumptions involved. This framework allows us to view power grids as complex networks of coupled second-order phase oscillators with both forcing and damping terms. U...

  13. Comparative Analysis of Visco-elastic Models with Variable Parameters

    Silviu Nastac

    2010-01-01

    Full Text Available The paper presents a theoretical comparative study for computational behaviour analysis of vibration isolation elements based on viscous and elastic models with variable parameters. The changing of elastic and viscous parameters can be produced by natural timed evolution demo-tion or by heating developed into the elements during their working cycle. It was supposed both linear and non-linear numerical viscous and elastic models, and their combinations. The results show the impor-tance of numerical model tuning with the real behaviour, as such the characteristics linearity, and the essential parameters for damping and rigidity. Multiple comparisons between linear and non-linear simulation cases dignify the basis of numerical model optimization regarding mathematical complexity vs. results reliability.

  14. Comparative Analysis of Congestion Control Algorithms Using ns-2

    Patel, Sanjeev; Garg, Arjun; Mehrotra, Prateek; Chhabra, Manish

    2012-01-01

    In order to curtail the escalating packet loss rates caused by an exponential increase in network traffic, active queue management techniques such as Random Early Detection (RED) have come into picture. Flow Random Early Drop (FRED) keeps state based on instantaneous queue occupancy of a given flow. FRED protects fragile flows by deterministically accepting flows from low bandwidth connections and fixes several shortcomings of RED by computing queue length during both arrival and departure of the packet. Stochastic Fair Queuing (SFQ) ensures fair access to network resources and prevents a busty flow from consuming more than its fair share. In case of (Random Exponential Marking) REM, the key idea is to decouple congestion measure from performance measure (loss, queue length or delay). Stabilized RED (SRED) is another approach of detecting nonresponsive flows. In this paper, we have shown a comparative analysis of throughput, delay and queue length for the various congestion control algorithms RED, SFQ and REM...

  15. Comparative analysis of DG and solar PV water pumping system

    Tharani, Kusum; Dahiya, Ratna

    2016-03-01

    Looking at present day electricity scenario, there is a major electricity crisis in rural areas. The farmers are still dependant on the monsoon rains for their irrigation needs and livestock maintenance. Some of the agrarian population has opted to use Diesel Generators for pumping water in their fields. But taking into consideration the economics and environmental conditions, the above choice is not suitable for longer run. An effort to shift from non-renewable sources such as diesel to renewable energy source such as solar has been highlighted. An approximate comparative analysis showing the life cycle costs of a PV pumping system with Diesel Generator powered water pumping is done using MATLAB/STMULTNK.

  16. Comparative Analysis of Algorithms for Single Source Shortest Path Problem

    Mrs. Shweta Srivastava

    2012-08-01

    Full Text Available The single source shortest path problem is one of the most studied problem in algorithmic graph theory. Single Source Shortest Path is the problem in which we have to find shortest paths from a source vertex v to all other vertices in the graph. A number of algorithms have been proposed for this problem. Most of the algorithms for this problem have evolved around the Dijkstra’s algorithm. In this paper, we are going to do comparative analysis of some of the algorithms to solve this problem. The algorithms discussed in this paper are- Thorup’s algorithm, augmented shortest path, adjacent node algorithm, a heuristic genetic algorithm, an improved faster version of the Dijkstra’s algorithm and a graph partitioning based algorithm.

  17. Comparative Analysis of Splice Site Regions by Information Content

    T. Shashi Rekha; Chanchal K. Mitra

    2006-01-01

    We have applied concepts from information theory for a comparative analysis of donor (gt) and acceptor (ag) splice site regions in the genes of five different organisms by calculating their mutual information content (relative entropy) over a selected block of nucleotides. A similar pattern that the information content decreases as the block size increases was observed for both regions in all the organisms studied. This result suggests that the information required for splicing might be contained in the consensus of ~6-8 nt at both regions. We assume from our study that even though the nucleotides are showing some degrees of conservation in the flanking regions of the splice sites, certain level of variability is still tolerated,which leads the splicing process to occur normally even if the extent of base pairing is not fully satisfied. We also suggest that this variability can be compensated by recognizing different splice sites with different spliceosomal factors.

