WorldWideScience

Sample records for cyberspace chat rooms

  1. CONVERSATIONS -- AND NEGOTIATED INTERACTION -- IN TEXT AND VOICE CHAT ROOMS

    Directory of Open Access Journals (Sweden)

    Kevin Jepson

    2005-09-01

    Full Text Available Despite the expanded use of the Internet for language learning and practice, little attention if any has been given to the quality of interaction among English L2 speakers in conversational text or voice chat rooms. This study explored the patterns of repair moves in synchronous non-native speaker (NNS text chat rooms in comparison to voice chat rooms on the Internet. The following questions were posed: (a Which types of repair moves occur in text and voice chats; and (b what are the differences, if any, between the repair moves in text chats and voice chats when time is held constant? Repair moves made by anonymous NNSs in 10, 5-minute, synchronous chat room sessions (5 text-chat sessions, 5 voice-chat sessions were counted and analyzed using chi-square with alpha set at .05. Significant differences were found between the higher number of total repair moves made in voice chats and the smaller number in text chats. Qualitative data analysis showed that repair work in voice chats was often pronunciation-related. The study includes discussion that may affect teachers' and learners' considerations of the value of NNS chat room interaction for second language development.

  2. LANGUAGE AWARENESS IN AN INTERNET CHAT ROOM

    Directory of Open Access Journals (Sweden)

    Leszek Szymański

    2013-10-01

    Full Text Available When communicating on the Internet, the participants, so to say, mingle two traditional modes of communication: writing and speech. The phenomenon appears to be most noticeable in chat room interactions. This suggestion is based on the fact that users try to behave as though they are engaged in a spoken act of communication, though the actual medium of communication employs written language forms. Therefore, Internet users need to know what conventions to employ and how to perform such actions in order to express the desired meanings, all with the aim of driving the interaction as close as possible to speech. Such implementations of certain language-related customs require a specific kind of language awareness from the users. This concept, plus the applied conventions, constitute the essence of this article. The discussion begins with an introduction to the research problem, in this case the intentional utilization by Internet chat participants of the graphic mode of communication in order to express their desired meanings. Second, the reader becomes acquainted with the terminology used in the paper, which includes: language awareness, (Internet chat, and (language corpus. Moreover, the source of the studied language material—a corpus of Internet chats—is presented. The said description additionally includes the informants’ characteristics, as well as the topicality of their conversations. The further sections of the paper discus the application of selected non-normative spelling conventions and word-formation processes, with the support of examples taken from the corpus. Based on the discussion, an attempt is made to indicate which features comprise certain values to the participants of Internet chats.

  3. Signal Detection using ICA: Application to Chat Room Topic Spotting

    DEFF Research Database (Denmark)

    Kolenda, Thomas; Hansen, Lars Kai; Larsen, Jan

    2001-01-01

    signals with weak a priori assumptions in multimedia contexts. ICA of real world data is typically performed without knowledge of the number of non-trivial independent components, hence, it is of interest to test hypotheses concerning the number of components or simply to test whether a given set...... can detect meaningful context structures in a chat room log file....

  4. Constructing Sexuality and Identity in an Online Teen Chat Room

    Science.gov (United States)

    Subrahmanyam, K.; Greenfield, P. M.; Tynes, B.

    2004-01-01

    In this article, we propose that adolescents' online interactions are both a literal and a metaphoric screen for representing major adolescent developmental issues, such as sexuality and identity. Because of the public nature of Internet chat rooms, they provide an open window into the expression of adolescent concerns. Our study utilizes this…

  5. Opinions of Female Juvenile Delinquents about Their Interactions in Chat Rooms

    Science.gov (United States)

    Sanger, Dixie; Long, Amie; Ritzman, Mitzi; Stofer, Keri; Davis, Candy

    2004-01-01

    The purpose of this study was to survey the opinions of 62 adolescent females residing in a correctional facility about their use of the Internet to participate in chat room conversations. Findings indicated that 54 of 62 girls (87.09%), with a mean age of 16.72 years, participated in chat room interactions. Most (n = 47) interacted in chat rooms…

  6. Second Language Socialization in a Bilingual Chat Room: Global and Local Considerations

    OpenAIRE

    Wan Shun Eva Lam

    2004-01-01

    This paper considers how global practices of English on the Internet intersect with local practices of English in the territorial or national sphere in constructing the language experiences of immigrant learners. Using a multi-contextual approach to language socialization, this paper examines the social and discursive practices in a Chinese/English bilingual chat room and how this Internet chat room provides an additional context of language socialization for two teenage Chinese immigrants in...

  7. Observations of Chat Room Conversations on the Internet: Implications for Educators Addressing the Needs of Female Adolescents

    Science.gov (United States)

    Sanger, Dixie; Ritzman, Mitzi; LaCost, Barbara; Stofer, Keri; Long, Amie; Grady, Marilyn

    2005-01-01

    This qualitative study explored the meanings of chat room conversations through observations of teenagers using the Internet. Adolescent girls were a focus because of their shaky sense of self. Participants in ten chat rooms included 534 individuals. Six themes, emerging from analyzing 2526 utterances [descriptive statements], included (a)…

  8. A Technology User's Bill of Rights: Lessons Learned in Chat Rooms

    Science.gov (United States)

    Norton-Meier, Lori A.

    2004-01-01

    For the past five years, the author has spent time talking with, interviewing, interacting with, and investigating language with adolescent females in chat rooms while they engage in synchronous talk. The discussion often centers on their interest in pop culture--music, movies, television, books, games, and anything else that is worthy of…

  9. Ostracism via virtual chat room-Effects on basic needs, anger and pain.

    Directory of Open Access Journals (Sweden)

    Ana Paula Gonçalves Donate

    Full Text Available Ostracism is characterized by a social pain provoked by being excluded and ignored. In order to address the effects of social ostracism in virtual non-physical interactions, we developed a more realistic paradigm as an alternative to Cyberball and assessed its effects on participant's expression of basic social needs, emotional experience and painful feeling. The chat room consisted of controlled social dialogue interactions between participants and two other (confederate chat room partners. Exclusion was manipulated by varying the number of messages a participant received (15% and 33% in exclusion and inclusion, respectively. Analysis of participant (N = 54 responses revealed that exclusion induced a lower experience of basic-need states and greater anger, compared with included participants. In addition, excluded participants reported higher levels of two specific self-pain feelings, namely tortured and hurt. Our findings suggest that this procedure is effective in inducing social ostracism in a realistic and yet highly controlled experimental procedure.

  10. How useful are bounded online chat rooms as a source of pastoral support in a sixth-form college?

    OpenAIRE

    Richards, Catherine

    2009-01-01

    Since the introduction of chat technology there has been resistance within education to fully engage with it partly due to policy making that has left teachers disempowered (UCLAN 2002:66). Unlike other innovative technologies, its use has been limited. Pastoral support has developed significantly in education but in some instances, like chat rooms, has been viewed with scepticism. One reason for this scepticism may be that a clear measurable link between support and achievement is not easily...

  11. Second Language Socialization in a Bilingual Chat Room: Global and Local Considerations

    Directory of Open Access Journals (Sweden)

    Wan Shun Eva Lam

    2004-09-01

    Full Text Available This paper considers how global practices of English on the Internet intersect with local practices of English in the territorial or national sphere in constructing the language experiences of immigrant learners. Using a multi-contextual approach to language socialization, this paper examines the social and discursive practices in a Chinese/English bilingual chat room and how this Internet chat room provides an additional context of language socialization for two teenage Chinese immigrants in the US. Analysis of discourse, interview, and observational data reveals that a mixed-code variety of English is adopted and developed among the focal youth and their peers around the globe to construct their relationships as bilingual speakers of English and Cantonese. This language variety served to create a collective ethnic identity for these young people and allowed the girls to assume a new identity in speaking English that doesn't follow the social categories of English-speaking Americans versus Cantonese-speaking Chinese in their local American context. This paper makes the case for studying how people navigate across contexts of socialization in the locality of the nation-state and the virtual environments of the Internet to articulate new ways of using English.

  12. "Floating signifiers": Negotiating the meaning of national in Montenegro, at the Internet chat room Café del Montenegro

    Directory of Open Access Journals (Sweden)

    Čarna Brković

    2016-03-01

    Full Text Available The paper represents the analysis of the narratives that deal with the sentiment of national belonging in Montenegro within the chat room Café del Montenegro. The practice of the Internet chat room users is perceived as cultural engagement – „practicing" the State and the emotion of national identification of its own kind. By writing, arguing, negotiating the meaning of the state and nation an abundance of different and broken knowledge’s are created- many histories, geographies, ethics and politics are offered. On the one hand, these directly undermines, jeopardizes and questions the power of the State narrative, hitherto negotiating the nation, the State, authentic devotion, simultaneously manufacturing the state-nation as a reality. The result of mutual correspondence in the chat room is persistent negotiation of the meaning of national categories in Montenegro over the years.

  13. From pen pals to chat rooms: the impact of social media on Middle Eastern Society.

    Science.gov (United States)

    Hatfield, Elaine; Rapson, Richard L

    2015-01-01

    In this article, we will discuss what is known about a surprisingly popular phenomenon in the Middle East-the use of social media to communicate. We will begin with a discussion of what "social media" sites are (sites such as Facebook, Your Middle East, YouTube, Flickr, Muslima.com, chat rooms, and instant messaging) and point out how common they are in the Middle East. Next, we will discuss the reasons why men and women are currently using Internet and social media. Finally, we will discuss what impact social media have had on politics, political dissent, education, and men's and women's relationships-and the impact they might be expected to have in future years. Finally, we will focus on the impact of such media on men's and women's relationships-including cross-gender friendships, romantic relationships, and sexual relationships.

  14. Deutsch, Doyc or Doitsch? Chatters as Languagers--The Case of a German-Turkish Chat Room

    Science.gov (United States)

    Hinnenkamp, Volker

    2008-01-01

    The paper looks at the process of online-languaging of adolescents with a migratory and ethnic Turkish background in a diasporic chat room. The multiple resources and voices used are analysed. One particular example is looked at more thoroughly to illustrate the process of languaging and how it is legitimised by the chatters themselves. Finally,…

  15. Experiencing the use of a chat room in EFL teaching in a public school

    Directory of Open Access Journals (Sweden)

    Hélvio Frank de Oliveira

    2013-03-01

    Full Text Available The technological aids available in public schools may be used during teaching experiences through methods and methodologies which provide the student an extensive network of opportunities to (reconfigure their way of building knowledge in a foreign language, in order to reflect on their own learning approach. From this perspective, beyond the reflection and desire to use these tools, an autonomous and active attitude by the student is essential in order to use significant environments with on-line activities. An experience was conducted with high school first graders at a public school in a country town of the State of Goiás, aiming at identifying and analyzing the possibilities for the use of the foreign language (English by employing Omegle.com chat tool. This is  a free random chat that allows people from all over the world to interact in several languages, Twenty-one participants used the chat to interact in English with several people from different places in of the world. The data include chat dialogues as well as others collected by means of questionnaires, a researcher journal and classroom observation notes. Results show that the experience, which was inedited in this context of investigation, was developed with enthusiasm by the participants who, through the chat, improved their communication in an independent way.

  16. Attitudes and emotions through written text: the case of textual deformation in internet chat rooms.

    Directory of Open Access Journals (Sweden)

    Francisco Yus Ramos

    2010-11-01

    Full Text Available Normal 0 21 false false false ES X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Los chats españoles de Internet son visitados por muchos jóvenes que usan el lenguaje de una forma muy creativa (ej. repetición de letras y signos de puntuación. En este artículo se evalúan varias hipótesis sobre el uso de la deformación textual respecto a su eficacia comunicativa. Se trata de comprobar si estas deformaciones favorecen una identificación y evaluación más adecuada de las actitudes (proposicionales o afectivas y emociones de sus autores. Las respuestas a un cuestionario revelan que a pesar de la información adicional que la deformación textual aporta, los lectores no suelen coincidir en la cualidad exacta de estas actitudes y emociones, ni establecen grados de intensidad relacionados con la cantidad de texto tecleada. Sin embargo, y a pesar de estos resultados, la deformación textual parece jugar un papel en la interpretación que finalmente se elige de estos mensajes enviados a los chats.

  17. US Strategy for Cyberspace

    National Research Council Canada - National Science Library

    Veazie, Arnold

    2003-01-01

    .... This strategic research paper analyzes the President's National Strategy to Secure Cyberspace to determine whether it effectively provides solutions for securing cyberspace. It concludes by proposing an alternative strategy for securing cyberspace.

  18. Promotional Chat on the Internet

    OpenAIRE

    Dina Mayzlin

    2006-01-01

    Chat rooms, recommendation sites, and customer review sections allow consumers to overcome geographic boundaries and to communicate based on mutual interests. However, marketers also have incentives to supply promotional chat or reviews in order to influence the consumers' evaluation of their products. Moreover, firms can disguise their promotion as consumer recommendations due to the anonymity afforded by online communities. We explore this new setting where advertising and word of mouth bec...

  19. Improving Automated Lexical and Discourse Analysis of Online Chat Dialog

    Science.gov (United States)

    2007-09-01

    chatbots ”. Chatbots are automated user software independent of the chat room system that assist human participants, provide entertainment to the chat...both the chat room system and chatbots as well as information provided by the system and chatbots were often preceded by either the token “.” or...personal chatbots . Finally, we also classified chatbot responses as system dialog acts. The Yes/No Question chat dialog act is simply a question that

  20. Open of chat rooms for discussing geological disposal issues and review of adequate approaches for offering the information using the internet

    International Nuclear Information System (INIS)

    Takizawa, Masayuki; Ito, Toshikazu; Yabuta, Naohiro; Yoshizawa, Nobuaki; Tsunoda, Hirokazu

    2001-03-01

    JNC is doing publicity work to let the technical reliability for geological disposal of high-level radioactive waste (HLW) comprehended widely. But the information about geological disposal of HLW itself and its technology has not been spread and recognized. It has been required to offer the opportunity to discuss the geological disposal and its technology as our own issue. Recently the internet, which has such characteristics as two-way, instant and open communication means, has become used on business and for pleasure commonly. So the opportunity for discussing the topics related to geological disposal of HLW has been offered on the internet web site so-called 'Internet Forum' by JNC since fiscal year 1999. 'Internet Forum' or an assembly of chat rooms is being run on the web server which is not operated by JNC in order to provide the place where discussion on the issue can be done as fairly and objectively as possible. In this report, the results of Internet Forum in fiscal year 2000 comparing with that in fiscal year 1999 were shown and the adequate approaches of operating 'Internet Forum' and offering the information about geological disposal of HLW were reviewed. (author)

  1. Cyberspace: A Selected Bibliography

    Science.gov (United States)

    2013-05-01

    Implications of the Private Sector’s Role in Cyber Conflict." Texas International Law Journal 47, no. 3 (Summer 2012): 617-640. ProQuest Lucas, George R...Cyberspace." Proceedings: United States Naval Institute 137, no. 2 (February 2011): 32-37. ProQuest Lin, Herbert . "Escalation Dynamics and Conflict...Harold Hongju. "International Law in Cyberspace." USCYBERCOM [United States Cyber Command] Inter-Agency Legal Conference, Ft. Meade , MD, September 18

  2. Sacred Sky and Cyberspace

    Science.gov (United States)

    Clynes, F.

    2011-06-01

    The concept of the sacred world beyond the stars found expression in the works of Plato, into Gnosticism and was incorporated into Christianity where medieval images of the cosmos pictured the heavenly domain as beyond the stars. Today cyberspace literature abounds with descriptions of a transmundane space, a great Beyond. This talk looks at current views of cyberspace and asks if they are a re-packaging of the age-old concept of a sacred sky in a secular and technological format?

  3. Become Jefferson in cyberspace

    Directory of Open Access Journals (Sweden)

    Ryszard Tadeusiewicz

    2010-01-01

    Full Text Available Very newly defined, but fast developing area of e-learning practice, is now known and available for everybody. Therefore it not need more explorers. Most of fundamental facts and properties are discovered and practical “colonization” of such area is already done. But the new area of practical activities of many e-learning specialists need now rules and regulations. Therefore we not need new Columbus of Cyberspace, but Jefferson of Cyberspace is necessary just now!

  4. Kinas kapabiliteter i cyberspace

    DEFF Research Database (Denmark)

    Hjortdal, Magnus

    Briefet præsenterer tre årsager til at stater anvender deres evner i cyberspace på en offensiv måde, og viser at cyberspace er – og vil blive ved med at være – et afgørende element i Kinas strategi for opstigningen i det internationale system. De tre årsager er: 1) afskrækkelse via infiltration, ...

  5. The Performance of Cyberspace

    DEFF Research Database (Denmark)

    Barbatsis, Gretchen; Feagan, Michael; Hansen, Kenneth

    1999-01-01

    This phenomenological enquiry into cyberspace examines the concept of space and metaphor, explaining ‘cyber’space as a figurative term and a figurative space, as something projected as a shared mental concept. Reception theory is used to theorize this figurative space as an ideational object...

  6. Veiligheid in cyberspace

    OpenAIRE

    WODC

    2012-01-01

    In dit themanummer worden actuele ontwikkelingen rond 'digitale piraterij' nader geanalyseerd. Daarnaast is er aandacht voor cybercrimewetgeving, voor de vorderingen bij de politie bij de bestrijding van cybercrime en voor fraude met identiteit en internettransacties. Het lekken van geheimen in cyberspace komt eveneens aan bod, waarbij wordt teruggeblikt op de WikiLeaks-affaire. Voorts is er een artikel gewijd aan het fenomeen cyberwar.

  7. Department of Homeland Security Policy for Defense of Cyberspace

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2003-01-01

    .... A closer look at commercial enterprises includes web browsing, chat rooms, e-mail, e-commerce, overhauls of business practices and organizations, telecommunication operations, and management of power...

  8. Warfighting in Cyberspace

    Science.gov (United States)

    2007-01-01

    Kurz- weil in his 2001 essay, dictate that we must move quickly.10 If one examines the advances in Internet and computer technology in just the last...the cyberspace environment is contained within two subsets of information operations (IO): computer network operations and electronic warfare (EW... computers , information systems, and networks.”8 This mission state- ment recognizes the primacy of the strike or attack aspects of computer network attacks

  9. Avatar, Identitas dalam Cyberspace

    Directory of Open Access Journals (Sweden)

    Maria Nala Damayanti

    2013-01-01

    Full Text Available Human dependence on technology will have implications for a new culture of communication. Culture is related to the person behind the presence of elements of verbal or visual communication through internet media. Communication established via the Internet, known as cyberspace, allows the presence of a person in a variety of virtual identities. These identities emerge through verbal and visual appearances. They have names and shapes but can be present in any kind of form, commonly called avatars. The identity of a person can be represented by a number of different avatars capable of having more than one party at the same time. Communication that exists in cyberspace exceed time and space. The presence of these identities clearly indicates a relationship model that has a specific purpose. It could be a model of social relations that promote friendship, excitement, a sense of play, a critical mind or with other purposes. But the presence of such virtual identity cannot simply be equated with human beings as their personal identity in the real world, because in cyberspace, identity is plural and fluid. It can even be made with a hidden agenda.

  10. Pigs in cyberspace

    Science.gov (United States)

    Moravec, Hans

    1993-01-01

    Exploration and colonization of the universe awaits, but Earth-adapted biological humans are ill-equipped to respond to the challenge. Machines have gone farther and seen more, limited though they presently are by insect-like behavior inflexibility. As they become smarter over the coming decades, space will be theirs. Organizations of robots of ever increasing intelligence and sensory and motor ability will expand and transform what they occupy, working with matter, space and time. As they grow, a smaller and smaller fraction of their territory will be undeveloped frontier. Competitive success will depend more and more on using already available matter and space in ever more refined and useful forms. The process, analogous to the miniaturization that makes today's computers a trillion times more powerful than the mechanical calculators of the past, will gradually transform all activity from grossly physical homesteading of raw nature, to minimum-energy quantum transactions of computation. The final frontier will be urbanized, ultimately into an arena where every bit of activity is a meaningful computation: the inhabited portion of the universe will be transformed into a cyberspace. Because it will use resources more efficiently, a mature cyberspace of the distant future will be effectively much bigger than the present physical universe. While only an infinitesimal fraction of existing matter and space is doing interesting work, in a well developed cyberspace every bit will be part of a relevant computation or storing a useful datum. Over time, more compact and faster ways of using space and matter will be invented, and used to restructure the cyberspace, effectively increasing the amount of computational spacetime per unit of physical spacetime. Computational speed-ups will affect the subjective experience of entities in the cyberspace in a paradoxical way. At first glimpse, there is no subjective effect, because everything, inside and outside the individual

  11. Cyberspace regulation: cesurist and traditionalists

    Directory of Open Access Journals (Sweden)

    Lino Santos

    2015-05-01

    Full Text Available In the amazing Code and Other Laws of Cyberspace, Professor L. Lessig writes "that something fundamental has changed" with cyberspace with regard to the state's ability to enforce the law. On the one hand, the structure and characteristics of cyberspace pose some difficulties related to jurisdiction and the choice of applicable law. On the other, it raises questions about the very concept of sovereignty as we know it. This paper examines the arguments of those who advocate a regulation of cyberspace on the edges of state sovereignty or within a new concept of sovereignty and capacity to enforce the law, and the arguments of those who reject this exceptional treatment of cyberspace.

  12. Cyberspace Math Models

    Science.gov (United States)

    2013-06-01

    Poster ) Visualizing Complexity of Sunspot Cycles Via Wavelet Transform, the Summer Intern Research Day, August 3, WPAFB 2010, Dayton, OH. 11...AOL- Spam-and-chat- dont -mix/2100-1032_3-1024010.html. [7] B. Krebs, “Yahoo! Messenger network overrun by bots,” Washington Post web article, Aug 2007

  13. Flying and Fighting in Cyberspace

    National Research Council Canada - National Science Library

    Convertino, II, Sebastian M; DeMattei, Lou Anne; Knierim, Tammy M

    2007-01-01

    .... It applies the Air Force Concept Development framework to examine cyberspace as a newly designated warfare domain and proposes cyber capabilities as well as effects that the Air Force should develop...

  14. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  15. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  16. Spontanschreibung im Chat

    Directory of Open Access Journals (Sweden)

    Burri, Gabriela

    2003-01-01

    Full Text Available In this article spontaneous writing in chat communication is analyzed in two aspects. On one hand, the spelling forms found here show some language change tendencies in the German spoken language. On the other hand, the article tries to describe on which writing conventions these spontaneous spellings are based.

  17. CYBERSPACE: TERRITORY OF CONTEMPORARY LIFE

    Directory of Open Access Journals (Sweden)

    D. E. Dobrinskaya

    2018-01-01

    Full Text Available The development of wireless technologies and digital infrastructure has radically changed the relationships of individuals with their habitat and with each other. Instead of boundaries and separation, researchers increasingly describe the modern world, using concepts of network, connectivity and flow. The article presents theoretical positions within the framework of the sociological analysis of cyberspace as a special type of space emerging as a result of the development of information and communication technologies. The specifics of different approaches to the definition of cyberspace in the context of the description of the time-space distantiation as one of the key characteristic of modern society in which network structures have a decisive influence are considered. The paper concludes that, despite the large number of studies devoted to the issues of cyberspace, the interpretation of this concept is highly ambiguous. The technological basis for the design of cyberspace, as well as the understanding that any space is socially constructed, allows us to consider cyberspace in the perspective of studying its physical, social and informational aspects. This new type of space, characteristic of the networked societies of the 21st century, has a number of features that point to its virtuality, network nature of functioning, multidimensionality, nonlinearity, variability, the ability to be a public and private space and the basis for constructing a networked identity.

  18. Acid chat: gestural interface design

    OpenAIRE

    Gökhan, Ali Oytun; Gokhan, Ali Oytun

    2005-01-01

    AcidChat is an experimental design project that aims to create an innovative computer software interface for Internet chat software using today's well known technologies; Adobe Photoshop, Macromedia Freehand and digital photography. The aim of the project is to create new understandings of interface and it's usage, by adding new conceptions to chat based interfaces which creates a totally new look at the computer software and application. One of the key features is to add a gestural approach ...

  19. Entrepreneurship in Cyberspace: What Do We Know?

    Directory of Open Access Journals (Sweden)

    Mindaugas Kiškis

    2013-08-01

    Full Text Available Purpose – The purpose of the paper is to analyze the specififific features of entrepreneurship in cyberspace compared to basic models of entrepreneurship.Design/methodology/approach – Systemic, teleological, deontological and hermeneutic analysis, limited case studies.Findings – Conclusions are drawn on new qualities of entrepreneurship in cyberspace and a novel approach needed to study and understand it.Research limitations/implications – The paper represents work in progress and surveys a rapidly developing field. Case studies mentioned in the paper are limited with respect to the scope of the paper and are only instrumental for illustrating different aspects of entrepreneurship in cyberspace.Practical implications – The paper presents the theoretical framework for further study of the entrepreneurship in cyberspace, as well as basic material for classroom use. Further research of the entrepreneurship in cyberspace as a distinct social phenomenon is envisaged.Originality/Value – Over the last two decades ICTs, and especially cyberspace technologies, have significantly modified the start of new businesses and entrepreneurial processes. Although not dependent on technological breakthroughs, the cyberspace has multiple direct effects on new products and services, which are at the focus of this article. Direct and indirect effects of cyberspace on the start of the businesses are analyzed, along with the advanced transformation business models in cyberspace and novel value creation approach. The paper is among the first studies of entrepreneurship in cyberspace as a distinct social phenomenon. No similar studies have been undertaken in the Baltics before, while the US and European management studies have been limited to specific case studies, without presenting a general theoretical framework.Research type: The paper presents conceptual considerations on entrepreneurship in cyberspace, as well as limited case studies on specific

  20. Cyberspace and Critical Information Infrastructures

    Directory of Open Access Journals (Sweden)

    Dan COLESNIUC

    2013-01-01

    Full Text Available Every economy of an advanced nation relies on information systems and interconnected networks, thus in order to ensure the prosperity of a nation, making cyberspace a secure place becomes as crucial as securing society. Cyber security means ensuring the safety of this cyberspace from threats which can take different forms, such as stealing secret information from national companies and government institutions, attacking infrastructure vital for the functioning of the nation or attacking the privacy of the single citizen. The critical information infrastructure (CII represents the indispensable "nervous system", that allow modern societies to work and live. Besides, without it, there would be no distribution of energy, no services like banking or finance, no air traffic control and so on. But at the same time, in the development process of CII, security was never considered a top priority and for this reason they are subject to a high risk in relation to the organized crime.

  1. From Internet User to Cyberspace Citizen.

    Science.gov (United States)

    Wakabayashi, Ippei

    1997-01-01

    Discusses social and cultural challenges that Internet technology raises. Highlights include preserving the freedom in cyberspace, the information distribution scheme of the Internet, two-way interactivity, search engines as marketing tools, the insecurity of cyberspace, online safety rules for children, educating children to "walk…

  2. Video Chat with Multiple Cameras

    OpenAIRE

    MacCormick, John

    2012-01-01

    The dominant paradigm for video chat employs a single camera at each end of the conversation, but some conversations can be greatly enhanced by using multiple cameras at one or both ends. This paper provides the first rigorous investigation of multi-camera video chat, concentrating especially on the ability of users to switch between views at either end of the conversation. A user study of 23 individuals analyzes the advantages and disadvantages of permitting a user to switch between views at...

  3. Multimedia chatting system on LAN

    Science.gov (United States)

    Lung, Chu-Sheng; Wang, Chun-Chao; Lee, Ching-Long; Huang, Huang-Chen

    1994-04-01

    An interactive system designed for talking via multimedia presentation with other parties on Ethernet- LAN is proposed. Our Multimedia Chatting System will take several media services into consideration, like still image, text, pen writing, voice, and slow-motion video, to integrate a practical chatting system. The prototyping subsystem to implement the above idea is currently under development using NETBIOS communication interface and Microsoft Windows environment.

  4. THE CYBERSPACE IN THE CONTINUED CLINICAL BIOCHEMISTRY EDUCATION

    Directory of Open Access Journals (Sweden)

    J.M. Martins

    2008-05-01

    Full Text Available The cybernetic spaces simulate the real world with interactive multimedia. This work  has been applied since January, 2007 on the curricular student’s apprenticeship at high school and graduation, in the site “bioq.educacao.biz/ULAB-HC-UFPE”. It has been developed to provide continuity to the technical-scientific learning of students and professionals, and also to improve their human social relations on the  labour  environment.  It’s comprises a virtual space, destined to communication and collective building of knowledge on the clinical biochemistry.   It’s about an interactive environment which allows the users registered as coordinator professor (professional  or the scientist student (trainee,  unlimited access to  posting contents (classes, texts, presentations, animations, consultations, non-synchronic discussions (on orkut, forums, e-mail and synchronic discussions (on chats, videoconferences. After a few live tutorials  about new  input in this environment, and the use of the new learning tool,  the collective building of knowledge on cyberspace begins. As a trainee’s program task, the scientist student would have to build a space of his own, under guidance and supervision of the coordinator teachers.  The cyberspace efficiency was evaluated from reports collected in February, 2008: the adherence to this  work was satisfactory, regarding this period, with 68 registered users, 870 accesses and 52 contents available on the several sections of the virtual laboratory. Our work is still being applied, and new adhesions are  happening everyday. We intend to amplify this cyber environment in order to make it a  permanent  continued education site on the health area.  From interest contracts and common knowledge,  the technological interfaces constitute an interaction, in which everyone is a potential author.  Keywords: Cyberspace, online biochemistry education, continued education.

  5. Cyber Flag: A Realistic Cyberspace Training Construct

    National Research Council Canada - National Science Library

    Hansen, Andrew P

    2008-01-01

    .... Red Flag provides dominant training within the air domain and now with the evolution of cyberspace, a comprehensive training environment is necessary to meet this growing and broadening threat...

  6. Understanding Southern Influence in Cyberspace Security and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... it a matter of national security - is perhaps the most important force shaping global communications today. ... The project will provide evidence of the benefits of openness in cyberspace that can inform international ... Training materials.

  7. Staffing for Cyberspace Operations: Summary of Analysis

    Science.gov (United States)

    2016-08-01

    military-unique knowledge or skills required; (2) military incumbency is required by law, Executive Order, treaty or international agreement (e.g., DPH...civilian employment . 1 Thomas H. Barth et al., “(U) Staffing for Cyberspace Operations,” IDA Paper P...DoD cyberspace strategies, doctrine, and current concepts of operation and employment for CMF. Additionally, the team conducted interviews with

  8. The ethics of deception in cyberspace

    OpenAIRE

    Rowe, Neil C.

    2008-01-01

    This paper appeared in the Handbook of Research on Technoethics, ed. R. Luppicini, Hershey, PA: Information Science Reference, 2008. We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as spam, phishing, spyware, deceptive commercial software, and dishonest games. We next examine deception used in attacks on comput...

  9. In Pursuit of an Aptitude Test for Potential Cyberspace Warriors

    National Research Council Canada - National Science Library

    Smith, Tiffany S

    2007-01-01

    The Air Force has officially assumed the cyberspace mission. To perform this mission well, it is important to employ personnel who have the necessary skill sets and motivation to work in a cyberspace environment...

  10. Forensic challenges for handling incidents and crime in cyberspace

    CSIR Research Space (South Africa)

    Taute, B

    2009-10-01

    Full Text Available their goals. Who will bring law and order to cyberspace? This presentation focuses on the technology challenges for dealing with digital forensics and the time factor in dealing with incidents and crime in cyberspace....

  11. Peer Interaction in Text Chat: Qualitative Analysis of Chat Transcripts

    Science.gov (United States)

    Golonka, Ewa M.; Tare, Medha; Bonilla, Carrie

    2017-01-01

    Prior research has shown that intermediate-level adult learners of Russian who worked interactively with partners using text chat improved their vocabulary and oral production skills more than students who worked independently (Tare et al., 2014). Drawing on the dataset from Tare et al. (2014), the current study follows up to explore the nature of…

  12. Cyberemotions collective emotions in cyberspace

    CERN Document Server

    2017-01-01

    This first monograph of its kind introduces the reader to fundamental definitions, key concepts and case studies addressing the following issues of rapidly growing relevance for online communities: What are emotions? How do they emerge, how are they transmitted? How can one measure emotional states? What are cyberemotions? When do emotions and cyberemotions become collective phenomena? How can one model emotions and their changes? What role do emotions play for on-line communities? Edited and authored by leading scientists in this field, this book is a comprehensive reference for anyone working on applications of complex systems methods in the social sciences, as well as for social scientists, psychologists, experts in on-line communities and computer scientists. This book provides an excellent overview of the current state-of-art in research on collective emotional interactions mediated by the Internet. It introduces a reader in social phenomena occurring in cyberspace, algorithms needed for automatic sentim...

  13. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  14. A Tactical Framework for Cyberspace Situational Awareness

    Science.gov (United States)

    2010-06-01

    Command & Control 1. VOIP Telephone 2. Internet Chat 3. Web App ( TBMCS ) 4. Email 5. Web App (PEX) 6. Database (CAMS) 7. Database (ARMS) 8...Database (LogMod) 9. Resource (WWW) 10. Application (PFPS) Mission Planning 1. Application (PFPS) 2. Email 3. Web App ( TBMCS ) 4. Internet Chat...1. Web App (PEX) 2. Database (ARMS) 3. Web App ( TBMCS ) 4. Email 5. Database (CAMS) 6. VOIP Telephone 7. Application (PFPS) 8. Internet Chat 9

  15. Modelling Hegemonic Power Transition in Cyberspace

    Directory of Open Access Journals (Sweden)

    Dmitry Brizhinev

    2018-01-01

    Full Text Available Cyberspace is the newest domain of conflict and cooperation between states. In cyberspace, as in all other domains, land, sea, air, and space, these interactions often lead to the emergence of hegemons which are characterised by their predominant influence over global world order and all other states. We examined the emergence and collapse of hegemons in a modelled cyberspace world through the notions of power transition and power diffusion. We used Repast Simphony to construct a simple agent-based model (ABM of a system of states interacting both competitively and cooperatively in this world. Our simple model parsimoniously captures the character of the real international system of states through simple parameters of wealth and power determining the outcome of attack or cooperation amongst pairwise interacting states. We found hegemons of global world order emerged in cyberspace as they do in the other traditional domains from models with these few parameters. And we found that hegemons, contrary to traditional understanding, are not exceptional states but merely occupy the tail of a continuous distribution of power and lifetimes. We also found that hegemony in the system depends on two perhaps unexpected parameters: the difficulty of acquiring power as wealth increases and the amount of cooperation between states. And as a consequence, we argue that cyberspace, as a power-diffuse domain where cooperation is easier than elsewhere, is less suited to the kind of hegemony we see in the traditional domains of state interaction.

  16. Analisis Web Accessibility Pada Perancangan Website Chat

    OpenAIRE

    Yushan, Subhansyah

    2011-01-01

    Chat is a popular application where one user can communicate to another using text. Nowadays in the internet, many websites provide chat applications, such as Instant Messaging, Yahoo Messanger, and etc. Website which provides chat application cannot accomodate users who have any dissabilities, especialy users with visual disabilities. This situation makes communication process more complicated, where accessibility level of sending and receiving information has became low. The ...

  17. Contemporary Ghost Stories: Cyberspace in Fiction for Children and Young Adults

    Science.gov (United States)

    Harris, Marla

    2005-01-01

    This essay identifies a genre of popular fiction for children and young adults, prevalent in the 1990s and continuing into the early twenty-first century, that incorporates computers and the internet, e-mails and chat rooms, into its plots. However, along with a focus on technology, this fiction frequently features the supernatural. So, too,…

  18. Optimizing Reasonableness, Critical Thinking, and Cyberspace

    Science.gov (United States)

    Ikuenobe, Polycarp

    2003-01-01

    In this paper, the author argues that the quantity, superabundance of information, easy availability, and quick access to information in cyberspace may engender critical thinking and the optimization of reasonableness. This point is different from, but presupposes, the commonplace view that critical thinking abilities, criteria, processes, and…

  19. RFID-based Electronic Identity Security Cloud Platform in Cyberspace

    OpenAIRE

    Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai

    2012-01-01

    With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...

  20. Investigating L2 Performance in Text Chat

    Science.gov (United States)

    Sauro, Shannon; Smith, Bryan

    2010-01-01

    This study examines the linguistic complexity and lexical diversity of both overt and covert L2 output produced during synchronous written computer-mediated communication, also referred to as chat. Video enhanced chatscripts produced by university learners of German (N = 23) engaged in dyadic task-based chat interaction were coded and analyzed for…

  1. Office Hours as You Like Them: Integrating Real-Time Chats into the Course Media Mix.

    Science.gov (United States)

    McKeage, Kim

    2001-01-01

    Reports on one professor's use of integrated synchronous electronic office hours (i.e., a "chat room") with asynchronous course conferencing (i.e., email) in a class on introductory marketing. Describes its uses, limitations, benefits, potential problems, and results from a student survey. (EV)

  2. Chat It Up: Backchanneling to Promote Reflective Practice among In-Service Teachers

    Science.gov (United States)

    Kassner, Laura D.; Cassada, Kate M.

    2017-01-01

    In a graduate education course geared toward developing reflective teaching practice in in-service teachers, backchannels, in the form of chat rooms, were employed in small groups to facilitate peer feedback during viewings of video recorded instruction. This study examined the nature and quality of peer feedback exchanged in the digital medium…

  3. Cyberspace violence against girls and adolescent females.

    Science.gov (United States)

    Chisholm, June F

    2006-11-01

    Children and adolescents today are the first generation raised in a society in which technological literacy is essential for effective citizenship in the 21st century. With many more youth using digital technologies for educational and recreational purposes, there has been an increase in social problems in cyberspace, exposing them to different forms of cyberviolence. This article gives an overview of the developments in cyberspace, describes different types of cyberviolence, and focuses on cyberbullying among girls and adolescent females as both victims and perpetrators of cyberbullying. At-risk online activities among girls and adolescent females as well as strategies to promote cybersafety are presented. Current research and future directions for research are reviewed.

  4. Monitoring and analysis of data in cyberspace

    Science.gov (United States)

    Schwuttke, Ursula M. (Inventor); Angelino, Robert (Inventor)

    2001-01-01

    Information from monitored systems is displayed in three dimensional cyberspace representations defining a virtual universe having three dimensions. Fixed and dynamic data parameter outputs from the monitored systems are visually represented as graphic objects that are positioned in the virtual universe based on relationships to the system and to the data parameter categories. Attributes and values of the data parameters are indicated by manipulating properties of the graphic object such as position, color, shape, and motion.

  5. Thoughts Invade Us: Lexical Cognition and Cyberspace

    Science.gov (United States)

    2017-06-01

    enables us to learn a language to begin with. In the same way that technology is socially constructed but later exerts influence within a...http://www.stratcom.mil/ Media /Factsheets/Factsheet- View/Article/960492/us-cyber-command-uscybercom/. Wendt, Alexander. Social Theory of...perspective extends a purely social construction of cyberspace, where the domain changes simply as an extension of social dynamics, utility, and

  6. Perfume formulation: words and chats.

    Science.gov (United States)

    Ellena, Céline

    2008-06-01

    What does it mean to create fragrances with materials from chemistry and/or from nature? How are they used to display their characteristic differences, their own personality? Is it easier to create with synthetic raw materials or with essential oils? This review explains why a perfume formulation corresponds in fact to a conversation, an interplay between synthetic and natural perfumery materials. A synthetic raw material carries a single information, and usually is very linear. Its smell is uniform, clear, and faithful. Natural raw materials, on the contrary, provide a strong, complex and generous image. While a synthetic material can be seen as a single word, a natural one such as rose oil could be compared to chatting: cold, warm, sticky, heavy, transparent, pepper, green, metallic, smooth, watery, fruity... full of information. Yet, if a very small amount of the natural material is used, nothing happens, the fragrance will not change. However, if a large amount is used, the rose oil will swallow up everything else. The fragrance will smell of nothing else except rose! To formulate a perfume is not to create a culinary recipe, with only dosing the ingredients in well-balanced amounts. To formulate rather means to flexibly knit materials together with a lively stitch, meeting or repelling each other, building a pleasant form, which is neither fixed, nor solid, nor rigid. A fragrance has an overall structure, which ranges from a clear sound, made up of stable, unique, and linear items, to a background chat, comfortable and reassuring. But that does, of course, not mean that there is only one way of creating a fragrance!

  7. Media Literacy and Information Behavior in Cyberspace

    Directory of Open Access Journals (Sweden)

    Seyed Ali Akbar Famil Rouhany

    2017-10-01

    Full Text Available The aim of this study was to investigate media literacy and information behavior in cyberspace. This was a review and library research based study. With the advent of the digital age and the increasing spread of the World Wide Web, popularity and general acceptance of virtual social networks in the world today, the need to examine media literacy and information behavior in human life is important. Approach to media literacy which is the subset of information literacy in cyberspace has become necessary and obvious. As an individual, higher level of literacy can lead to choosing better content and search for information to find useful content. By assessing the theoretical basis and different approaches in a virtual environment, it can be concluded that having literacy skills and information behavior, the period of time spent in cyberspace and the number of readers have increased, leading to the ability to criticize and interpret the social, political and economic information and identify useful information. Consequently, by acquiring new technologies and increasing the adaptability in viewpoints and improving skills within researchers, the context for developing new ideas will be provided.

  8. Extending Prior Posts in Dyadic Online Text Chat

    Science.gov (United States)

    Tudini, Vincenza

    2015-01-01

    This study explores whether chat users are able to extend prior, apparently completed posts in the dyadic online text chat context. Dyadic text chat has a unique turn-taking system, and most chat softwares do not permit users to monitor one another's written messages-in-progress. This is likely to impact on their use of online extensions as an…

  9. NOTICING AND TEXT-BASED CHAT

    Directory of Open Access Journals (Sweden)

    Chun Lai

    2006-09-01

    Full Text Available This study examined the capacity of text-based online chat to promote learners’ noticing of their problematic language productions and of the interactional feedback from their interlocutors. In this study, twelve ESL learners formed six mixed-proficiency dyads. The same dyads worked on two spot-the-difference tasks, one via online chat and the other through face-to-face conversation. Stimulated recall sessions were held subsequently to identify instances of noticing. It was found that text-based online chat promotes noticing more than face-to-face conversations, especially in terms of learners’ noticing of their own linguistic mistakes.

  10. Chat Bots Implementation and User Engagement

    OpenAIRE

    Hosseini, Sajjad

    2017-01-01

    The purpose of this project was to study the concept of Chat Bots, and to analyse its importance and place in today’s communication platforms. The goal of the project was to build a Chat Bot prototypically for Metropolia University of Applied Sciences helpdesk on a messaging platform, which would replace the traditional way of reserv- ing old devices for purchase sold at Metropolia’s helpdesk in different times throughout the year. The chat bot was developed using a high-level implementat...

  11. Cyberspace at the Operational Level: Warfighting In All Five Domains

    Science.gov (United States)

    2016-05-13

    exclusive , cyberspace capabilities and connections are everywhere. While innovation in space is possible through the imagination of a relative few, the...senior leaders rush to integrate and consolidate stovepiped cyberspace expertise scattered across DoD, our potential adversaries have the luxury of

  12. The Classroom, Board Room, Chat Room, and Court Room: School Computers at the Crossroads.

    Science.gov (United States)

    Stewart, Michael

    2000-01-01

    In schools' efforts to maximize technology's benefits, ethical considerations have often taken a back seat. Computer misuse is growing exponentially and assuming many forms: unauthorized data access, hacking, piracy, information theft, fraud, virus creation, harassment, defamation, and discrimination. Integrated-learning activities will help…

  13. Technical Evaluation Reports 15. Chat and Instant Messaging Systems (synchronous: Report 3/ 3

    Directory of Open Access Journals (Sweden)

    Brian Ludwig

    2002-10-01

    Full Text Available [Previous reviews of chat and IM systems are presented in Reports 6 and 14 in this series.]A further set of four text-based instant messaging (IM products was evaluated: AT&T Anywhere, Parachat, Sonork, and Yahoo Messenger, all available at no cost. Yahoo Messenger was judged to be the most effective of the three products for use by distance education (DE teachers and students, being compatible with most common operating systems and accommodating up to 50 chat room participants. Yahoo Messenger also possesses integrated audio and video capabilities. AT&T Anywhere is an efficient product, which supports Windows-based operating systems only. Parachat (Basic version is a basic, browser accessed chat board without instant messaging (IM capabilities.

  14. Joint Force Cyberspace Component Command: Establishing Cyberspace Operations Unity of Effort for the Joint Force Commander

    Science.gov (United States)

    2015-05-01

    strengths, the United States and DoD knowledge of cyberspace combined with the United States technical prowess and spirit of entrepreneurship provide us...notes that Warden did not find it acceptable to target citizens directly with anything but psychological means. The fifth and final ring is the

  15. The Chat Is Coming from inside the House: An Analysis of Perceived Chat Behavior and Reality

    Science.gov (United States)

    Berndt-Morris, Elizabeth; Minnis, Samantha M.

    2014-01-01

    When looking for ways to improve library services, we considered what data sources were readily available to us and how we could harvest and use this data. We investigated three years of chat reference statistics at Central Michigan University, a large research institution, to gain a better understanding of our patrons' chat behavior. We then…

  16. Security in cyberspace targeting nations, infrastructures, individuals

    CERN Document Server

    Giacomello, Giampiero

    2014-01-01

    Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as ""cybersecurity."" Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This colle

  17. Crowdsourced Translation for Rapid Internationalization in Cyberspace

    DEFF Research Database (Denmark)

    Tran, Yen; Yonatany, Moshe; Mahnke, Volker

    2016-01-01

    This paper explores how Facebook effectively used crowdsourced translation to accelerate its rapid internationalization. We apply the learning perspective of internationalization theory to unpack what the firm learned in order to mobilize crowd-based knowledge to facilitate internationalization...... and codified knowledge, rather than the experiential knowledge traditionally suggested in the literature on the process of internationalization, and (2) the firm's success rested on its ability to use virtual learning tools and incentive systems to acquire, articulate and integrate knowledge from communities...... of internationally dispersed users – the “crowd” – to accelerate its internationalization in cyberspace. This empirical study extends internationalization theory regarding knowledge and organizational learning....

  18. Cyberspace modernization. An interest protocol planning advisory

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); McLane, Victor N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-07-01

    A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internet of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.

  19. NOTICING HYBRID RECASTS IN TEXT CHAT

    Directory of Open Access Journals (Sweden)

    Mark J. Oliver

    2016-12-01

    Full Text Available This study examined ten EFL learners’ noticing of the corrective nature of a form of text-based SCMC (text chat feedback that combined a recast of a grammatical error with metalinguistic information. The feedback, termed a hybrid recast, was provided by a native-speaker interlocutor during two text chat activities: a spot-the-difference and picture-ordering task. Data was collected in two ways: analysis of task-based dyadic text chat interaction in which uptake was used as an indicator of learner noticing, and a post-task questionnaire containing questions that identified evidence of learner noticing. Interaction analysis showed that learners responded to almost two thirds of the hybrid recasts with uptake. In addition, every learner provided evidence that they had correctly perceived at least some of the hybrid recasts as corrective in their post-task questionnaire responses.

  20. Air Force Cyberspace Technical Center of Excellence (CyTCECR)

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Cyberspace Research (CCR), established in March 2002, conducts defense-focused research at the Master's and PhD levels. The CCR is forward-looking and...

  1. In Pursuit of an Aptitude Test for Potential Cyberspace Warriors

    National Research Council Canada - National Science Library

    Smith, Tiffany S

    2007-01-01

    .... This thesis attempts to determine the necessary skills and motivations to perform the cyberspace mission and recommends a screening process to select the candidates with the highest probability for success...

  2. [Clinical application of M-CHAT and CHAT-23 for autism screening].

    Science.gov (United States)

    Ren, Shuang; Ma, Hong-Wei; Hu, Man; Wang, Li-Bo; Wang, Lin; Li, Fang; Song, Ying; Tan, Ying-Hua

    2012-12-01

    To analyze and compare Modified Checklist for Autism in Toddlers (M-CHAT) and Checklist for Autism in Toddlers-23 (CHAT-23) in terms of clinical applicability, and to provide a basis for the understanding of early specific clinical manifestations of children with autism. A total of 350 children aged 18-36 months who visited the Department of Developmental Pediatrics of Shengjing Hospital of China Medical University were enrolled as subjects. Of the 350 children, 284 who had not been previously diagnosed with autism were screened according to the two checklists. Sixty-eight confirmed cases of autism (including two of the 284 screening subjects diagnosed with autism) were assigned to the autism group, and 278 of the 284 screening subjects (except six children diagnosed with autism, mental retardation or cerebral palsy) were assigned to the control group. The two groups were compared with respect to the positive rate for each item in the checklists. The efficacy of the M-CHAT and CHAT-23 assessment criteria was evaluated by comparative analysis. The autism group showed the highest positive rate for Item 9. There were significant differences between the two groups in terms of the positive rates for all items except Item 16 (PCHAT showed the lowest rate of missed diagnosis (0%); when the assessment criterion was that autism was confirmed if there were positive results for at least 6 of a total of 23 items, CHAT-23 showed the lowest rate of misdiagnosis (1.77%). The specificity of M-CHAT is lower than that of CHAT-23 (P0.05). CHAT-23 is more suitable than M-CHAT for clinical autism screening due to higher specificity, as well as having the advantages of low cost, easy completion,high efficiency and easy result judgment.

