WorldWideScience

Sample records for cyberspace chat rooms

  1. CONVERSATIONS -- AND NEGOTIATED INTERACTION -- IN TEXT AND VOICE CHAT ROOMS

    Directory of Open Access Journals (Sweden)

    Kevin Jepson

    2005-09-01

    Full Text Available Despite the expanded use of the Internet for language learning and practice, little attention if any has been given to the quality of interaction among English L2 speakers in conversational text or voice chat rooms. This study explored the patterns of repair moves in synchronous non-native speaker (NNS text chat rooms in comparison to voice chat rooms on the Internet. The following questions were posed: (a Which types of repair moves occur in text and voice chats; and (b what are the differences, if any, between the repair moves in text chats and voice chats when time is held constant? Repair moves made by anonymous NNSs in 10, 5-minute, synchronous chat room sessions (5 text-chat sessions, 5 voice-chat sessions were counted and analyzed using chi-square with alpha set at .05. Significant differences were found between the higher number of total repair moves made in voice chats and the smaller number in text chats. Qualitative data analysis showed that repair work in voice chats was often pronunciation-related. The study includes discussion that may affect teachers' and learners' considerations of the value of NNS chat room interaction for second language development.

  2. Opinions of Female Juvenile Delinquents about Their Interactions in Chat Rooms

    Science.gov (United States)

    Sanger, Dixie; Long, Amie; Ritzman, Mitzi; Stofer, Keri; Davis, Candy

    2004-01-01

    The purpose of this study was to survey the opinions of 62 adolescent females residing in a correctional facility about their use of the Internet to participate in chat room conversations. Findings indicated that 54 of 62 girls (87.09%), with a mean age of 16.72 years, participated in chat room interactions. Most (n = 47) interacted in chat rooms…

  3. Second Language Socialization in a Bilingual Chat Room: Global and Local Considerations

    OpenAIRE

    Wan Shun Eva Lam

    2004-01-01

    This paper considers how global practices of English on the Internet intersect with local practices of English in the territorial or national sphere in constructing the language experiences of immigrant learners. Using a multi-contextual approach to language socialization, this paper examines the social and discursive practices in a Chinese/English bilingual chat room and how this Internet chat room provides an additional context of language socialization for two teenage Chinese immigrants in...

  4. LANGUAGE AWARENESS IN AN INTERNET CHAT ROOM

    Directory of Open Access Journals (Sweden)

    Leszek Szymański

    2013-10-01

    Full Text Available When communicating on the Internet, the participants, so to say, mingle two traditional modes of communication: writing and speech. The phenomenon appears to be most noticeable in chat room interactions. This suggestion is based on the fact that users try to behave as though they are engaged in a spoken act of communication, though the actual medium of communication employs written language forms. Therefore, Internet users need to know what conventions to employ and how to perform such actions in order to express the desired meanings, all with the aim of driving the interaction as close as possible to speech. Such implementations of certain language-related customs require a specific kind of language awareness from the users. This concept, plus the applied conventions, constitute the essence of this article. The discussion begins with an introduction to the research problem, in this case the intentional utilization by Internet chat participants of the graphic mode of communication in order to express their desired meanings. Second, the reader becomes acquainted with the terminology used in the paper, which includes: language awareness, (Internet chat, and (language corpus. Moreover, the source of the studied language material—a corpus of Internet chats—is presented. The said description additionally includes the informants’ characteristics, as well as the topicality of their conversations. The further sections of the paper discus the application of selected non-normative spelling conventions and word-formation processes, with the support of examples taken from the corpus. Based on the discussion, an attempt is made to indicate which features comprise certain values to the participants of Internet chats.

  5. Observations of Chat Room Conversations on the Internet: Implications for Educators Addressing the Needs of Female Adolescents

    Science.gov (United States)

    Sanger, Dixie; Ritzman, Mitzi; LaCost, Barbara; Stofer, Keri; Long, Amie; Grady, Marilyn

    2005-01-01

    This qualitative study explored the meanings of chat room conversations through observations of teenagers using the Internet. Adolescent girls were a focus because of their shaky sense of self. Participants in ten chat rooms included 534 individuals. Six themes, emerging from analyzing 2526 utterances [descriptive statements], included (a)…

  6. Constructing Sexuality and Identity in an Online Teen Chat Room

    Science.gov (United States)

    Subrahmanyam, K.; Greenfield, P. M.; Tynes, B.

    2004-01-01

    In this article, we propose that adolescents' online interactions are both a literal and a metaphoric screen for representing major adolescent developmental issues, such as sexuality and identity. Because of the public nature of Internet chat rooms, they provide an open window into the expression of adolescent concerns. Our study utilizes this…

  7. Signal Detection using ICA: Application to Chat Room Topic Spotting

    DEFF Research Database (Denmark)

    Kolenda, Thomas; Hansen, Lars Kai; Larsen, Jan

    2001-01-01

    signals with weak a priori assumptions in multimedia contexts. ICA of real world data is typically performed without knowledge of the number of non-trivial independent components, hence, it is of interest to test hypotheses concerning the number of components or simply to test whether a given set...... can detect meaningful context structures in a chat room log file....

  8. A Technology User's Bill of Rights: Lessons Learned in Chat Rooms

    Science.gov (United States)

    Norton-Meier, Lori A.

    2004-01-01

    For the past five years, the author has spent time talking with, interviewing, interacting with, and investigating language with adolescent females in chat rooms while they engage in synchronous talk. The discussion often centers on their interest in pop culture--music, movies, television, books, games, and anything else that is worthy of…

  9. "Floating signifiers": Negotiating the meaning of national in Montenegro, at the Internet chat room Café del Montenegro

    Directory of Open Access Journals (Sweden)

    Čarna Brković

    2016-03-01

    Full Text Available The paper represents the analysis of the narratives that deal with the sentiment of national belonging in Montenegro within the chat room Café del Montenegro. The practice of the Internet chat room users is perceived as cultural engagement – „practicing" the State and the emotion of national identification of its own kind. By writing, arguing, negotiating the meaning of the state and nation an abundance of different and broken knowledge’s are created- many histories, geographies, ethics and politics are offered. On the one hand, these directly undermines, jeopardizes and questions the power of the State narrative, hitherto negotiating the nation, the State, authentic devotion, simultaneously manufacturing the state-nation as a reality. The result of mutual correspondence in the chat room is persistent negotiation of the meaning of national categories in Montenegro over the years.

  10. Ostracism via virtual chat room-Effects on basic needs, anger and pain.

    Directory of Open Access Journals (Sweden)

    Ana Paula Gonçalves Donate

    Full Text Available Ostracism is characterized by a social pain provoked by being excluded and ignored. In order to address the effects of social ostracism in virtual non-physical interactions, we developed a more realistic paradigm as an alternative to Cyberball and assessed its effects on participant's expression of basic social needs, emotional experience and painful feeling. The chat room consisted of controlled social dialogue interactions between participants and two other (confederate chat room partners. Exclusion was manipulated by varying the number of messages a participant received (15% and 33% in exclusion and inclusion, respectively. Analysis of participant (N = 54 responses revealed that exclusion induced a lower experience of basic-need states and greater anger, compared with included participants. In addition, excluded participants reported higher levels of two specific self-pain feelings, namely tortured and hurt. Our findings suggest that this procedure is effective in inducing social ostracism in a realistic and yet highly controlled experimental procedure.

  11. Second Language Socialization in a Bilingual Chat Room: Global and Local Considerations

    Directory of Open Access Journals (Sweden)

    Wan Shun Eva Lam

    2004-09-01

    Full Text Available This paper considers how global practices of English on the Internet intersect with local practices of English in the territorial or national sphere in constructing the language experiences of immigrant learners. Using a multi-contextual approach to language socialization, this paper examines the social and discursive practices in a Chinese/English bilingual chat room and how this Internet chat room provides an additional context of language socialization for two teenage Chinese immigrants in the US. Analysis of discourse, interview, and observational data reveals that a mixed-code variety of English is adopted and developed among the focal youth and their peers around the globe to construct their relationships as bilingual speakers of English and Cantonese. This language variety served to create a collective ethnic identity for these young people and allowed the girls to assume a new identity in speaking English that doesn't follow the social categories of English-speaking Americans versus Cantonese-speaking Chinese in their local American context. This paper makes the case for studying how people navigate across contexts of socialization in the locality of the nation-state and the virtual environments of the Internet to articulate new ways of using English.

  12. How useful are bounded online chat rooms as a source of pastoral support in a sixth-form college?

    OpenAIRE

    Richards, Catherine

    2009-01-01

    Since the introduction of chat technology there has been resistance within education to fully engage with it partly due to policy making that has left teachers disempowered (UCLAN 2002:66). Unlike other innovative technologies, its use has been limited. Pastoral support has developed significantly in education but in some instances, like chat rooms, has been viewed with scepticism. One reason for this scepticism may be that a clear measurable link between support and achievement is not easily...

  13. Improving Automated Lexical and Discourse Analysis of Online Chat Dialog

    Science.gov (United States)

    2007-09-01

    chatbots ”. Chatbots are automated user software independent of the chat room system that assist human participants, provide entertainment to the chat...both the chat room system and chatbots as well as information provided by the system and chatbots were often preceded by either the token “.” or...personal chatbots . Finally, we also classified chatbot responses as system dialog acts. The Yes/No Question chat dialog act is simply a question that

  14. Deutsch, Doyc or Doitsch? Chatters as Languagers--The Case of a German-Turkish Chat Room

    Science.gov (United States)

    Hinnenkamp, Volker

    2008-01-01

    The paper looks at the process of online-languaging of adolescents with a migratory and ethnic Turkish background in a diasporic chat room. The multiple resources and voices used are analysed. One particular example is looked at more thoroughly to illustrate the process of languaging and how it is legitimised by the chatters themselves. Finally,…

  15. Promotional Chat on the Internet

    OpenAIRE

    Dina Mayzlin

    2006-01-01

    Chat rooms, recommendation sites, and customer review sections allow consumers to overcome geographic boundaries and to communicate based on mutual interests. However, marketers also have incentives to supply promotional chat or reviews in order to influence the consumers' evaluation of their products. Moreover, firms can disguise their promotion as consumer recommendations due to the anonymity afforded by online communities. We explore this new setting where advertising and word of mouth bec...

  16. US Strategy for Cyberspace

    National Research Council Canada - National Science Library

    Veazie, Arnold

    2003-01-01

    .... This strategic research paper analyzes the President's National Strategy to Secure Cyberspace to determine whether it effectively provides solutions for securing cyberspace. It concludes by proposing an alternative strategy for securing cyberspace.

  17. Department of Homeland Security Policy for Defense of Cyberspace

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2003-01-01

    .... A closer look at commercial enterprises includes web browsing, chat rooms, e-mail, e-commerce, overhauls of business practices and organizations, telecommunication operations, and management of power...

  18. Cyberspace regulation: cesurist and traditionalists

    Directory of Open Access Journals (Sweden)

    Lino Santos

    2015-05-01

    Full Text Available In the amazing Code and Other Laws of Cyberspace, Professor L. Lessig writes "that something fundamental has changed" with cyberspace with regard to the state's ability to enforce the law. On the one hand, the structure and characteristics of cyberspace pose some difficulties related to jurisdiction and the choice of applicable law. On the other, it raises questions about the very concept of sovereignty as we know it. This paper examines the arguments of those who advocate a regulation of cyberspace on the edges of state sovereignty or within a new concept of sovereignty and capacity to enforce the law, and the arguments of those who reject this exceptional treatment of cyberspace.

  19. THE CYBERSPACE IN THE CONTINUED CLINICAL BIOCHEMISTRY EDUCATION

    Directory of Open Access Journals (Sweden)

    J.M. Martins

    2008-05-01

    Full Text Available The cybernetic spaces simulate the real world with interactive multimedia. This work  has been applied since January, 2007 on the curricular student’s apprenticeship at high school and graduation, in the site “bioq.educacao.biz/ULAB-HC-UFPE”. It has been developed to provide continuity to the technical-scientific learning of students and professionals, and also to improve their human social relations on the  labour  environment.  It’s comprises a virtual space, destined to communication and collective building of knowledge on the clinical biochemistry.   It’s about an interactive environment which allows the users registered as coordinator professor (professional  or the scientist student (trainee,  unlimited access to  posting contents (classes, texts, presentations, animations, consultations, non-synchronic discussions (on orkut, forums, e-mail and synchronic discussions (on chats, videoconferences. After a few live tutorials  about new  input in this environment, and the use of the new learning tool,  the collective building of knowledge on cyberspace begins. As a trainee’s program task, the scientist student would have to build a space of his own, under guidance and supervision of the coordinator teachers.  The cyberspace efficiency was evaluated from reports collected in February, 2008: the adherence to this  work was satisfactory, regarding this period, with 68 registered users, 870 accesses and 52 contents available on the several sections of the virtual laboratory. Our work is still being applied, and new adhesions are  happening everyday. We intend to amplify this cyber environment in order to make it a  permanent  continued education site on the health area.  From interest contracts and common knowledge,  the technological interfaces constitute an interaction, in which everyone is a potential author.  Keywords: Cyberspace, online biochemistry education, continued education.

  20. Experiencing the use of a chat room in EFL teaching in a public school

    Directory of Open Access Journals (Sweden)

    Hélvio Frank de Oliveira

    2013-03-01

    Full Text Available The technological aids available in public schools may be used during teaching experiences through methods and methodologies which provide the student an extensive network of opportunities to (reconfigure their way of building knowledge in a foreign language, in order to reflect on their own learning approach. From this perspective, beyond the reflection and desire to use these tools, an autonomous and active attitude by the student is essential in order to use significant environments with on-line activities. An experience was conducted with high school first graders at a public school in a country town of the State of Goiás, aiming at identifying and analyzing the possibilities for the use of the foreign language (English by employing Omegle.com chat tool. This is  a free random chat that allows people from all over the world to interact in several languages, Twenty-one participants used the chat to interact in English with several people from different places in of the world. The data include chat dialogues as well as others collected by means of questionnaires, a researcher journal and classroom observation notes. Results show that the experience, which was inedited in this context of investigation, was developed with enthusiasm by the participants who, through the chat, improved their communication in an independent way.

  1. Entrepreneurship in Cyberspace: What Do We Know?

    Directory of Open Access Journals (Sweden)

    Mindaugas Kiškis

    2013-08-01

    Full Text Available Purpose – The purpose of the paper is to analyze the specififific features of entrepreneurship in cyberspace compared to basic models of entrepreneurship.Design/methodology/approach – Systemic, teleological, deontological and hermeneutic analysis, limited case studies.Findings – Conclusions are drawn on new qualities of entrepreneurship in cyberspace and a novel approach needed to study and understand it.Research limitations/implications – The paper represents work in progress and surveys a rapidly developing field. Case studies mentioned in the paper are limited with respect to the scope of the paper and are only instrumental for illustrating different aspects of entrepreneurship in cyberspace.Practical implications – The paper presents the theoretical framework for further study of the entrepreneurship in cyberspace, as well as basic material for classroom use. Further research of the entrepreneurship in cyberspace as a distinct social phenomenon is envisaged.Originality/Value – Over the last two decades ICTs, and especially cyberspace technologies, have significantly modified the start of new businesses and entrepreneurial processes. Although not dependent on technological breakthroughs, the cyberspace has multiple direct effects on new products and services, which are at the focus of this article. Direct and indirect effects of cyberspace on the start of the businesses are analyzed, along with the advanced transformation business models in cyberspace and novel value creation approach. The paper is among the first studies of entrepreneurship in cyberspace as a distinct social phenomenon. No similar studies have been undertaken in the Baltics before, while the US and European management studies have been limited to specific case studies, without presenting a general theoretical framework.Research type: The paper presents conceptual considerations on entrepreneurship in cyberspace, as well as limited case studies on specific

  2. From pen pals to chat rooms: the impact of social media on Middle Eastern Society.

    Science.gov (United States)

    Hatfield, Elaine; Rapson, Richard L

    2015-01-01

    In this article, we will discuss what is known about a surprisingly popular phenomenon in the Middle East-the use of social media to communicate. We will begin with a discussion of what "social media" sites are (sites such as Facebook, Your Middle East, YouTube, Flickr, Muslima.com, chat rooms, and instant messaging) and point out how common they are in the Middle East. Next, we will discuss the reasons why men and women are currently using Internet and social media. Finally, we will discuss what impact social media have had on politics, political dissent, education, and men's and women's relationships-and the impact they might be expected to have in future years. Finally, we will focus on the impact of such media on men's and women's relationships-including cross-gender friendships, romantic relationships, and sexual relationships.

  3. Kinas kapabiliteter i cyberspace

    DEFF Research Database (Denmark)

    Hjortdal, Magnus

    Briefet præsenterer tre årsager til at stater anvender deres evner i cyberspace på en offensiv måde, og viser at cyberspace er – og vil blive ved med at være – et afgørende element i Kinas strategi for opstigningen i det internationale system. De tre årsager er: 1) afskrækkelse via infiltration, ...

  4. CYBERSPACE: TERRITORY OF CONTEMPORARY LIFE

    Directory of Open Access Journals (Sweden)

    D. E. Dobrinskaya

    2018-01-01

    Full Text Available The development of wireless technologies and digital infrastructure has radically changed the relationships of individuals with their habitat and with each other. Instead of boundaries and separation, researchers increasingly describe the modern world, using concepts of network, connectivity and flow. The article presents theoretical positions within the framework of the sociological analysis of cyberspace as a special type of space emerging as a result of the development of information and communication technologies. The specifics of different approaches to the definition of cyberspace in the context of the description of the time-space distantiation as one of the key characteristic of modern society in which network structures have a decisive influence are considered. The paper concludes that, despite the large number of studies devoted to the issues of cyberspace, the interpretation of this concept is highly ambiguous. The technological basis for the design of cyberspace, as well as the understanding that any space is socially constructed, allows us to consider cyberspace in the perspective of studying its physical, social and informational aspects. This new type of space, characteristic of the networked societies of the 21st century, has a number of features that point to its virtuality, network nature of functioning, multidimensionality, nonlinearity, variability, the ability to be a public and private space and the basis for constructing a networked identity.

  5. Cyberspace: A Selected Bibliography

    Science.gov (United States)

    2013-05-01

    Implications of the Private Sector’s Role in Cyber Conflict." Texas International Law Journal 47, no. 3 (Summer 2012): 617-640. ProQuest Lucas, George R...Cyberspace." Proceedings: United States Naval Institute 137, no. 2 (February 2011): 32-37. ProQuest Lin, Herbert . "Escalation Dynamics and Conflict...Harold Hongju. "International Law in Cyberspace." USCYBERCOM [United States Cyber Command] Inter-Agency Legal Conference, Ft. Meade , MD, September 18

  6. Become Jefferson in cyberspace

    Directory of Open Access Journals (Sweden)

    Ryszard Tadeusiewicz

    2010-01-01

    Full Text Available Very newly defined, but fast developing area of e-learning practice, is now known and available for everybody. Therefore it not need more explorers. Most of fundamental facts and properties are discovered and practical “colonization” of such area is already done. But the new area of practical activities of many e-learning specialists need now rules and regulations. Therefore we not need new Columbus of Cyberspace, but Jefferson of Cyberspace is necessary just now!

  7. From Internet User to Cyberspace Citizen.

    Science.gov (United States)

    Wakabayashi, Ippei

    1997-01-01

    Discusses social and cultural challenges that Internet technology raises. Highlights include preserving the freedom in cyberspace, the information distribution scheme of the Internet, two-way interactivity, search engines as marketing tools, the insecurity of cyberspace, online safety rules for children, educating children to "walk…

  8. Sacred Sky and Cyberspace

    Science.gov (United States)

    Clynes, F.

    2011-06-01

    The concept of the sacred world beyond the stars found expression in the works of Plato, into Gnosticism and was incorporated into Christianity where medieval images of the cosmos pictured the heavenly domain as beyond the stars. Today cyberspace literature abounds with descriptions of a transmundane space, a great Beyond. This talk looks at current views of cyberspace and asks if they are a re-packaging of the age-old concept of a sacred sky in a secular and technological format?

  9. [Clinical application of M-CHAT and CHAT-23 for autism screening].

    Science.gov (United States)

    Ren, Shuang; Ma, Hong-Wei; Hu, Man; Wang, Li-Bo; Wang, Lin; Li, Fang; Song, Ying; Tan, Ying-Hua

    2012-12-01

    To analyze and compare Modified Checklist for Autism in Toddlers (M-CHAT) and Checklist for Autism in Toddlers-23 (CHAT-23) in terms of clinical applicability, and to provide a basis for the understanding of early specific clinical manifestations of children with autism. A total of 350 children aged 18-36 months who visited the Department of Developmental Pediatrics of Shengjing Hospital of China Medical University were enrolled as subjects. Of the 350 children, 284 who had not been previously diagnosed with autism were screened according to the two checklists. Sixty-eight confirmed cases of autism (including two of the 284 screening subjects diagnosed with autism) were assigned to the autism group, and 278 of the 284 screening subjects (except six children diagnosed with autism, mental retardation or cerebral palsy) were assigned to the control group. The two groups were compared with respect to the positive rate for each item in the checklists. The efficacy of the M-CHAT and CHAT-23 assessment criteria was evaluated by comparative analysis. The autism group showed the highest positive rate for Item 9. There were significant differences between the two groups in terms of the positive rates for all items except Item 16 (PCHAT showed the lowest rate of missed diagnosis (0%); when the assessment criterion was that autism was confirmed if there were positive results for at least 6 of a total of 23 items, CHAT-23 showed the lowest rate of misdiagnosis (1.77%). The specificity of M-CHAT is lower than that of CHAT-23 (P0.05). CHAT-23 is more suitable than M-CHAT for clinical autism screening due to higher specificity, as well as having the advantages of low cost, easy completion,high efficiency and easy result judgment.

  10. Technical Evaluation Reports 15. Chat and Instant Messaging Systems (synchronous: Report 3/ 3

    Directory of Open Access Journals (Sweden)

    Brian Ludwig

    2002-10-01

    Full Text Available [Previous reviews of chat and IM systems are presented in Reports 6 and 14 in this series.]A further set of four text-based instant messaging (IM products was evaluated: AT&T Anywhere, Parachat, Sonork, and Yahoo Messenger, all available at no cost. Yahoo Messenger was judged to be the most effective of the three products for use by distance education (DE teachers and students, being compatible with most common operating systems and accommodating up to 50 chat room participants. Yahoo Messenger also possesses integrated audio and video capabilities. AT&T Anywhere is an efficient product, which supports Windows-based operating systems only. Parachat (Basic version is a basic, browser accessed chat board without instant messaging (IM capabilities.

  11. Modelling Hegemonic Power Transition in Cyberspace

    Directory of Open Access Journals (Sweden)

    Dmitry Brizhinev

    2018-01-01

    Full Text Available Cyberspace is the newest domain of conflict and cooperation between states. In cyberspace, as in all other domains, land, sea, air, and space, these interactions often lead to the emergence of hegemons which are characterised by their predominant influence over global world order and all other states. We examined the emergence and collapse of hegemons in a modelled cyberspace world through the notions of power transition and power diffusion. We used Repast Simphony to construct a simple agent-based model (ABM of a system of states interacting both competitively and cooperatively in this world. Our simple model parsimoniously captures the character of the real international system of states through simple parameters of wealth and power determining the outcome of attack or cooperation amongst pairwise interacting states. We found hegemons of global world order emerged in cyberspace as they do in the other traditional domains from models with these few parameters. And we found that hegemons, contrary to traditional understanding, are not exceptional states but merely occupy the tail of a continuous distribution of power and lifetimes. We also found that hegemony in the system depends on two perhaps unexpected parameters: the difficulty of acquiring power as wealth increases and the amount of cooperation between states. And as a consequence, we argue that cyberspace, as a power-diffuse domain where cooperation is easier than elsewhere, is less suited to the kind of hegemony we see in the traditional domains of state interaction.

  12. Von Neuromancer zu Second Life. Raumsimulationen im Cyberspace

    Directory of Open Access Journals (Sweden)

    Krämer, Steffen

    2011-07-01

    Full Text Available In his novel Neuromancer, first published in 1984, the US-american author William Gibson coined the term cyberspace for the virtual reality generated by computers. On the basis of an etymological analysis this term can be interpreted as the traditional relation between helmsman and space. In the medium of sci-fi-literature and sci-fi-film this phenomenon of cyberspace changed rapidly between 1980 and today. In early examples, for instance in the film Tron produced in 1982, the virtual figures act in a disintegrated space without any destination or orientation. In later examples, for instance in the film Matrix produced in 1999, the cyberspace becomes a substitute world for a dark, chaotic or destructive vision of reality. Contemporary forms of cyberspace, as visualized in the 3D-online-city Second Life, are in contrast used for financial activities and symbolize the hard world of economic policy. This development of cyberspace can be seen either as an evolutionary process or a dichotomy primary defined by different facets of space simulation in virtual reality.

  13. Contemporary Ghost Stories: Cyberspace in Fiction for Children and Young Adults

    Science.gov (United States)

    Harris, Marla

    2005-01-01

    This essay identifies a genre of popular fiction for children and young adults, prevalent in the 1990s and continuing into the early twenty-first century, that incorporates computers and the internet, e-mails and chat rooms, into its plots. However, along with a focus on technology, this fiction frequently features the supernatural. So, too,…

  14. Avatar, Identitas dalam Cyberspace

    Directory of Open Access Journals (Sweden)

    Maria Nala Damayanti

    2013-01-01

    Full Text Available Human dependence on technology will have implications for a new culture of communication. Culture is related to the person behind the presence of elements of verbal or visual communication through internet media. Communication established via the Internet, known as cyberspace, allows the presence of a person in a variety of virtual identities. These identities emerge through verbal and visual appearances. They have names and shapes but can be present in any kind of form, commonly called avatars. The identity of a person can be represented by a number of different avatars capable of having more than one party at the same time. Communication that exists in cyberspace exceed time and space. The presence of these identities clearly indicates a relationship model that has a specific purpose. It could be a model of social relations that promote friendship, excitement, a sense of play, a critical mind or with other purposes. But the presence of such virtual identity cannot simply be equated with human beings as their personal identity in the real world, because in cyberspace, identity is plural and fluid. It can even be made with a hidden agenda.

  15. Pigs in cyberspace

    Science.gov (United States)

    Moravec, Hans

    1993-01-01

    Exploration and colonization of the universe awaits, but Earth-adapted biological humans are ill-equipped to respond to the challenge. Machines have gone farther and seen more, limited though they presently are by insect-like behavior inflexibility. As they become smarter over the coming decades, space will be theirs. Organizations of robots of ever increasing intelligence and sensory and motor ability will expand and transform what they occupy, working with matter, space and time. As they grow, a smaller and smaller fraction of their territory will be undeveloped frontier. Competitive success will depend more and more on using already available matter and space in ever more refined and useful forms. The process, analogous to the miniaturization that makes today's computers a trillion times more powerful than the mechanical calculators of the past, will gradually transform all activity from grossly physical homesteading of raw nature, to minimum-energy quantum transactions of computation. The final frontier will be urbanized, ultimately into an arena where every bit of activity is a meaningful computation: the inhabited portion of the universe will be transformed into a cyberspace. Because it will use resources more efficiently, a mature cyberspace of the distant future will be effectively much bigger than the present physical universe. While only an infinitesimal fraction of existing matter and space is doing interesting work, in a well developed cyberspace every bit will be part of a relevant computation or storing a useful datum. Over time, more compact and faster ways of using space and matter will be invented, and used to restructure the cyberspace, effectively increasing the amount of computational spacetime per unit of physical spacetime. Computational speed-ups will affect the subjective experience of entities in the cyberspace in a paradoxical way. At first glimpse, there is no subjective effect, because everything, inside and outside the individual

  16. The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects: Power Projection through Cyberspace

    Science.gov (United States)

    2016-06-14

    in theory . Offensive cyberspace operations have the potential to provide these types of power- projecting effects in the battlespace, but how can...approach to allow for the maturation of command relationships, authorities, and buildup of operational capacity. In the direct support model...send cyber- space liaisons to the air component to integrate joint cyberspace operations. A major step in the center’s maturation process is

  17. RFID-based Electronic Identity Security Cloud Platform in Cyberspace

    OpenAIRE

    Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai

    2012-01-01

    With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...

  18. The ethics of deception in cyberspace

    OpenAIRE

    Rowe, Neil C.

    2008-01-01

    This paper appeared in the Handbook of Research on Technoethics, ed. R. Luppicini, Hershey, PA: Information Science Reference, 2008. We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as spam, phishing, spyware, deceptive commercial software, and dishonest games. We next examine deception used in attacks on comput...

  19. Staffing for Cyberspace Operations: Summary of Analysis

    Science.gov (United States)

    2016-08-01

    military-unique knowledge or skills required; (2) military incumbency is required by law, Executive Order, treaty or international agreement (e.g., DPH...civilian employment . 1 Thomas H. Barth et al., “(U) Staffing for Cyberspace Operations,” IDA Paper P...DoD cyberspace strategies, doctrine, and current concepts of operation and employment for CMF. Additionally, the team conducted interviews with

  20. Chat It Up: Backchanneling to Promote Reflective Practice among In-Service Teachers

    Science.gov (United States)

    Kassner, Laura D.; Cassada, Kate M.

    2017-01-01

    In a graduate education course geared toward developing reflective teaching practice in in-service teachers, backchannels, in the form of chat rooms, were employed in small groups to facilitate peer feedback during viewings of video recorded instruction. This study examined the nature and quality of peer feedback exchanged in the digital medium…

  1. Forensic challenges for handling incidents and crime in cyberspace

    CSIR Research Space (South Africa)

    Taute, B

    2009-10-01

    Full Text Available their goals. Who will bring law and order to cyberspace? This presentation focuses on the technology challenges for dealing with digital forensics and the time factor in dealing with incidents and crime in cyberspace....

  2. Office Hours as You Like Them: Integrating Real-Time Chats into the Course Media Mix.

    Science.gov (United States)

    McKeage, Kim

    2001-01-01

    Reports on one professor's use of integrated synchronous electronic office hours (i.e., a "chat room") with asynchronous course conferencing (i.e., email) in a class on introductory marketing. Describes its uses, limitations, benefits, potential problems, and results from a student survey. (EV)

  3. Makt og avmakt i cyberspace: hvordan styre det digitale rom?

    Directory of Open Access Journals (Sweden)

    Lilly Pijnenburg Muller

    2016-12-01

    Full Text Available Et sikkert cyberspace er nødvendig for en fungerende samfunnsstruktur, økonomisk, politisk og sosialt. Med samfunnets økende avhengighet av cyberspace for å kunne fungere normalt, har sikringen av cyberspace blitt stadig viktigere. For å løse sikkerhetsutfordringene knyttet til utviklingen av cyberspace har stater søkt støtte fra private aktører gjennom såkalte multistakeholder-initiativer. Med slike initiativer mener man en åpen form for samarbeid mellom interessenter, basert på en idé om likeverdige partnere. Stater iverksetter slike initiativer ut fra en tanke om at et samarbeid mellom private og offentlige aktører gir den beste formen for styring og sikring av aktiviteter i cyberspace. Implementeringen foregår imidlertid uten at de nødvendige forutsetningene for at en slik styringsform skal fungere er til stede. Selv om mange i dagens akademiske debatt stiller spørsmål ved om disse initiativene fungerer, er det få som har stilt spørsmål ved hvordan cybersikkerhet kan utøves i praksis. Dette fører til at man overser det sentrale spørsmålet om hvordan maktdynamikken mellom offentlig og privat sektor fungerer med henblikk på sikkerhet i cyberspace. Denne artikkelen diskuterer hvorvidt multistakeholder-initiativene faktisk fungerer som en kontroll- og styringsmekanisme i cyberspace. Ved å se nærmere på offentlig-privat samarbeid om cybersikkerhet i Norge er hensikten å gi en bedre forståelse av årsakene til at multistakeholder-initiativer ofte ikke fungerer i praksis.

  4. In Pursuit of an Aptitude Test for Potential Cyberspace Warriors

    National Research Council Canada - National Science Library

    Smith, Tiffany S

    2007-01-01

    The Air Force has officially assumed the cyberspace mission. To perform this mission well, it is important to employ personnel who have the necessary skill sets and motivation to work in a cyberspace environment...

  5. Improvements of cyberspace and effects to the battlefield

    Science.gov (United States)

    Gedıklı, Münir

    2014-06-01

    Wars previously being executed at land and sea have also become applicable in air and space due to the advancements of aircraft and satellite systems. Rapid improvements in information technologies have triggered the concept of cyberspace which is considered as the fifth dimension of war. While transferring information quickly from physical area to electronic/digital area, cyberspace has caused to emerge a lot of threats and methods like cyber-attack, cyber-crime, cyber war which are spreading too rapidly. Individuals, institutions and establishments have begun to take their own cyber security precautions to cope with these threats. This study gives information about the concepts and advances on cyberspace in order to raise comprehensive awareness. The study also focuses on the effects of these improvements in the battlefield, and analyzes them.

  6. Cyberspace at the Operational Level: Warfighting In All Five Domains

    Science.gov (United States)

    2016-05-13

    exclusive , cyberspace capabilities and connections are everywhere. While innovation in space is possible through the imagination of a relative few, the...senior leaders rush to integrate and consolidate stovepiped cyberspace expertise scattered across DoD, our potential adversaries have the luxury of

  7. For a cyberspace information policy: advances, perspectives and challenges

    Directory of Open Access Journals (Sweden)

    Jakeline Amparo Villota Enríquez

    2017-06-01

    Full Text Available This article is to describe and analyze the policies of information in cyberspace, both global and regionally, in different directions: programs, resolutions, and projects from the information sector. Likewise, an overview of the same is presented in the Latin American and Caribbean region. Through documentary analysis of the literature related to the topic, the article is based on a review of literature raised from scientific materials such as: books, thesis papers, dissertations, texts on internet sites and articles, resolutions, projects and decrees dealing with the same topic. As a result, cyberspace is conceptualized and its elements, dimensions, strategies and variations are characterized, by analyzing the information from cyberspace policy, based on the global stage to relate it, finally, to the region of Latin America and the Caribbean, with the idea of better addressing the problems. The cyberspace information policy experience a minor and slow process in the field of cyber war; resulting from the obstacle of international cooperation defined by the disparate ambitions of the State or region.

  8. Acid chat: gestural interface design

    OpenAIRE

    Gökhan, Ali Oytun; Gokhan, Ali Oytun

    2005-01-01

    AcidChat is an experimental design project that aims to create an innovative computer software interface for Internet chat software using today's well known technologies; Adobe Photoshop, Macromedia Freehand and digital photography. The aim of the project is to create new understandings of interface and it's usage, by adding new conceptions to chat based interfaces which creates a totally new look at the computer software and application. One of the key features is to add a gestural approach ...

  9. Flying and Fighting in Cyberspace

    National Research Council Canada - National Science Library

    Convertino, II, Sebastian M; DeMattei, Lou Anne; Knierim, Tammy M

    2007-01-01

    .... It applies the Air Force Concept Development framework to examine cyberspace as a newly designated warfare domain and proposes cyber capabilities as well as effects that the Air Force should develop...

  10. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  11. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  12. The Performance of Cyberspace

    DEFF Research Database (Denmark)

    Barbatsis, Gretchen; Feagan, Michael; Hansen, Kenneth

    1999-01-01

    This phenomenological enquiry into cyberspace examines the concept of space and metaphor, explaining ‘cyber’space as a figurative term and a figurative space, as something projected as a shared mental concept. Reception theory is used to theorize this figurative space as an ideational object...

  13. Veiligheid in cyberspace

    OpenAIRE

    WODC

    2012-01-01

    In dit themanummer worden actuele ontwikkelingen rond 'digitale piraterij' nader geanalyseerd. Daarnaast is er aandacht voor cybercrimewetgeving, voor de vorderingen bij de politie bij de bestrijding van cybercrime en voor fraude met identiteit en internettransacties. Het lekken van geheimen in cyberspace komt eveneens aan bod, waarbij wordt teruggeblikt op de WikiLeaks-affaire. Voorts is er een artikel gewijd aan het fenomeen cyberwar.

  14. Tutorial chat: a case study of synchronous communication in a learning environment

    Directory of Open Access Journals (Sweden)

    Malcolm Rutter

    2006-12-01

    Full Text Available This case study describes the use of a web-based synchronous chat application, run during computing tutorials. The chat room was moderated by a paid demonstrator, who assisted and encouraged students whenever possible. Most of the discussion was banter, which acted as a lubricant for relevant factual communication. Students were permitted a degree of anonymity, but nevertheless learned to treat the facility in a useful manner. The application and its mode of employment were found to be both motivating and supportive. Use was evaluated by questionnaire and an analysis of student input. As a result of the experience, it is suggested that abuse will certainly occur and may be minimised by technical improvements, but never eliminated. The Rogerian approach adopted was found to have transferred emphasis from teaching a topic to the learning of generic skills.

  15. Development of a Client-Server Chat Application

    OpenAIRE

    Malmberg, Lasse

    2017-01-01

    The goal of the Bachelor’s thesis was to develop a simple client-server chat application. The focus was on the development process and the underlying technologies that were utilized in the development of the chat application. The chat application was developed with the C++ programming language and the SDL software development library. The development environment consisted primarily of command-line operated tools. The thesis resulted in a functional chat application. The program is a d...

  16. Extending Prior Posts in Dyadic Online Text Chat

    Science.gov (United States)

    Tudini, Vincenza

    2015-01-01

    This study explores whether chat users are able to extend prior, apparently completed posts in the dyadic online text chat context. Dyadic text chat has a unique turn-taking system, and most chat softwares do not permit users to monitor one another's written messages-in-progress. This is likely to impact on their use of online extensions as an…

  17. NOTICING AND TEXT-BASED CHAT

    Directory of Open Access Journals (Sweden)

    Chun Lai

    2006-09-01

    Full Text Available This study examined the capacity of text-based online chat to promote learners’ noticing of their problematic language productions and of the interactional feedback from their interlocutors. In this study, twelve ESL learners formed six mixed-proficiency dyads. The same dyads worked on two spot-the-difference tasks, one via online chat and the other through face-to-face conversation. Stimulated recall sessions were held subsequently to identify instances of noticing. It was found that text-based online chat promotes noticing more than face-to-face conversations, especially in terms of learners’ noticing of their own linguistic mistakes.

  18. Warfighting in Cyberspace

    Science.gov (United States)

    2007-01-01

    Kurz- weil in his 2001 essay, dictate that we must move quickly.10 If one examines the advances in Internet and computer technology in just the last...the cyberspace environment is contained within two subsets of information operations (IO): computer network operations and electronic warfare (EW... computers , information systems, and networks.”8 This mission state- ment recognizes the primacy of the strike or attack aspects of computer network attacks

  19. Media Literacy and Information Behavior in Cyberspace

    Directory of Open Access Journals (Sweden)

    Seyed Ali Akbar Famil Rouhany

    2017-10-01

    Full Text Available The aim of this study was to investigate media literacy and information behavior in cyberspace. This was a review and library research based study. With the advent of the digital age and the increasing spread of the World Wide Web, popularity and general acceptance of virtual social networks in the world today, the need to examine media literacy and information behavior in human life is important. Approach to media literacy which is the subset of information literacy in cyberspace has become necessary and obvious. As an individual, higher level of literacy can lead to choosing better content and search for information to find useful content. By assessing the theoretical basis and different approaches in a virtual environment, it can be concluded that having literacy skills and information behavior, the period of time spent in cyberspace and the number of readers have increased, leading to the ability to criticize and interpret the social, political and economic information and identify useful information. Consequently, by acquiring new technologies and increasing the adaptability in viewpoints and improving skills within researchers, the context for developing new ideas will be provided.

  20. Chat Bots Implementation and User Engagement

    OpenAIRE

    Hosseini, Sajjad

    2017-01-01

    The purpose of this project was to study the concept of Chat Bots, and to analyse its importance and place in today’s communication platforms. The goal of the project was to build a Chat Bot prototypically for Metropolia University of Applied Sciences helpdesk on a messaging platform, which would replace the traditional way of reserv- ing old devices for purchase sold at Metropolia’s helpdesk in different times throughout the year. The chat bot was developed using a high-level implementat...

  1. A Tactical Framework for Cyberspace Situational Awareness

    Science.gov (United States)

    2010-06-01

    Command & Control 1. VOIP Telephone 2. Internet Chat 3. Web App ( TBMCS ) 4. Email 5. Web App (PEX) 6. Database (CAMS) 7. Database (ARMS) 8...Database (LogMod) 9. Resource (WWW) 10. Application (PFPS) Mission Planning 1. Application (PFPS) 2. Email 3. Web App ( TBMCS ) 4. Internet Chat...1. Web App (PEX) 2. Database (ARMS) 3. Web App ( TBMCS ) 4. Email 5. Database (CAMS) 6. VOIP Telephone 7. Application (PFPS) 8. Internet Chat 9

  2. Sexual Abuse Images in Cyberspace: Expanding the Ecology of the Child

    Science.gov (United States)

    Martin, Jennifer; Alaggia, Ramona

    2013-01-01

    Cyberspace has added a new dimension to the ecology of children made the subjects of sexual abuse images distributed online. These images cannot be permanently removed and can continue to circulate in cyberspace forever. A review of the current literature suggests that helping professionals are not consistently aware of or do not probe…

  3. Analisis Web Accessibility Pada Perancangan Website Chat

    OpenAIRE

    Yushan, Subhansyah

    2011-01-01

    Chat is a popular application where one user can communicate to another using text. Nowadays in the internet, many websites provide chat applications, such as Instant Messaging, Yahoo Messanger, and etc. Website which provides chat application cannot accomodate users who have any dissabilities, especialy users with visual disabilities. This situation makes communication process more complicated, where accessibility level of sending and receiving information has became low. The ...

  4. Analýza historie komunikace xChat

    OpenAIRE

    RYNEŠ, Pavel

    2012-01-01

    Based on the needs of forensic examination of communication history of various communication programs for the police authorities and forensic experts is needed documentation chat history of "xChat". This is especially necessary to analyze the data files containing records of contacts and communication history at a local PC. Based on the contact information to analyze the possibility of obtaining identification information from the portal xChat

  5. Cyberspace and Critical Information Infrastructures

    Directory of Open Access Journals (Sweden)

    Dan COLESNIUC

    2013-01-01

    Full Text Available Every economy of an advanced nation relies on information systems and interconnected networks, thus in order to ensure the prosperity of a nation, making cyberspace a secure place becomes as crucial as securing society. Cyber security means ensuring the safety of this cyberspace from threats which can take different forms, such as stealing secret information from national companies and government institutions, attacking infrastructure vital for the functioning of the nation or attacking the privacy of the single citizen. The critical information infrastructure (CII represents the indispensable "nervous system", that allow modern societies to work and live. Besides, without it, there would be no distribution of energy, no services like banking or finance, no air traffic control and so on. But at the same time, in the development process of CII, security was never considered a top priority and for this reason they are subject to a high risk in relation to the organized crime.

  6. Cyberspace violence against girls and adolescent females.

    Science.gov (United States)

    Chisholm, June F

    2006-11-01

    Children and adolescents today are the first generation raised in a society in which technological literacy is essential for effective citizenship in the 21st century. With many more youth using digital technologies for educational and recreational purposes, there has been an increase in social problems in cyberspace, exposing them to different forms of cyberviolence. This article gives an overview of the developments in cyberspace, describes different types of cyberviolence, and focuses on cyberbullying among girls and adolescent females as both victims and perpetrators of cyberbullying. At-risk online activities among girls and adolescent females as well as strategies to promote cybersafety are presented. Current research and future directions for research are reviewed.

  7. WeChat impact on social and economic in China

    OpenAIRE

    Rong, Mengmeng

    2016-01-01

    The purpose of the thesis is to analyse WeChat in China. On the hand, this thesis analyses the impact of WeChat on social and economic based on its features. WeChat changes Chinese way of life. Customers are directly taken part in economic activities in WeChat. On the other hand, this thesis is intended to help entrepreneurs and organizations to know more about WeChat B2B and B2C model in China. The thesis will be helpful for those entrepreneurs who are going to enter Chinese market. Th...

  8. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  9. Cyber Flag: A Realistic Cyberspace Training Construct

    National Research Council Canada - National Science Library

    Hansen, Andrew P

    2008-01-01

    .... Red Flag provides dominant training within the air domain and now with the evolution of cyberspace, a comprehensive training environment is necessary to meet this growing and broadening threat...

  10. Multimedia chatting system on LAN

    Science.gov (United States)

    Lung, Chu-Sheng; Wang, Chun-Chao; Lee, Ching-Long; Huang, Huang-Chen

    1994-04-01

    An interactive system designed for talking via multimedia presentation with other parties on Ethernet- LAN is proposed. Our Multimedia Chatting System will take several media services into consideration, like still image, text, pen writing, voice, and slow-motion video, to integrate a practical chatting system. The prototyping subsystem to implement the above idea is currently under development using NETBIOS communication interface and Microsoft Windows environment.

  11. The Chat Is Coming from inside the House: An Analysis of Perceived Chat Behavior and Reality

    Science.gov (United States)

    Berndt-Morris, Elizabeth; Minnis, Samantha M.