  18. Comparative analysis of heat transfer correlations for forced convection boiling

    A critical survey was conducted of the most relevant correlations of boiling heat transfer in forced convection flow. Most of the investigations carried out on partial nucleate boiling and fully developed nucleate boiling have led to the formulation of correlations that are not able to cover a wide range of operating conditions, due to the empirical approach of the problem. A comparative analysis is therefore required in order to delineate the relative accuracy of the proposed correlations, on the basis of the experimental data presently available. The survey performed allows the evaluation of the accuracy of the different calculating procedure; the results obtained, moreover, indicate the most reliable heat transfer correlations for the different operating conditions investigated. This survey was developed for five pressure range (up to 180bar) and for both saturation and subcooled boiling condition

  19. Comparative expression pathway analysis of human and canine mammary tumors

    Marconato Laura

    2009-03-01

    Full Text Available Abstract Background Spontaneous tumors in dog have been demonstrated to share many features with their human counterparts, including relevant molecular targets, histological appearance, genetics, biological behavior and response to conventional treatments. Mammary tumors in dog therefore provide an attractive alternative to more classical mouse models, such as transgenics or xenografts, where the tumour is artificially induced. To assess the extent to which dog tumors represent clinically significant human phenotypes, we performed the first genome-wide comparative analysis of transcriptional changes occurring in mammary tumors of the two species, with particular focus on the molecular pathways involved. Results We analyzed human and dog gene expression data derived from both tumor and normal mammary samples. By analyzing the expression levels of about ten thousand dog/human orthologous genes we observed a significant overlap of genes deregulated in the mammary tumor samples, as compared to their normal counterparts. Pathway analysis of gene expression data revealed a great degree of similarity in the perturbation of many cancer-related pathways, including the 'PI3K/AKT', 'KRAS', 'PTEN', 'WNT-beta catenin' and 'MAPK cascade'. Moreover, we show that the transcriptional relationships between different gene signatures observed in human breast cancer are largely maintained in the canine model, suggesting a close interspecies similarity in the network of cancer signalling circuitries. Conclusion Our data confirm and further strengthen the value of the canine mammary cancer model and open up new perspectives for the evaluation of novel cancer therapeutics and the development of prognostic and diagnostic biomarkers to be used in clinical studies.

  20. Extreme storm surges: a comparative study of frequency analysis approaches

    Y. Hamdi

    2013-11-01

    Full Text Available In France, nuclear facilities were designed to very low probabilities of failure. Nevertheless, exceptional climatic events have given rise to surges much larger than observations (outliers and had clearly illustrated the potential to underestimate the extreme water levels calculated with the current statistical methods. The objective of the present work is to conduct a comparative study of three approaches including the Annual Maxima (AM, the Peaks-Over Threshold (POT and the r-Largest Order Statistics (r-LOS. These methods are illustrated in a real analysis case study. All the data sets were screened for outliers. Non-parametric tests for randomness, homogeneity and stationarity of time series were used. The shape and scale parameters stability plots, the mean excess residual life plot and the stability of the standard errors of return levels were used to select optimal thresholds and r values for the POT and r-LOS method, respectively. The comparison of methods was based on: (i the uncertainty degrees, (ii the adequacy criteria and tests and (iii the visual inspection. It was found that the r-LOS and POT methods have reduced the uncertainty on the distributions parameters and return level estimates and have systematically shown values of the 100 and 500 yr return levels smaller than those estimated with the AM method. Results have also shown that none of the compared methods has allowed a good fitting at the right tail of the distribution in the presence of outliers. As a perspective, the use of historical information was proposed in order to increase the representativity of outliers in data sets. Findings are of practical relevance not only to nuclear energy operators in France, for applications in storm surge hazard analysis and flood management, but also for the optimal planning and design of facilities to withstand extreme environmental conditions, with an appropriate level of risk.