  3. Detecting Predatory Behaviour in Online Game Chats

    DEFF Research Database (Denmark)

    Gudnadottir, Elin Rut; Jensen, Alaina K.; Cheong, Yun-Gyung

    This paper describes a machine learning approach to detect sexually predatory behaviour in the massively multiplayer online game for children, MovieStarPlanet. The goal of this work is to take a chat log as an input and outputs its label as either the predatory category or the non......-predatory category. From the raw in-game chat logs provided by MovieStarPlanet, we first prepared three sub datasets via extensive preprocessing. Then, two machine learning algorithms, naive Bayes and Decision Tree, were employed to model the predatory behaviour using different feature sets. Our evaluation has...

  4. Development of a Client-Server Chat Application

    OpenAIRE

    Malmberg, Lasse

    2017-01-01

    The goal of the Bachelor’s thesis was to develop a simple client-server chat application. The focus was on the development process and the underlying technologies that were utilized in the development of the chat application. The chat application was developed with the C++ programming language and the SDL software development library. The development environment consisted primarily of command-line operated tools. The thesis resulted in a functional chat application. The program is a d...

  5. Satisfaction with Online Commercial Group Chat: The Influence of Perceived Technology Attributes, Chat Group Characteristics, and Advisor Communication Style

    NARCIS (Netherlands)

    van Dolen, W.M.; Dabholkar, P.A.; de Ruyter, J.C.

    2007-01-01

    This study examines online commercial group chat from a structuration theory perspective. The findings support the influence of perceived technology attributes (control, enjoyment, reliability, speed, and ease of use) and chat group characteristics (group involvement, similarity, and receptivity) on

  6. You Are There: No Budget for Travel? Try Video Chat

    Science.gov (United States)

    Langhorst, Eric

    2009-01-01

    The author discusses how he used video chat as an alternative to a physical trip. Any teacher with an Internet hookup and a $30 webcam can connect with anyone in the world using video chat. Programs like Skype Video and the Google Mail's video chat function make it easy and, best of all, are completely free. The author discusses how to get started…

  7. The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects: Power Projection through Cyberspace

    Science.gov (United States)

    2016-06-14

    in theory . Offensive cyberspace operations have the potential to provide these types of power- projecting effects in the battlespace, but how can...approach to allow for the maturation of command relationships, authorities, and buildup of operational capacity. In the direct support model...send cyber- space liaisons to the air component to integrate joint cyberspace operations. A major step in the center’s maturation process is

  8. Chat as a technically mediated social system

    DEFF Research Database (Denmark)

    Tække, Jesper

    2008-01-01

    This paper provides an analysis of chat as a technical media for communication. This is realized using the strategy for analyzing that I have called Media Sociography (Tække 2006). The Media Sociography is a synthesis of Medium Theory and the Systems Theoretical Sociology of Niklas Luhmann. The aim...

  9. Will online chat help alleviate mood loneliness?

    Science.gov (United States)

    Hu, Mu

    2009-04-01

    The present study examines the relationship between social Internet use and loneliness and reviews the studies about this topic from both social psychology and computer-mediated communication literature, as a response to the call for interdisciplinary research from scholars in these two areas. Two hundred thirty-four people participated in both the survey testing trait loneliness and a 5-condition (face-to-face chatting, instant message chatting, watching video, writing assignments, and "do nothing") experiment. Participants reported increase of mood loneliness after chatting online. The level of mood loneliness after online chat was higher than that in face-to-face communication. For people with high trait loneliness, the mood loneliness increase in the computer-mediated communication condition was significantly higher than in the face-to-face communication condition. The author of the current study hopes to help clarify the mixed research findings in previous social Internet use literature about this topic and reminds communication researchers of the need to explore the constructs included in "psychological well-being" in terms of their nature, mechanism, causes, consequences, and furthermore, how they are related to communication.

  10. First Things First: Internet Relay Chat Openings.

    Science.gov (United States)

    Rintel, E. Sean; Mulholland, Joan; Pittam, Jeffery

    2001-01-01

    Argues that Internet Relay Chat (IRC) research needs to systematically address links between interaction structures, technological mediation and the instantiation and development of interpersonal relationships. Finds that openings that occur directly following user's entries into public IRC channels are often ambiguous, can disrupt relationship…

  11. Cyberspace and individual: a possible synthesis?

    Directory of Open Access Journals (Sweden)

    Murilo Canella

    2012-05-01

    Full Text Available This study attempts to draw a picture of “liquid-modern” society regarding the extreme relationship exchange and neologism existing among the association forms created from the “solid modernity”. It tries to demonstrate the correlation between the fragmentation of tradition and the emergency for new values which, in its direct confrontation, brought to the humanity an era of new meanings and ongoing processes. From this concept derives the duality between “global” and “local”, submitted to economic, political, social and cultural processes, which in a closer examination shows the confl uence of latent crisis regarding the individual identity, even more oriented by global processes, inserted in an also global and virtual space, cyberspace. It follows, however, the problematic about the loss of individuals humanity by the impersonal logic of consumerism and its infl uence on individual thought.

  12. WeChat impact on social and economic in China

    OpenAIRE

    Rong, Mengmeng

    2016-01-01

    The purpose of the thesis is to analyse WeChat in China. On the hand, this thesis analyses the impact of WeChat on social and economic based on its features. WeChat changes Chinese way of life. Customers are directly taken part in economic activities in WeChat. On the other hand, this thesis is intended to help entrepreneurs and organizations to know more about WeChat B2B and B2C model in China. The thesis will be helpful for those entrepreneurs who are going to enter Chinese market. Th...

  13. Makt og avmakt i cyberspace: hvordan styre det digitale rom?

    Directory of Open Access Journals (Sweden)

    Lilly Pijnenburg Muller

    2016-12-01

    Full Text Available Et sikkert cyberspace er nødvendig for en fungerende samfunnsstruktur, økonomisk, politisk og sosialt. Med samfunnets økende avhengighet av cyberspace for å kunne fungere normalt, har sikringen av cyberspace blitt stadig viktigere. For å løse sikkerhetsutfordringene knyttet til utviklingen av cyberspace har stater søkt støtte fra private aktører gjennom såkalte multistakeholder-initiativer. Med slike initiativer mener man en åpen form for samarbeid mellom interessenter, basert på en idé om likeverdige partnere. Stater iverksetter slike initiativer ut fra en tanke om at et samarbeid mellom private og offentlige aktører gir den beste formen for styring og sikring av aktiviteter i cyberspace. Implementeringen foregår imidlertid uten at de nødvendige forutsetningene for at en slik styringsform skal fungere er til stede. Selv om mange i dagens akademiske debatt stiller spørsmål ved om disse initiativene fungerer, er det få som har stilt spørsmål ved hvordan cybersikkerhet kan utøves i praksis. Dette fører til at man overser det sentrale spørsmålet om hvordan maktdynamikken mellom offentlig og privat sektor fungerer med henblikk på sikkerhet i cyberspace. Denne artikkelen diskuterer hvorvidt multistakeholder-initiativene faktisk fungerer som en kontroll- og styringsmekanisme i cyberspace. Ved å se nærmere på offentlig-privat samarbeid om cybersikkerhet i Norge er hensikten å gi en bedre forståelse av årsakene til at multistakeholder-initiativer ofte ikke fungerer i praksis.

  14. Von Neuromancer zu Second Life. Raumsimulationen im Cyberspace

    Directory of Open Access Journals (Sweden)

    Krämer, Steffen

    2011-07-01

    Full Text Available In his novel Neuromancer, first published in 1984, the US-american author William Gibson coined the term cyberspace for the virtual reality generated by computers. On the basis of an etymological analysis this term can be interpreted as the traditional relation between helmsman and space. In the medium of sci-fi-literature and sci-fi-film this phenomenon of cyberspace changed rapidly between 1980 and today. In early examples, for instance in the film Tron produced in 1982, the virtual figures act in a disintegrated space without any destination or orientation. In later examples, for instance in the film Matrix produced in 1999, the cyberspace becomes a substitute world for a dark, chaotic or destructive vision of reality. Contemporary forms of cyberspace, as visualized in the 3D-online-city Second Life, are in contrast used for financial activities and symbolize the hard world of economic policy. This development of cyberspace can be seen either as an evolutionary process or a dichotomy primary defined by different facets of space simulation in virtual reality.

  15. Emotional persistence in online chatting communities

    Science.gov (United States)

    Garas, Antonios; Garcia, David; Skowron, Marcin; Schweitzer, Frank

    2012-05-01

    How do users behave in online chatrooms, where they instantaneously read and write posts? We analyzed about 2.5 million posts covering various topics in Internet relay channels, and found that user activity patterns follow known power-law and stretched exponential distributions, indicating that online chat activity is not different from other forms of communication. Analysing the emotional expressions (positive, negative, neutral) of users, we revealed a remarkable persistence both for individual users and channels. I.e. despite their anonymity, users tend to follow social norms in repeated interactions in online chats, which results in a specific emotional ``tone'' of the channels. We provide an agent-based model of emotional interaction, which recovers qualitatively both the activity patterns in chatrooms and the emotional persistence of users and channels. While our assumptions about agent's emotional expressions are rooted in psychology, the model allows to test different hypothesis regarding their emotional impact in online communication.

  16. Tutorial chat: a case study of synchronous communication in a learning environment

    Directory of Open Access Journals (Sweden)

    Malcolm Rutter

    2006-12-01

    Full Text Available This case study describes the use of a web-based synchronous chat application, run during computing tutorials. The chat room was moderated by a paid demonstrator, who assisted and encouraged students whenever possible. Most of the discussion was banter, which acted as a lubricant for relevant factual communication. Students were permitted a degree of anonymity, but nevertheless learned to treat the facility in a useful manner. The application and its mode of employment were found to be both motivating and supportive. Use was evaluated by questionnaire and an analysis of student input. As a result of the experience, it is suggested that abuse will certainly occur and may be minimised by technical improvements, but never eliminated. The Rogerian approach adopted was found to have transferred emphasis from teaching a topic to the learning of generic skills.

  17. Improvements of cyberspace and effects to the battlefield

    Science.gov (United States)

    Gedıklı, Münir

    2014-06-01

    Wars previously being executed at land and sea have also become applicable in air and space due to the advancements of aircraft and satellite systems. Rapid improvements in information technologies have triggered the concept of cyberspace which is considered as the fifth dimension of war. While transferring information quickly from physical area to electronic/digital area, cyberspace has caused to emerge a lot of threats and methods like cyber-attack, cyber-crime, cyber war which are spreading too rapidly. Individuals, institutions and establishments have begun to take their own cyber security precautions to cope with these threats. This study gives information about the concepts and advances on cyberspace in order to raise comprehensive awareness. The study also focuses on the effects of these improvements in the battlefield, and analyzes them.

  18. Information Cyberspace and Future Cyber Homes

    Directory of Open Access Journals (Sweden)

    Eduard Babulak

    2006-04-01

    Full Text Available The current Internet combines very complex communications infrastructures, while connecting users globally and at the same time creating information cyberspace systems. Large companies such as Philips are working on communications technologies that will facilitate fully automated households (i.e., Cyber Homes. Today, people are using are using small digital pagers and phones with embedded computers and displays, palm-size computers such as Palm Pilot, notebook-size panel computers and wall-size displays. Current research and development trends in the field of Telecommunications and computing industries continues towards a human centric computing, smart spaces, smart devices, clothing, fully automated houses etc. This new technology creates environment where computers are everywhere and provide online access to information at any time to anyone. In this paper, the author discusses new technological trends directions in the Internet, E-commerce and Automation Industries, while presenting his own vision on application of ubiquitous computing in the future cyber home automation. In support of creating future fully automated cyber homes, the author promotes creation of interdisciplinary and multinational research and development teams world-wide.

  19. Analýza historie komunikace xChat

    OpenAIRE

    RYNEŠ, Pavel

    2012-01-01

    Based on the needs of forensic examination of communication history of various communication programs for the police authorities and forensic experts is needed documentation chat history of "xChat". This is especially necessary to analyze the data files containing records of contacts and communication history at a local PC. Based on the contact information to analyze the possibility of obtaining identification information from the portal xChat

  20. RTP/I Payload Type Definition for Chat Tools

    OpenAIRE

    Vogel, Jürgen

    2001-01-01

    This document specifies an application-level protocol (i.e., payload type) for chat tools using the Real Time Protocol for Distributed Interactive Media (RTP/I). RTP/I defines a standardized framing for the transmission of application data and provides protocol mechanisms that are universally needed for the class of distributed interactive media. A chat tool provides an instant messaging service among an arbitrary number of users. This documents specifies how to employ a chat tool with RTP/I ...

  1. Virtual Reality and Cyberspace: From Science Fiction to Science Fact.

    Science.gov (United States)

    Stone, Robert J.

    1991-01-01

    Traces the history of virtual reality (VR), or cyberspace, and describes some of the research and development efforts currently being carried out in the United Kingdom, Europe, and the United States. Applications of VR in interactive computer-aided design (CAD), the military, leisure activities, spaceflight, teleconferencing, and medicine are…

  2. Gender, Space, and Discourse across Borders: Talking Gender in Cyberspace

    Science.gov (United States)

    Maher, JaneMaree; Hoon, Chng Huang

    2008-01-01

    The possibility of online student collaboration over cyberspace for two groups of students in Australia and Singapore was conceived by JaneMaree Maher at Monash University in Australia in 2005 after hearing a paper given by a colleague that detailed the experience of a three-way cross-country dialogue using flexible learning technologies. A recent…

  3. For a cyberspace information policy: advances, perspectives and challenges

    Directory of Open Access Journals (Sweden)

    Jakeline Amparo Villota Enríquez

    2017-06-01

    Full Text Available This article is to describe and analyze the policies of information in cyberspace, both global and regionally, in different directions: programs, resolutions, and projects from the information sector. Likewise, an overview of the same is presented in the Latin American and Caribbean region. Through documentary analysis of the literature related to the topic, the article is based on a review of literature raised from scientific materials such as: books, thesis papers, dissertations, texts on internet sites and articles, resolutions, projects and decrees dealing with the same topic. As a result, cyberspace is conceptualized and its elements, dimensions, strategies and variations are characterized, by analyzing the information from cyberspace policy, based on the global stage to relate it, finally, to the region of Latin America and the Caribbean, with the idea of better addressing the problems. The cyberspace information policy experience a minor and slow process in the field of cyber war; resulting from the obstacle of international cooperation defined by the disparate ambitions of the State or region.

  4. Miss Willie and Nora Bonesteel: Teaching in Cyberspace.

    Science.gov (United States)

    Atwell, Nedra Wheeler

    Two of the author's favorite Appalachian women serve as thought mentors to help see the practical and educational opportunities available in cyberspace for meeting the critical shortage of teachers serving the Appalachian women and children of today. In classrooms and homes throughout Appalachia, women and children are logging on to computers to…

  5. Cyberspace in the Curricula: New Legal and Ethical Issues.

    Science.gov (United States)

    Smethers, J. Steven

    1998-01-01

    Finds that most journalism and mass communication programs integrate legal and ethical issues surrounding cyberspace and interactive media into existing courses, especially into ethics and communication law courses, but also into introductory survey courses, communication technology, and reporting classes. Details reasons why some programs do not…

  6. Balancing Cyberspace Promise, Privacy, and Protection: Tracking the Debate.

    Science.gov (United States)

    Metivier-Carreiro, Karen A.; LaFollette, Marcel C.

    1997-01-01

    Examines aspects of cyberspace policy: Internet content and expectations; privacy: medical information and data collected by the government; and the regulation of offensive material: the Communications Decency Act, Internet filters, and the American Library Association's proactive great Web sites for children. Suggests that even "child…

  7. Improv Chat: Second Response Generation for Chatbot

    OpenAIRE

    Wei, Furu

    2018-01-01

    Existing research on response generation for chatbot focuses on \\textbf{First Response Generation} which aims to teach the chatbot to say the first response (e.g. a sentence) appropriate to the conversation context (e.g. the user's query). In this paper, we introduce a new task \\textbf{Second Response Generation}, termed as Improv chat, which aims to teach the chatbot to say the second response after saying the first response with respect the conversation context, so as to lighten the burden ...

  8. Online chats: A strategy to enhance learning in large classes

    African Journals Online (AJOL)

    Muntuwenkosi Mtshali

    2015-11-10

    Nov 10, 2015 ... interact with one another via online chats in the process of ... of learning using online chats in Business Management Education. ... results suggested that students' academic performance as measured ... contact in a way that could essentially 'scaffold' .... at the same time, participants had very little time to.

  9. Comparative loneliness of users versus nonusers of online chatting.

    Science.gov (United States)

    Ong, Chorng-Shyong; Chang, Shu-Chen; Wang, Chih-Chien

    2011-01-01

    Online chatting is an important component of improving interpersonal relationships online, but it may reduce participants' communication time with family members. We conducted a study of the relationship between participants' intent to engage in online chatting and three dimensions of loneliness: social, familial, and romantic. This study was designed to show the effect of online chatting on each of these three dimensions of loneliness. The participants in the study were 709 students at two universities in Taiwan who were classified on the basis of whether or not they had ever engaged in online chatting. Of the participants, 651 (91.82%) fully completed the questionnaires that served as the study instruments and were included in data analysis. The study found that individuals who had participated in online chatting exhibited greater familial loneliness than those who had not because the time spent in online chatting reduced the time spent in familial relationships. Social loneliness was related to the quality of Internet relationships rather than to the time spent online. Individuals who participated in online chatting had less romantic loneliness because of a greater ease of maintaining romantic relationships online. We conclude that online chatting can reduce social loneliness through high-quality Internet relationships but may exacerbate familial loneliness.

  10. Teacher Twitter Chats: Gender Differences in Participants' Contributions

    Science.gov (United States)

    Kerr, Stacey L.; Schmeichel, Mardi J.

    2018-01-01

    Gender differences in participation were examined across four Twitter chats for social studies teachers. Analyses drawing on mixed methods revealed that while there was parity across most kinds of tweets, participants identified as men were more likely to use the examined Twitter chats to share resources, give advice, boast, promote their own…

  11. The Value of Chat Reference Services: A Pilot Study

    Science.gov (United States)

    Jacoby, JoAnn; Ward, David; Avery, Susan; Marcyk, Emilia

    2016-01-01

    This article explores student, instructor, and librarian perceptions of chat reference in the context of an introductory composition course. Participants in a mixed-method study responded to an anonymized chat transcript. While student respondents valued speed and efficiency, they were willing to receive instruction and open to questions that…

  12. Fault Detection and Diagnosis System in Process industry Based on Big Data and WeChat

    Directory of Open Access Journals (Sweden)

    Sun Zengqiang

    2017-01-01

    Full Text Available The fault detection and diagnosis information in process industry can be received, anytime and anywhere, based on bigdata and WeChat with mobile phone, which got rid of constraints that can only check Distributed Control System (DCS in the central control room or look over in office. Then, fault detection, diagnosis information sharing can be provided, and what’s more, fault detection alarm range, code and inform time can be personalized. The pressure of managers who worked on process industry can be release with the mobile information system.

  13. Entrepreneurship in Cyberspace Research of Mru Management and Administration Students

    Directory of Open Access Journals (Sweden)

    Mindaugas Kiškis

    2012-07-01

    Full Text Available Youth entrepreneurship is one of the European Union’s public policy priorities. Student entrepreneurship in this context is particularly important as academic studies at the university shall develop an entrepreneurial personality.Student entrepreneurship is not widely examined in Lithuanian scholarly work. This phenomenon tends to be analyzed in the context of development of general entrepreneurial skills. There is no prior work on student entrepreneurship in cyberspace—most notably there is no empirical research in this area. This situation emphasizes the need for empirical studies of student entrepreneurship.The purpose of this article is to analyze student entrepreneurship in cyberspace status quo at Mykolas Romeris University (MRU. This research objective was chosen in order to determine the current status and to enable a reference for further research of student entrepreneurship in cyberspace. Additional practical goals are adopted, namely—based on the results of this study, to identify development guidelines for study programs as well as the “Entrepreneurship in Cyberspace” discipline taught in a postgraduate studies at MRU in order to focus them on the needs of future postgraduate students.The research was conducted using a survey method. Before the research three hypotheses were proposed:1 MRU students are more enterprising than the statistical resident of Lithuania;2 student entrepreneurship education in Management and Administration studies is inadequate;3 students need specialized knowledge of entrepreneurship in cyberspace.After the analysis of gathered data from students all three hypotheses were confirmed: students are more entrepreneurial then the general population of Lithuania, entrepreneurial education at the university is insufficient and there is a need among students for specialized knowledge in the field of e-business.Follow-up study of the negative dynamics of student entrepreneurship should be carried out in the

  14. Brain stem hypoplasia associated with Cri-du-Chat syndrome

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Jin Ho; Lee, Ha Young; Lim, Myung Kwan; Kim, Mi Young; Kang, Young Hye; Lee, Kyung Hee; Cho, Soon Gu [Dept. of Radiology, Inha University Hospital, Inha University School of Medicine, Incheon (Korea, Republic of)

    2013-12-15

    Cri-du-Chat syndrome, also called the 5p-syndrome, is a rare genetic abnormality, and only few cases have been reported on its brain MRI findings. We describe the magnetic resonance imaging findings of a 1-year-old girl with Cri-du-Chat syndrome who showed brain stem hypoplasia, particularly in the pons, with normal cerebellum and diffuse hypoplasia of the cerebral hemispheres. We suggest that Cri-du-Chat syndrome chould be suspected in children with brain stem hypoplasia, particularly for those with high-pitched cries.

  15. Evaluating the Effectiveness of Air Force Foundational Cyberspace Training

    Science.gov (United States)

    2012-06-14

    projected and actual USAFA and AFROTC officer accessions [15]. The Basic Officer Training syllabus for academic year 2010-2011 included a lesson...Forces Vocational Aptitude Battery (ASVAB), which covers four areas: arithmetic reasoning, word knowledge, paragraph comprehension, and mathematics ...http://afrotc.com/ college -life/courses/descriptions/ (accessed 25 May 2012). [12] United States Air Force Holm Center, "Cyberspace Lesson Plan

  16. The Cyberspace Domain: Path to a New Service?

    Science.gov (United States)

    2013-05-23

    What to Do About It, 36. 126Mark A. Morris ,“Who Will Command The High Ground? The Case For A Separate Area of Responsibility for Space” (monograph...STRATCOM occurred. Morris ’ paper is interesting because he couches discussion of the space domain in much the same way cyberspace is discussed today...Levin, Carl. Opening Statement at SASC Hearing on US Strategic Command and US Cyber Command for FY 2014, Tuesday , March 12, 2013. http

  17. “Just Chatting”: Research Ethics and Cyberspace

    Directory of Open Access Journals (Sweden)

    Ellen Whiteman

    2007-06-01

    Full Text Available Research conducted through computer-mediated communication is challenging traditional definitions of what is ethical research. In this article the author examines the changing role of assent/consent, confidentiality, and participant observation in qualitative research conducted in cyberspace. She concludes that REBs (research ethic boards might be becoming more conservative in their decisions at the very moment that Internet research requires more flexibility and broader ethical definitions.

  18. Key Terrain: Application to the Layers of Cyberspace

    Science.gov (United States)

    2017-03-01

    In the land domain, fixed terrain features such as mountains, depressions , or valleys are tied to a geographic location. Cyberspace does not have...January 2015, hackers claiming loyalty to the Islamic State of Iraq and Syria (ISIS) compromised Twitter and YouTube accounts owned by USCENTCOM. Twitter...a popular social media service and YouTube , a site that hosts user video content, were both used by USCENTCOM as effective communication tools for

  19. Bridging the Cyberspace Gap: Washington and Silicon Valley

    Science.gov (United States)

    2017-12-21

    Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program at the Council on Foreign Relations . One of the...large public role in tracing cyberattacks to nation-states and other perpetrators. In addition, Alphabet, Amazon, Apple, Cisco, Facebook, IBM, Intel...2013 after a number of public disputes.1 In December 2015, a terrorist killed 14 people in San Bernardino, California. The Federal Bureau of

  20. Centralized Offense, Decentralized Defense: Command and Control of Cyberspace

    Science.gov (United States)

    2012-06-01

    emphasizing that a healthy cyberspace is essential to the nation’s economy and security.12 Missing from this definition was an emphasis that...global information grid ( GIG ).11 9 McDougall, The Heavens and the Earth, 84. 10 Antione Bousquet, The Scientific Way of Warfare: Order and Chaos on...outside influence is a significant piece of this puzzle. It is common for the United States government’s global information grid ( GIG ) to be attacked

  1. WOC practice in cyberspace: legal and ethical issues.

    Science.gov (United States)

    Hoyman, K

    2001-07-01

    WOC nurses have the opportunity to extend their practice geographically by using electronic media, also called telehealth or "practicing in cyberspace." Currently, laws and regulations affecting this aspect of practice are in rapid flux. In addition, practicing electronically makes the ethical issues of choice, privacy, and confidentiality more acute. This article describes the current status of relevant legislation, discusses relevant ethical issues, and provides guidelines for WOC nurses who are considering the use of e-mail and video conferencing within their practice.

  2. Who is Responsible for Defending United States Interests in Cyberspace?

    Science.gov (United States)

    2013-03-01

    The U.S. Chamber of Commerce worked openly to challenge legislation that potentially would have directed minimum standards for operators of key...of companies to enable private public collaboration to 6 protect critical infrastructure as the U.S. Chamber of Commerce actively identifies...cyberspace-lawmakers-say/50869/ (accessed November 12, 2012). 19 US Chamber of Commerce , “Key Vote letter on S. 3414, the Cybersecurity Act of 2012

  3. IMPLEMENTATION OF UKRAINIAN-SPEAKING MEMES IN CYBERSPACE

    OpenAIRE

    M.V. Zabotnova; O.V. Bohdanova

    2018-01-01

    The article is devoted to the analysis of memes, as a key aspect of interaction in chatrooms. The author highlights the communicative specificity of memes in cyberspace. The article is based on the interaction among Internet users in modern social networks, on the sample of the widespread memes. The work examines the definite units of memes, such as: pictures, videos, inspirational posters and demotivational posters. The author puts a stress on the actuality of a work due to the speed and unc...

  4. Securing Cyberspace: Towards an Agenda for Research and Practice

    Directory of Open Access Journals (Sweden)

    Renaud Levesque

    2015-11-01

    Full Text Available In this article, we seek to identify the important challenges preventing security in cyberspace and to identify the key questions that nations should set out to answer to play a leading role in securing cyberspace. An important assertion is that the challenge of securing cyberspace transcends the abilities of any single entity and requires a radical shift in our approach in how: i research is conducted, ii cybersecurity researchers are educated, iii new defendable systems are developed, and iv effective defensive countermeasures are deployed. Our response draws upon extensive source material and our personal experiences as cybersecurity professionals contributing to the establishment of the VENUS Cybersecurity Corporation, a not-for-profit corporation that aims to make Canada a global leader in cybersecurity. We view the challenge to be global and transdisciplinary in nature and this article to be of relevance world-wide to senior decision makers, policy makers, managers, educators, strategists, futurists, scientists, technologists, and others interested in shaping the online world of the future.

  5. 76 FR 29195 - National Strategy for Trusted Identities in Cyberspace (NSTIC) Governance Workshop

    Science.gov (United States)

    2011-05-20

    ... Trusted Identities in Cyberspace (NSTIC) Governance Workshop AGENCY: National Institute of Standards... for Trusted Identities in Cyberspace (NSTIC) Governance Workshop to be held on Thursday, June 9, 2011... discuss various governance models to administer the process for policy and standards adoption for the...

  6. Sexual Abuse Images in Cyberspace: Expanding the Ecology of the Child

    Science.gov (United States)

    Martin, Jennifer; Alaggia, Ramona

    2013-01-01

    Cyberspace has added a new dimension to the ecology of children made the subjects of sexual abuse images distributed online. These images cannot be permanently removed and can continue to circulate in cyberspace forever. A review of the current literature suggests that helping professionals are not consistently aware of or do not probe…

  7. GOOF: OCTOPUS error messages, ORDER, ORDERLIB, FLOE, CHAT, and LOD

    Energy Technology Data Exchange (ETDEWEB)

    Whitten, G.

    1977-07-10

    This is a compilation of the error messages returned by five parts of the Livermore timesharing system: the ORDER batch-processor, the ORDERLIB subroutine library, the FLOE operating system, the CHAT compiler, and the LOD loader.

  8. Entrepreneurship in Cyberspace Research of Mru Management and Administration Students

    Directory of Open Access Journals (Sweden)

    Mindaugas Kiškis

    2013-01-01

    Full Text Available Youth entrepreneurship is one of the European Union’s public policy priorities. Student entrepreneurship in this context is particularly important as academic studies at the university shall develop an entrepreneurial personality. Student entrepreneurship is not widely examined in Lithuanian scholarly work. This phenomenon tends to be analyzed in the context of development of general entrepreneurial skills. There is no prior work on student entrepreneurship in cyberspace—most notably there is no empirical research in this area. This situation emphasizes the need for empirical studies of student entrepreneurship. The purpose of this article is to analyze student entrepreneurship in cyberspace status quo at Mykolas Romeris University (MRU. This research objective was chosen in order to determine the current status and to enable a reference for further research of student entrepreneurship in cyberspace. Additional practical goals are adopted, namely—based on the results of this study, to identify development guidelines for study programs as well as the “Entrepreneurship in Cyberspace” discipline taught in a postgraduate studies at MRU in order to focus them on the needs of future postgraduate students. The research was conducted using a survey method. Before the research three hypotheses were proposed: 1 MRU students are more enterprising than the statistical resident of Lithuania; 2 student entrepreneurship education in Management and Administration studies is inadequate; 3 students need specialized knowledge of entrepreneurship in cyberspace. After the analysis of gathered data from students all three hypotheses were confirmed: students are more entrepreneurial then the general population of Lithuania, entrepreneurial education at the university is insufficient and there is a need among students for specialized knowledge in the field of e-business. Follow-up study of the negative dynamics of student entrepreneurship should be carried

  9. El chat: la conversación escrita

    OpenAIRE

    Blanco Rodríguez, María José

    2002-01-01

    This study analyses the linguistic characteristics of a new medium of synchronous text-based computer-mediated communication called Chat. This communication and the type of discourse developed exhibit many oral qualities. These qualities of orality are analyzed starting from the conditions that surround the communication act and of the type of discursive activity that is developed, because the chat should be understood as a new communication system, with rules and forms of i...

  10. Canada and the Challenges of Cyberspace Governance and Security

    Directory of Open Access Journals (Sweden)

    Ron Deibert

    2013-03-01

    Full Text Available When Canada stood with the United States and Britain in refusing to sign on to a new, statecontrolled future for the Internet, at December’s World Conference on Information Technology, it certainly made the federal government appear to be a stalwart champion of Internet freedom. But in reality, Canada’s approach to cyberspace governance and security has, at best, sent mixed signals about our commitment to Internet freedom. At worst, it has actually contributed to increasing on-line censorship and surveillance by the very undemocratic and illiberal regimes that Canada voted against at the conference. Unfortunately this is a dangerous time for Canada to wallow in aimlessness: when it comes to cyberspace governance and security, the momentum is headed in the direction of greater state control. As demographic realities indicate, Internet usage will increasingly belong to the global South and East, where freedom is an unsettled and elusive concept. If Canada truly seeks to guard against the Internet falling captive to the controls sought by repressive regimes, such as those in China and Russia, it will have to offer the world a compelling, competing vision that demonstrates integrity and dedication to genuine Internet freedom. Among other things, that means moving beyond traditional top-down, state-centred models of security, which are a poor fit for a decentralized, global, publicly shared, but largely privately developed, communications network. Imposing conventional, state led policing frameworks on cyberspace — for instance, in the name of fighting cyber crime — only provides legitimacy to regimes abroad when they bring their own state powers to censor Internet communications. It also means thinking more carefully about how much we should tolerate our Canadian technology developers continuing to supply tools of repression to the foreign regimes who seek to dominate their own people. Canada has the potential to take on a leadership role in

  11. Cyberspace 101: taking a ride on the information superhighway.

    Science.gov (United States)

    Hayes, D; Forsell, G; Hansen, K; Homer-Trobaugh, J

    1997-10-01

    All you need to explore cyberspace is a computer, a modem, a phone line, and a local "on-ramp" to the infohighway. A litserv is an interactive mailing list that distributes information to a large number of people at the same time. Once you subscribe, you receive copies of all messages sent into listserv and have the opportunity to post questions and comments for other subscribers. Dietetics Online: A Network of Dietetic/Nutrition Professionals offers a range of cutting-edge services. Online marketing can reach a potentially larger audience for a fraction of the cost of traditional means and expand your business geographically.

  12. Modern Consumer in Cyberspace – Internet and Psychology Approach

    Directory of Open Access Journals (Sweden)

    Jabłońska Marta R.

    2017-02-01

    Full Text Available Online reality becomes a natural environment for nowadays companies. As more and more companies have understand a necessity of their presence in the cyberspace, they still need to learn about complex nature of young people who are becoming customers. The paper aims to present modern consumer from sociological and psychological perspective. First, it describes generations Y, Z, and C and their most common online activities and then concentrates on their behaviors performed online. To reach the aim of the paper, a study has also been conducted to investigate discussed behaviors.

  13. Expanding Suicide Crisis Services to Text and Chat.

    Science.gov (United States)

    Predmore, Zachary; Ramchand, Rajeev; Ayer, Lynsay; Kotzias, Virginia; Engel, Charles; Ebener, Patricia; Kemp, Janet E; Karras, Elizabeth; Haas, Gretchen L

    2017-07-01

    Crisis support services have historically been offered by phone-based suicide prevention hotlines, but are increasingly becoming available through alternative modalities, including Internet chat and text messaging. To better understand differences in the use of phone and chat/text services. We conducted semistructured interviews with call responders at the Veterans Crisis Line who utilize multimodal methods to respond to veterans in crisis. Responders indicated that veterans may access the chat/text service primarily for reasons that included a desire for anonymity and possible inability to use the phone. Responders were divided on whether callers and chatters presented with different issues or risk of suicide; however, they suggested that veterans frequently use chat/text to make their first contact with mental health services. We spoke with call responders, not the veterans themselves. Additionally, as this is qualitative research, applicability to other settings may be limited. While new platforms offer promise, participants also indicated that chat services can supplement phone lines, but not replace them.

  14. Structure, complexity and cooperation in parallel external chat interactions

    DEFF Research Database (Denmark)

    Grønning, Anette

    2012-01-01

    This article examines structure, complexity and cooperation in external chat interactions at the workplace in which one of the participants is taking part in multiple parallel conversations. The investigation is based on an analysis of nine chat interactions in a work-related context, with partic......This article examines structure, complexity and cooperation in external chat interactions at the workplace in which one of the participants is taking part in multiple parallel conversations. The investigation is based on an analysis of nine chat interactions in a work-related context...... focus is on “turn-taking organisation as the fundamental and generic aspect of interaction organisation” (Drew & Heritage, 1992, p. 25), including the use of turn-taking rules, adjacency pairs, and the importance of pauses. Even though the employee and the union members do not know one another...... and cannot see, hear, or touch one another, it is possible to detect an informal, pleasant tone in their interactions. This challenges the basically asymmetrical relationship between employee and customer, and one can sense a further level of asymmetry. In terms of medium, chat interactions exist via various...

  15. Recorded peer video chat as a research and development tool

    DEFF Research Database (Denmark)

    Otrel-Cass, Kathrin; Cowie, Bronwen

    2016-01-01

    When practising teachers take time to exchange their experiences and reflect on their teaching realities as critical friends, they add meaning and depth to educational research. When peer talk is facilitated through video chat platforms, teachers can meet (virtually) face to face even when...... recordings were transcribed and used to prompt further discussion. The recording of the video chat meetings provided an opportunity for researchers to listen in and follow up on points they felt needed further unpacking or clarification. The recorded peer video chat conversations provided an additional...... opportunity to stimulate and support teacher participants in a process of critical analysis and reflection on practice. The discussions themselves were empowering because in the absence of the researcher, the teachers, in negotiation with peers, choose what is important enough to them to take time to discuss....

  16. End-to-End Privacy Protection for Facebook Mobile Chat based on AES with Multi-Layered MD5

    Directory of Open Access Journals (Sweden)

    Wibisono Sukmo Wardhono

    2018-01-01

    Full Text Available As social media environments become more interactive and amount of users grown tremendously, privacy is a matter of increasing concern. When personal data become a commodity, social media company can share users data to another party such as government. Facebook, inc is one of the social media company that frequently asked for user’s data. Although this private data request mechanism through a formal and valid legal process, it still undermine the fundamental right to information privacy. In This Case, social media users need protection against privacy violation from social media platform provider itself.  Private chat is the most favorite feature of a social media. Inside a chat room, user can share their private information contents. Cryptography is one of data protection methods that can be used to hides private communication data from unauthorized parties. In our study, we proposed a system that can encrypt chatting content based on AES and multi-layered MD5 to ensure social media users have privacy protection against social media company that use user informations as a commodity. In addition, this system can make users convenience to share their private information through social media platform.

  17. Modelling of Processes of Logistics in Cyberspace Security

    Directory of Open Access Journals (Sweden)

    Konečný Jiří

    2017-01-01

    Full Text Available The goal of this contribution is especially to familiarize experts in various fields with the need for a new approach to the system-defined model and modelling of processes in the engineering practice and the expression of some state variables' possibilities for the modelling of real-world systems with regard to the highly dynamic development of structures and to the behaviour of systems of logistics. Thus, in this contribution, the necessity of making full use of cybernetics as a field for the management and communication of information is expressed, and also the environment of cybernetics as a much needed cybernetic realm (cyberspace, determining the steady state between cyber-attacks and cyber-defence as a modern knowledge-based potential in general and specifically of logistics in cyber security. Connected with this process is the very important area of lifelong training of experts in the dynamic world of science and technology (that is, also in a social system which is also expressed here briefly, and also the cyber and information security, all of which falls under the cyberspace of new perspective electronic learning (e-learning with the use of modern laboratories with new effects also for future possibilities of process modelling of artificial intelligence (AI with a perspective of mass use of UAVs in logistics.

  18. Meatspace is Cyberspace: The Pynchonian Posthuman in Bleeding Edge

    Directory of Open Access Journals (Sweden)

    Jason Siegel

    2016-06-01

    Full Text Available This article examines Thomas Pynchon’s indirect critique of utopian posthumanism in 'Bleeding Edge' by analyzing the deleterious effects that an emerging Internet culture has on the novel’s characters. By seeping into every aspect of their lives, embedding itself in their minds, and becoming a prosthetic consciousness, the Internet has transformed the characters into posthumans and altered their subject positions within a technological global capitalist culture. Contrasting the novel’s take on the posthuman with the posthuman theories of Donna Harraway, N. Katherine Hayles, Robert Pepperell, Rosi Braidotti, David Roden and Seb Franklin, I argue that, while the dominant utopian strain in posthuman theory imagines the advent of posthumanism as an opportunity for liberation from the sexism, racism, and colonial oppression that are enabled by the positing of the classical humanist subject, Pynchon demonstrates that because the Internet technology that brought about the posthuman condition is controlled by governments and corporations, it has become just one more lost chance at freedom that was converted into an instrument of increased control and surveillance. Reading 'Bleeding Edge' against William Gibson’s prototypical posthuman novel Neuromancer, I also contend that while Gibson, despite challenging the ontological primacy of meatspace over cyberspace, keeps the two realms separate, Pynchon, who borrows Gibson’s terms, shows that cyberspace has already merged with meatspace. As a result, Maxine Tarnow, the protagonist of 'Bleeding Edge', has nowhere to run in her attempt to find a provisional refuge for herself and her family.

  19. Overcoming the Confucian psychological barrier in government cyberspace.

    Science.gov (United States)

    Lee, Ook; Gong, Sung Jin

    2004-02-01

    The Confucian tradition still dictates the behavior of many people in East Asian countries such as South Korea. Even in e-mail communication, people try their best to show signs of respect which is required by the Confucian tradition. This psychological barrier can be detrimental to the development of democracy as people are educated not to challenge opinions of elders or bosses. After a long military dictatorship, South Korea has emerged as a newly democratized nation where the Confucian tradition is less emphasized. However, this tradition dies hard, and citizens are still afraid of offending government officials who have the power to affect lives of citizens. In light of creating a more democratic society, the e-government project has been implemented, and one of the features of cyber-government is to give citizens a place in cyberspace to express their concerns. Even though citizens have to use their real names, it is found that those who wrote messages in the bulletin board of the city of Seoul government's web pages tend not to use terms that are often used in e-mails for the purpose of expressing respect. A survey was conducted, and results show that people were able to overcome the Confucian psychological barrier in government cyberspace. Self-efficacy is proposed to explain this phenomenon.

  20. Electronic Market and Business: Cyberspace vs. Electronic Environment

    Directory of Open Access Journals (Sweden)

    Deniss Ščeulovs

    2013-12-01

    Full Text Available The authors of the article analyze the concept "electronic environment". Having studied a range of academic literature sources and other sources, the authors of the article have drawn a conclusion that the academic writings do not provide a definition of "electronic environment". Furthermore, the various opinions among specialists regarding this concept often differ. Meanwhile, there are several explanations of the term "cyberspace" overlapping the concept of "electronic environment", and these terms are often believed to be synonyms. To understand what the term "electronic environment" means and to properly and correctly employ this concept in entrepreneurship, the authors have performed a lexicographic analysis of this concept by comparing reciprocal concepts. As a result of the research, the authors propose their view on what, in their opinion, "electronic environment" is and what its connection to the concept "cyberspace" is. The topicality of the article lies in the fact that often entrepreneurs and specialists of public and other institutions, when using these terms, imply completely different concepts. It can lead to misunderstanding and misinterpreting the information, as well as to encumbering the understanding of tasks, problems, etc.

  1. Chat reference service in medical libraries: part 2--Trends in medical school libraries.

    Science.gov (United States)

    Dee, Cheryl R

    2003-01-01

    An increasing number of medical school libraries offer chat service to provide immediate, high quality information at the time and point of need to students, faculty, staff, and health care professionals. Part 2 of Chat Reference Service in Medical Libraries presents a snapshot of the current trends in chat reference service in medical school libraries. In late 2002, 25 (21%) medical school libraries provided chat reference. Trends in chat reference services in medical school libraries were compiled from an exploration of medical school library Web sites and informal correspondence from medical school library personnel. Many medical libraries are actively investigating and planning new chat reference services, while others have decided not to pursue chat reference at this time. Anecdotal comments from medical school library staff provide insights into chat reference service.

  2. Online Chat Dependency: The Influence of Social Anxiety

    Science.gov (United States)

    Wang, Chih-Chien; Chang, Shu-Chen

    Recent developments in information technology have made it easy for people to “chat” online with others in real time, and many do so regularly. “Virtual” relationships can be attractive, especially for people with social interaction problems in the “real world”. This study examines the influence on online chat dependency of three dimensions of social anxiety: general social situation fear, negative evaluation fear, and novel social situation fear. Participants of this study were 454 college students. The survey results show that negative evaluation fear and general social situation fear are relative to online chat dependency, while novel social situation fear does not seem to be a relevant factor.

  3. ANDROID CHATTING APPLICATION BASED ON WI-FI TECHNOLOGY

    OpenAIRE

    Ekata M. Lambture *, Prof. Z.M. Shaikh

    2016-01-01

    As we know that Android operating system is one of the popular operating system for mobile applications.It supports mobile applications such as Chatting based applications,File sharing applications etc. In market thosands of applications are available in which users can send-receive messages,shares the files,send images,audio,video through network connectivity such as 2G,3G,4G. Android chatting application based on wi-fi technology provides same features but using WI-FI(Wireless Fidelity)...

  4. Hypoxia Room

    Data.gov (United States)

    Federal Laboratory Consortium — The Hypoxia Room is a 8x8x8 ft. clear vinyl plastic and aluminum frame construction enclosure located within USAREIM laboratory 028. The Hypoxia Room (manufactured...

  5. An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services

    OpenAIRE

    Xing, Xinyu; Ahn, Junho; Lee, Wenke; Han, Richard; Mishra, Shivakant

    2012-01-01

    Recently, online video chat services are becoming increasingly popular. While experiencing tremendous growth, online video chat services have also become yet another spamming target. Unlike spam propagated via traditional medium like emails and social networks, we find that spam propagated via online video chat services is able to draw much larger attention from the users. We have conducted several experiments to investigate spam propagation on Chatroulette - the largest online video chat web...

  6. Building Community Through a #pulmcc Twitter Chat to Advocate for Pulmonary, Critical Care, and Sleep.

    Science.gov (United States)

    Carroll, Christopher L; Bruno, Kristi; Ramachandran, Pradeep

    2017-08-01

    Social media sites such as Twitter can significantly enhance education and advocacy efforts. In 2013, the American College of Chest Physicians (CHEST) launched a Twitter chat series using the hashtag #pulmcc to educate and advocate for topics related to pulmonary, critical care, and sleep medicine. To assess the reach of these chats, we analyzed the metrics using Symplur analytics, and compared data from each chat, as well as participant data. Since December 19, 2013, there have been 12 Twitter chats: six have been on critical care-related topics, four have been on pulmonary-/sleep-related topics, and two have been conducted during the CHEST annual meeting on more general topics. During these 1-h Twitter chats, there were a total of 4,212 tweets by 418 participants, resulting in 9,361,519 impressions (ie, views). There were similar numbers of participants and tweets in the three categories of Twitter chats, but there was a significantly greater reach during the more general Twitter chats conducted at the CHEST annual meeting, with 1,596,013 ± 126,472 impressions per chat session at these chats, compared with 739,203 ± 73,109 impressions per chat session during the critical care Twitter chats and 621,965 ± 123,933 impressions per chat session in the pulmonary/sleep chats. Seventy-five participants participated in two or more #pulmcc Twitter chats, and the average percent of return participants in each chat was 30% ± 7%. Most of the return participants were health-care providers. Twitter chats can be a powerful tool for the widespread engagement of a medical audience. Copyright © 2017 American College of Chest Physicians. Published by Elsevier Inc. All rights reserved.

  7. Analisis Kinerja Trafik Video Chatting Pada Sistem Client- Client Dengan Aplikasi Wireshark

    OpenAIRE

    Yuvandra, Rayhan

    2014-01-01

    Teknologi Video chat adalah salah satu media komunikasi yang memberikan kemudahan pengguna untuk dapat melihat wajah lawan bicara dalam chatting dengan menggunakan kamera yang terdapat di notebook atau perangkat komputer. Video chat juga membutuhkan jaringan internet sebagai media transmisinya. Salah satu aplikasi untuk video chat adalah skype. Skype adalah software aplikasi komunikasi suara berbasis IP dengan teknologi P2P ( peer to peer ) melalui internet antara sesama pengguna skype. Pene...

  8. Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program defines a set of interrelated priorities for the agencies of...

  9. Implicit and Explicit Attitudes towards America in Socio Digital Influence: Trust and Social Identity in Cyberspace

    Science.gov (United States)

    2018-03-16

    AFRL-AFOSR-JP-TR-2018-0024 Implicit and Explicit Attitudes towards America in Socio-Digital Influence: Trust and Social Identity in Cyberspace James...and Explicit Attitudes towards America in Socio-Digital Influence: Trust and Social Identity in Cyberspace 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER...comprehensive survey of personality, values, institutional trust, mass media usage, and political attitudes and ideology (including a comprehensive

  10. War in the Information Age: A Primer for Cyberspace Operations in 21st Century Warfare

    Science.gov (United States)

    2010-01-01

    funds transfers ( EFT ). 30 Paralleling the rapid expansion of civilian cyberspace use is the increasing use of cyberspace by modern militaries...company files by using a thumb drive to tap the corporate system. Boeing estimated that the stolen documents would have cost it between $5 billion...tactics and intelligence operations such as collecting data, recruiting members of state security services, and setting up phone taps .‖ 69

  11. When technological affordances meet interactional norms: the value of pre-screening in online chat counseling

    NARCIS (Netherlands)

    Stommel, Wyke; te Molder, Hedwig Frederica Maria

    2016-01-01

    We present a conversation analysis of openings sequences of online text-based chat counseling. Particular about this chat counseling is that the clients made available their help question through pre-screening. The data consisted of 40 chat sessions with pre-screening and 34 sessions without

  12. Reviving a Digital Dinosaur: Text-Only Synchronous Online Chats and Peer Tutoring in Communication Centers

    Science.gov (United States)

    Schwartzman, Roy

    2013-01-01

    A qualitative and quantitative content analysis was conducted of all text-based synchronous online chats at an oral communication peer tutoring center throughout a semester. As a comparative benchmark, chats at the same university's main library were analyzed over the same time period. The library's chats were much more heavily weighted toward…

  13. Uso del chat en el desarrollo de cursos en línea

    DEFF Research Database (Denmark)

    Bregnhøj, Henrik; Zurita, L.

    2006-01-01

    Chat has been used for support to development of environmental courses in a network of universities (ELAC) in Latin America and EU. 12 thematic chats were held on various common learning subjects as themes and 11 course chats focussed specifically on the design of 5 courses. 36 participants parti...