    2014-01-01

    When looking for ways to improve library services, we considered what data sources were readily available to us and how we could harvest and use this data. We investigated three years of chat reference statistics at Central Michigan University, a large research institution, to gain a better understanding of our patrons' chat behavior. We then…

  12. Options of system integrated environment modelling in the predicated dynamic cyberspace

    International Nuclear Information System (INIS)

    Janková, Martina; Dvořák, Jiří

    2015-01-01

    In this article there are briefly mentioned some selected options of contemporary conception of cybernetic system models in the corresponding and possible integratable environment with modern system dynamics thinking and all this in the cyberspace of possible projecting of predicted system characteristics. The key to new capabilities of system integration modelling in the considered cyberspace is mainly the ability to improve the environment and the system integration options, all this with the aim of modern control in the hierarchically arranged dynamic cyberspace, e.g. in the currently desired electronic business with information. The aim of this article is to assess generally the trends in the use of modern modelling methods considering the cybernetics applications verified in practice, modern concept of project management and also the potential integration of artificial intelligence in the new projecting and project management of integratable and intelligent models, e.g. with the optimal structures and adaptable behaviour.The article results from the solution of a specific research partial task at the faculty; especially the moments proving that the new economics will be based more and more on information, knowledge system defined cyberspace of modern management, are stressed in the text

  13. Options of system integrated environment modelling in the predicated dynamic cyberspace

    Energy Technology Data Exchange (ETDEWEB)

    Janková, Martina; Dvořák, Jiří [Institute of Informatics, Faculty of Business and Management, Brno University of Technology, Brno (Czech Republic)

    2015-03-10

    In this article there are briefly mentioned some selected options of contemporary conception of cybernetic system models in the corresponding and possible integratable environment with modern system dynamics thinking and all this in the cyberspace of possible projecting of predicted system characteristics. The key to new capabilities of system integration modelling in the considered cyberspace is mainly the ability to improve the environment and the system integration options, all this with the aim of modern control in the hierarchically arranged dynamic cyberspace, e.g. in the currently desired electronic business with information. The aim of this article is to assess generally the trends in the use of modern modelling methods considering the cybernetics applications verified in practice, modern concept of project management and also the potential integration of artificial intelligence in the new projecting and project management of integratable and intelligent models, e.g. with the optimal structures and adaptable behaviour.The article results from the solution of a specific research partial task at the faculty; especially the moments proving that the new economics will be based more and more on information, knowledge system defined cyberspace of modern management, are stressed in the text.

  14. 76 FR 29195 - National Strategy for Trusted Identities in Cyberspace (NSTIC) Governance Workshop

    Science.gov (United States)

    2011-05-20

    ... Trusted Identities in Cyberspace (NSTIC) Governance Workshop AGENCY: National Institute of Standards... for Trusted Identities in Cyberspace (NSTIC) Governance Workshop to be held on Thursday, June 9, 2011... discuss various governance models to administer the process for policy and standards adoption for the...

  15. Comparative loneliness of users versus nonusers of online chatting.

    Science.gov (United States)

    Ong, Chorng-Shyong; Chang, Shu-Chen; Wang, Chih-Chien

    2011-01-01

    Online chatting is an important component of improving interpersonal relationships online, but it may reduce participants' communication time with family members. We conducted a study of the relationship between participants' intent to engage in online chatting and three dimensions of loneliness: social, familial, and romantic. This study was designed to show the effect of online chatting on each of these three dimensions of loneliness. The participants in the study were 709 students at two universities in Taiwan who were classified on the basis of whether or not they had ever engaged in online chatting. Of the participants, 651 (91.82%) fully completed the questionnaires that served as the study instruments and were included in data analysis. The study found that individuals who had participated in online chatting exhibited greater familial loneliness than those who had not because the time spent in online chatting reduced the time spent in familial relationships. Social loneliness was related to the quality of Internet relationships rather than to the time spent online. Individuals who participated in online chatting had less romantic loneliness because of a greater ease of maintaining romantic relationships online. We conclude that online chatting can reduce social loneliness through high-quality Internet relationships but may exacerbate familial loneliness.

  16. Entrepreneurship in Cyberspace Research of Mru Management and Administration Students

    Directory of Open Access Journals (Sweden)

    Mindaugas Kiškis

    2012-07-01

    Full Text Available Youth entrepreneurship is one of the European Union’s public policy priorities. Student entrepreneurship in this context is particularly important as academic studies at the university shall develop an entrepreneurial personality.Student entrepreneurship is not widely examined in Lithuanian scholarly work. This phenomenon tends to be analyzed in the context of development of general entrepreneurial skills. There is no prior work on student entrepreneurship in cyberspace—most notably there is no empirical research in this area. This situation emphasizes the need for empirical studies of student entrepreneurship.The purpose of this article is to analyze student entrepreneurship in cyberspace status quo at Mykolas Romeris University (MRU. This research objective was chosen in order to determine the current status and to enable a reference for further research of student entrepreneurship in cyberspace. Additional practical goals are adopted, namely—based on the results of this study, to identify development guidelines for study programs as well as the “Entrepreneurship in Cyberspace” discipline taught in a postgraduate studies at MRU in order to focus them on the needs of future postgraduate students.The research was conducted using a survey method. Before the research three hypotheses were proposed:1 MRU students are more enterprising than the statistical resident of Lithuania;2 student entrepreneurship education in Management and Administration studies is inadequate;3 students need specialized knowledge of entrepreneurship in cyberspace.After the analysis of gathered data from students all three hypotheses were confirmed: students are more entrepreneurial then the general population of Lithuania, entrepreneurial education at the university is insufficient and there is a need among students for specialized knowledge in the field of e-business.Follow-up study of the negative dynamics of student entrepreneurship should be carried out in the

  17. Joint Force Cyberspace Component Command: Establishing Cyberspace Operations Unity of Effort for the Joint Force Commander

    Science.gov (United States)

    2015-05-01

    strengths, the United States and DoD knowledge of cyberspace combined with the United States technical prowess and spirit of entrepreneurship provide us...notes that Warden did not find it acceptable to target citizens directly with anything but psychological means. The fifth and final ring is the

  18. Securing Cyberspace: Towards an Agenda for Research and Practice

    Directory of Open Access Journals (Sweden)

    Renaud Levesque

    2015-11-01

    Full Text Available In this article, we seek to identify the important challenges preventing security in cyberspace and to identify the key questions that nations should set out to answer to play a leading role in securing cyberspace. An important assertion is that the challenge of securing cyberspace transcends the abilities of any single entity and requires a radical shift in our approach in how: i research is conducted, ii cybersecurity researchers are educated, iii new defendable systems are developed, and iv effective defensive countermeasures are deployed. Our response draws upon extensive source material and our personal experiences as cybersecurity professionals contributing to the establishment of the VENUS Cybersecurity Corporation, a not-for-profit corporation that aims to make Canada a global leader in cybersecurity. We view the challenge to be global and transdisciplinary in nature and this article to be of relevance world-wide to senior decision makers, policy makers, managers, educators, strategists, futurists, scientists, technologists, and others interested in shaping the online world of the future.

  19. Understanding Southern Influence in Cyberspace Security and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... it a matter of national security - is perhaps the most important force shaping global communications today. ... The project will provide evidence of the benefits of openness in cyberspace that can inform international ... Training materials.

  20. Open of chat rooms for discussing geological disposal issues and review of adequate approaches for offering the information using the internet

    International Nuclear Information System (INIS)

    Takizawa, Masayuki; Ito, Toshikazu; Yabuta, Naohiro; Yoshizawa, Nobuaki; Tsunoda, Hirokazu

    2001-03-01

    JNC is doing publicity work to let the technical reliability for geological disposal of high-level radioactive waste (HLW) comprehended widely. But the information about geological disposal of HLW itself and its technology has not been spread and recognized. It has been required to offer the opportunity to discuss the geological disposal and its technology as our own issue. Recently the internet, which has such characteristics as two-way, instant and open communication means, has become used on business and for pleasure commonly. So the opportunity for discussing the topics related to geological disposal of HLW has been offered on the internet web site so-called 'Internet Forum' by JNC since fiscal year 1999. 'Internet Forum' or an assembly of chat rooms is being run on the web server which is not operated by JNC in order to provide the place where discussion on the issue can be done as fairly and objectively as possible. In this report, the results of Internet Forum in fiscal year 2000 comparing with that in fiscal year 1999 were shown and the adequate approaches of operating 'Internet Forum' and offering the information about geological disposal of HLW were reviewed. (author)

  1. Mind in the Gap Between Neural and Social Networks - Cyberspace and Virtual Reality in Psychiatry and Healthcare.

    Science.gov (United States)

    Šendula-Jengić, Vesna; Šendula-Pavelić, Martina; Hodak, Jelena

    2016-06-01

    In terms of health and healthcare cyberspace and virtual reality can be used differently and for different purposes and consequently create different outcomes. The three main areas which we shall discuss here are: 1) cyberspace as provider of health information and self-help resources, since the anonymity cyberspace provides is particularly important in the highly stigmatized field of psychiatry where a large number of people never seek professional help, which in turn negatively affects not only the person in question, but the family and ultimately the society (work efficiency, disability-adjusted life year - DALY, etc.), 2) cyberspace and virtual reality (VR) as cause of psychopathology, starting from violent behaviour, to addictive behaviour and other, 3) and finally cyberspace and VR as providers of efficient professional therapy in the field of psychiatry.

  2. Expanding Suicide Crisis Services to Text and Chat.

    Science.gov (United States)

    Predmore, Zachary; Ramchand, Rajeev; Ayer, Lynsay; Kotzias, Virginia; Engel, Charles; Ebener, Patricia; Kemp, Janet E; Karras, Elizabeth; Haas, Gretchen L

    2017-07-01

    Crisis support services have historically been offered by phone-based suicide prevention hotlines, but are increasingly becoming available through alternative modalities, including Internet chat and text messaging. To better understand differences in the use of phone and chat/text services. We conducted semistructured interviews with call responders at the Veterans Crisis Line who utilize multimodal methods to respond to veterans in crisis. Responders indicated that veterans may access the chat/text service primarily for reasons that included a desire for anonymity and possible inability to use the phone. Responders were divided on whether callers and chatters presented with different issues or risk of suicide; however, they suggested that veterans frequently use chat/text to make their first contact with mental health services. We spoke with call responders, not the veterans themselves. Additionally, as this is qualitative research, applicability to other settings may be limited. While new platforms offer promise, participants also indicated that chat services can supplement phone lines, but not replace them.

  3. Optimizing Reasonableness, Critical Thinking, and Cyberspace

    Science.gov (United States)

    Ikuenobe, Polycarp

    2003-01-01

    In this paper, the author argues that the quantity, superabundance of information, easy availability, and quick access to information in cyberspace may engender critical thinking and the optimization of reasonableness. This point is different from, but presupposes, the commonplace view that critical thinking abilities, criteria, processes, and…

  4. Satisfaction with Online Commercial Group Chat: The Influence of Perceived Technology Attributes, Chat Group Characteristics, and Advisor Communication Style

    NARCIS (Netherlands)

    van Dolen, W.M.; Dabholkar, P.A.; de Ruyter, J.C.

    2007-01-01

    This study examines online commercial group chat from a structuration theory perspective. The findings support the influence of perceived technology attributes (control, enjoyment, reliability, speed, and ease of use) and chat group characteristics (group involvement, similarity, and receptivity) on

  5. Video Chat with Multiple Cameras

    OpenAIRE

    MacCormick, John

    2012-01-01

    The dominant paradigm for video chat employs a single camera at each end of the conversation, but some conversations can be greatly enhanced by using multiple cameras at one or both ends. This paper provides the first rigorous investigation of multi-camera video chat, concentrating especially on the ability of users to switch between views at either end of the conversation. A user study of 23 individuals analyzes the advantages and disadvantages of permitting a user to switch between views at...

  6. RTP/I Payload Type Definition for Chat Tools

    OpenAIRE

    Vogel, Jürgen

    2001-01-01

    This document specifies an application-level protocol (i.e., payload type) for chat tools using the Real Time Protocol for Distributed Interactive Media (RTP/I). RTP/I defines a standardized framing for the transmission of application data and provides protocol mechanisms that are universally needed for the class of distributed interactive media. A chat tool provides an instant messaging service among an arbitrary number of users. This documents specifies how to employ a chat tool with RTP/I ...

  7. End-to-End Privacy Protection for Facebook Mobile Chat based on AES with Multi-Layered MD5

    Directory of Open Access Journals (Sweden)

    Wibisono Sukmo Wardhono

    2018-01-01

    Full Text Available As social media environments become more interactive and amount of users grown tremendously, privacy is a matter of increasing concern. When personal data become a commodity, social media company can share users data to another party such as government. Facebook, inc is one of the social media company that frequently asked for user’s data. Although this private data request mechanism through a formal and valid legal process, it still undermine the fundamental right to information privacy. In This Case, social media users need protection against privacy violation from social media platform provider itself.  Private chat is the most favorite feature of a social media. Inside a chat room, user can share their private information contents. Cryptography is one of data protection methods that can be used to hides private communication data from unauthorized parties. In our study, we proposed a system that can encrypt chatting content based on AES and multi-layered MD5 to ensure social media users have privacy protection against social media company that use user informations as a commodity. In addition, this system can make users convenience to share their private information through social media platform.

  8. Cyberspace Math Models

    Science.gov (United States)

    2013-06-01

    Poster ) Visualizing Complexity of Sunspot Cycles Via Wavelet Transform, the Summer Intern Research Day, August 3, WPAFB 2010, Dayton, OH. 11...AOL- Spam-and-chat- dont -mix/2100-1032_3-1024010.html. [7] B. Krebs, “Yahoo! Messenger network overrun by bots,” Washington Post web article, Aug 2007

  9. Introduction to the WeChat marketing advantages and development prospects

    OpenAIRE

    Liang, Yi

    2014-01-01

    WeChat is evolved into a large commercial trading platform, and this can be the further research of this thesis. According to the development of WeChat, the consumers can realize the integration service mode of the commodity inquiry, the choose and buy, experience, interactive, online ordering and paying, as long as consumers by WeChat platform.. The objective of this thesis was to introduce the advantages of WeChat and its development prospects. The main research is focus on the analysis...

  10. Investigating L2 Performance in Text Chat

    Science.gov (United States)

    Sauro, Shannon; Smith, Bryan

    2010-01-01

    This study examines the linguistic complexity and lexical diversity of both overt and covert L2 output produced during synchronous written computer-mediated communication, also referred to as chat. Video enhanced chatscripts produced by university learners of German (N = 23) engaged in dyadic task-based chat interaction were coded and analyzed for…

  11. NOTICING HYBRID RECASTS IN TEXT CHAT

    Directory of Open Access Journals (Sweden)

    Mark J. Oliver

    2016-12-01

    Full Text Available This study examined ten EFL learners’ noticing of the corrective nature of a form of text-based SCMC (text chat feedback that combined a recast of a grammatical error with metalinguistic information. The feedback, termed a hybrid recast, was provided by a native-speaker interlocutor during two text chat activities: a spot-the-difference and picture-ordering task. Data was collected in two ways: analysis of task-based dyadic text chat interaction in which uptake was used as an indicator of learner noticing, and a post-task questionnaire containing questions that identified evidence of learner noticing. Interaction analysis showed that learners responded to almost two thirds of the hybrid recasts with uptake. In addition, every learner provided evidence that they had correctly perceived at least some of the hybrid recasts as corrective in their post-task questionnaire responses.

  12. Will online chat help alleviate mood loneliness?

    Science.gov (United States)

    Hu, Mu

    2009-04-01

    The present study examines the relationship between social Internet use and loneliness and reviews the studies about this topic from both social psychology and computer-mediated communication literature, as a response to the call for interdisciplinary research from scholars in these two areas. Two hundred thirty-four people participated in both the survey testing trait loneliness and a 5-condition (face-to-face chatting, instant message chatting, watching video, writing assignments, and "do nothing") experiment. Participants reported increase of mood loneliness after chatting online. The level of mood loneliness after online chat was higher than that in face-to-face communication. For people with high trait loneliness, the mood loneliness increase in the computer-mediated communication condition was significantly higher than in the face-to-face communication condition. The author of the current study hopes to help clarify the mixed research findings in previous social Internet use literature about this topic and reminds communication researchers of the need to explore the constructs included in "psychological well-being" in terms of their nature, mechanism, causes, consequences, and furthermore, how they are related to communication.

  13. Chat reference service in medical libraries: part 2--Trends in medical school libraries.

    Science.gov (United States)

    Dee, Cheryl R

    2003-01-01

    An increasing number of medical school libraries offer chat service to provide immediate, high quality information at the time and point of need to students, faculty, staff, and health care professionals. Part 2 of Chat Reference Service in Medical Libraries presents a snapshot of the current trends in chat reference service in medical school libraries. In late 2002, 25 (21%) medical school libraries provided chat reference. Trends in chat reference services in medical school libraries were compiled from an exploration of medical school library Web sites and informal correspondence from medical school library personnel. Many medical libraries are actively investigating and planning new chat reference services, while others have decided not to pursue chat reference at this time. Anecdotal comments from medical school library staff provide insights into chat reference service.

  14. Entrepreneurship in Cyberspace Research of Mru Management and Administration Students

    Directory of Open Access Journals (Sweden)

    Mindaugas Kiškis

    2013-01-01

    Full Text Available Youth entrepreneurship is one of the European Union’s public policy priorities. Student entrepreneurship in this context is particularly important as academic studies at the university shall develop an entrepreneurial personality. Student entrepreneurship is not widely examined in Lithuanian scholarly work. This phenomenon tends to be analyzed in the context of development of general entrepreneurial skills. There is no prior work on student entrepreneurship in cyberspace—most notably there is no empirical research in this area. This situation emphasizes the need for empirical studies of student entrepreneurship. The purpose of this article is to analyze student entrepreneurship in cyberspace status quo at Mykolas Romeris University (MRU. This research objective was chosen in order to determine the current status and to enable a reference for further research of student entrepreneurship in cyberspace. Additional practical goals are adopted, namely—based on the results of this study, to identify development guidelines for study programs as well as the “Entrepreneurship in Cyberspace” discipline taught in a postgraduate studies at MRU in order to focus them on the needs of future postgraduate students. The research was conducted using a survey method. Before the research three hypotheses were proposed: 1 MRU students are more enterprising than the statistical resident of Lithuania; 2 student entrepreneurship education in Management and Administration studies is inadequate; 3 students need specialized knowledge of entrepreneurship in cyberspace. After the analysis of gathered data from students all three hypotheses were confirmed: students are more entrepreneurial then the general population of Lithuania, entrepreneurial education at the university is insufficient and there is a need among students for specialized knowledge in the field of e-business. Follow-up study of the negative dynamics of student entrepreneurship should be carried

  15. Peer Interaction in Text Chat: Qualitative Analysis of Chat Transcripts

    Science.gov (United States)

    Golonka, Ewa M.; Tare, Medha; Bonilla, Carrie

    2017-01-01

    Prior research has shown that intermediate-level adult learners of Russian who worked interactively with partners using text chat improved their vocabulary and oral production skills more than students who worked independently (Tare et al., 2014). Drawing on the dataset from Tare et al. (2014), the current study follows up to explore the nature of…

  16. You Are There: No Budget for Travel? Try Video Chat

    Science.gov (United States)

    Langhorst, Eric

    2009-01-01

    The author discusses how he used video chat as an alternative to a physical trip. Any teacher with an Internet hookup and a $30 webcam can connect with anyone in the world using video chat. Programs like Skype Video and the Google Mail's video chat function make it easy and, best of all, are completely free. The author discusses how to get started…

  17. Air Force Cyberspace Technical Center of Excellence (CyTCECR)

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Cyberspace Research (CCR), established in March 2002, conducts defense-focused research at the Master's and PhD levels. The CCR is forward-looking and...

  18. Research on Human Dynamics of Information Release of WeChat Users

    OpenAIRE

    Zhang, Juliang; Zhang, Shengtai; Duo, Fan; Wang, Feifei

    2017-01-01

    The information release behavior of WeChat users is influenced by many factors, and studying the rules of the behavior of users in WeChat can provide theoretical help for the dynamic research of mobile social network users. By crawling WeChat moments information of nine users within 5 years, we used the human behavioral dynamics system to analyze users' behavior. The results show that the information distribution behavior of WeChat users is consistent with the power-law distribution for a cer...

  19. Brain stem hypoplasia associated with Cri-du-Chat syndrome

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Jin Ho; Lee, Ha Young; Lim, Myung Kwan; Kim, Mi Young; Kang, Young Hye; Lee, Kyung Hee; Cho, Soon Gu [Dept. of Radiology, Inha University Hospital, Inha University School of Medicine, Incheon (Korea, Republic of)

    2013-12-15

    Cri-du-Chat syndrome, also called the 5p-syndrome, is a rare genetic abnormality, and only few cases have been reported on its brain MRI findings. We describe the magnetic resonance imaging findings of a 1-year-old girl with Cri-du-Chat syndrome who showed brain stem hypoplasia, particularly in the pons, with normal cerebellum and diffuse hypoplasia of the cerebral hemispheres. We suggest that Cri-du-Chat syndrome chould be suspected in children with brain stem hypoplasia, particularly for those with high-pitched cries.

  20. Spontanschreibung im Chat

    Directory of Open Access Journals (Sweden)

    Burri, Gabriela

    2003-01-01

    Full Text Available In this article spontaneous writing in chat communication is analyzed in two aspects. On one hand, the spelling forms found here show some language change tendencies in the German spoken language. On the other hand, the article tries to describe on which writing conventions these spontaneous spellings are based.

  1. Structure, complexity and cooperation in parallel external chat interactions

    DEFF Research Database (Denmark)

    Grønning, Anette

    2012-01-01

    This article examines structure, complexity and cooperation in external chat interactions at the workplace in which one of the participants is taking part in multiple parallel conversations. The investigation is based on an analysis of nine chat interactions in a work-related context, with partic......This article examines structure, complexity and cooperation in external chat interactions at the workplace in which one of the participants is taking part in multiple parallel conversations. The investigation is based on an analysis of nine chat interactions in a work-related context...... focus is on “turn-taking organisation as the fundamental and generic aspect of interaction organisation” (Drew & Heritage, 1992, p. 25), including the use of turn-taking rules, adjacency pairs, and the importance of pauses. Even though the employee and the union members do not know one another...... and cannot see, hear, or touch one another, it is possible to detect an informal, pleasant tone in their interactions. This challenges the basically asymmetrical relationship between employee and customer, and one can sense a further level of asymmetry. In terms of medium, chat interactions exist via various...

  2. Analisis Kinerja Trafik Video Chatting Pada Sistem Client- Client Dengan Aplikasi Wireshark

    OpenAIRE

    Yuvandra, Rayhan

    2014-01-01

    Teknologi Video chat adalah salah satu media komunikasi yang memberikan kemudahan pengguna untuk dapat melihat wajah lawan bicara dalam chatting dengan menggunakan kamera yang terdapat di notebook atau perangkat komputer. Video chat juga membutuhkan jaringan internet sebagai media transmisinya. Salah satu aplikasi untuk video chat adalah skype. Skype adalah software aplikasi komunikasi suara berbasis IP dengan teknologi P2P ( peer to peer ) melalui internet antara sesama pengguna skype. Pene...

  3. Cyberspace modernization. An interest protocol planning advisory

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); McLane, Victor N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-07-01

    A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internet of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.

  4. “New Weapons” of Ideological and Political Education in Universities—WeChat

    Directory of Open Access Journals (Sweden)

    Wei He

    2014-04-01

    Full Text Available WeChat, a new instant messaging software, has been popularized nowadays. In order for WeChat to have the maximum impact on the ideological and political education areas, we need to have a deep understanding of the characteristics and regulars which attract students in the communication process, and combine WeChat platform with ideological and political education to attract students motivated to learn the content of ideological politics. This article, starting with college students, aims to understand their thinking and use of WeChat, and pertinently use WeChat platform to enhance the attractiveness and effectiveness of ideological and political education.

  5. El chat: la conversación escrita

    OpenAIRE

    Blanco Rodríguez, María José

    2002-01-01

    This study analyses the linguistic characteristics of a new medium of synchronous text-based computer-mediated communication called Chat. This communication and the type of discourse developed exhibit many oral qualities. These qualities of orality are analyzed starting from the conditions that surround the communication act and of the type of discursive activity that is developed, because the chat should be understood as a new communication system, with rules and forms of i...

  6. Fault Detection and Diagnosis System in Process industry Based on Big Data and WeChat

    Directory of Open Access Journals (Sweden)

    Sun Zengqiang

    2017-01-01

    Full Text Available The fault detection and diagnosis information in process industry can be received, anytime and anywhere, based on bigdata and WeChat with mobile phone, which got rid of constraints that can only check Distributed Control System (DCS in the central control room or look over in office. Then, fault detection, diagnosis information sharing can be provided, and what’s more, fault detection alarm range, code and inform time can be personalized. The pressure of managers who worked on process industry can be release with the mobile information system.

  7. Harnessing the Power of Informal Learning: Using WeChat, the Semi-Synchronous Group Chat, to Enhance Spoken Fluency in Chinese Learners

    Science.gov (United States)

    Sadoux, Marion

    2017-01-01

    This research is an exploratory study that seeks to evaluate the potentials of the Chinese app WeChat to enhance the spoken fluency of learners of French in China, who report having limited and insufficient opportunities to practice speaking in their daily life. WeChat is an extremely popular instant messenger facilitating communication through a…

  8. Building Community Through a #pulmcc Twitter Chat to Advocate for Pulmonary, Critical Care, and Sleep.

    Science.gov (United States)

    Carroll, Christopher L; Bruno, Kristi; Ramachandran, Pradeep

    2017-08-01

    Social media sites such as Twitter can significantly enhance education and advocacy efforts. In 2013, the American College of Chest Physicians (CHEST) launched a Twitter chat series using the hashtag #pulmcc to educate and advocate for topics related to pulmonary, critical care, and sleep medicine. To assess the reach of these chats, we analyzed the metrics using Symplur analytics, and compared data from each chat, as well as participant data. Since December 19, 2013, there have been 12 Twitter chats: six have been on critical care-related topics, four have been on pulmonary-/sleep-related topics, and two have been conducted during the CHEST annual meeting on more general topics. During these 1-h Twitter chats, there were a total of 4,212 tweets by 418 participants, resulting in 9,361,519 impressions (ie, views). There were similar numbers of participants and tweets in the three categories of Twitter chats, but there was a significantly greater reach during the more general Twitter chats conducted at the CHEST annual meeting, with 1,596,013 ± 126,472 impressions per chat session at these chats, compared with 739,203 ± 73,109 impressions per chat session during the critical care Twitter chats and 621,965 ± 123,933 impressions per chat session in the pulmonary/sleep chats. Seventy-five participants participated in two or more #pulmcc Twitter chats, and the average percent of return participants in each chat was 30% ± 7%. Most of the return participants were health-care providers. Twitter chats can be a powerful tool for the widespread engagement of a medical audience. Copyright © 2017 American College of Chest Physicians. Published by Elsevier Inc. All rights reserved.

  9. Chat-Bots for People with Parkinson's Disease: Science Fiction or Reality?

    Science.gov (United States)

    Ireland, David; Liddle, Jacki; McBride, Simon; Ding, Hang; Knuepffer, Christina

    2015-01-01

    People with Parkinson's disease are known to have difficulties in language and communication. This paper proposes the use of an artificial conversational agent, commonly known as a chat-bot that runs on a smart-phone device and performs two-way conversation with the user. In this paper, initial work on a Parkinson's disease themed chat-bot that interacts with the user relative to their symptoms is presented. Potential dialogues are provided to illustrate the various roles chat-bots can play in the management of Parkinson's disease. The chat-bot can be used for measuring voice and communication outcomes during the daily life of the user, and for gaining information about challenges encountered. Moreover, it is anticipated that it may also have an educational and support role. The chat-bot is now ready for usability testing with a clinical population.

  10. 76 FR 50719 - Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace...

    Science.gov (United States)

    2011-08-16

    ...-02] Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace... comments regarding the governance structure for the National Strategy for Trusted Identities in Cyberspace... June 14, 2011, the National Institute of Standards and Technology (NIST) announced that it was...

  11. Discourses of cyberspace securitization in Brazil and in the United States

    Directory of Open Access Journals (Sweden)

    LUÍSA CRUZ LOBATO

    2015-12-01

    Full Text Available Abstract This paper uses the framework of the Copenhagen School to understand the process of securitization of cyberspace, exploring how something in such sphere becomes a threat. Seeking to contribute to the debate, this study analyses the securitization discourses of Brazil and of the United States from Hansen and Nissenbaum's (2009 theorization about the existence of a specific sector for cybersecurity. To comprehend the securitization of cyberspace in these terms allows not only to identify distinct levels of securitization, but also to capture the dynamics of cyber threats, distinguishing them from those existent in other sectors, as well as to trace distinctions between tendencies of securitization and militarization.

  12. Analisa Kinerja Jaringan Provider untuk Aplikasi Video Chatting (Studi Kasus di Daerah Marpoyan)

    OpenAIRE

    Danur, Jeri Dwi; ', Febrizal '

    2016-01-01

    Video chat is a communication that allows users to chat and can see the other person's face directly. Video chatting requires a good network to transmit audio and video data in a short time. This paper examines the performance of three mobile network provider (Provider A and Provider B Provider C) in a video chat in the area Marpoyan and the effect of time when doing video chat on the performance of each provider. The method used is the method using packet sniffing software wireshark to see Q...

  13. In Pursuit of an Aptitude Test for Potential Cyberspace Warriors

    National Research Council Canada - National Science Library

    Smith, Tiffany S

    2007-01-01

    .... This thesis attempts to determine the necessary skills and motivations to perform the cyberspace mission and recommends a screening process to select the candidates with the highest probability for success...

  14. Attitudes and emotions through written text: the case of textual deformation in internet chat rooms.

    Directory of Open Access Journals (Sweden)

    Francisco Yus Ramos

    2010-11-01

    Full Text Available Normal 0 21 false false false ES X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Los chats españoles de Internet son visitados por muchos jóvenes que usan el lenguaje de una forma muy creativa (ej. repetición de letras y signos de puntuación. En este artículo se evalúan varias hipótesis sobre el uso de la deformación textual respecto a su eficacia comunicativa. Se trata de comprobar si estas deformaciones favorecen una identificación y evaluación más adecuada de las actitudes (proposicionales o afectivas y emociones de sus autores. Las respuestas a un cuestionario revelan que a pesar de la información adicional que la deformación textual aporta, los lectores no suelen coincidir en la cualidad exacta de estas actitudes y emociones, ni establecen grados de intensidad relacionados con la cantidad de texto tecleada. Sin embargo, y a pesar de estos resultados, la deformación textual parece jugar un papel en la interpretación que finalmente se elige de estos mensajes enviados a los chats.

  15. War in the Information Age: A Primer for Cyberspace Operations in 21st Century Warfare

    Science.gov (United States)

    2010-01-01

    funds transfers ( EFT ). 30 Paralleling the rapid expansion of civilian cyberspace use is the increasing use of cyberspace by modern militaries...company files by using a thumb drive to tap the corporate system. Boeing estimated that the stolen documents would have cost it between $5 billion...tactics and intelligence operations such as collecting data, recruiting members of state security services, and setting up phone taps .‖ 69

  16. Modelo Empírico, Descriptivo y Predictivo Para el Compromiso de Identidad en el Chat en Adolescentes Escolares Chilenos Empirical, Descriptive and Predictive Model for Identity Involvement in Chat use by Chilean School Adolescents

    Directory of Open Access Journals (Sweden)

    María Paz Altuzarra

    2007-11-01

    Full Text Available Se desarrolla un modelo empírico, descriptivo y predictivo de regresión múltiple de las relaciones entre compromiso de identidad en el Chat y salud mental, sexo, curso y tipo de Chat en una muestra de 385 alumnos de ambos sexos, de I, II, III y IV Medio de tres colegios de Santiago de Chile. Se aplicó un cuestionario sobre uso de Internet, Escala de Compromiso de Identidad en el Chat y Cuestionario de Salud Mental en la Edad Juvenil. Se encontró que tanto la salud mental como el tipo de Chat predecían el compromiso de la identidad en el Chat. Se observó un mayor compromiso entre jóvenes mujeres de I y II Medio y que empleaban Chat abierto o mixto.An empirical descriptive and predictive model of multiple regression on the relationships between identity involvement in the Chat and mental health, sex, grade and modality of Chat in a sample of 385 male and female high school students, from Santiago de Chile, is presented. The instruments used were: a questionnaire about Internet usage, an Identity Compromise Scale in the Chat and a Youth Mental Health Scale. Results indicate that both, mental health and type of Chat, predicted compromise of identity in the Chat. It was observed a greater compromise among female teenagers from 9th and 10th grade who used open and mixed Chat.

  17. Uso del chat en el desarrollo de cursos en línea

    DEFF Research Database (Denmark)

    Bregnhøj, Henrik; Zurita, L.

    2006-01-01

    Chat has been used for support to development of environmental courses in a network of universities (ELAC) in Latin America and EU. 12 thematic chats were held on various common learning subjects as themes and 11 course chats focussed specifically on the design of 5 courses. 36 participants parti...

  18. The Value of Chat Reference Services: A Pilot Study

    Science.gov (United States)

    Jacoby, JoAnn; Ward, David; Avery, Susan; Marcyk, Emilia

    2016-01-01

    This article explores student, instructor, and librarian perceptions of chat reference in the context of an introductory composition course. Participants in a mixed-method study responded to an anonymized chat transcript. While student respondents valued speed and efficiency, they were willing to receive instruction and open to questions that…

  19. Kreuz- und Que(erfahrerinnen im Cyberspace. Schöne Neue Welt, revisited Navigators in Cyberspace

    Directory of Open Access Journals (Sweden)

    Verena Kuni

    2003-03-01

    Full Text Available Obgleich sich um die Frage nach einer feministischen Eroberung des Cyberspace in den vergangenen Jahren nicht nur ein breites Feld streitbarer Diskurse gebildet hat, sondern mittlerweile auch eine Reihe markanter Mythen ranken, wird sie sowohl vom Mainstream der akademischen Medientheorie als auch von den Protagonisten der populären Cyberkultur nach wie vor allenfalls als Marginalie verhandelt. Ob Bücher genderspezifische Bildungslücken schließen können, sei einmal dahingestellt. Mit reload. rethinking women + cyberculture haben die Multi-Media-Künstlerin Mary Flanagan und die Gender-Medien-Theoretikerin Austin Booth jedenfalls einen Sammelband vorgelegt, der nicht nur Betriebsblinden und Einäugigen hinreichend Stoff zum Nachlesen und Nachdenken bietet, sondern in seiner Kombination aus feministischer Cyberfiktion und kritischen Essays zu Utopien und Realitäten der zeitgenössischen Cyberkultur spannende Querverbindungen zwischen Theorie und Praxis herzustellen verspricht.In recent years there have been a number of debates and quite a few myths about feminist usage (if not conquest! of cyberspace. Nonetheless, feminist cyber culture continues to be marginalised both within mainstream media theory and within discourses about popular cyber culture. This is about to change: The anthology Reload, edited by multi-media artist Mary Flanagan and gender studies/media studies scholar Austin Booth, offers plenty of food for thought for a wide audience. The different pieces range from feminist cyber fiction to critical essays on utopias and realities of contemporary cyber culture, cleverly connecting theory and practice.

  20. An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services

    OpenAIRE

    Xing, Xinyu; Ahn, Junho; Lee, Wenke; Han, Richard; Mishra, Shivakant

    2012-01-01

    Recently, online video chat services are becoming increasingly popular. While experiencing tremendous growth, online video chat services have also become yet another spamming target. Unlike spam propagated via traditional medium like emails and social networks, we find that spam propagated via online video chat services is able to draw much larger attention from the users. We have conducted several experiments to investigate spam propagation on Chatroulette - the largest online video chat web...

  1. Teacher Twitter Chats: Gender Differences in Participants' Contributions

    Science.gov (United States)

    Kerr, Stacey L.; Schmeichel, Mardi J.

    2018-01-01

    Gender differences in participation were examined across four Twitter chats for social studies teachers. Analyses drawing on mixed methods revealed that while there was parity across most kinds of tweets, participants identified as men were more likely to use the examined Twitter chats to share resources, give advice, boast, promote their own…

  2. Miss Willie and Nora Bonesteel: Teaching in Cyberspace.

    Science.gov (United States)

    Atwell, Nedra Wheeler

    Two of the author's favorite Appalachian women serve as thought mentors to help see the practical and educational opportunities available in cyberspace for meeting the critical shortage of teachers serving the Appalachian women and children of today. In classrooms and homes throughout Appalachia, women and children are logging on to computers to…

  3. Thoughts Invade Us: Lexical Cognition and Cyberspace

    Science.gov (United States)

    2017-06-01

    enables us to learn a language to begin with. In the same way that technology is socially constructed but later exerts influence within a...http://www.stratcom.mil/ Media /Factsheets/Factsheet- View/Article/960492/us-cyber-command-uscybercom/. Wendt, Alexander. Social Theory of...perspective extends a purely social construction of cyberspace, where the domain changes simply as an extension of social dynamics, utility, and

  4. Balancing Cyberspace Promise, Privacy, and Protection: Tracking the Debate.

    Science.gov (United States)

    Metivier-Carreiro, Karen A.; LaFollette, Marcel C.

    1997-01-01

    Examines aspects of cyberspace policy: Internet content and expectations; privacy: medical information and data collected by the government; and the regulation of offensive material: the Communications Decency Act, Internet filters, and the American Library Association's proactive great Web sites for children. Suggests that even "child…

  5. WeChat Addiction Suppresses the Impact of Stressful Life Events on Life Satisfaction.

    Science.gov (United States)

    Li, Bi; Wu, Yan; Jiang, Shengyi; Zhai, Huizhen

    2018-03-01

    The current study examined the influences of stressful life events and WeChat addiction on life satisfaction, and investigated the mediating role of WeChat addiction on the relationship between the two research variables. A total of 463 undergraduates completed self-reported scales for stressful life events, WeChat addiction, and life satisfaction. Structural equation modeling was used to analyze the questionnaire data. The results showed the suppressing effect of WeChat addiction on the negative impact of stressful life events on life satisfaction. Stressful life events affect life satisfaction both directly and indirectly. Stressful life events are positively associated with WeChat addiction, which exerts positive impact on life satisfaction. The contributions of the findings are discussed.

  6. Optical test course teaching practice on WeChat public platform

    Science.gov (United States)

    Fu, Yuegang; Liu, Zhiying

    2017-08-01

    With the development of information technological progress, M-Learning and Micro-learning is becoming more and more popular among learners as a new micro-learning resources. Micro-curriculum is playing a more and more important role in daily learning. The students can create a new way of optical course learning through "WeChat". Under the mutual interaction of two or more parties, the use of "WeChat" can fully arouse the students' interest in learning, make the subjective initiative of students, and achieve the ultimate goal of improving the level of students. In this paper, through the analysis of the current situation of college students using the "WeChat", a new teaching model suitable for "optics" teaching is summarized, and the use of "WeChat" has been infiltrated into the teaching process, using science and technology to assist teaching. Students' interest in autonomous learning.

  7. LibraryH3lp: A New Flexible Chat Reference System

    Directory of Open Access Journals (Sweden)

    Pam Sessoms

    2008-09-01

    Full Text Available LibraryH3lp is an integrated IM and web chat system designed specifically for Virtual Reference services in libraries. The software was designed for, and is currently used by, a night-time chat reference collaboraton between several large academic libraries. LibraryH3lp is designed for the workflow of chat reference, supporting multiple simultaneous operators and routing to queues of operators in a particular service area. It also supports web page embeddable chat 'widgets', as well as simultaneous gateways to multiple IM protocols. This article discusses the motivation for the development of the software, and provides an overview of LibraryH3lp's features and technical architecture. Parts of LibraryH3lp are available as open source. The complete application is available as a low-cost hosted service, and will eventually be available to be licensed for local hosting.

  8. Implicit and Explicit Attitudes towards America in Socio Digital Influence: Trust and Social Identity in Cyberspace

    Science.gov (United States)

    2018-03-16

    AFRL-AFOSR-JP-TR-2018-0024 Implicit and Explicit Attitudes towards America in Socio-Digital Influence: Trust and Social Identity in Cyberspace James...and Explicit Attitudes towards America in Socio-Digital Influence: Trust and Social Identity in Cyberspace 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER...comprehensive survey of personality, values, institutional trust, mass media usage, and political attitudes and ideology (including a comprehensive

  9. Cyberspace in the Curricula: New Legal and Ethical Issues.

    Science.gov (United States)

    Smethers, J. Steven

    1998-01-01

    Finds that most journalism and mass communication programs integrate legal and ethical issues surrounding cyberspace and interactive media into existing courses, especially into ethics and communication law courses, but also into introductory survey courses, communication technology, and reporting classes. Details reasons why some programs do not…

  10. “Just Chatting”: Research Ethics and Cyberspace

    Directory of Open Access Journals (Sweden)

    Ellen Whiteman

    2007-06-01

    Full Text Available Research conducted through computer-mediated communication is challenging traditional definitions of what is ethical research. In this article the author examines the changing role of assent/consent, confidentiality, and participant observation in qualitative research conducted in cyberspace. She concludes that REBs (research ethic boards might be becoming more conservative in their decisions at the very moment that Internet research requires more flexibility and broader ethical definitions.

  11. ANDROID CHATTING APPLICATION BASED ON WI-FI TECHNOLOGY

    OpenAIRE

    Ekata M. Lambture *, Prof. Z.M. Shaikh

    2016-01-01

    As we know that Android operating system is one of the popular operating system for mobile applications.It supports mobile applications such as Chatting based applications,File sharing applications etc. In market thosands of applications are available in which users can send-receive messages,shares the files,send images,audio,video through network connectivity such as 2G,3G,4G. Android chatting application based on wi-fi technology provides same features but using WI-FI(Wireless Fidelity)...

  12. Por que é difícil participar de Chats?

    Directory of Open Access Journals (Sweden)

    Heloísa Collins

    2003-01-01

    Full Text Available O chat é uma ferramenta e um serviço de comunicação síncrona na internet, cuja função educacional apresenta controvérsias nos meios acadêmicos. Possuindo interfaces supostamente intuitivas (salas de bate-papo em web, proporcionam, em tese, um meio fácil de usar e potencialmente rico para fins educacionais. Para testar esse meio, uma sessão de chat foi realizada com fins acadêmicos por estudantes e professores de uma disciplina de pós-graduação. Com seus propósitos aparentemente frustrados, essa sessão foi estudada sob instrumentais teórico-metodológicos diversos, no intuito de analisar, de diferentes ângulos, os obstáculos ao uso educacional do chat e sugerir algumas soluções. Com base nos turnos registrados pela ferramenta, foram analisadas as relações interpessoais e as dificuldades no ritmo da conversação; interações e dificuldades relativas a assimetrias, domínios e desenvolvimento de tópicos; fases da construção de conhecimento, e dificuldades técnico-operacionais. Entre os resultados convergentes das diversas análises, demonstrou-se principalmente o impacto da experiência prévia de uso da ferramenta para o sucesso do uso educacional do chat na evolução dos tópicos, no ritmo da conversação e nos domínios interacionais; também constatou-se o impacto do papel do professor e da experiência prévia nas fases de construção do conhecimento identificadas nos turnos dos alunos. Esses resultados sugerem que, para o chat ser proveitoso do ponto de vista educacional, é necessária uma preparação prévia cuidadosa. Para que a ferramenta possa ser mediadora de aprendizagem, é necessário evitar digressões, manter uma pequena variedade de tópicos e, portanto, um foco mais definido no tema programado para a discussão. Igualmente cuidadosa deve ser a mediação do professor para incentivar as problematizações e as sínteses, além de garantir, mediante o apoio aos turnos dos alunos menos experientes

  13. Online chats: A strategy to enhance learning in large classes

    African Journals Online (AJOL)

    Muntuwenkosi Mtshali

    2015-11-10

    Nov 10, 2015 ... interact with one another via online chats in the process of ... of learning using online chats in Business Management Education. ... results suggested that students' academic performance as measured ... contact in a way that could essentially 'scaffold' .... at the same time, participants had very little time to.

  14. Twitter Chats as a Research Tool: A Study of Young Adult Financial Decisions

    Directory of Open Access Journals (Sweden)

    Barbara O’Neill

    2018-02-01

    Full Text Available Many researchers collect online survey data because it is cost-effective and less time-consuming than traditional research methods. This paper describes Twitter chats as a research tool vis-à-vis two other online research methods: providing links to electronic surveys to respondents and use of commercially available survey panels through vendors with readily available respondents. Similar to a face-to-face focus group, Twitter chats provide a synchronous environment for participants to answer a structured series of questions and to respond to both the chat facilitator and each other. This paper also reports representative responses from a Twitter chat that explored financial decisions of young adults. The chat was sponsored by a multi-state group of land-grant university researchers, in cooperation with WiseBread, a personal finance website targeted to millennials, to recruit respondents for a more extensive month-long online survey about the financial decisions of young adults. The Twitter chat responses suggest that student loans were the top concern of participants, and debt and housing rounded out the top three concerns. The internet, both websites and social media, was the most frequently cited source of financial information. The article concludes with a discussion of lessons learned from the Twitter chat experience and suggestions for professional practice.