  14. Mobile Chatting Behaviour of Arts and Science College Students

    Science.gov (United States)

    Ramakrishnan, N.; Priya, J. Johnsi

    2016-01-01

    Mobile connectivity is the order of the day. Personas irrespective of their socio-economic status possess mobile device either basic or advanced android or windows or IOS. The chat applications have become popular with younger generation. It has started trickling down to children below the age of eighteen. The behaviour has influenced the aged…

  15. Online chats: A strategy to enhance learning in large classes ...

    African Journals Online (AJOL)

    Online-supported teaching and learning is a technological innovation in education that integrates face-to-face teaching in plenary lectures, with an online component using a learning management system. This extends opportunities to students to interact with one another via online chats in the process of transacting their ...

  16. Assessing the Language of Chat for Teamwork Dialogue

    Science.gov (United States)

    Shibani, Antonette; Koh, Elizabeth; Lai, Vivian; Shim, Kyong Jin

    2017-01-01

    In technology-enhanced language learning, many pedagogical activities involve students in online discussion such as synchronous chat, in order to help them practice their language skills. Besides developing the language competency of students, it is also crucial to nurture their teamwork competencies for today's global and complex environment.…

  17. Structure, complexity and cooperation in parallel external chat interactions

    Directory of Open Access Journals (Sweden)

    Anette Grønning

    2012-09-01

    Full Text Available This article examines structure, complexity and cooperation in external chat interactions at the workplace in which one of the participants is taking part in multiple parallel conversations. The investigation is based on an analysis of nine chat interactions in a work-related context, with particular focus on the content of the parallel time spans of the chat interactions. The analysis was inspired by applied conversation analysis (CA. The empirical material has been placed at my disposal by Kristelig Fagbevægelse (Krifa, which is Denmark’s third-largest trade union. The article’s overall focus is on “turn-taking organisation as the fundamental and generic aspect of interaction organisation” (Drew & Heritage, 1992, p. 25, including the use of turn-taking rules, adjacency pairs, and the importance of pauses. Even though the employee and the union members do not know one another and cannot see, hear, or touch one another, it is possible to detect an informal, pleasant tone in their interactions. This challenges the basically asymmetrical relationship between employee and customer, and one can sense a further level of asymmetry. In terms of medium, chat interactions exist via various references to other media, including telephone calls and e-mails.

  18. Afrikaans-English code switching on internet relay chat (IRC)

    African Journals Online (AJOL)

    The data examined in this paper consist of logs of IRC interactions in public IRC channels on irc.sun.ac.za (the Stellenbosch University IRC server) and logs of interaction on local hubs in DC++ (a file-sharing application that allows for synchronous chatting). Southern African Linguistics and Applied Language Studies 2008, ...

  19. Iterative Chat Transcript Analysis: Making Meaning from Existing Data

    Directory of Open Access Journals (Sweden)

    Steven Baumgart

    2016-04-01

    Full Text Available Objective – In order to better contextualize library data about patron satisfaction with reference services, we analyzed an existing corpus of chat transcripts. Having conducted a similar analysis in 2010, we also compared librarian behaviors over time. Methods – Drawing from the library literature, we identified a set of librarian behaviors closely associated with patron satisfaction. These behaviors include listening to and understanding patrons’ needs, inviting patrons to use the service again, and providing instruction or completing a search for patrons. Analysis of the chat transcripts included establishing a coding schema, applying these codes to individual chat transcripts, and analyzing these codes across the corpus of transcripts for frequency and correlation with other codes. The currently presented analysis used chat transcripts from the fall of 2013 and seeks changes in librarian behavior over time in order to gauge the success of establishing best practices and improving training standardization over the last three years. Results – The analysis shows that librarian behaviors have changed over time, pointing to what campus librarians are doing well, and that implementation of best practices at a campus level after the 2010 analysis may have increased these positive behaviors. The analysis also shows opportunities for further standardization and reinforcement of best practices. Conclusion – Qualitative analysis of already-collected data serves as a model for other units and suggests areas for process improvement, including enhanced coder training and code schema design. Further analysis of chat patrons’ questions is also warranted, including investigation of the relationship between subject- and location-specific questions and referrals.

  20. Analisa Kinerja Jaringan Provider untuk Aplikasi Video Chatting (Studi Kasus di Daerah Marpoyan)

    OpenAIRE

    Danur, Jeri Dwi; ', Febrizal '

    2016-01-01

    Video chat is a communication that allows users to chat and can see the other person's face directly. Video chatting requires a good network to transmit audio and video data in a short time. This paper examines the performance of three mobile network provider (Provider A and Provider B Provider C) in a video chat in the area Marpoyan and the effect of time when doing video chat on the performance of each provider. The method used is the method using packet sniffing software wireshark to see Q...

  1. “New Weapons” of Ideological and Political Education in Universities—WeChat

    Directory of Open Access Journals (Sweden)

    Wei He

    2014-04-01

    Full Text Available WeChat, a new instant messaging software, has been popularized nowadays. In order for WeChat to have the maximum impact on the ideological and political education areas, we need to have a deep understanding of the characteristics and regulars which attract students in the communication process, and combine WeChat platform with ideological and political education to attract students motivated to learn the content of ideological politics. This article, starting with college students, aims to understand their thinking and use of WeChat, and pertinently use WeChat platform to enhance the attractiveness and effectiveness of ideological and political education.

  2. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  3. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.

    Science.gov (United States)

    Pieters, Wolter; Hadžiosmanović, Dina; Dechesne, Francien

    2016-06-01

    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.

  4. Room Acoustics

    Science.gov (United States)

    Kuttruff, Heinrich; Mommertz, Eckard

    The traditional task of room acoustics is to create or formulate conditions which ensure the best possible propagation of sound in a room from a sound source to a listener. Thus, objects of room acoustics are in particular assembly halls of all kinds, such as auditoria and lecture halls, conference rooms, theaters, concert halls or churches. Already at this point, it has to be pointed out that these conditions essentially depend on the question if speech or music should be transmitted; in the first case, the criterion for transmission quality is good speech intelligibility, in the other case, however, the success of room-acoustical efforts depends on other factors that cannot be quantified that easily, not least it also depends on the hearing habits of the listeners. In any case, absolutely "good acoustics" of a room do not exist.

  5. Kreuz- und Que(erfahrerinnen im Cyberspace. Schöne Neue Welt, revisited Navigators in Cyberspace

    Directory of Open Access Journals (Sweden)

    Verena Kuni

    2003-03-01

    Full Text Available Obgleich sich um die Frage nach einer feministischen Eroberung des Cyberspace in den vergangenen Jahren nicht nur ein breites Feld streitbarer Diskurse gebildet hat, sondern mittlerweile auch eine Reihe markanter Mythen ranken, wird sie sowohl vom Mainstream der akademischen Medientheorie als auch von den Protagonisten der populären Cyberkultur nach wie vor allenfalls als Marginalie verhandelt. Ob Bücher genderspezifische Bildungslücken schließen können, sei einmal dahingestellt. Mit reload. rethinking women + cyberculture haben die Multi-Media-Künstlerin Mary Flanagan und die Gender-Medien-Theoretikerin Austin Booth jedenfalls einen Sammelband vorgelegt, der nicht nur Betriebsblinden und Einäugigen hinreichend Stoff zum Nachlesen und Nachdenken bietet, sondern in seiner Kombination aus feministischer Cyberfiktion und kritischen Essays zu Utopien und Realitäten der zeitgenössischen Cyberkultur spannende Querverbindungen zwischen Theorie und Praxis herzustellen verspricht.In recent years there have been a number of debates and quite a few myths about feminist usage (if not conquest! of cyberspace. Nonetheless, feminist cyber culture continues to be marginalised both within mainstream media theory and within discourses about popular cyber culture. This is about to change: The anthology Reload, edited by multi-media artist Mary Flanagan and gender studies/media studies scholar Austin Booth, offers plenty of food for thought for a wide audience. The different pieces range from feminist cyber fiction to critical essays on utopias and realities of contemporary cyber culture, cleverly connecting theory and practice.

  6. 76 FR 50719 - Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace...

    Science.gov (United States)

    2011-08-16

    ...-02] Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace... comments regarding the governance structure for the National Strategy for Trusted Identities in Cyberspace... June 14, 2011, the National Institute of Standards and Technology (NIST) announced that it was...

  7. Harnessing the Power of Informal Learning: Using WeChat, the Semi-Synchronous Group Chat, to Enhance Spoken Fluency in Chinese Learners

    Science.gov (United States)

    Sadoux, Marion

    2017-01-01

    This research is an exploratory study that seeks to evaluate the potentials of the Chinese app WeChat to enhance the spoken fluency of learners of French in China, who report having limited and insufficient opportunities to practice speaking in their daily life. WeChat is an extremely popular instant messenger facilitating communication through a…

  8. Location based chat application for iPhone

    Science.gov (United States)

    Rana, Pradeep

    With the increasing use of mobile devices everywhere in the world, there is a lack of social interaction between people. The objective of this thesis project is to create a location based chat application, which will help users to interact with other people around them. It will provide an opportunity to meet people when someone visits a new place. The app will use GPS coordinates of the user and will show him a list of other users based on his location. The user can then choose any of the other users from the list and start chatting with them. This app will consist of a frontend and backend. The frontend will be an iOS application and the backend will be a PHP/MYSQL server.

  9. Learners’ Participation in Informal Japanese-English Internet Chat

    Directory of Open Access Journals (Sweden)

    Sarah Pasfield-Neofitou

    2009-12-01

    Full Text Available It has been widely claimed that computer mediated communication offers unique opportunities for language learners, including the ability to take on the roles of ‘writer’ and ‘reader’, ‘teacher’ and ‘learner’. Hence, it is important for teachers and learners to be aware of not only the linguistic and interactional characteristics of especially bilingual chat, but also how participants in an intercultural setting may switch between roles. Learning about one’s second language from a peer, and in turn, teaching that peer about one’s native language may allow both participants opportunities to develop as language experts.This article utilises naturalistic bilingual chat data and follow-up interviews to examine the implications of these findings for learners, teachers and researchers.

  10. Mind in the Gap Between Neural and Social Networks - Cyberspace and Virtual Reality in Psychiatry and Healthcare.

    Science.gov (United States)

    Šendula-Jengić, Vesna; Šendula-Pavelić, Martina; Hodak, Jelena

    2016-06-01

    In terms of health and healthcare cyberspace and virtual reality can be used differently and for different purposes and consequently create different outcomes. The three main areas which we shall discuss here are: 1) cyberspace as provider of health information and self-help resources, since the anonymity cyberspace provides is particularly important in the highly stigmatized field of psychiatry where a large number of people never seek professional help, which in turn negatively affects not only the person in question, but the family and ultimately the society (work efficiency, disability-adjusted life year - DALY, etc.), 2) cyberspace and virtual reality (VR) as cause of psychopathology, starting from violent behaviour, to addictive behaviour and other, 3) and finally cyberspace and VR as providers of efficient professional therapy in the field of psychiatry.

  11. Restrictions on running IRC (Internet Relay Chat) at CERN

    CERN Multimedia

    2005-01-01

    Due to the large number of computer security incidents at CERN where intruders have used IRC (Internet Relay Chat) software to control computers, IRC connections will be blocked in the CERN firewall from 1st February 2005. Personal use of IRC software is not permitted at CERN. Further details of the restrictions on both personal and professional use of IRC are documented at http://cern.ch/security/IRC.

  12. Designing a large-scale video chat application

    OpenAIRE

    Scholl, Jeremiah; Parnes, Peter; McCarthy, John D.; Sasse, Angela

    2005-01-01

    Studies of video conferencing systems generally focus on scenarios where users communicate using an audio channel. However, text chat serves users in a wide variety of contexts, and is commonly included in multimedia conferencing systems as a complement to the audio channel. This paper introduces a prototype application which integrates video and text communication, and describes a formative evaluation of the prototype with 53 users in a social setting. We focus the evaluation on bandwidth an...

  13. Collective emotion dynamics in chats with agents, moderators and Bots

    Directory of Open Access Journals (Sweden)

    M. Šuvakov

    2014-09-01

    Full Text Available Using agent-directed simulations, we investigate fluctuations in the collective emotional states on a chat network where agents interchange messages with a fixed number of moderators and emotional Bot. To design a realistic chat system, the interaction rules and some statistical parameters, as well as the agent's attributes, are inferred from the empirical chat channel Ubuntu. In the simulations, the Bot's emotion is fixed; the moderators tune the level of its activity by passing a fraction ε of messages to the Bot. At ε ≥ 0, the collective emotional state matching the Bot's emotion polarity gradually arises; the average growth rate of the dominant emotional charge serves as an order parameter. Due to self-organizing effects, the collective dynamics is more explosive when positive emotions arise by positive Bot than the onset of negative emotions in the presence of negative Bot at the same ε. Furthermore, when the emotions matching the Bot's emotion polarity are spread over the system, the underlying fractal processes exhibit higher persistence and stronger clustering of events than the processes spreading of emotion polarity opposite to the Bot's emotion. On the other hand, the relaxation dynamics is controlled by the external noise; the related nonextensive parameter, estimated from the statistics of returns, is virtually independent of the Bot's activity level and emotion contents.

  14. Recovery Room

    African Journals Online (AJOL)

    defined postoperative unit or on the hospital ward. Patients were frequently transferred from the operating room directly to the ward where they were placed close to the nursing station. In 1947 the. Anesthesia Study Commission of the Philadelphia.

  15. Student Safety from Cyberbullies, in Chat Rooms, and in Instant Messaging

    Science.gov (United States)

    Wolfsberg, Jeffrey S.

    2006-01-01

    Once, targets of bullying had to endure it only at school. Now, with the increasing prevalence of cyberbullying it can follow them home and go on 24 hours a day. For students who have been exposed to cyberbullying themselves, for parents who have either been exposed to it or are seeing their child experience it, and for educators who have either…

  16. Por que é difícil participar de Chats?

    Directory of Open Access Journals (Sweden)

    Heloísa Collins

    2003-01-01

    Full Text Available O chat é uma ferramenta e um serviço de comunicação síncrona na internet, cuja função educacional apresenta controvérsias nos meios acadêmicos. Possuindo interfaces supostamente intuitivas (salas de bate-papo em web, proporcionam, em tese, um meio fácil de usar e potencialmente rico para fins educacionais. Para testar esse meio, uma sessão de chat foi realizada com fins acadêmicos por estudantes e professores de uma disciplina de pós-graduação. Com seus propósitos aparentemente frustrados, essa sessão foi estudada sob instrumentais teórico-metodológicos diversos, no intuito de analisar, de diferentes ângulos, os obstáculos ao uso educacional do chat e sugerir algumas soluções. Com base nos turnos registrados pela ferramenta, foram analisadas as relações interpessoais e as dificuldades no ritmo da conversação; interações e dificuldades relativas a assimetrias, domínios e desenvolvimento de tópicos; fases da construção de conhecimento, e dificuldades técnico-operacionais. Entre os resultados convergentes das diversas análises, demonstrou-se principalmente o impacto da experiência prévia de uso da ferramenta para o sucesso do uso educacional do chat na evolução dos tópicos, no ritmo da conversação e nos domínios interacionais; também constatou-se o impacto do papel do professor e da experiência prévia nas fases de construção do conhecimento identificadas nos turnos dos alunos. Esses resultados sugerem que, para o chat ser proveitoso do ponto de vista educacional, é necessária uma preparação prévia cuidadosa. Para que a ferramenta possa ser mediadora de aprendizagem, é necessário evitar digressões, manter uma pequena variedade de tópicos e, portanto, um foco mais definido no tema programado para a discussão. Igualmente cuidadosa deve ser a mediação do professor para incentivar as problematizações e as sínteses, além de garantir, mediante o apoio aos turnos dos alunos menos experientes

  17. Perancangan Dan Pembuatan Pengamanan Video Chat Dengan Menggunakan Metode Enkripsi RC4

    OpenAIRE

    Putra, Stevie Suwanto; Budhi, Gregorius Satia; Andjarwirawan, Justinus

    2015-01-01

    Technological development at this time has been growing rapidly with the internet. Along with the development the more the usefulness of the Internet. Not only used for browsing, now the Internet is also used for communication. Such as email, chat, and etc. The increasing development of communication technology, then people start to think about the secure of the communication technology. As in a video chat, only the person entitled to know the information in the video chat. But the encryption...

  18. “New Weapons” of Ideological and Political Education in Universities—WeChat

    OpenAIRE

    Wei He; Ke Liang

    2014-01-01

    WeChat, a new instant messaging software, has been popularized nowadays. In order for WeChat to have the maximum impact on the ideological and political education areas, we need to have a deep understanding of the characteristics and regulars which attract students in the communication process, and combine WeChat platform with ideological and political education to attract students motivated to learn the content of ideological politics. This article, starting with college students, aims to un...

  19. Discourses of cyberspace securitization in Brazil and in the United States

    Directory of Open Access Journals (Sweden)

    LUÍSA CRUZ LOBATO

    2015-12-01

    Full Text Available Abstract This paper uses the framework of the Copenhagen School to understand the process of securitization of cyberspace, exploring how something in such sphere becomes a threat. Seeking to contribute to the debate, this study analyses the securitization discourses of Brazil and of the United States from Hansen and Nissenbaum's (2009 theorization about the existence of a specific sector for cybersecurity. To comprehend the securitization of cyberspace in these terms allows not only to identify distinct levels of securitization, but also to capture the dynamics of cyber threats, distinguishing them from those existent in other sectors, as well as to trace distinctions between tendencies of securitization and militarization.

  20. Conflict and cooperation in cyberspace the challenge to national security

    CERN Document Server

    Yannakogeorgos, Panayotis A

    2016-01-01

    Facilitated by the exceptional handiwork of the editors, this book significantly advances the effort to achieve common ground in the debates regarding cyberspace. National security and cyber-related professionals will find it equally useful in their work.-Lt. Gen Bob Elder, USAF (Retired)In this wide-ranging anthology that encompasses expert viewpoints from military, civilian, and private sector contributors, the editors seek to provide a broad framework of issues to be considered. Rather than provide definitive answers (all of the contributors readily admit that none exist), the contributors state that in order to attain the right answers, we must first ask the right questions. Over the course of the book, the authors put forth a common set of concerns to frame the issue at hand. ... The authors undertake a study of how to apply cyber law to cyber war, warning that allowing the Intelligence Community and the military to assist in the defense of privately owned networks may lead to legal and political consequ...

  1. Book Review: Digital Crime and Forensic Science in Cyberspace

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2006-12-01

    Full Text Available Kanellis, P., Kiountouzis, E., Kolokotronis, N., & Martakos, D. (2006. Digital Crime and Forensic Science in Cyberspace. Hershey, PA: Idea Group Publishing, 357 pages, ISBN: 1-59140-873-3 (paper, US$79.95.Reviewed by Gary C. KesslerThis book, according to the preface, "is intended for those who are interested in a critical overview of what forensic science is, care about privacy issues, and wish to know what constitutes evidence for computer crime." It goes on to say that the specific audiences for which it was written are students in academia and professionals in the industry.If used carefully, this book does a good job at providing a snapshot of some of the current issues in digital forensics, although perhaps best aimed at information security professionals. It is a collection of 15 chapters written by authors from Greece, Italy, The Netherlands, South Africa, the U.K., and the U.S. The international flavor of the writing is also welcome in the field.(see PDF for full review

  2. Nuclear industry powering up to tackle potential threats from cyberspace

    International Nuclear Information System (INIS)

    Shepherd, John

    2015-01-01

    In June 2015, the International Atomic Energy Agency (IAEA), in cooperation with international agencies including the crime-fighting organisation Interpol, will host a major conference on the protection of computer systems and networks that support operations at the world's nuclear facilities. According to the IAEA, the use of computers and other digital electronic equipment in physical protection systems at nuclear facilities, as well as in facility safety systems, instrumentation, information processing and communication, ''continues to grow and presents an ever more likely target for cyber-attack''. The international nuclear industry is right to take heed of ever-evolving security threats, deal with them accordingly, and be as open and transparent as security allows about what is being done, which will reassure the general public. However, the potential menace of cyberspace should not be allowed to become such a distraction that it gives those who are ideologically opposed to nuclear another stick with which to beat the industry.

  3. Nuclear industry powering up to tackle potential threats from cyberspace

    Energy Technology Data Exchange (ETDEWEB)

    Shepherd, John [nuclear 24, Brighton (United Kingdom)

    2015-06-15

    In June 2015, the International Atomic Energy Agency (IAEA), in cooperation with international agencies including the crime-fighting organisation Interpol, will host a major conference on the protection of computer systems and networks that support operations at the world's nuclear facilities. According to the IAEA, the use of computers and other digital electronic equipment in physical protection systems at nuclear facilities, as well as in facility safety systems, instrumentation, information processing and communication, ''continues to grow and presents an ever more likely target for cyber-attack''. The international nuclear industry is right to take heed of ever-evolving security threats, deal with them accordingly, and be as open and transparent as security allows about what is being done, which will reassure the general public. However, the potential menace of cyberspace should not be allowed to become such a distraction that it gives those who are ideologically opposed to nuclear another stick with which to beat the industry.

  4. Research on Human Dynamics of Information Release of WeChat Users

    OpenAIRE

    Zhang, Juliang; Zhang, Shengtai; Duo, Fan; Wang, Feifei

    2017-01-01

    The information release behavior of WeChat users is influenced by many factors, and studying the rules of the behavior of users in WeChat can provide theoretical help for the dynamic research of mobile social network users. By crawling WeChat moments information of nine users within 5 years, we used the human behavioral dynamics system to analyze users' behavior. The results show that the information distribution behavior of WeChat users is consistent with the power-law distribution for a cer...

  5. Introduction to the WeChat marketing advantages and development prospects

    OpenAIRE

    Liang, Yi

    2014-01-01

    WeChat is evolved into a large commercial trading platform, and this can be the further research of this thesis. According to the development of WeChat, the consumers can realize the integration service mode of the commodity inquiry, the choose and buy, experience, interactive, online ordering and paying, as long as consumers by WeChat platform.. The objective of this thesis was to introduce the advantages of WeChat and its development prospects. The main research is focus on the analysis...

  6. UChat: chat accesible para la Universidad Carlos III de Madrid

    OpenAIRE

    García Morales, Pablo

    2015-01-01

    En los últimos años se ha producido un increíble aumento en el uso de aplicaciones en telefonía gracias al auge de los teléfonos inteligentes, especialmente las aplicaciones de mensajería instantánea de tipo chat. Estas aplicaciones, además, en los últimos años se han ido utilizando cada vez más en docencia, facilitando la comunicación entre alumnos y profesores en todo momento. A pesar de su popularidad, todavía presentar barreras de accesibilidad que impiden que muchas personas (personas co...

  7. The functionalities of mobile applications : case study: WeChat

    OpenAIRE

    Dai, Si; Zhang, Xin

    2015-01-01

    The objective of this thesis is to find out the functionalities of mobile application. And the purpose of this study is to make a research on WeChat’s functionalities. A native application and mobile web application are the two different types of mobile applications. When designers start to create an application, companies need to discuss which type of app is more suitable for business targets. Each has both pros and cons which influence companies’ choice. WeChat is a popular mobile applicati...

  8. Options of system integrated environment modelling in the predicated dynamic cyberspace

    Energy Technology Data Exchange (ETDEWEB)

    Janková, Martina; Dvořák, Jiří [Institute of Informatics, Faculty of Business and Management, Brno University of Technology, Brno (Czech Republic)

    2015-03-10

    In this article there are briefly mentioned some selected options of contemporary conception of cybernetic system models in the corresponding and possible integratable environment with modern system dynamics thinking and all this in the cyberspace of possible projecting of predicted system characteristics. The key to new capabilities of system integration modelling in the considered cyberspace is mainly the ability to improve the environment and the system integration options, all this with the aim of modern control in the hierarchically arranged dynamic cyberspace, e.g. in the currently desired electronic business with information. The aim of this article is to assess generally the trends in the use of modern modelling methods considering the cybernetics applications verified in practice, modern concept of project management and also the potential integration of artificial intelligence in the new projecting and project management of integratable and intelligent models, e.g. with the optimal structures and adaptable behaviour.The article results from the solution of a specific research partial task at the faculty; especially the moments proving that the new economics will be based more and more on information, knowledge system defined cyberspace of modern management, are stressed in the text.

  9. Options of system integrated environment modelling in the predicated dynamic cyberspace

    International Nuclear Information System (INIS)

    Janková, Martina; Dvořák, Jiří

    2015-01-01

    In this article there are briefly mentioned some selected options of contemporary conception of cybernetic system models in the corresponding and possible integratable environment with modern system dynamics thinking and all this in the cyberspace of possible projecting of predicted system characteristics. The key to new capabilities of system integration modelling in the considered cyberspace is mainly the ability to improve the environment and the system integration options, all this with the aim of modern control in the hierarchically arranged dynamic cyberspace, e.g. in the currently desired electronic business with information. The aim of this article is to assess generally the trends in the use of modern modelling methods considering the cybernetics applications verified in practice, modern concept of project management and also the potential integration of artificial intelligence in the new projecting and project management of integratable and intelligent models, e.g. with the optimal structures and adaptable behaviour.The article results from the solution of a specific research partial task at the faculty; especially the moments proving that the new economics will be based more and more on information, knowledge system defined cyberspace of modern management, are stressed in the text

  10. Gardening in Cyberspace: A Metaphor to Enhance Online Teaching and Learning.

    Science.gov (United States)

    May, Gary L.; Short, Darren

    2003-01-01

    Uses the metaphor of gardening in cyberspace as a guide to the creation of an environment that fosters learning and growth in online courses. Draws analogies between good gardening practices and online teaching practices, instructional design, and course management techniques. Contains 63 references. (SK)

  11. MS PHD'S Professional Development Program: A Scientific Renaissance in Cyberspace

    Science.gov (United States)

    Powell, J. M.; Williamson, V. A.; Griess, C. A.; Pyrtle, A. J.

    2004-12-01

    successful cyberspace programs and networks. Through the examination of the transformation, expansion and democratization of the Earth system science community, new knowledge will be obtained on how a cyber-community fuses science, diversity and technology to form dialectics between creating and analyzing a Scientific Renaissance.

  12. Peer counseling in an online chat service: a content analysis of social support

    NARCIS (Netherlands)

    Fukkink, R.

    2011-01-01

    In a recently launched one-on-one chat service for young people with psychosocial problems, young peer volunteers (ages 16-23) have a leading role in the conversations, comparable to the role of counselors in web-based and telephone-based child help-line services. A content analysis of the chat

  13. Look at That! Video Chat and Joint Visual Attention Development among Babies and Toddlers

    Science.gov (United States)

    McClure, Elisabeth R.; Chentsova-Dutton, Yulia E.; Holochwost, Steven J.; Parrott, W. G.; Barr, Rachel

    2018-01-01

    Although many relatives use video chat to keep in touch with toddlers, key features of adult-toddler interaction like joint visual attention (JVA) may be compromised in this context. In this study, 25 families with a child between 6 and 24 months were observed using video chat at home with geographically separated grandparents. We define two types…

  14. Color Visions from the Past in Science Teaching within a Cultural Historical Activity Theory (CHAT) Context

    Science.gov (United States)

    Kolokouri, Eleni; Plakitsi, Katerina

    2012-01-01

    This study uses history of science in teaching natural sciences from the early grades. The theoretical framework used is Cultural Historical Activity Theory (CHAT), which is a theory with expanding applications in different fields of science. The didactical scenario, in which history of science is used in a CHAT context, refers to Newton's…

  15. Adding a Feature: Can a Pop-Up Chat Box Enhance Virtual Reference Services?

    Science.gov (United States)

    Fan, Suhua Caroline; Fought, Rick L; Gahn, Paul C

    2017-01-01

    Online users seek help from virtual reference services via email, phone, texting, and live chat. Technologies have enabled new features in library websites to help make this service more accessible and effective. This article is an evaluation of an experimental pop-up live chat box on the website of a health sciences library to see whether the feature would enhance virtual reference services.

  16. Evaluating a Chat Reference Service at the University of South Alabama's Baugh Biomedical Library

    Science.gov (United States)

    Clanton, Clista C.; Staggs, Geneva B.; Williams, Thomas L.

    2006-01-01

    The University of South Alabama's Baugh Biomedical Library recently initiated a chat reference service targeted at distance education students in the biomedical sciences. After one year of service, the library conducted an evaluation of the chat reference to assess the success of this mode of reference service. Both traditional reference and…

  17. Goethe Gossips with Grass: Using Computer Chatting Software in an Introductory Literature Course.

    Science.gov (United States)

    Fraser, Catherine C.

    1999-01-01

    Students in a third-year introduction to German literature course chatted over networked computers, using "FirstClass" software. A brief description of the course design is provided with detailed information on how the three chat sessions were organized. (Author/VWL)

  18. Modelo Empírico, Descriptivo y Predictivo Para el Compromiso de Identidad en el Chat en Adolescentes Escolares Chilenos Empirical, Descriptive and Predictive Model for Identity Involvement in Chat use by Chilean School Adolescents

    Directory of Open Access Journals (Sweden)

    María Paz Altuzarra

    2007-11-01

    Full Text Available Se desarrolla un modelo empírico, descriptivo y predictivo de regresión múltiple de las relaciones entre compromiso de identidad en el Chat y salud mental, sexo, curso y tipo de Chat en una muestra de 385 alumnos de ambos sexos, de I, II, III y IV Medio de tres colegios de Santiago de Chile. Se aplicó un cuestionario sobre uso de Internet, Escala de Compromiso de Identidad en el Chat y Cuestionario de Salud Mental en la Edad Juvenil. Se encontró que tanto la salud mental como el tipo de Chat predecían el compromiso de la identidad en el Chat. Se observó un mayor compromiso entre jóvenes mujeres de I y II Medio y que empleaban Chat abierto o mixto.An empirical descriptive and predictive model of multiple regression on the relationships between identity involvement in the Chat and mental health, sex, grade and modality of Chat in a sample of 385 male and female high school students, from Santiago de Chile, is presented. The instruments used were: a questionnaire about Internet usage, an Identity Compromise Scale in the Chat and a Youth Mental Health Scale. Results indicate that both, mental health and type of Chat, predicted compromise of identity in the Chat. It was observed a greater compromise among female teenagers from 9th and 10th grade who used open and mixed Chat.

  19. Nosql Technology In Android Based Mobile Chat Application Using Mongodb

    Directory of Open Access Journals (Sweden)

    Yovita Tunardi

    2014-12-01

    Full Text Available Along with the development of data storage technology which previously using relational concept began to change to the non-relational concept or sometimes referred to as the term NoSQL technology. Data storage in NoSQL is no longer based on the relations between tables but using another methods, one of them is document-oriented. This method was applied specifically in MongoDB. This concept brings new hope because oftheir superiority that can handle very large data with promising performance and is perfect for agile system development. The purpose of this research was to measure the performance NoSQL, especially MongoDB with implemented it in a Android based mobile chat application. This research uses three methods, analysis method including literature study, analysis of similar application, questionnaires, design method using Agile SofwareDevelopment, and evaluation method including eight golden rules, analysis of similar application, questionnaires, and interview. The results of this research is a mobile chat application that uses MongoDB as the data storage technology. Through this research can be drawn the conclusion that NoSQL technology implementation, MongoDB, give special advantages like lighter data storage and faster data access.

  20. Technical Evaluation Report 6: Chat and Instant Messaging Systems

    Directory of Open Access Journals (Sweden)

    Jennifer Stein

    2002-04-01

    Full Text Available Text-based conferencing can be both asynchronous (i.e., participants log into the conference at separate times, and synchronous (i.e., interaction takes place in real time. It is thus subject to the same wide variation as the online audio- and video-conferencing methods (see the earlier Reports in this series. Synchronous text-based approaches (e.g., online chat groups and instant messaging systems are highly popular among online users generally owing to their ability to bring together special-interest groups from around the world without cost. In distance education (DE, however, synchronous chat methods are less widely used, owing in part to the problems of arranging for working adults in different time zones to join a discussion group simultaneously. Instant text messaging is more popular among DE users in view of the choice it provides between responding to a message immediately (synchronous communication or after a delay (asynchronous. The different synchronous and asynchronous approaches are likely to become more widely used in parallel with one another, as they are integrated in individual product packages.

  1. Chaotic Traversal (CHAT): Very Large Graphs Traversal Using Chaotic Dynamics

    Science.gov (United States)

    Changaival, Boonyarit; Rosalie, Martin; Danoy, Grégoire; Lavangnananda, Kittichai; Bouvry, Pascal

    2017-12-01

    Graph Traversal algorithms can find their applications in various fields such as routing problems, natural language processing or even database querying. The exploration can be considered as a first stepping stone into knowledge extraction from the graph which is now a popular topic. Classical solutions such as Breadth First Search (BFS) and Depth First Search (DFS) require huge amounts of memory for exploring very large graphs. In this research, we present a novel memoryless graph traversal algorithm, Chaotic Traversal (CHAT) which integrates chaotic dynamics to traverse large unknown graphs via the Lozi map and the Rössler system. To compare various dynamics effects on our algorithm, we present an original way to perform the exploration of a parameter space using a bifurcation diagram with respect to the topological structure of attractors. The resulting algorithm is an efficient and nonresource demanding algorithm, and is therefore very suitable for partial traversal of very large and/or unknown environment graphs. CHAT performance using Lozi map is proven superior than the, commonly known, Random Walk, in terms of number of nodes visited (coverage percentage) and computation time where the environment is unknown and memory usage is restricted.

  2. Creators Room

    DEFF Research Database (Denmark)

    Iversholt, Lene; Iversholt Toft, Karina

    2012-01-01

    Creators Room er et koncept til daginsitutioner, der indrammer og giver bud på en forståelse mellem inkluderende pædagogik og fysiske rammer. Konceptet er udviklet i et tværfagligt procesforløb, hvor formålet har været at skabe stadig bedre indendørsmiljøer for børn ved at forene pædagogiske...

  3. Chat-Bots for People with Parkinson's Disease: Science Fiction or Reality?

    Science.gov (United States)

    Ireland, David; Liddle, Jacki; McBride, Simon; Ding, Hang; Knuepffer, Christina

    2015-01-01

    People with Parkinson's disease are known to have difficulties in language and communication. This paper proposes the use of an artificial conversational agent, commonly known as a chat-bot that runs on a smart-phone device and performs two-way conversation with the user. In this paper, initial work on a Parkinson's disease themed chat-bot that interacts with the user relative to their symptoms is presented. Potential dialogues are provided to illustrate the various roles chat-bots can play in the management of Parkinson's disease. The chat-bot can be used for measuring voice and communication outcomes during the daily life of the user, and for gaining information about challenges encountered. Moreover, it is anticipated that it may also have an educational and support role. The chat-bot is now ready for usability testing with a clinical population.

  4. WeChat Addiction Suppresses the Impact of Stressful Life Events on Life Satisfaction.

    Science.gov (United States)

    Li, Bi; Wu, Yan; Jiang, Shengyi; Zhai, Huizhen

    2018-03-01

    The current study examined the influences of stressful life events and WeChat addiction on life satisfaction, and investigated the mediating role of WeChat addiction on the relationship between the two research variables. A total of 463 undergraduates completed self-reported scales for stressful life events, WeChat addiction, and life satisfaction. Structural equation modeling was used to analyze the questionnaire data. The results showed the suppressing effect of WeChat addiction on the negative impact of stressful life events on life satisfaction. Stressful life events affect life satisfaction both directly and indirectly. Stressful life events are positively associated with WeChat addiction, which exerts positive impact on life satisfaction. The contributions of the findings are discussed.

  5. Exploring the Affordances of WeChat for Facilitating Teaching, Social and Cognitive Presence in Semi-Synchronous Language Exchange

    Science.gov (United States)

    Wang, Yuping; Fang, Wei-Chieh; Han, Julia; Chen, Nian-Shing

    2016-01-01

    This research is an exploratory study that evaluates the affordances of WeChat for the development of a community of inquiry (CoI) in semi-synchronous language exchange supported by WeChat. WeChat is an instant messenger that facilitates a multimodal environment in which interaction can happen synchronously, semi-synchronously and asynchronously…

  6. Cyberanalysis: Transference and Its Management in the Cyberspace

    Directory of Open Access Journals (Sweden)

    Parviz Bahadoran

    2006-05-01

    Full Text Available Objective: As psychiatrists or psychotherapists, many of us may have had contact with people by e-mail and/or through online ‘chat rooms’. These people may write to us about their various problems, especially in their interpersonal relationships; discuss their queries about conflicts with their spouse, partner, and friends; or complained of low self-esteem and problems at work. In this article, we will try to discuss certain considerations and opinions about the possibility of insight-oriented psychotherapy in the domain of ‘virtual reality'. Method: This study was based on clinical observation of the first author. Two cases of ‘Cyberanalysis’ were described. The management of transference and countertransference, the analysis of defenses in this context, and possible reasons for success and failure of each case were discussed. Results: We have witnessed the formation of a transferential relationship between the ‘client’ and the therapists after a matter of months. One of the client had a satisfactory outcome and the other represented a therapeutic failure. Conclusion: This type of psychotherapy may provide a novel opportunity for therapists to move toward the internal world of the patient Compared to ‘real world’ therapies. This modality of therapy also has its own advantages and shortcomings.

  7. Changing communities, changing spaces: the challenges of health promotion outreach in cyberspace.

    Science.gov (United States)

    Hallett, Jonathan; Brown, Graham; Maycock, Bruce; Langdon, Patricia

    2007-01-01

    This article is a case study of an Internet chat room outreach project in Perth, Western Australia. The CyberReach project sought to adapt current peer based health promotion outreach, training and supervision frameworks to an online outreach setting in a way that was effective and supported by the online community. It targeted marginalised groups to trial the provision of online mental and sexual health promotion incorporating a participatory action research model into its development and implementation. Three 6-week trial periods were conducted and significant changes were made in response to changes in the online environment and to improve sustainability and effectiveness of the protocols. Four themes arose from CyberReach's experience: online group processes are unique due to the creation of extensive personal networks and occurrence of disclosure without face-to-face contact across potentially large geographic barriers; flexibility is required to adapt to technological changes and online community flux; enforcing boundaries and delineating peer education from therapeutic support can be challenging when only using text-based communication; and Internet outreach can be time intensive with small returns in actual community engagement and constant technological up-skilling of staff may be required. Based on the project's experiences we offer the following recommendations when planning similar Internet outreach strategies: Funding and planning groups need to be aware that the Internet environment is constantly changing and planning and funding arrangements need to reflect a capacity to remain flexible; Programs need to be firmly connected to the communities they are outreaching therefore a peer-based education component is strongly encouraged; Careful consideration should be taken regarding data collection so that the environment and the individuals within are respected; Further research needs to be conducted to understand the styles and approaches of different

  8. Dan Goldin chats with First Lady Hillary Clinton

    Science.gov (United States)

    1999-01-01

    At the Apollo/Saturn V Center, NASA Administrator Daniel Goldin (right) chats with First Lady Hillary Rodham Clinton and others while waiting for the launch of STS-93. Much attention has been generated over STS-93 due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. The primary payload of the five-day mission is the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X-ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes. Liftoff of Space Shuttle Columbia is scheduled for 12:36 a.m. EDT July 20.

  9. Hello Harlie: Enabling Speech Monitoring Through Chat-Bot Conversations.

    Science.gov (United States)

    Ireland, David; Atay, Christina; Liddle, Jacki; Bradford, Dana; Lee, Helen; Rushin, Olivia; Mullins, Thomas; Angus, Dan; Wiles, Janet; McBride, Simon; Vogel, Adam

    2016-01-01

    People with neurological conditions such as Parkinson's disease and dementia are known to have difficulties in language and communication. This paper presents initial testing of an artificial conversational agent, called Harlie. Harlie runs on a smartphone and is able to converse with the user on a variety of topics. A description of the application and a sample dialog are provided to illustrate the various roles chat-bots can play in the management of neurological conditions. Harlie can be used for measuring voice and communication outcomes during the daily life of the user, and for gaining information about challenges encountered. Moreover, it is anticipated that she may also have an educational and support role.

  10. A CHAT Perspective on Mobile Technology in Education

    DEFF Research Database (Denmark)

    Stenild, Kåre; Iversen, Ole Sejer

    The body of research within the design of mobile technology for use in k-12 education has primarily focused on the features and thereby new options that are brought about when utilizing mobile technologies in education. However, the theoretical concern for mobile technology’s effect on the child......’s development is not yet fully covered. In this paper we argue that mobile technology is a valuable resource in K-12 education. Based on CHAT theory, we argue that mobile technology potentially mediates subject matter knowledge and everyday knowledge and thereby supports the child to acquire valuable......Bag) in a participatory design context involving both teachers and students in the process. A four-month evaluation of the final version of the eBag was conducted to make a preliminary evaluation of the possibilities of mobile supported education. The result of this preliminary evaluation indicates that mobile technology...

  11. Twitter Chats as a Research Tool: A Study of Young Adult Financial Decisions

    Directory of Open Access Journals (Sweden)

    Barbara O’Neill

    2018-02-01

    Full Text Available Many researchers collect online survey data because it is cost-effective and less time-consuming than traditional research methods. This paper describes Twitter chats as a research tool vis-à-vis two other online research methods: providing links to electronic surveys to respondents and use of commercially available survey panels through vendors with readily available respondents. Similar to a face-to-face focus group, Twitter chats provide a synchronous environment for participants to answer a structured series of questions and to respond to both the chat facilitator and each other. This paper also reports representative responses from a Twitter chat that explored financial decisions of young adults. The chat was sponsored by a multi-state group of land-grant university researchers, in cooperation with WiseBread, a personal finance website targeted to millennials, to recruit respondents for a more extensive month-long online survey about the financial decisions of young adults. The Twitter chat responses suggest that student loans were the top concern of participants, and debt and housing rounded out the top three concerns. The internet, both websites and social media, was the most frequently cited source of financial information. The article concludes with a discussion of lessons learned from the Twitter chat experience and suggestions for professional practice.

  12. Emotion Chat: A Web Chatroom with Emotion Regulation for E-Learners

    Science.gov (United States)

    Zheng, Deli; Tian, Feng; Liu, Jun; Zheng, Qinghua; Qin, Jiwei

    In order to compensate for lack of emotion communication between teachers and students in e-learning systems, we have designed and implemented the EmotionChat -- a web chatroom with emotion regulation. EmotionChat perceives e-learners' emotional states based on interactive text. And it recommends resources such as music, cartoons, and mottos to an e-learner when it detects negative emotional states. Meanwhile, it recommends emotion regulation cases to the e-learner's listeners and teachers. The result of our initial experiment shows that EmotionChat can recommend valuable emotion regulation policies for e-learners.

  13. Unified underpinning of human mobility in the real world and cyberspace

    Science.gov (United States)

    Zhao, Yi-Ming; Zeng, An; Yan, Xiao-Yong; Wang, Wen-Xu; Lai, Ying-Cheng

    2016-05-01

    Human movements in the real world and in cyberspace affect not only dynamical processes such as epidemic spreading and information diffusion but also social and economical activities such as urban planning and personalized recommendation in online shopping. Despite recent efforts in characterizing and modeling human behaviors in both the real and cyber worlds, the fundamental dynamics underlying human mobility have not been well understood. We develop a minimal, memory-based random walk model in limited space for reproducing, with a single parameter, the key statistical behaviors characterizing human movements in both cases. The model is validated using relatively big data from mobile phone and online commerce, suggesting memory-based random walk dynamics as the unified underpinning for human mobility, regardless of whether it occurs in the real world or in cyberspace.

  14. Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications

    Science.gov (United States)

    2014-10-01

    testimony before the Sen - ate Armed Service Committee in March 2011. In fact, his statement that “the next Pearl Harbor we confront 5 could very well...in Military Domains. The dynamic nature of cyberspace adds more con- ceptual hurdles for decisionmakers trying to make sense of activities. The...severity of the incident as well as the appropriateness, necessity, and urgency to respond? Legal Frameworks. The purpose here is to describe what exists

  15. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    victims would fall prey to the attack vector. Both state and non-state actors alike, driven by a combination of intrinsic and extrinsic motivations ...different roles, motivations , and intentions. Associated complexities of safeguarding cyberspace contribute to the lack of a United States (US... psychological operations. The infosphere is also the entity that DOD doctrine refers to as the information environment in which humans and automated

  16. Cyber as a Team Sport: Operationalizing a Whole-Of-Government Approach to Cyberspace Operations

    Science.gov (United States)

    2011-06-07

    July 2010-7 June 2011 4. TITLE AND SUBTITLE • -~ ·- ~ I 5a. CONTRACT NUMBER CYBER AS A "TEAM SPORT ": OPERATIONALIZING A WHOLE-OF-GOVERNMENT APPROACH...JOINT FORCES STAFF COLLEGE JOINT ADVANCED WARFIGHTING SCHOOL CYBER AS A “TEAM SPORT ”: OPERATIONALIZING A WHOLE-OF- GOVERNMENT APPROACH...TO CYBERSPACE OPERATIONS by Elizabeth A. Myers Department of Defense CYBER AS A "TEAM SPORT ": OPERATIONALIZING A WHOLE-OF· GOVERNMENT

  17. Cyberspace Human Capital: Building a Cadre Today to Win Tomorrows War

    Science.gov (United States)

    2016-04-28

    U.S. homeland and U.S. vital interests from disruptive or destructive cyber [space] attacks of significant consequence. DoD Strategic Goal #4: Build...and maintain viable cyber [space] options and plan to use those options to control conflict escalation and to shape the conflict environment at all...strategies like cyberspace denial operations, espionage activities and anti-access/area-denial (A2/AD) strategies, turning traditional mass and maneuver

  18. Iran Election, Cyber-Statehood, and the Mass Mediated Fight for Cyberspace

    DEFF Research Database (Denmark)

    Andersen, Rune Saugmann

    2011-01-01

    The 2009 post-election crisis in Iran positioned Iranian unrest on front pages, newscasts, and blogs around the world, spurring intense debate and many attempts to influence the power struggle between Iranian authorities and the ‘green’ dissident movement. This paper explores how international ne...... a battle for the properties and values of cyberspace, struggling over the meaning of free online speech and primacy of states and sovereignty in international relations....

  19. LibraryH3lp: A New Flexible Chat Reference System

    Directory of Open Access Journals (Sweden)

    Pam Sessoms

    2008-09-01

    Full Text Available LibraryH3lp is an integrated IM and web chat system designed specifically for Virtual Reference services in libraries. The software was designed for, and is currently used by, a night-time chat reference collaboraton between several large academic libraries. LibraryH3lp is designed for the workflow of chat reference, supporting multiple simultaneous operators and routing to queues of operators in a particular service area. It also supports web page embeddable chat 'widgets', as well as simultaneous gateways to multiple IM protocols. This article discusses the motivation for the development of the software, and provides an overview of LibraryH3lp's features and technical architecture. Parts of LibraryH3lp are available as open source. The complete application is available as a low-cost hosted service, and will eventually be available to be licensed for local hosting.

  20. Optical test course teaching practice on WeChat public platform

    Science.gov (United States)

    Fu, Yuegang; Liu, Zhiying

    2017-08-01

    With the development of information technological progress, M-Learning and Micro-learning is becoming more and more popular among learners as a new micro-learning resources. Micro-curriculum is playing a more and more important role in daily learning. The students can create a new way of optical course learning through "WeChat". Under the mutual interaction of two or more parties, the use of "WeChat" can fully arouse the students' interest in learning, make the subjective initiative of students, and achieve the ultimate goal of improving the level of students. In this paper, through the analysis of the current situation of college students using the "WeChat", a new teaching model suitable for "optics" teaching is summarized, and the use of "WeChat" has been infiltrated into the teaching process, using science and technology to assist teaching. Students' interest in autonomous learning.

  1. "Live Chat" Clients at Kids Help Phone: Individual Characteristics and Problem Topics.

    Science.gov (United States)

    Haner, Dilys; Pepler, Debra

    2016-01-01

    Young people in Canada prefer to use the Internet over face-to-face contact when seeking help for problems of daily living and mental health problems. Kids Help Phone (KHP) provides on-demand, anonymous help to young people via telephone and Live Chat technologies. Two hundred thirty-two phone clients and 230 Live Chat clients responded to a questionnaire at this otherwise anonymous service, providing previously inaccessible data about their individual characteristics and characterizations of the problems for which they sought help. There was a larger proportion of weighty problems (mental health and suicide) among chatters than callers. There were also more non-heterosexual youth, and those who identified as Asian and Black African or Caribbean, using Live Chat than phone. Implications for training Live Chat counsellors to respond effectively to chatters are discussed.

  2. Conversation Thread Extraction and Topic Detection in Text-Based Chat

    National Research Council Canada - National Science Library

    Adams, Paige H

    2008-01-01

    Text-based chat systems are widely used within the Department of Defense, but the standard systems available do not provide robust capabilities for search, information retrieval, or information assurance...

  3. Some reflections on non-contractual obligations in cyberspace considering the Rome II regulation

    Directory of Open Access Journals (Sweden)

    Mierina A.

    2014-01-01

    Full Text Available Internet penetration has created a revolutionary change in people's communication nowadays. By creating immaterial and elusive cyberspace, without borders and limits of communication a three-dimensional territorial concept has been transformed by globalizing social relations and reducing importance of regional or national dimensions. All situations taking place on the Internet also occur somewhere in the reality. Sometimes it is difficult to measure whether the events are random or unrelated to particular events. Technological progress offers new possibilities to change a user's real location either consciously or subconsciously. However, the law is highly territorial in nature. This article focuses on existing conflict of law rules under the EU law and reveals its weaknesses in relation to non-contractual obligations caused by the Internet. Therefore, the author observes core concepts of the applicable law by analyzing the legal notions and information technology concepts and assessing the suitability of regulation in cyberspace. The EU regulation, the doctrine of European and domestic authors as well as the EU case law have been examined. As a result, a number of conclusions have been drawn on the suitability of non-contractual relationships in cyberspace considering Rome II Regulation.