  15. Detecting Predatory Behaviour in Online Game Chats

    DEFF Research Database (Denmark)

    Gudnadottir, Elin Rut; Jensen, Alaina K.; Cheong, Yun-Gyung

    This paper describes a machine learning approach to detect sexually predatory behaviour in the massively multiplayer online game for children, MovieStarPlanet. The goal of this work is to take a chat log as an input and outputs its label as either the predatory category or the non......-predatory category. From the raw in-game chat logs provided by MovieStarPlanet, we first prepared three sub datasets via extensive preprocessing. Then, two machine learning algorithms, naive Bayes and Decision Tree, were employed to model the predatory behaviour using different feature sets. Our evaluation has...

  16. Canada and the Challenges of Cyberspace Governance and Security

    Directory of Open Access Journals (Sweden)

    Ron Deibert

    2013-03-01

    Full Text Available When Canada stood with the United States and Britain in refusing to sign on to a new, statecontrolled future for the Internet, at December’s World Conference on Information Technology, it certainly made the federal government appear to be a stalwart champion of Internet freedom. But in reality, Canada’s approach to cyberspace governance and security has, at best, sent mixed signals about our commitment to Internet freedom. At worst, it has actually contributed to increasing on-line censorship and surveillance by the very undemocratic and illiberal regimes that Canada voted against at the conference. Unfortunately this is a dangerous time for Canada to wallow in aimlessness: when it comes to cyberspace governance and security, the momentum is headed in the direction of greater state control. As demographic realities indicate, Internet usage will increasingly belong to the global South and East, where freedom is an unsettled and elusive concept. If Canada truly seeks to guard against the Internet falling captive to the controls sought by repressive regimes, such as those in China and Russia, it will have to offer the world a compelling, competing vision that demonstrates integrity and dedication to genuine Internet freedom. Among other things, that means moving beyond traditional top-down, state-centred models of security, which are a poor fit for a decentralized, global, publicly shared, but largely privately developed, communications network. Imposing conventional, state led policing frameworks on cyberspace — for instance, in the name of fighting cyber crime — only provides legitimacy to regimes abroad when they bring their own state powers to censor Internet communications. It also means thinking more carefully about how much we should tolerate our Canadian technology developers continuing to supply tools of repression to the foreign regimes who seek to dominate their own people. Canada has the potential to take on a leadership role in

  17. Iterative Chat Transcript Analysis: Making Meaning from Existing Data

    Directory of Open Access Journals (Sweden)

    Steven Baumgart

    2016-04-01

    Full Text Available Objective – In order to better contextualize library data about patron satisfaction with reference services, we analyzed an existing corpus of chat transcripts. Having conducted a similar analysis in 2010, we also compared librarian behaviors over time. Methods – Drawing from the library literature, we identified a set of librarian behaviors closely associated with patron satisfaction. These behaviors include listening to and understanding patrons’ needs, inviting patrons to use the service again, and providing instruction or completing a search for patrons. Analysis of the chat transcripts included establishing a coding schema, applying these codes to individual chat transcripts, and analyzing these codes across the corpus of transcripts for frequency and correlation with other codes. The currently presented analysis used chat transcripts from the fall of 2013 and seeks changes in librarian behavior over time in order to gauge the success of establishing best practices and improving training standardization over the last three years. Results – The analysis shows that librarian behaviors have changed over time, pointing to what campus librarians are doing well, and that implementation of best practices at a campus level after the 2010 analysis may have increased these positive behaviors. The analysis also shows opportunities for further standardization and reinforcement of best practices. Conclusion – Qualitative analysis of already-collected data serves as a model for other units and suggests areas for process improvement, including enhanced coder training and code schema design. Further analysis of chat patrons’ questions is also warranted, including investigation of the relationship between subject- and location-specific questions and referrals.

  18. Emotion Chat: A Web Chatroom with Emotion Regulation for E-Learners

    Science.gov (United States)

    Zheng, Deli; Tian, Feng; Liu, Jun; Zheng, Qinghua; Qin, Jiwei

    In order to compensate for lack of emotion communication between teachers and students in e-learning systems, we have designed and implemented the EmotionChat -- a web chatroom with emotion regulation. EmotionChat perceives e-learners' emotional states based on interactive text. And it recommends resources such as music, cartoons, and mottos to an e-learner when it detects negative emotional states. Meanwhile, it recommends emotion regulation cases to the e-learner's listeners and teachers. The result of our initial experiment shows that EmotionChat can recommend valuable emotion regulation policies for e-learners.

  19. Unified underpinning of human mobility in the real world and cyberspace

    Science.gov (United States)

    Zhao, Yi-Ming; Zeng, An; Yan, Xiao-Yong; Wang, Wen-Xu; Lai, Ying-Cheng

    2016-05-01

    Human movements in the real world and in cyberspace affect not only dynamical processes such as epidemic spreading and information diffusion but also social and economical activities such as urban planning and personalized recommendation in online shopping. Despite recent efforts in characterizing and modeling human behaviors in both the real and cyber worlds, the fundamental dynamics underlying human mobility have not been well understood. We develop a minimal, memory-based random walk model in limited space for reproducing, with a single parameter, the key statistical behaviors characterizing human movements in both cases. The model is validated using relatively big data from mobile phone and online commerce, suggesting memory-based random walk dynamics as the unified underpinning for human mobility, regardless of whether it occurs in the real world or in cyberspace.

  20. Electronic Market and Business: Cyberspace vs. Electronic Environment

    Directory of Open Access Journals (Sweden)

    Deniss Ščeulovs

    2013-12-01

    Full Text Available The authors of the article analyze the concept "electronic environment". Having studied a range of academic literature sources and other sources, the authors of the article have drawn a conclusion that the academic writings do not provide a definition of "electronic environment". Furthermore, the various opinions among specialists regarding this concept often differ. Meanwhile, there are several explanations of the term "cyberspace" overlapping the concept of "electronic environment", and these terms are often believed to be synonyms. To understand what the term "electronic environment" means and to properly and correctly employ this concept in entrepreneurship, the authors have performed a lexicographic analysis of this concept by comparing reciprocal concepts. As a result of the research, the authors propose their view on what, in their opinion, "electronic environment" is and what its connection to the concept "cyberspace" is. The topicality of the article lies in the fact that often entrepreneurs and specialists of public and other institutions, when using these terms, imply completely different concepts. It can lead to misunderstanding and misinterpreting the information, as well as to encumbering the understanding of tasks, problems, etc.

  1. “New Weapons” of Ideological and Political Education in Universities—WeChat

    OpenAIRE

    Wei He; Ke Liang

    2014-01-01

    WeChat, a new instant messaging software, has been popularized nowadays. In order for WeChat to have the maximum impact on the ideological and political education areas, we need to have a deep understanding of the characteristics and regulars which attract students in the communication process, and combine WeChat platform with ideological and political education to attract students motivated to learn the content of ideological politics. This article, starting with college students, aims to un...

  2. Metodologia de utilização do chat na enfermagem Metodología para el uso del chat en enfermería Methodology for the use of chat in nursing

    Directory of Open Access Journals (Sweden)

    Cláudia Prado

    2009-08-01

    Full Text Available O objetivo deste estudo foi descrever a metodologia da utilização do bate-papo (Chat para comunicação em tempo real em um grupo de pesquisa em enfermagem. O papel do coordenador compreende as dimensões de planejamento, mediação e tecnológica. Cada dimensão pode determinar o sucesso ou o fracasso da comunicação. Elas devem ser vistas de forma integrada e a modificação em alguma delas interfere na qualidade do resultado final da atividade. O software de comunicação adotado foi o Skype® por permitir comunicação grátis entre muitos usuários em tempo real. Para a execução do Chat foram estabelecidas cinco etapas: abertura, acolhimento/ aquecimento, desenvolvimento da pauta, síntese e encerramento. A metodologia permitiu otimização e flexibilização de tempo, organização das atividades e alcance dos objetivos.El objetivo del estudio fue describir la metodología de utilizar una herramienta para chat para la comunicación en tiempo real en un grupo de investigación de enfermería. El rolo del coordinador comprende las dimensiones del planeamiento, mediación y tecnología. Cada dimensión puede determinar el suceso o fracaso de la comunicación. Ellas deben ser vistas de manera integrada y la modificación en algún de ellas interfiere la calidad del resultado final de la actividad. El software de comunicación ha sido aprobado por Skype® para la comunicación libre entre muchos usuarios en tiempo real. Para la ejecución del chat fueron establecidas cinco pasos: apertura, acogida / hospitalidad, desarrollo del personal, síntesis y encerramiento. La metodología permitió la optimización y flexibilidad de tiempo, la organización de las actividades y el alcance de las metas.The purpose of this study was to describe the methodology of the use of chat for real-time communication in a group of nursing research. The role of coordinator understands the dimensions of planning, mediation and technology. Each dimension can

  3. Structure, complexity and cooperation in parallel external chat interactions

    Directory of Open Access Journals (Sweden)

    Anette Grønning

    2012-09-01

    Full Text Available This article examines structure, complexity and cooperation in external chat interactions at the workplace in which one of the participants is taking part in multiple parallel conversations. The investigation is based on an analysis of nine chat interactions in a work-related context, with particular focus on the content of the parallel time spans of the chat interactions. The analysis was inspired by applied conversation analysis (CA. The empirical material has been placed at my disposal by Kristelig Fagbevægelse (Krifa, which is Denmark’s third-largest trade union. The article’s overall focus is on “turn-taking organisation as the fundamental and generic aspect of interaction organisation” (Drew & Heritage, 1992, p. 25, including the use of turn-taking rules, adjacency pairs, and the importance of pauses. Even though the employee and the union members do not know one another and cannot see, hear, or touch one another, it is possible to detect an informal, pleasant tone in their interactions. This challenges the basically asymmetrical relationship between employee and customer, and one can sense a further level of asymmetry. In terms of medium, chat interactions exist via various references to other media, including telephone calls and e-mails.

  4. Monitoring and analysis of data in cyberspace

    Science.gov (United States)

    Schwuttke, Ursula M. (Inventor); Angelino, Robert (Inventor)

    2001-01-01

    Information from monitored systems is displayed in three dimensional cyberspace representations defining a virtual universe having three dimensions. Fixed and dynamic data parameter outputs from the monitored systems are visually represented as graphic objects that are positioned in the virtual universe based on relationships to the system and to the data parameter categories. Attributes and values of the data parameters are indicated by manipulating properties of the graphic object such as position, color, shape, and motion.

  5. Perancangan Dan Pembuatan Pengamanan Video Chat Dengan Menggunakan Metode Enkripsi RC4

    OpenAIRE

    Putra, Stevie Suwanto; Budhi, Gregorius Satia; Andjarwirawan, Justinus

    2015-01-01

    Technological development at this time has been growing rapidly with the internet. Along with the development the more the usefulness of the Internet. Not only used for browsing, now the Internet is also used for communication. Such as email, chat, and etc. The increasing development of communication technology, then people start to think about the secure of the communication technology. As in a video chat, only the person entitled to know the information in the video chat. But the encryption...

  6. "Live Chat" Clients at Kids Help Phone: Individual Characteristics and Problem Topics.

    Science.gov (United States)

    Haner, Dilys; Pepler, Debra

    2016-01-01

    Young people in Canada prefer to use the Internet over face-to-face contact when seeking help for problems of daily living and mental health problems. Kids Help Phone (KHP) provides on-demand, anonymous help to young people via telephone and Live Chat technologies. Two hundred thirty-two phone clients and 230 Live Chat clients responded to a questionnaire at this otherwise anonymous service, providing previously inaccessible data about their individual characteristics and characterizations of the problems for which they sought help. There was a larger proportion of weighty problems (mental health and suicide) among chatters than callers. There were also more non-heterosexual youth, and those who identified as Asian and Black African or Caribbean, using Live Chat than phone. Implications for training Live Chat counsellors to respond effectively to chatters are discussed.

  7. Web Inventor Berners-Lee starts a Blog

    CERN Multimedia

    Olson, Parmy

    2005-01-01

    Berners-Lee created what is known today as the World Wide Web. Now, just in time for the Web's 15th anniversary and after taking his proverbial stroll around the global dwelling of cyberspace, Berners-Lee is chatting with the rest of us about what he thinks with a blog

  8. Adolescents' Perceptions of Popularity-Motivated Behaviors, Characteristics, and Relationships in Cyberspace and Cyber Aggression: The Role of Gender.

    Science.gov (United States)

    Wright, Michelle F

    2017-06-01

    Research is increasingly revealing that adolescents utilize electronic technologies to promote and/or maintain their social standing among their peer group. Little is known about whether adolescents' perceptions of popularity-motivated behaviors, characteristics, and relationships in cyberspace are associated with popularity-motivated cyber relational aggression. It is also unclear how gender might impact these associations, especially considering that adolescent girls and boys differ in regard to the type of behaviors, characteristics, and relationships they believe contribute to popularity. To this end, this study examined the potential moderating effect of gender on the association between adolescents' perceptions of popularity-motivated behaviors, characteristics, and relationships in cyberspace and their engagement in popularity-motivated cyber relational aggression over 1 year, from seventh to eighth grade. There were 217 eighth graders (51 percent female; M age = 12.13) from three middle schools in a large Midwestern city in the United States included in this research. They completed questionnaires on their popularity-motivated behaviors, characteristics, and relationships in cyberspace and their perpetration of popularity-motivated cyber relational aggression during the seventh grade. One year later, they completed the perpetration of popularity-motivated cyber relational aggression questionnaire. The results revealed that the association between popularity-motivated behaviors, characteristics, and relationships in cyberspace and the perpetration of popularity-motivated cyber relational aggression was stronger for girls, while such an association was not found for boys. These findings indicate the importance of considering cyberspace as an environment in which adolescents can enhance their social standing among peers from their school.

  9. Virtual Reality and Cyberspace: From Science Fiction to Science Fact.

    Science.gov (United States)

    Stone, Robert J.

    1991-01-01

    Traces the history of virtual reality (VR), or cyberspace, and describes some of the research and development efforts currently being carried out in the United Kingdom, Europe, and the United States. Applications of VR in interactive computer-aided design (CAD), the military, leisure activities, spaceflight, teleconferencing, and medicine are…

  10. Bridging the Cyberspace Gap: Washington and Silicon Valley

    Science.gov (United States)

    2017-12-21

    Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program at the Council on Foreign Relations . One of the...large public role in tracing cyberattacks to nation-states and other perpetrators. In addition, Alphabet, Amazon, Apple, Cisco, Facebook, IBM, Intel...2013 after a number of public disputes.1 In December 2015, a terrorist killed 14 people in San Bernardino, California. The Federal Bureau of

  11. IMPLEMENTATION OF UKRAINIAN-SPEAKING MEMES IN CYBERSPACE

    OpenAIRE

    M.V. Zabotnova; O.V. Bohdanova

    2018-01-01

    The article is devoted to the analysis of memes, as a key aspect of interaction in chatrooms. The author highlights the communicative specificity of memes in cyberspace. The article is based on the interaction among Internet users in modern social networks, on the sample of the widespread memes. The work examines the definite units of memes, such as: pictures, videos, inspirational posters and demotivational posters. The author puts a stress on the actuality of a work due to the speed and unc...

  12. When technological affordances meet interactional norms: the value of pre-screening in online chat counseling

    NARCIS (Netherlands)

    Stommel, Wyke; te Molder, Hedwig Frederica Maria

    2016-01-01

    We present a conversation analysis of openings sequences of online text-based chat counseling. Particular about this chat counseling is that the clients made available their help question through pre-screening. The data consisted of 40 chat sessions with pre-screening and 34 sessions without

  13. Some reflections on non-contractual obligations in cyberspace considering the Rome II regulation

    Directory of Open Access Journals (Sweden)

    Mierina A.

    2014-01-01

    Full Text Available Internet penetration has created a revolutionary change in people's communication nowadays. By creating immaterial and elusive cyberspace, without borders and limits of communication a three-dimensional territorial concept has been transformed by globalizing social relations and reducing importance of regional or national dimensions. All situations taking place on the Internet also occur somewhere in the reality. Sometimes it is difficult to measure whether the events are random or unrelated to particular events. Technological progress offers new possibilities to change a user's real location either consciously or subconsciously. However, the law is highly territorial in nature. This article focuses on existing conflict of law rules under the EU law and reveals its weaknesses in relation to non-contractual obligations caused by the Internet. Therefore, the author observes core concepts of the applicable law by analyzing the legal notions and information technology concepts and assessing the suitability of regulation in cyberspace. The EU regulation, the doctrine of European and domestic authors as well as the EU case law have been examined. As a result, a number of conclusions have been drawn on the suitability of non-contractual relationships in cyberspace considering Rome II Regulation.

  14. Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program defines a set of interrelated priorities for the agencies of...

  15. Evaluating the Effectiveness of Air Force Foundational Cyberspace Training

    Science.gov (United States)

    2012-06-14

    projected and actual USAFA and AFROTC officer accessions [15]. The Basic Officer Training syllabus for academic year 2010-2011 included a lesson...Forces Vocational Aptitude Battery (ASVAB), which covers four areas: arithmetic reasoning, word knowledge, paragraph comprehension, and mathematics ...http://afrotc.com/ college -life/courses/descriptions/ (accessed 25 May 2012). [12] United States Air Force Holm Center, "Cyberspace Lesson Plan

  16. Key Terrain: Application to the Layers of Cyberspace

    Science.gov (United States)

    2017-03-01

    In the land domain, fixed terrain features such as mountains, depressions , or valleys are tied to a geographic location. Cyberspace does not have...January 2015, hackers claiming loyalty to the Islamic State of Iraq and Syria (ISIS) compromised Twitter and YouTube accounts owned by USCENTCOM. Twitter...a popular social media service and YouTube , a site that hosts user video content, were both used by USCENTCOM as effective communication tools for

  17. The Cyberspace Domain: Path to a New Service?

    Science.gov (United States)

    2013-05-23

    What to Do About It, 36. 126Mark A. Morris ,“Who Will Command The High Ground? The Case For A Separate Area of Responsibility for Space” (monograph...STRATCOM occurred. Morris ’ paper is interesting because he couches discussion of the space domain in much the same way cyberspace is discussed today...Levin, Carl. Opening Statement at SASC Hearing on US Strategic Command and US Cyber Command for FY 2014, Tuesday , March 12, 2013. http

  18. Gardening in Cyberspace: A Metaphor to Enhance Online Teaching and Learning.

    Science.gov (United States)

    May, Gary L.; Short, Darren

    2003-01-01

    Uses the metaphor of gardening in cyberspace as a guide to the creation of an environment that fosters learning and growth in online courses. Draws analogies between good gardening practices and online teaching practices, instructional design, and course management techniques. Contains 63 references. (SK)

  19. Location based chat application for iPhone

    Science.gov (United States)

    Rana, Pradeep

    With the increasing use of mobile devices everywhere in the world, there is a lack of social interaction between people. The objective of this thesis project is to create a location based chat application, which will help users to interact with other people around them. It will provide an opportunity to meet people when someone visits a new place. The app will use GPS coordinates of the user and will show him a list of other users based on his location. The user can then choose any of the other users from the list and start chatting with them. This app will consist of a frontend and backend. The frontend will be an iOS application and the backend will be a PHP/MYSQL server.

  20. Reviving a Digital Dinosaur: Text-Only Synchronous Online Chats and Peer Tutoring in Communication Centers

    Science.gov (United States)

    Schwartzman, Roy

    2013-01-01

    A qualitative and quantitative content analysis was conducted of all text-based synchronous online chats at an oral communication peer tutoring center throughout a semester. As a comparative benchmark, chats at the same university's main library were analyzed over the same time period. The library's chats were much more heavily weighted toward…

  1. Recorded peer video chat as a research and development tool

    DEFF Research Database (Denmark)

    Otrel-Cass, Kathrin; Cowie, Bronwen

    2016-01-01

    When practising teachers take time to exchange their experiences and reflect on their teaching realities as critical friends, they add meaning and depth to educational research. When peer talk is facilitated through video chat platforms, teachers can meet (virtually) face to face even when...... recordings were transcribed and used to prompt further discussion. The recording of the video chat meetings provided an opportunity for researchers to listen in and follow up on points they felt needed further unpacking or clarification. The recorded peer video chat conversations provided an additional...... opportunity to stimulate and support teacher participants in a process of critical analysis and reflection on practice. The discussions themselves were empowering because in the absence of the researcher, the teachers, in negotiation with peers, choose what is important enough to them to take time to discuss....

  2. Gender, Space, and Discourse across Borders: Talking Gender in Cyberspace

    Science.gov (United States)

    Maher, JaneMaree; Hoon, Chng Huang

    2008-01-01

    The possibility of online student collaboration over cyberspace for two groups of students in Australia and Singapore was conceived by JaneMaree Maher at Monash University in Australia in 2005 after hearing a paper given by a colleague that detailed the experience of a three-way cross-country dialogue using flexible learning technologies. A recent…

  3. Online Chat Dependency: The Influence of Social Anxiety

    Science.gov (United States)

    Wang, Chih-Chien; Chang, Shu-Chen

    Recent developments in information technology have made it easy for people to “chat” online with others in real time, and many do so regularly. “Virtual” relationships can be attractive, especially for people with social interaction problems in the “real world”. This study examines the influence on online chat dependency of three dimensions of social anxiety: general social situation fear, negative evaluation fear, and novel social situation fear. Participants of this study were 454 college students. The survey results show that negative evaluation fear and general social situation fear are relative to online chat dependency, while novel social situation fear does not seem to be a relevant factor.

  4. Security in cyberspace targeting nations, infrastructures, individuals

    CERN Document Server

    Giacomello, Giampiero

    2014-01-01

    Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as ""cybersecurity."" Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This colle

  5. Using a book chat to improve attitudes and perceptions of long-term care staff about dementia.

    Science.gov (United States)

    Larocque, Natasha; Schotsman, Chloe; Kaasalainen, Sharon; Crawshaw, Diane; McAiney, Carrie; Brazil, Emma

    2014-05-01

    This study sought to evaluate a book chat intervention based on Lisa Genova's novel, Still Alice, to influence long-term care (LTC) staff perceptions and attitudes when caring for individuals with dementia. A qualitative descriptive design was used. Eleven participants partook in a 2.5-hour book chat at a southern Ontario LTC facility. Following the book chat, participants answered two open-ended questions to assess how the book chat influenced their views on dementia. Thematic content analysis was used to analyze the qualitative questionnaire. Content analysis of the participants' responses revealed that the book chat positively influenced their attitudes and perceptions toward dementia, particularly by providing more insight into the individual's personal struggle with the disease. Furthermore, participants found that the book chat influenced their care practices. By creating innovative learning opportunities, attitudes and perceptions about dementia care can be transcended and greatly benefit staff, family, and residents. Copyright 2014, SLACK Incorporated.

  6. Emotional persistence in online chatting communities

    Science.gov (United States)

    Garas, Antonios; Garcia, David; Skowron, Marcin; Schweitzer, Frank

    2012-05-01

    How do users behave in online chatrooms, where they instantaneously read and write posts? We analyzed about 2.5 million posts covering various topics in Internet relay channels, and found that user activity patterns follow known power-law and stretched exponential distributions, indicating that online chat activity is not different from other forms of communication. Analysing the emotional expressions (positive, negative, neutral) of users, we revealed a remarkable persistence both for individual users and channels. I.e. despite their anonymity, users tend to follow social norms in repeated interactions in online chats, which results in a specific emotional ``tone'' of the channels. We provide an agent-based model of emotional interaction, which recovers qualitatively both the activity patterns in chatrooms and the emotional persistence of users and channels. While our assumptions about agent's emotional expressions are rooted in psychology, the model allows to test different hypothesis regarding their emotional impact in online communication.

  7. Goethe Gossips with Grass: Using Computer Chatting Software in an Introductory Literature Course.

    Science.gov (United States)

    Fraser, Catherine C.

    1999-01-01

    Students in a third-year introduction to German literature course chatted over networked computers, using "FirstClass" software. A brief description of the course design is provided with detailed information on how the three chat sessions were organized. (Author/VWL)

  8. Modelling of Processes of Logistics in Cyberspace Security

    Directory of Open Access Journals (Sweden)

    Konečný Jiří

    2017-01-01

    Full Text Available The goal of this contribution is especially to familiarize experts in various fields with the need for a new approach to the system-defined model and modelling of processes in the engineering practice and the expression of some state variables' possibilities for the modelling of real-world systems with regard to the highly dynamic development of structures and to the behaviour of systems of logistics. Thus, in this contribution, the necessity of making full use of cybernetics as a field for the management and communication of information is expressed, and also the environment of cybernetics as a much needed cybernetic realm (cyberspace, determining the steady state between cyber-attacks and cyber-defence as a modern knowledge-based potential in general and specifically of logistics in cyber security. Connected with this process is the very important area of lifelong training of experts in the dynamic world of science and technology (that is, also in a social system which is also expressed here briefly, and also the cyber and information security, all of which falls under the cyberspace of new perspective electronic learning (e-learning with the use of modern laboratories with new effects also for future possibilities of process modelling of artificial intelligence (AI with a perspective of mass use of UAVs in logistics.

  9. Overcoming the Confucian psychological barrier in government cyberspace.

    Science.gov (United States)

    Lee, Ook; Gong, Sung Jin

    2004-02-01

    The Confucian tradition still dictates the behavior of many people in East Asian countries such as South Korea. Even in e-mail communication, people try their best to show signs of respect which is required by the Confucian tradition. This psychological barrier can be detrimental to the development of democracy as people are educated not to challenge opinions of elders or bosses. After a long military dictatorship, South Korea has emerged as a newly democratized nation where the Confucian tradition is less emphasized. However, this tradition dies hard, and citizens are still afraid of offending government officials who have the power to affect lives of citizens. In light of creating a more democratic society, the e-government project has been implemented, and one of the features of cyber-government is to give citizens a place in cyberspace to express their concerns. Even though citizens have to use their real names, it is found that those who wrote messages in the bulletin board of the city of Seoul government's web pages tend not to use terms that are often used in e-mails for the purpose of expressing respect. A survey was conducted, and results show that people were able to overcome the Confucian psychological barrier in government cyberspace. Self-efficacy is proposed to explain this phenomenon.

  10. [Dental education for college students based on WeChat public platform].

    Science.gov (United States)

    Chen, Chuan-Jun; Sun, Tan

    2016-06-01

    The authors proposed a model for dental education based on WeChat public platform. In this model, teachers send various kinds of digital teaching information such as PPT,word and video to the WeChat public platform and students share the information for preview before class and differentiate the key-point knowledge from those information for in-depth learning in class. Teachers also send reference materials for expansive learning after class. Questionaire through the WeChat public platform is used to evaluate teaching effect of teachers and improvement may be taken based on the feedback questionnaire. A discussion and interaction based on WeCchat between students and teacher can be aroused on a specific topic to reach a proper solution. With technique development of mobile terminal, mobile class will come true in near future.

  11. WOC practice in cyberspace: legal and ethical issues.

    Science.gov (United States)

    Hoyman, K

    2001-07-01

    WOC nurses have the opportunity to extend their practice geographically by using electronic media, also called telehealth or "practicing in cyberspace." Currently, laws and regulations affecting this aspect of practice are in rapid flux. In addition, practicing electronically makes the ethical issues of choice, privacy, and confidentiality more acute. This article describes the current status of relevant legislation, discusses relevant ethical issues, and provides guidelines for WOC nurses who are considering the use of e-mail and video conferencing within their practice.

  12. Implementación de un bot de ChatOps compatible con varias plataformas de chat para interactuar con un entorno basado en microservicios

    OpenAIRE

    Arenas Rodríguez, David

    2017-01-01

    ChatOps, un término atribuido a GitHub, representa un modelo de desarrollo de software en el que la mayor parte de las operaciones se realizan a través de un chat, donde un equipo se comunica con un bot que interpreta comandos escritos por los usuarios y permite automatizar numerosas tareas del flujo de trabajo. Éstas pueden ser prácticamente cualquier cosa: desde revisión de código, compilación, tests, actualización y despliegue de servicios, hasta avisos, control y asignación de tareas, con...

  13. Centralized Offense, Decentralized Defense: Command and Control of Cyberspace

    Science.gov (United States)

    2012-06-01

    emphasizing that a healthy cyberspace is essential to the nation’s economy and security.12 Missing from this definition was an emphasis that...global information grid ( GIG ).11 9 McDougall, The Heavens and the Earth, 84. 10 Antione Bousquet, The Scientific Way of Warfare: Order and Chaos on...outside influence is a significant piece of this puzzle. It is common for the United States government’s global information grid ( GIG ) to be attacked

  14. Learners’ Participation in Informal Japanese-English Internet Chat

    Directory of Open Access Journals (Sweden)

    Sarah Pasfield-Neofitou

    2009-12-01

    Full Text Available It has been widely claimed that computer mediated communication offers unique opportunities for language learners, including the ability to take on the roles of ‘writer’ and ‘reader’, ‘teacher’ and ‘learner’. Hence, it is important for teachers and learners to be aware of not only the linguistic and interactional characteristics of especially bilingual chat, but also how participants in an intercultural setting may switch between roles. Learning about one’s second language from a peer, and in turn, teaching that peer about one’s native language may allow both participants opportunities to develop as language experts.This article utilises naturalistic bilingual chat data and follow-up interviews to examine the implications of these findings for learners, teachers and researchers.

  15. Advanced tools for enhancing control room collaborations

    International Nuclear Information System (INIS)

    Abla, G.; Flanagan, S.M.; Peng, Q.; Burruss, J.R.; Schissel, D.P.

    2006-01-01

    The US National Fusion Collaboratory (NFC) project has been exploring a variety of computer and network technologies to develop a persistent, efficient, reliable and convenient collaborative environment for magnetic fusion research. One goal is to enhance remote and collocated team collaboration by integrating collaboration software tools into control room operations as well as with data analysis tools. To achieve this goal, the NFC recently introduced two new collaboration technologies into the DIII-D tokamak control room. The first technology is a high-resolution, large format Shared Display Wall (SDW). By creating a shared public display space and providing real time visual information about the multiple aspects of complex experiment activity, the large SDW plays an important role in increasing the rate of information dissemination and promoting interaction among team members. The second technology being implemented is the 'tokamak control room aware' Instant Messaging (IM) service. In addition to providing text-chat capabilities for research scientists, it enables them to automatically receive information about experiment operations and data analysis processes to remotely monitor the status of ongoing tokamak experiment. As a result, the IM service has become a unified portal interface for team collaboration and remote participation

  16. Advanced tools for enhancing control room collaborations

    Energy Technology Data Exchange (ETDEWEB)

    Abla, G. [General Atomics, P.O. Box 85608, San Diego, CA 92186 5608 (United States)]. E-mail: abla@fusion.gat.com; Flanagan, S.M. [General Atomics, P.O. Box 85608, San Diego, CA 92186 5608 (United States); Peng, Q. [General Atomics, P.O. Box 85608, San Diego, CA 92186 5608 (United States); Burruss, J.R. [General Atomics, P.O. Box 85608, San Diego, CA 92186 5608 (United States); Schissel, D.P. [General Atomics, P.O. Box 85608, San Diego, CA 92186 5608 (United States)

    2006-07-15

    The US National Fusion Collaboratory (NFC) project has been exploring a variety of computer and network technologies to develop a persistent, efficient, reliable and convenient collaborative environment for magnetic fusion research. One goal is to enhance remote and collocated team collaboration by integrating collaboration software tools into control room operations as well as with data analysis tools. To achieve this goal, the NFC recently introduced two new collaboration technologies into the DIII-D tokamak control room. The first technology is a high-resolution, large format Shared Display Wall (SDW). By creating a shared public display space and providing real time visual information about the multiple aspects of complex experiment activity, the large SDW plays an important role in increasing the rate of information dissemination and promoting interaction among team members. The second technology being implemented is the 'tokamak control room aware' Instant Messaging (IM) service. In addition to providing text-chat capabilities for research scientists, it enables them to automatically receive information about experiment operations and data analysis processes to remotely monitor the status of ongoing tokamak experiment. As a result, the IM service has become a unified portal interface for team collaboration and remote participation.

  17. Video chat technology to remotely quantify dietary, supplement and medication adherence in clinical trials.

    Science.gov (United States)

    Peterson, Courtney M; Apolzan, John W; Wright, Courtney; Martin, Corby K

    2016-11-01

    We conducted two studies to test the validity, reliability, feasibility and acceptability of using video chat technology to quantify dietary and pill-taking (i.e. supplement and medication) adherence. In study 1, we investigated whether video chat technology can accurately quantify adherence to dietary and pill-taking interventions. Mock study participants ate food items and swallowed pills, while performing randomised scripted 'cheating' behaviours to mimic non-adherence. Monitoring was conducted in a cross-over design, with two monitors watching in-person and two watching remotely by Skype on a smartphone. For study 2, a twenty-two-item online survey was sent to a listserv with more than 20 000 unique email addresses of past and present study participants to assess the feasibility and acceptability of the technology. For the dietary adherence tests, monitors detected 86 % of non-adherent events (sensitivity) in-person v. 78 % of events via video chat monitoring (P=0·12), with comparable inter-rater agreement (0·88 v. 0·85; P=0·62). However, for pill-taking, non-adherence trended towards being more easily detected in-person than by video chat (77 v. 60 %; P=0·08), with non-significantly higher inter-rater agreement (0·85 v. 0·69; P=0·21). Survey results from study 2 (n 1076 respondents; ≥5 % response rate) indicated that 86·4 % of study participants had video chatting hardware, 73·3 % were comfortable using the technology and 79·8 % were willing to use it for clinical research. Given the capability of video chat technology to reduce participant burden and outperform other adherence monitoring methods such as dietary self-report and pill counts, video chatting is a novel and promising platform to quantify dietary and pill-taking adherence.

  18. Mass Surveillance and the Militarization of Cyberspace in Post-Coup Thailand

    Directory of Open Access Journals (Sweden)

    Pinkaew Laungaramsri

    2016-12-01

    Full Text Available Post-coup Thailand has witnessed a troubling shift toward censorship, surveillance, and suppression in cyberspace. With cyber security ranking prominently on the military’s agenda and the expansion of the military’s cyber intervention, the country’s online infrastructure has undergone politicization, securitization, and militarization. This paper argues that the militarization of cyberspace in Thailand represents the process in which cyber warfare capabilities have been integrated with other military forces and with support from the masses. This process has been effective through at least three significant mechanisms, including mass surveillance, surveillance by the masses, and normalization of surveillance. Social media have been turned into an absolute digital panopticon. Cyber dystopia, created by the 2014 coup and supported by the masses, has served to sustain a ‘state of exception’ not only within the territorial borders of the state, but also more importantly, within the virtual space of civil society. Cyber surveillance by the military and the masses has continued to jeopardize the already vulnerable Thai democracy.

  19. Evaluation of the 113Online Suicide Prevention Crisis Chat Service: Outcomes, Helper Behaviors and Comparison to Telephone Hotlines.

    Science.gov (United States)

    Mokkenstorm, Jan K; Eikelenboom, Merijn; Huisman, Annemiek; Wiebenga, Jasper; Gilissen, Renske; Kerkhof, Ad J F M; Smit, Johannes H

    2017-06-01

    Recognizing the importance of digital communication, major suicide prevention helplines have started offering crisis intervention by chat. To date there is little evidence supporting the effectiveness of crisis chat services. To evaluate the reach and outcomes of the 113Online volunteer-operated crisis chat service, 526 crisis chat logs were studied, replicating the use of measures that were developed to study telephone crisis calls. Reaching a relatively young population of predominantly females with severe suicidality and (mental) health problems, chat outcomes for this group were found to be comparable to those found for crisis calls to U.S. Lifeline Centers in 2003-2004, with similar but not identical associations with specific helpers' styles and attitudes. Our findings support a positive effect of the 113Online chat service, to be enhanced by practice standards addressing an apparent lack of focus on the central issue of suicidality during chats, as well as by the development of best practices specific for online crisis intervention. © 2016 The American Association of Suicidology.

  20. Does the Use of WeChat Lead to Subjective Well-Being?: The Effect of Use Intensity and Motivations.

    Science.gov (United States)

    Wen, Zhengbao; Geng, Xiaowei; Ye, Yinghua

    2016-10-01

    Recently, WeChat has been widely used in China. The positive and negative effects of WeChat on users have received attention from researchers gradually. Using the questionnaire method, we recruited 339 undergraduates and graduates as participants, and tested the effects of WeChat on their subjective well-being (SWB) in terms of intensity. In addition, we confirmed the mediating effects of WeChat with respect to motivation. The results showed that the participants' WeChat use intensity was at a mid-level, 85.3 percent of them spending no more than 2 hours on WeChat every day. Furthermore, there have been no demographic differences in the variables of gender, place of residence, or grade. Participants' WeChat use intensity can significantly predict their use motivation and life satisfaction, and intrinsic use motivation was the mediator between the use intensity and SWB, while the other three types of motivation (external, introjection, and identification) cannot predict SWB significantly. The user's ultimate emotional experience is primarily derived from why and how they use it. We also tested whether the use motivation can be shaped.

  1. Excessive use of WeChat, social interaction and locus of control among college students in China.

    Science.gov (United States)

    Hou, Juan; Ndasauka, Yamikani; Jiang, Yingying; Ye, Zi; Wang, Ying; Yang, Lizhuang; Li, Xiaoming; Zhang, Yongjun; Pang, Liangjun; Kong, Yan; Xu, Fei; Zhang, Xiaochu

    2017-01-01

    In China, the number of college students using mobile phone based messaging and social networking applications like WeChat is increasing rapidly. However, there has been minimal research into the addictive nature of these applications and the psychological characteristics associate with their excessive use. There is also no published scale available for assessing excessive use of WeChat and similar applications. In the current study, we collected data from 1,245 college students in China (715 females) and developed the WeChat Excessive Use Scale (WEUS). We then assessed the relationship between excessive use of WeChat and excessive use of a social networking application-Weibo, problematic use of mobile phones, external locus of control, and social interaction skills. Our 10-item scale featured three factors, namely- "mood modification," "salience" and ''conflict"- critical factors in assessing different forms of addiction. The WEUS was found to be a reliable instrument in assessing excessive use of WeChat as it showed good internal consistency and correlated with other measures of problematic use social networking and mobile phone addiction. Our results showed that excessive users of WeChat are more likely to excessively use Weibo than they are to problematically use mobile phones. Our study also showed that greater excessive use of WeChat is associated with higher external locus of control and greater online social interaction skills. These results reveal that WeChat has unique and strong appeal among college students in China. Further, practitioners should consider dealing with malleable factors like locus of control and real life social skills in treating people with problematic messaging and social networking.

  2. Excessive use of WeChat, social interaction and locus of control among college students in China

    Science.gov (United States)

    Jiang, Yingying; Ye, Zi; Wang, Ying; Yang, Lizhuang; Li, Xiaoming; Zhang, Yongjun; Pang, Liangjun; Kong, Yan; Xu, Fei; Zhang, Xiaochu

    2017-01-01

    In China, the number of college students using mobile phone based messaging and social networking applications like WeChat is increasing rapidly. However, there has been minimal research into the addictive nature of these applications and the psychological characteristics associate with their excessive use. There is also no published scale available for assessing excessive use of WeChat and similar applications. In the current study, we collected data from 1,245 college students in China (715 females) and developed the WeChat Excessive Use Scale (WEUS). We then assessed the relationship between excessive use of WeChat and excessive use of a social networking application-Weibo, problematic use of mobile phones, external locus of control, and social interaction skills. Our 10-item scale featured three factors, namely- “mood modification,” “salience” and ‘‘conflict”- critical factors in assessing different forms of addiction. The WEUS was found to be a reliable instrument in assessing excessive use of WeChat as it showed good internal consistency and correlated with other measures of problematic use social networking and mobile phone addiction. Our results showed that excessive users of WeChat are more likely to excessively use Weibo than they are to problematically use mobile phones. Our study also showed that greater excessive use of WeChat is associated with higher external locus of control and greater online social interaction skills. These results reveal that WeChat has unique and strong appeal among college students in China. Further, practitioners should consider dealing with malleable factors like locus of control and real life social skills in treating people with problematic messaging and social networking. PMID:28817710

  3. Excessive use of WeChat, social interaction and locus of control among college students in China.

    Directory of Open Access Journals (Sweden)

    Juan Hou

    Full Text Available In China, the number of college students using mobile phone based messaging and social networking applications like WeChat is increasing rapidly. However, there has been minimal research into the addictive nature of these applications and the psychological characteristics associate with their excessive use. There is also no published scale available for assessing excessive use of WeChat and similar applications. In the current study, we collected data from 1,245 college students in China (715 females and developed the WeChat Excessive Use Scale (WEUS. We then assessed the relationship between excessive use of WeChat and excessive use of a social networking application-Weibo, problematic use of mobile phones, external locus of control, and social interaction skills. Our 10-item scale featured three factors, namely- "mood modification," "salience" and ''conflict"- critical factors in assessing different forms of addiction. The WEUS was found to be a reliable instrument in assessing excessive use of WeChat as it showed good internal consistency and correlated with other measures of problematic use social networking and mobile phone addiction. Our results showed that excessive users of WeChat are more likely to excessively use Weibo than they are to problematically use mobile phones. Our study also showed that greater excessive use of WeChat is associated with higher external locus of control and greater online social interaction skills. These results reveal that WeChat has unique and strong appeal among college students in China. Further, practitioners should consider dealing with malleable factors like locus of control and real life social skills in treating people with problematic messaging and social networking.

  4. Peer counseling in an online chat service: a content analysis of social support

    NARCIS (Netherlands)

    Fukkink, R.

    2011-01-01

    In a recently launched one-on-one chat service for young people with psychosocial problems, young peer volunteers (ages 16-23) have a leading role in the conversations, comparable to the role of counselors in web-based and telephone-based child help-line services. A content analysis of the chat

  5. First Things First: Internet Relay Chat Openings.

    Science.gov (United States)

    Rintel, E. Sean; Mulholland, Joan; Pittam, Jeffery

    2001-01-01

    Argues that Internet Relay Chat (IRC) research needs to systematically address links between interaction structures, technological mediation and the instantiation and development of interpersonal relationships. Finds that openings that occur directly following user's entries into public IRC channels are often ambiguous, can disrupt relationship…

  6. Chat (Catha edulis): a socio economic crop in Harar Region, Eastern Ethiopia.

    Science.gov (United States)

    Kandari, Laxman S; Yadav, Hiranmai R; Thakur, Ashok K; Kandari, Tripti

    2014-01-01

    Chat (Catha edulis) is an important perennial crop and its leaves are chewed for a stimulating effect. It is widely cultivated in the Ethiopian highlands of Oromia region and is figured as Ethiopia's second largest foreign exchange earner. Its cultivation accounts for about 70% of farmer's income in the study area. The common effect of its consumption leads to insomnia, a condition that the users sometimes try to overcome with sedatives or alcohol. The present study is an attempt to survey and assess the impact of crop on the community. It has been observed to implicate health problems, reduces savings and nutritional standards of the family members. The chat yields in the area ranges from 1500-1800 kg/ha through monoculture. During the study, the average monthly income of the family practicing chat cultivation was from Birr 8, 533.00 to 13, 166.00 kg/ha per year in Baate and Genede cultivating areas. When the average cost per/ha was rupees 60/kg. The present study shows that during the recent past, leaf consumption has increased significantly. Chat growers are not only producers but also traders and consumers. Its consumption has become a widespread habit from secondary schools. Highest number of consumers was found to be among drivers followed by students and shopkeepers. The consumption of the plant is not considered a taboo but on contrary a status symbol in the region. It has no legal or moral implications and is considered as a part of custom and habit of local people. High value cash crop like vegetables and orchard fruits needs to be used as a replacement for chat which could be a regular source of income to farmers. Alternative sources of income for farmers needs to be scientifically worked out and proposed keeping in view the proportion of agricultural land reserved under chat cultivation and to increase the production of food grains being produced.

  7. Who is Responsible for Defending United States Interests in Cyberspace?

    Science.gov (United States)

    2013-03-01

    The U.S. Chamber of Commerce worked openly to challenge legislation that potentially would have directed minimum standards for operators of key...of companies to enable private public collaboration to 6 protect critical infrastructure as the U.S. Chamber of Commerce actively identifies...cyberspace-lawmakers-say/50869/ (accessed November 12, 2012). 19 US Chamber of Commerce , “Key Vote letter on S. 3414, the Cybersecurity Act of 2012

  8. 75 FR 2836 - Schools and Libraries Universal Service Support Mechanism

    Science.gov (United States)

    2010-01-19

    ... networking websites and in chat rooms and cyberbullying awareness and response, as required by the Protecting... interacting with other individuals on social networking Web sites and in chat rooms and cyberbullying... networking websites and in chat rooms and cyberbullying awareness and response. We seek comment on this...