  4. Bla-bla-bla: video chat service on the Internet - a market feasibility study

    OpenAIRE

    Lindgreen, Adam; Antioco, Michael; Wetzels, Martin

    2004-01-01

    The Internet is changing the way that companies carry out their business and, in fact, constitutes an entirely new application domain, which makes product innovation possible. Moreover, it is a new medium for reaching consumers, which is a central preoccupation to organisations in the current business market. Here interest lies in video chatting on the Internet. This is a type of service that adds video support to chatting using a Web cam and is gradually attracting more Internet users. The p...

  5. Implementación de un bot de ChatOps compatible con varias plataformas de chat para interactuar con un entorno basado en microservicios

    OpenAIRE

    Arenas Rodríguez, David

    2017-01-01

    ChatOps, un término atribuido a GitHub, representa un modelo de desarrollo de software en el que la mayor parte de las operaciones se realizan a través de un chat, donde un equipo se comunica con un bot que interpreta comandos escritos por los usuarios y permite automatizar numerosas tareas del flujo de trabajo. Éstas pueden ser prácticamente cualquier cosa: desde revisión de código, compilación, tests, actualización y despliegue de servicios, hasta avisos, control y asignación de tareas, con...

  6. Learning patterns of life from intelligence analyst chat

    Science.gov (United States)

    Schneider, Michael K.; Alford, Mark; Babko-Malaya, Olga; Blasch, Erik; Chen, Lingji; Crespi, Valentino; HandUber, Jason; Haney, Phil; Nagy, Jim; Richman, Mike; Von Pless, Gregory; Zhu, Howie; Rhodes, Bradley J.

    2016-05-01

    Our Multi-INT Data Association Tool (MIDAT) learns patterns of life (POL) of a geographical area from video analyst observations called out in textual reporting. Typical approaches to learning POLs from video make use of computer vision algorithms to extract locations in space and time of various activities. Such approaches are subject to the detection and tracking performance of the video processing algorithms. Numerous examples of human analysts monitoring live video streams annotating or "calling out" relevant entities and activities exist, such as security analysis, crime-scene forensics, news reports, and sports commentary. This user description typically corresponds with textual capture, such as chat. Although the purpose of these text products is primarily to describe events as they happen, organizations typically archive the reports for extended periods. This archive provides a basis to build POLs. Such POLs are useful for diagnosis to assess activities in an area based on historical context, and for consumers of products, who gain an understanding of historical patterns. MIDAT combines natural language processing, multi-hypothesis tracking, and Multi-INT Activity Pattern Learning and Exploitation (MAPLE) technologies in an end-to-end lab prototype that processes textual products produced by video analysts, infers POLs, and highlights anomalies relative to those POLs with links to "tracks" of related activities performed by the same entity. MIDAT technologies perform well, achieving, for example, a 90% F1-value on extracting activities from the textual reports.

  7. Advanced tools for enhancing control room collaborations

    International Nuclear Information System (INIS)

    Abla, G.; Flanagan, S.M.; Peng, Q.; Burruss, J.R.; Schissel, D.P.

    2006-01-01

    The US National Fusion Collaboratory (NFC) project has been exploring a variety of computer and network technologies to develop a persistent, efficient, reliable and convenient collaborative environment for magnetic fusion research. One goal is to enhance remote and collocated team collaboration by integrating collaboration software tools into control room operations as well as with data analysis tools. To achieve this goal, the NFC recently introduced two new collaboration technologies into the DIII-D tokamak control room. The first technology is a high-resolution, large format Shared Display Wall (SDW). By creating a shared public display space and providing real time visual information about the multiple aspects of complex experiment activity, the large SDW plays an important role in increasing the rate of information dissemination and promoting interaction among team members. The second technology being implemented is the 'tokamak control room aware' Instant Messaging (IM) service. In addition to providing text-chat capabilities for research scientists, it enables them to automatically receive information about experiment operations and data analysis processes to remotely monitor the status of ongoing tokamak experiment. As a result, the IM service has become a unified portal interface for team collaboration and remote participation

  8. Advanced tools for enhancing control room collaborations

    Energy Technology Data Exchange (ETDEWEB)

    Abla, G. [General Atomics, P.O. Box 85608, San Diego, CA 92186 5608 (United States)]. E-mail: abla@fusion.gat.com; Flanagan, S.M. [General Atomics, P.O. Box 85608, San Diego, CA 92186 5608 (United States); Peng, Q. [General Atomics, P.O. Box 85608, San Diego, CA 92186 5608 (United States); Burruss, J.R. [General Atomics, P.O. Box 85608, San Diego, CA 92186 5608 (United States); Schissel, D.P. [General Atomics, P.O. Box 85608, San Diego, CA 92186 5608 (United States)

    2006-07-15

    The US National Fusion Collaboratory (NFC) project has been exploring a variety of computer and network technologies to develop a persistent, efficient, reliable and convenient collaborative environment for magnetic fusion research. One goal is to enhance remote and collocated team collaboration by integrating collaboration software tools into control room operations as well as with data analysis tools. To achieve this goal, the NFC recently introduced two new collaboration technologies into the DIII-D tokamak control room. The first technology is a high-resolution, large format Shared Display Wall (SDW). By creating a shared public display space and providing real time visual information about the multiple aspects of complex experiment activity, the large SDW plays an important role in increasing the rate of information dissemination and promoting interaction among team members. The second technology being implemented is the 'tokamak control room aware' Instant Messaging (IM) service. In addition to providing text-chat capabilities for research scientists, it enables them to automatically receive information about experiment operations and data analysis processes to remotely monitor the status of ongoing tokamak experiment. As a result, the IM service has become a unified portal interface for team collaboration and remote participation.

  9. Using a book chat to improve attitudes and perceptions of long-term care staff about dementia.

    Science.gov (United States)

    Larocque, Natasha; Schotsman, Chloe; Kaasalainen, Sharon; Crawshaw, Diane; McAiney, Carrie; Brazil, Emma

    2014-05-01

    This study sought to evaluate a book chat intervention based on Lisa Genova's novel, Still Alice, to influence long-term care (LTC) staff perceptions and attitudes when caring for individuals with dementia. A qualitative descriptive design was used. Eleven participants partook in a 2.5-hour book chat at a southern Ontario LTC facility. Following the book chat, participants answered two open-ended questions to assess how the book chat influenced their views on dementia. Thematic content analysis was used to analyze the qualitative questionnaire. Content analysis of the participants' responses revealed that the book chat positively influenced their attitudes and perceptions toward dementia, particularly by providing more insight into the individual's personal struggle with the disease. Furthermore, participants found that the book chat influenced their care practices. By creating innovative learning opportunities, attitudes and perceptions about dementia care can be transcended and greatly benefit staff, family, and residents. Copyright 2014, SLACK Incorporated.

  10. Video chat technology to remotely quantify dietary, supplement and medication adherence in clinical trials.

    Science.gov (United States)

    Peterson, Courtney M; Apolzan, John W; Wright, Courtney; Martin, Corby K

    2016-11-01

    We conducted two studies to test the validity, reliability, feasibility and acceptability of using video chat technology to quantify dietary and pill-taking (i.e. supplement and medication) adherence. In study 1, we investigated whether video chat technology can accurately quantify adherence to dietary and pill-taking interventions. Mock study participants ate food items and swallowed pills, while performing randomised scripted 'cheating' behaviours to mimic non-adherence. Monitoring was conducted in a cross-over design, with two monitors watching in-person and two watching remotely by Skype on a smartphone. For study 2, a twenty-two-item online survey was sent to a listserv with more than 20 000 unique email addresses of past and present study participants to assess the feasibility and acceptability of the technology. For the dietary adherence tests, monitors detected 86 % of non-adherent events (sensitivity) in-person v. 78 % of events via video chat monitoring (P=0·12), with comparable inter-rater agreement (0·88 v. 0·85; P=0·62). However, for pill-taking, non-adherence trended towards being more easily detected in-person than by video chat (77 v. 60 %; P=0·08), with non-significantly higher inter-rater agreement (0·85 v. 0·69; P=0·21). Survey results from study 2 (n 1076 respondents; ≥5 % response rate) indicated that 86·4 % of study participants had video chatting hardware, 73·3 % were comfortable using the technology and 79·8 % were willing to use it for clinical research. Given the capability of video chat technology to reduce participant burden and outperform other adherence monitoring methods such as dietary self-report and pill counts, video chatting is a novel and promising platform to quantify dietary and pill-taking adherence.

  11. Cyberspace as a new arena for terroristic propaganda: an updated examination.

    Science.gov (United States)

    Minei, Elizabeth; Matusitz, Jonathan

    2012-11-01

    This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterrorists display various semiotic gestures (e.g., the use of images and Internet videos) to communicate their intents to the public at large. In doing so, they communicate themes-these themes range from hate to anger. Cyberterrorism, then, is a form of theater or spectacle in which terrorists exploit cyberspace to trigger feelings of panic and overreaction in the target population. In many cases, this form of propaganda is the primary means of communication for various cyberterrorist groups to convey their intents. Internet sites also produce numerous opportunities for in-group communication and publicity.

  12. Adapting Unconventional Warfare Doctrine to Cyberspace Operations: An Examination of Hacktivist Based Insurgencies

    Science.gov (United States)

    2015-06-12

    Agency by Edward Snowden exposed only intelligence collection activities, and not means and methods of cyberspace operations under Title 10 and Joint...Kopstein, Joshua. 2014. “How the NSA Recruits in a Post- Snowden World.” The Daily Beast. Accessed May 6, 2015. http://www.thedailybeast.com...articles/ 2014/01/17/how-the-nsa-recruits-in-a-post- snowden -world.html. Koyfman, Tanya. 2014. “Ukraine versus Russia in a Cyber-Duel.” SenseCy. Accessed

  13. The Informative Documentation and Retrieval of Written Information. New Competences for Cyberspace

    Directory of Open Access Journals (Sweden)

    Pilar Beltrán Orenes

    2015-07-01

    Full Text Available Cyberspace has opened to the journalist the possibility of accessing a lot of documentation sources without the direct mediation of an information science professional. However, this autonomy is more a dream than a reality for the vast ocean that represents Internet and, especially, for those deep areas (deep Internet which are very difficult to reach without the right skills. This article will attempt to show the reality of documentation sources on the Internet and the need for literacy training on the future journalists, as well as the presence of documentalists, now more than ever, in the media.

  14. [Dental education for college students based on WeChat public platform].

    Science.gov (United States)

    Chen, Chuan-Jun; Sun, Tan

    2016-06-01

    The authors proposed a model for dental education based on WeChat public platform. In this model, teachers send various kinds of digital teaching information such as PPT,word and video to the WeChat public platform and students share the information for preview before class and differentiate the key-point knowledge from those information for in-depth learning in class. Teachers also send reference materials for expansive learning after class. Questionaire through the WeChat public platform is used to evaluate teaching effect of teachers and improvement may be taken based on the feedback questionnaire. A discussion and interaction based on WeCchat between students and teacher can be aroused on a specific topic to reach a proper solution. With technique development of mobile terminal, mobile class will come true in near future.

  15. Chat (Catha edulis): a socio economic crop in Harar Region, Eastern Ethiopia.

    Science.gov (United States)

    Kandari, Laxman S; Yadav, Hiranmai R; Thakur, Ashok K; Kandari, Tripti

    2014-01-01

    Chat (Catha edulis) is an important perennial crop and its leaves are chewed for a stimulating effect. It is widely cultivated in the Ethiopian highlands of Oromia region and is figured as Ethiopia's second largest foreign exchange earner. Its cultivation accounts for about 70% of farmer's income in the study area. The common effect of its consumption leads to insomnia, a condition that the users sometimes try to overcome with sedatives or alcohol. The present study is an attempt to survey and assess the impact of crop on the community. It has been observed to implicate health problems, reduces savings and nutritional standards of the family members. The chat yields in the area ranges from 1500-1800 kg/ha through monoculture. During the study, the average monthly income of the family practicing chat cultivation was from Birr 8, 533.00 to 13, 166.00 kg/ha per year in Baate and Genede cultivating areas. When the average cost per/ha was rupees 60/kg. The present study shows that during the recent past, leaf consumption has increased significantly. Chat growers are not only producers but also traders and consumers. Its consumption has become a widespread habit from secondary schools. Highest number of consumers was found to be among drivers followed by students and shopkeepers. The consumption of the plant is not considered a taboo but on contrary a status symbol in the region. It has no legal or moral implications and is considered as a part of custom and habit of local people. High value cash crop like vegetables and orchard fruits needs to be used as a replacement for chat which could be a regular source of income to farmers. Alternative sources of income for farmers needs to be scientifically worked out and proposed keeping in view the proportion of agricultural land reserved under chat cultivation and to increase the production of food grains being produced.

  16. Effects of face-to-face versus chat communication on performance in a collaborative inquiry modeling task

    NARCIS (Netherlands)

    Sins, P.H.M.; Savelsbergh, E.R.; van Joolingen, W.R.; van Hout-Wolters, B.H.A.M.

    2011-01-01

    In many contemporary collaborative inquiry learning environments, chat is being used as a means for communication. Still, it remains an open issue whether chat communication is an appropriate means to support the deep reasoning process students need to perform in such environments. Purpose of the

  17. Effects of Face-to-Face versus Chat Communication on Performance in a Collaborative Inquiry Modeling Task

    Science.gov (United States)

    Sins, Patrick H. M.; Savelsbergh, Elwin R.; van Joolingen, Wouter R.; van Hout-Wolters, Bernadette H. A. M.

    2011-01-01

    In many contemporary collaborative inquiry learning environments, chat is being used as a means for communication. Still, it remains an open issue whether chat communication is an appropriate means to support the deep reasoning process students need to perform in such environments. Purpose of the present study was to compare the impact of chat…

  18. Bringing Japan and Taiwan Closer Electronically: A Look at an Intercultural Online Synchronic Chat Task and Its Effect on Motivation

    Science.gov (United States)

    Freiermuth, Mark R.; Huang, Hsin-chou

    2012-01-01

    This study examines the motivation of 20 Japanese students of English as a foreign language (EFL) who chatted electronically with 19 Taiwanese EFL students using online synchronous chat software. In particular, we were interested in four factors that affect task-based motivation: the willingness to communicate, task attractiveness, task…

  19. 77 FR 49059 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel CHAT DE MER; Invitation for...

    Science.gov (United States)

    2012-08-15

    ... Administrative Waiver of the Coastwise Trade Laws: Vessel CHAT DE MER; Invitation for Public Comments AGENCY....gov . SUPPLEMENTARY INFORMATION: As described by the applicant the intended service of the vessel CHAT... Francisco Bay. Geographic Region: ``California.'' The complete application is given in DOT docket MARAD-2012...

  20. Investigating the Building of a WeChat-Based Community of Practice for Language Teachers' Professional Development

    Science.gov (United States)

    Qi, Grace Yue; Wang, Yuping

    2018-01-01

    This study explores the process of Community of Practice (CoP) building for language teachers' professional development through the support of a WeChat group. WeChat is an instant messenger app that provides a multimodal platform for one-on-one and group interactions through text, audio and video. In order to support the implementation of flipped…

  1. Changes in the lichen flora influenced by the Bełchatów Industrial Region

    Directory of Open Access Journals (Sweden)

    Krystyna Czyżewska

    2014-08-01

    Full Text Available At the beginning of our study, i.e.. before opening the Bełchatów brown coal mine and the power station 155 species of lichens were registered in the period 1970-1985. A preliminary estimation of the influence of the Bełchatów Industrial Region (BIR on the lichen flora has been performed. More than 1% of the lichen flora has entirely disappcared, about 43% of the species have shown partial devastation of their localities and numerous localities of more than 35% of taxa have been threatened.

  2. CHAT 2013: Experience, University College London, 8–10 November 2013

    Directory of Open Access Journals (Sweden)

    Colin Philip Sterling

    2013-11-01

    Full Text Available For ten years now CHAT (Contemporary and Historical Archaeology in Theory has set out to challenge assumptions around the archaeology of the recent past with a series of thought provoking thematic conferences. This year, the 11th  annual CHAT Conference was held at University College London and jointly organised by the Institute of Archaeology and Atkins,1  with a broad focus on the topic of ‘experience.’ Over three days, established academics, early career researchers and practicing heritage professionals from across the world offered up their take on this sometimes nebulous theme. The results were - in turn - captivating, frustrating, enlightening and provocative, but never boring.

  3. Chatting, Chatten or Chattare: Using a Multilingual Workspace for Language and Culture Learning

    Directory of Open Access Journals (Sweden)

    Ursula Stickler

    2008-12-01

    Full Text Available This paper will describe the results of analyses carried out on multilingual chat sessions that took place in the context of LITERALIA, a 24-months long project funded by the European Union’s Grundtvig initiative to support: “Learning In Tandem to Encourage Reciprocal Autonomous Learning In Adults - LITERALIA”. An online workspace was created for the project that allowed learners to communicate with others in four different countries and to enhance their linguistic and cultural competence in four European languages: English, German, Italian, and Polish. Participation in the chat was voluntary and took place in an integrated Moodle workspace.

  4. Case Report - Le syndrome de Cri du Chat : A propos d'une ...

    African Journals Online (AJOL)

    Le syndrome du Cri du Chat (Cri du Chat syndrome, CdCS) est une anomalie chromosomique résultant d'une délétion de taille variable de l'extrémité du bras court du chromosome 5 (5p), incluant une région critique située en p15.2. Il représente une des délétions chromosomiques les plus fréquentes, son incidence dans ...

  5. Characteristics and Diffusion Model of the Individual Knowledge in the WeChat Mode

    Directory of Open Access Journals (Sweden)

    Zhang Lingzhi

    2017-12-01

    Full Text Available [Purpose/significance] According to the model of the individual knowledge diffusion, we conduct a behavior research and analyze the characteristics of that based on WeChat which is the most popular communication platform in China.[Method/process] By analyzing the methods of the diffusion on WeChat, we analyzed the characteristics of the individual knowledge diffusion. [Result/conclusion]The characteristics of the individual knowledge diffusion include real-time, short-term, speciality, friendship and transmission.

  6. Mass Surveillance and the Militarization of Cyberspace in Post-Coup Thailand

    Directory of Open Access Journals (Sweden)

    Pinkaew Laungaramsri

    2016-12-01

    Full Text Available Post-coup Thailand has witnessed a troubling shift toward censorship, surveillance, and suppression in cyberspace. With cyber security ranking prominently on the military’s agenda and the expansion of the military’s cyber intervention, the country’s online infrastructure has undergone politicization, securitization, and militarization. This paper argues that the militarization of cyberspace in Thailand represents the process in which cyber warfare capabilities have been integrated with other military forces and with support from the masses. This process has been effective through at least three significant mechanisms, including mass surveillance, surveillance by the masses, and normalization of surveillance. Social media have been turned into an absolute digital panopticon. Cyber dystopia, created by the 2014 coup and supported by the masses, has served to sustain a ‘state of exception’ not only within the territorial borders of the state, but also more importantly, within the virtual space of civil society. Cyber surveillance by the military and the masses has continued to jeopardize the already vulnerable Thai democracy.

  7. Immunity status of adults and children against poliomyelitis virus type 1 strains CHAT and Sabin (LSc-2ab) in Germany.

    Science.gov (United States)

    Eggers, Maren; Terletskaia-Ladwig, Elena; Rabenau, Holger F; Doerr, Hans W; Diedrich, Sabine; Enders, Gisela; Enders, Martin

    2010-12-09

    In October 2007, the working group CEN/TC 216 of the European Committee for standardisation suggested that the Sabin oral poliovirus vaccine type 1 strain (LSc-2ab) presently used for virucidal tests should be replaced by another attenuated vaccine poliovirus type 1 strain, CHAT. Both strains were historically used as oral vaccines, but the Sabin type 1 strain was acknowledged to be more attenuated. In Germany, vaccination against poliomyelitis was introduced in 1962 using the oral polio vaccine (OPV) containing Sabin strain LSc-2ab. The vaccination schedule was changed from OPV to an inactivated polio vaccine (IPV) containing wild polio virus type 1 strain Mahoney in 1998. In the present study, we assessed potential differences in neutralising antibody titres to Sabin and CHAT in persons with a history of either OPV, IPV, or OPV with IPV booster. Neutralisation poliovirus antibodies against CHAT and Sabin 1 were measured in sera of 41 adults vaccinated with OPV. Additionally, sera from 28 children less than 10 years of age and immunised with IPV only were analysed. The neutralisation assay against poliovirus was performed according to WHO guidelines. The neutralisation activity against CHAT in adults with OPV vaccination history was significantly lower than against Sabin poliovirus type 1 strains (Wilcoxon signed-rank test P Sabin 1 varied between 8 and 64. Following IPV booster, anti-CHAT antibodies increased rapidly in sera of CHAT-negative adults with OPV history. Sera from children with IPV history neutralised CHAT and Sabin 1 strains equally. The lack of neutralising antibodies against the CHAT strain in persons vaccinated with OPV might be associated with an increased risk of reinfection with the CHAT polio virus type 1, and this implies a putative risk of transmission of the virus to polio-free communities. We strongly suggest that laboratory workers who were immunised with OPV receive a booster vaccination with IPV before handling CHAT in the laboratory.

  8. Adolescents' Perceptions of Popularity-Motivated Behaviors, Characteristics, and Relationships in Cyberspace and Cyber Aggression: The Role of Gender.

    Science.gov (United States)

    Wright, Michelle F

    2017-06-01

    Research is increasingly revealing that adolescents utilize electronic technologies to promote and/or maintain their social standing among their peer group. Little is known about whether adolescents' perceptions of popularity-motivated behaviors, characteristics, and relationships in cyberspace are associated with popularity-motivated cyber relational aggression. It is also unclear how gender might impact these associations, especially considering that adolescent girls and boys differ in regard to the type of behaviors, characteristics, and relationships they believe contribute to popularity. To this end, this study examined the potential moderating effect of gender on the association between adolescents' perceptions of popularity-motivated behaviors, characteristics, and relationships in cyberspace and their engagement in popularity-motivated cyber relational aggression over 1 year, from seventh to eighth grade. There were 217 eighth graders (51 percent female; M age = 12.13) from three middle schools in a large Midwestern city in the United States included in this research. They completed questionnaires on their popularity-motivated behaviors, characteristics, and relationships in cyberspace and their perpetration of popularity-motivated cyber relational aggression during the seventh grade. One year later, they completed the perpetration of popularity-motivated cyber relational aggression questionnaire. The results revealed that the association between popularity-motivated behaviors, characteristics, and relationships in cyberspace and the perpetration of popularity-motivated cyber relational aggression was stronger for girls, while such an association was not found for boys. These findings indicate the importance of considering cyberspace as an environment in which adolescents can enhance their social standing among peers from their school.

  9. Alert: the dark side of chats--internet without boundaries.

    Science.gov (United States)

    Aderet, Avshalom

    2009-01-01

    The web has some unique advantages: It eliminates barriers of space and time; information flows quicker and is more accessible to all; the markets are more effective; community and interpersonal communication is more evolved. However, the web is also anonymous, without supervision, freedom of speech is exploited, minors and other web users are exploited, racism and prejudice are encouraged. These manifestations of violence not only hurt many people but actually pose a threat to the existence of the web as a place for exchanging ideas and thoughts, as a tool for relaying messages in a liberal and democratic fashion. Today, it is not legally possible to stop any discussion group or chats, like the one in which Eran participated, which develop dialogues regarding death or suicide. A wise and proper use of the web will be achieved by agreements and not enforcement. It is a process of education in its widest meaning that will be accomplished through the acceptance of norms. Proper use of the web will be possible when all sides--users, site owners and suppliers--willingly commit to values of mutual respect, decency and protection of individual fundamental rights to freedom. The web, which is a great blessing to the communication between people, organizations and cultures, carries with it substantial risks, especially to young users. The rapid expansion of the web and the increase in the number of users has brought many social-ideological dangers alongside the many advantages. In order to deal with these issues, a few years ago I initiated an association known as Eshnav (www.eshnav.org.il) which acts to increase public awareness to the risks and dangers of the web. Eshnav's mission, established to commemorate Eran's memory, is to promote public awareness to the positive and negative aspects of using the web on society and its values, and to promote the wise and safe use of the web. Eran was in great distress and needed empathy, encouragement and support. Sadly, when his

  10. Improving operating room safety

    Directory of Open Access Journals (Sweden)

    Garrett Jill

    2009-11-01

    Full Text Available Abstract Despite the introduction of the Universal Protocol, patient safety in surgery remains a daily challenge in the operating room. This present study describes one community health system's efforts to improve operating room safety through human factors training and ultimately the development of a surgical checklist. Using a combination of formal training, local studies documenting operating room safety issues and peer to peer mentoring we were able to substantially change the culture of our operating room. Our efforts have prepared us for successfully implementing a standardized checklist to improve operating room safety throughout our entire system. Based on these findings we recommend a multimodal approach to improving operating room safety.

  11. C³TO: an architecture for implementing a chat based call centre and tutoring online

    CSIR Research Space (South Africa)

    Butgereit, L

    2010-05-01

    Full Text Available questions or provide information to thousands of people using inexpensive chat protocols on their cell phones. The first practical implementation of C³TO was the re-design and re-implementation of the Dr Math project in South Africa where thousands...

  12. From "Hello" to Higher-Order Thinking: The Effect of Coaching and Feedback on Online Chats

    Science.gov (United States)

    Stein, David S.; Wanstreet, Constance E.; Slagle, Paula; Trinko, Lynn A.; Lutz, Michelle

    2013-01-01

    This exploratory study examined the effect of a coaching and feedback intervention in teaching presence and social presence on higher-order thinking in an online community of inquiry. Coaching occurred before each chat, and feedback was provided immediately afterwards. The findings suggest that over time, the frequency of higher-order thinking…

  13. More than "Hello" and "Bye-Bye": Opening and Closing the Online Chats in Mandarin Chinese

    Science.gov (United States)

    Zhang, De

    2014-01-01

    Reporting on a descriptive study on the first semester Chinese language learners' openings and closings in online chats with age-peer native speakers of Chinese, this paper demonstrates the great promise that telecollaboration holds for foreign language education, and argues for an increasing role of pragmatics in Chinese language instruction, and…

  14. What Are Youth Asking about Drugs? A Report of NIDA Drug Facts Chat Day

    Science.gov (United States)

    Morton, Cory M.; Hoefinger, Heidi; Linn-Walton, Rebecca; Aikins, Ross; Falkin, Gregory P.

    2015-01-01

    The current study analyzes a sample of questions about drugs asked online by youth who participated in the National Institute on Drug Abuse's (NIDA) "Drug Facts Chat Day." The types of drugs youth asked about were coded into 17 substance categories, and the topics they raised were coded into seven thematic categories. The top five…

  15. Polymorphisms of CHAT but not TFAM or VR22 are Associated with Alzheimer Disease Risk.

    Science.gov (United States)

    Gao, Lili; Zhang, Yan; Deng, Jinghua; Yu, Wenbing; Yu, Yunxia

    2016-06-07

    BACKGROUND Alzheimer disease (AD) is a chronic neurodegenerative disease that is one of the most prevalent health problems among seniors. The cause of AD has not yet been elucidated, but many risk factors have been identified that might contribute to the pathogenesis and prognosis of AD. We conducted a meta-analysis of studies involving CHAT, TFAM, and VR22 polymorphisms and AD susceptibility to further understand the pathogenesis of AD. MATERIAL AND METHODS PubMed/Medline, Embase, Web of Science, the Cochrane Library, and Google Scholar were searched for relevant articles. Rs1880676, rs2177369, rs3810950, and rs868750 of CHAT; rs1937 and rs2306604 of TFAM; and rs10997691 and rs7070570 of VR22 are studied in this meta-analysis. RESULTS A total of 51 case-control studies with 16 446 cases and 16 057 controls were enrolled. For CHAT, rs2177369 (G>A) in whites and rs3810950 (G>A) in Asians were found to be associated with AD susceptibility. No association was detected between rs1880676 and rs868750 and AD risk. For TFAM and VR22, no significant association was detected in studied single-nucleotide polymorphisms (SNPs). CONCLUSIONS Rs2177369 and rs3810950 of CHAT are associated with AD susceptibility, but rs1880676 and rs868750 are not. Rs1937 and rs2306604 of TFAM, and rs10997691 and rs7070570 of VR22 are not significantly associated with AD risk.

  16. "Nous" versus "on": Pronouns with First-Person Plural Reference in Synchronous French Chat

    Science.gov (United States)

    van Compernolle, Remi A.

    2008-01-01

    This article explores variation in the use of the pronouns "nous" and "on" for first-person plural reference in a substantial corpus of French-language Internet chat discourse. The results indicate that "on" is nearly categorically preferred to "nous," which is in line with previous research on informal spoken French. A qualitative analysis of…

  17. Recycler l'orientalisme: 'Le Chat du rabbin' de Joann Sfar

    NARCIS (Netherlands)

    van der Poel, I.

    2013-01-01

    The complete edition of Le Chat du rabbin (The Rabbi’s Cat), the graphic novel created by Joann Sfar, appeared in 2011, followed by a 3D film version in the same year. It tells the story of the author’s ancestors, Sephardic Jews, who lived in Algeria under French colonial rule during the Interwar

  18. Automated topic spotting provides added efficiency in a chat based tutoring environment

    CSIR Research Space (South Africa)

    Butgereit, L

    2012-05-01

    Full Text Available Dr Math is a mobile, online tutoring project which allows primary and secondary school pupils to contact tutors in mathematics using text based chat systems on their cell phones. The tutors use traditional Internet based workstations. Dr Math...

  19. Baby FaceTime: Can Toddlers Learn from Online Video Chat?

    Science.gov (United States)

    Myers, Lauren J.; LeWitt, Rachel B.; Gallo, Renee E.; Maselli, Nicole M.

    2017-01-01

    There is abundant evidence for the "video deficit": children under 2 years old learn better in person than from video. We evaluated whether these findings applied to video chat by testing whether children aged 12-25 months could form relationships with and learn from on-screen partners. We manipulated social contingency: children…

  20. Text Chat during Video/Audio Conferencing Lessons: Scaffolding or Getting in the Way?

    Science.gov (United States)

    Kozar, Olga

    2016-01-01

    Private online language tutoring is growing in popularity. An important prerequisite for development of effective pedagogies in this context is a good understanding of how different modalities can be combined. This study provides a detailed account of how several experienced private online teachers use text chat in their Skype-based English…

  1. Comparing Six Video Chat Tools: A Critical Evaluation by Language Teachers

    Science.gov (United States)

    Eroz-Tuga, Betil; Sadler, Randall

    2009-01-01

    This article presents a critical comparison of the usefulness and practicality of six CMC video chat tools (CUworld, ICQ, MSN Messenger, Paltalk, Skype, and Yahoo Messenger) from the perspective of language teaching professionals. This comparison is based on the results of a semester-long project between graduate students at an American university…

  2. Status Quo and Prospective of WeChat in Improving Chinese English Learners' Pronunciation

    Science.gov (United States)

    Wang, Kanghui

    2017-01-01

    With the ubiquitous usage of wireless, portable, and handheld devices gaining popularity in 21st century, the revolutionary mobile technology introduces digital new media to educational settings, which has changed the way of traditional teaching and learning. WeChat is one of the most popular social networking applications in China featured by its…

  3. Face-to-face talk and synchronous chat as learning tools in tutorial ...

    African Journals Online (AJOL)

    The findings suggest that although synchronous chat and small-group discussion share certain characteristics, they are also distinct in several significant ways. The implications that these differences hold for language instruction are then discussed. Keywords: synchronous CMC, tutorials, CLT, group work, blended learning, ...

  4. Managing family healthcare with multimedia chat apps: A survey on what is missing

    NARCIS (Netherlands)

    B. Meixner (Britta); M. Lee (Matthew); S. Carter (Scott)

    2017-01-01

    textabstractChatting and messaging apps allow people to share information (text, images, etc.) using a simple, well-understood interaction metaphor of a conversational time-line. These apps can help small task-oriented user groups, like caregivers of a family member, to coordinate with each other in

  5. Chatting in L2 Spanish: Interactivity, Self-Efficacy and Interpersonal Relations

    Science.gov (United States)

    Sanchez-Castro, Olga; Mrowa-Hopkins, Colette

    2012-01-01

    This study seeks to examine variations in patterns of interactivity as they are displayed in the ongoing discourse construction of high and low self-efficacy learners of Spanish in the context of computer-mediated-communication. The paper specifically focuses on the analysis of synchronous text chats of six university students of Spanish at…

  6. Prevalence of Autism Spectrum Phenomenology in Cornelia de Lange and Cri du Chat Syndromes

    Science.gov (United States)

    Moss, Joanna F.; Oliver, Chris; Berg, Katy; Kaur, Gurmeash; Jephcott, Lesley; Cornish, Kim

    2008-01-01

    Autism spectrum disorder characteristics have not been evaluated in Cornelia de Lange and Cri du Chat syndromes using robust assessments. The Autism Diagnostic Observation Schedule and Social Communication Questionnaire were administered to 34 participants with Cornelia de Lange syndrome and a comparison group of 23 participants with Cri du Chat…

  7. Mobile-Based Chatting for Meaning Negotiation in Foreign Language Learning

    Science.gov (United States)

    Castrillo, María Dolores; Martín-Monje, Elena; Bárcena, Elena

    2014-01-01

    This paper analyzes the adequacy of mobile chatting via Whatsapp for the enhancement of a type of spontaneous and colloquial written interaction which has a strong connection with oral discourse. This is part of a research project undertaken with Spanish students of German as a foreign language with a beginner's or quasi-beginner's level. The…

  8. Effects of Interactive Chat versus Independent Writing on L2 Learning

    Science.gov (United States)

    Tare, Medha; Golonka, Ewa M.; Vatz, Karen; Bonilla, Carrie L.; Crooks, Carolyn; Strong, Rachel

    2014-01-01

    This study examines the importance of interaction for second language (L2) acquisition by analyzing outcomes from two types of out-of-class activities. The study compared: (a) interactive homework, completed via text chat, and (b) individual homework, completed via independent writing. In a between-subjects design, participants in two…

  9. Integration of Three CBI Models and WeChat Mobile Learning in Business English Teaching

    Science.gov (United States)

    Siqi, Che

    2017-01-01

    Content-Based Instruction (CBI) is considered effective not only in mastering language skills, but also in acquiring the content knowledge of business subjects. WeChat, a popular communicative and interactive platform, is acknowledged as a new instrument to improve verbal teaching proficiency and obtain relevant information. The integration of…

  10. Screening for Autism in Iranian Preschoolers: Contrasting M-CHAT and a Scale Developed in Iran

    Science.gov (United States)

    Samadi, Sayyed Ali; McConkey, Roy

    2015-01-01

    Suitable screening instruments for the early diagnosis of autism are not readily available for use with preschoolers in non-Western countries. This study evaluated two tools: M-CHAT which is widely used internationally and one developed in Iran called Hiva. A population sample was recruited of nearly 3000 preschoolers in one Iranian city. Parents…

  11. Mediated Group Development and Dynamics: An Examination of Video Chatting, Twitter, and Facebook in Group Assignments

    Science.gov (United States)

    Frisby, Brandi N.; Kaufmann, Renee; Beck, Anna-Carrie

    2016-01-01

    Instructors incorporate technological tools into the classroom to address short attention spans, appeal to technologically savvy students, and to increase engagement. This study used both quantitative descriptive and qualitative embedded assessment data to examine the use of three popular tools (i.e. Twitter, Facebook, and video chatting) in…

  12. Comparing Protest Movements in Chile and California: Interculturality in an Internet Chat Exchange

    Science.gov (United States)

    Menard-Warwick, Julia

    2009-01-01

    This paper is based on an analysis of chat transcripts from an English-language telecollaboration project between students at universities in Chile and California. This research found that the richest intercultural interactions involved events that could not have been foreseen: the immigrant rights demonstrations in the USA and the massive student…

  13. Technical Evaluation Report 14: Chat and Instant Messaging Systems (synchronous: Report 2/ 3

    Directory of Open Access Journals (Sweden)

    Ellen Kinsel

    2002-10-01

    Full Text Available This study extends the earlier review of online chat systems (Report 6, by reviewing a further seven products that provide text-based instant messaging (IM. The functionality of these products in distance education contexts is stressed in relation to their comparative costs, complexity, control, clarity, technical framework, and other functional options.

  14. Metodologia de utilização do chat na enfermagem Metodología para el uso del chat en enfermería Methodology for the use of chat in nursing

    Directory of Open Access Journals (Sweden)

    Cláudia Prado

    2009-08-01

    Full Text Available O objetivo deste estudo foi descrever a metodologia da utilização do bate-papo (Chat para comunicação em tempo real em um grupo de pesquisa em enfermagem. O papel do coordenador compreende as dimensões de planejamento, mediação e tecnológica. Cada dimensão pode determinar o sucesso ou o fracasso da comunicação. Elas devem ser vistas de forma integrada e a modificação em alguma delas interfere na qualidade do resultado final da atividade. O software de comunicação adotado foi o Skype® por permitir comunicação grátis entre muitos usuários em tempo real. Para a execução do Chat foram estabelecidas cinco etapas: abertura, acolhimento/ aquecimento, desenvolvimento da pauta, síntese e encerramento. A metodologia permitiu otimização e flexibilização de tempo, organização das atividades e alcance dos objetivos.El objetivo del estudio fue describir la metodología de utilizar una herramienta para chat para la comunicación en tiempo real en un grupo de investigación de enfermería. El rolo del coordinador comprende las dimensiones del planeamiento, mediación y tecnología. Cada dimensión puede determinar el suceso o fracaso de la comunicación. Ellas deben ser vistas de manera integrada y la modificación en algún de ellas interfiere la calidad del resultado final de la actividad. El software de comunicación ha sido aprobado por Skype® para la comunicación libre entre muchos usuarios en tiempo real. Para la ejecución del chat fueron establecidas cinco pasos: apertura, acogida / hospitalidad, desarrollo del personal, síntesis y encerramiento. La metodología permitió la optimización y flexibilidad de tiempo, la organización de las actividades y el alcance de las metas.The purpose of this study was to describe the methodology of the use of chat for real-time communication in a group of nursing research. The role of coordinator understands the dimensions of planning, mediation and technology. Each dimension can

  15. Contextual Hub Analysis Tool (CHAT): A Cytoscape app for identifying contextually relevant hubs in biological networks.

    Science.gov (United States)

    Muetze, Tanja; Goenawan, Ivan H; Wiencko, Heather L; Bernal-Llinares, Manuel; Bryan, Kenneth; Lynn, David J

    2016-01-01

    Highly connected nodes (hubs) in biological networks are topologically important to the structure of the network and have also been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we report a Cytoscape app, the Contextual Hub Analysis Tool (CHAT), which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene expression or mass spectrometry data, and identify hub nodes that are more highly connected to contextual nodes (e.g. genes or proteins that are differentially expressed) than expected by chance. In a case study, we use CHAT to construct a network of genes that are differentially expressed in Dengue fever, a viral infection. CHAT was used to identify and compare contextual and degree-based hubs in this network. The top 20 degree-based hubs were enriched in pathways related to the cell cycle and cancer, which is likely due to the fact that proteins involved in these processes tend to be highly connected in general. In comparison, the top 20 contextual hubs were enriched in pathways commonly observed in a viral infection including pathways related to the immune response to viral infection. This analysis shows that such contextual hubs are considerably more biologically relevant than degree-based hubs and that analyses which rely on the identification of hubs solely based on their connectivity may be biased towards nodes that are highly connected in general rather than in the specific context of interest. CHAT is available for Cytoscape 3.0+ and can be installed via the Cytoscape App Store ( http://apps.cytoscape.org/apps/chat).

  16. Room temperature superconductors

    International Nuclear Information System (INIS)

    Sleight, A.W.

    1995-01-01

    If the Holy Grail of room temperature superconductivity could be achieved, the impact on could be enormous. However, a useful room temperature superconductor for most applications must possess a T c somewhat above room temperature and must be capable of sustaining superconductivity in the presence of magnetic fields while carrying a significant current load. The authors will return to the subject of just what characteristics one might seek for a compound to be a room temperature superconductor. 30 refs., 3 figs., 1 tab

  17. Evaluation of the 113Online Suicide Prevention Crisis Chat Service: Outcomes, Helper Behaviors and Comparison to Telephone Hotlines.

    Science.gov (United States)

    Mokkenstorm, Jan K; Eikelenboom, Merijn; Huisman, Annemiek; Wiebenga, Jasper; Gilissen, Renske; Kerkhof, Ad J F M; Smit, Johannes H

    2017-06-01

    Recognizing the importance of digital communication, major suicide prevention helplines have started offering crisis intervention by chat. To date there is little evidence supporting the effectiveness of crisis chat services. To evaluate the reach and outcomes of the 113Online volunteer-operated crisis chat service, 526 crisis chat logs were studied, replicating the use of measures that were developed to study telephone crisis calls. Reaching a relatively young population of predominantly females with severe suicidality and (mental) health problems, chat outcomes for this group were found to be comparable to those found for crisis calls to U.S. Lifeline Centers in 2003-2004, with similar but not identical associations with specific helpers' styles and attitudes. Our findings support a positive effect of the 113Online chat service, to be enhanced by practice standards addressing an apparent lack of focus on the central issue of suicidality during chats, as well as by the development of best practices specific for online crisis intervention. © 2016 The American Association of Suicidology.

  18. Does the Use of WeChat Lead to Subjective Well-Being?: The Effect of Use Intensity and Motivations.

    Science.gov (United States)

    Wen, Zhengbao; Geng, Xiaowei; Ye, Yinghua

    2016-10-01

    Recently, WeChat has been widely used in China. The positive and negative effects of WeChat on users have received attention from researchers gradually. Using the questionnaire method, we recruited 339 undergraduates and graduates as participants, and tested the effects of WeChat on their subjective well-being (SWB) in terms of intensity. In addition, we confirmed the mediating effects of WeChat with respect to motivation. The results showed that the participants' WeChat use intensity was at a mid-level, 85.3 percent of them spending no more than 2 hours on WeChat every day. Furthermore, there have been no demographic differences in the variables of gender, place of residence, or grade. Participants' WeChat use intensity can significantly predict their use motivation and life satisfaction, and intrinsic use motivation was the mediator between the use intensity and SWB, while the other three types of motivation (external, introjection, and identification) cannot predict SWB significantly. The user's ultimate emotional experience is primarily derived from why and how they use it. We also tested whether the use motivation can be shaped.

  19. Genetic variants in the choline acetyltransferase (ChAT) gene are modestly associated with normal cognitive function in the elderly

    DEFF Research Database (Denmark)

    Mengel-From, J; Christensen, K; Thinggaard, M

    2011-01-01

    Genetic variants in the choline acetyltransferase (ChAT) gene have been suggested as risk factors for neurodegenerative Alzheimer's disease (AD). Here we tested the importance of genetic variants in the ChAT gene in normal cognitive function of elderly in a study sample of Danish twins...... and singletons (N = 2070). The ChAT rs3810950 A allele, which has been associated with increased risk for AD, was found to be associated with a decrease cognitive status evaluated by a five-component cognitive composite score [P = 0.03, regression coefficient -0.30, 95% confidence interval (CI) -0.57 to -0...

  20. Influence of WeChat on sleep quality among undergraduates in Chongqing, China: a cross-sectional study

    OpenAIRE

    Xu, Xianglong; Lin, Qianyi; Zhang, Yan; Zhu, Runzhi; Sharma, Manoj; Zhao, Yong

    2016-01-01

    Background Previous studies showed that social media is associated with sleep quality. WeChat (a native social media in China) is very popular in China, especially among the youth. In the second quarter of 2016, Tencent?s WeChat had 806 million monthly active users. The study sought to identify the influence of WeChat on the sleep quality among undergraduate students. Methods A cross-sectional survey adopted a multi-stage stratified sampling survey to investigate undergraduates in Chongqing, ...

  1. Performing Re-mediation in Graphical Cyberspace: Mediating Agency, Body and Identity in Virtual Interactional Practices

    DEFF Research Database (Denmark)

    McIlvenny, Paul

    and spectacular multi-media event raises many questions. How do we conceive of the recent developments in media technology and social computing that are impacting on what we have traditionally called 'the mass media'? How is interaction and talk mediated and adapted to new media genres? And how do participants......Promoted as the first academic conference to be held completely in graphical cyberspace, Avatars 98 took place in November 1998. The virtual conference site was built and inhabited using software that supports multi-party presence over the Internet in a simulated, navigable environment. During...... frameworks through the multimedia representations that were 'cast' and 'served' across the Internet. If such a ceremonial event had been broadcast through the institutional medium of television, broadcast talk would have been produced for an eavesdropping 'mass audience'. Instead, the digitally re...

  2. Digital hajj: the pilgrimage to Mecca in Muslim cyberspace and the issue of religious online authority

    Directory of Open Access Journals (Sweden)

    Dominik Schlosser

    2013-01-01

    Full Text Available This paper attempts to give an overview of the different representations of the pilgrimage to Mecca found in the ‘liminal space’ of the internet. For that purpose, it examines a handful of emblematic examples of how the hajj is being presented and discussed in cyberspace. Thereby, special attention shall be paid to the question of how far issues of religious authority are manifest on these websites, whether the content providers of web pages appoint themselves as authorities by scrutinizing established views of the fifth pillar of Islam, or if they upload already printed texts onto their sites in order to reiterate normative notions of the pilgrimage to Mecca, or of they make use of search engine optimisation techniques, thus heightening the very visibility of their online presence and increasing the possibility of becoming authoritative in shaping internet surfers’ perceptions of the hajj.

  3. Reproducibility and convergences in the cyberspace: the diffusion of literary texts in television adaptations

    Directory of Open Access Journals (Sweden)

    Líliam Cristina Marins Prieto

    2014-03-01

    Full Text Available In this study, multimodal circulation of literary texts in television adaptations is outlined, emphasizing their implications in the conceptualization and value judgment in the Arts (particularly in Literature. The technological boom in several social segments and new reading practices in the current information revolution age have influenced the circulation of literature in new forms and intersemiotic medias. By congregating theories about cyberculture and media convergence (Negroponte, Lévy and Jenkins and the analysis of specific cases, such as the adaptation of Shakespeare´s The Taming of the Shrew (1593 in O Cravo e a Rosa (2000, a Brazilian telenovela directed by Walcyr Carrasco and Mário Teixeira, a new cultural context emerges. In this new configuration where television and cyberspace are part of the convergence culture, the media and their users interact. This interaction contributes towards the survival of the literary text and the emergence of new reading practices.

  4. Cyberspace Security Econometrics System (CSES) - U.S. Copyright TXu 1-901-039

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Schlicher, Bob G [ORNL; Sheldon, Frederick T [ORNL; Lantz, Margaret W [ORNL; Hauser, Katie R [ORNL

    2014-01-01

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. The Cyberspace Security Econometrics System (CSES) provides a measure (i.e., a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement. The basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings contained in this copyright.

  5. Living in the electronic age: musings on nearly two decades in Cyberspace.

    Science.gov (United States)

    Gavrin, Jonathan R

    2009-01-01

    My journey through Cyberspace began about 20 years ago with an introduction to e-mail. A few years later, I had the good fortune of working with artificial intelligence engineers who were developing information retrieval techniques and expert systems. By serendipity this led to an early introduction to the World Wide Web (www) and the use of Web browsers as tools for gathering information, long before the Internet became commercialized. Internet content and form are now so omnipresent that they have affected our language in both amusing and utilitarian ways. We are entering an era where social networking, from personal to professional lives, is potentially a vibrant new direction for the Internet. Future articles for this feature will explore how to maximize the utility of the Internet.

  6. Estimation of volume and mass and of changes in volume and mass of selected chat piles in the Picher mining district, Ottawa County, Oklahoma, 2005-10

    Science.gov (United States)

    Smith, S. Jerrod

    2013-01-01

    From the 1890s through the 1970s the Picher mining district in northeastern Ottawa County, Oklahoma, was the site of mining and processing of lead and zinc ore. When mining ceased in about 1979, as much as 165–300 million tons of mine tailings, locally referred to as “chat,” remained in the Picher mining district. Since 1979, some chat piles have been mined for aggregate materials and have decreased in volume and mass. Currently (2013), the land surface in the Picher mining district is covered by thousands of acres of chat, much of which remains on Indian trust land owned by allottees. The Bureau of Indian Affairs manages these allotted lands and oversees the sale and removal of chat from these properties. To help the Bureau of Indian Affairs better manage the sale and removal of chat, the U.S. Geological Survey, in cooperation with the Bureau of Indian Affairs, estimated the 2005 and 2010 volumes and masses of selected chat piles remaining on allotted lands in the Picher mining district. The U.S. Geological Survey also estimated the changes in volume and mass of these chat piles for the period 2005 through 2010. The 2005 and 2010 chat-pile volume and mass estimates were computed for 34 selected chat piles on 16 properties in the study area. All computations of volume and mass were performed on individual chat piles and on groups of chat piles in the same property. The Sooner property had the greatest estimated volume (4.644 million cubic yards) and mass (5.253 ± 0.473 million tons) of chat in 2010. Five of the selected properties (Sooner, Western, Lawyers, Skelton, and St. Joe) contained estimated chat volumes exceeding 1 million cubic yards and estimated chat masses exceeding 1 million tons in 2010. Four of the selected properties (Lucky Bill Humbah, Ta Mee Heh, Bird Dog, and St. Louis No. 6) contained estimated chat volumes of less than 0.1 million cubic yards and estimated chat masses of less than 0.1 million tons in 2010. The total volume of all

  7. Weibo or WeChat? Assessing Preference for Social Networking Sites and Role of Personality Traits and Psychological Factors.