  9. Crowdsourced Translation for Rapid Internationalization in Cyberspace

    DEFF Research Database (Denmark)

    Tran, Yen; Yonatany, Moshe; Mahnke, Volker

    2016-01-01

    This paper explores how Facebook effectively used crowdsourced translation to accelerate its rapid internationalization. We apply the learning perspective of internationalization theory to unpack what the firm learned in order to mobilize crowd-based knowledge to facilitate internationalization...... and codified knowledge, rather than the experiential knowledge traditionally suggested in the literature on the process of internationalization, and (2) the firm's success rested on its ability to use virtual learning tools and incentive systems to acquire, articulate and integrate knowledge from communities...... of internationally dispersed users – the “crowd” – to accelerate its internationalization in cyberspace. This empirical study extends internationalization theory regarding knowledge and organizational learning....

  10. [Influence of WeChat platform on the compliance of continuous treatment of scar in adult burn patients].

    Science.gov (United States)

    Wang, F; Zhang, H L

    2018-03-20

    Objective: To explore influence of the WeChat platform on the compliance of continuous treatment of scar in adult burn patients. Methods: A total of 124 adult burn patients, conforming to the study criteria, admitted in the Department of Burns of our hospital from January 2015 to January 2016 were divided into WeChat group ( n =63) and control group ( n =61) according to the random number table. Patients in control group only received regular discharging rehabilitation guide, while patients in WeChat group received regular discharging rehabilitation guide and joined WeChat platform after being discharged from hospital. Through pushing rehabilitation plan and rehabilitation related knowledge, organizing support discussion of burn patients, answering the patients' questions, members of WeChat platform intervention group conducted continuous treatment for 6 months on patients of WeChat group. The compliance of functional exercise of patients in two groups in one week before discharge and 3 and 6 months after discharge was evaluated by using the self-made functional exercise compliance log sheet. The compliance of using anti-scar drug and appliance of patients in two groups in 3 and 6 months after discharge was evaluated by using self-made anti-scar drug and appliance usage log sheets. Data were processed with chi-square test, independent sample t test, non-parametric rank sum test of independent sample, and Wilcoxon rank sum test. Results: (1) The compliance ratio of functional exercise of patients in WeChat group (95.24%, 60/63) was close to 93.44% (57/61) in control group in one week before discharge ( χ (2)=0.188, P >0.05). The compliance ratios of functional exercise of patients in WeChat group were respectively 93.65% (59/63) and 87.30% (55/63) in 3 and 6 months after discharge, which were higher than 68.85% (42/61) and 65.57% (40/61) in control group ( χ (2)=12.615, 8.166, P WeChat group was significantly better than that in control group in 3 and 6 months

  11. Chat as a technically mediated social system

    DEFF Research Database (Denmark)

    Tække, Jesper

    2008-01-01

    This paper provides an analysis of chat as a technical media for communication. This is realized using the strategy for analyzing that I have called Media Sociography (Tække 2006). The Media Sociography is a synthesis of Medium Theory and the Systems Theoretical Sociology of Niklas Luhmann. The aim...

  12. Exploring the Affordances of WeChat for Facilitating Teaching, Social and Cognitive Presence in Semi-Synchronous Language Exchange

    Science.gov (United States)

    Wang, Yuping; Fang, Wei-Chieh; Han, Julia; Chen, Nian-Shing

    2016-01-01

    This research is an exploratory study that evaluates the affordances of WeChat for the development of a community of inquiry (CoI) in semi-synchronous language exchange supported by WeChat. WeChat is an instant messenger that facilitates a multimodal environment in which interaction can happen synchronously, semi-synchronously and asynchronously…

  13. Adding a Feature: Can a Pop-Up Chat Box Enhance Virtual Reference Services?

    Science.gov (United States)

    Fan, Suhua Caroline; Fought, Rick L; Gahn, Paul C

    2017-01-01

    Online users seek help from virtual reference services via email, phone, texting, and live chat. Technologies have enabled new features in library websites to help make this service more accessible and effective. This article is an evaluation of an experimental pop-up live chat box on the website of a health sciences library to see whether the feature would enhance virtual reference services.

  14. Influence of WeChat on sleep quality among undergraduates in Chongqing, China: a cross-sectional study

    OpenAIRE

    Xu, Xianglong; Lin, Qianyi; Zhang, Yan; Zhu, Runzhi; Sharma, Manoj; Zhao, Yong

    2016-01-01

    Background Previous studies showed that social media is associated with sleep quality. WeChat (a native social media in China) is very popular in China, especially among the youth. In the second quarter of 2016, Tencent?s WeChat had 806 million monthly active users. The study sought to identify the influence of WeChat on the sleep quality among undergraduate students. Methods A cross-sectional survey adopted a multi-stage stratified sampling survey to investigate undergraduates in Chongqing, ...

  15. Evaluating a Chat Reference Service at the University of South Alabama's Baugh Biomedical Library

    Science.gov (United States)

    Clanton, Clista C.; Staggs, Geneva B.; Williams, Thomas L.

    2006-01-01

    The University of South Alabama's Baugh Biomedical Library recently initiated a chat reference service targeted at distance education students in the biomedical sciences. After one year of service, the library conducted an evaluation of the chat reference to assess the success of this mode of reference service. Both traditional reference and…

  16. Influence of WeChat on sleep quality among undergraduates in Chongqing, China: a cross-sectional study.

    Science.gov (United States)

    Xu, Xianglong; Lin, Qianyi; Zhang, Yan; Zhu, Runzhi; Sharma, Manoj; Zhao, Yong

    2016-01-01

    Previous studies showed that social media is associated with sleep quality. WeChat (a native social media in China) is very popular in China, especially among the youth. In the second quarter of 2016, Tencent's WeChat had 806 million monthly active users. The study sought to identify the influence of WeChat on the sleep quality among undergraduate students. A cross-sectional survey adopted a multi-stage stratified sampling survey to investigate undergraduates in Chongqing, China. Data were collected on 1979 eligible adults, aged 20.27 (SD: 1.26) years old, using Pittsburgh Sleep Quality Index (PSQI) to measure sleep quality. Respondents aged 20.27 ± 1.26 years included 535 (27.0%) males, and 1311 (66.3%) reported as having poor sleep quality. Of the 1979 participants, 1320 (66.70%) were WeChat users. In multivariable analyses, gender, grade, nationality, living costs, the student leader, the only child, type of university, WeChat usage was associated with domains of PSQI among undergraduates ( p  students.

  17. The usability of WeChat as a mobile and interactive medium in student-centered medical teaching.

    Science.gov (United States)

    Wang, Juan; Gao, Furong; Li, Jiao; Zhang, Jieping; Li, Siguang; Xu, Guo-Tong; Xu, Lei; Chen, Jianjun; Lu, Lixia

    2017-09-01

    Biochemistry and cellular biology courses for medical students at Tongji University include the assessment that provides students with feedback to enhance their learning, which is a type of formative assessment. However, frequent instant feedback and guidance for students is often absent or inconsistently included in the teaching process. WeChat, the most popular Chinese social media, was introduced in biochemistry and cellular biology course. A WeChat official account (OA) was set up as an instant interactive platform. Over a period of two semesters, OA sent 73 push notifications. The components included course notices, preclass thought questions, after-class study materials, answer questions and feedback, simulation exercises, teacher-student interaction, and research progress relevant to the course. WeChat OA served as an active-learning teaching tool, provided more frequent feedback and guidance to students, and facilitated better student-centered communication in the teaching process. Using the WeChat OA in medical teaching emphasized interactive, interoperable, effective, engaging, adaptable, and more participatory teaching styles. As a new platform, WeChat OA was free, Internet-reliant, and easily managed. Using this new medium as a communication tool accelerated further advancement of instant feedback and improvement in teaching activities. Notifications and interactive feedback via the mobile social medium WeChat OA anytime and anywhere facilitated a student-centered teaching mode. Use of WeChat OA significantly increased the proportion of students interactively participating and resulted in a high degree of student satisfaction. © 2017 by The International Union of Biochemistry and Molecular Biology, 45(5):421-425, 2017. © 2017 The International Union of Biochemistry and Molecular Biology.

  18. Paradigmatic Shifts in Jihadism in Cyberspace: The Emerging Role of Unaffiliated Sympathizers in Islamic State’s Social Media Strategy

    Directory of Open Access Journals (Sweden)

    Yannick Veilleux-Lepage

    2016-02-01

    Full Text Available 'This paper provides an overview of the evolution of the concept of jihadism as it presently exists in cyberspace. From its roots during the Chechen conflict to the current use of social media by the Islamic State (IS, this paper identifies and examines three highly significant paradigm shifts: (1 the emergence of rudimentary Web 2.0 platforms and jihadist forums; (2 the advent of advanced Web 2.0 and social media platforms as methods of spreading jihadism; and (3 turn towards ‘lone wolf’ terrorism.  In this paper, the author argues that IS’ extensive reliance on unaffiliated sympathizers, who either re-tweet or re-post content produced and authorized by the IS leadership can be seen as a groundbreaking paradigm shift in the evolution of jihadism in cyberspace. Furthermore, it is also argued that IS’ strategy of empowering of unaffiliated sympathizers represents a further development in the evolution of jihadism in cyberspace and can best be understood as an attempt to normalize and legitimize IS’ existence through its efforts to dominate the ‘IS narrative’ across social media platforms.' ' '

  19. Case Report - Le syndrome de Cri du Chat : A propos d'une ...

    African Journals Online (AJOL)

    Le syndrome du Cri du Chat (Cri du Chat syndrome, CdCS) est une anomalie chromosomique résultant d'une délétion de taille variable de l'extrémité du bras court du chromosome 5 (5p), incluant une région critique située en p15.2. Il représente une des délétions chromosomiques les plus fréquentes, son incidence dans ...

  20. Look at That! Video Chat and Joint Visual Attention Development among Babies and Toddlers

    Science.gov (United States)

    McClure, Elisabeth R.; Chentsova-Dutton, Yulia E.; Holochwost, Steven J.; Parrott, W. G.; Barr, Rachel

    2018-01-01

    Although many relatives use video chat to keep in touch with toddlers, key features of adult-toddler interaction like joint visual attention (JVA) may be compromised in this context. In this study, 25 families with a child between 6 and 24 months were observed using video chat at home with geographically separated grandparents. We define two types…

  1. Modern Consumer in Cyberspace – Internet and Psychology Approach

    Directory of Open Access Journals (Sweden)

    Jabłońska Marta R.

    2017-02-01

    Full Text Available Online reality becomes a natural environment for nowadays companies. As more and more companies have understand a necessity of their presence in the cyberspace, they still need to learn about complex nature of young people who are becoming customers. The paper aims to present modern consumer from sociological and psychological perspective. First, it describes generations Y, Z, and C and their most common online activities and then concentrates on their behaviors performed online. To reach the aim of the paper, a study has also been conducted to investigate discussed behaviors.

  2. Cyberemotions collective emotions in cyberspace

    CERN Document Server

    2017-01-01

    This first monograph of its kind introduces the reader to fundamental definitions, key concepts and case studies addressing the following issues of rapidly growing relevance for online communities: What are emotions? How do they emerge, how are they transmitted? How can one measure emotional states? What are cyberemotions? When do emotions and cyberemotions become collective phenomena? How can one model emotions and their changes? What role do emotions play for on-line communities? Edited and authored by leading scientists in this field, this book is a comprehensive reference for anyone working on applications of complex systems methods in the social sciences, as well as for social scientists, psychologists, experts in on-line communities and computer scientists. This book provides an excellent overview of the current state-of-art in research on collective emotional interactions mediated by the Internet. It introduces a reader in social phenomena occurring in cyberspace, algorithms needed for automatic sentim...

  3. Cyberspace Human Capital: Building a Cadre Today to Win Tomorrows War

    Science.gov (United States)

    2016-04-28

    U.S. homeland and U.S. vital interests from disruptive or destructive cyber [space] attacks of significant consequence. DoD Strategic Goal #4: Build...and maintain viable cyber [space] options and plan to use those options to control conflict escalation and to shape the conflict environment at all...strategies like cyberspace denial operations, espionage activities and anti-access/area-denial (A2/AD) strategies, turning traditional mass and maneuver

  4. Iran Election, Cyber-Statehood, and the Mass Mediated Fight for Cyberspace

    DEFF Research Database (Denmark)

    Andersen, Rune Saugmann

    2011-01-01

    The 2009 post-election crisis in Iran positioned Iranian unrest on front pages, newscasts, and blogs around the world, spurring intense debate and many attempts to influence the power struggle between Iranian authorities and the ‘green’ dissident movement. This paper explores how international ne...... a battle for the properties and values of cyberspace, struggling over the meaning of free online speech and primacy of states and sovereignty in international relations....

  5. The Current Status and a New Approach for Chinese Doctors to Obtain Medical Knowledge Using Social Media: A Study of WeChat

    Directory of Open Access Journals (Sweden)

    Li Liu

    2018-01-01

    Full Text Available Background. WeChat is the most widely and frequently used mobile social media in China and has profoundly integrated into the daily life of many Chinese people. A variety of medicine-related information may be found on WeChat. As users of WeChat, doctors often access health-related information and even provide a variety of medical services or participate in various types of mobile communication with patients. Objective. This study is the first attempt to quantitatively explore the approaches by doctors of acquiring medical knowledge using Internet resources especially social media such as WeChat to access knowledge. Methods. A self-administered questionnaire was designed, distributed, collected, and analyzed utilizing the online survey tool Sojump. WeChat was adopted to randomly release the questionnaires using snowball sampling and collect the results after a certain amount of time. Results. 292 valid questionnaires out of 314 questionnaires by clinical doctors were analyzed. Regarding the current status of accessing medical knowledge among doctors, more than 60% of the doctors regularly used the Internet to search for medical knowledge, 19.86% used WeChat as a channel to acquire medical knowledge, and only 23.97% were satisfied with acquiring medical knowledge through the Internet. Regarding the frequency of WeChat usage, nearly 40% of the doctors accessed WeChat more than 20 times per day and over 70% used WeChat for over half an hour every day. Regarding the status of accessing medical knowledge through WeChat, nearly half (47.26% of the doctors stated that they often read professional medical articles on WeChat and the most common channel is friends’ moment sharing and public account subscriptions, with selection rates of 59.93% and 60.27%, respectively. The most desirable mode of acquiring medical knowledge through WeChat was the following: “professional medical knowledge from peers, with a reminder.” Conclusion. WeChat has become a

  6. The Changing Physical and Social Environment of Newsgathering: A Case Study of Foreign Correspondents Using Chat Apps During Unrest

    Directory of Open Access Journals (Sweden)

    Valerie Belair-Gagnon

    2017-03-01

    Full Text Available Mobile chat apps have shaped multiple forms of communication in everyday life, including education, family, business, and health communication. In journalism, chat apps have taken on a heightened significance in reporting political unrest, particularly in terms of audience/reporter distinctions, sourcing of information, and community formation. Mobile phones are now essential components in reporters’ everyday communication, and particularly during political unrest. In East Asia, the latest trends point toward private networking apps, such as WeChat and WhatsApp, as the most important digital tools for journalists to interact with sources and audiences in news production. These apps provide a set of private (and, increasingly, encrypted alternatives to open, public-facing social media platforms. This article is the first to examine foreign correspondents’ usage of chat apps for newsgathering during political unrest in China and Hong Kong since the 2014 “Umbrella Movement,” a time when the use of chat apps in newsgathering became widespread. This article identifies and critically examines the salient features of these apps. It then discusses the ways these journalistic interactions on chat apps perpetuate, disrupt, and affect “social” newsgathering. This article argues that chat apps do not represent one interactive space; rather they are hybrid interactions of news production embedded in social practices rather than pre-existing physical/digital spaces. This research is significant as the emergence of chat apps as tools in foreign correspondents’ reporting has implications for journalistic practices in information gathering, storage, security, and interpretation and for the informational cultures of journalism.

  7. Cyberspace and individual: a possible synthesis?

    Directory of Open Access Journals (Sweden)

    Murilo Canella

    2012-05-01

    Full Text Available This study attempts to draw a picture of “liquid-modern” society regarding the extreme relationship exchange and neologism existing among the association forms created from the “solid modernity”. It tries to demonstrate the correlation between the fragmentation of tradition and the emergency for new values which, in its direct confrontation, brought to the humanity an era of new meanings and ongoing processes. From this concept derives the duality between “global” and “local”, submitted to economic, political, social and cultural processes, which in a closer examination shows the confl uence of latent crisis regarding the individual identity, even more oriented by global processes, inserted in an also global and virtual space, cyberspace. It follows, however, the problematic about the loss of individuals humanity by the impersonal logic of consumerism and its infl uence on individual thought.

  8. Social Media–Promoted Weight Loss Among an Occupational Population: Cohort Study Using a WeChat Mobile Phone App-Based Campaign

    Science.gov (United States)

    Zhao, Yingying; Li, Zheng; Zhang, Yanyan; Le, Jia; Wang, Lei; Wan, Siyang; Li, Changqing; Li, Yindong

    2017-01-01

    Background Being overweight and obese are major risk factors for noncommunicable diseases such as cardiovascular diseases. The prevalence of overweight and obesity is high throughout the world and these issues are very serious in the Shunyi District in China. As mobile technologies have rapidly developed, mobile apps such as WeChat are well accepted and have the potential to improve health behaviors. Objective This study aims to evaluate the effectiveness of a mobile app (WeChat) as an intervention on weight loss behavior. Methods This study was conducted among an occupational population from August 2015 to February 2016 in the Shunyi District of Beijing. Before the intervention, the Shunyi District Government released an official document for weight loss to all 134 government agencies and enterprises in Shunyi District. Participants willing to use our official WeChat account were enrolled in a WeChat group and received 6 months of interventions for weight loss; those who were not willing to use the account were in a control group given routine publicity on weight loss. Results In total, 15,310 occupational participants including 3467 participants (22.65%) in the control group and 11,843 participants (77.35%) in the WeChat group were enrolled. Participants in the WeChat group lost more weight (mean 2.09, SD 3.43 kg) than people in the control group (mean 1.78, SD 2.96 kg), and the difference in mean weight loss between the two groups for males was significant based on the stratification of age and educational level. To control for confounding factors and to explore the effects of WeChat on weight loss, the propensity score method with a multinominal logistic regression was utilized. For males, this showed that the WeChat group (with both active and inactive subgroups) had a higher probability of maintaining weight, weight loss from 1 to 2 kg, or weight loss more than 2 kg than the control group. However, the control group had higher probability of weight loss from

  9. Assessing the Language of Chat for Teamwork Dialogue

    Science.gov (United States)

    Shibani, Antonette; Koh, Elizabeth; Lai, Vivian; Shim, Kyong Jin

    2017-01-01

    In technology-enhanced language learning, many pedagogical activities involve students in online discussion such as synchronous chat, in order to help them practice their language skills. Besides developing the language competency of students, it is also crucial to nurture their teamwork competencies for today's global and complex environment.…

  10. Conversation Thread Extraction and Topic Detection in Text-Based Chat

    National Research Council Canada - National Science Library

    Adams, Paige H

    2008-01-01

    Text-based chat systems are widely used within the Department of Defense, but the standard systems available do not provide robust capabilities for search, information retrieval, or information assurance...

  11. Effects of face-to-face versus chat communication on performance in a collaborative inquiry modeling task

    NARCIS (Netherlands)

    Sins, P.H.M.; Savelsbergh, E.R.; van Joolingen, W.R.; van Hout-Wolters, B.H.A.M.

    2011-01-01

    In many contemporary collaborative inquiry learning environments, chat is being used as a means for communication. Still, it remains an open issue whether chat communication is an appropriate means to support the deep reasoning process students need to perform in such environments. Purpose of the

  12. Study on Cyber-security Strategy and National Cyberspace Sovereignty%论网络安全战略与国家网络主权

    Institute of Scientific and Technical Information of China (English)

    邹鹏; 朱诗兵; 邹红霞

    2017-01-01

    While national interests increasingly extending with the development of cyberspace, cyberspace sovereignty and its guarantee have drawn wide attention from international communities and major countries have developed space-security strategy to safeguard their national cyberspace sovereignty.This paper analyzes the relationship between the cyberspace sovereignty and cyber-security as well as summarizes the characteristics of existing cyber-security strategies in the world.In view of protecting our national cyberspace sovereignty, it points out the issues we should pay more attention to in the formulation and implementation of cyber-security strategy which include taking national security as the starting point, taking cyberspace sovereignty as the fundament, perfecting relevant law and regulation systems, improving relevant systems, mechanisms and the support systems, accelerating the development of core technologies in cyber-security and strengthening the cyber-security training.%随着网络空间承载的国家利益日益广泛,网络主权及其保障问题引起了国际社会的高度重视,世界主要国家纷纷通过制定网络安全战略来维护本国网络主权.分析了世界各国对网络主权保护的态度及网络主权与网络安全的关系,综述了世界各国现有网络安全战略的特点.从保护我国国家网络主权的实际需求出发,指出了我国在网络安全战略的制定和实施中应当重点关注的问题,即以总体国家安全观为根本出发点、以网络主权为基本依据、健全相关法律法规体系、健全体制机制和保障力量体系、加快推进网络安全核心技术发展以及加强网络安全人才培养.

  13. Characteristics and Diffusion Model of the Individual Knowledge in the WeChat Mode

    Directory of Open Access Journals (Sweden)

    Zhang Lingzhi

    2017-12-01

    Full Text Available [Purpose/significance] According to the model of the individual knowledge diffusion, we conduct a behavior research and analyze the characteristics of that based on WeChat which is the most popular communication platform in China.[Method/process] By analyzing the methods of the diffusion on WeChat, we analyzed the characteristics of the individual knowledge diffusion. [Result/conclusion]The characteristics of the individual knowledge diffusion include real-time, short-term, speciality, friendship and transmission.

  14. Meatspace is Cyberspace: The Pynchonian Posthuman in Bleeding Edge

    Directory of Open Access Journals (Sweden)

    Jason Siegel

    2016-06-01

    Full Text Available This article examines Thomas Pynchon’s indirect critique of utopian posthumanism in 'Bleeding Edge' by analyzing the deleterious effects that an emerging Internet culture has on the novel’s characters. By seeping into every aspect of their lives, embedding itself in their minds, and becoming a prosthetic consciousness, the Internet has transformed the characters into posthumans and altered their subject positions within a technological global capitalist culture. Contrasting the novel’s take on the posthuman with the posthuman theories of Donna Harraway, N. Katherine Hayles, Robert Pepperell, Rosi Braidotti, David Roden and Seb Franklin, I argue that, while the dominant utopian strain in posthuman theory imagines the advent of posthumanism as an opportunity for liberation from the sexism, racism, and colonial oppression that are enabled by the positing of the classical humanist subject, Pynchon demonstrates that because the Internet technology that brought about the posthuman condition is controlled by governments and corporations, it has become just one more lost chance at freedom that was converted into an instrument of increased control and surveillance. Reading 'Bleeding Edge' against William Gibson’s prototypical posthuman novel Neuromancer, I also contend that while Gibson, despite challenging the ontological primacy of meatspace over cyberspace, keeps the two realms separate, Pynchon, who borrows Gibson’s terms, shows that cyberspace has already merged with meatspace. As a result, Maxine Tarnow, the protagonist of 'Bleeding Edge', has nowhere to run in her attempt to find a provisional refuge for herself and her family.

  15. 推进网络空间核心支援能力建设%Considerations on promoting the building-up of PLA's core supporting capabilities in cyberspace

    Institute of Scientific and Technical Information of China (English)

    柯宏发; 祝冀鲁; 赵荣

    2017-01-01

    从网络空间侦察能力、指挥控制能力、精确攻击能力、防御能力和评估能力等五个方面,对网络空间支援力量的核心支援能力进行了系统论述,提出建设军队网络支援力量、应对网络空间安全威胁的新思考和新观点.研究认为,当前我军在网络空间的安全意识、核心技术、均衡发展等方面面临严峻困难.为实现网络强国的奋斗目标,需要加强国家网络安全的顶层设计,增强网络技术自主创新能力,强化军民融合式建设和系统常态的攻防训练等.%Core supporting capabilities of cyberspace military forces, such as cyberspace reconnaissance, command and control, precise attack, defense and evaluation, are systematically discussed.New considerations and ideas about promoting the building up of PLA's cyberspace supporting forces and encountering security threats in cyberspace are proposed.It is concluded that a lot of difficulties exist in aspects such as security awareness of cyberspace, core technologies and balanced developing.In order to realize the goal of building up a powerful country in cyberspace, emphasis should be laid on enhancing top-level design of national cyber security, independent innovation of cyber technologies, civil-military integration, and systematical and regular attack-and-defense training, etc.

  16. Immunity status of adults and children against poliomyelitis virus type 1 strains CHAT and Sabin (LSc-2ab) in Germany.

    Science.gov (United States)

    Eggers, Maren; Terletskaia-Ladwig, Elena; Rabenau, Holger F; Doerr, Hans W; Diedrich, Sabine; Enders, Gisela; Enders, Martin

    2010-12-09

    In October 2007, the working group CEN/TC 216 of the European Committee for standardisation suggested that the Sabin oral poliovirus vaccine type 1 strain (LSc-2ab) presently used for virucidal tests should be replaced by another attenuated vaccine poliovirus type 1 strain, CHAT. Both strains were historically used as oral vaccines, but the Sabin type 1 strain was acknowledged to be more attenuated. In Germany, vaccination against poliomyelitis was introduced in 1962 using the oral polio vaccine (OPV) containing Sabin strain LSc-2ab. The vaccination schedule was changed from OPV to an inactivated polio vaccine (IPV) containing wild polio virus type 1 strain Mahoney in 1998. In the present study, we assessed potential differences in neutralising antibody titres to Sabin and CHAT in persons with a history of either OPV, IPV, or OPV with IPV booster. Neutralisation poliovirus antibodies against CHAT and Sabin 1 were measured in sera of 41 adults vaccinated with OPV. Additionally, sera from 28 children less than 10 years of age and immunised with IPV only were analysed. The neutralisation assay against poliovirus was performed according to WHO guidelines. The neutralisation activity against CHAT in adults with OPV vaccination history was significantly lower than against Sabin poliovirus type 1 strains (Wilcoxon signed-rank test P Sabin 1 varied between 8 and 64. Following IPV booster, anti-CHAT antibodies increased rapidly in sera of CHAT-negative adults with OPV history. Sera from children with IPV history neutralised CHAT and Sabin 1 strains equally. The lack of neutralising antibodies against the CHAT strain in persons vaccinated with OPV might be associated with an increased risk of reinfection with the CHAT polio virus type 1, and this implies a putative risk of transmission of the virus to polio-free communities. We strongly suggest that laboratory workers who were immunised with OPV receive a booster vaccination with IPV before handling CHAT in the laboratory.

  17. CHAT 2013: Experience, University College London, 8–10 November 2013

    Directory of Open Access Journals (Sweden)

    Colin Philip Sterling

    2013-11-01

    Full Text Available For ten years now CHAT (Contemporary and Historical Archaeology in Theory has set out to challenge assumptions around the archaeology of the recent past with a series of thought provoking thematic conferences. This year, the 11th  annual CHAT Conference was held at University College London and jointly organised by the Institute of Archaeology and Atkins,1  with a broad focus on the topic of ‘experience.’ Over three days, established academics, early career researchers and practicing heritage professionals from across the world offered up their take on this sometimes nebulous theme. The results were - in turn - captivating, frustrating, enlightening and provocative, but never boring.

  18. Weibo or WeChat? Assessing Preference for Social Networking Sites and Role of Personality Traits and Psychological Factors

    Science.gov (United States)

    Hou, Juan; Ndasauka, Yamikani; Pan, Xuefei; Chen, Shuangyi; Xu, Fei; Zhang, Xiaochu

    2018-01-01

    Research trying to understand individual difference in the use of different social networking sites (SNSs) is minimal. In the present study, we collected data from 714 college students in China (273 males) to assess how personality traits and psychological factors relate to excessive use of WeChat and Weibo. We found that excessive use of Weibo and WeChat correlated positively with neuroticism, loneliness, and external locus of control and negatively with agreeableness, social support, and social interaction. Furthermore, people that scored high on loneliness, lack of social support, and poor social interaction skills excessively used Weibo more than WeChat. These results entail that by fulfilling different needs, WeChat and Weibo attract different kinds of people; significant lesson for future development of SNSs. PMID:29755384

  19. Weibo or WeChat? Assessing Preference for Social Networking Sites and Role of Personality Traits and Psychological Factors.

    Science.gov (United States)

    Hou, Juan; Ndasauka, Yamikani; Pan, Xuefei; Chen, Shuangyi; Xu, Fei; Zhang, Xiaochu

    2018-01-01

    Research trying to understand individual difference in the use of different social networking sites (SNSs) is minimal. In the present study, we collected data from 714 college students in China (273 males) to assess how personality traits and psychological factors relate to excessive use of WeChat and Weibo. We found that excessive use of Weibo and WeChat correlated positively with neuroticism, loneliness, and external locus of control and negatively with agreeableness, social support, and social interaction. Furthermore, people that scored high on loneliness, lack of social support, and poor social interaction skills excessively used Weibo more than WeChat. These results entail that by fulfilling different needs, WeChat and Weibo attract different kinds of people; significant lesson for future development of SNSs.

  20. Cyberspace 101: taking a ride on the information superhighway.

    Science.gov (United States)

    Hayes, D; Forsell, G; Hansen, K; Homer-Trobaugh, J

    1997-10-01

    All you need to explore cyberspace is a computer, a modem, a phone line, and a local "on-ramp" to the infohighway. A litserv is an interactive mailing list that distributes information to a large number of people at the same time. Once you subscribe, you receive copies of all messages sent into listserv and have the opportunity to post questions and comments for other subscribers. Dietetics Online: A Network of Dietetic/Nutrition Professionals offers a range of cutting-edge services. Online marketing can reach a potentially larger audience for a fraction of the cost of traditional means and expand your business geographically.

  1. Estimation of volume and mass and of changes in volume and mass of selected chat piles in the Picher mining district, Ottawa County, Oklahoma, 2005-10

    Science.gov (United States)

    Smith, S. Jerrod

    2013-01-01

    From the 1890s through the 1970s the Picher mining district in northeastern Ottawa County, Oklahoma, was the site of mining and processing of lead and zinc ore. When mining ceased in about 1979, as much as 165–300 million tons of mine tailings, locally referred to as “chat,” remained in the Picher mining district. Since 1979, some chat piles have been mined for aggregate materials and have decreased in volume and mass. Currently (2013), the land surface in the Picher mining district is covered by thousands of acres of chat, much of which remains on Indian trust land owned by allottees. The Bureau of Indian Affairs manages these allotted lands and oversees the sale and removal of chat from these properties. To help the Bureau of Indian Affairs better manage the sale and removal of chat, the U.S. Geological Survey, in cooperation with the Bureau of Indian Affairs, estimated the 2005 and 2010 volumes and masses of selected chat piles remaining on allotted lands in the Picher mining district. The U.S. Geological Survey also estimated the changes in volume and mass of these chat piles for the period 2005 through 2010. The 2005 and 2010 chat-pile volume and mass estimates were computed for 34 selected chat piles on 16 properties in the study area. All computations of volume and mass were performed on individual chat piles and on groups of chat piles in the same property. The Sooner property had the greatest estimated volume (4.644 million cubic yards) and mass (5.253 ± 0.473 million tons) of chat in 2010. Five of the selected properties (Sooner, Western, Lawyers, Skelton, and St. Joe) contained estimated chat volumes exceeding 1 million cubic yards and estimated chat masses exceeding 1 million tons in 2010. Four of the selected properties (Lucky Bill Humbah, Ta Mee Heh, Bird Dog, and St. Louis No. 6) contained estimated chat volumes of less than 0.1 million cubic yards and estimated chat masses of less than 0.1 million tons in 2010. The total volume of all

  2. Social Media-Promoted Weight Loss Among an Occupational Population: Cohort Study Using a WeChat Mobile Phone App-Based Campaign.

    Science.gov (United States)

    He, Chao; Wu, Shiyan; Zhao, Yingying; Li, Zheng; Zhang, Yanyan; Le, Jia; Wang, Lei; Wan, Siyang; Li, Changqing; Li, Yindong; Sun, Xinying

    2017-10-23

    Being overweight and obese are major risk factors for noncommunicable diseases such as cardiovascular diseases. The prevalence of overweight and obesity is high throughout the world and these issues are very serious in the Shunyi District in China. As mobile technologies have rapidly developed, mobile apps such as WeChat are well accepted and have the potential to improve health behaviors. This study aims to evaluate the effectiveness of a mobile app (WeChat) as an intervention on weight loss behavior. This study was conducted among an occupational population from August 2015 to February 2016 in the Shunyi District of Beijing. Before the intervention, the Shunyi District Government released an official document for weight loss to all 134 government agencies and enterprises in Shunyi District. Participants willing to use our official WeChat account were enrolled in a WeChat group and received 6 months of interventions for weight loss; those who were not willing to use the account were in a control group given routine publicity on weight loss. In total, 15,310 occupational participants including 3467 participants (22.65%) in the control group and 11,843 participants (77.35%) in the WeChat group were enrolled. Participants in the WeChat group lost more weight (mean 2.09, SD 3.43 kg) than people in the control group (mean 1.78, SD 2.96 kg), and the difference in mean weight loss between the two groups for males was significant based on the stratification of age and educational level. To control for confounding factors and to explore the effects of WeChat on weight loss, the propensity score method with a multinominal logistic regression was utilized. For males, this showed that the WeChat group (with both active and inactive subgroups) had a higher probability of maintaining weight, weight loss from 1 to 2 kg, or weight loss more than 2 kg than the control group. However, the control group had higher probability of weight loss from 0 to 1 kg. Being active in WeChat was

  3. NUEVO ESCENARIO DE SOCIALIZACIÓN DEL LENGUAJE: EL CHAT Y LOS ADOLESCENTES

    Directory of Open Access Journals (Sweden)

    Claudia Julieta Galera

    2010-01-01

    Full Text Available Este trabajo es parte de un proyecto de investigación denominado “Las Nuevas Tecnologías de Información y Comunicación y sus efectos en el lenguaje escrito de los adolescentes”.Los objetivos que intentaremos develar a través de esta investigación son: analizar el lenguaje escrito derivado del uso del chat como fenómeno cultural emergente; indagar si el lenguaje derivado del uso del chat es la expresión de una nueva forma de percibir, de comunicar y de concebir el mundo; caracterizar al lenguaje escrito emergente por el uso y apropiación de las TICs por parte de los adolescentes.La elección del tema fue motivada por la amplia difusión y discusión que existía sobre los problemas o consecuencias por el uso del chat en el lenguaje escrito de los adolescentes debido a la existencia de prejuicios ampliamente difundidos sobre este problema en el mundo académico y en el ámbito escolar en particular.

  4. Bla-bla-bla: video chat service on the Internet - a market feasibility study

    OpenAIRE

    Lindgreen, Adam; Antioco, Michael; Wetzels, Martin

    2004-01-01

    The Internet is changing the way that companies carry out their business and, in fact, constitutes an entirely new application domain, which makes product innovation possible. Moreover, it is a new medium for reaching consumers, which is a central preoccupation to organisations in the current business market. Here interest lies in video chatting on the Internet. This is a type of service that adds video support to chatting using a Web cam and is gradually attracting more Internet users. The p...

  5. Collective emotion dynamics in chats with agents, moderators and Bots

    Directory of Open Access Journals (Sweden)

    M. Šuvakov

    2014-09-01

    Full Text Available Using agent-directed simulations, we investigate fluctuations in the collective emotional states on a chat network where agents interchange messages with a fixed number of moderators and emotional Bot. To design a realistic chat system, the interaction rules and some statistical parameters, as well as the agent's attributes, are inferred from the empirical chat channel Ubuntu. In the simulations, the Bot's emotion is fixed; the moderators tune the level of its activity by passing a fraction ε of messages to the Bot. At ε ≥ 0, the collective emotional state matching the Bot's emotion polarity gradually arises; the average growth rate of the dominant emotional charge serves as an order parameter. Due to self-organizing effects, the collective dynamics is more explosive when positive emotions arise by positive Bot than the onset of negative emotions in the presence of negative Bot at the same ε. Furthermore, when the emotions matching the Bot's emotion polarity are spread over the system, the underlying fractal processes exhibit higher persistence and stronger clustering of events than the processes spreading of emotion polarity opposite to the Bot's emotion. On the other hand, the relaxation dynamics is controlled by the external noise; the related nonextensive parameter, estimated from the statistics of returns, is virtually independent of the Bot's activity level and emotion contents.

  6. Information and Communication Technologies – and Culturally Sensitive Systems

    Directory of Open Access Journals (Sweden)

    Nancy Michail

    2006-12-01

    Full Text Available This paper discusses the perceptions of Egyptian minority groups in relation to internet information technology with which they feel empowered to protect, affirm and communicate their oppressed existence, on local and global dimensions. The research employs qualitative methods and interpretive analysis, to focus on the use of Internet information technology tools by Egyptian minority groups, in particular, their online platforms and chat rooms, and the related issues associated with these practices and usages. The paper argues that cyberspace is used by specific minority groups in Egypt as a "gateway to freedom" in which it constitutes an ally to establish newly founded cyber identities that aide them to exercise their basic human rights of freedom of thought, speech and expression. The paper thus examines cyberspace a medium or tool for the carrying out of information exchange without the traditional fear of politics and power that is deeply engraved in the roots of the Egyptian culture. In this way, these minority groups are analysed as the newly conceived human information systems (HIS residing on Internet information technology and infrastructure. The paper proposes an adaptive and culturally sensitive model of human information systems as well as human information systems development life cycle (HISDLC to aid in establishing effective processes of information exchange and creation, hence assisting in the emancipation of conflicting parties residing in Egypt, elsewhere in the Middle East and globally.

  7. Weibo or WeChat? Assessing Preference for Social Networking Sites and Role of Personality Traits and Psychological Factors

    Directory of Open Access Journals (Sweden)

    Juan Hou

    2018-04-01

    Full Text Available Research trying to understand individual difference in the use of different social networking sites (SNSs is minimal. In the present study, we collected data from 714 college students in China (273 males to assess how personality traits and psychological factors relate to excessive use of WeChat and Weibo. We found that excessive use of Weibo and WeChat correlated positively with neuroticism, loneliness, and external locus of control and negatively with agreeableness, social support, and social interaction. Furthermore, people that scored high on loneliness, lack of social support, and poor social interaction skills excessively used Weibo more than WeChat. These results entail that by fulfilling different needs, WeChat and Weibo attract different kinds of people; significant lesson for future development of SNSs.

  8. Effects of Face-to-Face versus Chat Communication on Performance in a Collaborative Inquiry Modeling Task

    Science.gov (United States)

    Sins, Patrick H. M.; Savelsbergh, Elwin R.; van Joolingen, Wouter R.; van Hout-Wolters, Bernadette H. A. M.

    2011-01-01

    In many contemporary collaborative inquiry learning environments, chat is being used as a means for communication. Still, it remains an open issue whether chat communication is an appropriate means to support the deep reasoning process students need to perform in such environments. Purpose of the present study was to compare the impact of chat…

  9. Color Visions from the Past in Science Teaching within a Cultural Historical Activity Theory (CHAT) Context

    Science.gov (United States)

    Kolokouri, Eleni; Plakitsi, Katerina

    2012-01-01

    This study uses history of science in teaching natural sciences from the early grades. The theoretical framework used is Cultural Historical Activity Theory (CHAT), which is a theory with expanding applications in different fields of science. The didactical scenario, in which history of science is used in a CHAT context, refers to Newton's…

  10. GOOF: OCTOPUS error messages, ORDER, ORDERLIB, FLOE, CHAT, and LOD

    Energy Technology Data Exchange (ETDEWEB)

    Whitten, G.

    1977-07-10

    This is a compilation of the error messages returned by five parts of the Livermore timesharing system: the ORDER batch-processor, the ORDERLIB subroutine library, the FLOE operating system, the CHAT compiler, and the LOD loader.

  11. WeChat Public Account Use Improves Clinical Control of Cough-Variant Asthma: A Randomized Controlled Trial.

    Science.gov (United States)

    Cao, Yuan; Lin, Shi-Hua; Zhu, Ding; Xu, Feng; Chen, Zhi-Hua; Shen, Hua-Hao; Li, Wen

    2018-03-14

    BACKGROUND WeChat is a convenient and popular social medium, and it seems to be an appropriate platform for education and management of patients. This study sought to identify usefulness in clinical control of cough-variant asthma (CVA). MATERIAL AND METHODS A randomized controlled trial was conducted among 80 CVA patients. After being assigned to either the traditional group (TG) or the WeChat group (WG), they received the same inhalation therapy, but patients in WG received additional education and instruction via our public account on the WeChat application. Questionnaires on asthma and chronic cough, data on pulmonary function, blood-related items, follow-up adherence, and Emergency Department (ED) visits were collected at the initial visit and at 3 months. RESULTS A total of 67 participants completed the trial for analysis. FEV1/predicted and FEV1/FVC were significantly increased in WG (pWeChat as part of treatment and management of CVA can help patients learn about their disease and medications, as well as improve disease control and therapy outcomes.

  12. 77 FR 49059 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel CHAT DE MER; Invitation for...

    Science.gov (United States)

    2012-08-15

    ... Administrative Waiver of the Coastwise Trade Laws: Vessel CHAT DE MER; Invitation for Public Comments AGENCY....gov . SUPPLEMENTARY INFORMATION: As described by the applicant the intended service of the vessel CHAT... Francisco Bay. Geographic Region: ``California.'' The complete application is given in DOT docket MARAD-2012...

  13. Perfume formulation: words and chats.

    Science.gov (United States)

    Ellena, Céline

    2008-06-01

    What does it mean to create fragrances with materials from chemistry and/or from nature? How are they used to display their characteristic differences, their own personality? Is it easier to create with synthetic raw materials or with essential oils? This review explains why a perfume formulation corresponds in fact to a conversation, an interplay between synthetic and natural perfumery materials. A synthetic raw material carries a single information, and usually is very linear. Its smell is uniform, clear, and faithful. Natural raw materials, on the contrary, provide a strong, complex and generous image. While a synthetic material can be seen as a single word, a natural one such as rose oil could be compared to chatting: cold, warm, sticky, heavy, transparent, pepper, green, metallic, smooth, watery, fruity... full of information. Yet, if a very small amount of the natural material is used, nothing happens, the fragrance will not change. However, if a large amount is used, the rose oil will swallow up everything else. The fragrance will smell of nothing else except rose! To formulate a perfume is not to create a culinary recipe, with only dosing the ingredients in well-balanced amounts. To formulate rather means to flexibly knit materials together with a lively stitch, meeting or repelling each other, building a pleasant form, which is neither fixed, nor solid, nor rigid. A fragrance has an overall structure, which ranges from a clear sound, made up of stable, unique, and linear items, to a background chat, comfortable and reassuring. But that does, of course, not mean that there is only one way of creating a fragrance!

  14. Extending IM beyond the Reference Desk: A Case Study on the Integration of Chat Reference and Library-Wide Instant Messaging Network

    Directory of Open Access Journals (Sweden)

    Ian Chan

    2012-09-01

    Full Text Available Openfire is an open source IM network and a single unified application that meets the needs of chat reference and internal communications. In Fall 2009, the California State University San Marcos (CSUSM Library began use of Openfire and other Jive software instant messaging technologies, to simultaneously improve our existing IM-integrated chat reference software and implement an internal IM network. This case study describes the chat reference and internal communications environment at the CSUSM Library and the selection, implementation, and evaluation of Openfire. In addition, the authors discuss the benefits of deploying an integrated instant messaging and chat reference network.

  15. Differences in Brand Image of Online Chat Application of Blackberry Messenger, Whatsapp, and Line for Bina Nusantara University’s Student

    Directory of Open Access Journals (Sweden)

    Kuspuji C. B. Wicaksono

    2016-05-01

    Full Text Available This article was written to find out whether there were any differences on brand image for each online chat Application such as Blackberry Messenger, Whatsapp, and LINE based on six factors of the brand image which are: benefits, attributes, cultures, values, personality, and user. Data for the research were collected from questionnaires given to respondents who had used each mention online chat application. Then each respondent was asked to give scores based on the six factors of brand image for each online chat Application. Using the ANOVA method for testing the differences between brand images for each online chat application. The result reveales that there are differences in the brand image between BlackBerry Messenger, Whatsapp, and LINE for benefits, cultures, and values. There is no difference in attributes, and personality cannot be tested. The company that creates online chat application are expected to improve their brand image to distinguish one another differently.

  16. Effects of using WeChat-assisted perioperative care instructions for parents of pediatric patients undergoing day surgery for herniorrhaphy.