    Science.gov (United States)

    Hou, Juan; Ndasauka, Yamikani; Pan, Xuefei; Chen, Shuangyi; Xu, Fei; Zhang, Xiaochu

    2018-01-01

    Research trying to understand individual difference in the use of different social networking sites (SNSs) is minimal. In the present study, we collected data from 714 college students in China (273 males) to assess how personality traits and psychological factors relate to excessive use of WeChat and Weibo. We found that excessive use of Weibo and WeChat correlated positively with neuroticism, loneliness, and external locus of control and negatively with agreeableness, social support, and social interaction. Furthermore, people that scored high on loneliness, lack of social support, and poor social interaction skills excessively used Weibo more than WeChat. These results entail that by fulfilling different needs, WeChat and Weibo attract different kinds of people; significant lesson for future development of SNSs.

  8. Weibo or WeChat? Assessing Preference for Social Networking Sites and Role of Personality Traits and Psychological Factors

    Science.gov (United States)

    Hou, Juan; Ndasauka, Yamikani; Pan, Xuefei; Chen, Shuangyi; Xu, Fei; Zhang, Xiaochu

    2018-01-01

    Research trying to understand individual difference in the use of different social networking sites (SNSs) is minimal. In the present study, we collected data from 714 college students in China (273 males) to assess how personality traits and psychological factors relate to excessive use of WeChat and Weibo. We found that excessive use of Weibo and WeChat correlated positively with neuroticism, loneliness, and external locus of control and negatively with agreeableness, social support, and social interaction. Furthermore, people that scored high on loneliness, lack of social support, and poor social interaction skills excessively used Weibo more than WeChat. These results entail that by fulfilling different needs, WeChat and Weibo attract different kinds of people; significant lesson for future development of SNSs. PMID:29755384

  9. Weibo or WeChat? Assessing Preference for Social Networking Sites and Role of Personality Traits and Psychological Factors

    Directory of Open Access Journals (Sweden)

    Juan Hou

    2018-04-01

    Full Text Available Research trying to understand individual difference in the use of different social networking sites (SNSs is minimal. In the present study, we collected data from 714 college students in China (273 males to assess how personality traits and psychological factors relate to excessive use of WeChat and Weibo. We found that excessive use of Weibo and WeChat correlated positively with neuroticism, loneliness, and external locus of control and negatively with agreeableness, social support, and social interaction. Furthermore, people that scored high on loneliness, lack of social support, and poor social interaction skills excessively used Weibo more than WeChat. These results entail that by fulfilling different needs, WeChat and Weibo attract different kinds of people; significant lesson for future development of SNSs.

  10. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    Science.gov (United States)

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  11. [Influence of WeChat platform on the compliance of continuous treatment of scar in adult burn patients].

    Science.gov (United States)

    Wang, F; Zhang, H L

    2018-03-20

    Objective: To explore influence of the WeChat platform on the compliance of continuous treatment of scar in adult burn patients. Methods: A total of 124 adult burn patients, conforming to the study criteria, admitted in the Department of Burns of our hospital from January 2015 to January 2016 were divided into WeChat group ( n =63) and control group ( n =61) according to the random number table. Patients in control group only received regular discharging rehabilitation guide, while patients in WeChat group received regular discharging rehabilitation guide and joined WeChat platform after being discharged from hospital. Through pushing rehabilitation plan and rehabilitation related knowledge, organizing support discussion of burn patients, answering the patients' questions, members of WeChat platform intervention group conducted continuous treatment for 6 months on patients of WeChat group. The compliance of functional exercise of patients in two groups in one week before discharge and 3 and 6 months after discharge was evaluated by using the self-made functional exercise compliance log sheet. The compliance of using anti-scar drug and appliance of patients in two groups in 3 and 6 months after discharge was evaluated by using self-made anti-scar drug and appliance usage log sheets. Data were processed with chi-square test, independent sample t test, non-parametric rank sum test of independent sample, and Wilcoxon rank sum test. Results: (1) The compliance ratio of functional exercise of patients in WeChat group (95.24%, 60/63) was close to 93.44% (57/61) in control group in one week before discharge ( χ (2)=0.188, P >0.05). The compliance ratios of functional exercise of patients in WeChat group were respectively 93.65% (59/63) and 87.30% (55/63) in 3 and 6 months after discharge, which were higher than 68.85% (42/61) and 65.57% (40/61) in control group ( χ (2)=12.615, 8.166, P WeChat group was significantly better than that in control group in 3 and 6 months

  12. Excessive use of WeChat, social interaction and locus of control among college students in China.

    Directory of Open Access Journals (Sweden)

    Juan Hou

    Full Text Available In China, the number of college students using mobile phone based messaging and social networking applications like WeChat is increasing rapidly. However, there has been minimal research into the addictive nature of these applications and the psychological characteristics associate with their excessive use. There is also no published scale available for assessing excessive use of WeChat and similar applications. In the current study, we collected data from 1,245 college students in China (715 females and developed the WeChat Excessive Use Scale (WEUS. We then assessed the relationship between excessive use of WeChat and excessive use of a social networking application-Weibo, problematic use of mobile phones, external locus of control, and social interaction skills. Our 10-item scale featured three factors, namely- "mood modification," "salience" and ''conflict"- critical factors in assessing different forms of addiction. The WEUS was found to be a reliable instrument in assessing excessive use of WeChat as it showed good internal consistency and correlated with other measures of problematic use social networking and mobile phone addiction. Our results showed that excessive users of WeChat are more likely to excessively use Weibo than they are to problematically use mobile phones. Our study also showed that greater excessive use of WeChat is associated with higher external locus of control and greater online social interaction skills. These results reveal that WeChat has unique and strong appeal among college students in China. Further, practitioners should consider dealing with malleable factors like locus of control and real life social skills in treating people with problematic messaging and social networking.

  13. Effects of Video Games and Online Chat on Mathematics Performance in High School: An Approach of Multivariate Data Analysis

    OpenAIRE

    Lina Wu; Wenyi Lu; Ye Li

    2016-01-01

    Regarding heavy video game players for boys and super online chat lovers for girls as a symbolic phrase in the current adolescent culture, this project of data analysis verifies the displacement effect on deteriorating mathematics performance. To evaluate correlation or regression coefficients between a factor of playing video games or chatting online and mathematics performance compared with other factors, we use multivariate analysis technique and take gender difference into account. We fin...

  14. The Changing Physical and Social Environment of Newsgathering: A Case Study of Foreign Correspondents Using Chat Apps During Unrest

    Directory of Open Access Journals (Sweden)

    Valerie Belair-Gagnon

    2017-03-01

    Full Text Available Mobile chat apps have shaped multiple forms of communication in everyday life, including education, family, business, and health communication. In journalism, chat apps have taken on a heightened significance in reporting political unrest, particularly in terms of audience/reporter distinctions, sourcing of information, and community formation. Mobile phones are now essential components in reporters’ everyday communication, and particularly during political unrest. In East Asia, the latest trends point toward private networking apps, such as WeChat and WhatsApp, as the most important digital tools for journalists to interact with sources and audiences in news production. These apps provide a set of private (and, increasingly, encrypted alternatives to open, public-facing social media platforms. This article is the first to examine foreign correspondents’ usage of chat apps for newsgathering during political unrest in China and Hong Kong since the 2014 “Umbrella Movement,” a time when the use of chat apps in newsgathering became widespread. This article identifies and critically examines the salient features of these apps. It then discusses the ways these journalistic interactions on chat apps perpetuate, disrupt, and affect “social” newsgathering. This article argues that chat apps do not represent one interactive space; rather they are hybrid interactions of news production embedded in social practices rather than pre-existing physical/digital spaces. This research is significant as the emergence of chat apps as tools in foreign correspondents’ reporting has implications for journalistic practices in information gathering, storage, security, and interpretation and for the informational cultures of journalism.

  15. Chat Transcript Analysis Reveals that Undergraduate Students are Open to Instruction, While Instructors and Librarians Care About Supporting Student Learning

    OpenAIRE

    Elaine Sullo

    2017-01-01

    A Review of: Jacoby, J., Ward, D., Avery, S., & Marcyk, E. (2016). The value of chat reference services: A pilot study. portal: Libraries and the Academy, 16(1), 109-129. https://doi.org/10.1353/pla.2016.0013 Objective – To investigate student, instructor, and librarian perspectives of chat reference service in the context of first-year undergraduate students conducting research for an introductory composition course. Design – Focus groups, individual interviews, and surveys. S...

  16. Excessive use of WeChat, social interaction and locus of control among college students in China.

    Science.gov (United States)

    Hou, Juan; Ndasauka, Yamikani; Jiang, Yingying; Ye, Zi; Wang, Ying; Yang, Lizhuang; Li, Xiaoming; Zhang, Yongjun; Pang, Liangjun; Kong, Yan; Xu, Fei; Zhang, Xiaochu

    2017-01-01

    In China, the number of college students using mobile phone based messaging and social networking applications like WeChat is increasing rapidly. However, there has been minimal research into the addictive nature of these applications and the psychological characteristics associate with their excessive use. There is also no published scale available for assessing excessive use of WeChat and similar applications. In the current study, we collected data from 1,245 college students in China (715 females) and developed the WeChat Excessive Use Scale (WEUS). We then assessed the relationship between excessive use of WeChat and excessive use of a social networking application-Weibo, problematic use of mobile phones, external locus of control, and social interaction skills. Our 10-item scale featured three factors, namely- "mood modification," "salience" and ''conflict"- critical factors in assessing different forms of addiction. The WEUS was found to be a reliable instrument in assessing excessive use of WeChat as it showed good internal consistency and correlated with other measures of problematic use social networking and mobile phone addiction. Our results showed that excessive users of WeChat are more likely to excessively use Weibo than they are to problematically use mobile phones. Our study also showed that greater excessive use of WeChat is associated with higher external locus of control and greater online social interaction skills. These results reveal that WeChat has unique and strong appeal among college students in China. Further, practitioners should consider dealing with malleable factors like locus of control and real life social skills in treating people with problematic messaging and social networking.

  17. Excessive use of WeChat, social interaction and locus of control among college students in China

    Science.gov (United States)

    Jiang, Yingying; Ye, Zi; Wang, Ying; Yang, Lizhuang; Li, Xiaoming; Zhang, Yongjun; Pang, Liangjun; Kong, Yan; Xu, Fei; Zhang, Xiaochu

    2017-01-01

    In China, the number of college students using mobile phone based messaging and social networking applications like WeChat is increasing rapidly. However, there has been minimal research into the addictive nature of these applications and the psychological characteristics associate with their excessive use. There is also no published scale available for assessing excessive use of WeChat and similar applications. In the current study, we collected data from 1,245 college students in China (715 females) and developed the WeChat Excessive Use Scale (WEUS). We then assessed the relationship between excessive use of WeChat and excessive use of a social networking application-Weibo, problematic use of mobile phones, external locus of control, and social interaction skills. Our 10-item scale featured three factors, namely- “mood modification,” “salience” and ‘‘conflict”- critical factors in assessing different forms of addiction. The WEUS was found to be a reliable instrument in assessing excessive use of WeChat as it showed good internal consistency and correlated with other measures of problematic use social networking and mobile phone addiction. Our results showed that excessive users of WeChat are more likely to excessively use Weibo than they are to problematically use mobile phones. Our study also showed that greater excessive use of WeChat is associated with higher external locus of control and greater online social interaction skills. These results reveal that WeChat has unique and strong appeal among college students in China. Further, practitioners should consider dealing with malleable factors like locus of control and real life social skills in treating people with problematic messaging and social networking. PMID:28817710

  18. Towards educational data mining: Using data mining methods for automated chat analysis to understand and support inquiry learning processes

    OpenAIRE

    Anjewierden , Anjo; Kolloffel , Bas; Hulshof , Casper

    2007-01-01

    In this paper we investigate the application of data mining methods to provide learners with real-time adaptive feedback on the nature and patterns of their on-line communication while learning collaboratively.We derived two models for classifying chat messages using data mining techniques and tested these on an actual data set [16]. The reliability of the classification of chat messages is established by comparing the models performance to that of humans. Results indicate that the classifica...

  19. Paradigmatic Shifts in Jihadism in Cyberspace: The Emerging Role of Unaffiliated Sympathizers in Islamic State’s Social Media Strategy

    Directory of Open Access Journals (Sweden)

    Yannick Veilleux-Lepage

    2016-02-01

    Full Text Available 'This paper provides an overview of the evolution of the concept of jihadism as it presently exists in cyberspace. From its roots during the Chechen conflict to the current use of social media by the Islamic State (IS, this paper identifies and examines three highly significant paradigm shifts: (1 the emergence of rudimentary Web 2.0 platforms and jihadist forums; (2 the advent of advanced Web 2.0 and social media platforms as methods of spreading jihadism; and (3 turn towards ‘lone wolf’ terrorism.  In this paper, the author argues that IS’ extensive reliance on unaffiliated sympathizers, who either re-tweet or re-post content produced and authorized by the IS leadership can be seen as a groundbreaking paradigm shift in the evolution of jihadism in cyberspace. Furthermore, it is also argued that IS’ strategy of empowering of unaffiliated sympathizers represents a further development in the evolution of jihadism in cyberspace and can best be understood as an attempt to normalize and legitimize IS’ existence through its efforts to dominate the ‘IS narrative’ across social media platforms.' ' '

  20. Cuerpos e identidades on line: construcción de identidades corporales en el chat

    Directory of Open Access Journals (Sweden)

    Luz Marilyn Ortiz

    2014-01-01

    Full Text Available Este artículo tiene como propósito analizar el proceso de construcción de la identidad en sus relaciones con el cuerpo en el contexto de la Comunicación Mediada por Computación (CMC, particularmente por usuarios del chat. En la primer parte se trata el tema de laidentidad en la época digital, desde una perspectiva no esencialista del concepto de identidad. En la segunda parte se analiza la “emergencia epistemológica” del cuerpo en esta nueva forma de comunicación. La tercera parte enfatiza los efectos de la CMC en los modos y estrategias de construcción de identidades corporales por usuarios del chat, entendido este como un dispositivo de enunciación virtual en la que el sujeto se textualiza mediante lenguajes multimodales.

  1. CSN's New Emergency Room

    International Nuclear Information System (INIS)

    Sendin, P.

    2005-01-01

    During the month of July 2005 the physical renovation works and technological updating of the basic infrastructures of the CSN Emergency Room (SALEM) were finished, allowing the Room to now have greater functionality and a broader technical capacity. Nevertheless, the technological improvement process of SALEM will reach its full potential within the next few years, once the installation currently underway of the new information integration and monitoring systems and the decision making support systems have been completed. This article describes the improvements introduced to the Room and the objectives pursued in this renovation project to convert the SALEM into a new generation room in accordance with its current technological context. (Author) 4 refs

  2. Effects of using WeChat-assisted perioperative care instructions for parents of pediatric patients undergoing day surgery for herniorrhaphy.

    Science.gov (United States)

    Liu, Jun; Zheng, Xin; Chai, Shouxia; Lei, Meirong; Feng, Zehui; Zhang, Xuelin; Lopez, Violeta

    2018-02-19

    This study examined the effects of WeChat-assisted perioperative instructions for parents whose children were to undergo herniorrhaphy. A randomized controlled trial was conducted in a day surgery center in China. Participants were randomly assigned to the intervention (WeChat) group (n = 209) and the control (Leaflet) group (n = 209). The primary outcomes of this study were parents' knowledge regarding hernia and rate of cancellation of children's surgery. The secondary outcomes were the rate of lost-to-follow-up and the rate of complications and adverse events during the seventh postoperative follow-up day. There was a significant difference in the rate of cancelling the surgery and the mean knowledge score between the WeChat group and leaflet groups. The lost-to-follow-up rate was significantly lower in the WeChat group (0.54%) than in the leaflet group (3.66%). The incidence of postoperative complications were higher in the control group. WeChat-assisted perioperative care instructions enhanced parents' knowledge on perioperative instructions and promoted the preparation of their children for day surgery resulting in lower rate of cancelling the surgery. WeChat has the ability to expand health services outside the hospital confines and could be used as an important low-cost health educational medium in China. Copyright © 2018 Elsevier B.V. All rights reserved.

  3. Modelling of information diffusion on social networks with applications to WeChat

    Science.gov (United States)

    Liu, Liang; Qu, Bo; Chen, Bin; Hanjalic, Alan; Wang, Huijuan

    2018-04-01

    Traces of user activities recorded in online social networks open new possibilities to systematically understand the information diffusion process on social networks. From the online social network WeChat, we collected a large number of information cascade trees, each of which tells the spreading trajectory of a message/information such as which user creates the information and which users view or forward the information shared by which neighbours. In this work, we propose two heterogeneous non-linear models, one for the topologies of the information cascade trees and the other for the stochastic process of information diffusion on a social network. Both models are validated by the WeChat data in reproducing and explaining key features of cascade trees. Specifically, we apply the Random Recursive Tree (RRT) to model the growth of cascade trees. The RRT model could capture key features, i.e. the average path length and degree variance of a cascade tree in relation to the number of nodes (size) of the tree. Its single identified parameter quantifies the relative depth or broadness of the cascade trees and indicates that information propagates via a star-like broadcasting or viral-like hop by hop spreading. The RRT model explains the appearance of hubs, thus a possibly smaller average path length as the cascade size increases, as observed in WeChat. We further propose the stochastic Susceptible View Forward Removed (SVFR) model to depict the dynamic user behaviour including creating, viewing, forwarding and ignoring a message on a given social network. Beside the average path length and degree variance of the cascade trees in relation to their sizes, the SVFR model could further explain the power-law cascade size distribution in WeChat and unravel that a user with a large number of friends may actually have a smaller probability to read a message (s)he receives due to limited attention.

  4. Late Neogene leaf assemblage from Bełchatów Lignite Mine (central Poland

    Directory of Open Access Journals (Sweden)

    Worobiec Grzegorz

    2014-12-01

    Full Text Available Leaf macroremains collected in the Bełchatów Lignite Mine (central Poland were investigated. The fossil assemblage consists of leaves of Acer, Betula, Carpinus, Dicotylophyllum, Fagus, ?Magnolia, “Parrotia”, Pinus, Quercus, and Zelkova. Mesophytic (zonal elements dominate, with admixture of riparian (azonal leaf taxa. The floristic composition points to late Neogene (late Miocene to late Pliocene age and suggests favourable temperate climate with mild winters.

  5. Chat educacional em enfermagem: possibilidades de interação no meio virtual

    Directory of Open Access Journals (Sweden)

    Ana Paula Scheffer Schell da Silva

    2011-10-01

    Full Text Available Pesquisa documental com abordagem qualitativa do tipo estudo de caso, que analisou os diálogos produzidos por alunos de Enfermagem em um contexto mediado por chat educacional em Ambiente Virtual de Aprendizagem (AVA. Os dados constituíram-se de oito discussões promovidas por alunos, professores e monitores da Escola de Enfermagem da Universidade Federal do Rio Grande do Sul no chat do AVA TelEduc® sobre a atividade denominada Cliente Virtual. Para a categorização dos dados, utilizou-se o software NVivo®; e para a análise das informações, a técnica de Análise de Conteúdo. Os resultados revelaram sentimentos como ansiedade, medo e motivação perante a prática hospitalar, bem como o posicionamento dicotômico dos alunos frente à atividade proposta: alguns gostaram das discussões virtuais, enquanto outros preferiram as presenciais. O artigo apresenta recomendações para o uso de chat educacional no ensino de Enfermagem.

  6. “Why Caipirinha?”- The Online via Chat Laddering Technique CAN Answer

    Directory of Open Access Journals (Sweden)

    Bruno Bordeaux-Rego

    2011-04-01

    Full Text Available As customers are becoming increasingly connected to the internet, this means that they are available for online interviews, thus opening up a space for investigating research methods, especially qualitative research, in an attempt to identify how to adapt data collecting instruments to the so-called “connected customer era”. In this context, the focus of this article is on the application viability analysis of the laddering technique used online and in real-time chat by asking the following question: “Why caipirinha?”. Conducting online in-depth interviews through the MSN Messenger and Skype (the most commonly used chat tools in Brazil, 23 attributes, 22 consequences and 13 values were identified, resulting in 133 ladders, 71 of which reached the value level. Along with friends/mates, Integration, Entertainment and Fun, in addition to Alcohol, Insouciance/ relaxation and Pleasure constitute the most frequent ladders. Concerning the application itself, the participants gave positive feedback, even though some of them did not feel satisfied because they became tired. Convenience, objectivity, disinhibition, easy scheduling and flexibility were identified. The viability of online in-depth interviewing via real-time chats was confirmed, raising the question of the possibility of it achieving other qualitative research techniques.

  7. NUEVO ESCENARIO DE SOCIALIZACIÓN DEL LENGUAJE: EL CHAT Y LOS ADOLESCENTES

    Directory of Open Access Journals (Sweden)

    Claudia Julieta Galera

    2010-01-01

    Full Text Available Este trabajo es parte de un proyecto de investigación denominado “Las Nuevas Tecnologías de Información y Comunicación y sus efectos en el lenguaje escrito de los adolescentes”.Los objetivos que intentaremos develar a través de esta investigación son: analizar el lenguaje escrito derivado del uso del chat como fenómeno cultural emergente; indagar si el lenguaje derivado del uso del chat es la expresión de una nueva forma de percibir, de comunicar y de concebir el mundo; caracterizar al lenguaje escrito emergente por el uso y apropiación de las TICs por parte de los adolescentes.La elección del tema fue motivada por la amplia difusión y discusión que existía sobre los problemas o consecuencias por el uso del chat en el lenguaje escrito de los adolescentes debido a la existencia de prejuicios ampliamente difundidos sobre este problema en el mundo académico y en el ámbito escolar en particular.

  8. Virtual Seminar Room

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Fosgerau, Anders; Hansen, Peter Søren Kirk

    1999-01-01

    The initial design considerations and research goals for an ATM network based virtual seminar room with 5 sites are presented.......The initial design considerations and research goals for an ATM network based virtual seminar room with 5 sites are presented....

  9. Operating room manager game

    NARCIS (Netherlands)

    Hans, Elias W.; Nieberg, T.

    2007-01-01

    The operating room (OR) department of a hospital forms the heart of the organization, where the single largest cost is incurred. This document presents and reports on the “Operating Room Manager Game,” developed to give insight into managing a large hospital's OR department at various levels of

  10. The usability of WeChat as a mobile and interactive medium in student-centered medical teaching.

    Science.gov (United States)

    Wang, Juan; Gao, Furong; Li, Jiao; Zhang, Jieping; Li, Siguang; Xu, Guo-Tong; Xu, Lei; Chen, Jianjun; Lu, Lixia

    2017-09-01

    Biochemistry and cellular biology courses for medical students at Tongji University include the assessment that provides students with feedback to enhance their learning, which is a type of formative assessment. However, frequent instant feedback and guidance for students is often absent or inconsistently included in the teaching process. WeChat, the most popular Chinese social media, was introduced in biochemistry and cellular biology course. A WeChat official account (OA) was set up as an instant interactive platform. Over a period of two semesters, OA sent 73 push notifications. The components included course notices, preclass thought questions, after-class study materials, answer questions and feedback, simulation exercises, teacher-student interaction, and research progress relevant to the course. WeChat OA served as an active-learning teaching tool, provided more frequent feedback and guidance to students, and facilitated better student-centered communication in the teaching process. Using the WeChat OA in medical teaching emphasized interactive, interoperable, effective, engaging, adaptable, and more participatory teaching styles. As a new platform, WeChat OA was free, Internet-reliant, and easily managed. Using this new medium as a communication tool accelerated further advancement of instant feedback and improvement in teaching activities. Notifications and interactive feedback via the mobile social medium WeChat OA anytime and anywhere facilitated a student-centered teaching mode. Use of WeChat OA significantly increased the proportion of students interactively participating and resulted in a high degree of student satisfaction. © 2017 by The International Union of Biochemistry and Molecular Biology, 45(5):421-425, 2017. © 2017 The International Union of Biochemistry and Molecular Biology.

  11. Immunity status of adults and children against poliomyelitis virus type 1 strains CHAT and Sabin (LSc-2ab in Germany

    Directory of Open Access Journals (Sweden)

    Diedrich Sabine

    2010-12-01

    Full Text Available Abstract Background In October 2007, the working group CEN/TC 216 of the European Committee for standardisation suggested that the Sabin oral poliovirus vaccine type 1 strain (LSc-2ab presently used for virucidal tests should be replaced by another attenuated vaccine poliovirus type 1 strain, CHAT. Both strains were historically used as oral vaccines, but the Sabin type 1 strain was acknowledged to be more attenuated. In Germany, vaccination against poliomyelitis was introduced in 1962 using the oral polio vaccine (OPV containing Sabin strain LSc-2ab. The vaccination schedule was changed from OPV to an inactivated polio vaccine (IPV containing wild polio virus type 1 strain Mahoney in 1998. In the present study, we assessed potential differences in neutralising antibody titres to Sabin and CHAT in persons with a history of either OPV, IPV, or OPV with IPV booster. Methods Neutralisation poliovirus antibodies against CHAT and Sabin 1 were measured in sera of 41 adults vaccinated with OPV. Additionally, sera from 28 children less than 10 years of age and immunised with IPV only were analysed. The neutralisation assay against poliovirus was performed according to WHO guidelines. Results The neutralisation activity against CHAT in adults with OPV vaccination history was significantly lower than against Sabin poliovirus type 1 strains (Wilcoxon signed-rank test P Conclusion The lack of neutralising antibodies against the CHAT strain in persons vaccinated with OPV might be associated with an increased risk of reinfection with the CHAT polio virus type 1, and this implies a putative risk of transmission of the virus to polio-free communities. We strongly suggest that laboratory workers who were immunised with OPV receive a booster vaccination with IPV before handling CHAT in the laboratory.

  12. Extending IM beyond the Reference Desk: A Case Study on the Integration of Chat Reference and Library-Wide Instant Messaging Network

    Directory of Open Access Journals (Sweden)

    Ian Chan

    2012-09-01

    Full Text Available Openfire is an open source IM network and a single unified application that meets the needs of chat reference and internal communications. In Fall 2009, the California State University San Marcos (CSUSM Library began use of Openfire and other Jive software instant messaging technologies, to simultaneously improve our existing IM-integrated chat reference software and implement an internal IM network. This case study describes the chat reference and internal communications environment at the CSUSM Library and the selection, implementation, and evaluation of Openfire. In addition, the authors discuss the benefits of deploying an integrated instant messaging and chat reference network.

  13. The Virtual Dressing Room

    DEFF Research Database (Denmark)

    Holte, Michael Boelstoft; Gao, Yi; Petersson, Eva

    2015-01-01

    This paper presents the design and evaluation of a usability and user experience test of a virtual dressing room. First, we motivate and introduce our recent developed prototype of a virtual dressing room. Next, we present the research and test design grounded in related usability and user...... experience studies. We give a description of the experimental setup and the execution of the designed usability and user experience test. To this end, we report interesting results and discuss the results with respect to user-centered design and development of a virtual dressing room....

  14. Films and dark room

    International Nuclear Information System (INIS)

    Abdul Nassir Ibrahim; Azali Muhammad; Ab. Razak Hamzah; Abd. Aziz Mohamed; Mohamad Pauzi Ismail

    2008-01-01

    After we know where the radiographic come from, then we must know about the film and also dark room. So, this chapter 5 discusses the two main components for radiography work that is film and dark room, places to process the film. Film are structured with three structured that are basic structured, emulsion and protection structured. So, this film can be classified either with their speed, screen and standard that used. The process to wash the film must be done in dark room otherwise the radiographer cannot get what are they inspected. The processing of film will be discussed briefly in next chapter.

  15. Room Acoustical Fields

    CERN Document Server

    Mechel, Fridolin

    2013-01-01

    This book presents the theory of room acoustical fields and revises the Mirror Source Methods for practical computational use, emphasizing the wave character of acoustical fields.  The presented higher methods include the concepts of “Mirror Point Sources” and “Corner sources which allow for an excellent approximation of complex room geometries and even equipped rooms. In contrast to classical description, this book extends the theory of sound fields describing them by their complex sound pressure and the particle velocity. This approach enables accurate descriptions of interference and absorption phenomena.

  16. Our Urban Living Room

    DEFF Research Database (Denmark)

    Hjortshøj, Rasmus

    2016-01-01

    Our Urban Living Room is an exhibition and a book, created by Cobe. The theme is based on Cobe’s ten years of practice, grounded in social livability and urban democracy, and our aim to create buildings and spaces that invite Copenhageners to use and define them; as an extended living room, where...... the boundaries between private and public space become fluid. Based on specific Cobe projects, Our Urban Living Room tells stories about the architectural development of Copenhagen, while exploring the progression of the Danish Capital - from an industrial city into an urban living room, known as one...... of the world’s most livable places. Photography by Rasmus Hjortshøj....

  17. Forensic psychiatry and the internet: practical perspectives on sexual predators and obsessional harassers in cyberspace.

    Science.gov (United States)

    McGrath, Michael G; Casey, Eoghan

    2002-01-01

    The growth of the Internet has revolutionized how society conducts business in many areas. Not to be left behind, the sexual predator and the obsessional harasser have found cyberspace to be a vehicle capable of meeting their needs: obtaining information, monitoring and contacting victims, developing fantasy, overcoming inhibitions, avoiding apprehension, and communicating with other offenders. Although clearly disparate offender categories, these two groups are included in this article because of the likelihood of their using the Internet in pursuit of their goals. Forensic psychiatrists should become familiar with computers and the Internet so that they can conduct relevant psychiatric evaluations of such individuals and can advise attorneys, victims, and law enforcement personnel competently, when retained in that capacity. This article discusses the Internet and its use by the sexual predator and the obsessional harasser, highlighting information of interest to the forensic psychiatrist, including the poorly understood field of digital evidence. Aspects of the Internet, such as on-line dating and cybersex also are covered, because they relate to sexual predation and stalking.

  18. El turismo en tiempos del ciberespacio / Tourism in times of cyberspace

    Directory of Open Access Journals (Sweden)

    Liliana López Levi

    2015-03-01

    Full Text Available This article analyzes tourists and their practices in times of cyberspace, as well as its impact in shaping the landscape and territory. The phenomenon should be analyzed based on the cyborg subject, their views, perceptions and ways of living leisure, recreation, adventure, relaxation and recreation. A subject to which technology, consumption and simulation are central, therefore it is lead to practices where simultaneity, ephemeral, diversity and the duality between local attachment and detachment are reflected in a space that echoes the imagination of cyborgs. El presente artículo analiza al sujeto y las prácticas turísticas en tiempos del ciberespacio, así como las repercusiones en la configuración del paisaje y del territorio. En la actualidad se trata de un fenómeno a investigar a partir de un sujeto ciborg, de sus concepciones, percepciones y formas de vivir el ocio, el esparcimiento, la aventura, el descanso y la recreación. Un sujeto para el cual la tecnología, el consumo y la simulación son centrales y que lo llevan a prácticas donde la simultaneidad, lo efímero, la diversidad y la dualidad arraigo-desarraigo se reflejan en un espacio que hace eco de los imaginarios de los cibernautas (ciborgs.

  19. Who is Everyone's Darling in Cyberspace? The Characteristics of Popular Online Daters

    Directory of Open Access Journals (Sweden)

    Chih-Chien Wang

    2010-06-01

    Full Text Available Online dating current is a popular activity in cyberspace. More and more people make new friends and find their partners through online dating web sites. There is an interesting observation that some people are more popular than others in online dating web sites. The current study focuses on the personal profile characteristics that make one a popular dater. By two field surveys, this study discusses the relationship between online daters' personal profiles and their popularity. The first survey investigated 800 online daters' profiles from dating web sites. The statistical analysis results indicated thatphysical body types and looks, education level, occupation, personality, and interests were characteristics that influenced the popularity of online daters, while significant gender differences were found in the characteristics that related to popularity of online daters. The second survey searched 960 online daters with profiles of popular and unpopular characteristics. By observing the popularity of these online daters, it was found that those with "popular" characteristics also were the popular daters and those with "unpopular" characteristics were the unpopular daters. This may serve as evidence that the found personal profile characteristics were indeed factors influencing the popularity of the online daters.

  20. Possibilities and Limits of Religion in the Cyberspace of Digital Media

    Directory of Open Access Journals (Sweden)

    Slavomír Gálik

    2017-06-01

    Full Text Available The authors of this paper study possibilities and limits of religion in the cyberspace of digital media, especially in the World of Warcraft videogame. Basing on various research cases, they claim that videogames can saturate religious needs of the hypermodern human. Nevertheless, they cannot substitute them totally, since there is the humans’ body, a barrier between virtual and traditional religion. In the first case (the so-called external limitation, the body is irreplaceable in religious ritual such as Baptising in Christian religion or Mindfulness of Breathing (ānāpānasati in Buddhism. In the second case (the so-called internal limitation, when the body (or its nerve centre is linked to technologies, the boundary lies in the depth and validity of spiritual experience. The authors state that even if positive cyber-spiritual experience could be reached, it would still be necessary to plant it into broader moral and cognitive frames. Only in such case it could represent a positive stimulus for the spiritual journey.

  1. Influence of WeChat on sleep quality among undergraduates in Chongqing, China: a cross-sectional study.

    Science.gov (United States)

    Xu, Xianglong; Lin, Qianyi; Zhang, Yan; Zhu, Runzhi; Sharma, Manoj; Zhao, Yong

    2016-01-01

    Previous studies showed that social media is associated with sleep quality. WeChat (a native social media in China) is very popular in China, especially among the youth. In the second quarter of 2016, Tencent's WeChat had 806 million monthly active users. The study sought to identify the influence of WeChat on the sleep quality among undergraduate students. A cross-sectional survey adopted a multi-stage stratified sampling survey to investigate undergraduates in Chongqing, China. Data were collected on 1979 eligible adults, aged 20.27 (SD: 1.26) years old, using Pittsburgh Sleep Quality Index (PSQI) to measure sleep quality. Respondents aged 20.27 ± 1.26 years included 535 (27.0%) males, and 1311 (66.3%) reported as having poor sleep quality. Of the 1979 participants, 1320 (66.70%) were WeChat users. In multivariable analyses, gender, grade, nationality, living costs, the student leader, the only child, type of university, WeChat usage was associated with domains of PSQI among undergraduates ( p  students.

  2. Proposal and Evaluation of Sequencing Words in Chat Conversation between Japanese and Chinese using Machine Translation

    OpenAIRE

    李, 芬慧; 由井薗, 隆也

    2010-01-01

    日中翻訳チャットにおいて単語を並べた会話によるチャットコミュニケーションを提案する.比較評価のために,通常の文章チャットによる評価実験も行った.その結果,日中翻訳チャットにおいて,(1)単語チャットは会話速度や会話内容の理解において文章チャットと同等に使えること,(2)利用者は,単語チャットよりは文章チャットを好む傾向があること,(3)翻訳された会話の理解は日本人と中国人とで文化的違いがある可能性が得られた.今後は単語チャットの応用を検討する予定である. : We propose a chat conversation between Japanese and Chinese using machine translation by sequencing words. By comparison with a conventional chat using machine translation, it is showed that (1) sequencing words in the chat is as same speed and understanding as the...

  3. The chatting gathering as a methodological strategy in in-service learning: moving along dialogical dynamics

    Directory of Open Access Journals (Sweden)

    María José Alonso

    2008-04-01

    Full Text Available This article focuses on an experience of in-service training carried out by a group of educators in literacy. The novelty of the undertaking lies in the methodological proposal analysed: using “chatting gatherings” as a methodological strategy, which supports critical reflection and the construction of knowledge, both in in-service training of professionals and in basic adult education. This experience reveals the nature of learning achieved through dialogical educational processes. Further, it allows us to observe the impact that they may have on the improvement of the professionals’ educational practices.

  4. IRC on your dime? What you really need to know about Internet relay chat

    Energy Technology Data Exchange (ETDEWEB)

    ERayome, J.; Romig, S., LLNL

    1998-05-22

    The purpose of this paper is to describe recent trends CIAC has encountered while working with sites that have been compromised. Frequently, the intruders set up and run Internet Relay Chat (IRC) to exchange information and to show off their success at having compromised a site. Invariably, this protocol consumes bandwidth, uses CPU cycles and is a source of embarrassment for the site. This paper focuses on these negative aspects of IRC and concedes that one can cite numerous examples where IRC is used in a positive manner.

  5. Design and Implementation of Mobile Blended Learning Model Based on WeChat Public Platform

    Directory of Open Access Journals (Sweden)

    Han Yanyan

    2017-01-01

    Full Text Available Merging together the ideas of mobile learning, blended learning and flipped classroom, a Mobile Blended Learning Model (MBLM is constructed. Based on WeChat Public Platform (WPP, MBLM can optimize the instructional process and improve the learning efficiency. A Mobile Blended Learning System(MBLS is implemented by using MBLM, and it is constructed by both WPP and auxiliary learning system which based on Java Web. This system has reasonable designed function, easy operation, and beautiful interface, so it can effectively promote the popularization of MBLM.

  6. Unusual nocturnal feeding by Brown Rock-chat Cercomela fusca (Passeriformes: Muscicapidae in Bikaner, Rajasthan, India

    Directory of Open Access Journals (Sweden)

    P. Singh

    2009-04-01

    Full Text Available Brown Rock-chat is a diurnal insectivorous bird commonly associated with human habitations. I report here nocturnal foraging of the species in and around Bikaner in Rajasthan. The birds showed a marked bimodal activity during their nocturnal foraging which peaked in early morning and late evening hours. Bright sodium-vapour lights that attracted a horde of insects during monsoons offered ideal foraging opportunities for the birds. This behavior is explained here as an adaptation to maximize their food intake during the period when the birds breed and their nutritional requirements are naturally high.

  7. Test Room Stability Plan

    International Nuclear Information System (INIS)

    1993-01-01

    This plan documents the combination of designs, installations, programs, and activities that ensures that the underground excavations at the Waste Isolation Pilot Plant (WIPP), in which transuranic (TRU) waste may be emplaced during the Test Phase, will remain sufficiently stable and safe during that time. The current ground support systems installed at the WIPP are the result of over ten years of data collection from hundreds of geomechanical instruments and thousands of hours of direct observation of the changing conditions of the openings. In addition, some of the world's most respected experts on salt rock mechanics have provided input in the design process and concurrence on the suitability of the final design. The general mine rockbolt pattern and the ground support system for the test rooms are designed to specifically address the fracture and deformation geometries observed today at the WIPP. After an introductory chapter, this plan describes the general underground design, then proceeds to an account of general ground support performance, and finally focuses on the details of the special test room ground support systems. One such system already installed in Room 1, Panel 1, is described in comprehensive detail. Other test rooms in Panel 1, whether full-size or smaller, will be equipped with systems that ensure stability to the same or equivalent extent. They will benefit from the experience gained in the first test room, which in turn benefitted from the data and knowledge accumulated during previous stages (e.g., the Site and Preliminary Design Validation program) of the project

  8. Variable Omission of "ne" in Real-Time French Chat: A Corpus-Driven Comparison of Educational and Non-Educational Contexts

    Science.gov (United States)

    van Compernolle, Remi A.; Williams, Lawrence

    2009-01-01

    This article reports on the variable omission of the French negative particle "ne" (the first marker of verbal negation) in synchronous (i.e., real-time) electronic communication environments. Patterns of variation in a corpus of non-educational chat (i.e., free, public-access Internet chat) are analyzed and compared to data produced by first-,…

  9. Frequency and Content of Chat Questions by Time of Semester at the University of Central Florida: Implications for Training, Staffing and Marketing

    Science.gov (United States)

    Goda, Donna; Bishop, Corinne

    2008-01-01

    The more than 4,000 "chats" received by the University of Central Florida's (UCF) Ask-A-Librarian digital reference service are the subject of this practitioner-based, descriptive case study. Question content from chats received during four semesters between January 2005 and May 2006 are categorized and plotted, by semester, to show the…

  10. Accuracy of "Modified Checklist for Autism in Toddlers" ("M-CHAT") in Detecting Autism and Other Developmental Disorders in Community Clinics

    Science.gov (United States)

    Toh, Teck-Hock; Tan, Vivian Wee-Yen; Lau, Peter Sie-Teck; Kiyu, Andrew

    2018-01-01

    This study determined the accuracy of "Modified Checklist for Autism in Toddlers" ("M-CHAT") in detecting toddlers with autism spectrum disorder (ASD) and other developmental disorders (DD) in community mother and child health clinics. We analysed 19,297 eligible toddlers (15-36 months) who had "M-CHAT" performed in…

  11. Control room design

    International Nuclear Information System (INIS)

    Zinke, H.

    1980-01-01

    To control a 1300 megawatt nuclear power plant, about 15000 plant parameters must be collected together to control and operate the plant. The control room design therefore is of particular importance. The main design criteria are: Required functions of the power plant process - Level of Automation - Ergonomics - Available Technology. Extensive analysis has resulted in a control room design method. This ensures that an objective solution will be reached. Resulting from this methodical approach are: 1. Scope, position and appearance of the instrumentation. 2. Scope, position and appearance of the operator controls. Process analysis dictates what instrumentation and operator controls are needed. The priority and importance of the control and instrumentation (this we define as the utilisation areas), dictates the rough layout of the control room. (orig./RW)

  12. Room for caring

    DEFF Research Database (Denmark)

    Timmermann, Connie; Uhrenfeldt, Lisbeth; Birkelund, Regner

    2015-01-01

    Aim This study explores how seriously ill hospitalized patients' experience and assign meaning to their patient room. Background Modern hospitals and the rational underlying care and treatment of today have their emphasis on diagnosis, cure and treatment. Consequently, aesthetics in the patient...... rooms such as a view of nature or natural light entering the room are often neglected in caring for these patients. Method A phenomenological-hermeneutic study design was applied and data was collected through multiple qualitative interviews combined with observations at a teaching hospital in Denmark......-being, relief and hope for the patients during serious illness. Therefore, these sensory impressions should be thought of as holding palliative potential and should be included as a part of caring for the seriously ill patients....

  13. Occupational Therapy Intervention in a child with Cri-du-Chat Syndrome: a case study

    Directory of Open Access Journals (Sweden)

    Gabriela Caseiro

    2013-04-01

    Full Text Available Cri-du-Chat syndrome is a chromosomal abnormality that can result in several damages including developmental delay and intellectual disability of the affected child. This case study describes the occupational therapy intervention in a child with Cri-du-chat syndrome that was followed from two to four years old, in weekly sessions, at a school hospital in the state of São Paulo. Data from medical records, family reports, and occupational therapy sessions were used for case description. The initial assessment showed that the child was hypotonic, stood up only with support, and explored objects by taking them to the mouth. Occupational Therapy assistance aimed to stimulate sensorimotor performance skills (perceptual, neuromuscleskeletal and motor processing and cognitive integration and components (attention spectrum, sequencing, and learning, through make-believe activities and participation in the activities of daily living (ADL. Moreover, it was also necessary to intervene directly in the school context and the child’s family, advising parents to avoid overprotection. Through the jointffort of the multidisciplinary team and the child’s family, it was possible to contribute to the improvement of bodily functions, allowing an increase in activities and participation, considering the child’s personal factors and environmental conditions, with consequent discharge from ambulatory attendance of occupational therapy.

  14. Conversational elements of online chatting: speaking practice for distance language learners?

    Directory of Open Access Journals (Sweden)

    Vincenza Tudini

    2003-12-01

    Full Text Available A critical issue in the delivery of language courses at a distance is to provide adequate scaffolding and monitoring1 of learners to assist them in the development of their interlanguage. As well as being one of the main reasons students enroll in language courses, oral interaction is considered beneficial to interlanguage development since it provides opportunities for negotiation of meaning. In the case of campus-based students, learners' progress in speaking the target language is supported and monitored mainly in the classroom. If non campus-based or online students do not attend face-to-face classes, how do they find opportunities for oral interaction? Using a Conversational Analysis and Second Language Acquisition perspective, the author considers elements which are common to both face-to-face oral interactions and chatting via a computer, with a view to assessing the potential of synchronous text-based communication tools to support the development of the speaking skills and interlanguage of distance language learners. This is done by reviewing findings of previous studies on synchronous text-based communication tools and identifying selected characteristics of oral interaction which are present in the chat sessions of two groups of campus-based intermediate level learners of Italian. In particular, the study focuses on repairs and incorporation of target forms, variety of speech acts, particularly questions and clarification requests, and the presence of discourse markers.

  15. Conceptualisation and development of the Conversational Health Literacy Assessment Tool (CHAT).

    Science.gov (United States)

    O'Hara, Jonathan; Hawkins, Melanie; Batterham, Roy; Dodson, Sarity; Osborne, Richard H; Beauchamp, Alison

    2018-03-22

    The aim of this study was to develop a tool to support health workers' ability to identify patients' multidimensional health literacy strengths and challenges. The tool was intended to be suitable for administration in healthcare settings where health workers must identify health literacy priorities as the basis for person-centred care. Development was based on a qualitative co-design process that used the Health Literacy Questionnaire (HLQ) as a framework to generate questions. Health workers were recruited to participate in an online consultation, a workshop, and two rounds of pilot testing. Participating health workers identified and refined ten questions that target five areas of assessment: supportive professional relationships, supportive personal relationships, health information access and comprehension, current health behaviours, and health promotion barriers and support. Preliminary evidence suggests that application of the Conversational Health Literacy Assessment Tool (CHAT) can support health workers to better understand the health literacy challenges and supportive resources of their patients. As an integrated clinical process, the CHAT can supplement existing intake and assessment procedures across healthcare settings to give insight into patients' circumstances so that decisions about care can be tailored to be more appropriate and effective.

  16. Automatic Association of Chats and Video Tracks for Activity Learning and Recognition in Aerial Video Surveillance

    Directory of Open Access Journals (Sweden)

    Riad I. Hammoud

    2014-10-01

    Full Text Available We describe two advanced video analysis techniques, including video-indexed by voice annotations (VIVA and multi-media indexing and explorer (MINER. VIVA utilizes analyst call-outs (ACOs in the form of chat messages (voice-to-text to associate labels with video target tracks, to designate spatial-temporal activity boundaries and to augment video tracking in challenging scenarios. Challenging scenarios include low-resolution sensors, moving targets and target trajectories obscured by natural and man-made clutter. MINER includes: (1 a fusion of graphical track and text data using probabilistic methods; (2 an activity pattern learning framework to support querying an index of activities of interest (AOIs and targets of interest (TOIs by movement type and geolocation; and (3 a user interface to support streaming multi-intelligence data processing. We also present an activity pattern learning framework that uses the multi-source associated data as training to index a large archive of full-motion videos (FMV. VIVA and MINER examples are demonstrated for wide aerial/overhead imagery over common data sets affording an improvement in tracking from video data alone, leading to 84% detection with modest misdetection/false alarm results due to the complexity of the scenario. The novel use of ACOs and chat Sensors 2014, 14 19844 messages in video tracking paves the way for user interaction, correction and preparation of situation awareness reports.

  17. Automatic association of chats and video tracks for activity learning and recognition in aerial video surveillance.

    Science.gov (United States)

    Hammoud, Riad I; Sahin, Cem S; Blasch, Erik P; Rhodes, Bradley J; Wang, Tao

    2014-10-22

    We describe two advanced video analysis techniques, including video-indexed by voice annotations (VIVA) and multi-media indexing and explorer (MINER). VIVA utilizes analyst call-outs (ACOs) in the form of chat messages (voice-to-text) to associate labels with video target tracks, to designate spatial-temporal activity boundaries and to augment video tracking in challenging scenarios. Challenging scenarios include low-resolution sensors, moving targets and target trajectories obscured by natural and man-made clutter. MINER includes: (1) a fusion of graphical track and text data using probabilistic methods; (2) an activity pattern learning framework to support querying an index of activities of interest (AOIs) and targets of interest (TOIs) by movement type and geolocation; and (3) a user interface to support streaming multi-intelligence data processing. We also present an activity pattern learning framework that uses the multi-source associated data as training to index a large archive of full-motion videos (FMV). VIVA and MINER examples are demonstrated for wide aerial/overhead imagery over common data sets affording an improvement in tracking from video data alone, leading to 84% detection with modest misdetection/false alarm results due to the complexity of the scenario. The novel use of ACOs and chat Sensors 2014, 14 19844 messages in video tracking paves the way for user interaction, correction and preparation of situation awareness reports.

  18. Analysis of chats on French internet forums about drugs and pregnancy.

    Science.gov (United States)

    Palosse-Cantaloube, Lucie; Lacroix, Isabelle; Rousseau, Vanessa; Bagheri, Haleh; Montastruc, Jean-Louis; Damase-Michel, Christine

    2014-12-01

    Some pregnant women use the internet to search for medical information. However, online information is not controlled. The objectives were to describe French online chats about drugs and pregnancy and evaluate the quality and reliability of information shared by internet users. This French descriptive study was performed in November 2012. In order to identify drugs and pregnancy-related forum websites, we used three French key words: forum, pregnancy and drug. We explored the first 10 websites from the search result. Diseases were described using the International Classification of Diseases and drugs classified with the Anatomical Therapeutic Chemical codes and the FDA risk classification. We selected 115 questions that were mainly posted by pregnant internet users in French forums. Drugs raising questions were mostly "nervous system," "anti-infective for systemic use" and "respiratory system" drugs. The risk during pregnancy for nearly half of these drugs had not been evaluated properly. Health professionals were only involved in 7% of the 214 answers. Internet users advised to take a drug in 21% of their answers. Thirty-four percent of those recommended drugs had not been well-evaluated or were potentially at risk during pregnancy. Finally, 12% of the answers could be at risk for pregnant woman. This study shows that information related to drugs and pregnancy in online chats could be at risk for pregnant women. Internet users must be aware that online forums are not reliable sources of information. Copyright © 2014 John Wiley & Sons, Ltd.