    Science.gov (United States)

    Liu, Jun; Zheng, Xin; Chai, Shouxia; Lei, Meirong; Feng, Zehui; Zhang, Xuelin; Lopez, Violeta

    2018-02-19

    This study examined the effects of WeChat-assisted perioperative instructions for parents whose children were to undergo herniorrhaphy. A randomized controlled trial was conducted in a day surgery center in China. Participants were randomly assigned to the intervention (WeChat) group (n = 209) and the control (Leaflet) group (n = 209). The primary outcomes of this study were parents' knowledge regarding hernia and rate of cancellation of children's surgery. The secondary outcomes were the rate of lost-to-follow-up and the rate of complications and adverse events during the seventh postoperative follow-up day. There was a significant difference in the rate of cancelling the surgery and the mean knowledge score between the WeChat group and leaflet groups. The lost-to-follow-up rate was significantly lower in the WeChat group (0.54%) than in the leaflet group (3.66%). The incidence of postoperative complications were higher in the control group. WeChat-assisted perioperative care instructions enhanced parents' knowledge on perioperative instructions and promoted the preparation of their children for day surgery resulting in lower rate of cancelling the surgery. WeChat has the ability to expand health services outside the hospital confines and could be used as an important low-cost health educational medium in China. Copyright © 2018 Elsevier B.V. All rights reserved.

  17. Chat educacional em enfermagem: possibilidades de interação no meio virtual

    Directory of Open Access Journals (Sweden)

    Ana Paula Scheffer Schell da Silva

    2011-10-01

    Full Text Available Pesquisa documental com abordagem qualitativa do tipo estudo de caso, que analisou os diálogos produzidos por alunos de Enfermagem em um contexto mediado por chat educacional em Ambiente Virtual de Aprendizagem (AVA. Os dados constituíram-se de oito discussões promovidas por alunos, professores e monitores da Escola de Enfermagem da Universidade Federal do Rio Grande do Sul no chat do AVA TelEduc® sobre a atividade denominada Cliente Virtual. Para a categorização dos dados, utilizou-se o software NVivo®; e para a análise das informações, a técnica de Análise de Conteúdo. Os resultados revelaram sentimentos como ansiedade, medo e motivação perante a prática hospitalar, bem como o posicionamento dicotômico dos alunos frente à atividade proposta: alguns gostaram das discussões virtuais, enquanto outros preferiram as presenciais. O artigo apresenta recomendações para o uso de chat educacional no ensino de Enfermagem.

  18. Chatting, Chatten or Chattare: Using a Multilingual Workspace for Language and Culture Learning

    Directory of Open Access Journals (Sweden)

    Ursula Stickler

    2008-12-01

    Full Text Available This paper will describe the results of analyses carried out on multilingual chat sessions that took place in the context of LITERALIA, a 24-months long project funded by the European Union’s Grundtvig initiative to support: “Learning In Tandem to Encourage Reciprocal Autonomous Learning In Adults - LITERALIA”. An online workspace was created for the project that allowed learners to communicate with others in four different countries and to enhance their linguistic and cultural competence in four European languages: English, German, Italian, and Polish. Participation in the chat was voluntary and took place in an integrated Moodle workspace.

  19. Designing a large-scale video chat application

    OpenAIRE

    Scholl, Jeremiah; Parnes, Peter; McCarthy, John D.; Sasse, Angela

    2005-01-01

    Studies of video conferencing systems generally focus on scenarios where users communicate using an audio channel. However, text chat serves users in a wide variety of contexts, and is commonly included in multimedia conferencing systems as a complement to the audio channel. This paper introduces a prototype application which integrates video and text communication, and describes a formative evaluation of the prototype with 53 users in a social setting. We focus the evaluation on bandwidth an...

  20. Modelling of information diffusion on social networks with applications to WeChat

    Science.gov (United States)

    Liu, Liang; Qu, Bo; Chen, Bin; Hanjalic, Alan; Wang, Huijuan

    2018-04-01

    Traces of user activities recorded in online social networks open new possibilities to systematically understand the information diffusion process on social networks. From the online social network WeChat, we collected a large number of information cascade trees, each of which tells the spreading trajectory of a message/information such as which user creates the information and which users view or forward the information shared by which neighbours. In this work, we propose two heterogeneous non-linear models, one for the topologies of the information cascade trees and the other for the stochastic process of information diffusion on a social network. Both models are validated by the WeChat data in reproducing and explaining key features of cascade trees. Specifically, we apply the Random Recursive Tree (RRT) to model the growth of cascade trees. The RRT model could capture key features, i.e. the average path length and degree variance of a cascade tree in relation to the number of nodes (size) of the tree. Its single identified parameter quantifies the relative depth or broadness of the cascade trees and indicates that information propagates via a star-like broadcasting or viral-like hop by hop spreading. The RRT model explains the appearance of hubs, thus a possibly smaller average path length as the cascade size increases, as observed in WeChat. We further propose the stochastic Susceptible View Forward Removed (SVFR) model to depict the dynamic user behaviour including creating, viewing, forwarding and ignoring a message on a given social network. Beside the average path length and degree variance of the cascade trees in relation to their sizes, the SVFR model could further explain the power-law cascade size distribution in WeChat and unravel that a user with a large number of friends may actually have a smaller probability to read a message (s)he receives due to limited attention.

  1. Afrikaans-English code switching on internet relay chat (IRC)

    African Journals Online (AJOL)

    The data examined in this paper consist of logs of IRC interactions in public IRC channels on irc.sun.ac.za (the Stellenbosch University IRC server) and logs of interaction on local hubs in DC++ (a file-sharing application that allows for synchronous chatting). Southern African Linguistics and Applied Language Studies 2008, ...

  2. Investigating the Building of a WeChat-Based Community of Practice for Language Teachers' Professional Development

    Science.gov (United States)

    Qi, Grace Yue; Wang, Yuping

    2018-01-01

    This study explores the process of Community of Practice (CoP) building for language teachers' professional development through the support of a WeChat group. WeChat is an instant messenger app that provides a multimodal platform for one-on-one and group interactions through text, audio and video. In order to support the implementation of flipped…

  3. “Why Caipirinha?”- The Online via Chat Laddering Technique CAN Answer

    Directory of Open Access Journals (Sweden)

    Bruno Bordeaux-Rego

    2011-04-01

    Full Text Available As customers are becoming increasingly connected to the internet, this means that they are available for online interviews, thus opening up a space for investigating research methods, especially qualitative research, in an attempt to identify how to adapt data collecting instruments to the so-called “connected customer era”. In this context, the focus of this article is on the application viability analysis of the laddering technique used online and in real-time chat by asking the following question: “Why caipirinha?”. Conducting online in-depth interviews through the MSN Messenger and Skype (the most commonly used chat tools in Brazil, 23 attributes, 22 consequences and 13 values were identified, resulting in 133 ladders, 71 of which reached the value level. Along with friends/mates, Integration, Entertainment and Fun, in addition to Alcohol, Insouciance/ relaxation and Pleasure constitute the most frequent ladders. Concerning the application itself, the participants gave positive feedback, even though some of them did not feel satisfied because they became tired. Convenience, objectivity, disinhibition, easy scheduling and flexibility were identified. The viability of online in-depth interviewing via real-time chats was confirmed, raising the question of the possibility of it achieving other qualitative research techniques.

  4. Mobile Chatting Behaviour of Arts and Science College Students

    Science.gov (United States)

    Ramakrishnan, N.; Priya, J. Johnsi

    2016-01-01

    Mobile connectivity is the order of the day. Personas irrespective of their socio-economic status possess mobile device either basic or advanced android or windows or IOS. The chat applications have become popular with younger generation. It has started trickling down to children below the age of eighteen. The behaviour has influenced the aged…

  5. Technical Evaluation Report 6: Chat and Instant Messaging Systems

    Directory of Open Access Journals (Sweden)

    Jennifer Stein

    2002-04-01

    Full Text Available Text-based conferencing can be both asynchronous (i.e., participants log into the conference at separate times, and synchronous (i.e., interaction takes place in real time. It is thus subject to the same wide variation as the online audio- and video-conferencing methods (see the earlier Reports in this series. Synchronous text-based approaches (e.g., online chat groups and instant messaging systems are highly popular among online users generally owing to their ability to bring together special-interest groups from around the world without cost. In distance education (DE, however, synchronous chat methods are less widely used, owing in part to the problems of arranging for working adults in different time zones to join a discussion group simultaneously. Instant text messaging is more popular among DE users in view of the choice it provides between responding to a message immediately (synchronous communication or after a delay (asynchronous. The different synchronous and asynchronous approaches are likely to become more widely used in parallel with one another, as they are integrated in individual product packages.

  6. A Comparative study on the clinical application of Modified Checklist for Autism in Toddlers (M-CHAT) and Checklist for Autism in Toddlers (CHAT)%改良婴幼儿孤独症量表与婴幼儿孤独症量表临床应用比较

    Institute of Scientific and Technical Information of China (English)

    沈继英; 柯晓燕; 肖婷; 肖湘; 肖舟; 邹冰; 梁凤晶; 邱婷; 王晨阳; 王民洁

    2012-01-01

    Objective: To compare the application of Modified Checklist for Autism in Toddlers (M-CHAT) and that of Checklist for Autism in Toddlers (CHAT) in the clinical screening. Methods: Sixty-nine children with pervasive developmental disorders (PDDs) according to the Diagnostic and Statistical Manual of Mental Disorders-IV( DSM-IV-TR) criterion and 32 age- and gender-matched children with other developmental disorder were included. All subjects were evaluated with M-CHAT and CHAT. Results: The sensitivity of M-CHAT was higher than that of CHAT (0.99 vs. 0.81, P 0.05), and no significant difference between the positive screening result of M-CHAT and that of CHAT (P >0.05) ; but in the children aged 24-36 months, there was significant difference between the positive screening result of M-CHAT and the gold standard [(72/5) vs. (51/26), P 0.05). Conclusion: It suggests that the sensitivity of M-CHAT is higher than that of CHAT, and it is a promising screening instrument for PDDs in normal toddlers. Applying in the clinic of child developmental disorder, the screening results of CHAT ate consistent with clinical diagnosis.%目的:比较改良婴幼儿孤独症量表(M-CHAT)与婴幼儿孤独症量表(CHAT)在广泛性发育障碍( PDDs)儿童的早期筛查中的适用性.方法:对69例符合美国精神障碍诊断和统计手册第4版(DSM-Ⅳ-TR)诊断标准的广泛性发育障碍儿童(PDDs组),和年龄、性别匹配的32名其他发育障碍儿童(对照组),同时运用M-CHAT和CHAT对被试进行临床评估,比较两种工具在临床筛查时的差异.结果:M-CHAT的灵敏度高于CHAT (0.99 vs.0.81,P<0.01);而特异度则低于CHAT (0.16 vs.0.51,P<0.01).两种工具筛查阳性人数和阴性人数不一致[(95/6) vs.(72/29),P<0.05].年龄分层比较,在24月以下儿童中M-CHAT阳性数(17/0)和CHAT阳性数(15/2)均与临床诊断(12/5)一致;在36月以上儿童中,M-CHAT阳性数(6/1)和CHAT阳性数(3/4)均与临床诊断(6/1)

  7. Improv Chat: Second Response Generation for Chatbot

    OpenAIRE

    Wei, Furu

    2018-01-01

    Existing research on response generation for chatbot focuses on \\textbf{First Response Generation} which aims to teach the chatbot to say the first response (e.g. a sentence) appropriate to the conversation context (e.g. the user's query). In this paper, we introduce a new task \\textbf{Second Response Generation}, termed as Improv chat, which aims to teach the chatbot to say the second response after saying the first response with respect the conversation context, so as to lighten the burden ...

  8. Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications

    Science.gov (United States)

    2014-10-01

    testimony before the Sen - ate Armed Service Committee in March 2011. In fact, his statement that “the next Pearl Harbor we confront 5 could very well...in Military Domains. The dynamic nature of cyberspace adds more con- ceptual hurdles for decisionmakers trying to make sense of activities. The...severity of the incident as well as the appropriateness, necessity, and urgency to respond? Legal Frameworks. The purpose here is to describe what exists

  9. Internet Communication Disorder and the structure of the human brain: initial insights on WeChat addiction.

    Science.gov (United States)

    Montag, Christian; Zhao, Zhiying; Sindermann, Cornelia; Xu, Lei; Fu, Meina; Li, Jialin; Zheng, Xiaoxiao; Li, Keshuang; Kendrick, Keith M; Dai, Jing; Becker, Benjamin

    2018-02-01

    WeChat represents one of the most popular smartphone-based applications for communication. Although the application provides several useful features that simplify daily life, a growing number of users spend excessive amounts of time on the application. This may lead to interferences with everyday life and even to addictive patterns of use. In the context of the ongoing discussion on Internet Communication Disorder (ICD), the present study aimed to better characterize the addictive potential of communication applications, using WeChat as an example, by examining associations between individual variations in tendencies towards WeChat addiction and brain structural variations in fronto-striatal-limbic brain regions. To this end levels of addictive tendencies, frequency of use and structural MRI data were assessed in n = 61 healthy participants. Higher tendencies towards WeChat addiction were associated with smaller gray matter volumes of the subgenual anterior cingulate cortex, a key region for monitoring and regulatory control in neural networks underlying addictive behaviors. Moreover, a higher frequency of the paying function was associated with smaller nucleus accumbens volumes. Findings were robust after controlling for levels of anxiety and depression. The present results are in line with previous findings in substance and behavioral addictions, and suggest a similar neurobiological basis in ICD.

  10. Genetic variants in the choline acetyltransferase (ChAT) gene are modestly associated with normal cognitive function in the elderly

    DEFF Research Database (Denmark)

    Mengel-From, J; Christensen, K; Thinggaard, M

    2011-01-01

    Genetic variants in the choline acetyltransferase (ChAT) gene have been suggested as risk factors for neurodegenerative Alzheimer's disease (AD). Here we tested the importance of genetic variants in the ChAT gene in normal cognitive function of elderly in a study sample of Danish twins...... and singletons (N = 2070). The ChAT rs3810950 A allele, which has been associated with increased risk for AD, was found to be associated with a decrease cognitive status evaluated by a five-component cognitive composite score [P = 0.03, regression coefficient -0.30, 95% confidence interval (CI) -0.57 to -0...

  11. Information Cyberspace and Future Cyber Homes

    Directory of Open Access Journals (Sweden)

    Eduard Babulak

    2006-04-01

    Full Text Available The current Internet combines very complex communications infrastructures, while connecting users globally and at the same time creating information cyberspace systems. Large companies such as Philips are working on communications technologies that will facilitate fully automated households (i.e., Cyber Homes. Today, people are using are using small digital pagers and phones with embedded computers and displays, palm-size computers such as Palm Pilot, notebook-size panel computers and wall-size displays. Current research and development trends in the field of Telecommunications and computing industries continues towards a human centric computing, smart spaces, smart devices, clothing, fully automated houses etc. This new technology creates environment where computers are everywhere and provide online access to information at any time to anyone. In this paper, the author discusses new technological trends directions in the Internet, E-commerce and Automation Industries, while presenting his own vision on application of ubiquitous computing in the future cyber home automation. In support of creating future fully automated cyber homes, the author promotes creation of interdisciplinary and multinational research and development teams world-wide.

  12. Immunity status of adults and children against poliomyelitis virus type 1 strains CHAT and Sabin (LSc-2ab in Germany

    Directory of Open Access Journals (Sweden)

    Diedrich Sabine

    2010-12-01

    Full Text Available Abstract Background In October 2007, the working group CEN/TC 216 of the European Committee for standardisation suggested that the Sabin oral poliovirus vaccine type 1 strain (LSc-2ab presently used for virucidal tests should be replaced by another attenuated vaccine poliovirus type 1 strain, CHAT. Both strains were historically used as oral vaccines, but the Sabin type 1 strain was acknowledged to be more attenuated. In Germany, vaccination against poliomyelitis was introduced in 1962 using the oral polio vaccine (OPV containing Sabin strain LSc-2ab. The vaccination schedule was changed from OPV to an inactivated polio vaccine (IPV containing wild polio virus type 1 strain Mahoney in 1998. In the present study, we assessed potential differences in neutralising antibody titres to Sabin and CHAT in persons with a history of either OPV, IPV, or OPV with IPV booster. Methods Neutralisation poliovirus antibodies against CHAT and Sabin 1 were measured in sera of 41 adults vaccinated with OPV. Additionally, sera from 28 children less than 10 years of age and immunised with IPV only were analysed. The neutralisation assay against poliovirus was performed according to WHO guidelines. Results The neutralisation activity against CHAT in adults with OPV vaccination history was significantly lower than against Sabin poliovirus type 1 strains (Wilcoxon signed-rank test P Conclusion The lack of neutralising antibodies against the CHAT strain in persons vaccinated with OPV might be associated with an increased risk of reinfection with the CHAT polio virus type 1, and this implies a putative risk of transmission of the virus to polio-free communities. We strongly suggest that laboratory workers who were immunised with OPV receive a booster vaccination with IPV before handling CHAT in the laboratory.

  13. Online chats: A strategy to enhance learning in large classes ...

    African Journals Online (AJOL)

    Online-supported teaching and learning is a technological innovation in education that integrates face-to-face teaching in plenary lectures, with an online component using a learning management system. This extends opportunities to students to interact with one another via online chats in the process of transacting their ...

  14. Analysis of innovation diffusion theory under “micro” environment - Survey analysis of application and promotion of WeChat among the youth group

    Directory of Open Access Journals (Sweden)

    Wei Chen

    2016-01-01

    Full Text Available Since WeChat has been launched in 2011, as of the first quarter of 2015, the active users have reached 549 million per month1. WeChat has become the largest mobile instant messaging software among the user groups in Asia. Therefore, WeChat is no longer “micro”, and grabs the attention of more youth groups by virtue of the “micro” advantages in the Internet era in a way of low-priced new media. Through sorting 192 effective questionnaires recovered, this paper summarizes some transmitting tendency and suggestions of “micro” innovation diffusion from the research view of the concept of innovation diffusion theory, and development stage of WeChat in the youth group, based on the survey data and by the use of the statistics of informatics, qualitative and quantitative analysis method, so as to provide a certain theoretical basis for the future research of WeChat.

  15. Adapting Unconventional Warfare Doctrine to Cyberspace Operations: An Examination of Hacktivist Based Insurgencies

    Science.gov (United States)

    2015-06-12

    Agency by Edward Snowden exposed only intelligence collection activities, and not means and methods of cyberspace operations under Title 10 and Joint...Kopstein, Joshua. 2014. “How the NSA Recruits in a Post- Snowden World.” The Daily Beast. Accessed May 6, 2015. http://www.thedailybeast.com...articles/ 2014/01/17/how-the-nsa-recruits-in-a-post- snowden -world.html. Koyfman, Tanya. 2014. “Ukraine versus Russia in a Cyber-Duel.” SenseCy. Accessed

  16. Optimizing Fracture Treatments in a Mississippian "Chat" Reservoir, South-Central Kansas

    Energy Technology Data Exchange (ETDEWEB)

    K. David Newell; Saibal Bhattacharya; Alan Byrnes; W. Lynn Watney; Willard Guy

    2005-10-01

    This project is a collaboration of Woolsey Petroleum Corporation (a small independent operator) and the Kansas Geological Survey. The project will investigate geologic and engineering factors critical for designing hydraulic fracture treatments in Mississippian ''chat'' reservoirs. Mississippian reservoirs, including the chat, account for 159 million m3 (1 billion barrels) of the cumulative oil produced in Kansas. Mississippian reservoirs presently represent {approx}40% of the state's 5.6*106m3 (35 million barrels) annual production. Although geographically widespread, the ''chat'' is a heterogeneous reservoir composed of chert, cherty dolomite, and argillaceous limestone. Fractured chert with micro-moldic porosity is the best reservoir in this 18- to 30-m-thick (60- to 100-ft) unit. The chat will be cored in an infill well in the Medicine Lodge North field (417,638 m3 [2,626,858 bbls] oil; 217,811,000 m3 [7,692,010 mcf] gas cumulative production; discovered 1954). The core and modern wireline logs will provide geological and petrophysical data for designing a fracture treatment. Optimum hydraulic fracturing design is poorly defined in the chat, with poor correlation of treatment size to production increase. To establish new geologic and petrophysical guidelines for these treatments, data from core petrophysics, wireline logs, and oil-field maps will be input to a fracture-treatment simulation program. Parameters will be established for optimal size of the treatment and geologic characteristics of the predicted fracturing. The fracturing will be performed and subsequent wellsite tests will ascertain the results for comparison to predictions. A reservoir simulation program will then predict the rate and volumetric increase in production. Comparison of the predicted increase in production with that of reality, and the hypothetical fracturing behavior of the reservoir with that of its actual behavior, will serve as tests of

  17. Polymorphisms of CHAT but not TFAM or VR22 are Associated with Alzheimer Disease Risk.

    Science.gov (United States)

    Gao, Lili; Zhang, Yan; Deng, Jinghua; Yu, Wenbing; Yu, Yunxia

    2016-06-07

    BACKGROUND Alzheimer disease (AD) is a chronic neurodegenerative disease that is one of the most prevalent health problems among seniors. The cause of AD has not yet been elucidated, but many risk factors have been identified that might contribute to the pathogenesis and prognosis of AD. We conducted a meta-analysis of studies involving CHAT, TFAM, and VR22 polymorphisms and AD susceptibility to further understand the pathogenesis of AD. MATERIAL AND METHODS PubMed/Medline, Embase, Web of Science, the Cochrane Library, and Google Scholar were searched for relevant articles. Rs1880676, rs2177369, rs3810950, and rs868750 of CHAT; rs1937 and rs2306604 of TFAM; and rs10997691 and rs7070570 of VR22 are studied in this meta-analysis. RESULTS A total of 51 case-control studies with 16 446 cases and 16 057 controls were enrolled. For CHAT, rs2177369 (G>A) in whites and rs3810950 (G>A) in Asians were found to be associated with AD susceptibility. No association was detected between rs1880676 and rs868750 and AD risk. For TFAM and VR22, no significant association was detected in studied single-nucleotide polymorphisms (SNPs). CONCLUSIONS Rs2177369 and rs3810950 of CHAT are associated with AD susceptibility, but rs1880676 and rs868750 are not. Rs1937 and rs2306604 of TFAM, and rs10997691 and rs7070570 of VR22 are not significantly associated with AD risk.

  18. Contextual Hub Analysis Tool (CHAT): A Cytoscape app for identifying contextually relevant hubs in biological networks.

    Science.gov (United States)

    Muetze, Tanja; Goenawan, Ivan H; Wiencko, Heather L; Bernal-Llinares, Manuel; Bryan, Kenneth; Lynn, David J

    2016-01-01

    Highly connected nodes (hubs) in biological networks are topologically important to the structure of the network and have also been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we report a Cytoscape app, the Contextual Hub Analysis Tool (CHAT), which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene expression or mass spectrometry data, and identify hub nodes that are more highly connected to contextual nodes (e.g. genes or proteins that are differentially expressed) than expected by chance. In a case study, we use CHAT to construct a network of genes that are differentially expressed in Dengue fever, a viral infection. CHAT was used to identify and compare contextual and degree-based hubs in this network. The top 20 degree-based hubs were enriched in pathways related to the cell cycle and cancer, which is likely due to the fact that proteins involved in these processes tend to be highly connected in general. In comparison, the top 20 contextual hubs were enriched in pathways commonly observed in a viral infection including pathways related to the immune response to viral infection. This analysis shows that such contextual hubs are considerably more biologically relevant than degree-based hubs and that analyses which rely on the identification of hubs solely based on their connectivity may be biased towards nodes that are highly connected in general rather than in the specific context of interest. CHAT is available for Cytoscape 3.0+ and can be installed via the Cytoscape App Store ( http://apps.cytoscape.org/apps/chat).

  19. Changes in the lichen flora influenced by the Bełchatów Industrial Region

    Directory of Open Access Journals (Sweden)

    Krystyna Czyżewska

    2014-08-01

    Full Text Available At the beginning of our study, i.e.. before opening the Bełchatów brown coal mine and the power station 155 species of lichens were registered in the period 1970-1985. A preliminary estimation of the influence of the Bełchatów Industrial Region (BIR on the lichen flora has been performed. More than 1% of the lichen flora has entirely disappcared, about 43% of the species have shown partial devastation of their localities and numerous localities of more than 35% of taxa have been threatened.

  20. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    victims would fall prey to the attack vector. Both state and non-state actors alike, driven by a combination of intrinsic and extrinsic motivations ...different roles, motivations , and intentions. Associated complexities of safeguarding cyberspace contribute to the lack of a United States (US... psychological operations. The infosphere is also the entity that DOD doctrine refers to as the information environment in which humans and automated

  1. Cyber as a Team Sport: Operationalizing a Whole-Of-Government Approach to Cyberspace Operations

    Science.gov (United States)

    2011-06-07

    July 2010-7 June 2011 4. TITLE AND SUBTITLE • -~ ·- ~ I 5a. CONTRACT NUMBER CYBER AS A "TEAM SPORT ": OPERATIONALIZING A WHOLE-OF-GOVERNMENT APPROACH...JOINT FORCES STAFF COLLEGE JOINT ADVANCED WARFIGHTING SCHOOL CYBER AS A “TEAM SPORT ”: OPERATIONALIZING A WHOLE-OF- GOVERNMENT APPROACH...TO CYBERSPACE OPERATIONS by Elizabeth A. Myers Department of Defense CYBER AS A "TEAM SPORT ": OPERATIONALIZING A WHOLE-OF· GOVERNMENT

  2. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  3. Recycler l'orientalisme: 'Le Chat du rabbin' de Joann Sfar

    NARCIS (Netherlands)

    van der Poel, I.

    2013-01-01

    The complete edition of Le Chat du rabbin (The Rabbi’s Cat), the graphic novel created by Joann Sfar, appeared in 2011, followed by a 3D film version in the same year. It tells the story of the author’s ancestors, Sephardic Jews, who lived in Algeria under French colonial rule during the Interwar

  4. Baby FaceTime: Can Toddlers Learn from Online Video Chat?

    Science.gov (United States)

    Myers, Lauren J.; LeWitt, Rachel B.; Gallo, Renee E.; Maselli, Nicole M.

    2017-01-01

    There is abundant evidence for the "video deficit": children under 2 years old learn better in person than from video. We evaluated whether these findings applied to video chat by testing whether children aged 12-25 months could form relationships with and learn from on-screen partners. We manipulated social contingency: children…

  5. Mobile-Based Chatting for Meaning Negotiation in Foreign Language Learning

    Science.gov (United States)

    Castrillo, María Dolores; Martín-Monje, Elena; Bárcena, Elena

    2014-01-01

    This paper analyzes the adequacy of mobile chatting via Whatsapp for the enhancement of a type of spontaneous and colloquial written interaction which has a strong connection with oral discourse. This is part of a research project undertaken with Spanish students of German as a foreign language with a beginner's or quasi-beginner's level. The…

  6. Variable Omission of "ne" in Real-Time French Chat: A Corpus-Driven Comparison of Educational and Non-Educational Contexts

    Science.gov (United States)

    van Compernolle, Remi A.; Williams, Lawrence

    2009-01-01

    This article reports on the variable omission of the French negative particle "ne" (the first marker of verbal negation) in synchronous (i.e., real-time) electronic communication environments. Patterns of variation in a corpus of non-educational chat (i.e., free, public-access Internet chat) are analyzed and compared to data produced by first-,…

  7. Accuracy of "Modified Checklist for Autism in Toddlers" ("M-CHAT") in Detecting Autism and Other Developmental Disorders in Community Clinics

    Science.gov (United States)

    Toh, Teck-Hock; Tan, Vivian Wee-Yen; Lau, Peter Sie-Teck; Kiyu, Andrew

    2018-01-01

    This study determined the accuracy of "Modified Checklist for Autism in Toddlers" ("M-CHAT") in detecting toddlers with autism spectrum disorder (ASD) and other developmental disorders (DD) in community mother and child health clinics. We analysed 19,297 eligible toddlers (15-36 months) who had "M-CHAT" performed in…

  8. Bringing Japan and Taiwan Closer Electronically: A Look at an Intercultural Online Synchronic Chat Task and Its Effect on Motivation

    Science.gov (United States)

    Freiermuth, Mark R.; Huang, Hsin-chou

    2012-01-01

    This study examines the motivation of 20 Japanese students of English as a foreign language (EFL) who chatted electronically with 19 Taiwanese EFL students using online synchronous chat software. In particular, we were interested in four factors that affect task-based motivation: the willingness to communicate, task attractiveness, task…

  9. 76 FR 56295 - Schools and Libraries Universal Service Support Mechanism and a National Broadband Plan for Our...

    Science.gov (United States)

    2011-09-13

    ... other individuals on social networking Web sites and in chat rooms, and regarding cyberbullying... in chat rooms and cyberbullying awareness and response. 3. We note that the Notice of Proposed... cyberbullying awareness and response.'' We believe this makes clear that, although a school's Internet safety...

  10. Restrictions on running IRC (Internet Relay Chat) at CERN

    CERN Multimedia

    2005-01-01

    Due to the large number of computer security incidents at CERN where intruders have used IRC (Internet Relay Chat) software to control computers, IRC connections will be blocked in the CERN firewall from 1st February 2005. Personal use of IRC software is not permitted at CERN. Further details of the restrictions on both personal and professional use of IRC are documented at http://cern.ch/security/IRC.

  11. Cyberspace as a new arena for terroristic propaganda: an updated examination.

    Science.gov (United States)

    Minei, Elizabeth; Matusitz, Jonathan

    2012-11-01

    This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterrorists display various semiotic gestures (e.g., the use of images and Internet videos) to communicate their intents to the public at large. In doing so, they communicate themes-these themes range from hate to anger. Cyberterrorism, then, is a form of theater or spectacle in which terrorists exploit cyberspace to trigger feelings of panic and overreaction in the target population. In many cases, this form of propaganda is the primary means of communication for various cyberterrorist groups to convey their intents. Internet sites also produce numerous opportunities for in-group communication and publicity.

  12. Autonomy in Nursing Students’ Process of Knowledge Construction: the Educational Chat as a Teaching Tool La autonomía en el proceso de construcción del conocimiento de alumnos de enfermería: el chat educacional como herramienta de enseñanza Autonomia no processo de construção do conhecimento de alunos de enfermagem: o chat educacional como ferramenta de ensino

    Directory of Open Access Journals (Sweden)

    Ana Paula Scheffer Schell da Silva

    2010-04-01

    Full Text Available This documental study has the qualitative approach of a case study. It analyzes how autonomy has been developed in nursing students’ process of knowledge construction, in a context mediated by the use of educational chat in Learning Management Systems (LMS. The analyzed materials were eight discussions promoted by students, professors, and monitors in the chat session of TelEduc® LMS. The software NVivo® was used to categorize data and Content Analysis for the analysis of information. Data analysis used Freire as a reference point, revealing that nursing students need to develop their autonomy by acknowledging their incompleteness. Professors can aid this process by problematizing and developing critical dialogical relations. The potential of the educational chat as a pedagogical tool is highlighted because it encourages students to autonomously seek knowledge.Investigación documental con abordaje cualitativo del tipo estudio de caso. El objetivo fue analizar como se desarrolló la autonomía en el proceso de construcción del conocimiento de alumnos de Enfermería, en un contexto mediado por un chat educacional, en Ambiente Virtual de Aprendizaje (AVA. Los materiales analizados fueron ocho discusiones promovidas por alumnos, profesores y monitores en el chat del AVA TelEduc®. Para la categorización de los datos, se utilizó el software NVivo® y, para el análisis de las informaciones, la técnica de análisis de contenido. El análisis estuvo de acuerdo con el marco teórico de Freire, revelando que es necesario que el alumno de Enfermería desarrolle la autonomía, mediante el darse cuenta de no estar acabado. Esto puede ser realizado con ayuda de profesores que adopten la metodología de la problematización y del desarrollo de relaciones dialógicas críticas. Se destaca el chat educacional como herramienta que incentiva a los alumnos a buscar el conocimiento de forma autónoma.Pesquisa documental com abordagem qualitativa do tipo

  13. Automated topic spotting provides added efficiency in a chat based tutoring environment

    CSIR Research Space (South Africa)

    Butgereit, L

    2012-05-01

    Full Text Available Dr Math is a mobile, online tutoring project which allows primary and secondary school pupils to contact tutors in mathematics using text based chat systems on their cell phones. The tutors use traditional Internet based workstations. Dr Math...

  14. The Informative Documentation and Retrieval of Written Information. New Competences for Cyberspace

    Directory of Open Access Journals (Sweden)

    Pilar Beltrán Orenes

    2015-07-01

    Full Text Available Cyberspace has opened to the journalist the possibility of accessing a lot of documentation sources without the direct mediation of an information science professional. However, this autonomy is more a dream than a reality for the vast ocean that represents Internet and, especially, for those deep areas (deep Internet which are very difficult to reach without the right skills. This article will attempt to show the reality of documentation sources on the Internet and the need for literacy training on the future journalists, as well as the presence of documentalists, now more than ever, in the media.

  15. Effects of Interactive Chat versus Independent Writing on L2 Learning

    Science.gov (United States)

    Tare, Medha; Golonka, Ewa M.; Vatz, Karen; Bonilla, Carrie L.; Crooks, Carolyn; Strong, Rachel

    2014-01-01

    This study examines the importance of interaction for second language (L2) acquisition by analyzing outcomes from two types of out-of-class activities. The study compared: (a) interactive homework, completed via text chat, and (b) individual homework, completed via independent writing. In a between-subjects design, participants in two…

  16. The usability of a WeChat-based electronic questionnaire for collecting participant-reported data in female pelvic floor disorders: a comparison with the traditional paper-administered format.

    Science.gov (United States)

    Sun, Zhi-Jing; Zhu, Lan; Liang, Maolian; Xu, Tao; Lang, Jing-He

    2016-08-01

    WeChat is a promising tool for capturing electronic data; however, no research has examined its use. This study evaluates the reliability and feasibility of WeChat for administering the Pelvic Floor Impact Questionnaire Short Form 7 questionnaire to women with pelvic floor disorders. Sixty-eight pelvic floor rehabilitation women were recruited between June and December 2015 and crossover randomized to two groups. All participants completed two questionnaire formats. One group completed the paper version followed by the WeChat version; the other group completed the questionnaires in reverse order. Two weeks later, each group completed the two versions in reverse order. The WeChat version's reliability was assessed using intraclass correlation coefficients and test-retest reliability. Forty-two women (61.8%) preferred the WeChat to the paper format, eight (11.8%) preferred the paper format, and 18 (26.5%) had no preference. The younger women preferred WeChat. Completion time was 116.5 (61.3) seconds for the WeChat version and 133.4 (107.0) seconds for the paper version, with no significant difference (P = 0.145). Age and education did not impact completion time (P > 0.05). Consistency between the WeChat and paper versions was excellent. The intraclass correlation coefficients of the Pelvic Floor Impact Questionnaire Short Form 7 and the three subscales ranged from 0.915 to 0.980. The Bland-Altman analysis and linear regression results also showed high consistency. The test-retest study had a Pearson's correlation coefficient of 0.908, demonstrating a strong correlation. WeChat-based questionnaires were well accepted by women with pelvic floor disorders and had good data quality and reliability.

  17. Comparing Six Video Chat Tools: A Critical Evaluation by Language Teachers

    Science.gov (United States)

    Eroz-Tuga, Betil; Sadler, Randall

    2009-01-01

    This article presents a critical comparison of the usefulness and practicality of six CMC video chat tools (CUworld, ICQ, MSN Messenger, Paltalk, Skype, and Yahoo Messenger) from the perspective of language teaching professionals. This comparison is based on the results of a semester-long project between graduate students at an American university…

  18. Chatting in L2 Spanish: Interactivity, Self-Efficacy and Interpersonal Relations

    Science.gov (United States)

    Sanchez-Castro, Olga; Mrowa-Hopkins, Colette

    2012-01-01

    This study seeks to examine variations in patterns of interactivity as they are displayed in the ongoing discourse construction of high and low self-efficacy learners of Spanish in the context of computer-mediated-communication. The paper specifically focuses on the analysis of synchronous text chats of six university students of Spanish at…

  19. Nosql Technology In Android Based Mobile Chat Application Using Mongodb

    Directory of Open Access Journals (Sweden)

    Yovita Tunardi

    2014-12-01

    Full Text Available Along with the development of data storage technology which previously using relational concept began to change to the non-relational concept or sometimes referred to as the term NoSQL technology. Data storage in NoSQL is no longer based on the relations between tables but using another methods, one of them is document-oriented. This method was applied specifically in MongoDB. This concept brings new hope because oftheir superiority that can handle very large data with promising performance and is perfect for agile system development. The purpose of this research was to measure the performance NoSQL, especially MongoDB with implemented it in a Android based mobile chat application. This research uses three methods, analysis method including literature study, analysis of similar application, questionnaires, design method using Agile SofwareDevelopment, and evaluation method including eight golden rules, analysis of similar application, questionnaires, and interview. The results of this research is a mobile chat application that uses MongoDB as the data storage technology. Through this research can be drawn the conclusion that NoSQL technology implementation, MongoDB, give special advantages like lighter data storage and faster data access.

  20. Chaotic Traversal (CHAT): Very Large Graphs Traversal Using Chaotic Dynamics

    Science.gov (United States)

    Changaival, Boonyarit; Rosalie, Martin; Danoy, Grégoire; Lavangnananda, Kittichai; Bouvry, Pascal

    2017-12-01

    Graph Traversal algorithms can find their applications in various fields such as routing problems, natural language processing or even database querying. The exploration can be considered as a first stepping stone into knowledge extraction from the graph which is now a popular topic. Classical solutions such as Breadth First Search (BFS) and Depth First Search (DFS) require huge amounts of memory for exploring very large graphs. In this research, we present a novel memoryless graph traversal algorithm, Chaotic Traversal (CHAT) which integrates chaotic dynamics to traverse large unknown graphs via the Lozi map and the Rössler system. To compare various dynamics effects on our algorithm, we present an original way to perform the exploration of a parameter space using a bifurcation diagram with respect to the topological structure of attractors. The resulting algorithm is an efficient and nonresource demanding algorithm, and is therefore very suitable for partial traversal of very large and/or unknown environment graphs. CHAT performance using Lozi map is proven superior than the, commonly known, Random Walk, in terms of number of nodes visited (coverage percentage) and computation time where the environment is unknown and memory usage is restricted.

  1. Face-to-face talk and synchronous chat as learning tools in tutorial ...

    African Journals Online (AJOL)

    The findings suggest that although synchronous chat and small-group discussion share certain characteristics, they are also distinct in several significant ways. The implications that these differences hold for language instruction are then discussed. Keywords: synchronous CMC, tutorials, CLT, group work, blended learning, ...

  2. Examining African American and Caucasian Interaction Patterns within Computer-Mediated Communication Environments

    Science.gov (United States)

    Bellamy, Al; Greenfield, M. C.

    2009-01-01

    This study explored the extent to which student emotion management factors and normative orientation (belief that chat rooms have normative standards of conduct similar to face-to-face interaction) circumscribe the sending of hostile messages within electronic relay chat rooms on the Internet. A questionnaire survey collected data from 114…

  3. Undergraduate and Postgraduate Students in a North American University are Choosing to use Chat Reference Services for all Kinds of Reasons. A review of: Ward, David. “Why Users Choose Chat: A Survey of Behavior and Motivations.” Internet Reference Services Quarterly 10.1 (2005: 29-46.

    Directory of Open Access Journals (Sweden)

    Gill Needham

    2006-03-01

    Full Text Available Objective – To investigate reasons why undergraduate and postgraduate students choose to use chat reference services and their satisfaction with the experience. Design – User survey. Setting – Large academic library in the United States. Subjects – A total of 341 library users took part in the survey. Of these, 79 were graduate students, 215 undergraduates, 21 staff, 5 alumni and 21 members of the public. Method – A user survey form was posted on the library website for a period of one month (March 2003. Users of the chat reference service received an automatic closing message asking them to complete the survey. Responses were fed into a database to be analysed by the research staff. Additional data was also gathered about the behaviour of all users of the chat service during that period – both responders and non‐responders. Main results – The most popular reason for choosing to use a chat service was the desire for a speedy response, followed by ‘distance from the library’. Responders chose to use chat to ask a range of different kinds of questions. Nearly half (45% were looking for a specific resource and 23% were seeking help at the beginning of their research. There were notable differences between undergraduate and graduate students. Twice as many undergraduates as graduates used the service to help them get started on their research. Graduates were three times as likely as undergraduates to be using the service to address technical problems they were having with the website. Overall satisfaction with the service was extremely high, with 77.5% rating it 5 out of 5 and 94.5% giving it 4 or 5 out of 5. Conclusion – Chat reference services are popular with users primarily because they are quick and convenient. However, users expect that these services will be able to deal with all types of questions, including help with research. This challenges an assumption by library staff that the medium is only suitable for short

  4. "Poliedro é um sólido, correto?":um estudo com graduandos interagindo em um chat sobre a definição de poliedro "A Polyhedron is a solid, right?" a study with pre-service teachers interacting in a chat about the definition of a polyhedron

    Directory of Open Access Journals (Sweden)

    Rodrigo Zuza Nieto

    2013-01-01

    Full Text Available Na pesquisa educacional, são escassos os estudos que analisam a construção de conceitos geométricos mediante interações à distância. Essa investigação está focada no entendimento de futuros professores sobre a definição de poliedro. O artigo é fruto de uma pesquisa que analisa interações em ambientes virtuais de aprendizagem. Apresentaremos, resumidamente, o cenário que foi elaborado para ser um curso sobre poliedros estrelados e, posteriormente, analisaremos as interações em um de seus espaços: o chat. A investigação sublinha que a análise em um chat deve movimentar-se de uma visão global para uma visão focada nas reflexões individuais/coletivas. O chat mostrou ser um cenário que oportunizou, aos graduandos, refletirem sobre a definição de poliedros em três âmbitos: um no contexto dos sólidos geométricos, um focado nos seus elementos (faces, arestas e vértices e outro centrado no número de dimensões.Educational research studies that analyze the construction of geometric concepts through distance interactions are scarce. This study is focused on pre-service teachers' understanding about the definition of a polyhedron. The article is based on research that analyses interactions in virtual scenarios of learning. Briefly, we will present the environment that was designed to be a course about star polyhedrons and, later, we analyze the interactions in one of its forms: that of chat. The investigation and analysis of one chat shows that it must move from a global vision to one focused on individual and collective reflections. The chat was shown to be a scenario that improved pre-service teachers' reflection about the definition of polyhedrons in three areas: in the context of geometric solids; of its elements (faces, vertices and edges; and in the number of dimensions.

  5. The relationship between addiction to internet and adolescence’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking

    Directory of Open Access Journals (Sweden)

    Mehri Mowlaie

    2016-01-01

    Full Text Available Background: Given the importance of adolescent period and impact of internet and virtual communication tools on high risk behaviors, this research was conducted to examine the relationship between addiction to internet and adolescent’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking. Methods: The population of this study included all (n=40597 junior and senior high school students (boys and girls in academic year 2014-2015 in Ardabil, Iran. 380 subjects were selected as the study sample by multistage cluster sampling. The instruments for data collection in this research were addiction to internet questionnaire, Iranian adolescent's risk-taking scale and the researcher-made tendency to chat and hacking questionnaire. The data were analyzed by SPSS-22 software using correlation coefficient and simultaneous regression analysis. Results: The results showed a significantly positive correlation between addiction to internet and sexual behavior, tendency toward opposite sex, aggression, chatting and hacking (P<0.001, but there was no significant relationship between addiction to internet and alcohol. Conclusion: The results of the present study showed that addiction to internet was able to significantly predict sexual behavior, tendency toward opposite sex, aggression, chatting and hacking.

  6. Indonesian Modified Checklist for Autism in Toddler, Revised with Follow-Up (M-CHAT-R/F for Autism Screening in Children at Sanglah General Hospital, Bali-Indonesia

    Directory of Open Access Journals (Sweden)

    I Gusti Ayu Trisna Windiani

    2016-07-01

    Full Text Available Background: Autism Spectrum Disorder (ASD is a developmental disorder characterized by impaired reciprocal social interaction and communication, and by a restricted, repetitive or stereotyped behavior. Early detection of autism is recommended on all toddlers from the ages of 9 months because of increasing in prevalence. The Modified Checklist for Autism (M-CHAT in Toddlers, a Revised with Follow-Up (M-CHAT-R/F is a 2-stage parent-report screening tool to assess a risk for ASD and it demonstrates an improvement compared to the original M-CHAT. It is translated to Indonesian language by Soetjiningsih and colleagues, and it needs to be validated. Methods: This is a diagnostic accuracy study conducted at Sanglah Hospital, Bali, conducted from March 2015 to December 2016. We included children 18-48 months in this study. The parents of the outpatient children in the growth and development clinic of Sanglah Hospital were asked to fill out the Indonesian M-CHAT-R/F form. In the same visit, the Autism Spectrum Disorder (ASD assessment according to the DSM-5 as a gold standard was done by the researchers, without knowing the M-CHAT-R/F result. The assessment comparison based on M-CHAT-R/F and DSM-5 was analyzed to obtain the AUC intersection on ROC curve that gives the best sensitivity and specificity. Results: We found 10.71% of our outpatient was diagnosed with autism according to DSM 5, when they are 18-24 months old. The Indonesian version of M-CHAT-R/F as an ASD screening tool has 88.9% in sensitivity and 94.6% in specificity. Conclusion: Our results suggest that the Indonesian translation of the M-CHAT-R/F is an effective screening instrument for ASD, particularly when a two-step screening process is used. 