  19. The Current Status and a New Approach for Chinese Doctors to Obtain Medical Knowledge Using Social Media: A Study of WeChat

    Directory of Open Access Journals (Sweden)

    Li Liu

    2018-01-01

    Full Text Available Background. WeChat is the most widely and frequently used mobile social media in China and has profoundly integrated into the daily life of many Chinese people. A variety of medicine-related information may be found on WeChat. As users of WeChat, doctors often access health-related information and even provide a variety of medical services or participate in various types of mobile communication with patients. Objective. This study is the first attempt to quantitatively explore the approaches by doctors of acquiring medical knowledge using Internet resources especially social media such as WeChat to access knowledge. Methods. A self-administered questionnaire was designed, distributed, collected, and analyzed utilizing the online survey tool Sojump. WeChat was adopted to randomly release the questionnaires using snowball sampling and collect the results after a certain amount of time. Results. 292 valid questionnaires out of 314 questionnaires by clinical doctors were analyzed. Regarding the current status of accessing medical knowledge among doctors, more than 60% of the doctors regularly used the Internet to search for medical knowledge, 19.86% used WeChat as a channel to acquire medical knowledge, and only 23.97% were satisfied with acquiring medical knowledge through the Internet. Regarding the frequency of WeChat usage, nearly 40% of the doctors accessed WeChat more than 20 times per day and over 70% used WeChat for over half an hour every day. Regarding the status of accessing medical knowledge through WeChat, nearly half (47.26% of the doctors stated that they often read professional medical articles on WeChat and the most common channel is friends’ moment sharing and public account subscriptions, with selection rates of 59.93% and 60.27%, respectively. The most desirable mode of acquiring medical knowledge through WeChat was the following: “professional medical knowledge from peers, with a reminder.” Conclusion. WeChat has become a

  20. The Virtual Dressing Room

    DEFF Research Database (Denmark)

    Holte, Michael Boelstoft

    2013-01-01

    This paper presents a review of recent developments and future perspectives, addressing the problem of creating a virtual dressing room. First, we review the current state-of-the-art of exiting solutions and discuss their applicability and limitations. We categorize the exiting solutions into three...... kinds: (1) virtual real-time 2D image/video techniques, where the consumer gets to superimpose the clothes on their real-time video to visualize themselves wearing the clothes. (2) 2D and 3D mannequins, where a web-application uses the body measurements provided by the customer, to superimpose...... and their demands to a virtual dressing room....

  1. Birth room images

    DEFF Research Database (Denmark)

    Bowden, Calida; Sheehan, Athena; Foureur, Maralyn Jean

    2016-01-01

    Objective: this study examined images of birth rooms in developed countries to analyse the messages and visual discourse being communicated through images. Design: a small qualitative study using Kress and van Leeuwen's (2006) social semiotic theoretical framework for image analysis, a form...... and implications for practice: as images on the Internet inform and persuade society about stereotypical behaviours, the trends of our time and sociocultural norms, it is important to recognise images of the technological birth room on the Internet may be influential in dictating women's attitudes, choices...

  2. The changing sensory room

    DEFF Research Database (Denmark)

    2018-01-01

    In 2017 the kindergarten The Milky Way in the city Vejle in Denmark made a sensory room that has the special ability change whenever wanted by the children and social educators. Kjetil Sandvik (to the right) from Copenhagen University and Klaus Thestrup from Aarhus University reflects upon what...... they saw, took part in and talked with the social educators about. Jacob Knudsen from VIFIN filmed the two gentlemen and organised the project. it is a room composed around common experiments, many self-made objects, open narrative structures. and a combination of digital and analogue elements....

  3. Optimizing Fracture Treatments in a Mississippian "Chat" Reservoir, South-Central Kansas

    Energy Technology Data Exchange (ETDEWEB)

    K. David Newell; Saibal Bhattacharya; Alan Byrnes; W. Lynn Watney; Willard Guy

    2005-10-01

    This project is a collaboration of Woolsey Petroleum Corporation (a small independent operator) and the Kansas Geological Survey. The project will investigate geologic and engineering factors critical for designing hydraulic fracture treatments in Mississippian ''chat'' reservoirs. Mississippian reservoirs, including the chat, account for 159 million m3 (1 billion barrels) of the cumulative oil produced in Kansas. Mississippian reservoirs presently represent {approx}40% of the state's 5.6*106m3 (35 million barrels) annual production. Although geographically widespread, the ''chat'' is a heterogeneous reservoir composed of chert, cherty dolomite, and argillaceous limestone. Fractured chert with micro-moldic porosity is the best reservoir in this 18- to 30-m-thick (60- to 100-ft) unit. The chat will be cored in an infill well in the Medicine Lodge North field (417,638 m3 [2,626,858 bbls] oil; 217,811,000 m3 [7,692,010 mcf] gas cumulative production; discovered 1954). The core and modern wireline logs will provide geological and petrophysical data for designing a fracture treatment. Optimum hydraulic fracturing design is poorly defined in the chat, with poor correlation of treatment size to production increase. To establish new geologic and petrophysical guidelines for these treatments, data from core petrophysics, wireline logs, and oil-field maps will be input to a fracture-treatment simulation program. Parameters will be established for optimal size of the treatment and geologic characteristics of the predicted fracturing. The fracturing will be performed and subsequent wellsite tests will ascertain the results for comparison to predictions. A reservoir simulation program will then predict the rate and volumetric increase in production. Comparison of the predicted increase in production with that of reality, and the hypothetical fracturing behavior of the reservoir with that of its actual behavior, will serve as tests of

  4. Differences in Brand Image of Online Chat Application of Blackberry Messenger, Whatsapp, and Line for Bina Nusantara University’s Student

    Directory of Open Access Journals (Sweden)

    Kuspuji C. B. Wicaksono

    2016-05-01

    Full Text Available This article was written to find out whether there were any differences on brand image for each online chat Application such as Blackberry Messenger, Whatsapp, and LINE based on six factors of the brand image which are: benefits, attributes, cultures, values, personality, and user. Data for the research were collected from questionnaires given to respondents who had used each mention online chat application. Then each respondent was asked to give scores based on the six factors of brand image for each online chat Application. Using the ANOVA method for testing the differences between brand images for each online chat application. The result reveales that there are differences in the brand image between BlackBerry Messenger, Whatsapp, and LINE for benefits, cultures, and values. There is no difference in attributes, and personality cannot be tested. The company that creates online chat application are expected to improve their brand image to distinguish one another differently.

  5. Analysis of innovation diffusion theory under “micro” environment - Survey analysis of application and promotion of WeChat among the youth group

    Directory of Open Access Journals (Sweden)

    Wei Chen

    2016-01-01

    Full Text Available Since WeChat has been launched in 2011, as of the first quarter of 2015, the active users have reached 549 million per month1. WeChat has become the largest mobile instant messaging software among the user groups in Asia. Therefore, WeChat is no longer “micro”, and grabs the attention of more youth groups by virtue of the “micro” advantages in the Internet era in a way of low-priced new media. Through sorting 192 effective questionnaires recovered, this paper summarizes some transmitting tendency and suggestions of “micro” innovation diffusion from the research view of the concept of innovation diffusion theory, and development stage of WeChat in the youth group, based on the survey data and by the use of the statistics of informatics, qualitative and quantitative analysis method, so as to provide a certain theoretical basis for the future research of WeChat.

  6. Crafting a Democratic Enclave on the Cyberspace: Case Studies of Malaysia, Indonesia, and Singapore

    Directory of Open Access Journals (Sweden)

    Yangyue Liu

    2011-01-01

    Full Text Available As an antithesis of “authoritarian enclave” which has been well-established in the comparative politics literature, “democratic enclave” points to the institution of a state or the unambiguous regulatory space in society “where the authoritarian regime’s writ is substantively limited and is replaced by an adherence to recognizably democratic norms and procedures” (Gilley 2010. In this sense, the Internet space, embodied by information and communication technologies, has great potential to play such a role, since its “inherited” properties of decentralization and anonymity would inevitably breach the authoritarian rules. However, a closer look at three Southeast Asian states, Malaysia, Singapore and the “New Order” Indonesia whose regimes were characterized by authoritarianism when Internet was initially developed, reveals different trajectories. In the “New Order” Indonesia and Malaysia, the governments consciously left the Internet space uncontrolled; the online media developed independently, vibrantly, and professionally, especially in the Malaysian case; and there were strong connections between online and offline contentious politics. These elements made the Internet space in Indonesia and Malaysia a successful case of democratic enclave. Based on these criteria, however, the Internet space in Singapore has not achieved similar status. This paper analyses the different outcomes of enclave creation on the cyberspace among these countries. It argues that elite conflict and the strength of civil society are the two major factors that shape the differences. In this sense, the political contexts are of great importance for the understanding of Internet’s political impacts.

  7. PS Control Room

    CERN Multimedia

    CERN PhotoLab

    1963-01-01

    The good old PS Control Room, all manual. For each parameter, a knob or a button to control it; for each, a light or meter or oscilloscope to monitor it; carefully written pages serve as the data bank; phones and intercom for communication. D.Dekkers is at the microphone, M.Valvini sits in front.

  8. Room for iodo therapy

    International Nuclear Information System (INIS)

    Pinto, A.L.A.; Derivi, A.; Bacelar, A.; Ramos, F.R.; Dias, T.M.; Baptista, I.S.

    1996-01-01

    A description of rules to assemble, to install and to maintain a room for iodo therapy is presented. The necessities of the patients and procedures to meet the norms of radiologic protection established by the Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil) are highlighted

  9. Local control room

    CERN Multimedia

    CERN PhotoLab

    1972-01-01

    Local control room in the ejection building : all electronics pertaining to proton distribution and concomitants such as beam gymnastics and diagnostics at high energies will eventually be gathered here. Shown is the first of two rows of fast ejection electronic racks. It includes only what is necessary for operation.

  10. DSS / Press Room

    Science.gov (United States)

    Defense Security Service, U.S. Department of Defense Site Map | A-Z Index | Facebook | Twitter Locations Press Room Organizational Structure Careers at DSS Doing Business with DSS Frequently Asked Classification System (NCCS) National Industrial Security System (NISS) ODAA Business Management System (OBMS

  11. Disinhibition of negative true self for identity reconstructions in cyberspace: Advancing self-discrepancy theory for virtual setting.

    Directory of Open Access Journals (Sweden)

    Chuan Hu

    Full Text Available In face-to-face communications, to avoid sanctions and disapproval from others, people are more likely to hide negative aspects of their true self (such as socially undesirable personalities, minds, beliefs and consciousness to avoid conflict with social norms and laws. The anonymity of cyberspace provides people a unique environment to behave more freely and openly with less restraint from the real word. Existing research related to online true self expression has mainly explored true self as an independent aspect of self. Regarding true self as a two-dimensional concept, this study investigates true self from the perspective of individuals' self-guide and identity reconstruction in both online and offline world. Using qualitative research methods, the current study investigates 57 participants through interviews and questionnaires. Content analysis reveals four factors that motivate people to express more true self (especially negative true self when reconstructing their online identity and involve true self as a part of their self-guide in anonymous environment. By incorporating true self as an important part of individuals' self-guide and identity online, the current study advances self-discrepancy theory, making it more comprehensive for cyberspace. The results are also interpreted based on self-determination theory. The theoretical contributions of this study are discussed and practical implications are also presented.

  12. Controlling the clean room atmosphere

    International Nuclear Information System (INIS)

    Meeks, R.F.

    1979-01-01

    Several types of clean rooms are commonly in use. They include the conventional clean room, the horizontal laminar flow clean room, the vertical laminar flow clean room and a fourth type that incorporates ideas from the previous types and is known as a clean air bench or hood. These clean rooms are briefly described. The origin of contamination and methods for controlling the contamination are discussed

  13. Attitudes of Jordanian University Students towards Using Online Chat Discourse with Native Speakers of English for Improving Their Language Proficiency

    Science.gov (United States)

    Mahfouz, Safi M.; Ihmeideh, Fathi M.

    2009-01-01

    This study aims to investigate Jordanian university students' attitudes towards using video and text chat discourse with anonymous native speakers of English to improve their English proficiency. To achieve this aim, a questionnaire was designed. The study sample consisted of 320 university students enrolled in two Jordanian universities. Results…

  14. Psychological Well-Being in Parents of Children with Angelman, Cornelia de Lange and Cri du Chat Syndromes

    Science.gov (United States)

    Griffith, G. M.; Hastings, R. P.; Oliver, C.; Howlin, P.; Moss, J.; Petty, J.; Tunnicliffe, P.

    2011-01-01

    Background: The current study focuses on mothers and fathers of children with three rare genetic syndromes that are relatively unexplored in terms of family experience: Angelman syndrome, Cornelia de Lange syndrome and Cri du Chat syndrome. Method: Parents of children with Angelman syndrome (n = 15), Cornelia de Lange syndrome (n = 16) and Cri du…

  15. Social Behavior and Characteristics of Autism Spectrum Disorder in Angelman, Cornelia de Lange, and Cri du Chat Syndromes

    Science.gov (United States)

    Moss, Joanna; Howlin, Patricia; Hastings, Richard Patrick; Beaumont, Sarah; Griffith, Gemma M.; Petty, Jane; Tunnicliffe, Penny; Yates, Rachel; Villa, Darrelle; Oliver, Chris

    2013-01-01

    We evaluated autism spectrum disorder (ASD) characteristics and social behavior in Angelman (AS; "n" ?=? 19; mean age ?=?10.35 years), Cornelia de Lange (CdLS; "n" ?=? 15; mean age ?=?12.40 years), and Cri du Chat (CdCS, also known as 5 p-syndrome; "n" ?=? 19; mean age ?=? 8.80 years) syndromes. The proportion of…

  16. Internet Communication Disorder and the structure of the human brain: initial insights on WeChat addiction.

    Science.gov (United States)

    Montag, Christian; Zhao, Zhiying; Sindermann, Cornelia; Xu, Lei; Fu, Meina; Li, Jialin; Zheng, Xiaoxiao; Li, Keshuang; Kendrick, Keith M; Dai, Jing; Becker, Benjamin

    2018-02-01

    WeChat represents one of the most popular smartphone-based applications for communication. Although the application provides several useful features that simplify daily life, a growing number of users spend excessive amounts of time on the application. This may lead to interferences with everyday life and even to addictive patterns of use. In the context of the ongoing discussion on Internet Communication Disorder (ICD), the present study aimed to better characterize the addictive potential of communication applications, using WeChat as an example, by examining associations between individual variations in tendencies towards WeChat addiction and brain structural variations in fronto-striatal-limbic brain regions. To this end levels of addictive tendencies, frequency of use and structural MRI data were assessed in n = 61 healthy participants. Higher tendencies towards WeChat addiction were associated with smaller gray matter volumes of the subgenual anterior cingulate cortex, a key region for monitoring and regulatory control in neural networks underlying addictive behaviors. Moreover, a higher frequency of the paying function was associated with smaller nucleus accumbens volumes. Findings were robust after controlling for levels of anxiety and depression. The present results are in line with previous findings in substance and behavioral addictions, and suggest a similar neurobiological basis in ICD.

  17. The Usability of WeChat as a Mobile and Interactive Medium in Student-Centered Medical Teaching

    Science.gov (United States)

    Wang, Juan; Gao, Furong; Li, Jiao; Zhang, Jieping; Li, Siguang; Xu, Guo-tong; Xu, Lei; Chen, Jianjun; Lu, Lixia

    2017-01-01

    Biochemistry and cellular biology courses for medical students at Tongji University include the assessment that provides students with feedback to enhance their learning, which is a type of formative assessment. However, frequent instant feedback and guidance for students is often absent or inconsistently included in the teaching process. WeChat,…

  18. WeChat Public Account Use Improves Clinical Control of Cough-Variant Asthma: A Randomized Controlled Trial.

    Science.gov (United States)

    Cao, Yuan; Lin, Shi-Hua; Zhu, Ding; Xu, Feng; Chen, Zhi-Hua; Shen, Hua-Hao; Li, Wen

    2018-03-14

    BACKGROUND WeChat is a convenient and popular social medium, and it seems to be an appropriate platform for education and management of patients. This study sought to identify usefulness in clinical control of cough-variant asthma (CVA). MATERIAL AND METHODS A randomized controlled trial was conducted among 80 CVA patients. After being assigned to either the traditional group (TG) or the WeChat group (WG), they received the same inhalation therapy, but patients in WG received additional education and instruction via our public account on the WeChat application. Questionnaires on asthma and chronic cough, data on pulmonary function, blood-related items, follow-up adherence, and Emergency Department (ED) visits were collected at the initial visit and at 3 months. RESULTS A total of 67 participants completed the trial for analysis. FEV1/predicted and FEV1/FVC were significantly increased in WG (pWeChat as part of treatment and management of CVA can help patients learn about their disease and medications, as well as improve disease control and therapy outcomes.

  19. Teachers' instructional goals for science practice: Identifying knowledge gaps using cultural-historical activity theory (CHAT)

    Science.gov (United States)

    Farrar, Cynthia Hamen

    In AP Biology, the course goal, with respect to scientific acts and reasoning, has recently shifted toward a reform goal of science practice, where the goal is for students to have a scientific perspective that views science as a practice of a community rather than a body of knowledge. Given this recent shift, this study is interested in the gaps that may exist between an individual teacher's instructional goal and the goals of the AP Biology course. A Cultural-Historical Activity Theory (CHAT) methodology and perspective is used to analyze four teachers' knowledge, practice, and learning. Teachers have content knowledge for teaching, a form of knowledge that is unique for teaching called specialized content knowledge. This specialized content knowledge (SCK) defines their instructional goals, the student outcomes they ultimately aim to achieve with their students. The study employs a cultural-historical continuum of scientific acts and reasoning, which represents the development of the AP Biology goal over time, to study gaps in their instructional goal. The study also analyzes the contradictions within their teaching practice and how teachers address those contradictions to shift their instructional practice and learn. The findings suggest that teachers have different interpretations of the AP Biology goals of science practice, placing their instructional goal at different points along the continuum. Based on the location of their instructional goal, different micro-communities of teachers exist along the continuum, comprised of teachers with a shared goal, language, and culture of their AP Biology teaching. The in-depth study of one teacher's AP Biology teaching, using a CHAT perspective, provides a means for studying the mechanisms that connect SCK to classroom actions and ultimately to instructional practice. CHAT also reveals the nature and importance of contradictions or cognitive dissonance in teacher learning and the types of support teachers need to

  20. Clean room actuators

    Energy Technology Data Exchange (ETDEWEB)

    Higuchi, Toshiro

    1987-06-01

    This report explains on the present status of the clean room actuators including the author's research results. In a clean room, there exists a possibility of dust generation, even when a direct human work is eliminated by the use of robots or automatic machines, from the machines themselves. For this, it is important to develop such clean robots and transfer/positioning mechanism that do not generate dusts, and to develop an actuator and its control technique. Topics described in the report are as follows: 1. Prevention of dust diffusion by means of sealing. 2. Elimination of mechanical contact (Linear induction motor and pneumatic float, linear motor and magnetic attraction float, linear motor and air bearing, and magnetic bearing). 3. Contactless actuator having a positioning mechanism (Use of linear step motor and rotary contactless actuator). (15 figs, 11 refs)

  1. Parametric Room Acoustic Workflows

    DEFF Research Database (Denmark)

    Parigi, Dario; Svidt, Kjeld; Molin, Erik

    2017-01-01

    The paper investigates and assesses different room acoustics software and the opportunities they offer to engage in parametric acoustics workflow and to influence architectural designs. The first step consists in the testing and benchmarking of different tools on the basis of accuracy, speed...... and interoperability with Grasshopper 3d. The focus will be placed to the benchmarking of three different acoustic analysis tools based on raytracing. To compare the accuracy and speed of the acoustic evaluation across different tools, a homogeneous set of acoustic parameters is chosen. The room acoustics parameters...... included in the set are reverberation time (EDT, RT30), clarity (C50), loudness (G), and definition (D50). Scenarios are discussed for determining at different design stages the most suitable acoustic tool. Those scenarios are characterized, by the use of less accurate but fast evaluation tools to be used...

  2. Air Distribution in Rooms

    DEFF Research Database (Denmark)

    Nielsen, Peter V.

    The research on air distribution in rooms is often done as full-size investigations, scale-model investigations or by Computational Fluid Dynamics (CFD). New activities have taken place within all three areas and this paper draws comparisons between the different methods. The outcome of the l......EA sponsored research "Air Flow Pattern within Buildings" is used for comparisons in some parts of the paper because various types of experiments and many countries are involved....

  3. Planets in a Room

    Science.gov (United States)

    Giacomini, l.; Aloisi, F.; De Angelis, I.

    2017-09-01

    Teaching planetary science using a spherical projector to show the planets' surfaces is a very effective but usually very expensive idea. Whatsmore, it usually assumes the availability of a dedicated space and a trained user. "Planets in a room" is a prototypal low cost version of a small, spherical projector that teachers, museum, planetary scientists and other individuals can easily build and use on their own, to show and teach the planets The project of "Planets in a Room" was made by the italian non-profit association Speak Science with the collaboration of INAF-IAPS of Rome and the Roma Tre University (Dipartimento di Matematica e Fisica). This proposal was funded by the Europlanet Outreach Funding Scheme in 2016. "Planets in a room" will be presented during EPSC 2017 to give birth to the second phase of the project, when the outreach and research community will be involved and schools from all over Europe will be invited to participate with the aim of bringing planetary science to a larger audience.

  4. Pituitary adenoma in monozigotic twins with Cri du Chat syndome: a rare case report

    Directory of Open Access Journals (Sweden)

    Canaz Gokhan

    2016-12-01

    Full Text Available Pituitary adenomas are rare tumours of pediatric population. In etiology, genetic factors are more common than they are in adults. Because of the rarity of the cases, there are only a few large case studies in the literature. Pituitary tumours in children are often related with syndromes like MEN type 1, Carney Complex and Mc Cune Albright, but there is no case in the literature associated with Cri Du Chat syndrome. Statisticlly, it has been reported that, pediatric tumours occur more often in twins, in the pediatric population. Main treatment for prolactinomas is medical intervention with dopamine agonists, as in adults. Surgery is prefered when the tumour is resistant to medical treatment or shows mass effects around sellae. In that situation, as in adults, both transcranial and transsphenoidal approach is possible.

  5. 2012 ARPA-E Energy Innovation Summit: Fireside Chat with Steven Chu and Bill Gates

    Energy Technology Data Exchange (ETDEWEB)

    Chu, Steven; Gates, Bill; Podesta, John

    2012-02-28

    The third annual ARPA-E Energy Innovation Summit was held in Washington D.C. in February, 2012. The event brought together key players from across the energy ecosystem - researchers, entrepreneurs, investors, corporate executives, and government officials - to share ideas for developing and deploying the next generation of energy technologies. This video captures a session called Fireside Chat that featured Steven Chu, the Secretary of Energy, and Bill Gates, Chairman of Microsoft Corporation. The session is moderated by John Podesta, Chair of the Center for American Progress. Energy Secretary Steven Chu and Microsoft Founder and Chairman Bill Gates exchanged ideas about how small businesses and innovators can overcome the challenges that face many startups.

  6. Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware

    Science.gov (United States)

    Dumont, Maarten; Rogmans, Sammy; Maesen, Steven; Bekaert, Philippe

    We present a practical system prototype to convincingly restore eye contact between two video chat participants, with a minimal amount of constraints. The proposed six-fold camera setup is easily integrated into the monitor frame, and is used to interpolate an image as if its virtual camera captured the image through a transparent screen. The peer user has a large freedom of movement, resulting in system specifications that enable genuine practical usage. Our software framework thereby harnesses the powerful computational resources inside graphics hardware, and maximizes arithmetic intensity to achieve over real-time performance up to 42 frames per second for 800 ×600 resolution images. Furthermore, an optimal set of fine tuned parameters are presented, that optimizes the end-to-end performance of the application to achieve high subjective visual quality, and still allows for further algorithmic advancement without loosing its real-time capabilities.

  7. Protein-energy malnutrition is frequent and precocious in children with cri du chat syndrome.

    Science.gov (United States)

    Lefranc, Violaine; de Luca, Arnaud; Hankard, Régis

    2016-05-01

    Protein-energy malnutrition (PEM) is poorly reported in cri du chat syndrome (CDCS) (OMIM #123450), a genetic disease that causes developmental delay and global growth retardation. The objective was to determine the nutritional status at different ages in children with CDCS and factors associated with PEM. A questionnaire focused on growth and nutritional care was sent to 190 families. Among 36 analyzable questionnaires, growth and nutritional indices compatible with PEM occurred in 47% of patients: 19% before 6 months of age, 24% between 6-12 months and 34% after 12 months. Eight patients received enteral feeding. Speech therapy for swallowing education was performed more often in malnourished children (63% vs. 22%, P < 0.02). PEM is frequent and occurs early in this disease, requiring closed nutritional monitoring. © 2016 Wiley Periodicals, Inc.

  8. Using the Contextual Hub Analysis Tool (CHAT) in Cytoscape to Identify Contextually Relevant Network Hubs.

    Science.gov (United States)

    Muetze, Tanja; Lynn, David J

    2017-09-13

    Highly connected nodes in biological networks are called network hubs. Hubs are topologically important to the structure of the network and have been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we provide a step-by-step protocol for using the Contextual Hub Analysis Tool (CHAT), an application within Cytoscape 3, which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene or protein expression data, and identify hub nodes that are more highly connected to contextual nodes than expected by chance. © 2017 by John Wiley & Sons, Inc. Copyright © 2017 John Wiley & Sons, Inc.

  9. What Makes Sports Fans Interactive? Identifying Factors Affecting Chat Interactions in Online Sports Viewing.

    Science.gov (United States)

    Ko, Minsam; Yeo, Jaeryong; Lee, Juyeong; Lee, Uichin; Jang, Young Jae

    2016-01-01

    Sports fans are able to watch games from many locations using TV services while interacting with other fans online. In this paper, we identify the factors that affect sports viewers' online interactions. Using a large-scale dataset of more than 25 million chat messages from a popular social TV site for baseball, we extract various game-related factors, and investigate the relationships between these factors and fans' interactions using a series of multiple regression analyses. As a result, we identify several factors that are significantly related to viewer interactions. In addition, we determine that the influence of these factors varies according to the user group; i.e., active vs. less active users, and loyal vs. non-loyal users.

  10. Practice and Evaluation of Ability Grouping Lecture on Information Literacy Using a Chat Tool

    Science.gov (United States)

    Fujinaga, Kiyohisa

    A teaching methodology on information literacy that skilled and inexperienced students learn through different specific contents in a class is proposed. Skilled students collaboratively work using an e-Learning environment while a conventional projector-based lecture on how to use a computer is given for inexperienced students. The methodology had been put into practice for two years. Skilled students were divided into a few groups and members in a group collaboratively made a PowerPoint slide show using a chat tool as the communication media. The slide shows were evaluated by means of questionnaire to the inexperienced students. The results were nearly the same as those of teachers. The practice of the methodology resulted in that the concentration of the skilled students was promoted and the learning attitude of the inexperienced students was improved, compared with the case that the both skilled and inexperienced students learned through the same contents.

  11. What Makes Sports Fans Interactive? Identifying Factors Affecting Chat Interactions in Online Sports Viewing.

    Directory of Open Access Journals (Sweden)

    Minsam Ko

    Full Text Available Sports fans are able to watch games from many locations using TV services while interacting with other fans online. In this paper, we identify the factors that affect sports viewers' online interactions. Using a large-scale dataset of more than 25 million chat messages from a popular social TV site for baseball, we extract various game-related factors, and investigate the relationships between these factors and fans' interactions using a series of multiple regression analyses. As a result, we identify several factors that are significantly related to viewer interactions. In addition, we determine that the influence of these factors varies according to the user group; i.e., active vs. less active users, and loyal vs. non-loyal users.

  12. What Makes Sports Fans Interactive? Identifying Factors Affecting Chat Interactions in Online Sports Viewing

    Science.gov (United States)

    Yeo, Jaeryong; Lee, Juyeong

    2016-01-01

    Sports fans are able to watch games from many locations using TV services while interacting with other fans online. In this paper, we identify the factors that affect sports viewers’ online interactions. Using a large-scale dataset of more than 25 million chat messages from a popular social TV site for baseball, we extract various game-related factors, and investigate the relationships between these factors and fans’ interactions using a series of multiple regression analyses. As a result, we identify several factors that are significantly related to viewer interactions. In addition, we determine that the influence of these factors varies according to the user group; i.e., active vs. less active users, and loyal vs. non-loyal users. PMID:26849568

  13. O uso de chats na aprendizagem de línguas estrangeiras

    Directory of Open Access Journals (Sweden)

    Lorena Ribeiro Fonseca

    2011-11-01

    Full Text Available Resumo: Neste artigo, justifico o uso do chat por aprendizes de línguas estrangeiras ressaltando seus pontos positivos mas, também, apontando para problemas potenciais que esta prática pode acarretar.Palavras-chave: Lingüística aplicada; ensino e aprendizagem de língua estrangeira; tecnologia.Résumé: Dans cet article, je justifie la pratique des tchatches par les étudiants de langues étrangères. J’en rélève les points positifs mais, aussi, je signale les problèmes potentiels que cet exercice peut entraîner.Mots-clés: Linguistique apliquée; enseigment et apprentissage des langues étrangères; technologie.Keywords: Applied linguistics; foreign language teaching and learning; technology.

  14. Room with a View: Ethical Encounters in Room 13

    Science.gov (United States)

    Grube, Vicky

    2012-01-01

    In this article, the author describes ethical encounters in Room 13, a schoolroom where children made what they wanted, posed their own questions, and ran an art room like a small business. In Room 13 children had the responsibility to maintain all aspects of the art studio. Specific decisions fell to an annually elected management team, a small…

  15. Study on Cyber-security Strategy and National Cyberspace Sovereignty%论网络安全战略与国家网络主权

    Institute of Scientific and Technical Information of China (English)

    邹鹏; 朱诗兵; 邹红霞

    2017-01-01

    While national interests increasingly extending with the development of cyberspace, cyberspace sovereignty and its guarantee have drawn wide attention from international communities and major countries have developed space-security strategy to safeguard their national cyberspace sovereignty.This paper analyzes the relationship between the cyberspace sovereignty and cyber-security as well as summarizes the characteristics of existing cyber-security strategies in the world.In view of protecting our national cyberspace sovereignty, it points out the issues we should pay more attention to in the formulation and implementation of cyber-security strategy which include taking national security as the starting point, taking cyberspace sovereignty as the fundament, perfecting relevant law and regulation systems, improving relevant systems, mechanisms and the support systems, accelerating the development of core technologies in cyber-security and strengthening the cyber-security training.%随着网络空间承载的国家利益日益广泛,网络主权及其保障问题引起了国际社会的高度重视,世界主要国家纷纷通过制定网络安全战略来维护本国网络主权.分析了世界各国对网络主权保护的态度及网络主权与网络安全的关系,综述了世界各国现有网络安全战略的特点.从保护我国国家网络主权的实际需求出发,指出了我国在网络安全战略的制定和实施中应当重点关注的问题,即以总体国家安全观为根本出发点、以网络主权为基本依据、健全相关法律法规体系、健全体制机制和保障力量体系、加快推进网络安全核心技术发展以及加强网络安全人才培养.

  16. Safety measures in exposure room

    International Nuclear Information System (INIS)

    Muhammad Jamal Md Isa

    2004-01-01

    The contents of this chapter are follows - The exposure room: location and dimension, material and thickness, windows, doors and other openings; Position of the Irradiating Apparatus, Use of Space Adjoining the Room, Warning Signs/Light, Dark Room. Materials and Apparatus: Classification of Areas, Local Rules, Other General Safety Requirements

  17. Room for a rethink?

    Energy Technology Data Exchange (ETDEWEB)

    Walker, S. [Independent Editorial and Technical Services, Oxford (United Kingdom)

    2000-05-01

    Room-and-pillar has traditionally satisfied the need for a low-cost, flexible coal mining system. Its downside can be low resource recovery. With accessible reserves falling steadily, can mining companies afford to accept this? Simon Walker looks into this problem using evidence presented recently on the US experience by Richard Bonskorski of the US Energy Information Administration, Dr Michael Karmis of Virgina Tech, Roger O'Quinn from Eimco, an equipment manufacturer, and Larry Howe from J H Fletcher. An urgent need is identified to develop new systems to allow significant gains in extraction, using novel concepts such as remote mining. 2 refs., 1 fig., 4 photos.

  18. Room for improvement

    DEFF Research Database (Denmark)

    Sandal, Louise F; Thorlund, Jonas B; Moore, Andrew J

    2018-01-01

    -reported outcomes and qualitative findings supported the primary finding, while improvements in muscle strength and aerobic capacity did not differ between exercise groups. CONCLUSION: Results suggest that the physical environment contributes to treatment response. Matching patients' preferences to treatment rooms...... significance (p=0.07). Waitlist group reported no improvement (-0.05 95% CI -0.5 to 0.4). In interviews, participants from the standard environment expressed greater social cohesion and feeling at home. Qualitative themes identified; reflection, sense of fellowship and transition. Secondary patient...... may improve patient-reported outcomes. TRIAL REGISTRATION NUMBER: ClinicalTrials.gov identifier: NCT02043613....

  19. Making room for volunteers

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Kleis

    2012-01-01

    If campaigns do not accommodate this view, all but a hard core of regulars and fired-up partisans will drift away, leaving it for staffers and hired hands to do all the hard work of identifying voters, canvassing people by foot and by phone, and turning out the vote. [...] ironically, a campaign...... that is singleminded in its instrumental pursuit of victory can thus be less effective than one that is more accommodating- a campaign that makes room for volunteers by accepting that, unlike staffers, they come to politics with a different perspective and conception of what is and ought to be going on....

  20. On The Living Room

    Directory of Open Access Journals (Sweden)

    Thomas Richards

    2013-03-01

    Full Text Available This text discusses the work The Living Room, directed by the author, and reflects on its meanings and functions. The article confronts problems performance raises in relation to contemporary social life, bringing forward the isolation of life today and the possibilities performance offers to fight it. We problematise the crisis experienced by the author and the consequent creation of the work as a mobile performative device in relation to the staging space. Finally, the work questions the forms of interaction and type of participation possible in performance.

  1. Social Networks in context of cyberspace. Consumers, electronic commerce and intellectual property in the light of the Cuban case

    Directory of Open Access Journals (Sweden)

    Nelvys Mendoza Gurdián

    2018-06-01

    Full Text Available Face the state of vulnerability in the context of cyberspace, it is necessary to reflect on the social networks and law, from a holistic approach aimed at the vulnerability of rights associated with the information in this environment. This work general objective is to analyse the phenomenon of online social networks and the information society, emphasizing on the study of the legal aspects related to consumers, electronic commerce and intellectual property. The methodology used aims to conceptualize the category of social networks, examinate the aspects associated with law in the use of social networks and establish the conceptual, legal and conflicting points of relevance. This will allow describing the problems under study and propose alternatives for a sphere of integrative protection that harmonizes the edges of the preventive, the corrective and the prophylactic.

  2. Use of lidar point cloud data to support estimation of residual trace metals stored in mine chat piles in the Old Lead Belt of southeastern, Missouri

    Science.gov (United States)

    Witt, Emitt C.

    2016-01-01

    Historic lead and zinc (Pb-Zn) mining in southeast Missouri’s ―Old Lead Belt‖ has left large chat piles dominating the landscape where prior to 1972 mining was the major industry of the region. As a result of variable beneficiation methods over the history of mining activity, these piles remain with large quantities of unrecovered Pb and Zn and to a lesser extent cadmium (Cd). Quantifying the residual content of trace metals in chat piles is problematic because of the extensive field effort that must go into collecting elevation points for volumetric analysis. This investigation demonstrates that publicly available lidar point data from the U.S. Geological Survey 3D Elevation Program (3DEP) can be used to effectively calculate chat pile volumes as a method of more accurately estimating the total residual trace metal content in these mining wastes. Five chat piles located in St. Francois County, Missouri, were quantified for residual trace metal content. Utilizing lidar point cloud data collected in 2011 and existing trace metal concentration data obtained during remedial investigations, residual content of these chat piles ranged from 9247 to 88,579 metric tons Pb, 1925 to 52,306 metric tons Zn, and 51 to 1107 metric tons Cd. Development of new beneficiation methods for recovering these constituents from chat piles would need to achieve current Federal soil screening standards. To achieve this for the five chat piles investigated, 42 to 72% of residual Pb would require mitigation to the 1200 mg/kg Federal non-playground standard, 88 to 98% of residual Zn would require mitigation to the Ecological Soil Screening level (ESSL) for plant life, and 70% to 98% of Cd would require mitigation to achieve the ESSL. Achieving these goals through an existing or future beneficiation method(s) would remediate chat to a trace metal concentration level that would support its use as a safe agricultural soil amendment.

  3. The Mineral Character and Geomechanical Properties of the Transitional Rocks from the Mesozoic-Neogene Contact Zone in the Bełchatów Lignite Deposit

    Directory of Open Access Journals (Sweden)

    Agnieszka Pękala

    2014-01-01

    Originality/value: Against the background of a number of published papers on the rocks accompanying lignite seams there is a lack of the "Bełchatów" mineralogical-petrographic studies of the transitional sediments in the Mesozoic-Neogene contact zone in the "Bełchatów" lignite deposit taking into account the aspect of raw materials. This paper has been produced to fill the void in this area.

  4. Differences in Brand Image of Online Chat Application of Blackberry Messenger, Whatsapp, and Line for Bina Nusantara University’s Student

    OpenAIRE

    Kuspuji C. B. Wicaksono

    2016-01-01

    This article was written to find out whether there were any differences on brand image for each online chat Application such as Blackberry Messenger, Whatsapp, and LINE based on six factors of the brand image which are: benefits, attributes, cultures, values, personality, and user. Data for the research were collected from questionnaires given to respondents who had used each mention online chat application. Then each respondent was asked to give scores based on the six factors of brand image...

  5. Chat Transcript Analysis Reveals that Undergraduate Students are Open to Instruction, While Instructors and Librarians Care About Supporting Student Learning

    Directory of Open Access Journals (Sweden)

    Elaine Sullo

    2017-03-01

    Full Text Available A Review of: Jacoby, J., Ward, D., Avery, S., & Marcyk, E. (2016. The value of chat reference services: A pilot study. portal: Libraries and the Academy, 16(1, 109-129. https://doi.org/10.1353/pla.2016.0013 Objective – To investigate student, instructor, and librarian perspectives of chat reference service in the context of first-year undergraduate students conducting research for an introductory composition course. Design – Focus groups, individual interviews, and surveys. Setting – A large, public university in the United States of America. Subjects – 57 library reference providers, 36 instructors of an introductory composition course, and approximately 936 undergraduate students in certain sections of the introductory composition course who were assigned a specific research project. Methods – In spring of 2014, all participants were invited via email to respond to an anonymous chat transcript of a librarian interacting with a student working on his or her research project. Study participants could participate via a brief survey or by taking part in a focus group or individual interview. The invited instructors were asked to forward the invitation to the students in their sections, and reminder emails were sent two weeks after the initial email. Main Results – Nine instructors, 24 students, and 25 library reference providers participated in the study, representing a response rate of 25%, 3% (estimated, and 44%, respectively. The authors conducted a qualitative analysis of key themes that were derived from both the focus groups or individual interviews and the survey questions. The themes were: students as novice researchers, question negotiation, open and closed questions, instruction, speed and convenience, customer service, and referrals. The theme of “students as novice researchers” is based on student comments related to their frustrations of being inexperienced researchers, as well as librarian comments on strategies for

  6. Implementación de un servicio de referencia virtual por chat en una biblioteca universitaria argentina

    Directory of Open Access Journals (Sweden)

    Borrell, Marina

    2009-12-01

    Full Text Available The following article will comment the experience of the library Joaquín V. González of the Facultad de Ciencias Jurídicas y Sociales of the Universidad Nacional de La Plata (Argentina in the implementation of a virtual reference service by chat, to answer requests in real time, directed to the university community

    En el presente trabajo se comentará la experiencia de la biblioteca Joaquín V. González de la facultad de Ciencias Jurídicas y Sociales de la Universidad Nacional de La Plata (Argentina en la implementación y puesta en marcha de un servicio de referencia virtual vía chat, para responder consultas en tiempo real, destinado a la comunidad universitaria.

  7. On how the Cyberspace arose to fulfill theoretical physicists' needs and eventually changed the World: Personal recallings and a practitioner's perspective

    OpenAIRE

    Elizalde, Emilio

    2017-01-01

    The very humble origins of the Cyberspace, and all the related developments that smoothly conspired and converged towards this concept, making its emergence possible, as the personal computer, TEX and LATEX, the Fax, the internet, the cellphone, and the World Wide Web, are discussed, always from a personal perspective. A separate, comprehensive explanation of the reasons for the appearance and subsequent evolution of each of these different phenomena, with explicit assessments and a future pr...

  8. "Same Room, Safe Place".

    Science.gov (United States)

    Keene Woods, Nikki

    2017-04-01

    There are many different professional stances on safe sleep and then there is the reality of caring for a newborn. There is a debate among professionals regarding safe sleep recommendations. The continum of recommendations vary from the American Academy of Pediatrics (AAP) Safe Sleep Guidelines to the bed-sharing recommendations from the Mother-Baby Behavioral Sleep Laboratory. The lack of consistent and uniform safe sleep recommendations from health professionals has been confusing for families but has more recently raised a real professional ethical dilemma. Despite years of focused safe sleep community education and interventions, sleep-related infant deaths are on the rise in many communities. This commentary calls for a united safe sleep message from all health professionals to improve health for mothers and infants most at-risk, "Same Room, Safe Place."

  9. Hotel room suicide.

    Science.gov (United States)

    Zarkowski, Paul; Avery, David

    2006-10-01

    The objective of our research was to quantify the increased risk of suicide associated with registering in local hotels/motels. Medical examiner case files of suicide in King County, Washington, were reviewed for years 2002-2004. The incidence of suicide in local residents registering in local hotels/motels was 223/100,000 which is significantly greater than the incidence of suicide in the general population of King County (11.7/100,000 p Hotel/motel guests from outside Washington had a significantly reduced incidence of suicide (3.9/100,000 p = 0.002). The study results suggest that there is an increased risk of suicide in local residents who register in local hotel rooms.

  10. CEBAF Control Room Renovation

    International Nuclear Information System (INIS)

    Michael Spata; Anthony Cuffe; Thomas Oren

    2005-01-01

    The Machine Control Center (MCC) at Jefferson Lab's Continuous Electron Beam Accelerator Facility (CEBAF) was constructed in the early 1990s and based on proven technology of that era. Through our experience over the last 15 years and in our planning for the facilities 12 GeV upgrade we reevaluated the control room environment to capitalize on emerging visualization and display technologies and improve on work-flow processes and ergonomic attributes. The renovation was performed in two phases during the summer of 2004, with one phase occurring during machine operations and the latter, more extensive phase, occurring during our semi-annual shutdown period. The new facility takes advantage of advances in display technology, analog and video signal management, server technology, ergonomic workspace design, lighting engineering, acoustic ceilings and raised flooring solutions to provide a marked improvement in the overall environment of machine operations

  11. [Hospital emergency rooms].

    Science.gov (United States)

    Tudela, Pere; Mòdol, Josep Maria

    2003-05-17

    Overuse of hospital emergency rooms (HERs) is parallel to their controversy. To understand this problem, some concepts should be first clarified. In HERs, there are some intrinsic aspects which are directly related to the emergency itself and thus cannot be modified (intermittent patient flow, need to prioritize, difficulty to achieve a rapid diagnosis, influence of time on treatment, value of clinical follow up, patient's expectations, impact of HER on the overall hospital working dynamics). On the other hand, there are some extrinsic aspects which indeed are not related to HER itself but are rather historically associated with it (precarious structure, delay on admission, lack of privacy, inadequate triage of cases, lack of professionalization); these latter aspects may be potentially modified and should be reconsidered.

  12. Room to Groove?

    DEFF Research Database (Denmark)

    Seabrooke, Leonard

    . As long as they stay within the parameters of legitimate financial practice to signal institutional isomorphism, the `groove', creditors may well allow borrowers room for change in self-determined ways. This paper maps out the historical and conceptual terrain concerning civilizing ideas about...... the legitimacy of financial practices within global capital markets, and investigates relationships between Western `civilizers' and Emerging Market Economies during the last two periods of financial globalization, the late-nineteenth/ early-twentieth centuries and the late-twentieth century.......The use of a `standard of civilization', a preferred form of socio-political organization, in global capital markets presents both constraints and opportunities for creditors and borrowers. When imposed, civilizing standards may change how a borrower would prefer to conduct their affairs. Creditors...

  13. CEBAF Control Room Renovation

    International Nuclear Information System (INIS)

    Michael Spata; Thomas Oren

    2005-01-01

    The Machine Control Center (MCC) at Jefferson Lab's Continuous Electron Beam Accelerator Facility (CEBAF) was initially constructed in the early 1990s and based on proven technology of that era. Through our experience over the last 15 years and in our planning for the facility's 12 GeV upgrade we reevaluated the control room environment to capitalize on emerging visualization and display technologies and improve workflow processes and ergonomic attributes. This effort also sets the foundation for the redevelopment of the accelerator's control system to deliver high reliability performance with improvements in beam specifications management and information flow. The complete renovation was performed over a three-week maintenance period with no interruption to beam operations. We present the results of this effort

  14. CEBAF Control Room Renovation

    International Nuclear Information System (INIS)

    Michael Spata; Thomas Oren

    2005-01-01

    The Machine Control Center at Jefferson Lab's Continuous Electron Beam Accelerator Facility was initially constructed in the early 1990s and based on proven technology of that era. Through our experience over the last 15 years and in our planning for the facilities 12 GeV upgrade we reevaluated the control room environment to capitalize on emerging visualization and display technologies and improve on workflow processes and ergonomic attributes. This effort also sets the foundation for the redevelopment of the accelerator's control system to deliver high reliability performance with improvements in beam specifications management and information flow. The complete renovation was performed over a three-week period with no interruption to beam operations. We present the results of this effort

  15. Binaural room simulation

    Science.gov (United States)

    Lehnert, H.; Blauert, Jens; Pompetzki, W.

    1991-01-01

    In every-day listening the auditory event perceived by a listener is determined not only by the sound signal that a sound emits but also by a variety of environmental parameters. These parameters are the position, orientation and directional characteristics of the sound source, the listener's position and orientation, the geometrical and acoustical properties of surfaces which affect the sound field and the sound propagation properties of the surrounding fluid. A complete set of these parameters can be called an Acoustic Environment. If the auditory event perceived by a listener is manipulated in such a way that the listener is shifted acoustically into a different acoustic environment without moving himself physically, a Virtual Acoustic Environment has been created. Here, we deal with a special technique to set up nearly arbitrary Virtual Acoustic Environments, the Binaural Room Simulation. The purpose of the Binaural Room Simulation is to compute the binaural impulse response related to a virtual acoustic environment taking into account all parameters mentioned above. One possible way to describe a Virtual Acoustic Environment is the concept of the virtual sound sources. Each of the virtual sources emits a certain signal which is correlated but not necessarily identical with the signal emitted by the direct sound source. If source and receiver are non moving, the acoustic environment becomes a linear time-invariant system. Then, the Binaural Impulse Response from the source to a listener' s eardrums contains all relevant auditory information related to the Virtual Acoustic Environment. Listening into the simulated environment can easily be achieved by convolving the Binaural Impulse Response with dry signals and representing the results via headphones.

  16. Special Digital Monies: The Design of Alipay and WeChat Wallet for Mobile Payment Practices in China

    OpenAIRE

    Kow , Yong ,; Gui , Xinning; Cheng , Waikuen

    2017-01-01

    Part 2: Social Media and Design Innovation; International audience; While research studies of digital and mobile payment systems in HCI have pointed out design opportunities situated within informal and nuanced mobile contexts, we have not yet understood how we can design digital monies to allow users to use monies more easily in these contexts. In this study, we examined the design of Alipay and WeChat Wallet, two successful mobile payment apps in China, which have been used by Chinese users...

  17. The exploitation of "sicko-chatting" by the pharmaceutical industry : a strategy for the normalization of drug use

    OpenAIRE

    Niquette , Manon

    2012-01-01

    International audience; The Exploitation of 'sicko-chatting' by the Pharmaceutical industry: a strategy for the Normalization of drug use Pharmaceutical drugs are consumer goods. As such, they inscribe the transition from normality to pathology within the ambit of health marketing (Duclos, 2008, p. 109). It is now widely acknowledged that this pathology is not just a mere quantitative modification of the normal state, but that it also implies the patient's qualitative assessment of his or her...

  18. Hubungan antara, Self Esteem dengan Self Disclosure pada Saat Chatting di Facebook

    Directory of Open Access Journals (Sweden)

    Novi Nitya Santi

    2017-05-01

    Full Text Available Facebook is an internet based social media that were populer at the moment. The use of sosial media is very populer no exception student. Students communicatem confide and seek information through facebook. Of the activities, appears a phenomenon experienced by students of the symptoms of self esteem and self disclosure. This research aims to determine the relationship between self esteem and self disclosure. The relationship between the level of self esteem with self disclosure while chatting on facebook worth 0,766. Meaning that the reletionship between the level of self esteem with self disclosure is very strong and direct. Where a person who has high self esteem will be able to able to demonstrate self-disclosure are effective in communicating that is: be open, able to empathize, to be positive in the communication process and feel similar to the communication partner. Conversely a low self esteem are less able to express himself well, fear of failure in social relations

  19. A Case Study of Foreigner’s Intercultural Identity in China via WeChat Moments

    Directory of Open Access Journals (Sweden)

    Bei Ju

    2017-01-01

    Full Text Available The study of communication and culture are interrelated with each other and with semiotics. This study attempts to explore the intercultural identity of foreigners via their use of social media in China. As the most popular social media used in China, a foreign teacher from America (named as Liz’s posts via WeChat Moments from 2013 to 2015 were coded based upon photos and texts to indicate her identity in China. As a result of semiotic analyses, five main themes were identified in her posts, ranging from personal interests and needs, occupation, family, Chinese traits to American traits. Based upon these identified themes, Liz’s intercultural identity as Chinese culture experiencer and promoter is reflected by her description of Chinese traditions, showing contrasts between American and Chinese culture, and using Chinese characters in writing. Overall, not much anxiety and stress during Liz’s acculturation process are shown while most cultural posts reflect her active and ongoing adaption to Chinese culture.

  20. Can human-like Bots control collective mood: agent-based simulations of online chats

    International Nuclear Information System (INIS)

    Tadić, Bosiljka; Šuvakov, Milovan

    2013-01-01

    Using an agent-based modeling approach, in this paper, we study self-organized dynamics of interacting agents in the presence of chat Bots. Different Bots with tunable ‘human-like’ attributes, which exchange emotional messages with agents, are considered, and the collective emotional behavior of agents is quantitatively analyzed. In particular, using detrended fractal analysis we determine persistent fluctuations and temporal correlations in time series of agent activity and statistics of avalanches carrying emotional messages of agents when Bots favoring positive/negative affects are active. We determine the impact of Bots and identify parameters that can modulate that impact. Our analysis suggests that, by these measures, the emotional Bots induce collective emotion among interacting agents by suitably altering the fractal characteristics of the underlying stochastic process. Positive emotion Bots are slightly more effective than negative emotion Bots. Moreover, Bots which periodically alternate between positive and negative emotion can enhance fluctuations in the system, leading to avalanches of agent messages that are reminiscent of self-organized critical states. (paper)

  1. Distributed communication: Implications of cultural-historical activity theory (CHAT) for communication disorders.

    Science.gov (United States)

    Hengst, Julie A

    2015-01-01

    This article proposes distributed communication as a promising theoretical framework for building supportive environments for child language development. Distributed communication is grounded in an emerging intersection of cultural-historical activity theory (CHAT) and theories of communicative practices that argue for integrating accounts of language, cognition and culture. The article first defines and illustrates through selected research articles, three key principles of distributed communication: (a) language and all communicative resources are inextricably embedded in activity; (b) successful communication depends on common ground built up through short- and long-term histories of participation in activities; and (c) language cannot act alone, but is always orchestrated with other communicative resources. It then illustrates how these principles are fully integrated in everyday interactions by drawing from my research on Cindy Magic, a verbal make-believe game played by a father and his two daughters. Overall, the research presented here points to the remarkably complex communicative environments and sophisticated forms of distributed communication children routinely engage in as they interact with peer and adult communication partners in everyday settings. The article concludes by considering implications of these theories for, and examples of, distributed communication relevant to clinical intervention. Readers will learn about (1) distributed communication as a conceptual tool grounded in an emerging intersection of cultural-historical activity theory and theories of communicative practices and (2) how to apply distributed communication to the study of child language development and to interventions for children with communication disorders. Copyright © 2015 Elsevier Inc. All rights reserved.

  2. Can human-like Bots control collective mood: agent-based simulations of online chats

    Science.gov (United States)

    Tadić, Bosiljka; Šuvakov, Milovan

    2013-10-01

    Using an agent-based modeling approach, in this paper, we study self-organized dynamics of interacting agents in the presence of chat Bots. Different Bots with tunable ‘human-like’ attributes, which exchange emotional messages with agents, are considered, and the collective emotional behavior of agents is quantitatively analyzed. In particular, using detrended fractal analysis we determine persistent fluctuations and temporal correlations in time series of agent activity and statistics of avalanches carrying emotional messages of agents when Bots favoring positive/negative affects are active. We determine the impact of Bots and identify parameters that can modulate that impact. Our analysis suggests that, by these measures, the emotional Bots induce collective emotion among interacting agents by suitably altering the fractal characteristics of the underlying stochastic process. Positive emotion Bots are slightly more effective than negative emotion Bots. Moreover, Bots which periodically alternate between positive and negative emotion can enhance fluctuations in the system, leading to avalanches of agent messages that are reminiscent of self-organized critical states.

  3. A Text-Based Chat System Embodied with an Expressive Agent

    Directory of Open Access Journals (Sweden)

    Lamia Alam

    2017-01-01

    Full Text Available Life-like characters are playing vital role in social computing by making human-computer interaction more easy and spontaneous. Nowadays, use of these characters to interact in online virtual environment has gained immense popularity. In this paper, we proposed a framework for a text-based chat system embodied with a life-like virtual agent that aims at natural communication between the users. To achieve this kind of system, we developed an agent that performs some nonverbal communications such as generating facial expression and motions by analyzing the text messages of the users. More specifically, this agent is capable of generating facial expressions for six basic emotions such as happy, sad, fear, angry, surprise, and disgust along with two additional emotions, irony and determined. Then to make the interaction between the users more realistic and lively, we added motions such as eye blink and head movements. We measured our proposed system from different aspects and found the results satisfactory, which make us believe that this kind of system can play a significant role in making an interaction episode more natural, effective, and interesting. Experimental evaluation reveals that the proposed agent can display emotive expressions correctly 93% of the time by analyzing the users’ text input.

  4. Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification

    Directory of Open Access Journals (Sweden)

    Muhammad Shafiq

    2017-01-01

    Full Text Available Accurate network traffic classification at early stage is very important for 5G network applications. During the last few years, researchers endeavored hard to propose effective machine learning model for classification of Internet traffic applications at early stage with few packets. Nevertheless, this essential problem still needs to be studied profoundly to find out effective packet number as well as effective machine learning (ML model. In this paper, we tried to solve the above-mentioned problem. For this purpose, five Internet traffic datasets are utilized. Initially, we extract packet size of 20 packets and then mutual information analysis is carried out to find out the mutual information of each packet on n flow type. Thereafter, we execute 10 well-known machine learning algorithms using crossover classification method. Two statistical analysis tests, Friedman and Wilcoxon pairwise tests, are applied for the experimental results. Moreover, we also apply the statistical tests for classifiers to find out effective ML classifier. Our experimental results show that 13–19 packets are the effective packet numbers for 5G IM WeChat application at early stage network traffic classification. We also find out effective ML classifier, where Random Forest ML classifier is effective classifier at early stage Internet traffic classification.

  5. Leadership in the control room

    International Nuclear Information System (INIS)

    McDougall, S.J.

    2006-01-01

    This paper discusses the importance of leadership within the control rooms at nuclear power facilities. the leadership capability of control room staff has a significant influence over the improvement of human performance and the development of an 'event free' culture within the business. The development of leadership competency in the control room must be an important part of any nuclear power utility business improvement plan. (author)

  6. Leadership in the control room

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, S.J. [Bruce Power, Bruce B Operations Div., Tiverton, Ontario (Canada)

    2006-07-01

    This paper discusses the importance of leadership within the control rooms at nuclear power facilities. the leadership capability of control room staff has a significant influence over the improvement of human performance and the development of an 'event free' culture within the business. The development of leadership competency in the control room must be an important part of any nuclear power utility business improvement plan. (author)

  7. Modern control room for AHWR

    International Nuclear Information System (INIS)

    Verghese, Clement C.; Joseph, Jose; Biswas, B.B.; Patil, R.K.

    2005-01-01

    Advanced Heavy Water Reactor (AHWR) is a next generation nuclear power plant being developed by Bhabha Atomic Research Centre. A modern control room has been conceived for operation and monitoring of the plant in tune with the advanced features of the reactor. A state of the art C and I architecture based on extensive use of computers and networking has been conceived for this plant. This architecture enables the implementation of a fully computerised operator friendly control room with soft HMIs. Features of the modern control room and control room and concept of soft HMI based operator interfaces have been described in the paper. (author)

  8. More room for ISOLDE

    CERN Multimedia

    2005-01-01

    To meet the needs of the new ISOLDE experiments, a new extension has been added to the facility's Building 170. The new extension to Building 170. Moving around the ISOLDE hall was almost like an obstacle course until now. The facility's Building 170 simply didn't have an inch to spare and the ISOLDE team's need to set up new experiments, whose installation could have created difficulties from the safety point of view, only exacerbated the problem. "We had ambitious plans to develop new experiments but no room for them", says Mats Lindroos, ISOLDE's technical coordinator. The only solution was to extend the existing building". This was how a new building saw the light of day. Measuring 24 metres long, 20 metres wide and 12 metres high, it is an extension to the existing Building 170 and should be ready for use this year. The new structure makes use of the existing infrastructure, with part of the end wall of Building 170 being kept as a support for steel platforms. The top of this wall had to be cut away ...

  9. Social Media-Promoted Weight Loss Among an Occupational Population: Cohort Study Using a WeChat Mobile Phone App-Based Campaign.

    Science.gov (United States)

    He, Chao; Wu, Shiyan; Zhao, Yingying; Li, Zheng; Zhang, Yanyan; Le, Jia; Wang, Lei; Wan, Siyang; Li, Changqing; Li, Yindong; Sun, Xinying

    2017-10-23

    Being overweight and obese are major risk factors for noncommunicable diseases such as cardiovascular diseases. The prevalence of overweight and obesity is high throughout the world and these issues are very serious in the Shunyi District in China. As mobile technologies have rapidly developed, mobile apps such as WeChat are well accepted and have the potential to improve health behaviors. This study aims to evaluate the effectiveness of a mobile app (WeChat) as an intervention on weight loss behavior. This study was conducted among an occupational population from August 2015 to February 2016 in the Shunyi District of Beijing. Before the intervention, the Shunyi District Government released an official document for weight loss to all 134 government agencies and enterprises in Shunyi District. Participants willing to use our official WeChat account were enrolled in a WeChat group and received 6 months of interventions for weight loss; those who were not willing to use the account were in a control group given routine publicity on weight loss. In total, 15,310 occupational participants including 3467 participants (22.65%) in the control group and 11,843 participants (77.35%) in the WeChat group were enrolled. Participants in the WeChat group lost more weight (mean 2.09, SD 3.43 kg) than people in the control group (mean 1.78, SD 2.96 kg), and the difference in mean weight loss between the two groups for males was significant based on the stratification of age and educational level. To control for confounding factors and to explore the effects of WeChat on weight loss, the propensity score method with a multinominal logistic regression was utilized. For males, this showed that the WeChat group (with both active and inactive subgroups) had a higher probability of maintaining weight, weight loss from 1 to 2 kg, or weight loss more than 2 kg than the control group. However, the control group had higher probability of weight loss from 0 to 1 kg. Being active in WeChat was

  10. Social Media–Promoted Weight Loss Among an Occupational Population: Cohort Study Using a WeChat Mobile Phone App-Based Campaign

    Science.gov (United States)

    Zhao, Yingying; Li, Zheng; Zhang, Yanyan; Le, Jia; Wang, Lei; Wan, Siyang; Li, Changqing; Li, Yindong

    2017-01-01

    Background Being overweight and obese are major risk factors for noncommunicable diseases such as cardiovascular diseases. The prevalence of overweight and obesity is high throughout the world and these issues are very serious in the Shunyi District in China. As mobile technologies have rapidly developed, mobile apps such as WeChat are well accepted and have the potential to improve health behaviors. Objective This study aims to evaluate the effectiveness of a mobile app (WeChat) as an intervention on weight loss behavior. Methods This study was conducted among an occupational population from August 2015 to February 2016 in the Shunyi District of Beijing. Before the intervention, the Shunyi District Government released an official document for weight loss to all 134 government agencies and enterprises in Shunyi District. Participants willing to use our official WeChat account were enrolled in a WeChat group and received 6 months of interventions for weight loss; those who were not willing to use the account were in a control group given routine publicity on weight loss. Results In total, 15,310 occupational participants including 3467 participants (22.65%) in the control group and 11,843 participants (77.35%) in the WeChat group were enrolled. Participants in the WeChat group lost more weight (mean 2.09, SD 3.43 kg) than people in the control group (mean 1.78, SD 2.96 kg), and the difference in mean weight loss between the two groups for males was significant based on the stratification of age and educational level. To control for confounding factors and to explore the effects of WeChat on weight loss, the propensity score method with a multinominal logistic regression was utilized. For males, this showed that the WeChat group (with both active and inactive subgroups) had a higher probability of maintaining weight, weight loss from 1 to 2 kg, or weight loss more than 2 kg than the control group. However, the control group had higher probability of weight loss from

  11. Madness in Sartre's "The Room"

    NARCIS (Netherlands)

    Jongeneel, E.C.S.

    2009-01-01

    In "The Room," part of his short story collection, The Wall (1938), Jean-Paul Sartre investigates madness as an alternative way of bourgeois life and thus takes a stand in the contemporary debate on the existential status of mental illness. "The Room" is a case-study of a "limit situation," as well

  12. A control room lighting study

    International Nuclear Information System (INIS)

    Vaidya, V.V.; Iwasa-Madge, K.M.; Howard, B.; Willson, R.B.

    1984-01-01

    Operators at a Heavy Water Plant in Ontario, Canada complained about lighting-related difficulties in the control room. The Human Factors Engineering Unit was requested to perform a lighting survey and make recommendations to improve the control centre lighting conditions. This paper describes the control room, the operator tasks, the procedures used for the lighting survey, the findings, and the changes recommended

  13. A Parent's Guide to the Teen Years: Raising Your 11- to 14-Year-Old in the Age of Chat Rooms and Navel Rings.

    Science.gov (United States)

    Panzarine, Susan

    Noting that swift growth with the accompanying desire for independence during early adolescence creates tension in the family that is often difficult for parents to understand, accept, and handle, this book is designed to help parents adapt their roles to nurture the physical, social, emotional, and intellectual development of their early teen.…

  14. Fire protection for clean rooms

    International Nuclear Information System (INIS)

    Kirson, D.

    1990-01-01

    The fire protection engineer often must decide what size fire can be tolerated before automatic fire suppression systems actuate. Is it a wastepaper basket fire, a bushel basket fire...? In the case of state-of-the-art clean rooms, the answer clearly is not even an incipient fire. Minor fires in clean rooms can cause major losses. This paper discusses what a clean room is and gives a brief overview of the unique fire protection challenges encountered. The two major causes of fire related to clean rooms in the semiconductor industry are flammable/pyrophoric gas fires in plastic ducts and polypropylene wet bench fires. This paper concentrates on plastic ductwork in clean rooms, sprinkler protection in ductwork, and protection for wet benches

  15. Let's chat: developmental neural bases of social motivation during real-time peer interaction.

    Science.gov (United States)

    Warnell, Katherine Rice; Sadikova, Eleonora; Redcay, Elizabeth

    2018-05-01

    Humans are motivated to interact with each other, but the neural bases of social motivation have been predominantly examined in non-interactive contexts. Understanding real-world social motivation is of special importance during middle childhood (ages 8-12), a period when social skills improve, social networks grow, and social brain networks specialize. To assess interactive social motivation, the current study used a novel fMRI paradigm in which children believed they were chatting with a peer. The design targeted two phases of interaction: (1) Initiation, in which children engaged in a social bid via sharing a like or hobby, and (2) Reply, in which children received either an engaged ("Me too") or non-engaged ("I'm away") reply from the peer. On control trials, children were told that their answers were not shared and that they would receive either engaged ("Matched") or non-engaged ("Disconnected") replies from the computer. Results indicated that during Initiation and Reply, key components of reward circuitry (e.g., ventral striatum) were more active for the peer than the computer trials. In addition, during Reply, social cognitive regions were more activated by the peer, and this social cognitive specialization increased with age. Finally, the effect of engagement type on reward circuitry activation was larger for social than non-social trials, indicating developmental sensitivity to social contingency. These findings demonstrate that both reward and social cognitive brain systems support real-time social interaction in middle childhood. An interactive approach to understanding social reward has implications for clinical disorders, where social motivation is more affected in real-world contexts. © 2017 John Wiley & Sons Ltd.

  16. 推进网络空间核心支援能力建设%Considerations on promoting the building-up of PLA's core supporting capabilities in cyberspace

    Institute of Scientific and Technical Information of China (English)

    柯宏发; 祝冀鲁; 赵荣

    2017-01-01

    从网络空间侦察能力、指挥控制能力、精确攻击能力、防御能力和评估能力等五个方面,对网络空间支援力量的核心支援能力进行了系统论述,提出建设军队网络支援力量、应对网络空间安全威胁的新思考和新观点.研究认为,当前我军在网络空间的安全意识、核心技术、均衡发展等方面面临严峻困难.为实现网络强国的奋斗目标,需要加强国家网络安全的顶层设计,增强网络技术自主创新能力,强化军民融合式建设和系统常态的攻防训练等.%Core supporting capabilities of cyberspace military forces, such as cyberspace reconnaissance, command and control, precise attack, defense and evaluation, are systematically discussed.New considerations and ideas about promoting the building up of PLA's cyberspace supporting forces and encountering security threats in cyberspace are proposed.It is concluded that a lot of difficulties exist in aspects such as security awareness of cyberspace, core technologies and balanced developing.In order to realize the goal of building up a powerful country in cyberspace, emphasis should be laid on enhancing top-level design of national cyber security, independent innovation of cyber technologies, civil-military integration, and systematical and regular attack-and-defense training, etc.

  17. Control room lay-out

    International Nuclear Information System (INIS)

    Toma, Violeta

    2004-01-01

    TRIUMF (Tri-University Meson Facility) is Canada's national laboratory for particle and nuclear physics. There are 6 accelerators and 3 Control Rooms at TRIUMF. The main control room serves the big cyclotron, the 500 MeV, and the adjacent experiment. The 42 MeV and two 32 MeV ones are production dedicated. These cyclotrons belong to a private company but are operated by TRIUMF staff from ATG (Applied Technology Group) Control Room. The last is ISAC (Isotope Acceleration and Separation) Control Room, from which the LINAC is controlled. Research areas cover theoretical (2 subjects), pure (5 subjects) and applied (8 subjects) physics. In the early '70s, as the 500 MeV was being completed, the first Control Room was built in the main accelerator building. The recent topics covered by this paper are proton and pion therapy, what are the operator's duties?, the CP42, TR30 and TR13 cyclotron control rooms, the ISAC control systems including control room modification. Due to the nature of an operator's job, the Control Room layout is pretty important. This is true for any work environment, but when working shifts it becomes essential. Lots of time and effort, not to mention money, were spent to figure out the optimum configuration. It seems to me that the key factor in the control room layout is versatility, and this is because it has to keep happy a group of people with different inclinations, which have a tendency to become quite moody after the second night shift. No matter what, there will still be unhappy people, but we are trying our best. (Y. Tanaka)

  18. In the LEAR control room

    CERN Multimedia

    CERN PhotoLab

    1983-01-01

    View into the control room of the Low Energy Antiproton Ring (LEAR). Edgar Asseo (sitting) and Dieter Möhl and Georges Carron reflecting upon some beam dynamics (or hardware?) problem. Vassilis Agoritsas, in the background, leaning over a plan or a keyboard. LEAR in its early years (1982 to about 1990) was run from this local control room in building 363 close to the end of the PS South Hall, where the ring was installed. Later-on the operation was surveyed from the PS main control room.

  19. Twitter journal clubs and continuing professional development: An analysis of a #MedRadJClub tweet chat.

    Science.gov (United States)

    Bolderston, A; Watson, J; Woznitza, N; Westerink, A; Di Prospero, L; Currie, G; Beardmore, C; Hewis, J

    2018-02-01

    Online Twitter journal clubs are a recent and popular innovation with the potential to increase research awareness and inform practice. The medical radiation sciences' MedRadJournalClub (MJRC) is a Twitter-based event that attracts a global group of participants at the monthly chats. An analysis of a recent MedRadJournalClub discussion evaluated the perceived benefits and limitations of medical radiation practitioners participating in an online journal club. The February 2017 chat used for analysis was based on the Journal of Medical Imaging and Radiation Sciences article by Currie et al. "Twitter Journal Club in Medical Radiation Science" that examines the educational theory behind learning and evidencing professional development through MRJC and social media. The data consisted of chat tweets which were collated using the Twitter advanced search function using the #medradjclub. An initial reviewed was performed to exclude irrelevant content. A second review was then undertaken to categorize the main theme of the tweet. The data were then subjected to thematic analysis which yielded seven different categories. The main benefits included global access due to the online nature of MRJC that has facilitated networking and collaboration. Open access to recently published research was another key benefit. The character limitation of a tweet was the most common constraint, and the dynamic nature of the twitter conversation requires multi-tasking that may be difficult. Our analysis indicated that participants use MedRadJournalClub as a source of continuing professional development with some evidence that this is directly informing clinical and educational practice. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  20. Microscopic charcoal and tar (CHAT particles in peat: a 6500-year record of palaeo-fires in southern Sweden

    Directory of Open Access Journals (Sweden)

    B.A. Malmgren

    2012-01-01

    Full Text Available Peat stratigraphies of eleven raised bogs in southern Sweden were investigated. Measurements included the occurrence of charcoal and various tar particles. Most of the particles found were microscopic, i.e. 5–100 µm in diameter. Two distinctly different groups of particles were distinguished: (A charred fragments of plant tissue and (B objects formed from tar, which were classified into five sub-groups on the basis of morphology. Both charcoal and tar are indicative of mire and forest fires. We suggest that it is possible to use the different groups of particles as fire regime indicators. Hence, the high frequency of charcoal and tar (CHAT in the lower parts of the stratigraphies, i.e. in the lower strongly decomposed fen and carr peats that were formed before ca. 4000 cal 14C BP, could be indicative of intense and frequent local fires. The decreasing abundance of CHAT and the lower relative share of Type A particles within the lower strongly decomposed Sphagnum peat ca. 4000–2500 cal 14C BP signify a transition from local to regional fires. With a few exceptions, the uppermost weakly decomposed ombrotrophic peats formed after ca. 2500 cal 14C BP, in which both charcoal and tar are rare, indicate a period of low fire frequency at both local and regional scales. There is no regional variation in the lower material, and it seems that wildfires were common phenomena throughout southern Sweden during the first few thousand years after peat formation began 6–8000 years ago. From a climatological point of view, the mass occurrence of CHAT in the lower parts of the profiles indicates a warm and dry Mid Holocene with frequent and widespread wildfires, and a moist and cool Late Holocene with more sporadic fires. Spectral analysis of the entire dataset shows significant periodicities of 610, 70, 30, 21, 17 and 14 years, the two most significant being 14 and 70 years.

  1. Using WeChat official accounts to improve malaria health literacy among Chinese expatriates in Niger: an intervention study.

    Science.gov (United States)

    Li, Wei; Han, Le Qiang; Guo, Yan Jun; Sun, Jing

    2016-11-24

    Malaria is the main health risk for Chinese expatriates working in Niger. Health education is a recommended intervention for prevention of malaria among non-immune travellers and expatriate workers. It is urgent to develop an effective and feasible way for these populations to obtain information about the prevention and treatment of malaria. An individually randomized, unblinded, controlled trial was used to evaluate the effectiveness of using WeChat official accounts for health education to improve malaria health literacy among Chinese expatriates in Niger. A total 1441 participants completed a baseline malaria health literacy questionnaire and were randomly assigned to an intervention or comparison group in a ratio of 1:1. From July to October 2014, 50 malaria prevention and treatment messages were sent to the intervention group; 50 health news messages were concurrently sent to the control group. Both groups completed the malaria health literacy questionnaire again 4 months after the start of the education intervention. A questionnaire addressing satisfaction with the health education programme was completed by the intervention group. Malaria morbidity data for 2013 and 2014 were also collected. At baseline, participant health literacy rates were 58.29, 62, 54, and 34% for skills, knowledge, practice, and attitude, respectively. After the intervention, rates for all four aspects of malaria literacy were above 70%. There was greater change in knowledge, attitude, practice, skills, and overall health literacy among the intervention group compared with the controls, with a statistically significant difference (p WeChat health education programme with over 80% stating that they would continue to follow the programme. The present health education intervention, via a WeChat official account, for the prevention and treatment of malaria among non-immune travellers and expatriate workers proved to be an effective, sustainable, feasible, and well accepted strategy for

  2. Plant a tree in cyberspace: metaphor and analogy as design elements in Web-based learning environments.

    Science.gov (United States)

    Wolfe, C R

    2001-02-01

    Analogy and metaphor are figurative forms of communication that help people integrate new information with prior knowledge to facilitate comprehension and appropriate inferences. The novelty and versatility of the Web place cognitive burdens on learners that can be overcome through the use of analogies and metaphors. This paper explores three uses of figurative communication as design elements in Web-based learning environments, and provides empirical illustrations of each. First, extended analogies can be used as the basis of cover stories that create an analogy between the learner's position and a hypothetical situation. The Dragonfly Web pages make extensive use of analogous cover stories in the design of interactive decision-making games. Feedback from visitors, patterns of usage, and external reviews provide evidence of effectiveness. A second approach is visual analogies based on the principles of ecological psychology. An empirical example suggests that visual analogies are most effective when there is a one-to-one correspondence between the base and visual target analogs. The use of learner-generated analogies is a third approach. Data from an offline study with undergraduate science students are presented indicating that generating analogies are associated with significant improvements in the ability to place events in natural history on a time line. It is concluded that cyberspace itself might form the basis of the next guiding metaphor of mind.

  3. Urban networks among Chinese cities along "the Belt and Road": A case of web search activity in cyberspace.

    Science.gov (United States)

    Zhang, Lu; Du, Hongru; Zhao, Yannan; Wu, Rongwei; Zhang, Xiaolei

    2017-01-01

    "The Belt and Road" initiative has been expected to facilitate interactions among numerous city centers. This initiative would generate a number of centers, both economic and political, which would facilitate greater interaction. To explore how information flows are merged and the specific opportunities that may be offered, Chinese cities along "the Belt and Road" are selected for a case study. Furthermore, urban networks in cyberspace have been characterized by their infrastructure orientation, which implies that there is a relative dearth of studies focusing on the investigation of urban hierarchies by capturing information flows between Chinese cities along "the Belt and Road". This paper employs Baidu, the main web search engine in China, to examine urban hierarchies. The results show that urban networks become more balanced, shifting from a polycentric to a homogenized pattern. Furthermore, cities in networks tend to have both a hierarchical system and a spatial concentration primarily in regions such as Beijing-Tianjin-Hebei, Yangtze River Delta and the Pearl River Delta region. Urban hierarchy based on web search activity does not follow the existing hierarchical system based on geospatial and economic development in all cases. Moreover, urban networks, under the framework of "the Belt and Road", show several significant corridors and more opportunities for more cities, particularly western cities. Furthermore, factors that may influence web search activity are explored. The results show that web search activity is significantly influenced by the economic gap, geographical proximity and administrative rank of the city.

  4. O estar-com o outro no ciberespaço/Being-with-other on the cyberspace

    Directory of Open Access Journals (Sweden)

    Maria Aparecida Viggiani Bicudo

    2009-06-01

    Full Text Available Esse tema é tratado em uma abordagem fenomenológica, notadamente a husserliana, destacando-se a concepção de corpo-próprio. A idéia central trabalhada concerne à intencionalidade e aos respectivos atos da consciência como sendo o “quê” nos mantém unidos ao outro no ciberespaço. O virtual será enfocado no contexto da filosofia, em que ele se mostra como dimensões do real. São trabalhadas as concepções de não-atual, referindo-se ao potencial, virtual, provável, e de atual, entendido como o realizado por atos, fazendo com que o não-atual se torne atual. We focus on the mentioned subject on a phenomenological perspective, chiefly the husserlian one, putting on evidence the proper-body conception. The main arguments of the work are the ideas of intentionality and the conscious acts as being the “what” keep us linked to the other on the cyberspace. We focus on the “virtual” on the philosophical context where it presents itself as one of the dimensions of the “real”. We work on the “non-actual” conception, comprehending the potential, virtual probable aspects of reality and “actual” conception comprehending the becoming actual acts.

  5. Urban networks among Chinese cities along "the Belt and Road": A case of web search activity in cyberspace.

    Directory of Open Access Journals (Sweden)

    Lu Zhang

    Full Text Available "The Belt and Road" initiative has been expected to facilitate interactions among numerous city centers. This initiative would generate a number of centers, both economic and political, which would facilitate greater interaction. To explore how information flows are merged and the specific opportunities that may be offered, Chinese cities along "the Belt and Road" are selected for a case study. Furthermore, urban networks in cyberspace have been characterized by their infrastructure orientation, which implies that there is a relative dearth of studies focusing on the investigation of urban hierarchies by capturing information flows between Chinese cities along "the Belt and Road". This paper employs Baidu, the main web search engine in China, to examine urban hierarchies. The results show that urban networks become more balanced, shifting from a polycentric to a homogenized pattern. Furthermore, cities in networks tend to have both a hierarchical system and a spatial concentration primarily in regions such as Beijing-Tianjin-Hebei, Yangtze River Delta and the Pearl River Delta region. Urban hierarchy based on web search activity does not follow the existing hierarchical system based on geospatial and economic development in all cases. Moreover, urban networks, under the framework of "the Belt and Road", show several significant corridors and more opportunities for more cities, particularly western cities. Furthermore, factors that may influence web search activity are explored. The results show that web search activity is significantly influenced by the economic gap, geographical proximity and administrative rank of the city.

  6. Using Cultural Historical Activity Theory (CHAT) to Frame `SuperclubsPLUS', an Online Social Network for Children

    Science.gov (United States)

    Masters, Jennifer

    This paper uses a Cultural Historical Activity Theory framework to describe a social-networking online community project, “SuperclubsPLUS”, for children aged 6-12. The use of the CHAT frame enables a detailed description of connections within the project as participants work together to achieve individual and common goals. Application of this structure to the SuperclubsPLUS environment supports the concept that the community is continually changing, shaped by the interactions of the participants. It is anticipated that this snapshot of the project will provide a tangible base in order to further develop and map ongoing patterns of interaction for research.

  7. Control room philosophy: Principles of control room design and control room work

    International Nuclear Information System (INIS)

    Skriver, Jan; Ramberg, Jasmine; Allwin, Pernilla

    2006-01-01

    In order to provide insights for improvement of work in control rooms several factors have to be considered. Knowledge of principles including control room philosophies will guide the recommended improvements. In addition to knowledge about specific principles an advantage for an organization can be an understanding of similarities and policies used in other high risk industry. The report has been developed on the basis of a document analysis of international standards and other guiding documents. (NUREG 0711, ISO 11064, ISO 6385, IEC 60964). In addition to the document analysis which has strived to compare the documents to see similarities in important principals, experience from working with control room design, modifications and evaluations in other high risk industries has pervaded the report. Important principles have been identified which are recommended to be included in a control room philosophy. Many of these are similar to the principles identified in the international standards. An additional principal which is regarded as important is the utilization of Key Performance Indicators (KPI) which can be used as a measure to target preventative means. Further more it is critical that the control room philosophy is easy to access and comprehend for all users. One of the challenges that remain after having developed a control room philosophy is how to utilize it in the daily work situation. It is vital that the document remains as a living document, guiding the continual improvement of the control room in the various life cycle stages

  8. CDRH FOIA Electronic Reading Room

    Data.gov (United States)

    U.S. Department of Health & Human Services — The CDRH FOIA electronic reading room contains frequently requested information via the Freedom of Information Act from the Center for Devices and Radiological Health.

  9. Nuclear reactor control room construction

    International Nuclear Information System (INIS)

    Lamuro, R.C.; Orr, R.

    1993-01-01

    A control room for a nuclear plant is disclosed. In the control room, objects labelled 12, 20, 22, 26, 30 in the drawing are no less than four inches from walls labelled 10.2. A ceiling contains cooling fins that extend downwards toward the floor from metal plates. A concrete slab is poured over the plates. Studs are welded to the plates and are encased in the concrete. 6 figures

  10. The conference hybrid control room

    International Nuclear Information System (INIS)

    Gieci, A.; Caucik, J.; Macko, J.

    2008-01-01

    An original concept of a hybrid control room was developed for the Mochovce-3 and Mochovce-4 reactor units which are under construction. The basic idea underlying the concept is that the control room should be a main working place for the operators (reactor operator and turbine operator) and for the shift supervisor, designed as a comprehensive unit desk shaped so that all members of the control room crew are in a face-to-face contact constantly. The main desk consists of three clearly identified areas serving the operators and the unit supervisor as their main working places. A soft control system is installed at the main working places. A separate safety-related working place, designed as a panel with classical instrumentations at the conference hybrid control room, is provided in case of abnormal conditions or emergency situation. Principles of ergonomics and cognitive engineering were taken into account when designing the new conference hybrid control room for the Mochovce-3 and -4 reactor units. The sizes, propositions, shapes and disposition of the equipment at the control room have been created and verified by using virtual reality tools. (orig.)

  11. First-year plant density of seeded vegetation on amended lead-zinc chat tailing

    International Nuclear Information System (INIS)

    Norland, M.R.; Veith, D.L.

    1991-01-01

    Mining of lead and zinc sulfides began in the Kansas portion of the Tri-State Mining District in 1976 and continued until the 1950s when a decrease in the demand for lead and zinc forced operations to shut down. As a result of this shallow underground mining, chat tailing and other mine wastes were deposited on the soil surface or as mine waste piles. In 1983, the U.S. EPA added 285 km of Cherokee County, Kansas, to the National Priorities List due to the risks to human health and the environment by heavy metal contamination. In 1985, the EPA declared the Cherokee County portion of the Tri-State District to be a Superfund Site and began remedial action investigations at the Galena, Kansas subsite. The Bureau of Mines is evaluating site stabilization techniques in Galena, to minimize wind and water erosion, infiltration and percolation through the mine wastes. Vegetation and the use of locally available organic wastes are being tested as site stabilization techniques. A 4x3x3 factorial experiment arranged in a randomized complete block was initiated in 1990. Four organic waste materials (composted yard waste, composted cattle manure, spent mushroom compost and turkey litter) were applied with inorganic fertilizer. Control plots were included in the design. A total of 39 combinations were assigned to 2.5 by 4 m test plots at random and each combination was replicated three times. All experimental plots were seeded with a mix of introduced or native and cool or warm season grasses and leguminous forbs. First-year results of this long-term study suggest that the type of organic waste material used as a soil amendment has a significant effect on first-year plant density. Applications of composted cattle manure, composted yard waste and spent mushroom compost resulted in mean plant densities of 90, 83 and 76 plants M-2 which are significantly higher than the mean plant density of control plots and plots amended with turkey litter, 37 and 21 plants M-2

  12. The Mineral Character and Geomechanical Properties of the Transitional Rocks from the Mesozoic-Neogene Contact Zone in the Bełchatów Lignite Deposit

    OpenAIRE

    Agnieszka Pękala

    2014-01-01

    Purpose: Beginning more than 30 years ago, opencast lignite mining in the "Bełchatów" area is an important source of accompanying minerals. Lignite mining in the "Bełchatów" mine yields, on average, more than 35 million tonnes per annum and requires removing more than 110 million cubic meters of overburden. Therefore the mine outside of the main mineral exploitation of lignite, leads to a large-scale economy of accompanying minerals. Part of the minerals are present in the overburden and are ...

  13. Consideraciones gráficas y lingüísticas del lenguaje cibernético: el chat y el Messenger.

    OpenAIRE

    Cabedo Nebot, Adrián

    2009-01-01

    Este trabajo pretende estudiar el comportamiento lingüístico de intercambios comunicativos en plataformas cibernéticas como el chat o el Messenger. Así mismo, el planteamiento inicial es investigar si el lenguaje cibernético constituye un código particular, diferenciado del código del lenguaje habitual. This work tries to study linguistic behavior of communicative exchanges in cybernetic platforms like chat or Messenger. Likewise, the initial approach is to investigate if the cybernetic la...

  14. Teen CHAT: Development and Utilization of a Web-Based Intervention to Improve Physician Communication with Adolescents About Healthy Weight

    Science.gov (United States)

    Bravender, Terrill; Tulsky, James A.; Farrell, David; Alexander, Stewart C.; Østbye, Truls; Lyna, Pauline; Dolor, Rowena J.; Coffman, Cynthia J.; Bilheimer, Alicia; Lin, Pao-Hwa; Pollak, Kathryn I.

    2013-01-01

    Objective To describe the theoretical basis, use, and satisfaction with Teen CHAT, an online educational intervention designed to improve physician-adolescent communication about healthy weight. Methods Routine health maintenance encounters between pediatricians and family practitioners and their overweight adolescent patients were audio recorded, and content was coded to summarize adherence with motivational interviewing techniques. An online educational intervention was developed using constructs from social cognitive theory and using personalized audio recordings. Physicians were randomized to the online intervention or not, and completed post-intervention surveys. Results Forty-six physicians were recruited, and 22 physicians were randomized to view the intervention website. The educational intervention took an average of 54 minutes to complete, and most physicians thought it was useful, that they would use newly acquired skills with their patients, and would recommend it to others. Fewer physicians thought it helped them address confidentiality issues with their adolescent patients. Conclusion The Teen CHAT online intervention shows potential for enhancing physician motivational interviewing skills in an acceptable and time-efficient manner. Practice Implications If found to be effective in enhancing motivational interviewing skills and changing adolescent weight-related behaviors, wide dissemination will be feasible and indicated. PMID:24021419

  15. Future control room design (modernization of control room systems)

    International Nuclear Information System (INIS)

    Reischl, Ludwig; Freitag, Timo; Dergel, Rene

    2009-01-01

    In the frame of lifetime extension for nuclear power plants the modernization of the complete safety and operational control technology will be digitalized. It is also recommended to modernize the operator facilities, monitoring systems in the control room, the back-up shut-down center and the local control stations. The authors summarize the reasons for the modernization recommendations and discuss possible solutions for display-oriented control rooms. A concept for control room backfitting includes generic requirements, requirements of the local authorities, ergonomic principles information content and information density, and the design process. The backfitting strategy should include a cooperation with the operational personnel, The quality assurance and training via simulator needs sufficient timing during the implementation of the backfitting.

  16. Revisiting the Operating Room Basics

    Directory of Open Access Journals (Sweden)

    Tushar Chakravorty

    2015-12-01

    Full Text Available Young doctors walking into the operating room are eager to develop their skills to become efficient and knowledgeable professionals in future. But precious little is done to actively develop the basic practical skills of the budding doctors. They remain unaware about the layout of the operating room, the OR etiquette and often do not have sound scientific understanding and importance of meticulous execution of the basic operating room protocols. This article stresses the need to develop the basics of OR protocol and to improve the confidence of the young doctor by strengthening his foundation by showing him that attention to the basics of medical care and empathy for the patient can really make a difference to the outcome of a treatment.

  17. Control room and ergonomic design

    International Nuclear Information System (INIS)

    Hinz, W.

    1984-01-01

    The important basis for the configuration of the control room of a nuclear power station is the concept for controlling a fault and that for controlling normal operation. The tasks resulting from this for the control room personnel are decided by the control room concept. In this configuration process (from the division of process control tasks between the system components operators and control technology to the configuration of individual means of operation) the characteristics and capabilities of the personnel, which are subject to special requirements as regards their qualifications, are observed. New concepts which are only now technically feasible are therefore being developed for information processing and display, in order to give the personnel a better oversight of the state and trends of the plant. (orig./DG) [de

  18. Digital narratives: deviations from journalism in cyberspace Narrativas digitais: desvios do jornalismo no ciberespaço

    Directory of Open Access Journals (Sweden)

    Rosana de Lima Soares

    2009-09-01

    Full Text Available Digital narratives: deviations from journalism in cyberspace — This paper attempts to shift the reflections on communication medias (especially journalism to the field of confluence of the theories that constitute the language sciences, seeking to create a differentiated approach about how they are carried out. In proposing a shift in the way we think about communication medias, we start from the assumption that the discursive domain, which is understood as the articulator of symbolic relations — and hence the place where social bonds are created and undone — is the privileged field for its study. This fact is even more significant when one considers the advanced level of intermediation that models the contemporary world, characterized by mediatic networks and by differentiated forms of production and circulation of narratives — among them journalistic narratives —, especially in online digital formats. Este artigo busca deslocar as reflexões sobre as mídias (especialmente o jornalismo para o campo de confluência das teorias constituintes das ciências da linguagem, tendo em vista a elaboração de uma abordagem diferenciada em relação a seu fazer. Ao propô-lo, partimos do pressuposto de que o domínio discursivo — entendido como articulador das relações simbólicas e, por isso, o lugar em que se fazem e desfazem os laços sociais — é o campo privilegiado para seu estudo. Esse fato se torna ainda mais significativo se considerarmos o avançado nível de intermediação que modela o mundo contemporâneo, caracterizado pelas redes midiáticas e por formas diferenciadas de produção e circulação de narrativas — entre elas, as narrativas jornalísticas —, especialmente em formatos digitais on-line.

  19. Supporting a caring fatherhood in cyberspace - an analysis of communication about caring within an online forum for fathers.

    Science.gov (United States)

    Eriksson, Henrik; Salzmann-Erikson, Martin

    2013-03-01

    Today's parents seek out social support on the Internet. A key motivation behind the choice to go online is the need for more experience based information. In recent years, new fathers have increasingly taken on an active parental role. Men's support for their caring activities for infants on the Internet needs attention. The aim was to describe communication about caring activities for infants among men who visited an Internet-based forum for fathers and elaborate on the dimensions of support available in the forum. An archival and cross-sectional observational forum study was undertaken using principles for conducting ethnographic research online: "nethnography". A total of 1203 pages of data from an Internet forum for fathers were gathered and analysed. Support for a caring fatherhood in cyberspace can be understood as fathers' communicating encouragement, confirmation and advice. The findings show that important ways of providing support through the forum included a reciprocal sharing of concerns - how to be a better father - in relation to caring for an infant. Concerns for their child's well-being and shared feelings of joy and distress in everyday life were recurrent supportive themes in the communication. Information gained from contacting others in similar situations is one important reason for the fathers' use of the Internet. Support offered in this kind of forum can be considered as a complement to formal support. Professionals can use it to provide choices for fathers who are developing themselves as caregivers without downplaying the parental support offered by formal health care regimes. FURTHER RESEARCH: Online support will probably be one of the main supporting strategies for fathers in Scandinavia. Caring and nursing researchers need to closely monitor support activities that develop, and over time, as these ill likely become an important source of support for people. © 2012 The Authors. Scandinavian Journal of Caring Sciences © 2012 Nordic

  20. Creating Engaging Escape Rooms for the Classroom

    Science.gov (United States)

    Nicholson, Scott

    2018-01-01

    Escape rooms are "live-action team-based games where players discover clues, solve puzzles, and accomplish tasks in one or more rooms in order to accomplish a specific goal (usually escaping from the room) in a limited amount of time." Escape Rooms are one type of Escape Game, which are narrative-based challenges that use puzzles, tasks,…

  1. The relationship between addiction to internet and adolescence’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking

    Directory of Open Access Journals (Sweden)

    Mehri Mowlaie

    2016-01-01

    Full Text Available Background: Given the importance of adolescent period and impact of internet and virtual communication tools on high risk behaviors, this research was conducted to examine the relationship between addiction to internet and adolescent’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking. Methods: The population of this study included all (n=40597 junior and senior high school students (boys and girls in academic year 2014-2015 in Ardabil, Iran. 380 subjects were selected as the study sample by multistage cluster sampling. The instruments for data collection in this research were addiction to internet questionnaire, Iranian adolescent's risk-taking scale and the researcher-made tendency to chat and hacking questionnaire. The data were analyzed by SPSS-22 software using correlation coefficient and simultaneous regression analysis. Results: The results showed a significantly positive correlation between addiction to internet and sexual behavior, tendency toward opposite sex, aggression, chatting and hacking (P<0.001, but there was no significant relationship between addiction to internet and alcohol. Conclusion: The results of the present study showed that addiction to internet was able to significantly predict sexual behavior, tendency toward opposite sex, aggression, chatting and hacking.

  2. Less Words, More Action: Using On-the-Fly Videos and Screenshots in Your Library's IM/Chat and Email Reference Transactions

    Science.gov (United States)

    Sekyere, Kwabena

    2010-01-01

    Email and chat/IM reference services have become a convenient and easily accessible option for the online community and libraries, particularly with increasing amounts of library resources now available electronically. This article gives an overview of Jing, which can be used to produce videos and screenshots on-the-fly, and demonstrates how to…

  3. The Influence of Group Formation on Learner Participation, Language Complexity, and Corrective Behaviour in Synchronous Written Chat as Part of Academic German Studies

    Science.gov (United States)

    Fredriksson, Christine

    2015-01-01

    Synchronous written chat and instant messaging are tools which have been used and explored in online language learning settings for at least two decades. Research literature has shown that such tools give second language (L2) learners opportunities for language learning, e.g. , the interaction in real time with peers and native speakers, the…

  4. Stats Don't Tell the Whole Story: Using Qualitative Data Analysis of Chat Reference Transcripts to Assess and Improve Services

    Science.gov (United States)

    Mungin, Michael

    2017-01-01

    In the five years following implementation of a chat reference service at James Madison University (JMU), the service proved very popular but was not closely assessed for quality of service. Using grounded theory and qualitative data analysis techniques, a comprehensive assessment effort was begun in earnest and is in progress. Preliminary results…

  5. The French Version of the Modified-Checklist for Autism in Toddlers (M-CHAT): A Validation Study on a French Sample of 24 Month-Old Children

    Science.gov (United States)

    Baduel, Sophie; Guillon, Quentin; Afzali, Mohammad H.; Foudon, Nadège; Kruck, Jeanne; Rogé, Bernadette

    2017-01-01

    Early ASD screening has the potential to reduce delays between initial parental concerns and diagnosis, and promote early intervention. The aim of this study was to validate the M-CHAT on a French population sample of 24 month-old children. This study included a low-risk sample of 1,227 children. A total of 20 children screened positive on the…

  6. Comparison of bNOS and chat immunohistochemistry in the laterodorsal tegmentum (LDT) and the pedunculopontine tegmentum (PPT) of the mouse from brain slices prepared for electrophysiology

    DEFF Research Database (Denmark)

    Veleanu, Maxime; Axen, Tina E; Kristensen, Morten P

    2016-01-01

    maintains that antibody staining for enzymes involved in synthesis or transport, of acetylcholine would be a more definitive marker and hence, preferable. NEW METHOD: Colocalization of bNOS and CHAT in the LDT/PPT, and presence of parvalbumin (PV), was examined in non-ideally prepared mouse brain slices...

  7. Organisation of roentgenofluorographic room functioning

    International Nuclear Information System (INIS)

    Yukelis, L.I.; Fejgin, M.I.

    1988-01-01

    Stationary and transportable roentgenofluorographic rooms as forms of using special roentgenodiagnostic equipment being parts of radiographic departments of therapeutic-preventive institutions are considered. Special attention is paid to operation of physicians and roentgenolaboratory worker, arrangement and carrying out roentgenodiagnostic part of work as well as interactions with the system of prescription for examination

  8. Room temperature ferromagnetic and photoluminescence ...

    Indian Academy of Sciences (India)

    32

    electrode, photo electronic devices, photo sensors, liquid crystal displays, electrochromic windows, solar panels and transparent coatings for solar-energy heat mirrors [11-13]. Here we report on magnetic properties of ITO nanoparticles at room temperature and at 100 K. 2. Experimental. The In1.9Sn0.1O3 powder samples ...

  9. New Radiation Protection training room

    CERN Multimedia

    HSE Unit

    2013-01-01

    From now on, the theory and practical components of the Radiation Protection training, developed by the RP Group and offered by the HSE Unit’s Safety Training team to people working in a Controlled Radiation Area, will take place in a dedicated teaching room, designed specifically for this kind of training.   The new room is in the Safety Training Centre on the Prévessin site and has been open since 16 October. It has an adjoining workshop that, like the room itself, can accommodate up to 12 people. It is also equipped with an interactive board as well as instruments and detectors to test for ionising radiation. This room is located near the recently inaugurated LHC tunnel mock-up where practical training exercises can be carried out in conditions almost identical to those in the real tunnel. To consult the safety training catalogue and/or sign up for Radiation Protection training, please go to: https://cta.cern.ch For further information, please contact the Safety Trainin...

  10. Room-Maid in Hotel

    Science.gov (United States)

    Hotel and Catering Industry Training Board, Wembley (England).