  7. Effects of Video Games and Online Chat on Mathematics Performance in High School: An Approach of Multivariate Data Analysis

    OpenAIRE

    Lina Wu; Wenyi Lu; Ye Li

    2016-01-01

    Regarding heavy video game players for boys and super online chat lovers for girls as a symbolic phrase in the current adolescent culture, this project of data analysis verifies the displacement effect on deteriorating mathematics performance. To evaluate correlation or regression coefficients between a factor of playing video games or chatting online and mathematics performance compared with other factors, we use multivariate analysis technique and take gender difference into account. We fin...

  8. The functionalities of mobile applications : case study: WeChat

    OpenAIRE

    Dai, Si; Zhang, Xin

    2015-01-01

    The objective of this thesis is to find out the functionalities of mobile application. And the purpose of this study is to make a research on WeChat’s functionalities. A native application and mobile web application are the two different types of mobile applications. When designers start to create an application, companies need to discuss which type of app is more suitable for business targets. Each has both pros and cons which influence companies’ choice. WeChat is a popular mobile applicati...

  9. Frequency and Content of Chat Questions by Time of Semester at the University of Central Florida: Implications for Training, Staffing and Marketing

    Science.gov (United States)

    Goda, Donna; Bishop, Corinne

    2008-01-01

    The more than 4,000 "chats" received by the University of Central Florida's (UCF) Ask-A-Librarian digital reference service are the subject of this practitioner-based, descriptive case study. Question content from chats received during four semesters between January 2005 and May 2006 are categorized and plotted, by semester, to show the…

  10. Towards educational data mining: Using data mining methods for automated chat analysis to understand and support inquiry learning processes

    OpenAIRE

    Anjewierden , Anjo; Kolloffel , Bas; Hulshof , Casper

    2007-01-01

    In this paper we investigate the application of data mining methods to provide learners with real-time adaptive feedback on the nature and patterns of their on-line communication while learning collaboratively.We derived two models for classifying chat messages using data mining techniques and tested these on an actual data set [16]. The reliability of the classification of chat messages is established by comparing the models performance to that of humans. Results indicate that the classifica...

  11. Smartphone Application WeChat for Clinical Follow-up of Discharged Patients with Head and Neck Tumors: A Randomized Controlled Trial.

    Science.gov (United States)

    Lyu, Ke-Xing; Zhao, Jing; Wang, Bin; Xiong, Guan-Xia; Yang, Wei-Qiang; Liu, Qi-Hong; Zhu, Xiao-Lin; Sun, Wei; Jiang, Ai-Yun; Wen, Wei-Ping; Lei, Wen-Bin

    2016-12-05

    Nowadays, social media tools such as short message service, Twitter, video, and web-based systems are more and more used in clinical follow-up, making clinical follow-up much more time- and cost-effective than ever before. However, as the most popular social media in China, little is known about the utility of smartphone WeChat application in follow-up. In this study, we aimed to investigate the feasibility and superiority of WeChat application in clinical follow-up. A total of 108 patients diagnosed with head and neck tumor were randomized to WeChat follow-up (WFU) group or telephone follow-up (TFU) group for 6-month follow-up. The follow-ups were delivered by WeChat or telephone at 2 weeks, 1, 2, 3, and 6 months to the patients after being discharged. The study measurements were time consumption for follow-up delivery, total economic cost, lost-to-follow-up rate, and overall satisfaction for the follow-up method. Time consumption in WFU group for each patient (23.36 ± 6.16 min) was significantly shorter than that in TFU group (42.89 ± 7.15 min) (P smartphone WeChat application was found to be a viable option for follow-up in discharged patients with head and neck tumors. WFU was time-effective, cost-effective, and convenient in communication. This doctor-led follow-up model has the potential to establish a good physician-patient relationship by enhancing dynamic communications and providing individual health instructions. Chinese Clinical Trial Registry, ChiCTR-IOR-15007498; http://www.chictr.org.cn/ showproj.aspx?proj=12613.

  12. Conceptualisation and development of the Conversational Health Literacy Assessment Tool (CHAT).

    Science.gov (United States)

    O'Hara, Jonathan; Hawkins, Melanie; Batterham, Roy; Dodson, Sarity; Osborne, Richard H; Beauchamp, Alison

    2018-03-22

    The aim of this study was to develop a tool to support health workers' ability to identify patients' multidimensional health literacy strengths and challenges. The tool was intended to be suitable for administration in healthcare settings where health workers must identify health literacy priorities as the basis for person-centred care. Development was based on a qualitative co-design process that used the Health Literacy Questionnaire (HLQ) as a framework to generate questions. Health workers were recruited to participate in an online consultation, a workshop, and two rounds of pilot testing. Participating health workers identified and refined ten questions that target five areas of assessment: supportive professional relationships, supportive personal relationships, health information access and comprehension, current health behaviours, and health promotion barriers and support. Preliminary evidence suggests that application of the Conversational Health Literacy Assessment Tool (CHAT) can support health workers to better understand the health literacy challenges and supportive resources of their patients. As an integrated clinical process, the CHAT can supplement existing intake and assessment procedures across healthcare settings to give insight into patients' circumstances so that decisions about care can be tailored to be more appropriate and effective.

  13. Consideraciones gráficas y lingüísticas del lenguaje cibernético: el chat y el Messenger.

    OpenAIRE

    Cabedo Nebot, Adrián

    2009-01-01

    Este trabajo pretende estudiar el comportamiento lingüístico de intercambios comunicativos en plataformas cibernéticas como el chat o el Messenger. Así mismo, el planteamiento inicial es investigar si el lenguaje cibernético constituye un código particular, diferenciado del código del lenguaje habitual. This work tries to study linguistic behavior of communicative exchanges in cybernetic platforms like chat or Messenger. Likewise, the initial approach is to investigate if the cybernetic la...

  14. Cuerpos e identidades on line: construcción de identidades corporales en el chat

    Directory of Open Access Journals (Sweden)

    Luz Marilyn Ortiz

    2014-01-01

    Full Text Available Este artículo tiene como propósito analizar el proceso de construcción de la identidad en sus relaciones con el cuerpo en el contexto de la Comunicación Mediada por Computación (CMC, particularmente por usuarios del chat. En la primer parte se trata el tema de laidentidad en la época digital, desde una perspectiva no esencialista del concepto de identidad. En la segunda parte se analiza la “emergencia epistemológica” del cuerpo en esta nueva forma de comunicación. La tercera parte enfatiza los efectos de la CMC en los modos y estrategias de construcción de identidades corporales por usuarios del chat, entendido este como un dispositivo de enunciación virtual en la que el sujeto se textualiza mediante lenguajes multimodales.

  15. Chat Transcript Analysis Reveals that Undergraduate Students are Open to Instruction, While Instructors and Librarians Care About Supporting Student Learning

    OpenAIRE

    Elaine Sullo

    2017-01-01

    A Review of: Jacoby, J., Ward, D., Avery, S., & Marcyk, E. (2016). The value of chat reference services: A pilot study. portal: Libraries and the Academy, 16(1), 109-129. https://doi.org/10.1353/pla.2016.0013 Objective – To investigate student, instructor, and librarian perspectives of chat reference service in the context of first-year undergraduate students conducting research for an introductory composition course. Design – Focus groups, individual interviews, and surveys. S...

  16. Managing family healthcare with multimedia chat apps: A survey on what is missing

    NARCIS (Netherlands)

    B. Meixner (Britta); M. Lee (Matthew); S. Carter (Scott)

    2017-01-01

    textabstractChatting and messaging apps allow people to share information (text, images, etc.) using a simple, well-understood interaction metaphor of a conversational time-line. These apps can help small task-oriented user groups, like caregivers of a family member, to coordinate with each other in

  17. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.

    Science.gov (United States)

    Pieters, Wolter; Hadžiosmanović, Dina; Dechesne, Francien

    2016-06-01

    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.

  18. Use of lidar point cloud data to support estimation of residual trace metals stored in mine chat piles in the Old Lead Belt of southeastern, Missouri

    Science.gov (United States)

    Witt, Emitt C.

    2016-01-01

    Historic lead and zinc (Pb-Zn) mining in southeast Missouri’s ―Old Lead Belt‖ has left large chat piles dominating the landscape where prior to 1972 mining was the major industry of the region. As a result of variable beneficiation methods over the history of mining activity, these piles remain with large quantities of unrecovered Pb and Zn and to a lesser extent cadmium (Cd). Quantifying the residual content of trace metals in chat piles is problematic because of the extensive field effort that must go into collecting elevation points for volumetric analysis. This investigation demonstrates that publicly available lidar point data from the U.S. Geological Survey 3D Elevation Program (3DEP) can be used to effectively calculate chat pile volumes as a method of more accurately estimating the total residual trace metal content in these mining wastes. Five chat piles located in St. Francois County, Missouri, were quantified for residual trace metal content. Utilizing lidar point cloud data collected in 2011 and existing trace metal concentration data obtained during remedial investigations, residual content of these chat piles ranged from 9247 to 88,579 metric tons Pb, 1925 to 52,306 metric tons Zn, and 51 to 1107 metric tons Cd. Development of new beneficiation methods for recovering these constituents from chat piles would need to achieve current Federal soil screening standards. To achieve this for the five chat piles investigated, 42 to 72% of residual Pb would require mitigation to the 1200 mg/kg Federal non-playground standard, 88 to 98% of residual Zn would require mitigation to the Ecological Soil Screening level (ESSL) for plant life, and 70% to 98% of Cd would require mitigation to achieve the ESSL. Achieving these goals through an existing or future beneficiation method(s) would remediate chat to a trace metal concentration level that would support its use as a safe agricultural soil amendment.

  19. Differences in Brand Image of Online Chat Application of Blackberry Messenger, Whatsapp, and Line for Bina Nusantara University’s Student

    OpenAIRE

    Kuspuji C. B. Wicaksono

    2016-01-01

    This article was written to find out whether there were any differences on brand image for each online chat Application such as Blackberry Messenger, Whatsapp, and LINE based on six factors of the brand image which are: benefits, attributes, cultures, values, personality, and user. Data for the research were collected from questionnaires given to respondents who had used each mention online chat application. Then each respondent was asked to give scores based on the six factors of brand image...

  20. C³TO: an architecture for implementing a chat based call centre and tutoring online

    CSIR Research Space (South Africa)

    Butgereit, L

    2010-05-01

    Full Text Available questions or provide information to thousands of people using inexpensive chat protocols on their cell phones. The first practical implementation of C³TO was the re-design and re-implementation of the Dr Math project in South Africa where thousands...

  1. Text Chat during Video/Audio Conferencing Lessons: Scaffolding or Getting in the Way?

    Science.gov (United States)

    Kozar, Olga

    2016-01-01

    Private online language tutoring is growing in popularity. An important prerequisite for development of effective pedagogies in this context is a good understanding of how different modalities can be combined. This study provides a detailed account of how several experienced private online teachers use text chat in their Skype-based English…

  2. Comparing Protest Movements in Chile and California: Interculturality in an Internet Chat Exchange

    Science.gov (United States)

    Menard-Warwick, Julia

    2009-01-01

    This paper is based on an analysis of chat transcripts from an English-language telecollaboration project between students at universities in Chile and California. This research found that the richest intercultural interactions involved events that could not have been foreseen: the immigrant rights demonstrations in the USA and the massive student…

  3. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    Science.gov (United States)

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  4. Status Quo and Prospective of WeChat in Improving Chinese English Learners' Pronunciation

    Science.gov (United States)

    Wang, Kanghui

    2017-01-01

    With the ubiquitous usage of wireless, portable, and handheld devices gaining popularity in 21st century, the revolutionary mobile technology introduces digital new media to educational settings, which has changed the way of traditional teaching and learning. WeChat is one of the most popular social networking applications in China featured by its…

  5. Living in the electronic age: musings on nearly two decades in Cyberspace.

    Science.gov (United States)

    Gavrin, Jonathan R

    2009-01-01

    My journey through Cyberspace began about 20 years ago with an introduction to e-mail. A few years later, I had the good fortune of working with artificial intelligence engineers who were developing information retrieval techniques and expert systems. By serendipity this led to an early introduction to the World Wide Web (www) and the use of Web browsers as tools for gathering information, long before the Internet became commercialized. Internet content and form are now so omnipresent that they have affected our language in both amusing and utilitarian ways. We are entering an era where social networking, from personal to professional lives, is potentially a vibrant new direction for the Internet. Future articles for this feature will explore how to maximize the utility of the Internet.

  6. "Nous" versus "on": Pronouns with First-Person Plural Reference in Synchronous French Chat

    Science.gov (United States)

    van Compernolle, Remi A.

    2008-01-01

    This article explores variation in the use of the pronouns "nous" and "on" for first-person plural reference in a substantial corpus of French-language Internet chat discourse. The results indicate that "on" is nearly categorically preferred to "nous," which is in line with previous research on informal spoken French. A qualitative analysis of…

  7. Technical Evaluation Report 14: Chat and Instant Messaging Systems (synchronous: Report 2/ 3

    Directory of Open Access Journals (Sweden)

    Ellen Kinsel

    2002-10-01

    Full Text Available This study extends the earlier review of online chat systems (Report 6, by reviewing a further seven products that provide text-based instant messaging (IM. The functionality of these products in distance education contexts is stressed in relation to their comparative costs, complexity, control, clarity, technical framework, and other functional options.

  8. Contextual Hub Analysis Tool (CHAT: A Cytoscape app for identifying contextually relevant hubs in biological networks [version 2; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Tanja Muetze

    2016-08-01

    Full Text Available Highly connected nodes (hubs in biological networks are topologically important to the structure of the network and have also been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we report a Cytoscape app, the Contextual Hub Analysis Tool (CHAT, which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene expression or mass spectrometry data, and identify hub nodes that are more highly connected to contextual nodes (e.g. genes or proteins that are differentially expressed than expected by chance. In a case study, we use CHAT to construct a network of genes that are differentially expressed in Dengue fever, a viral infection. CHAT was used to identify and compare contextual and degree-based hubs in this network. The top 20 degree-based hubs were enriched in pathways related to the cell cycle and cancer, which is likely due to the fact that proteins involved in these processes tend to be highly connected in general. In comparison, the top 20 contextual hubs were enriched in pathways commonly observed in a viral infection including pathways related to the immune response to viral infection. This analysis shows that such contextual hubs are considerably more biologically relevant than degree-based hubs and that analyses which rely on the identification of hubs solely based on their connectivity may be biased towards nodes that are highly connected in general rather than in the specific context of interest.   Availability: CHAT is available for Cytoscape 3.0+ and can be installed via the Cytoscape App Store (http://apps.cytoscape.org/apps/chat.

  9. Disinhibition of negative true self for identity reconstructions in cyberspace: Advancing self-discrepancy theory for virtual setting.

    Directory of Open Access Journals (Sweden)

    Chuan Hu

    Full Text Available In face-to-face communications, to avoid sanctions and disapproval from others, people are more likely to hide negative aspects of their true self (such as socially undesirable personalities, minds, beliefs and consciousness to avoid conflict with social norms and laws. The anonymity of cyberspace provides people a unique environment to behave more freely and openly with less restraint from the real word. Existing research related to online true self expression has mainly explored true self as an independent aspect of self. Regarding true self as a two-dimensional concept, this study investigates true self from the perspective of individuals' self-guide and identity reconstruction in both online and offline world. Using qualitative research methods, the current study investigates 57 participants through interviews and questionnaires. Content analysis reveals four factors that motivate people to express more true self (especially negative true self when reconstructing their online identity and involve true self as a part of their self-guide in anonymous environment. By incorporating true self as an important part of individuals' self-guide and identity online, the current study advances self-discrepancy theory, making it more comprehensive for cyberspace. The results are also interpreted based on self-determination theory. The theoretical contributions of this study are discussed and practical implications are also presented.

  10. Implementación de un servicio de referencia virtual por chat en una biblioteca universitaria argentina

    Directory of Open Access Journals (Sweden)

    Borrell, Marina

    2009-12-01

    Full Text Available The following article will comment the experience of the library Joaquín V. González of the Facultad de Ciencias Jurídicas y Sociales of the Universidad Nacional de La Plata (Argentina in the implementation of a virtual reference service by chat, to answer requests in real time, directed to the university community

    En el presente trabajo se comentará la experiencia de la biblioteca Joaquín V. González de la facultad de Ciencias Jurídicas y Sociales de la Universidad Nacional de La Plata (Argentina en la implementación y puesta en marcha de un servicio de referencia virtual vía chat, para responder consultas en tiempo real, destinado a la comunidad universitaria.

  11. Integration of Three CBI Models and WeChat Mobile Learning in Business English Teaching

    Science.gov (United States)

    Siqi, Che

    2017-01-01

    Content-Based Instruction (CBI) is considered effective not only in mastering language skills, but also in acquiring the content knowledge of business subjects. WeChat, a popular communicative and interactive platform, is acknowledged as a new instrument to improve verbal teaching proficiency and obtain relevant information. The integration of…

  12. Book Review: Digital Crime and Forensic Science in Cyberspace

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2006-12-01

    Full Text Available Kanellis, P., Kiountouzis, E., Kolokotronis, N., & Martakos, D. (2006. Digital Crime and Forensic Science in Cyberspace. Hershey, PA: Idea Group Publishing, 357 pages, ISBN: 1-59140-873-3 (paper, US$79.95.Reviewed by Gary C. KesslerThis book, according to the preface, "is intended for those who are interested in a critical overview of what forensic science is, care about privacy issues, and wish to know what constitutes evidence for computer crime." It goes on to say that the specific audiences for which it was written are students in academia and professionals in the industry.If used carefully, this book does a good job at providing a snapshot of some of the current issues in digital forensics, although perhaps best aimed at information security professionals. It is a collection of 15 chapters written by authors from Greece, Italy, The Netherlands, South Africa, the U.K., and the U.S. The international flavor of the writing is also welcome in the field.(see PDF for full review

  13. Conflict and cooperation in cyberspace the challenge to national security

    CERN Document Server

    Yannakogeorgos, Panayotis A

    2016-01-01

    Facilitated by the exceptional handiwork of the editors, this book significantly advances the effort to achieve common ground in the debates regarding cyberspace. National security and cyber-related professionals will find it equally useful in their work.-Lt. Gen Bob Elder, USAF (Retired)In this wide-ranging anthology that encompasses expert viewpoints from military, civilian, and private sector contributors, the editors seek to provide a broad framework of issues to be considered. Rather than provide definitive answers (all of the contributors readily admit that none exist), the contributors state that in order to attain the right answers, we must first ask the right questions. Over the course of the book, the authors put forth a common set of concerns to frame the issue at hand. ... The authors undertake a study of how to apply cyber law to cyber war, warning that allowing the Intelligence Community and the military to assist in the defense of privately owned networks may lead to legal and political consequ...

  14. Nuclear industry powering up to tackle potential threats from cyberspace

    International Nuclear Information System (INIS)

    Shepherd, John

    2015-01-01

    In June 2015, the International Atomic Energy Agency (IAEA), in cooperation with international agencies including the crime-fighting organisation Interpol, will host a major conference on the protection of computer systems and networks that support operations at the world's nuclear facilities. According to the IAEA, the use of computers and other digital electronic equipment in physical protection systems at nuclear facilities, as well as in facility safety systems, instrumentation, information processing and communication, ''continues to grow and presents an ever more likely target for cyber-attack''. The international nuclear industry is right to take heed of ever-evolving security threats, deal with them accordingly, and be as open and transparent as security allows about what is being done, which will reassure the general public. However, the potential menace of cyberspace should not be allowed to become such a distraction that it gives those who are ideologically opposed to nuclear another stick with which to beat the industry.

  15. Nuclear industry powering up to tackle potential threats from cyberspace

    Energy Technology Data Exchange (ETDEWEB)

    Shepherd, John [nuclear 24, Brighton (United Kingdom)

    2015-06-15

    In June 2015, the International Atomic Energy Agency (IAEA), in cooperation with international agencies including the crime-fighting organisation Interpol, will host a major conference on the protection of computer systems and networks that support operations at the world's nuclear facilities. According to the IAEA, the use of computers and other digital electronic equipment in physical protection systems at nuclear facilities, as well as in facility safety systems, instrumentation, information processing and communication, ''continues to grow and presents an ever more likely target for cyber-attack''. The international nuclear industry is right to take heed of ever-evolving security threats, deal with them accordingly, and be as open and transparent as security allows about what is being done, which will reassure the general public. However, the potential menace of cyberspace should not be allowed to become such a distraction that it gives those who are ideologically opposed to nuclear another stick with which to beat the industry.

  16. Chat Transcript Analysis Reveals that Undergraduate Students are Open to Instruction, While Instructors and Librarians Care About Supporting Student Learning

    Directory of Open Access Journals (Sweden)

    Elaine Sullo

    2017-03-01

    Full Text Available A Review of: Jacoby, J., Ward, D., Avery, S., & Marcyk, E. (2016. The value of chat reference services: A pilot study. portal: Libraries and the Academy, 16(1, 109-129. https://doi.org/10.1353/pla.2016.0013 Objective – To investigate student, instructor, and librarian perspectives of chat reference service in the context of first-year undergraduate students conducting research for an introductory composition course. Design – Focus groups, individual interviews, and surveys. Setting – A large, public university in the United States of America. Subjects – 57 library reference providers, 36 instructors of an introductory composition course, and approximately 936 undergraduate students in certain sections of the introductory composition course who were assigned a specific research project. Methods – In spring of 2014, all participants were invited via email to respond to an anonymous chat transcript of a librarian interacting with a student working on his or her research project. Study participants could participate via a brief survey or by taking part in a focus group or individual interview. The invited instructors were asked to forward the invitation to the students in their sections, and reminder emails were sent two weeks after the initial email. Main Results – Nine instructors, 24 students, and 25 library reference providers participated in the study, representing a response rate of 25%, 3% (estimated, and 44%, respectively. The authors conducted a qualitative analysis of key themes that were derived from both the focus groups or individual interviews and the survey questions. The themes were: students as novice researchers, question negotiation, open and closed questions, instruction, speed and convenience, customer service, and referrals. The theme of “students as novice researchers” is based on student comments related to their frustrations of being inexperienced researchers, as well as librarian comments on strategies for

  17. Prevalence of Autism Spectrum Phenomenology in Cornelia de Lange and Cri du Chat Syndromes

    Science.gov (United States)

    Moss, Joanna F.; Oliver, Chris; Berg, Katy; Kaur, Gurmeash; Jephcott, Lesley; Cornish, Kim

    2008-01-01

    Autism spectrum disorder characteristics have not been evaluated in Cornelia de Lange and Cri du Chat syndromes using robust assessments. The Autism Diagnostic Observation Schedule and Social Communication Questionnaire were administered to 34 participants with Cornelia de Lange syndrome and a comparison group of 23 participants with Cri du Chat…

  18. Conversational elements of online chatting: speaking practice for distance language learners?

    Directory of Open Access Journals (Sweden)

    Vincenza Tudini

    2003-12-01

    Full Text Available A critical issue in the delivery of language courses at a distance is to provide adequate scaffolding and monitoring1 of learners to assist them in the development of their interlanguage. As well as being one of the main reasons students enroll in language courses, oral interaction is considered beneficial to interlanguage development since it provides opportunities for negotiation of meaning. In the case of campus-based students, learners' progress in speaking the target language is supported and monitored mainly in the classroom. If non campus-based or online students do not attend face-to-face classes, how do they find opportunities for oral interaction? Using a Conversational Analysis and Second Language Acquisition perspective, the author considers elements which are common to both face-to-face oral interactions and chatting via a computer, with a view to assessing the potential of synchronous text-based communication tools to support the development of the speaking skills and interlanguage of distance language learners. This is done by reviewing findings of previous studies on synchronous text-based communication tools and identifying selected characteristics of oral interaction which are present in the chat sessions of two groups of campus-based intermediate level learners of Italian. In particular, the study focuses on repairs and incorporation of target forms, variety of speech acts, particularly questions and clarification requests, and the presence of discourse markers.

  19. “But, don’t you think...?”: chat educacional para a reflexão na formação inicial de professores de inglês

    Directory of Open Access Journals (Sweden)

    Lucas Moreira dos Anjos-Santos

    2015-05-01

    Full Text Available Resumo Este artigo objetiva investigar a participação de alunos-professores em um chat educacional e as reflexões propiciadas ou não por meio do uso desse gênero digital. Partimos do pressuposto de que a atividade de reflexão situada pode ser uma das ferramentas para a formação de professores comprometidos com suas práticas e capazes de orientar e tomar decisões com base em seus contextos de atuação. Os dados analisados são de uma pesquisa conjunta desenvolvida por pesquisadores de duas universidades estaduais do norte do Paraná. Os participantes da pesquisa são alunos-professores dos terceiro e primeiro anos do curso de Letras-Inglês. Os resultados demonstram que o uso do chat educacional pode ser adequado a situações em que o aluno-professor tenha sua voz ouvida e quebre padrões de assimetria entre professor e aluno-professor. Palavras-chave: Chat educacional. Formação inicial de professores de inglês. Atividade de reflexão   “But, don’t you think...?”: educational chat for reflection in pre-service English teacher education Abstract This article aims to investigate the participation of pre-service teachers in an educational chat and the reflection promoted or not by the use of this digital genre.The investigation is based on the assumption that the activity of situated reflection can be one of the tools for educating teachers committed to their practices and capable of making decisions by assessing their professional contexts. The data analyzed are part of a joint research developed by researchers from two state universities in the north of Paraná. The research participants are pre-service teachers from third and first years in an English Language undergraduate degree. The results show that the use of educational chats can be adequate to situations in which pre-service teachers have their voices heard and break asymmetry patterns between teacher educators and pre-service teachers Keywords: educational chat; pre

  20. What Are Youth Asking about Drugs? A Report of NIDA Drug Facts Chat Day

    Science.gov (United States)

    Morton, Cory M.; Hoefinger, Heidi; Linn-Walton, Rebecca; Aikins, Ross; Falkin, Gregory P.

    2015-01-01

    The current study analyzes a sample of questions about drugs asked online by youth who participated in the National Institute on Drug Abuse's (NIDA) "Drug Facts Chat Day." The types of drugs youth asked about were coded into 17 substance categories, and the topics they raised were coded into seven thematic categories. The top five…

  1. Internet Infidelity: Exploration of Attitudes towards Partners Internet Behaviors

    Directory of Open Access Journals (Sweden)

    Mohammad R. Abdi

    2012-09-01

    Full Text Available Background: Today, the Internet has become a part of our everyday life and online communications have made it easy for people to develop interpersonal relationships. However, certain problems and difficulties have arisen from this issue. One of these problems, which have been prevalent among couples and families, is extramarital internet relationships or internet infidelity. The present research has been done to study people's attitudes towards this phenomenon. Materials and Methods: A 43-item Internet Infidelity Questionnaire (IIQ was presented on a website designed for this purpose. 481 Iranian users who were members of Farsi language forums and chat rooms were selected through available community sampling and enrolled in the study. To analyze research data, descriptive statistics and the t-test were used.Results: The results showed that either women or men considered online sexual activities of their partners as traitorous compared with friendly and emotional activities in cyberspace. In addition, women in comparison with men had a more negative attitude towards their partners’ internet activity (especially online sexual activities.Conclusion: This study expanded our understanding of the traditional concept of infidelity that had merely limited it to face-to-face sexual and emotional behavior. The results also showed that women had more negative attitudes towards such activities compared to men.

  2. UChat: chat accesible para la Universidad Carlos III de Madrid

    OpenAIRE

    García Morales, Pablo

    2015-01-01

    En los últimos años se ha producido un increíble aumento en el uso de aplicaciones en telefonía gracias al auge de los teléfonos inteligentes, especialmente las aplicaciones de mensajería instantánea de tipo chat. Estas aplicaciones, además, en los últimos años se han ido utilizando cada vez más en docencia, facilitando la comunicación entre alumnos y profesores en todo momento. A pesar de su popularidad, todavía presentar barreras de accesibilidad que impiden que muchas personas (personas co...

  3. Cyberspace Security Econometrics System (CSES) - U.S. Copyright TXu 1-901-039

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Schlicher, Bob G [ORNL; Sheldon, Frederick T [ORNL; Lantz, Margaret W [ORNL; Hauser, Katie R [ORNL

    2014-01-01

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. The Cyberspace Security Econometrics System (CSES) provides a measure (i.e., a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement. The basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings contained in this copyright.

  4. Changing communities, changing spaces: the challenges of health promotion outreach in cyberspace.

    Science.gov (United States)

    Hallett, Jonathan; Brown, Graham; Maycock, Bruce; Langdon, Patricia

    2007-01-01

    This article is a case study of an Internet chat room outreach project in Perth, Western Australia. The CyberReach project sought to adapt current peer based health promotion outreach, training and supervision frameworks to an online outreach setting in a way that was effective and supported by the online community. It targeted marginalised groups to trial the provision of online mental and sexual health promotion incorporating a participatory action research model into its development and implementation. Three 6-week trial periods were conducted and significant changes were made in response to changes in the online environment and to improve sustainability and effectiveness of the protocols. Four themes arose from CyberReach's experience: online group processes are unique due to the creation of extensive personal networks and occurrence of disclosure without face-to-face contact across potentially large geographic barriers; flexibility is required to adapt to technological changes and online community flux; enforcing boundaries and delineating peer education from therapeutic support can be challenging when only using text-based communication; and Internet outreach can be time intensive with small returns in actual community engagement and constant technological up-skilling of staff may be required. Based on the project's experiences we offer the following recommendations when planning similar Internet outreach strategies: Funding and planning groups need to be aware that the Internet environment is constantly changing and planning and funding arrangements need to reflect a capacity to remain flexible; Programs need to be firmly connected to the communities they are outreaching therefore a peer-based education component is strongly encouraged; Careful consideration should be taken regarding data collection so that the environment and the individuals within are respected; Further research needs to be conducted to understand the styles and approaches of different

  5. Dan Goldin chats with First Lady Hillary Clinton

    Science.gov (United States)

    1999-01-01

    At the Apollo/Saturn V Center, NASA Administrator Daniel Goldin (right) chats with First Lady Hillary Rodham Clinton and others while waiting for the launch of STS-93. Much attention has been generated over STS-93 due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. The primary payload of the five-day mission is the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X-ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes. Liftoff of Space Shuttle Columbia is scheduled for 12:36 a.m. EDT July 20.

  6. Hello Harlie: Enabling Speech Monitoring Through Chat-Bot Conversations.

    Science.gov (United States)

    Ireland, David; Atay, Christina; Liddle, Jacki; Bradford, Dana; Lee, Helen; Rushin, Olivia; Mullins, Thomas; Angus, Dan; Wiles, Janet; McBride, Simon; Vogel, Adam

    2016-01-01

    People with neurological conditions such as Parkinson's disease and dementia are known to have difficulties in language and communication. This paper presents initial testing of an artificial conversational agent, called Harlie. Harlie runs on a smartphone and is able to converse with the user on a variety of topics. A description of the application and a sample dialog are provided to illustrate the various roles chat-bots can play in the management of neurological conditions. Harlie can be used for measuring voice and communication outcomes during the daily life of the user, and for gaining information about challenges encountered. Moreover, it is anticipated that she may also have an educational and support role.

  7. From "Hello" to Higher-Order Thinking: The Effect of Coaching and Feedback on Online Chats

    Science.gov (United States)

    Stein, David S.; Wanstreet, Constance E.; Slagle, Paula; Trinko, Lynn A.; Lutz, Michelle

    2013-01-01

    This exploratory study examined the effect of a coaching and feedback intervention in teaching presence and social presence on higher-order thinking in an online community of inquiry. Coaching occurred before each chat, and feedback was provided immediately afterwards. The findings suggest that over time, the frequency of higher-order thinking…

  8. More than "Hello" and "Bye-Bye": Opening and Closing the Online Chats in Mandarin Chinese

    Science.gov (United States)

    Zhang, De

    2014-01-01

    Reporting on a descriptive study on the first semester Chinese language learners' openings and closings in online chats with age-peer native speakers of Chinese, this paper demonstrates the great promise that telecollaboration holds for foreign language education, and argues for an increasing role of pragmatics in Chinese language instruction, and…

  9. Analysis of chats on French internet forums about drugs and pregnancy.

    Science.gov (United States)

    Palosse-Cantaloube, Lucie; Lacroix, Isabelle; Rousseau, Vanessa; Bagheri, Haleh; Montastruc, Jean-Louis; Damase-Michel, Christine

    2014-12-01

    Some pregnant women use the internet to search for medical information. However, online information is not controlled. The objectives were to describe French online chats about drugs and pregnancy and evaluate the quality and reliability of information shared by internet users. This French descriptive study was performed in November 2012. In order to identify drugs and pregnancy-related forum websites, we used three French key words: forum, pregnancy and drug. We explored the first 10 websites from the search result. Diseases were described using the International Classification of Diseases and drugs classified with the Anatomical Therapeutic Chemical codes and the FDA risk classification. We selected 115 questions that were mainly posted by pregnant internet users in French forums. Drugs raising questions were mostly "nervous system," "anti-infective for systemic use" and "respiratory system" drugs. The risk during pregnancy for nearly half of these drugs had not been evaluated properly. Health professionals were only involved in 7% of the 214 answers. Internet users advised to take a drug in 21% of their answers. Thirty-four percent of those recommended drugs had not been well-evaluated or were potentially at risk during pregnancy. Finally, 12% of the answers could be at risk for pregnant woman. This study shows that information related to drugs and pregnancy in online chats could be at risk for pregnant women. Internet users must be aware that online forums are not reliable sources of information. Copyright © 2014 John Wiley & Sons, Ltd.

  10. A CBPR partnership increases HIV testing among men who have sex with men (MSM): outcome findings from a pilot test of the CyBER/testing internet intervention.

    Science.gov (United States)

    Rhodes, Scott D; Vissman, Aaron T; Stowers, Jason; Miller, Cindy; McCoy, Thomas P; Hergenrather, Kenneth C; Wilkin, Aimee M; Reece, Michael; Bachmann, Laura H; Ore, Addison; Ross, Michael W; Hendrix, Ellen; Eng, Eugenia

    2011-06-01

    The Internet has emerged as an important tool for the delivery of health promotion and disease prevention interventions. Our community-based participatory research (CBPR) partnership developed and piloted CyBER/testing, a culturally congruent intervention designed to promote HIV testing among men who have sex with men (MSM) within existing Internet chat rooms. Using a quasi-experimental, single-group study design, cross-sectional data were collected from chat room participants, known as "chatters," at pretest (n = 346) and posttest (n = 315). Extant profile data also were collected to describe the demographics of the online population. The intervention significantly increased self-reported HIV testing among chatters overall, increasing rates from 44.5% at pretest to nearly 60% at posttest (p testing at posttest. Findings suggest that chat room-based HIV testing intervention may increase testing among MSM who may be difficult to reach in traditional physical spaces.

  11. The Mineral Character and Geomechanical Properties of the Transitional Rocks from the Mesozoic-Neogene Contact Zone in the Bełchatów Lignite Deposit

    Directory of Open Access Journals (Sweden)

    Agnieszka Pękala

    2014-01-01

    Originality/value: Against the background of a number of published papers on the rocks accompanying lignite seams there is a lack of the "Bełchatów" mineralogical-petrographic studies of the transitional sediments in the Mesozoic-Neogene contact zone in the "Bełchatów" lignite deposit taking into account the aspect of raw materials. This paper has been produced to fill the void in this area.

  12. Screening for Autism in Iranian Preschoolers: Contrasting M-CHAT and a Scale Developed in Iran

    Science.gov (United States)

    Samadi, Sayyed Ali; McConkey, Roy

    2015-01-01

    Suitable screening instruments for the early diagnosis of autism are not readily available for use with preschoolers in non-Western countries. This study evaluated two tools: M-CHAT which is widely used internationally and one developed in Iran called Hiva. A population sample was recruited of nearly 3000 preschoolers in one Iranian city. Parents…

  13. Analysis on the Information Crisis in the Micro Era——A Case Study of the WeChat Friends Circle

    Directory of Open Access Journals (Sweden)

    Wang feifei

    2017-12-01

    Full Text Available [Purpose/significance] In the mobile social network, the emergence and dissemination of information presents a new law and characteristics. Social network information management is facing enormous challenges. [Method/process] We analyzed the characteristics of micro information transmission from four perspectives--information dissemination, information contents, information cognition and information communication. Then, we analyzed the crisis and put forward related strategies of WeChat information. [Result/conclusion]The microera has changed our lives and brought us a new crisis: the user’s over-reliance, the expansion of WeChat immediate information, the influx of weak relations, the ongoing increase of information noise and so on. Through analyzing the information characteristics and discussing about the crisis, it provides a proper theoretical basis for facing the information crisis.

  14. Manejo anestésico de paciente com síndrome de Cri Du Chat (miado do gato: relato de caso

    Directory of Open Access Journals (Sweden)

    Klaus Morales dos Santos

    2010-12-01

    Full Text Available JUSTIFICATIVA E OBJETIVOS: A síndrome de Cri Du Chat é uma desordem cromossômica com características clínicas peculiares, incluindo anormalidades de vias aéreas, que exigem do anestesiologista cuidados especiais no manuseio desses pacientes. OBJETIVO: Apresentar um caso de anestesia ambulatorial em paciente com síndrome de Cri Du Chat e abordar os aspectos anestésicos relacionados com essa doença. RELATO DO CASO: Paciente do sexo masculino, 14 anos, 25 kg, portador de síndrome de Cri Du Chat, estado físico ASA P2, admitido para realização de endoscopia digestiva alta e dilatação esofagiana. Quadro neurológico com retardo mental, alguns episódios de convulsões e hipertonia acentuada de membros. Exame das vias aéreas demonstrando mobilidade cervical limitada e distância tireomentoniana inferior a 6 cm. Paciente não atendia ao comando verbal, sendo difícil a avaliação completa das vias aéreas. Outros achados ao exame físico incluíram microcefalia, micrognatia, discreto estrabismo, hipertonia de membros em flexão e protrusão de língua. Administrados, por via venosa, 50 µg de citrato de fentanila, 1 mg de midazolam e 60 mg de propofol. Mantido em ventilação espontânea. Procedimento com duração de 5 minutos, realizado sem intercorrências. CONCLUSÕES: Pacientes com síndrome de Cri Du Chat apresentam características clínicas de grande relevância no manejo anestésico, cabendo ao anestesiologista considerar com cautela as particularidades estruturais de cada paciente.

  15. Mediated Group Development and Dynamics: An Examination of Video Chatting, Twitter, and Facebook in Group Assignments

    Science.gov (United States)

    Frisby, Brandi N.; Kaufmann, Renee; Beck, Anna-Carrie

    2016-01-01

    Instructors incorporate technological tools into the classroom to address short attention spans, appeal to technologically savvy students, and to increase engagement. This study used both quantitative descriptive and qualitative embedded assessment data to examine the use of three popular tools (i.e. Twitter, Facebook, and video chatting) in…

  16. Web Surveys to Digital Movies: Technological Tools of the Trade.

    Science.gov (United States)

    Fetterman, David M.

    2002-01-01

    Highlights some of the technological tools used by educational researchers today, focusing on data collection related tools such as Web surveys, digital photography, voice recognition and transcription, file sharing and virtual office, videoconferencing on the Internet, instantaneous chat and chat rooms, reporting and dissemination, and digital…

  17. The Classroom, Board Room, Chat Room, and Court Room: School Computers at the Crossroads.

    Science.gov (United States)

    Stewart, Michael

    2000-01-01

    In schools' efforts to maximize technology's benefits, ethical considerations have often taken a back seat. Computer misuse is growing exponentially and assuming many forms: unauthorized data access, hacking, piracy, information theft, fraud, virus creation, harassment, defamation, and discrimination. Integrated-learning activities will help…

  18. Proposal and Evaluation of Sequencing Words in Chat Conversation between Japanese and Chinese using Machine Translation

    OpenAIRE

    李, 芬慧; 由井薗, 隆也

    2010-01-01

    日中翻訳チャットにおいて単語を並べた会話によるチャットコミュニケーションを提案する.比較評価のために,通常の文章チャットによる評価実験も行った.その結果,日中翻訳チャットにおいて,(1)単語チャットは会話速度や会話内容の理解において文章チャットと同等に使えること,(2)利用者は,単語チャットよりは文章チャットを好む傾向があること,(3)翻訳された会話の理解は日本人と中国人とで文化的違いがある可能性が得られた.今後は単語チャットの応用を検討する予定である. : We propose a chat conversation between Japanese and Chinese using machine translation by sequencing words. By comparison with a conventional chat using machine translation, it is showed that (1) sequencing words in the chat is as same speed and understanding as the...

  19. Twitter journal clubs and continuing professional development: An analysis of a #MedRadJClub tweet chat.

    Science.gov (United States)

    Bolderston, A; Watson, J; Woznitza, N; Westerink, A; Di Prospero, L; Currie, G; Beardmore, C; Hewis, J

    2018-02-01

    Online Twitter journal clubs are a recent and popular innovation with the potential to increase research awareness and inform practice. The medical radiation sciences' MedRadJournalClub (MJRC) is a Twitter-based event that attracts a global group of participants at the monthly chats. An analysis of a recent MedRadJournalClub discussion evaluated the perceived benefits and limitations of medical radiation practitioners participating in an online journal club. The February 2017 chat used for analysis was based on the Journal of Medical Imaging and Radiation Sciences article by Currie et al. "Twitter Journal Club in Medical Radiation Science" that examines the educational theory behind learning and evidencing professional development through MRJC and social media. The data consisted of chat tweets which were collated using the Twitter advanced search function using the #medradjclub. An initial reviewed was performed to exclude irrelevant content. A second review was then undertaken to categorize the main theme of the tweet. The data were then subjected to thematic analysis which yielded seven different categories. The main benefits included global access due to the online nature of MRJC that has facilitated networking and collaboration. Open access to recently published research was another key benefit. The character limitation of a tweet was the most common constraint, and the dynamic nature of the twitter conversation requires multi-tasking that may be difficult. Our analysis indicated that participants use MedRadJournalClub as a source of continuing professional development with some evidence that this is directly informing clinical and educational practice. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  20. Effects of short-term hormonal replacement on learning and on basal forebrain ChAT and TrkA content in ovariectomized rats.

    Science.gov (United States)

    Espinosa-Raya, Judith; Plata-Cruz, Noemí; Neri-Gómez, Teresa; Camacho-Arroyo, Ignacio; Picazo, Ofir

    2011-02-23

    It has been proposed that sex steroid hormones improve performance in some cognitive tasks by regulating the basal forebrain cholinergic function. However, the molecular basis of such influence still remains unknown. Current study analyzed the performance of ovariectomized rats in an autoshaping learning task after a short-term treatment with 17β-estradiol (E2: 4 and 40μg/kg) and/or progesterone (P4: 4mg/kg). These results were correlated with basal forebrain choline acetyltransferase (ChAT) and TrkA protein content. The high dose of E2 enhanced both acquisition in the autoshaping task and the content of ChAT and TrkA. P4 treatment increased ChAT and TrkA content without affecting performance of rats in the autoshaping learning task. Interestingly, the continuous and simultaneous administration of E2 plus P4 did not significantly modify behavioral and biochemical evaluated parameters. These results address the influence of both E2 and P4 on cholinergic and TrkA activity and suggest that the effects of ovarian hormones on cognitive performance involve basal forebrain cholinergic neurons. Copyright © 2010 Elsevier B.V. All rights reserved.

  1. On how the Cyberspace arose to fulfill theoretical physicists' needs and eventually changed the World: Personal recallings and a practitioner's perspective

    OpenAIRE

    Elizalde, Emilio

    2017-01-01

    The very humble origins of the Cyberspace, and all the related developments that smoothly conspired and converged towards this concept, making its emergence possible, as the personal computer, TEX and LATEX, the Fax, the internet, the cellphone, and the World Wide Web, are discussed, always from a personal perspective. A separate, comprehensive explanation of the reasons for the appearance and subsequent evolution of each of these different phenomena, with explicit assessments and a future pr...

  2. The Usability of WeChat as a Mobile and Interactive Medium in Student-Centered Medical Teaching

    Science.gov (United States)

    Wang, Juan; Gao, Furong; Li, Jiao; Zhang, Jieping; Li, Siguang; Xu, Guo-tong; Xu, Lei; Chen, Jianjun; Lu, Lixia

    2017-01-01

    Biochemistry and cellular biology courses for medical students at Tongji University include the assessment that provides students with feedback to enhance their learning, which is a type of formative assessment. However, frequent instant feedback and guidance for students is often absent or inconsistently included in the teaching process. WeChat,…

  3. 75 FR 1426 - National Futures Association; Notice of Filing and Immediate Effectiveness of Proposed Rule...

    Science.gov (United States)

    2010-01-11

    ...) require that certain audio and video advertisements that appear on the Internet--like similar radio and... CPO/CTA Advisory Committees considered the growing use of social networking groups such as blogs, chat... advertisements, while participating in a chat room is a public appearance subject to FINRA rules. The guidance...