    This syllabus is intended for the use of training personnel in drawing up training programs for room-maids in hotels. Its main objective is to produce fully trained maids, thereby maintaining and raising standards. The syllabus is divided into three sections: Introducing to Housekeeping, Basic Tasks Performed by the Majority of Housekeeping…

  11. Hotels Make Room for Fitness.

    Science.gov (United States)

    Koszuta, Laurie Einstein

    1986-01-01

    Hotels, in hopes of gaining a competitive edge, are offering workout rooms, exercise equipment, fitness trails, and jogging tracks, but no standards have been set for safety of the facilities or staff preparedness in exercise screening, equipment use, injury prevention, or first aid. (MT)

  12. An Optimisation Approach for Room Acoustics Design

    DEFF Research Database (Denmark)

    Holm-Jørgensen, Kristian; Kirkegaard, Poul Henning; Andersen, Lars

    2005-01-01

    This paper discuss on a conceptual level the value of optimisation techniques in architectural acoustics room design from a practical point of view. It is chosen to optimise one objective room acoustics design criterium estimated from the sound field inside the room. The sound field is modeled...... using the boundary element method where absorption is incorporated. An example is given where the geometry of a room is defined by four design modes. The room geometry is optimised to get a uniform sound pressure....

  13. Smartphone Application WeChat for Clinical Follow-up of Discharged Patients with Head and Neck Tumors: A Randomized Controlled Trial.

    Science.gov (United States)

    Lyu, Ke-Xing; Zhao, Jing; Wang, Bin; Xiong, Guan-Xia; Yang, Wei-Qiang; Liu, Qi-Hong; Zhu, Xiao-Lin; Sun, Wei; Jiang, Ai-Yun; Wen, Wei-Ping; Lei, Wen-Bin

    2016-12-05

    Nowadays, social media tools such as short message service, Twitter, video, and web-based systems are more and more used in clinical follow-up, making clinical follow-up much more time- and cost-effective than ever before. However, as the most popular social media in China, little is known about the utility of smartphone WeChat application in follow-up. In this study, we aimed to investigate the feasibility and superiority of WeChat application in clinical follow-up. A total of 108 patients diagnosed with head and neck tumor were randomized to WeChat follow-up (WFU) group or telephone follow-up (TFU) group for 6-month follow-up. The follow-ups were delivered by WeChat or telephone at 2 weeks, 1, 2, 3, and 6 months to the patients after being discharged. The study measurements were time consumption for follow-up delivery, total economic cost, lost-to-follow-up rate, and overall satisfaction for the follow-up method. Time consumption in WFU group for each patient (23.36 ± 6.16 min) was significantly shorter than that in TFU group (42.89 ± 7.15 min) (P smartphone WeChat application was found to be a viable option for follow-up in discharged patients with head and neck tumors. WFU was time-effective, cost-effective, and convenient in communication. This doctor-led follow-up model has the potential to establish a good physician-patient relationship by enhancing dynamic communications and providing individual health instructions. Chinese Clinical Trial Registry, ChiCTR-IOR-15007498; http://www.chictr.org.cn/ showproj.aspx?proj=12613.

  14. Contextual Hub Analysis Tool (CHAT: A Cytoscape app for identifying contextually relevant hubs in biological networks [version 2; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Tanja Muetze

    2016-08-01

    Full Text Available Highly connected nodes (hubs in biological networks are topologically important to the structure of the network and have also been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we report a Cytoscape app, the Contextual Hub Analysis Tool (CHAT, which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene expression or mass spectrometry data, and identify hub nodes that are more highly connected to contextual nodes (e.g. genes or proteins that are differentially expressed than expected by chance. In a case study, we use CHAT to construct a network of genes that are differentially expressed in Dengue fever, a viral infection. CHAT was used to identify and compare contextual and degree-based hubs in this network. The top 20 degree-based hubs were enriched in pathways related to the cell cycle and cancer, which is likely due to the fact that proteins involved in these processes tend to be highly connected in general. In comparison, the top 20 contextual hubs were enriched in pathways commonly observed in a viral infection including pathways related to the immune response to viral infection. This analysis shows that such contextual hubs are considerably more biologically relevant than degree-based hubs and that analyses which rely on the identification of hubs solely based on their connectivity may be biased towards nodes that are highly connected in general rather than in the specific context of interest.   Availability: CHAT is available for Cytoscape 3.0+ and can be installed via the Cytoscape App Store (http://apps.cytoscape.org/apps/chat.

  15. Does a rival’s song elicit territorial defense in a tropical songbird, the Pied Bush Chat (Saxicola caprata?

    Directory of Open Access Journals (Sweden)

    Navjeevan Dadwal

    2017-05-01

    Full Text Available The purpose of bird song and the way in which it is delivered has been argued to be adapted mainly for territorial defense. We performed a field experiment with the combination of playbacks and a model to test how much song actually relates to increased territorial defense in the territorial tropical songbird, the Pied Bush Chat, during breeding season (Feb–May, 2015 at Haridwar, Himalayan Foothills, India. As expected, the results of the experiment indicated that song was the major cue used by territory holders to cope with rival intrusions. The song rate was particularly escalated during simulated territorial interactions when the model was presented with a playback song of conspecifics. Behaviors such as restlessness (perch change, the height of perch, and distance from the model appeared to be of relatively lesser importance. To our knowledge, no avian species from the Indian subcontinent has been studied to provide evidence that song can escalate aggressive response by a territory owner.

  16. Identification of a mutation in the CHAT gene of Old Danish Pointing Dogs affected with congenital myasthenic syndrome

    DEFF Research Database (Denmark)

    Proschowsky, Helle Friis; Flagstad, Annette; Cirera, Susanna

    2007-01-01

    The presence of a recessive inherited muscle disease in Old Danish Pointing Dogs has been well known for years. Comparisons of this disease with myasthenic diseases of other dog breeds and humans have pointed toward a defect in the synthesis of the neurotransmitter acetylcholine possibly due...... to decreased activity of the enzyme choline acetyltransferase. We sequenced exons 5-18 of the gene encoding choline acetyltransferase (CHAT) in 2 affected and 2 unaffected dogs and identified a G to A missense mutation in exon 6. The mutation causes a valine to methionine substitution and segregates...... in agreement with the inheritance of the disease. The mutation was not detected in 50 dogs representing 25 other dog breeds. A DNA test has been developed and is now available to the breeders of Old Danish Pointing Dogs....

  17. The usability of a WeChat-based electronic questionnaire for collecting participant-reported data in female pelvic floor disorders: a comparison with the traditional paper-administered format.

    Science.gov (United States)

    Sun, Zhi-Jing; Zhu, Lan; Liang, Maolian; Xu, Tao; Lang, Jing-He

    2016-08-01

    WeChat is a promising tool for capturing electronic data; however, no research has examined its use. This study evaluates the reliability and feasibility of WeChat for administering the Pelvic Floor Impact Questionnaire Short Form 7 questionnaire to women with pelvic floor disorders. Sixty-eight pelvic floor rehabilitation women were recruited between June and December 2015 and crossover randomized to two groups. All participants completed two questionnaire formats. One group completed the paper version followed by the WeChat version; the other group completed the questionnaires in reverse order. Two weeks later, each group completed the two versions in reverse order. The WeChat version's reliability was assessed using intraclass correlation coefficients and test-retest reliability. Forty-two women (61.8%) preferred the WeChat to the paper format, eight (11.8%) preferred the paper format, and 18 (26.5%) had no preference. The younger women preferred WeChat. Completion time was 116.5 (61.3) seconds for the WeChat version and 133.4 (107.0) seconds for the paper version, with no significant difference (P = 0.145). Age and education did not impact completion time (P > 0.05). Consistency between the WeChat and paper versions was excellent. The intraclass correlation coefficients of the Pelvic Floor Impact Questionnaire Short Form 7 and the three subscales ranged from 0.915 to 0.980. The Bland-Altman analysis and linear regression results also showed high consistency. The test-retest study had a Pearson's correlation coefficient of 0.908, demonstrating a strong correlation. WeChat-based questionnaires were well accepted by women with pelvic floor disorders and had good data quality and reliability.

  18. Autonomy in Nursing Students’ Process of Knowledge Construction: the Educational Chat as a Teaching Tool La autonomía en el proceso de construcción del conocimiento de alumnos de enfermería: el chat educacional como herramienta de enseñanza Autonomia no processo de construção do conhecimento de alunos de enfermagem: o chat educacional como ferramenta de ensino

    Directory of Open Access Journals (Sweden)

    Ana Paula Scheffer Schell da Silva

    2010-04-01

    Full Text Available This documental study has the qualitative approach of a case study. It analyzes how autonomy has been developed in nursing students’ process of knowledge construction, in a context mediated by the use of educational chat in Learning Management Systems (LMS. The analyzed materials were eight discussions promoted by students, professors, and monitors in the chat session of TelEduc® LMS. The software NVivo® was used to categorize data and Content Analysis for the analysis of information. Data analysis used Freire as a reference point, revealing that nursing students need to develop their autonomy by acknowledging their incompleteness. Professors can aid this process by problematizing and developing critical dialogical relations. The potential of the educational chat as a pedagogical tool is highlighted because it encourages students to autonomously seek knowledge.Investigación documental con abordaje cualitativo del tipo estudio de caso. El objetivo fue analizar como se desarrolló la autonomía en el proceso de construcción del conocimiento de alumnos de Enfermería, en un contexto mediado por un chat educacional, en Ambiente Virtual de Aprendizaje (AVA. Los materiales analizados fueron ocho discusiones promovidas por alumnos, profesores y monitores en el chat del AVA TelEduc®. Para la categorización de los datos, se utilizó el software NVivo® y, para el análisis de las informaciones, la técnica de análisis de contenido. El análisis estuvo de acuerdo con el marco teórico de Freire, revelando que es necesario que el alumno de Enfermería desarrolle la autonomía, mediante el darse cuenta de no estar acabado. Esto puede ser realizado con ayuda de profesores que adopten la metodología de la problematización y del desarrollo de relaciones dialógicas críticas. Se destaca el chat educacional como herramienta que incentiva a los alumnos a buscar el conocimiento de forma autónoma.Pesquisa documental com abordagem qualitativa do tipo

  19. At ISR Main Control Room

    CERN Multimedia

    1983-01-01

    After 13 years the exploitation of the Intersecting Storage Rings as a beam-beam collider went to an end. In this last year the demands were very exacting, both in terms of operating time and diversified running conditions (Annual Report 1983 p. 123). Before dismantelement the photographer made a last tour, see photos 8310889X --> 8310667X. This photo shows the Main Control Room.

  20. The Complex Relationship of Realspace Events and Messages in Cyberspace: Case Study of Influenza and Pertussis Using Tweets

    Science.gov (United States)

    Nagel, Anna C; Spitzberg, Brian H; An, Li; Gawron, J Mark; Gupta, Dipak K; Yang, Jiue-An; Han, Su; Peddecord, K Michael; Lindsay, Suzanne; Sawyer, Mark H

    2013-01-01

    Background Surveillance plays a vital role in disease detection, but traditional methods of collecting patient data, reporting to health officials, and compiling reports are costly and time consuming. In recent years, syndromic surveillance tools have expanded and researchers are able to exploit the vast amount of data available in real time on the Internet at minimal cost. Many data sources for infoveillance exist, but this study focuses on status updates (tweets) from the Twitter microblogging website. Objective The aim of this study was to explore the interaction between cyberspace message activity, measured by keyword-specific tweets, and real world occurrences of influenza and pertussis. Tweets were aggregated by week and compared to weekly influenza-like illness (ILI) and weekly pertussis incidence. The potential effect of tweet type was analyzed by categorizing tweets into 4 categories: nonretweets, retweets, tweets with a URL Web address, and tweets without a URL Web address. Methods Tweets were collected within a 17-mile radius of 11 US cities chosen on the basis of population size and the availability of disease data. Influenza analysis involved all 11 cities. Pertussis analysis was based on the 2 cities nearest to the Washington State pertussis outbreak (Seattle, WA and Portland, OR). Tweet collection resulted in 161,821 flu, 6174 influenza, 160 pertussis, and 1167 whooping cough tweets. The correlation coefficients between tweets or subgroups of tweets and disease occurrence were calculated and trends were presented graphically. Results Correlations between weekly aggregated tweets and disease occurrence varied greatly, but were relatively strong in some areas. In general, correlation coefficients were stronger in the flu analysis compared to the pertussis analysis. Within each analysis, flu tweets were more strongly correlated with ILI rates than influenza tweets, and whooping cough tweets correlated more strongly with pertussis incidence than

  1. Novel room temperature ferromagnetic semiconductors

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Amita [KTH Royal Inst. of Technology, Stockholm (Sweden)

    2004-06-01

    Today's information world, bits of data are processed by semiconductor chips, and stored in the magnetic disk drives. But tomorrow's information technology may see magnetism (spin) and semiconductivity (charge) combined in one 'spintronic' device that exploits both charge and 'spin' to carry data (the best of two worlds). Spintronic devices such as spin valve transistors, spin light emitting diodes, non-volatile memory, logic devices, optical isolators and ultra-fast optical switches are some of the areas of interest for introducing the ferromagnetic properties at room temperature in a semiconductor to make it multifunctional. The potential advantages of such spintronic devices will be higher speed, greater efficiency, and better stability at a reduced power consumption. This Thesis contains two main topics: In-depth understanding of magnetism in Mn doped ZnO, and our search and identification of at least six new above room temperature ferromagnetic semiconductors. Both complex doped ZnO based new materials, as well as a number of nonoxides like phosphides, and sulfides suitably doped with Mn or Cu are shown to give rise to ferromagnetism above room temperature. Some of the highlights of this work are discovery of room temperature ferromagnetism in: (1) ZnO:Mn (paper in Nature Materials, Oct issue, 2003); (2) ZnO doped with Cu (containing no magnetic elements in it); (3) GaP doped with Cu (again containing no magnetic elements in it); (4) Enhancement of Magnetization by Cu co-doping in ZnO:Mn; (5) CdS doped with Mn, and a few others not reported in this thesis. We discuss in detail the first observation of ferromagnetism above room temperature in the form of powder, bulk pellets, in 2-3 mu-m thick transparent pulsed laser deposited films of the Mn (<4 at. percent) doped ZnO. High-resolution transmission electron microscopy (HRTEM) and electron energy loss spectroscopy (EELS) spectra recorded from 2 to 200nm areas showed homogeneous

  2. New thinking for the boiler room.

    Science.gov (United States)

    Rose, Wayne

    2008-09-01

    Wayne Rose, marketing manager at integrated plant room manufacturer Armstrong Integrated Systems, explains how increasing use of off-site manufacture, the latest 3D modelling technology, and advances in control technology, are revolutionising boiler room design and construction.

  3. Operating Room Utilization at Frederick Memorial Hospital

    National Research Council Canada - National Science Library

    Edwards, Jonathan A

    2007-01-01

    .... A logistical regression analysis was used to identify the impact of variables on operating room utilization rates and therefore help explain how or why some operating rooms incurred higher utilization rates than others...

  4. Recovery room nurses' knowledge regarding postoperative airway ...

    African Journals Online (AJOL)

    Adele

    room nurses in private hospitals in Northern Gauteng, South Af- rica, regarding ... room nurse' is used. The same principle applies when reference is made to the terms ... Ethical considerations. Written consent ..... Principles of CPR in theatre.

  5. Manufacturing of NAA laboratory clean room

    International Nuclear Information System (INIS)

    Suwoto; Hasibuan, Djaruddin

    2001-01-01

    The ''NAA laboratory clean room'' has been built in the Reactor Serba Guna G.A. Siwabessy building. The erection of ''AAN laboratory clean room'' doing by started of preparation of the ''manufacturing procedure'' refer to ''Design and manufacturing neutron activation analysis clean room laboratory''. Manufacturing process and erection doing refer to procedures makes. By providing of the ''AAN laboratory clean room'' can be cocluded that the research activity and the user sevises in P2TRR well meet to be done

  6. THE CYBER THREAT AND THE PROBLEM OF INFORMATION SECURITY - A critical analysis of the concepts of cyber-power and cyber-space

    Directory of Open Access Journals (Sweden)

    Sebastian SÂRBU

    2017-06-01

    Full Text Available In this paper we approached from a researcher’s angle and analyzed the concepts of cyber-space, cyber-power from the security school perspective, from that of the international organizations, and from the civil society point of view. Therefore we referred to the documents and the international initiatives concerning the security of data transfer in the context of the current threats against cybernetic security on the one hand, and its interpretation as a threat to the values, rights and democratic freedoms of the civil society, on the other. The risk society is defined both through the grid of political sociology, of the Copenhagen school, as a key element of reference in this case, as well as through the necessity to build a safe cyber space, here being scrutinized in a value-based antithesis between terror and democracy / freedom of speech.

  7. Cyberspace, identities, and everyday life: new perspectives on mediated interactions / Ciberespaço, cotidiano e identidades: novas leituras sobre interações mediadas

    Directory of Open Access Journals (Sweden)

    Francis Oliveira Bezerra

    2011-10-01

    Full Text Available This article aims to discuss the analysis of mechanisms of social interaction operationalized in cyberspace. Our point of view is directed by Simmel's thinking about the game of interests between individuals, and subjects of interaction, when placed within a new area of virtual environments such as relationships and building their everyday relationships in this environment. This would not only be a possible side in the analysis of social reality, but also operated one of the identities and social roles, which would be rearranged and incorporated as a process of forming a meaningful unity of the subject, streamlined by a constant idea of being active in mode 'on' and ‘offline' as a means of enhancing their experiences. Our study will consider the contributions of Erving Goffman, Jean Baudrillard, Anthony Giddens, among others.

  8. 7 CFR 58.312 - Churn rooms.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Churn rooms. 58.312 Section 58.312 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards....312 Churn rooms. Churn rooms in addition to proper construction and sanitation shall be so equipped...

  9. 32 CFR 518.9 - Reading room.

    Science.gov (United States)

    2010-07-01

    ... RELATIONS THE FREEDOM OF INFORMATION ACT PROGRAM FOIA Reading Rooms § 518.9 Reading room. (a) Reading room... clearly unwarranted invasions of privacy, or competitive harm to business submitters. In appropriate cases... information concerning munitions, equipment, systems, and intelligence activities. (4) (a)(2)(D) records...

  10. Auditory modelling for assessing room acoustics

    NARCIS (Netherlands)

    Van Dorp Schuitman, J.

    2011-01-01

    The acoustics of a concert hall, or any other room, are generally assessed by measuring room impulse responses for one or multiple source and receiver location(s). From these responses, objective parameters can be determined that should be related to various perceptual attributes of room acoustics.

  11. An open room for interpretation

    DEFF Research Database (Denmark)

    Tofte-Hansen, Inge

    2015-01-01

    Based on a concept that I have developed, which is called: "An open room for interpretation", the following article states that creative work and aesthetic expression in a pedagogical context with 2-6 years old children must give space for the children's own expressions. To teach music should...... not only be seen as a learning task where initiative and product is defined by the teacher. In contrast, I suggest that creative activities and aesthetic processes must be seen as an interaction between children's immediate physicality and curiosity and the teacher's musical skills and abilities to follow...

  12. Flow in air conditioned rooms

    DEFF Research Database (Denmark)

    Nielsen, Peter V.

    1974-01-01

    Flow in air conditioned r ooms is examined by means of model experiments . The different gearnetries giving unsteady, steady three- dimensional and steady twodimensional flow are determined . Velacity profiles and temperature profiles are measured in some of the geometries. A numerical solution...... of the flow equations is demonstrated and the flow in air conditioned rooms in case of steady two dimensional flow is predi cted. Compari son with measured results is shown i n the case of small Archimedes numbers, and predictions are shown at high Archimedes numbers. A numerical prediction of f low and heat...

  13. Ergonomics and control room design

    International Nuclear Information System (INIS)

    Williams, J.C.; Story, D.T.

    1987-01-01

    The application of ergonomic principles to the design process and some aspects of the Sizewell B control room is discussed. Also outlined is the management process which ensures that these principles are applied systematically throughout the design development activity and highlights the functional requirements which must also be met in the creation of a total man-machine system package which meets all the technical design criteria. The ergonomics requirements are part of this process and extend into all aspects of design ranging from such matters as workplace organization to environmental factors, social engineering, communications and aesthetics. (author)

  14. Guidelines for control room design reviews

    International Nuclear Information System (INIS)

    1981-09-01

    The control room design review is part of a broad program being undertaken by the nuclear industry and the government to ensure consideration of human factors in nuclear power plant design and operation. The purpose of the control room design review described by these guidelines is to (1) review and evaluate the control room workspace, instrumentation, controls, and other equipment from a human factors engineering point of view that takes into account both system demands and operator capabilities; and (2) to identify, assess, and implement control room design modifications that correct inadequate or unsuitable items. The scope of the control room design review described by these guidelines covers the human engineering review of completed control rooms; i.e., operational control rooms or those at that stage of the licensing process where control room design and equipment selection are committed. These guidelines should also be of use during the design process for new control rooms. However, additional analyses to optimize the allocation of functions to man and machine, and further examination of advanced control system technology, are recommended for new control rooms. Guidelines and references for comprehensive system analyses designed to incorporate human factors considerations into the design and development of new control rooms are presented in Appendix B. Where possible, a generic approach to the control room design review process is encouraged; for example, when control room designs are replicated wholly or in part in two or more units. Even when designs are not replicated exactly, generic reviews which can be modified to account for specific differences in particular control rooms should be considered. Industry organizations and owners groups are encouraged to coordinate joint efforts and share data to develop generic approaches to the design review process. The control room design review should accomplish the following specific objectives. To determine

  15. Indonesian Modified Checklist for Autism in Toddler, Revised with Follow-Up (M-CHAT-R/F for Autism Screening in Children at Sanglah General Hospital, Bali-Indonesia

    Directory of Open Access Journals (Sweden)

    I Gusti Ayu Trisna Windiani

    2016-07-01

    Full Text Available Background: Autism Spectrum Disorder (ASD is a developmental disorder characterized by impaired reciprocal social interaction and communication, and by a restricted, repetitive or stereotyped behavior. Early detection of autism is recommended on all toddlers from the ages of 9 months because of increasing in prevalence. The Modified Checklist for Autism (M-CHAT in Toddlers, a Revised with Follow-Up (M-CHAT-R/F is a 2-stage parent-report screening tool to assess a risk for ASD and it demonstrates an improvement compared to the original M-CHAT. It is translated to Indonesian language by Soetjiningsih and colleagues, and it needs to be validated. Methods: This is a diagnostic accuracy study conducted at Sanglah Hospital, Bali, conducted from March 2015 to December 2016. We included children 18-48 months in this study. The parents of the outpatient children in the growth and development clinic of Sanglah Hospital were asked to fill out the Indonesian M-CHAT-R/F form. In the same visit, the Autism Spectrum Disorder (ASD assessment according to the DSM-5 as a gold standard was done by the researchers, without knowing the M-CHAT-R/F result. The assessment comparison based on M-CHAT-R/F and DSM-5 was analyzed to obtain the AUC intersection on ROC curve that gives the best sensitivity and specificity. Results: We found 10.71% of our outpatient was diagnosed with autism according to DSM 5, when they are 18-24 months old. The Indonesian version of M-CHAT-R/F as an ASD screening tool has 88.9% in sensitivity and 94.6% in specificity. Conclusion: Our results suggest that the Indonesian translation of the M-CHAT-R/F is an effective screening instrument for ASD, particularly when a two-step screening process is used. 

  16. WhatsApp: caracterização do gênero chat em contexto de ensino de línguas estrangeiras

    Directory of Open Access Journals (Sweden)

    Natália Costa Leite

    2015-07-01

    Full Text Available Digital information and communication technologies widely brought unquestionable advances in the fields of knowledge and social life. With the advent of these new technologies, meaning negotiation has become increasingly multimodal, that is, conventional methods of meaning negotiation by writing, for example, may link up with visual, oral, and gestural modes, among many others. Education can be configured as a space to enable and facilitate the new production of multiple meanings with the help of new technologies. Therefore, this paper proposes to present a characterization of the text genre chat through WhatsApp application, given its relevance and popularity among mobile users, by adopting Bakhtin’s perspective of speech genres (2003. The use of specific criteria for analysing the genre chat was the method applied. It is expected that the characterization of the genre may encourage the use of the instant messaging app as a support tool for teaching and learning a foreign language.

  17. Analysis on the Information Crisis in the Micro Era——A Case Study of the WeChat Friends Circle

    Directory of Open Access Journals (Sweden)

    Wang feifei

    2017-12-01

    Full Text Available [Purpose/significance] In the mobile social network, the emergence and dissemination of information presents a new law and characteristics. Social network information management is facing enormous challenges. [Method/process] We analyzed the characteristics of micro information transmission from four perspectives--information dissemination, information contents, information cognition and information communication. Then, we analyzed the crisis and put forward related strategies of WeChat information. [Result/conclusion]The microera has changed our lives and brought us a new crisis: the user’s over-reliance, the expansion of WeChat immediate information, the influx of weak relations, the ongoing increase of information noise and so on. Through analyzing the information characteristics and discussing about the crisis, it provides a proper theoretical basis for facing the information crisis.

  18. Comparaison de différentes associations d'anticoagulants sur les numérations plaquettaires et la formation d'agrégats chez le chat

    OpenAIRE

    Charru, Pauline

    2011-01-01

    Chez le chat, l'hémogramme est un examen complémentaire parfois difficile à interpréter aux vues des nombreuses difficultés d'ordre pré-analytique et analytique potentielle. Parmi elles, on retiendra la forte tendance des plaquettes à s'agréger in vitro, surtout sur EDTA-dépendante, une nouvelle molécule antiagrégante a montré son intérêt : le CTAD (Citrate, Théophylline, Adénosine et Dipyridamole). Dans notre étude, l'utilisation de l'association EDTA et CTAD chez 46 chats sains, en éliminan...

  19. A Comparative study on the clinical application of Modified Checklist for Autism in Toddlers (M-CHAT) and Checklist for Autism in Toddlers (CHAT)%改良婴幼儿孤独症量表与婴幼儿孤独症量表临床应用比较

    Institute of Scientific and Technical Information of China (English)

    沈继英; 柯晓燕; 肖婷; 肖湘; 肖舟; 邹冰; 梁凤晶; 邱婷; 王晨阳; 王民洁

    2012-01-01

    Objective: To compare the application of Modified Checklist for Autism in Toddlers (M-CHAT) and that of Checklist for Autism in Toddlers (CHAT) in the clinical screening. Methods: Sixty-nine children with pervasive developmental disorders (PDDs) according to the Diagnostic and Statistical Manual of Mental Disorders-IV( DSM-IV-TR) criterion and 32 age- and gender-matched children with other developmental disorder were included. All subjects were evaluated with M-CHAT and CHAT. Results: The sensitivity of M-CHAT was higher than that of CHAT (0.99 vs. 0.81, P 0.05), and no significant difference between the positive screening result of M-CHAT and that of CHAT (P >0.05) ; but in the children aged 24-36 months, there was significant difference between the positive screening result of M-CHAT and the gold standard [(72/5) vs. (51/26), P 0.05). Conclusion: It suggests that the sensitivity of M-CHAT is higher than that of CHAT, and it is a promising screening instrument for PDDs in normal toddlers. Applying in the clinic of child developmental disorder, the screening results of CHAT ate consistent with clinical diagnosis.%目的:比较改良婴幼儿孤独症量表(M-CHAT)与婴幼儿孤独症量表(CHAT)在广泛性发育障碍( PDDs)儿童的早期筛查中的适用性.方法:对69例符合美国精神障碍诊断和统计手册第4版(DSM-Ⅳ-TR)诊断标准的广泛性发育障碍儿童(PDDs组),和年龄、性别匹配的32名其他发育障碍儿童(对照组),同时运用M-CHAT和CHAT对被试进行临床评估,比较两种工具在临床筛查时的差异.结果:M-CHAT的灵敏度高于CHAT (0.99 vs.0.81,P<0.01);而特异度则低于CHAT (0.16 vs.0.51,P<0.01).两种工具筛查阳性人数和阴性人数不一致[(95/6) vs.(72/29),P<0.05].年龄分层比较,在24月以下儿童中M-CHAT阳性数(17/0)和CHAT阳性数(15/2)均与临床诊断(12/5)一致;在36月以上儿童中,M-CHAT阳性数(6/1)和CHAT阳性数(3/4)均与临床诊断(6/1)

  20. Room temperature cryogenic test interface

    International Nuclear Information System (INIS)

    Faris, S. M.; Davidson, A.; Moskowitz, P. A.; Sai-Halasz, G. A.

    1985-01-01

    This interface permits the testing of high speed semiconductor devices (room-temperature chips) by a Josephson junction sampling device (cryogenic chip) without intolerable loss of resolution. The interface comprises a quartz pass-through plug which includes a planar transmission line interconnecting a first chip station, where the cryogenic chip is mounted, and a second chip station, where the semiconductor chip to be tested is temporarily mounted. The pass-through plug has a cemented long half-cylindrical portion and short half-cylindrical portion. The long portion carries the planar transmission line, the ends of which form the first and second chip mounting stations. The short portion completes the cylinder with the long portion for part of its length, where a seal can be achieved, but does not extend over the chip mounting stations. Sealing is by epoxy cement. The pass-through plug is sealed in place in a flange mounted to the chamber wall. The first chip station, with the cryogenic chip attached, extends into the liquid helium reservoir. The second chip station is in the room temperature environment required for semiconductor operation. Proper semiconductor operating temperature is achieved by a heater wire and control thermocouple in the vicinity of each other and the second chip mounting station. Thermal isolation is maintained by vacuum and seals. Connections for power and control, for test result signals, for temperature control and heating, and for vacuum complete the test apparatus

  1. Web based emergency room PACS

    International Nuclear Information System (INIS)

    Cha, Soon Joo; Cheon, Yong Kyung; Choi, Sung Woo Kim

    2005-01-01

    We wished to develop the web based Picture Archiving and Communication System in the emergency room for early decision making in emergency treatment planning at a full PACS Hospital. The program tools were Microsoft Visual Studio 6.0 - Visual C++ 6.0, and the Microsoft SQL 7.0 under the Microsoft Windows 2000 server operation system. The achievement of images was performed by an auto transport program installed in the ER and the radiology department. The average compression rates were 5:1 for CT and MR, and 20:1 for CR with JPEG 2000 lossy compression. All the images were stored on hard disk for 3 months. The patients' information was displayed for 2 weeks for reducing the security risk. For interdepartmental consultation, patient query by patient hospital number was available. Our Web based ER PACS could be useful system for early decision making for treatment planning in the emergency room because it reduces the risk factors for the security of the Web Paces by using a system independent from PACS in the hospital and minimizing the information patients

  2. Room design in dental radiology

    International Nuclear Information System (INIS)

    Achalli, Sonika

    2013-01-01

    Radiography and radiographic examination of the patient form most valuable diagnostic tool in providing comprehensive dental care. The safe and effective use of the X-ray equipment is important for the protection of the patient, other members of the public and all members of the dental team. For patients, the risk that is associated with exposure to X-rays must always be weighed against the clinical benefit of an accurate diagnosis. The risks associated with the exposure to the X-rays during the radiographic examination of the patient must be minimised by meticulously adhering to good practice and thus carefully managing the use of dental radiological procedures. The dentist or the personnel who is the license holder for the X-ray equipment is ultimately responsible for the radiation safety at the workplace. One important method in limiting the possible risk of radiation exposure at workplace is the correct design of an X-ray room. This paper is aimed at discussing the guidelines and recommendations on X-ray room designs in dental radiology in order to facilitate radiation control and safe working conditions for radiation workers as well as the public. (author)

  3. Web based emergency room PACS

    Energy Technology Data Exchange (ETDEWEB)

    Cha, Soon Joo; Cheon, Yong Kyung; Choi, Sung Woo Kim [Ilsan Paik Hospital, Inje University, Seoul (Korea, Republic of)] (and others)

    2005-07-15

    We wished to develop the web based Picture Archiving and Communication System in the emergency room for early decision making in emergency treatment planning at a full PACS Hospital. The program tools were Microsoft Visual Studio 6.0 - Visual C++ 6.0, and the Microsoft SQL 7.0 under the Microsoft Windows 2000 server operation system. The achievement of images was performed by an auto transport program installed in the ER and the radiology department. The average compression rates were 5:1 for CT and MR, and 20:1 for CR with JPEG 2000 lossy compression. All the images were stored on hard disk for 3 months. The patients' information was displayed for 2 weeks for reducing the security risk. For interdepartmental consultation, patient query by patient hospital number was available. Our Web based ER PACS could be useful system for early decision making for treatment planning in the emergency room because it reduces the risk factors for the security of the Web Paces by using a system independent from PACS in the hospital and minimizing the information patients.

  4. Acquirement and Interpretation of Public Documentation of Cultural Heritage - WeChat & Post-disaster Rebuilding of Shangri-La Ancient City

    Science.gov (United States)

    Huo, X. W.; Zhang, G.; Shang, J.; Qi, X. J.; Li, G. L.; Huang, Z. Y.

    2015-09-01

    The essay introduces the methodology and reflection upon the acquirement and interpretation of public documentation supporting the post-disaster reconstruction of the Shangri-La historic town after struck by fire in 2014. The proposed acquirement platform is developed on the basis of WeChat, a popular mobile communication App on smart phones in China. Historic photos and related documents of the burnt historic area are then accumulated to be analytically interpreted to inform post-disaster reconstruction planning.

  5. The relationship between addiction to internet and adolescence’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking

    OpenAIRE

    Mehri Mowlaie; Setareh Jani

    2016-01-01

    Background: Given the importance of adolescent period and impact of internet and virtual communication tools on high risk behaviors, this research was conducted to examine the relationship between addiction to internet and adolescent’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking. Methods: The population of this study included all (n=40597) junior and senior high school students (boys and girls) in academic year 2014-2015 in Ardabil, Iran. 38...

  6. [Maxillofacial and dental abnormalities in some multiple abnormality syndromes. "Cri du chat" syndrome, Wilms' tumor-aniridia syndrome; Sotos syndrome; Goldenhar syndrome].

    Science.gov (United States)

    Berio, A; Trucchi, R; Meliota, M

    1992-05-01

    The paper describes the maxillo-facial and dental anomalies observed in some chromosome and non-chromosome poly-malformative syndromes ("Cri du chat" syndrome; Wilms' tumour; Sotos' syndrome; Goldenhar's syndrome). The Authors emphasise the possibility of diagnosing these multiple deformity syndromes from maxillo-facial alterations in early infancy; anomalous tooth position and structure cal also be successfully treated immediately after the first appearance of teeth. This is a particularly promising field of pediatrics and preventive pediatric medicine.

  7. Manejo anestésico de paciente com síndrome de Cri Du Chat (miado do gato: relato de caso

    Directory of Open Access Journals (Sweden)

    Klaus Morales dos Santos

    2010-12-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: A síndrome de Cri Du Chat é uma desordem cromossômica com características clínicas peculiares, incluindo anormalidades de vias aéreas, que exigem do anestesiologista cuidados especiais no manuseio desses pacientes. OBJETIVO: Apresentar um caso de anestesia ambulatorial em paciente com síndrome de Cri Du Chat e abordar os aspectos anestésicos relacionados com essa doença. RELATO DO CASO: Paciente do sexo masculino, 14 anos, 25 kg, portador de síndrome de Cri Du Chat, estado físico ASA P2, admitido para realização de endoscopia digestiva alta e dilatação esofagiana. Quadro neurológico com retardo mental, alguns episódios de convulsões e hipertonia acentuada de membros. Exame das vias aéreas demonstrando mobilidade cervical limitada e distância tireomentoniana inferior a 6 cm. Paciente não atendia ao comando verbal, sendo difícil a avaliação completa das vias aéreas. Outros achados ao exame físico incluíram microcefalia, micrognatia, discreto estrabismo, hipertonia de membros em flexão e protrusão de língua. Administrados, por via venosa, 50 µg de citrato de fentanila, 1 mg de midazolam e 60 mg de propofol. Mantido em ventilação espontânea. Procedimento com duração de 5 minutos, realizado sem intercorrências. CONCLUSÕES: Pacientes com síndrome de Cri Du Chat apresentam características clínicas de grande relevância no manejo anestésico, cabendo ao anestesiologista considerar com cautela as particularidades estruturais de cada paciente.

  8. Undergraduate and Postgraduate Students in a North American University are Choosing to use Chat Reference Services for all Kinds of Reasons. A review of: Ward, David. “Why Users Choose Chat: A Survey of Behavior and Motivations.” Internet Reference Services Quarterly 10.1 (2005: 29-46.

    Directory of Open Access Journals (Sweden)

    Gill Needham

    2006-03-01

    Full Text Available Objective – To investigate reasons why undergraduate and postgraduate students choose to use chat reference services and their satisfaction with the experience. Design – User survey. Setting – Large academic library in the United States. Subjects – A total of 341 library users took part in the survey. Of these, 79 were graduate students, 215 undergraduates, 21 staff, 5 alumni and 21 members of the public. Method – A user survey form was posted on the library website for a period of one month (March 2003. Users of the chat reference service received an automatic closing message asking them to complete the survey. Responses were fed into a database to be analysed by the research staff. Additional data was also gathered about the behaviour of all users of the chat service during that period – both responders and non‐responders. Main results – The most popular reason for choosing to use a chat service was the desire for a speedy response, followed by ‘distance from the library’. Responders chose to use chat to ask a range of different kinds of questions. Nearly half (45% were looking for a specific resource and 23% were seeking help at the beginning of their research. There were notable differences between undergraduate and graduate students. Twice as many undergraduates as graduates used the service to help them get started on their research. Graduates were three times as likely as undergraduates to be using the service to address technical problems they were having with the website. Overall satisfaction with the service was extremely high, with 77.5% rating it 5 out of 5 and 94.5% giving it 4 or 5 out of 5. Conclusion – Chat reference services are popular with users primarily because they are quick and convenient. However, users expect that these services will be able to deal with all types of questions, including help with research. This challenges an assumption by library staff that the medium is only suitable for short

  9. Effects of short-term hormonal replacement on learning and on basal forebrain ChAT and TrkA content in ovariectomized rats.

    Science.gov (United States)

    Espinosa-Raya, Judith; Plata-Cruz, Noemí; Neri-Gómez, Teresa; Camacho-Arroyo, Ignacio; Picazo, Ofir

    2011-02-23

    It has been proposed that sex steroid hormones improve performance in some cognitive tasks by regulating the basal forebrain cholinergic function. However, the molecular basis of such influence still remains unknown. Current study analyzed the performance of ovariectomized rats in an autoshaping learning task after a short-term treatment with 17β-estradiol (E2: 4 and 40μg/kg) and/or progesterone (P4: 4mg/kg). These results were correlated with basal forebrain choline acetyltransferase (ChAT) and TrkA protein content. The high dose of E2 enhanced both acquisition in the autoshaping task and the content of ChAT and TrkA. P4 treatment increased ChAT and TrkA content without affecting performance of rats in the autoshaping learning task. Interestingly, the continuous and simultaneous administration of E2 plus P4 did not significantly modify behavioral and biochemical evaluated parameters. These results address the influence of both E2 and P4 on cholinergic and TrkA activity and suggest that the effects of ovarian hormones on cognitive performance involve basal forebrain cholinergic neurons. Copyright © 2010 Elsevier B.V. All rights reserved.

  10. Harnessing motivational forces in the promotion of physical activity: the Community Health Advice by Telephone (CHAT) project.

    Science.gov (United States)

    King, Abby C; Friedman, Robert; Marcus, Bess; Castro, Cynthia; Forsyth, LeighAnn; Napolitano, Melissa; Pinto, Bernardine

    2002-10-01

    Physical inactivity among middle- and older-aged adults is pervasive, and is linked with numerous chronic conditions that diminish health and functioning. Counselor-directed physical activity programs may enhance extrinsic motivation (reflected in social influence theories, such as self-presentation theory) and, in turn, physical activity adherence, while the counselor is in charge of program delivery. However, external influences can undermine intrinsic motivation, making it more difficult to maintain physical activity once counselor-initiated contact ends. In contrast, programs that diminish the socially evaluative and controlling aspects of the counseling interchange may promote intrinsic motivation (described in cognitive evaluation theory), and, thus, physical activity maintenance, even when counselor-initiated contact ceases. The objective of the Community Health Advice by Telephone (CHAT) project is to compare these two theories by conducting a randomized controlled trial evaluating the effects of a telephone-administered counseling program delivered by a person (social influence enhancement) or computer (cognitive evaluation enhancement) on physical activity adoption and maintenance over 18 months. Healthy, sedentary adults (n = 225) aged 55 years and older are randomized to one of these programs or to a control arm. This study will contribute to advancing motivational theory as well as provide information on the sustained effectiveness of interventions with substantial public health applicability.

  11. Effects of Oral Stimulation Intervention in Newborn Babies with Cri du Chat Syndrome: Single-Subject Research Design

    Directory of Open Access Journals (Sweden)

    Mi Kyung Kim

    2018-01-01

    Full Text Available The purpose of this study is to treat dysphagia in a newborn baby with cri du chat syndrome using an oral stimulation intervention and to examine its effects. The subject of this study was a baby born 2 weeks prematurely. Since birth, his oxygen saturation (SaO2 decreased while feeding, and he had difficulty with mouth feeding. Thus, an NG feeding tube was inserted, and dysphagia treatment was initiated on the sixth day after birth. A baseline phase and an intervention phase were performed using an AB design. The oral stimulation intervention was not performed in the baseline phase, as only nonnutritive sucking training using a rubber pacifier was used during the baseline phase. During the intervention phase, nonnutritive sucking training and oral stimulation intervention were simultaneously conducted. After the intervention period, daily oral milk intake and intake per feeding of the subject noticeably increased. The oxygen saturation while feeding rose over 90% on average, and the baby did not present with hypoxia. The oral stimulation intervention provided prior to feeding resulted in highly positive effects, including induced normal development of the baby, stimulation of his transition from the NG feeding tube to bottle feeding, increased oxygen saturation, and a shortened hospital stay.

  12. An artificially intelligent chat agent that answers adolescents' questions related to sex, drugs, and alcohol: an exploratory study.

    Science.gov (United States)

    Crutzen, Rik; Peters, Gjalt-Jorn Y; Portugal, Sarah Dias; Fisser, Erwin M; Grolleman, Jorne J

    2011-05-01

    The aim of this study was to investigate if and how an artificially intelligent chat agent (chatbot) that answers questions about sex, drugs, and alcohol is used and evaluated by adolescents, especially in comparison with information lines and search engines. A sample of 929 adolescents (64% girls, mean age = 15), varying in urbanization level and educational level, participated in this study. Use of the chatbot was objectively tracked through server registrations (e.g., frequency and duration of conversations with the chatbot, the number and topics of queries), and a web-based questionnaire was used to evaluate the chatbot (e.g., the perception of anonymity, conciseness, ease of use, fun, quality and quantity of information, and speed) and to compare it with information lines and search engines. The chatbot reached high school attendees in general and not only adolescents with previous experience related to sex, drugs, or alcohol; this is promising from an informed decision-making point of view. Frequency (M = 11) and duration of conversations (3:57 minutes) was high and the chatbot was evaluated positively, especially in comparison with information lines and search engines. The use of chatbots within the field of health promotion has a large potential to reach a varied group of adolescents and to provide them with answers to their questions related to sex, drugs, and alcohol. Copyright © 2011 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  13. Clean-room robot implementation

    International Nuclear Information System (INIS)

    Comeau, J.L.

    1982-01-01

    A robot has been incorporated in a clean room operation in which vacuum tube parts are cleaned just prior to final assembly with a 60 lb/in 2 blast of argon gas. The robot is programmed to pick up the parts, manipulate/rotate them as necessary in the jet pattern and deposit them in a tray precleaned by the robot. A carefully studied implementation plan was followed in the procurement, installation, modification and programming of the robot facility. An unusual configuration of one tube part required a unique gripper design. A study indicated that the tube parts processed by the robot are 12% cleaner than those manually cleaned by an experienced operator

  14. Improvement of main control room

    International Nuclear Information System (INIS)

    Chae, Sung Ki; Ham, Chang Sik; Kwon, Ki Chun

    1991-07-01

    Information display system, advanced alarm system and fiber optical communication system were developed to improve the main control room in nuclear power plant. Establishing the new hierachical information structure of plant operation data, plant overview status board(POSB) and digital indicator(DI) were designed and manufactured. The prototype advanced alarm system which employed the new alarm logics and algorithm compared with the conventional alarm system were developed and its effectiveness was proved. Optical communication system which has multi-drop feature and capability of upgrading to large-scale system by using BITBUS communication protocol which is proven technology, were developed. Reliability of that system was enhanced by using distributed control. (Author)

  15. Thermal plumes in ventilated rooms

    DEFF Research Database (Denmark)

    Kofoed, Peter; Nielsen, Peter V.

    1990-01-01

    The design of a displacement ventilation system involves determination of the flow rate in the thermal plumes. The flow rate in the plumes and the vertical temperature gradient influence each other, and they are influenced by many factors. This paper shows some descriptions of these effects. Free...... above a point heat source cannot be used. This is caused either by the way of generating the plume including a long intermediate region or by the environmental conditions where vertical temperature gradients are present. The flow has a larger angle of spread and the entrainment factor is greather than...... turbulent plumes from different heated bodies are investigated. The measurements have taken place in a full-scale test room where the vertical temperature gradient have been changed. The velocity and the temperature distribution in the plume are measured. Large scale plume axis wandering is taken...

  16. Room acoustics for the aged.

    Science.gov (United States)

    Plomp, R; Duquesnoy, A J

    1980-12-01

    This article deals with the combined effects of noise and reverberation on the speech-reception threshold for sentences. It is based on a series of current investigations on: (1) the modulation-transfer function as a measure of speech intelligibility in rooms, (2) the applicability of this concept to hearing-impaired persons, and (3) hearing loss for speech in quiet and in noise as a function of age. It is shown that, generally, in auditoria, classrooms, etc. the reverberation time T, acceptable for normal-hearing listeners, has to be reduced to (0.75)DT in order to be acceptable for elderly subjects with a hearing loss of D dB for speech in noise; for listening conditions as in lounges, restaurants, etc. the corresponding value is (0.82)DT.

  17. Shielded room measurements, Final report

    Energy Technology Data Exchange (ETDEWEB)

    Stanton, J.S.

    1949-02-22

    The attenuation of electro-statically and electro-magnetically shielded rooms in the ``E,`` ``R,`` ``I,`` and ``T`` Buildings was measured so that corrective measure could be taken if the attenuation was found to be low. If remedial measures could not be taken, the shortcomings of the rooms would be known. Also, the men making the measurements should oversee construction and correct errors at the time. The work was performed by measuring the attenuation at spot frequencies over the range of from 150 kilocycles to 1280 megacycles with suitable equipment mounted in small rubber-tried trucks. The attenuation was determined by ``before and after`` shielding and/or ``door open and door closed`` measurements after installation of copper shielding. In general, attenuation in the frequency range of approximately 10 to 150 mc. was good and was of the order expected. At frequencies in the range of 150 mc. to 1280 mc., the attenuation curve was more erratic; that is, at certain frequencies a severe loss of attenuation was noted, while at others, the attenuation was very good. This was mainly due to poor or faulty seals around doors and pass windows. These poor seals existed in the ``T,`` ``E,`` and ``I`` Buildings because the doors were fitted improperly and somewhat inferior material was used. By experience from these difficulties, both causes were corrected in the ``R`` Building, which resulted in the improvement of the very high frequency (v.h.f.) range in this building. In some specific cases, however, the results were about the same. For the range of frequencies below approximately 10 mc., the attenuation, in almost all cases, gradually decreased as the frequency decreased and reached a minimum at .3 to 1.0 mc. This loss of attenuation was attributed to multiple grounding caused by moisture in the insulating timbers and will gradually decrease as the wood dries out.

  18. From Baltic rooms to conference rooms: my jouney with data

    Science.gov (United States)

    Kozlowski, W. A.

    2015-12-01

    From time spent in murky, mosquito-filled mangrove swamps searching for fiddler crabs, to being transported off ships in webbed "man-baskets" on inky-black winter mornings to sample sea ice, to teaching rooms full of students the benefits of information organization, the wonders of science have long shaped my career path. Regardless of surroundings, the driving factor has always been a desire to learn new skills, then try to figure out how to use them to make work easier or more efficient for myself and hopefully others. Somewhere along the way, I've switched from doing it primarily for my "own" research projects, to a focus on helping others with theirs. Like many in this field, my route to a career in data science has influenced how I do my work. Along the way I've carried skills with me but also learned a few things that have made my journey both practical and fun. In this presentation, I'll discuss a few key factors that contribute to my current efforts as a data curation specialist in a research library, including communication (translation of "library" concepts to "science" concepts and vice versa), flexibility (ability to accomodate ideas, pace and values of those I'm working with), and prioritization (learning to balance what's valuable to researchers with principles important to libraries, curators, repositories, archives and other groups with which I interact).

  19. ID THEFT IN CYBERSPACE

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2014-05-01

    Full Text Available Obtaining personal data, identification data, including data which allow the use of a electronic payment instrument, or any other data generated in the context of one person’s activities in the social, economic or financial life, without its consent or by deceit, if this occurs in computer systems or through electronic means of communications, should be considered as a crime and punished accordingly.

  20. Hooked on Cyberspace

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Chinese psychologists outline criteria for Internet addiction Day after day you are glued to your computer screen.You cannot get enough of online games,net shop-ping or cyber surfing.Your social life dete-riorates,and so does your health.Chancesare that you are addicted to the Internet and you need counseling.