  4. Effectiveness of a web-based solution-focused brief chat treatment for depressed adolescents and young adults: randomized controlled trial.

    Science.gov (United States)

    Kramer, Jeannet; Conijn, Barbara; Oijevaar, Pien; Riper, Heleen

    2014-05-29

    Up to 9% of young people suffer from depression. Unfortunately, many in need of help remain untreated. The Internet offers anonymous ways to help depressed youth, especially those who are reluctant to search for help because of fear of stigma. Our goal was to evaluate the effectiveness of an individual chat treatment based on Solution-Focused Brief Therapy (SFBT) to young individuals aged 12-22 years with depressive symptoms by comparing it to a waiting list control group. For this study, 263 young people with depressive symptoms were randomized to the Web-based SFBT intervention, PratenOnline, or to a waiting list control condition. The chat treatment was delivered by trained professionals. Groups were compared on depressive complaints as measured by the Center for Epidemiologic Studies Depression Scale (CES-D) after 9 weeks and 4.5 months. For the chat group only, changes in depressive symptoms at 7.5 months after baseline were explored. The experimental SFBT condition (n=131) showed significantly greater improvement than the waiting list condition (n=132) in depressive symptoms at 9 weeks and 4.5 months on the CES-D, with a small between group effect size at 9 weeks (d=0.18, 95% CI -0.10 to 0.47) and a large effect size at 4.5 months (d=0.79, 95% CI 0.45-1.08). The percentage of participants showing a reliable and clinically significant change in depression was significantly larger for the SFBT intervention at 4.5 months only (28.2% vs 11.4% for the waiting list, PWeb-based SFBT chat intervention of PratenOnline was more effective than a waiting list control group in reducing depressive symptoms, and effects were larger at follow-up then at post-treatment. More studies are needed to find out if outcomes will be replicated, especially for those younger than 18 year old. Netherlands Trial Register: NTR 1696; http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=1696 (Archived by WebCite at http://www.webcitation.org/6DspeYWrJ).

  5. Reflexões sobre a linguagem do ambiente chat no teletandem sob a perspectiva da natureza heterogênea da escrita

    Directory of Open Access Journals (Sweden)

    Suzi Marques Spatti Cavalari

    2012-07-01

    Full Text Available O objetivo deste trabalho é discutir as características da linguagem mediada pelo computador em um ambiente de ensino e aprendizagem de língua estrangeira viabilizado pelo uso de recursos de comunicação síncrona na modalidade escrita – chat. O presente estudo se fundamenta em (i princípios teóricos sobre o uso de tecnologias e o ensino/aprendizagem de línguas estrangeiras no escopo do Projeto Teletandem Brasil: línguas estrangeiras para todos (TELLES, 2005; (ii estudos sobre as características da linguagem em interações via chat; (iii diferentes perspectivas teóricas a respeito das relações entre o oral e o escrito, enfatizando a perspectiva da heterogeneidade constitutiva da escrita (CORRÊA, 1997, 1998, 2001; e (iv em alguns conceitos pertinentes à área da Fonologia Prosódica (NESPOR; VOGEL, 1986. Toma‑se como material de análise a produção escrita de uma universitária brasileira (formanda em Licenciatura em Letras que interage com um universitário estadunidense (cursando Estudos Religiosos via Windows Live Messenger. Os dados foram coletados em um período de 5 meses, durante os quais os participantes interagiram via chat, totalizando 12 interações em inglês e em português. Na análise, enfocam-se as interações em língua portuguesa, particularmente a fragmentação das mensagens, o uso (ou não de sinais de pontuação e de abreviaturas na produção da participante brasileira, a fim de se discutirem as representações que ela constrói sobre a (sua escrita, sobre seu interlocutor, sobre si mesma e sobre o processo de ensino/aprendizagem de língua estrangeira.Palavras-chave: Língua escrita. Heterogeneidade. Chat. Teletandem.

  6. A CHAT Perspective on Mobile Technology in Education

    DEFF Research Database (Denmark)

    Stenild, Kåre; Iversen, Ole Sejer

    The body of research within the design of mobile technology for use in k-12 education has primarily focused on the features and thereby new options that are brought about when utilizing mobile technologies in education. However, the theoretical concern for mobile technology’s effect on the child......’s development is not yet fully covered. In this paper we argue that mobile technology is a valuable resource in K-12 education. Based on CHAT theory, we argue that mobile technology potentially mediates subject matter knowledge and everyday knowledge and thereby supports the child to acquire valuable......Bag) in a participatory design context involving both teachers and students in the process. A four-month evaluation of the final version of the eBag was conducted to make a preliminary evaluation of the possibilities of mobile supported education. The result of this preliminary evaluation indicates that mobile technology...

  7. Late Neogene leaf assemblage from Bełchatów Lignite Mine (central Poland

    Directory of Open Access Journals (Sweden)

    Worobiec Grzegorz

    2014-12-01

    Full Text Available Leaf macroremains collected in the Bełchatów Lignite Mine (central Poland were investigated. The fossil assemblage consists of leaves of Acer, Betula, Carpinus, Dicotylophyllum, Fagus, ?Magnolia, “Parrotia”, Pinus, Quercus, and Zelkova. Mesophytic (zonal elements dominate, with admixture of riparian (azonal leaf taxa. The floristic composition points to late Neogene (late Miocene to late Pliocene age and suggests favourable temperate climate with mild winters.

  8. Possibilities and Limits of Religion in the Cyberspace of Digital Media

    Directory of Open Access Journals (Sweden)

    Slavomír Gálik

    2017-06-01

    Full Text Available The authors of this paper study possibilities and limits of religion in the cyberspace of digital media, especially in the World of Warcraft videogame. Basing on various research cases, they claim that videogames can saturate religious needs of the hypermodern human. Nevertheless, they cannot substitute them totally, since there is the humans’ body, a barrier between virtual and traditional religion. In the first case (the so-called external limitation, the body is irreplaceable in religious ritual such as Baptising in Christian religion or Mindfulness of Breathing (ānāpānasati in Buddhism. In the second case (the so-called internal limitation, when the body (or its nerve centre is linked to technologies, the boundary lies in the depth and validity of spiritual experience. The authors state that even if positive cyber-spiritual experience could be reached, it would still be necessary to plant it into broader moral and cognitive frames. Only in such case it could represent a positive stimulus for the spiritual journey.

  9. Occupational Therapy Intervention in a child with Cri-du-Chat Syndrome: a case study

    Directory of Open Access Journals (Sweden)

    Gabriela Caseiro

    2013-04-01

    Full Text Available Cri-du-Chat syndrome is a chromosomal abnormality that can result in several damages including developmental delay and intellectual disability of the affected child. This case study describes the occupational therapy intervention in a child with Cri-du-chat syndrome that was followed from two to four years old, in weekly sessions, at a school hospital in the state of São Paulo. Data from medical records, family reports, and occupational therapy sessions were used for case description. The initial assessment showed that the child was hypotonic, stood up only with support, and explored objects by taking them to the mouth. Occupational Therapy assistance aimed to stimulate sensorimotor performance skills (perceptual, neuromuscleskeletal and motor processing and cognitive integration and components (attention spectrum, sequencing, and learning, through make-believe activities and participation in the activities of daily living (ADL. Moreover, it was also necessary to intervene directly in the school context and the child’s family, advising parents to avoid overprotection. Through the jointffort of the multidisciplinary team and the child’s family, it was possible to contribute to the improvement of bodily functions, allowing an increase in activities and participation, considering the child’s personal factors and environmental conditions, with consequent discharge from ambulatory attendance of occupational therapy.

  10. "985"高校微信公众号发展现状研究%Research on the Development Status of WeChat Public Accounts of "985" Universities

    Institute of Scientific and Technical Information of China (English)

    周春雷; 曹玲静

    2017-01-01

    利用搜狗微信搜索采集"985"高校相关微信公众号数据并清洗、整理,运用标签法对其进行语义层面的整合,进而梳理微信公众号间的内在联系并探讨"985"高校在新媒体传播、微信公众号管理等方面存在的问题.建议"985"高校从声誉管理视角加强对相关微信公众号的统一管理,使其成为媒体宣传、品牌维护的重要阵地.%This paper searched and cleaned the data of "985" Universities' WeChat public accounts with the tool of Sogou WeChat search. We looked into theinternal relationship among the WeChat public accounts by using labels attached to them, then we discussed the problems and gave some countermeasures to solvethem. In order to make WeChat public account an important tool to communicate with the public, the paper suggests to carry out a unified management from thereputation management point of view.

  11. The Mineral Character and Geomechanical Properties of the Transitional Rocks from the Mesozoic-Neogene Contact Zone in the Bełchatów Lignite Deposit

    OpenAIRE

    Agnieszka Pękala

    2014-01-01

    Purpose: Beginning more than 30 years ago, opencast lignite mining in the "Bełchatów" area is an important source of accompanying minerals. Lignite mining in the "Bełchatów" mine yields, on average, more than 35 million tonnes per annum and requires removing more than 110 million cubic meters of overburden. Therefore the mine outside of the main mineral exploitation of lignite, leads to a large-scale economy of accompanying minerals. Part of the minerals are present in the overburden and are ...

  12. Comparaison de différentes associations d'anticoagulants sur les numérations plaquettaires et la formation d'agrégats chez le chat

    OpenAIRE

    Charru, Pauline

    2011-01-01

    Chez le chat, l'hémogramme est un examen complémentaire parfois difficile à interpréter aux vues des nombreuses difficultés d'ordre pré-analytique et analytique potentielle. Parmi elles, on retiendra la forte tendance des plaquettes à s'agréger in vitro, surtout sur EDTA-dépendante, une nouvelle molécule antiagrégante a montré son intérêt : le CTAD (Citrate, Théophylline, Adénosine et Dipyridamole). Dans notre étude, l'utilisation de l'association EDTA et CTAD chez 46 chats sains, en éliminan...

  13. Psychological Well-Being in Parents of Children with Angelman, Cornelia de Lange and Cri du Chat Syndromes

    Science.gov (United States)

    Griffith, G. M.; Hastings, R. P.; Oliver, C.; Howlin, P.; Moss, J.; Petty, J.; Tunnicliffe, P.

    2011-01-01

    Background: The current study focuses on mothers and fathers of children with three rare genetic syndromes that are relatively unexplored in terms of family experience: Angelman syndrome, Cornelia de Lange syndrome and Cri du Chat syndrome. Method: Parents of children with Angelman syndrome (n = 15), Cornelia de Lange syndrome (n = 16) and Cri du…

  14. The Dot.com Kids and the Demise of Frustration Tolerance

    Science.gov (United States)

    Benoit, Marilyn B.

    2005-01-01

    Many children are now on the Internet receiving almost instant responses to queries. Groups can form instant "chat rooms," creating rapid virtual social gatherings. A recent cartoon by Mike Twohy in the Washington Post (1/11/00) depicted a young boy leaving the family dinner table in anger while shouting "Fine- I'll go talk to my chat room…

  15. When do online sexual fantasies become reality? The contribution of erotic chatting via the Internet to sexual risk-taking in gay and other men who have sex with men.

    Science.gov (United States)

    Adam, Philippe C G; Murphy, Dean A; de Wit, John B F

    2011-06-01

    Seeking sexual partners online is associated with sexual risk-taking among men who have sex with men (MSM), but it is not well understood how this use of the Internet is implicated in potential sexual risks. The present study explores whether fantasizing about unprotected anal intercourse (UAI) during online chatting is associated with UAI with partners met online. An online survey of 2058 MSM in France included assessments of UAI with partners met online, responses to erotic chatting about UAI, intentions to use condoms, attitudes regarding UAI, practicing UAI with casual partners, alcohol and drug use with sex and biographical characteristics. While intentions to use condoms with casual partners were high, one-third (32.1%) of respondents reported UAI with partners met online. Responding positively to online chatting about UAI was significantly associated with UAI with partners met online, controlling for intentions, attitudes, behavior and biographic characteristics. These findings suggest that, while MSM may not go online to seek UAI, some engage in online fantasizing about UAI that is associated with possible sexual risk-taking. This speaks critically to the assumption that online fantasizing has no behavioral implications, and underscores the importance of human immunodeficiency virus prevention that addresses the dynamics of online chatting.

  16. El Chat: ¿Medio de Comunicación o Laboratorio de Experimentación de la Identidad? Estudio en una Muestra de 124 Estudiantes Universitarios de Santiago de Chile The Chat: ¿Is it a Communication Media or a Laboratory to Experience With Identity? A Study with 124 University Students in Santiago, Chile

    Directory of Open Access Journals (Sweden)

    Beatriz Zegers

    2004-05-01

    Full Text Available Se reportan los resultados de la aplicación exploratoria en una muestra de 124 estudiantes universitarios, de un test de Completación de Frases (TCF orientado a evaluar si el chat es un medio de comunicación o si también, a través de él, los jóvenes experimentan -asumiendo roles o comportamientos ficticios- comprometiendo aspectos de su identidad. Se calculó el alpha de Cronbach del TCF y éste reveló una alta consistencia interna (0.91. El análisis factorial encontró una estructura subyacente conformada por seis factores (actitudes y consistencia del comportamiento entre la vida real y la realidad virtual; posibilidades y experiencias ofrecidas por la realidad virtual; enmascaramiento y engaño; desinhibición y vivencias de confusión y angustia; valoración de las experiencias virtuales; y actitudes frente a los cambios de identidad en el otro los que en su conjunto explican el 45.82% de la varianza, valor que se considera aceptable. Una media de 17.46 sobre un total de 42 puntos, con una desviación standard de 9.01, en un rango de mínimo de 3 puntos y máximo de 38 puntos en el TCF, nos permiten afirmar que los jóvenes comprometen su identidad en el chat. El análisis de varianza univariado para los puntajes totales del TCF reveló diferencias significativas según el sexo del encuestado (p = 0.024. En el análisis multivariado para los seis factores del TCF se encontró que los hombres exploraron más con las posibilidades de experiencias ofrecidas por la realidad virtual (p = 0.025, enmascararon con mayor frecuencia aspectos de su identidad y engañaron más que las mujeres (p = 0.006 y valoraron de manera más permisiva las experiencias que comprometen la identidad en el chat (p = 0.023. Respecto de la variable horas de chateo no se encontraran evidencias que permitan afirmar que existe una asociación entre esta variable y el compromiso de la identidad.This paper reports the results of the exploratory application of a

  17. Effects of mobile phone WeChat services improve adherence to corticosteroid nasal spray treatment for chronic rhinosinusitis after functional endoscopic sinus surgery: a 3-month follow-up study.

    Science.gov (United States)

    Feng, Shaoyan; Liang, Zibin; Zhang, Rongkai; Liao, Wei; Chen, Yuan; Fan, Yunping; Li, Huabin

    2017-03-01

    The objective of the study is to investigate the impact of receiving daily WeChat services on one's cell phone on adherence to corticosteroid nasal spray treatment in chronic rhinosinusitis (CRS) patients after functional endoscopic sinus surgery (FESS). This study was a two-arm, randomized, follow-up investigation. Patients with chronic rhinosinusitis with/without nasal polyps following bilateral FESS were randomised to receive, or to not receive, daily WeChat service on their cell phone to take corticosteroid nasal spray treatment. A prescription of budesonide aqueous nasal spray 128 µg bid was given to all the subjects. Then they returned to the clinic after 30, 60, 90 days. The primary study outcome was adherence to nasal spray treatment, whereas secondary outcomes were change in endoscopic findings and SinoNasal Outcome Test-20 (SNOT-20). On the whole, there was a significant inter-group difference in the change of adherence rate (F = 90.88, p = 0.000). The WeChat group had much higher adherence rate than the control group during the follow-up. In terms of postoperative endoscopic scores and SNOT-20, except granulation score, no significant differences were observed between the two randomization groups. WeChat services are already after a short period of observation associated with improved adherence to corticosteroid nasal spray treatment in CRS patients after FESS.

  18. WhatsApp: caracterização do gênero chat em contexto de ensino de línguas estrangeiras

    Directory of Open Access Journals (Sweden)

    Natália Costa Leite

    2015-07-01

    Full Text Available Digital information and communication technologies widely brought unquestionable advances in the fields of knowledge and social life. With the advent of these new technologies, meaning negotiation has become increasingly multimodal, that is, conventional methods of meaning negotiation by writing, for example, may link up with visual, oral, and gestural modes, among many others. Education can be configured as a space to enable and facilitate the new production of multiple meanings with the help of new technologies. Therefore, this paper proposes to present a characterization of the text genre chat through WhatsApp application, given its relevance and popularity among mobile users, by adopting Bakhtin’s perspective of speech genres (2003. The use of specific criteria for analysing the genre chat was the method applied. It is expected that the characterization of the genre may encourage the use of the instant messaging app as a support tool for teaching and learning a foreign language.

  19. Performing Re-mediation in Graphical Cyberspace: Mediating Agency, Body and Identity in Virtual Interactional Practices

    DEFF Research Database (Denmark)

    McIlvenny, Paul

    and spectacular multi-media event raises many questions. How do we conceive of the recent developments in media technology and social computing that are impacting on what we have traditionally called 'the mass media'? How is interaction and talk mediated and adapted to new media genres? And how do participants......Promoted as the first academic conference to be held completely in graphical cyberspace, Avatars 98 took place in November 1998. The virtual conference site was built and inhabited using software that supports multi-party presence over the Internet in a simulated, navigable environment. During...... frameworks through the multimedia representations that were 'cast' and 'served' across the Internet. If such a ceremonial event had been broadcast through the institutional medium of television, broadcast talk would have been produced for an eavesdropping 'mass audience'. Instead, the digitally re...

  20. Using WeChat official accounts to improve malaria health literacy among Chinese expatriates in Niger: an intervention study.

    Science.gov (United States)

    Li, Wei; Han, Le Qiang; Guo, Yan Jun; Sun, Jing

    2016-11-24

    Malaria is the main health risk for Chinese expatriates working in Niger. Health education is a recommended intervention for prevention of malaria among non-immune travellers and expatriate workers. It is urgent to develop an effective and feasible way for these populations to obtain information about the prevention and treatment of malaria. An individually randomized, unblinded, controlled trial was used to evaluate the effectiveness of using WeChat official accounts for health education to improve malaria health literacy among Chinese expatriates in Niger. A total 1441 participants completed a baseline malaria health literacy questionnaire and were randomly assigned to an intervention or comparison group in a ratio of 1:1. From July to October 2014, 50 malaria prevention and treatment messages were sent to the intervention group; 50 health news messages were concurrently sent to the control group. Both groups completed the malaria health literacy questionnaire again 4 months after the start of the education intervention. A questionnaire addressing satisfaction with the health education programme was completed by the intervention group. Malaria morbidity data for 2013 and 2014 were also collected. At baseline, participant health literacy rates were 58.29, 62, 54, and 34% for skills, knowledge, practice, and attitude, respectively. After the intervention, rates for all four aspects of malaria literacy were above 70%. There was greater change in knowledge, attitude, practice, skills, and overall health literacy among the intervention group compared with the controls, with a statistically significant difference (p WeChat health education programme with over 80% stating that they would continue to follow the programme. The present health education intervention, via a WeChat official account, for the prevention and treatment of malaria among non-immune travellers and expatriate workers proved to be an effective, sustainable, feasible, and well accepted strategy for

  1. Social Behavior and Characteristics of Autism Spectrum Disorder in Angelman, Cornelia de Lange, and Cri du Chat Syndromes

    Science.gov (United States)

    Moss, Joanna; Howlin, Patricia; Hastings, Richard Patrick; Beaumont, Sarah; Griffith, Gemma M.; Petty, Jane; Tunnicliffe, Penny; Yates, Rachel; Villa, Darrelle; Oliver, Chris

    2013-01-01

    We evaluated autism spectrum disorder (ASD) characteristics and social behavior in Angelman (AS; "n" ?=? 19; mean age ?=?10.35 years), Cornelia de Lange (CdLS; "n" ?=? 15; mean age ?=?12.40 years), and Cri du Chat (CdCS, also known as 5 p-syndrome; "n" ?=? 19; mean age ?=? 8.80 years) syndromes. The proportion of…

  2. “微信营销”存在的问题及其法律规制%The problems of "WeChat marketing" and its legal regulation

    Institute of Scientific and Technical Information of China (English)

    甫鲁西·齐美革

    2016-01-01

    In recent years,with the development and update of mobile Internet technology,and the rapid popularity of smart phones,the WeChat business,WeChat marketing also arises at the historic moment. Behind the strong mo-mentum of Wechat business development,many disadvantages exist in the WeChat marketing and trading,the legal issues and risks also gradually highlights. The paper expounds the WeChat business and WeChat marketing through the interpretation of the legal characteristics,and analyzes problems existing in the marketing and trading,such as false advertising overrun,purchasing agency of fake goods,and difficulty of rights protection. It puts forward the pro-posal from the aspects of legal regulation:using the existing legal norms,speeding up the electronic commerce legis-lation,and strengthening the administrative regulation.%近些年随着移动互联网技术的发展更新和智能手机加快普及,微商、微信营销也应运而生。微商强劲发展势头的背后,微信营销及交易存在诸多弊端,其中的法律问题和风险也逐渐凸显。文章通过对微信和微商以及微信营销的法律特征入手进行阐释,对微信营销及交易中存在的虚假广告泛滥成灾、微信诈骗和假货代购问题严重、买家维权困难等问题进行分析,从法律规制等角度提出利用现有的法律规范,并加快专门的电子商务立法、加大行政监管力度等建议。

  3. Reproducibility and convergences in the cyberspace: the diffusion of literary texts in television adaptations

    Directory of Open Access Journals (Sweden)

    Líliam Cristina Marins Prieto

    2014-03-01

    Full Text Available In this study, multimodal circulation of literary texts in television adaptations is outlined, emphasizing their implications in the conceptualization and value judgment in the Arts (particularly in Literature. The technological boom in several social segments and new reading practices in the current information revolution age have influenced the circulation of literature in new forms and intersemiotic medias. By congregating theories about cyberculture and media convergence (Negroponte, Lévy and Jenkins and the analysis of specific cases, such as the adaptation of Shakespeare´s The Taming of the Shrew (1593 in O Cravo e a Rosa (2000, a Brazilian telenovela directed by Walcyr Carrasco and Mário Teixeira, a new cultural context emerges. In this new configuration where television and cyberspace are part of the convergence culture, the media and their users interact. This interaction contributes towards the survival of the literary text and the emergence of new reading practices.

  4. IRC on your dime? What you really need to know about Internet relay chat

    Energy Technology Data Exchange (ETDEWEB)

    ERayome, J.; Romig, S., LLNL

    1998-05-22

    The purpose of this paper is to describe recent trends CIAC has encountered while working with sites that have been compromised. Frequently, the intruders set up and run Internet Relay Chat (IRC) to exchange information and to show off their success at having compromised a site. Invariably, this protocol consumes bandwidth, uses CPU cycles and is a source of embarrassment for the site. This paper focuses on these negative aspects of IRC and concedes that one can cite numerous examples where IRC is used in a positive manner.

  5. Design and Implementation of Mobile Blended Learning Model Based on WeChat Public Platform

    Directory of Open Access Journals (Sweden)

    Han Yanyan

    2017-01-01

    Full Text Available Merging together the ideas of mobile learning, blended learning and flipped classroom, a Mobile Blended Learning Model (MBLM is constructed. Based on WeChat Public Platform (WPP, MBLM can optimize the instructional process and improve the learning efficiency. A Mobile Blended Learning System(MBLS is implemented by using MBLM, and it is constructed by both WPP and auxiliary learning system which based on Java Web. This system has reasonable designed function, easy operation, and beautiful interface, so it can effectively promote the popularization of MBLM.

  6. Serviço de Referência Virtual: implantação do serviço de chat

    Directory of Open Access Journals (Sweden)

    Natalia Nakano

    2014-02-01

    Full Text Available Introdução: Com o advento da Internet e da Web Colaborativa, as bibliotecas tiveram que repensar a maneira como disponibilizam seus serviços. Assim, as bibliotecas norte-americanas iniciaram uma busca por inovações tecnológicas para levar a biblioteca até o usuário com recursos que ele já utiliza. O Serviço de Referência Virtual (SRV por meio de chat online e a referência por videoconferência caracterizam serviços que derivaram dessa busca. Objetivo: A proposta apresentada tem como objetivo delinear um dos processos de implantação dos recursos tecnológicos dos Serviços de Referência Virtuais (SRV utilizados por bibliotecas de universidades norte-americanas, em especial aqueles para atendimento por chat, bem como apresentar as experiências brasileiras bem sucedidas. Propõe fatores a serem considerados para a implantação do Serviço de Referência Virtual por meio de chat para bibliotecas desejosas de incluir esse serviço de atendimento no rol de seus serviços. Metodologia: A metodologia de pesquisa, consiste em um aporte teórico feito a partir da literatura produzida nacional e internacionalmente sobre o assunto, além de uma pesquisa exploratória realizada por meio da observação participante. Resultados: O SRV é um serviço que traz benefícios à comunidade e coloca a biblioteca em consonância com as demandas tecnológicas de informação e comunicação. Conclusões: Conclui-se que o SRV online em tempo real é apropriado à realidade das bibliotecas de universidades brasileiras, uma vez que as instituições que dispõem o serviço têm resultados positivos de suas avaliações e acreditam estar agregando valor à sua biblioteca.

  7. Cyber piracy in cyberspace "The growing threat to state security القرصنة الالكترونية في الفضاء السيبراني "التهديد المتصاعد لأمن الدول"

    Directory of Open Access Journals (Sweden)

    Noura Shalouch نورة شلوش

    2018-04-01

    Full Text Available The importance of this research paper on electronic piracy in cyberspace is the growing threat to the security of countries, from the importance of virtual cyberspace and the various cyber attacks received by cyberspace , which today is the first threatened entity of any country with destruction and collapse and the creation of international conflicts among them, for the purpose of the strategies and mechanisms that can be activeated by international systems for the embodiment of cybersecurity international and to know the relationship of electronic piracy to make changes in the security environment, and the identification of the impact of cyber attachs,including electronic piracy in the emergence of new patterns of international conflict the most prominent of these attacks in addition to the nature of these cyber attacks and to the identification of most of the new electronic weapons this paper aims to identify the electronic race that the world is witnessing today by international regimes in the extent to which cybercrime can be reduce in cyberspace.

  8. A series of studies examining Internet treatment of obesity to inform Internet interventions for substance use and misuse.

    Science.gov (United States)

    Tate, Deborah F

    2011-01-01

    The feasibility and efficacy of Internet treatment programs for overweight and obese people have been demonstrated in a series of randomized trials. Initial studies examined various approaches to Internet behavioral treatment. Other studies have examined delivery of group behavioral counseling using Internet chat rooms, using the Internet for long-term maintenance of weight loss, and enhancing motivation in Internet programs. These interventions have produced weight losses of 4-7 kg over 6 months to 1 year when support via e-mail, automated messages, or chat rooms is provided. Outcomes and lessons learned with application to the treatment of substance use and misuse are provided.

  9. Who is Everyone's Darling in Cyberspace? The Characteristics of Popular Online Daters

    Directory of Open Access Journals (Sweden)

    Chih-Chien Wang

    2010-06-01

    Full Text Available Online dating current is a popular activity in cyberspace. More and more people make new friends and find their partners through online dating web sites. There is an interesting observation that some people are more popular than others in online dating web sites. The current study focuses on the personal profile characteristics that make one a popular dater. By two field surveys, this study discusses the relationship between online daters' personal profiles and their popularity. The first survey investigated 800 online daters' profiles from dating web sites. The statistical analysis results indicated thatphysical body types and looks, education level, occupation, personality, and interests were characteristics that influenced the popularity of online daters, while significant gender differences were found in the characteristics that related to popularity of online daters. The second survey searched 960 online daters with profiles of popular and unpopular characteristics. By observing the popularity of these online daters, it was found that those with "popular" characteristics also were the popular daters and those with "unpopular" characteristics were the unpopular daters. This may serve as evidence that the found personal profile characteristics were indeed factors influencing the popularity of the online daters.

  10. Attitudes of Jordanian University Students towards Using Online Chat Discourse with Native Speakers of English for Improving Their Language Proficiency

    Science.gov (United States)

    Mahfouz, Safi M.; Ihmeideh, Fathi M.

    2009-01-01

    This study aims to investigate Jordanian university students' attitudes towards using video and text chat discourse with anonymous native speakers of English to improve their English proficiency. To achieve this aim, a questionnaire was designed. The study sample consisted of 320 university students enrolled in two Jordanian universities. Results…

  11. O uso de chats na aprendizagem de línguas estrangeiras

    Directory of Open Access Journals (Sweden)

    Lorena Ribeiro Fonseca

    2011-11-01

    Full Text Available Resumo: Neste artigo, justifico o uso do chat por aprendizes de línguas estrangeiras ressaltando seus pontos positivos mas, também, apontando para problemas potenciais que esta prática pode acarretar.Palavras-chave: Lingüística aplicada; ensino e aprendizagem de língua estrangeira; tecnologia.Résumé: Dans cet article, je justifie la pratique des tchatches par les étudiants de langues étrangères. J’en rélève les points positifs mais, aussi, je signale les problèmes potentiels que cet exercice peut entraîner.Mots-clés: Linguistique apliquée; enseigment et apprentissage des langues étrangères; technologie.Keywords: Applied linguistics; foreign language teaching and learning; technology.

  12. Control room philosophy: Principles of control room design and control room work

    International Nuclear Information System (INIS)

    Skriver, Jan; Ramberg, Jasmine; Allwin, Pernilla

    2006-01-01

    In order to provide insights for improvement of work in control rooms several factors have to be considered. Knowledge of principles including control room philosophies will guide the recommended improvements. In addition to knowledge about specific principles an advantage for an organization can be an understanding of similarities and policies used in other high risk industry. The report has been developed on the basis of a document analysis of international standards and other guiding documents. (NUREG 0711, ISO 11064, ISO 6385, IEC 60964). In addition to the document analysis which has strived to compare the documents to see similarities in important principals, experience from working with control room design, modifications and evaluations in other high risk industries has pervaded the report. Important principles have been identified which are recommended to be included in a control room philosophy. Many of these are similar to the principles identified in the international standards. An additional principal which is regarded as important is the utilization of Key Performance Indicators (KPI) which can be used as a measure to target preventative means. Further more it is critical that the control room philosophy is easy to access and comprehend for all users. One of the challenges that remain after having developed a control room philosophy is how to utilize it in the daily work situation. It is vital that the document remains as a living document, guiding the continual improvement of the control room in the various life cycle stages

  13. PubMedReco: A Real-Time Recommender System for PubMed Citations.

    Science.gov (United States)

    Samuel, Hamman W; Zaïane, Osmar R

    2017-01-01

    We present a recommender system, PubMedReco, for real-time suggestions of medical articles from PubMed, a database of over 23 million medical citations. PubMedReco can recommend medical article citations while users are conversing in a synchronous communication environment such as a chat room. Normally, users would have to leave their chat interface to open a new web browser window, and formulate an appropriate search query to retrieve relevant results. PubMedReco automatically generates the search query and shows relevant citations within the same integrated user interface. PubMedReco analyzes relevant keywords associated with the conversation and uses them to search for relevant citations using the PubMed E-utilities programming interface. Our contributions include improvements to the user experience for searching PubMed from within health forums and chat rooms, and a machine learning model for identifying relevant keywords. We demonstrate the feasibility of PubMedReco using BMJ's Doc2Doc forum discussions.

  14. Cyberanalysis: Transference and Its Management in the Cyberspace

    Directory of Open Access Journals (Sweden)

    Parviz Bahadoran

    2006-05-01

    Full Text Available Objective: As psychiatrists or psychotherapists, many of us may have had contact with people by e-mail and/or through online ‘chat rooms’. These people may write to us about their various problems, especially in their interpersonal relationships; discuss their queries about conflicts with their spouse, partner, and friends; or complained of low self-esteem and problems at work. In this article, we will try to discuss certain considerations and opinions about the possibility of insight-oriented psychotherapy in the domain of ‘virtual reality'. Method: This study was based on clinical observation of the first author. Two cases of ‘Cyberanalysis’ were described. The management of transference and countertransference, the analysis of defenses in this context, and possible reasons for success and failure of each case were discussed. Results: We have witnessed the formation of a transferential relationship between the ‘client’ and the therapists after a matter of months. One of the client had a satisfactory outcome and the other represented a therapeutic failure. Conclusion: This type of psychotherapy may provide a novel opportunity for therapists to move toward the internal world of the patient Compared to ‘real world’ therapies. This modality of therapy also has its own advantages and shortcomings.

  15. Teachers' instructional goals for science practice: Identifying knowledge gaps using cultural-historical activity theory (CHAT)

    Science.gov (United States)

    Farrar, Cynthia Hamen

    In AP Biology, the course goal, with respect to scientific acts and reasoning, has recently shifted toward a reform goal of science practice, where the goal is for students to have a scientific perspective that views science as a practice of a community rather than a body of knowledge. Given this recent shift, this study is interested in the gaps that may exist between an individual teacher's instructional goal and the goals of the AP Biology course. A Cultural-Historical Activity Theory (CHAT) methodology and perspective is used to analyze four teachers' knowledge, practice, and learning. Teachers have content knowledge for teaching, a form of knowledge that is unique for teaching called specialized content knowledge. This specialized content knowledge (SCK) defines their instructional goals, the student outcomes they ultimately aim to achieve with their students. The study employs a cultural-historical continuum of scientific acts and reasoning, which represents the development of the AP Biology goal over time, to study gaps in their instructional goal. The study also analyzes the contradictions within their teaching practice and how teachers address those contradictions to shift their instructional practice and learn. The findings suggest that teachers have different interpretations of the AP Biology goals of science practice, placing their instructional goal at different points along the continuum. Based on the location of their instructional goal, different micro-communities of teachers exist along the continuum, comprised of teachers with a shared goal, language, and culture of their AP Biology teaching. The in-depth study of one teacher's AP Biology teaching, using a CHAT perspective, provides a means for studying the mechanisms that connect SCK to classroom actions and ultimately to instructional practice. CHAT also reveals the nature and importance of contradictions or cognitive dissonance in teacher learning and the types of support teachers need to

  16. Automatic Association of Chats and Video Tracks for Activity Learning and Recognition in Aerial Video Surveillance

    Directory of Open Access Journals (Sweden)

    Riad I. Hammoud

    2014-10-01

    Full Text Available We describe two advanced video analysis techniques, including video-indexed by voice annotations (VIVA and multi-media indexing and explorer (MINER. VIVA utilizes analyst call-outs (ACOs in the form of chat messages (voice-to-text to associate labels with video target tracks, to designate spatial-temporal activity boundaries and to augment video tracking in challenging scenarios. Challenging scenarios include low-resolution sensors, moving targets and target trajectories obscured by natural and man-made clutter. MINER includes: (1 a fusion of graphical track and text data using probabilistic methods; (2 an activity pattern learning framework to support querying an index of activities of interest (AOIs and targets of interest (TOIs by movement type and geolocation; and (3 a user interface to support streaming multi-intelligence data processing. We also present an activity pattern learning framework that uses the multi-source associated data as training to index a large archive of full-motion videos (FMV. VIVA and MINER examples are demonstrated for wide aerial/overhead imagery over common data sets affording an improvement in tracking from video data alone, leading to 84% detection with modest misdetection/false alarm results due to the complexity of the scenario. The novel use of ACOs and chat Sensors 2014, 14 19844 messages in video tracking paves the way for user interaction, correction and preparation of situation awareness reports.

  17. Automatic association of chats and video tracks for activity learning and recognition in aerial video surveillance.

    Science.gov (United States)

    Hammoud, Riad I; Sahin, Cem S; Blasch, Erik P; Rhodes, Bradley J; Wang, Tao

    2014-10-22

    We describe two advanced video analysis techniques, including video-indexed by voice annotations (VIVA) and multi-media indexing and explorer (MINER). VIVA utilizes analyst call-outs (ACOs) in the form of chat messages (voice-to-text) to associate labels with video target tracks, to designate spatial-temporal activity boundaries and to augment video tracking in challenging scenarios. Challenging scenarios include low-resolution sensors, moving targets and target trajectories obscured by natural and man-made clutter. MINER includes: (1) a fusion of graphical track and text data using probabilistic methods; (2) an activity pattern learning framework to support querying an index of activities of interest (AOIs) and targets of interest (TOIs) by movement type and geolocation; and (3) a user interface to support streaming multi-intelligence data processing. We also present an activity pattern learning framework that uses the multi-source associated data as training to index a large archive of full-motion videos (FMV). VIVA and MINER examples are demonstrated for wide aerial/overhead imagery over common data sets affording an improvement in tracking from video data alone, leading to 84% detection with modest misdetection/false alarm results due to the complexity of the scenario. The novel use of ACOs and chat Sensors 2014, 14 19844 messages in video tracking paves the way for user interaction, correction and preparation of situation awareness reports.

  18. 18th Annual NDIA SOLIC Symposium and Exhibition - Warfare in the Seams: Defense and Industry Partnering to Win the Long War. Volume 1. Presentations

    Science.gov (United States)

    2007-02-28

    The second objective is to create several content rich Darknet environments that offer e-mail, file sharing, chat, instant messenger, and streaming...video services. A Darknet is a private virtual network where users connect only to people they trust.8 The Demolition Node: The demolition node’s...objective is to remotely destroy or disable all extremists’ websites, chat rooms, Darknets , etc. The Cyber-herding Process: Phase One: The

  19. Less Words, More Action: Using On-the-Fly Videos and Screenshots in Your Library's IM/Chat and Email Reference Transactions

    Science.gov (United States)

    Sekyere, Kwabena

    2010-01-01

    Email and chat/IM reference services have become a convenient and easily accessible option for the online community and libraries, particularly with increasing amounts of library resources now available electronically. This article gives an overview of Jing, which can be used to produce videos and screenshots on-the-fly, and demonstrates how to…

  20. Stats Don't Tell the Whole Story: Using Qualitative Data Analysis of Chat Reference Transcripts to Assess and Improve Services

    Science.gov (United States)

    Mungin, Michael

    2017-01-01

    In the five years following implementation of a chat reference service at James Madison University (JMU), the service proved very popular but was not closely assessed for quality of service. Using grounded theory and qualitative data analysis techniques, a comprehensive assessment effort was begun in earnest and is in progress. Preliminary results…

  1. Microscopic charcoal and tar (CHAT particles in peat: a 6500-year record of palaeo-fires in southern Sweden

    Directory of Open Access Journals (Sweden)

    B.A. Malmgren

    2012-01-01

    Full Text Available Peat stratigraphies of eleven raised bogs in southern Sweden were investigated. Measurements included the occurrence of charcoal and various tar particles. Most of the particles found were microscopic, i.e. 5–100 µm in diameter. Two distinctly different groups of particles were distinguished: (A charred fragments of plant tissue and (B objects formed from tar, which were classified into five sub-groups on the basis of morphology. Both charcoal and tar are indicative of mire and forest fires. We suggest that it is possible to use the different groups of particles as fire regime indicators. Hence, the high frequency of charcoal and tar (CHAT in the lower parts of the stratigraphies, i.e. in the lower strongly decomposed fen and carr peats that were formed before ca. 4000 cal 14C BP, could be indicative of intense and frequent local fires. The decreasing abundance of CHAT and the lower relative share of Type A particles within the lower strongly decomposed Sphagnum peat ca. 4000–2500 cal 14C BP signify a transition from local to regional fires. With a few exceptions, the uppermost weakly decomposed ombrotrophic peats formed after ca. 2500 cal 14C BP, in which both charcoal and tar are rare, indicate a period of low fire frequency at both local and regional scales. There is no regional variation in the lower material, and it seems that wildfires were common phenomena throughout southern Sweden during the first few thousand years after peat formation began 6–8000 years ago. From a climatological point of view, the mass occurrence of CHAT in the lower parts of the profiles indicates a warm and dry Mid Holocene with frequent and widespread wildfires, and a moist and cool Late Holocene with more sporadic fires. Spectral analysis of the entire dataset shows significant periodicities of 610, 70, 30, 21, 17 and 14 years, the two most significant being 14 and 70 years.

  2. The chatting gathering as a methodological strategy in in-service learning: moving along dialogical dynamics

    Directory of Open Access Journals (Sweden)

    María José Alonso

    2008-04-01

    Full Text Available This article focuses on an experience of in-service training carried out by a group of educators in literacy. The novelty of the undertaking lies in the methodological proposal analysed: using “chatting gatherings” as a methodological strategy, which supports critical reflection and the construction of knowledge, both in in-service training of professionals and in basic adult education. This experience reveals the nature of learning achieved through dialogical educational processes. Further, it allows us to observe the impact that they may have on the improvement of the professionals’ educational practices.

  3. The mind over the Web: the quest for the definition of a method for Internet research.

    Science.gov (United States)

    Riva, G

    2001-02-01

    Psychology is increasingly interested in understanding the characteristics of the Internet and its effects on people, groups and organizations. However, studying the Internet is not a simple task. First, the Internet is a medium that can be experienced in many different ways. Though a computer and keyboard are usually the mediator of our Internet experience, there are different ways in which users can explore the Internet, present themselves, and communicate using it. Second, the Internet is a social and cognitive space. The handling of information is linked to the activation of psychosocial relationships in which cognitions are elaborated. This happens inside a rather special kind of container--Cyberspace--which tends to rarefy the structural and process features of communication. Third, the Internet experience is always situated in a specific context, even when we are chatting alone in a room. In this sense it can only be fully understood through detailed analysis of the social context in which it happens. Starting from a general three-level model of interpersonal interaction in the Web, this paper tries to define a model of data analysis (Complementary Explorative Multilevel Data Analysis--CEMDA) suited to the constraints of Internet research. The main characteristics of the model are: the focus on different frames and objects for each considered unit of research; the mixed use of quantitative and qualitative tools; and the final integration of results in a general framework.

  4. Digital hajj: the pilgrimage to Mecca in Muslim cyberspace and the issue of religious online authority

    Directory of Open Access Journals (Sweden)

    Dominik Schlosser

    2013-01-01

    Full Text Available This paper attempts to give an overview of the different representations of the pilgrimage to Mecca found in the ‘liminal space’ of the internet. For that purpose, it examines a handful of emblematic examples of how the hajj is being presented and discussed in cyberspace. Thereby, special attention shall be paid to the question of how far issues of religious authority are manifest on these websites, whether the content providers of web pages appoint themselves as authorities by scrutinizing established views of the fifth pillar of Islam, or if they upload already printed texts onto their sites in order to reiterate normative notions of the pilgrimage to Mecca, or of they make use of search engine optimisation techniques, thus heightening the very visibility of their online presence and increasing the possibility of becoming authoritative in shaping internet surfers’ perceptions of the hajj.

  5. Room Acoustics

    Science.gov (United States)

    Kuttruff, Heinrich; Mommertz, Eckard

    The traditional task of room acoustics is to create or formulate conditions which ensure the best possible propagation of sound in a room from a sound source to a listener. Thus, objects of room acoustics are in particular assembly halls of all kinds, such as auditoria and lecture halls, conference rooms, theaters, concert halls or churches. Already at this point, it has to be pointed out that these conditions essentially depend on the question if speech or music should be transmitted; in the first case, the criterion for transmission quality is good speech intelligibility, in the other case, however, the success of room-acoustical efforts depends on other factors that cannot be quantified that easily, not least it also depends on the hearing habits of the listeners. In any case, absolutely "good acoustics" of a room do not exist.

  6. Fathers online: learning about fatherhood through the internet.

    Science.gov (United States)

    Stgeorge, Jennifer M; Fletcher, Richard J

    2011-01-01

    In the transition to fatherhood, men face numerous challenges. Opportunities to learn new practices and gain support are limited, although the provisions of father-specific spaces such as fathers' antenatal classes or "responsible fathering" programs are important advances. This article explores how men use the social space of a father-specific Internet chat room to learn about fathering. Messages to an Australian-hosted, father-specific chat room (for fathers of infants or young children) were examined, and three overlapping themes illustrated men's perceptions of their transition to fatherhood. The themes concerned recognition of and response to a lack of social space, services, and support for new fathers. The implications for fathers' perinatal education are discussed.

  7. El turismo en tiempos del ciberespacio / Tourism in times of cyberspace

    Directory of Open Access Journals (Sweden)

    Liliana López Levi

    2015-03-01

    Full Text Available This article analyzes tourists and their practices in times of cyberspace, as well as its impact in shaping the landscape and territory. The phenomenon should be analyzed based on the cyborg subject, their views, perceptions and ways of living leisure, recreation, adventure, relaxation and recreation. A subject to which technology, consumption and simulation are central, therefore it is lead to practices where simultaneity, ephemeral, diversity and the duality between local attachment and detachment are reflected in a space that echoes the imagination of cyborgs. El presente artículo analiza al sujeto y las prácticas turísticas en tiempos del ciberespacio, así como las repercusiones en la configuración del paisaje y del territorio. En la actualidad se trata de un fenómeno a investigar a partir de un sujeto ciborg, de sus concepciones, percepciones y formas de vivir el ocio, el esparcimiento, la aventura, el descanso y la recreación. Un sujeto para el cual la tecnología, el consumo y la simulación son centrales y que lo llevan a prácticas donde la simultaneidad, lo efímero, la diversidad y la dualidad arraigo-desarraigo se reflejan en un espacio que hace eco de los imaginarios de los cibernautas (ciborgs.

  8. The exploitation of "sicko-chatting" by the pharmaceutical industry : a strategy for the normalization of drug use

    OpenAIRE

    Niquette , Manon

    2012-01-01

    International audience; The Exploitation of 'sicko-chatting' by the Pharmaceutical industry: a strategy for the Normalization of drug use Pharmaceutical drugs are consumer goods. As such, they inscribe the transition from normality to pathology within the ambit of health marketing (Duclos, 2008, p. 109). It is now widely acknowledged that this pathology is not just a mere quantitative modification of the normal state, but that it also implies the patient's qualitative assessment of his or her...

  9. Teen CHAT: Development and Utilization of a Web-Based Intervention to Improve Physician Communication with Adolescents About Healthy Weight

    Science.gov (United States)

    Bravender, Terrill; Tulsky, James A.; Farrell, David; Alexander, Stewart C.; Østbye, Truls; Lyna, Pauline; Dolor, Rowena J.; Coffman, Cynthia J.; Bilheimer, Alicia; Lin, Pao-Hwa; Pollak, Kathryn I.

    2013-01-01

    Objective To describe the theoretical basis, use, and satisfaction with Teen CHAT, an online educational intervention designed to improve physician-adolescent communication about healthy weight. Methods Routine health maintenance encounters between pediatricians and family practitioners and their overweight adolescent patients were audio recorded, and content was coded to summarize adherence with motivational interviewing techniques. An online educational intervention was developed using constructs from social cognitive theory and using personalized audio recordings. Physicians were randomized to the online intervention or not, and completed post-intervention surveys. Results Forty-six physicians were recruited, and 22 physicians were randomized to view the intervention website. The educational intervention took an average of 54 minutes to complete, and most physicians thought it was useful, that they would use newly acquired skills with their patients, and would recommend it to others. Fewer physicians thought it helped them address confidentiality issues with their adolescent patients. Conclusion The Teen CHAT online intervention shows potential for enhancing physician motivational interviewing skills in an acceptable and time-efficient manner. Practice Implications If found to be effective in enhancing motivational interviewing skills and changing adolescent weight-related behaviors, wide dissemination will be feasible and indicated. PMID:24021419

  10. IT: Intellectually Taxing?

    Science.gov (United States)

    Cooper, Kenneth J.

    2009-01-01

    By the professor's rule, students in the English classes of Dr. Mark Bauerlein at Emory University must take notes by hand. Laptops must be turned off, he says, to ensure students focus on what's happening in the room, rather than on what's floating around cyberspace. In an age of instant communication via computers, cell phones and personal…

  11. A correção como procedimento de reformulação em chat educacional escrito em espanhol por brasileiros: tipos de operacionalização e marcas The correction as a process of reformulation in educational chat written in spanish by Brazilians: types of operation and marks

    Directory of Open Access Journals (Sweden)

    Crisciene Lara Barbosa-Paiva

    2012-06-01

    Full Text Available O objetivo deste artigo foi analisar, nas interações realizadas por escrito dentro de um chat educacional, os tipos de operacionalização para o processo da correção - enquanto procedimento de reformulação, de acordo com a Perspectiva Textual-Interativa. O corpus, constituído por 31 sessões e por 17 participantes (1 professor e 16 alunos, mostrou a presença de quatro tipos de operacionalização da correção: autocorreção autoiniciada, autocorreção heteroiniciada, heterocorreção autoiniciada e heterocorreção heteroiniciada. O maior número de ocorrências foi o da autocorreção autoiniciada. Esse resultado sugere que: i os participantes, nesse contexto, parecem se preocupar em preservar a auto-imagem, já que a correção não era essencial à compreensão do texto; ii os escreventes conhecem as regras e, por isso, se monitoram; iii a própria ferramenta chat contribui para a autocorreção autoiniciada; e iv a preferência pela autocorreção autoiniciada parece evitar que o professor assuma o papel de corretor do curso de língua. Foram identificados, ainda, padrões de reformulação com e sem marcadores inscritos na materialidade do texto.The aim of this article was to analyse in written educational chat interactions the types of operation of correction process as a reformulation procedure according to Textual-Interactive Perspective. Our corpus is formed by 31 sessions and 17 participants (1 teacher and 16 students and four types of correction operations were identified: self-initiated self-correction, other-initiated self-correction, self-initiated other-correction and other-initiated other-correction. The highest number of occurrences was the self-initiated self-correction. This result suggests that: i the participants in such context seem to worry about preserving the self-image since correction was not essential to text comprehension; ii the participants know the rules and because of them they monitor themselves; iii

  12. Unusual nocturnal feeding by Brown Rock-chat Cercomela fusca (Passeriformes: Muscicapidae in Bikaner, Rajasthan, India

    Directory of Open Access Journals (Sweden)

    P. Singh

    2009-04-01

    Full Text Available Brown Rock-chat is a diurnal insectivorous bird commonly associated with human habitations. I report here nocturnal foraging of the species in and around Bikaner in Rajasthan. The birds showed a marked bimodal activity during their nocturnal foraging which peaked in early morning and late evening hours. Bright sodium-vapour lights that attracted a horde of insects during monsoons offered ideal foraging opportunities for the birds. This behavior is explained here as an adaptation to maximize their food intake during the period when the birds breed and their nutritional requirements are naturally high.

  13. A Test of Concept Study of At-Home, Self-Administered HIV Testing With Web-Based Peer Counseling Via Video Chat for Men Who Have Sex With Men.

    Science.gov (United States)

    Maksut, Jessica L; Eaton, Lisa A; Siembida, Elizabeth J; Driffin, Daniel D; Baldwin, Robert

    2016-12-14

    Men who have sex with men (MSM), particularly MSM who identify as African-American or Black (BMSM), are the sociodemographic group that is most heavily burdened by the human immunodeficiency virus (HIV) epidemic in the United States. To meet national HIV testing goals, there must be a greater emphasis on novel ways to promote and deliver HIV testing to MSM. Obstacles to standard, clinic-based HIV testing include concerns about stigmatization or recognition at in-person testing sites, as well as the inability to access a testing site due to logistical barriers. This study examined the feasibility of self-administered, at-home HIV testing with Web-based peer counseling to MSM by using an interactive video chatting method. The aims of this study were to (1) determine whether individuals would participate in at-home HIV testing with video chat-based test counseling with a peer counselor, (2) address logistical barriers to HIV testing that individuals who report risk for HIV transmission may experience, and (3) reduce anticipated HIV stigma, a primary psychosocial barrier to HIV testing. In response to the gap in HIV testing, a pilot study was developed and implemented via mailed, at-home HIV test kits, accompanied by HIV counseling with a peer counselor via video chat. A total of 20 MSM were enrolled in this test of concept study, 80% of whom identified as BMSM. All participants reported that at-home HIV testing with a peer counseling via video chat was a satisfying experience. The majority of participants (13/18, 72%) said they would prefer for their next HIV testing and counseling experience to be at home with Web-based video chat peer counseling, as opposed to testing in an office or clinic setting. Participants were less likely to report logistical and emotional barriers to HIV testing at the 6-week and 3-month follow-ups. The results of this study suggest that self-administered HIV testing with Web-based peer counseling is feasible and that MSM find it to be a

  14. Special Digital Monies: The Design of Alipay and WeChat Wallet for Mobile Payment Practices in China

    OpenAIRE

    Kow , Yong ,; Gui , Xinning; Cheng , Waikuen

    2017-01-01

    Part 2: Social Media and Design Innovation; International audience; While research studies of digital and mobile payment systems in HCI have pointed out design opportunities situated within informal and nuanced mobile contexts, we have not yet understood how we can design digital monies to allow users to use monies more easily in these contexts. In this study, we examined the design of Alipay and WeChat Wallet, two successful mobile payment apps in China, which have been used by Chinese users...

  15. Three-dimensional point-cloud room model in room acoustics simulations

    DEFF Research Database (Denmark)

    Markovic, Milos; Olesen, Søren Krarup; Hammershøi, Dorte

    2013-01-01

    acquisition and its representation with a 3D point-cloud model, as well as utilization of such a model for the room acoustics simulations. A room is scanned with a commercially available input device (Kinect for Xbox360) in two different ways; the first one involves the device placed in the middle of the room...... and rotated around the vertical axis while for the second one the device is moved within the room. Benefits of both approaches were analyzed. The device's depth sensor provides a set of points in a three-dimensional coordinate system which represents scanned surfaces of the room interior. These data are used...... to build a 3D point-cloud model of the room. Several models are created to meet requirements of different room acoustics simulation algorithms: plane fitting and uniform voxel grid for geometric methods and triangulation mesh for the numerical methods. Advantages of the proposed method over the traditional...

  16. Three-dimensional point-cloud room model for room acoustics simulations

    DEFF Research Database (Denmark)

    Markovic, Milos; Olesen, Søren Krarup; Hammershøi, Dorte

    2013-01-01

    acquisition and its representation with a 3D point-cloud model, as well as utilization of such a model for the room acoustics simulations. A room is scanned with a commercially available input device (Kinect for Xbox360) in two different ways; the first one involves the device placed in the middle of the room...... and rotated around the vertical axis while for the second one the device is moved within the room. Benefits of both approaches were analyzed. The device's depth sensor provides a set of points in a three-dimensional coordinate system which represents scanned surfaces of the room interior. These data are used...... to build a 3D point-cloud model of the room. Several models are created to meet requirements of different room acoustics simulation algorithms: plane fitting and uniform voxel grid for geometric methods and triangulation mesh for the numerical methods. Advantages of the proposed method over the traditional...

  17. Forensic psychiatry and the internet: practical perspectives on sexual predators and obsessional harassers in cyberspace.

    Science.gov (United States)

    McGrath, Michael G; Casey, Eoghan

    2002-01-01

    The growth of the Internet has revolutionized how society conducts business in many areas. Not to be left behind, the sexual predator and the obsessional harasser have found cyberspace to be a vehicle capable of meeting their needs: obtaining information, monitoring and contacting victims, developing fantasy, overcoming inhibitions, avoiding apprehension, and communicating with other offenders. Although clearly disparate offender categories, these two groups are included in this article because of the likelihood of their using the Internet in pursuit of their goals. Forensic psychiatrists should become familiar with computers and the Internet so that they can conduct relevant psychiatric evaluations of such individuals and can advise attorneys, victims, and law enforcement personnel competently, when retained in that capacity. This article discusses the Internet and its use by the sexual predator and the obsessional harasser, highlighting information of interest to the forensic psychiatrist, including the poorly understood field of digital evidence. Aspects of the Internet, such as on-line dating and cybersex also are covered, because they relate to sexual predation and stalking.

  18. Room with a View: Ethical Encounters in Room 13

    Science.gov (United States)

    Grube, Vicky

    2012-01-01

    In this article, the author describes ethical encounters in Room 13, a schoolroom where children made what they wanted, posed their own questions, and ran an art room like a small business. In Room 13 children had the responsibility to maintain all aspects of the art studio. Specific decisions fell to an annually elected management team, a small…

  19. What Makes Sports Fans Interactive? Identifying Factors Affecting Chat Interactions in Online Sports Viewing.

    Science.gov (United States)

    Ko, Minsam; Yeo, Jaeryong; Lee, Juyeong; Lee, Uichin; Jang, Young Jae

    2016-01-01

    Sports fans are able to watch games from many locations using TV services while interacting with other fans online. In this paper, we identify the factors that affect sports viewers' online interactions. Using a large-scale dataset of more than 25 million chat messages from a popular social TV site for baseball, we extract various game-related factors, and investigate the relationships between these factors and fans' interactions using a series of multiple regression analyses. As a result, we identify several factors that are significantly related to viewer interactions. In addition, we determine that the influence of these factors varies according to the user group; i.e., active vs. less active users, and loyal vs. non-loyal users.

  20. 2012 ARPA-E Energy Innovation Summit: Fireside Chat with Steven Chu and Bill Gates

    Energy Technology Data Exchange (ETDEWEB)

    Chu, Steven; Gates, Bill; Podesta, John

    2012-02-28

    The third annual ARPA-E Energy Innovation Summit was held in Washington D.C. in February, 2012. The event brought together key players from across the energy ecosystem - researchers, entrepreneurs, investors, corporate executives, and government officials - to share ideas for developing and deploying the next generation of energy technologies. This video captures a session called Fireside Chat that featured Steven Chu, the Secretary of Energy, and Bill Gates, Chairman of Microsoft Corporation. The session is moderated by John Podesta, Chair of the Center for American Progress. Energy Secretary Steven Chu and Microsoft Founder and Chairman Bill Gates exchanged ideas about how small businesses and innovators can overcome the challenges that face many startups.

  1. Operating room management and operating room productivity: the case of Germany.

    Science.gov (United States)

    Berry, Maresi; Berry-Stölzle, Thomas; Schleppers, Alexander

    2008-09-01

    We examine operating room productivity on the example of hospitals in Germany with independent anesthesiology departments. Linked to anesthesiology group literature, we use the ln(Total Surgical Time/Total Anesthesiologists Salary) as a proxy for operating room productivity. We test the association between operating room productivity and different structural, organizational and management characteristics based on survey data from 87 hospitals. Our empirical analysis links improved operating room productivity to greater operating room capacity, appropriate scheduling behavior and management methods to realign interests. From this analysis, the enforcing jurisdiction and avoiding advance over-scheduling appear to be the implementable tools for improving operating room productivity.

  2. Using Cultural Historical Activity Theory (CHAT) to Frame `SuperclubsPLUS', an Online Social Network for Children

    Science.gov (United States)

    Masters, Jennifer

    This paper uses a Cultural Historical Activity Theory framework to describe a social-networking online community project, “SuperclubsPLUS”, for children aged 6-12. The use of the CHAT frame enables a detailed description of connections within the project as participants work together to achieve individual and common goals. Application of this structure to the SuperclubsPLUS environment supports the concept that the community is continually changing, shaped by the interactions of the participants. It is anticipated that this snapshot of the project will provide a tangible base in order to further develop and map ongoing patterns of interaction for research.

  3. Optimized Two-Party Video Chat with Restored Eye Contact Using Graphics Hardware

    Science.gov (United States)

    Dumont, Maarten; Rogmans, Sammy; Maesen, Steven; Bekaert, Philippe

    We present a practical system prototype to convincingly restore eye contact between two video chat participants, with a minimal amount of constraints. The proposed six-fold camera setup is easily integrated into the monitor frame, and is used to interpolate an image as if its virtual camera captured the image through a transparent screen. The peer user has a large freedom of movement, resulting in system specifications that enable genuine practical usage. Our software framework thereby harnesses the powerful computational resources inside graphics hardware, and maximizes arithmetic intensity to achieve over real-time performance up to 42 frames per second for 800 ×600 resolution images. Furthermore, an optimal set of fine tuned parameters are presented, that optimizes the end-to-end performance of the application to achieve high subjective visual quality, and still allows for further algorithmic advancement without loosing its real-time capabilities.

  4. Hypoxia Room

    Data.gov (United States)

    Federal Laboratory Consortium — The Hypoxia Room is a 8x8x8 ft. clear vinyl plastic and aluminum frame construction enclosure located within USAREIM laboratory 028. The Hypoxia Room (manufactured...

  5. Social Networks in context of cyberspace. Consumers, electronic commerce and intellectual property in the light of the Cuban case

    Directory of Open Access Journals (Sweden)

    Nelvys Mendoza Gurdián

    2018-06-01

    Full Text Available Face the state of vulnerability in the context of cyberspace, it is necessary to reflect on the social networks and law, from a holistic approach aimed at the vulnerability of rights associated with the information in this environment. This work general objective is to analyse the phenomenon of online social networks and the information society, emphasizing on the study of the legal aspects related to consumers, electronic commerce and intellectual property. The methodology used aims to conceptualize the category of social networks, examinate the aspects associated with law in the use of social networks and establish the conceptual, legal and conflicting points of relevance. This will allow describing the problems under study and propose alternatives for a sphere of integrative protection that harmonizes the edges of the preventive, the corrective and the prophylactic.

  6. What Makes Sports Fans Interactive? Identifying Factors Affecting Chat Interactions in Online Sports Viewing.

    Directory of Open Access Journals (Sweden)

    Minsam Ko

    Full Text Available Sports fans are able to watch games from many locations using TV services while interacting with other fans online. In this paper, we identify the factors that affect sports viewers' online interactions. Using a large-scale dataset of more than 25 million chat messages from a popular social TV site for baseball, we extract various game-related factors, and investigate the relationships between these factors and fans' interactions using a series of multiple regression analyses. As a result, we identify several factors that are significantly related to viewer interactions. In addition, we determine that the influence of these factors varies according to the user group; i.e., active vs. less active users, and loyal vs. non-loyal users.

  7. What Makes Sports Fans Interactive? Identifying Factors Affecting Chat Interactions in Online Sports Viewing

    Science.gov (United States)

    Yeo, Jaeryong; Lee, Juyeong

    2016-01-01

    Sports fans are able to watch games from many locations using TV services while interacting with other fans online. In this paper, we identify the factors that affect sports viewers’ online interactions. Using a large-scale dataset of more than 25 million chat messages from a popular social TV site for baseball, we extract various game-related factors, and investigate the relationships between these factors and fans’ interactions using a series of multiple regression analyses. As a result, we identify several factors that are significantly related to viewer interactions. In addition, we determine that the influence of these factors varies according to the user group; i.e., active vs. less active users, and loyal vs. non-loyal users. PMID:26849568

  8. Collaborative Chat Reference Service Effectiveness Varies by Question Type for Public Library Patrons. A review of: Kwon, Nahyun. ʺPublic Library Patronsʹ Use of Collaborative Chat Reference Service: The Effectiveness of Question Answering by Question Type.ʺ Library & Information Science Research 29.1 (Mar. 2007: 70‐91.

    Directory of Open Access Journals (Sweden)

    Stephanie Hall

    2008-03-01

    Full Text Available Objective – To assess the effectiveness of a collaborative chat reference service in answering different types of question. Specifically, the study compares the degree of answer completion and the level of user satisfaction for simple factual questions vs. more in‐depth subject‐based reference questions, and for ‘local’ (pertaining to a particular library and non‐local questions.Design – Content analysis of 415 transcripts of reference transactions, which were also compared to corresponding user satisfaction survey results.Setting – An online collaborative reference service offered by a large public library system (33 branch and regional locations. This service is part of the Metropolitan Cooperative Library System: a virtual reference consortium of U.S. libraries (public, academic, special, and corporate that provides 24/7 service.Subjects – Reference librarians from around the U.S. (49 different libraries, and users logging into the service via the public library system’s portal (primarily patrons of the 49 libraries. Method – Content analysis was used to evaluate virtual reference transcripts recorded between January and June, 2004. Reliability was enhanced through triangulation, with researchers comparing the content analysis of each transcript against the results of a voluntary exit survey. Of 1,387 transactions that occurred during the period of study, 420 users completed the survey and these formed the basis of the study, apart from 5 transactions that were omitted because the questions were incomprehensible. Questions were examined and assigned to five categories: “simple, factual questions; subject‐based research questions; resource access questions; circulation‐related questions; and local library information inquiries” (80‐81. Answers were classed as either “completely answered, partially answered or unanswered, referred, and problematic endings” (82. Lastly, user satisfaction was surveyed on three

  9. Acquirement and Interpretation of Public Documentation of Cultural Heritage - WeChat & Post-disaster Rebuilding of Shangri-La Ancient City

    Science.gov (United States)

    Huo, X. W.; Zhang, G.; Shang, J.; Qi, X. J.; Li, G. L.; Huang, Z. Y.

    2015-09-01

    The essay introduces the methodology and reflection upon the acquirement and interpretation of public documentation supporting the post-disaster reconstruction of the Shangri-La historic town after struck by fire in 2014. The proposed acquirement platform is developed on the basis of WeChat, a popular mobile communication App on smart phones in China. Historic photos and related documents of the burnt historic area are then accumulated to be analytically interpreted to inform post-disaster reconstruction planning.

  10. The e-marketers of South India | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-07-13

    Jul 13, 2011 ... FOOD India, a nongovernmental organization based in Chennai, ... by visiting chat-rooms and discussion groups about Indian culture. ... Southeast Asia has sustained impressive and rapid growth in the last few decades.

  11. Effect of Room Ventilation Rates in Rodent Rooms with Direct-Exhaust IVC Systems.

    Science.gov (United States)

    Geertsema, Roger S; Lindsell, Claire E

    2015-09-01

    When IVC are directly exhausted from a rodent housing room, the air quality of the room can become independent of the intracage air quality and may reduce the need for high room ventilation rates. This study assessed the effect of decreasing the ventilation rate in rodent rooms using direct-exhaust IVC systems. The study was conducted over 16 wk and compared conditions in 8 rodent rooms that had ventilation rates of 5 to 6 air changes per hour (ACH) with those in rooms at 10 to 12 ACH. At the low ventilation rate, rooms had higher CO₂ concentrations, higher dew point temperature, and lower particulate levels and spent a greater percentage of time above the temperature set point than did rooms at the high rate. The levels of allergens and endotoxins in room air were the same regardless of the ventilation rate. Differences seen in parameters within cages at the 2 ventilation rates were operationally irrelevant. We detected no total volatile organic compounds in the room that were attributable to ammonia, regardless of the ventilation rate. Clearing the air of ethanol after a spill took longer at the low compared with high rate. However, ethanol clearance was faster at the low rate when the demand-control system was activated than at the high ventilation rate alone. Air quality in the room and in the cages were acceptable with room ventilation rates of 5 to 6 ACH in rodent rooms that use direct-exhaust IVC systems.

  12. The Influence of Group Formation on Learner Participation, Language Complexity, and Corrective Behaviour in Synchronous Written Chat as Part of Academic German Studies

    Science.gov (United States)

    Fredriksson, Christine

    2015-01-01

    Synchronous written chat and instant messaging are tools which have been used and explored in online language learning settings for at least two decades. Research literature has shown that such tools give second language (L2) learners opportunities for language learning, e.g. , the interaction in real time with peers and native speakers, the…

  13. Room temperature superconductors

    International Nuclear Information System (INIS)

    Sleight, A.W.

    1995-01-01

    If the Holy Grail of room temperature superconductivity could be achieved, the impact on could be enormous. However, a useful room temperature superconductor for most applications must possess a T c somewhat above room temperature and must be capable of sustaining superconductivity in the presence of magnetic fields while carrying a significant current load. The authors will return to the subject of just what characteristics one might seek for a compound to be a room temperature superconductor. 30 refs., 3 figs., 1 tab

  14. Advertising Strategy Based on WeChat Operation Platform%基于微信运营平台的广告投放策略

    Institute of Scientific and Technical Information of China (English)

    程瑶; 张慎成

    2016-01-01

    网络环境下的信息传播,随着科技的发展而不断衍生出新的载体,以微信为平台搭载的商业广告,为广告投放提供了新的契机与推广方式.微信广告具有受众量大,传播迅速等特征,其良好的用户体验及高性价比的营销投入都是传统媒介无法比拟的.%With the development of science and technology ,information dissemination in the network environment constantly derives new carriers .Commercial advertising ,carried under the platform of We-Chat ,offers a new opportunity and promotion method for advertising injecting .WeChat advertising is pro-vided with features of large in the number of audiences ,rapid in transmission ,etc .Its good user experi-ence and high cost - benefit marketing input cannot be matched by any traditional medias .

  15. Room acoustics modeling using a point-cloud representation of the room geometry

    DEFF Research Database (Denmark)

    Markovic, Milos; Olesen, Søren Krarup; Hammershøi, Dorte

    2013-01-01

    Room acoustics modeling is usually based on the room geometry that is parametrically described prior to a sound transmission calculation. This is a highly room-specific task and rather time consuming if a complex geometry is to be described. Here, a run time generic method for an arbitrary room...... geometry acquisition is presented. The method exploits a depth sensor of the Kinect device that provides a point based information of a scanned room interior. After post-processing of the Kinect output data, a 3D point-cloud model of the room is obtained. Sound transmission between two selected points...... level of user immersion by a real time acoustical simulation of a dynamic scenes....

  16. Learning patterns of life from intelligence analyst chat

    Science.gov (United States)

    Schneider, Michael K.; Alford, Mark; Babko-Malaya, Olga; Blasch, Erik; Chen, Lingji; Crespi, Valentino; HandUber, Jason; Haney, Phil; Nagy, Jim; Richman, Mike; Von Pless, Gregory; Zhu, Howie; Rhodes, Bradley J.

    2016-05-01

    Our Multi-INT Data Association Tool (MIDAT) learns patterns of life (POL) of a geographical area from video analyst observations called out in textual reporting. Typical approaches to learning POLs from video make use of computer vision algorithms to extract locations in space and time of various activities. Such approaches are subject to the detection and tracking performance of the video processing algorithms. Numerous examples of human analysts monitoring live video streams annotating or "calling out" relevant entities and activities exist, such as security analysis, crime-scene forensics, news reports, and sports commentary. This user description typically corresponds with textual capture, such as chat. Although the purpose of these text products is primarily to describe events as they happen, organizations typically archive the reports for extended periods. This archive provides a basis to build POLs. Such POLs are useful for diagnosis to assess activities in an area based on historical context, and for consumers of products, who gain an understanding of historical patterns. MIDAT combines natural language processing, multi-hypothesis tracking, and Multi-INT Activity Pattern Learning and Exploitation (MAPLE) technologies in an end-to-end lab prototype that processes textual products produced by video analysts, infers POLs, and highlights anomalies relative to those POLs with links to "tracks" of related activities performed by the same entity. MIDAT technologies perform well, achieving, for example, a 90% F1-value on extracting activities from the textual reports.

  17. TUGAS ROOM ATTENDANT DALAM MENANGANI COMPLAINT TAMU DELUXE ROOM HOTEL HYAAT REGENCY BANDUNG

    Directory of Open Access Journals (Sweden)

    Reza Gustia Purnama

    2016-05-01

    Full Text Available Abstract - The problem is how meticulous the duties and responsibilities of the room attendant in the deluxe room Hotel Hyatt Regency Bandung, standard operational procedures in the deluxe room Hotel Hyatt Regency Bandung, and handling guest complaint in deluxe room Hotel Hyatt Regency Bandung. Author uses descriptive analysis, which is a form of writing in the actual situation describes strive about the object of research, then the data obtained in the form of a report compiled in. Based on the results of observation it can be concluded that the task and responsibility of the room attendant in the deluxe room Hyatt Regency Bandung already carry it out in accordance with standard operational procedures (SOP which is divided into two shifts, morning and evening shift which has a slightly different task, standard operational procedures in the deluxe room Hyatt Regency Bandung has been standard operating procedure in applying it at the hotel Hyatt Regency Bandung, and Guest complaint handling in deluxe room Hyatt Regency Bandung Hotel how to deal with and resolve the complaint vary slightly in view of the type of complaint. Based on the results of observation and discussion, the authors conclude that the Duty room attendant in handling customers compaint deluxe room in the Hyatt Regency Bandung Hotel when his handlers was conducted appropriately and propesional effects will be good for the image of the hyatt regency hotel bandung.   Keywords: Room Attendant, Complaint, Deluxe room   Abstraksi - Masalah yang di teliti adalah tugas dan tanggung jawab room attendant di deluxe room Hotel Hyatt Regency Bandung, standar operasional prosedur di deluxe room Hotel Hyatt Regency Bandung, dan penanganan complaint tamu di deluxe room Hotel Hyatt Regency Bandung.  Metode yang di gunakan menggunakan analisis deskriptif, yaitu bentuk penulisan yang di upayakan menggambarkan keadaan yang sebenarnya tetang objek penelitian,kemudian data yang di peroleh disusun

  18. Nurses and social media.

    Science.gov (United States)

    Farrelly, Rory

    Nurses' use of social media and other electronic communications has increased significantly with growing numbers of social media opportunities, platforms and applications including blogs, social networking sites, video sites and online chat rooms and forums.

  19. The relationship between addiction to internet and adolescence’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking

    OpenAIRE

    Mehri Mowlaie; Setareh Jani

    2016-01-01

    Background: Given the importance of adolescent period and impact of internet and virtual communication tools on high risk behaviors, this research was conducted to examine the relationship between addiction to internet and adolescent’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking. Methods: The population of this study included all (n=40597) junior and senior high school students (boys and girls) in academic year 2014-2015 in Ardabil, Iran. 38...

  20. Hubungan antara, Self Esteem dengan Self Disclosure pada Saat Chatting di Facebook

    Directory of Open Access Journals (Sweden)

    Novi Nitya Santi

    2017-05-01

    Full Text Available Facebook is an internet based social media that were populer at the moment. The use of sosial media is very populer no exception student. Students communicatem confide and seek information through facebook. Of the activities, appears a phenomenon experienced by students of the symptoms of self esteem and self disclosure. This research aims to determine the relationship between self esteem and self disclosure. The relationship between the level of self esteem with self disclosure while chatting on facebook worth 0,766. Meaning that the reletionship between the level of self esteem with self disclosure is very strong and direct. Where a person who has high self esteem will be able to able to demonstrate self-disclosure are effective in communicating that is: be open, able to empathize, to be positive in the communication process and feel similar to the communication partner. Conversely a low self esteem are less able to express himself well, fear of failure in social relations

  1. Electronic Aggression

    Centers for Disease Control (CDC) Podcasts

    Aggression is no longer limited to the school yard. New forms of electronic media, such as blogs, instant messaging, chat rooms, email, text messaging, and the internet are providing new arenas for youth violence to occur.

  2. Exploring detection of contact vs. fantasy online sexual offenders in chats with minors: Statistical discourse analysis of self-disclosure and emotion words.

    Science.gov (United States)

    Chiu, Ming Ming; Seigfried-Spellar, Kathryn C; Ringenberg, Tatiana R

    2018-05-03

    This exploratory study is the first to identify content differences between youths' online chats with contact child sex offenders (CCSOs; seek to meet with youths) and those with fantasy child sex offenders (FCSOs; do not meet with youths) using statistical discourse analysis (SDA). Past studies suggest that CCSOs share their experiences and emotions with targeted youths (self-disclosure grooming tactic) and encourage them to reciprocate, to build trust and closer relationships through a cycle of self-disclosures. In this study, we examined 36,029 words in 4,353 messages within 107 anonymized online chat sessions by 21 people, specifically 12 youths and 9 arrested sex offenders (5 CCSOs and 4 FCSOs), using SDA. Results showed that CCSOs were more likely than FCSOs to write online messages with specific words (first person pronouns, negative emotions and positive emotions), suggesting the use of self-disclosure grooming tactics. CCSO's self-disclosure messages elicited corresponding self-disclosure messages from their targeted youths. These results suggest that CCSOs use grooming tactics that help engender youths' trust to meet in the physical world, but FCSOs do not. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. Pituitary adenoma in monozigotic twins with Cri du Chat syndome: a rare case report

    Directory of Open Access Journals (Sweden)

    Canaz Gokhan

    2016-12-01

    Full Text Available Pituitary adenomas are rare tumours of pediatric population. In etiology, genetic factors are more common than they are in adults. Because of the rarity of the cases, there are only a few large case studies in the literature. Pituitary tumours in children are often related with syndromes like MEN type 1, Carney Complex and Mc Cune Albright, but there is no case in the literature associated with Cri Du Chat syndrome. Statisticlly, it has been reported that, pediatric tumours occur more often in twins, in the pediatric population. Main treatment for prolactinomas is medical intervention with dopamine agonists, as in adults. Surgery is prefered when the tumour is resistant to medical treatment or shows mass effects around sellae. In that situation, as in adults, both transcranial and transsphenoidal approach is possible.

  4. Protein-energy malnutrition is frequent and precocious in children with cri du chat syndrome.

    Science.gov (United States)

    Lefranc, Violaine; de Luca, Arnaud; Hankard, Régis

    2016-05-01

    Protein-energy malnutrition (PEM) is poorly reported in cri du chat syndrome (CDCS) (OMIM #123450), a genetic disease that causes developmental delay and global growth retardation. The objective was to determine the nutritional status at different ages in children with CDCS and factors associated with PEM. A questionnaire focused on growth and nutritional care was sent to 190 families. Among 36 analyzable questionnaires, growth and nutritional indices compatible with PEM occurred in 47% of patients: 19% before 6 months of age, 24% between 6-12 months and 34% after 12 months. Eight patients received enteral feeding. Speech therapy for swallowing education was performed more often in malnourished children (63% vs. 22%, P < 0.02). PEM is frequent and occurs early in this disease, requiring closed nutritional monitoring. © 2016 Wiley Periodicals, Inc.

  5. Improving operating room safety

    Directory of Open Access Journals (Sweden)

    Garrett Jill

    2009-11-01

    Full Text Available Abstract Despite the introduction of the Universal Protocol, patient safety in surgery remains a daily challenge in the operating room. This present study describes one community health system's efforts to improve operating room safety through human factors training and ultimately the development of a surgical checklist. Using a combination of formal training, local studies documenting operating room safety issues and peer to peer mentoring we were able to substantially change the culture of our operating room. Our efforts have prepared us for successfully implementing a standardized checklist to improve operating room safety throughout our entire system. Based on these findings we recommend a multimodal approach to improving operating room safety.

  6. Control room philosophy: Principles of control room design and control room work; Kontrollrumsfilosofi: Principer foer kontrollrumsutformning och kontrollrumsarbete

    Energy Technology Data Exchange (ETDEWEB)

    Skriver, Jan; Ramberg, Jasmine; Allwin, Pernilla [Scandpower Risk Management AB, Uppsala (Sweden)

    2006-01-15

    In order to provide insights for improvement of work in control rooms several factors have to be considered. Knowledge of principles including control room philosophies will guide the recommended improvements. In addition to knowledge about specific principles an advantage for an organization can be an understanding of similarities and policies used in other high risk industry. The report has been developed on the basis of a document analysis of international standards and other guiding documents. (NUREG 0711, ISO 11064, ISO 6385, IEC 60964). In addition to the document analysis which has strived to compare the documents to see similarities in important principals, experience from working with control room design, modifications and evaluations in other high risk industries has pervaded the report. Important principles have been identified which are recommended to be included in a control room philosophy. Many of these are similar to the principles identified in the international standards. An additional principal which is regarded as important is the utilization of Key Performance Indicators (KPI) which can be used as a measure to target preventative means. Further more it is critical that the control room philosophy is easy to access and comprehend for all users. One of the challenges that remain after having developed a control room philosophy is how to utilize it in the daily work situation. It is vital that the document remains as a living document, guiding the continual improvement of the control room in the various life cycle stages.

  7. Reliability of estimating the room volume from a single room impulse response

    OpenAIRE

    Kuster, M.

    2008-01-01

    The methods investigated for the room volume estimation are based on geometrical acoustics, eigenmode, and diffuse field models and no data other than the room impulse response are available. The measurements include several receiver positions in a total of 12 rooms of vastly different sizes and acoustic characteristics. The limitations in identifying the pivotal specular reflections of the geometrical acoustics model in measured room impulse responses are examined both theoretically and expe...

  8. Comparison of bNOS and chat immunohistochemistry in the laterodorsal tegmentum (LDT) and the pedunculopontine tegmentum (PPT) of the mouse from brain slices prepared for electrophysiology

    DEFF Research Database (Denmark)

    Veleanu, Maxime; Axen, Tina E; Kristensen, Morten P

    2016-01-01

    maintains that antibody staining for enzymes involved in synthesis or transport, of acetylcholine would be a more definitive marker and hence, preferable. NEW METHOD: Colocalization of bNOS and CHAT in the LDT/PPT, and presence of parvalbumin (PV), was examined in non-ideally prepared mouse brain slices...

  9. A Text-Based Chat System Embodied with an Expressive Agent

    Directory of Open Access Journals (Sweden)

    Lamia Alam

    2017-01-01

    Full Text Available Life-like characters are playing vital role in social computing by making human-computer interaction more easy and spontaneous. Nowadays, use of these characters to interact in online virtual environment has gained immense popularity. In this paper, we proposed a framework for a text-based chat system embodied with a life-like virtual agent that aims at natural communication between the users. To achieve this kind of system, we developed an agent that performs some nonverbal communications such as generating facial expression and motions by analyzing the text messages of the users. More specifically, this agent is capable of generating facial expressions for six basic emotions such as happy, sad, fear, angry, surprise, and disgust along with two additional emotions, irony and determined. Then to make the interaction between the users more realistic and lively, we added motions such as eye blink and head movements. We measured our proposed system from different aspects and found the results satisfactory, which make us believe that this kind of system can play a significant role in making an interaction episode more natural, effective, and interesting. Experimental evaluation reveals that the proposed agent can display emotive expressions correctly 93% of the time by analyzing the users’ text input.

  10. THE CYBER THREAT AND THE PROBLEM OF INFORMATION SECURITY - A critical analysis of the concepts of cyber-power and cyber-space

    Directory of Open Access Journals (Sweden)

    Sebastian SÂRBU

    2017-06-01

    Full Text Available In this paper we approached from a researcher’s angle and analyzed the concepts of cyber-space, cyber-power from the security school perspective, from that of the international organizations, and from the civil society point of view. Therefore we referred to the documents and the international initiatives concerning the security of data transfer in the context of the current threats against cybernetic security on the one hand, and its interpretation as a threat to the values, rights and democratic freedoms of the civil society, on the other. The risk society is defined both through the grid of political sociology, of the Copenhagen school, as a key element of reference in this case, as well as through the necessity to build a safe cyber space, here being scrutinized in a value-based antithesis between terror and democracy / freedom of speech.

  11. [Maxillofacial and dental abnormalities in some multiple abnormality syndromes. "Cri du chat" syndrome, Wilms' tumor-aniridia syndrome; Sotos syndrome; Goldenhar syndrome].

    Science.gov (United States)

    Berio, A; Trucchi, R; Meliota, M

    1992-05-01

    The paper describes the maxillo-facial and dental anomalies observed in some chromosome and non-chromosome poly-malformative syndromes ("Cri du chat" syndrome; Wilms' tumour; Sotos' syndrome; Goldenhar's syndrome). The Authors emphasise the possibility of diagnosing these multiple deformity syndromes from maxillo-facial alterations in early infancy; anomalous tooth position and structure cal also be successfully treated immediately after the first appearance of teeth. This is a particularly promising field of pediatrics and preventive pediatric medicine.

  12. Future control room design (modernization of control room systems)

    International Nuclear Information System (INIS)

    Reischl, Ludwig; Freitag, Timo; Dergel, Rene

    2009-01-01

    In the frame of lifetime extension for nuclear power plants the modernization of the complete safety and operational control technology will be digitalized. It is also recommended to modernize the operator facilities, monitoring systems in the control room, the back-up shut-down center and the local control stations. The authors summarize the reasons for the modernization recommendations and discuss possible solutions for display-oriented control rooms. A concept for control room backfitting includes generic requirements, requirements of the local authorities, ergonomic principles information content and information density, and the design process. The backfitting strategy should include a cooperation with the operational personnel, The quality assurance and training via simulator needs sufficient timing during the implementation of the backfitting.

  13. Can human-like Bots control collective mood: agent-based simulations of online chats

    Science.gov (United States)

    Tadić, Bosiljka; Šuvakov, Milovan

    2013-10-01

    Using an agent-based modeling approach, in this paper, we study self-organized dynamics of interacting agents in the presence of chat Bots. Different Bots with tunable ‘human-like’ attributes, which exchange emotional messages with agents, are considered, and the collective emotional behavior of agents is quantitatively analyzed. In particular, using detrended fractal analysis we determine persistent fluctuations and temporal correlations in time series of agent activity and statistics of avalanches carrying emotional messages of agents when Bots favoring positive/negative affects are active. We determine the impact of Bots and identify parameters that can modulate that impact. Our analysis suggests that, by these measures, the emotional Bots induce collective emotion among interacting agents by suitably altering the fractal characteristics of the underlying stochastic process. Positive emotion Bots are slightly more effective than negative emotion Bots. Moreover, Bots which periodically alternate between positive and negative emotion can enhance fluctuations in the system, leading to avalanches of agent messages that are reminiscent of self-organized critical states.

  14. Controlling the clean room atmosphere

    International Nuclear Information System (INIS)

    Meeks, R.F.

    1979-01-01

    Several types of clean rooms are commonly in use. They include the conventional clean room, the horizontal laminar flow clean room, the vertical laminar flow clean room and a fourth type that incorporates ideas from the previous types and is known as a clean air bench or hood. These clean rooms are briefly described. The origin of contamination and methods for controlling the contamination are discussed

  15. Using the Contextual Hub Analysis Tool (CHAT) in Cytoscape to Identify Contextually Relevant Network Hubs.

    Science.gov (United States)

    Muetze, Tanja; Lynn, David J

    2017-09-13

    Highly connected nodes in biological networks are called network hubs. Hubs are topologically important to the structure of the network and have been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we provide a step-by-step protocol for using the Contextual Hub Analysis Tool (CHAT), an application within Cytoscape 3, which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene or protein expression data, and identify hub nodes that are more highly connected to contextual nodes than expected by chance. © 2017 by John Wiley & Sons, Inc. Copyright © 2017 John Wiley & Sons, Inc.

  16. "What exactly is a paedophile?" Children talking about Internet risk

    Directory of Open Access Journals (Sweden)

    Andrew Burn

    2017-09-01

    Full Text Available Reports tell us that the internet is opening new dangers to children, including online grooming, exposure to pornography and financial scams (Carr 2004; Gardner 2003; UK Home Office 2001; O'Connell 2003. The result has been various initiatives which attempt to teach children safe surfing habits. The UK Home Office "ThinkUKnow" campaign featured advertisements on the radio, internet and cinemas, targeting teens and preteens with the message that the person they are chatting to "may not be who you think they are". There are indications that such campaigns have had an impact on children's awareness of "stranger danger" on the internet (Livingstone/Bober 2003. However, many organisations are still struggling with the question of how best to prevent internet-related harm to children. Children are exposed not only to advertising campaigns about stranger danger but also sensationalist stories about, for example, what happens to girls who enter chat rooms. When a teenage girl goes missing, police investigations routinely include looking at the girls' online activities, and tabloid media frequently make the connection between missing school girls and chat room activities. These connections are firmly embedded in the minds of the children we interviewed for the study we will be discussing. Alongside the very rational and prohibitive discourse coming from campaigns which warn children against any chat with strangers, sit the folkloric stories about girls meeting up and getting killed by paedophiles. The challenge to educators is to find an approach which will engage with both sets of discourses.

  17. Control room lay-out

    International Nuclear Information System (INIS)

    Toma, Violeta

    2004-01-01

    TRIUMF (Tri-University Meson Facility) is Canada's national laboratory for particle and nuclear physics. There are 6 accelerators and 3 Control Rooms at TRIUMF. The main control room serves the big cyclotron, the 500 MeV, and the adjacent experiment. The 42 MeV and two 32 MeV ones are production dedicated. These cyclotrons belong to a private company but are operated by TRIUMF staff from ATG (Applied Technology Group) Control Room. The last is ISAC (Isotope Acceleration and Separation) Control Room, from which the LINAC is controlled. Research areas cover theoretical (2 subjects), pure (5 subjects) and applied (8 subjects) physics. In the early '70s, as the 500 MeV was being completed, the first Control Room was built in the main accelerator building. The recent topics covered by this paper are proton and pion therapy, what are the operator's duties?, the CP42, TR30 and TR13 cyclotron control rooms, the ISAC control systems including control room modification. Due to the nature of an operator's job, the Control Room layout is pretty important. This is true for any work environment, but when working shifts it becomes essential. Lots of time and effort, not to mention money, were spent to figure out the optimum configuration. It seems to me that the key factor in the control room layout is versatility, and this is because it has to keep happy a group of people with different inclinations, which have a tendency to become quite moody after the second night shift. No matter what, there will still be unhappy people, but we are trying our best. (Y. Tanaka)

  18. Finding Malicious Cyber Discussions in Social Media

    Science.gov (United States)

    2015-12-11

    automatically filter cyber discussions from Stack Exchange, Reddit, and Twitter posts written in English. Criminal hackers often use social media...monitoring hackers on Facebook and in private chat rooms. As a result, system administrators were prepared to counter distributed denial-of-service

  19. Social Skills Deficits in a Virtual Environment Among Spanish Children With ADHD.

    Science.gov (United States)

    García-Castellar, Rosa; Jara-Jiménez, Pilar; Sánchez-Chiva, Desirée; Mikami, Amori Y

    2018-06-01

    Research assessing the social skills of children with ADHD has predominantly relied upon North American samples. In addition, most existing work has been conducted using methodology that fails to use a controlled peer stimulus; such methods may be more vulnerable to cultural influence. We examined the social skills of 52 Spanish children (ages 8-12) with and without ADHD using a controlled Chat Room Task, which simulates a virtual social environment where peers' responses are held constant, so that participants' social skills may be assessed. After statistical control of typing and reading comprehension skills, Spanish children with ADHD gave fewer prosocial comments and had greater difficulty remembering central details from the conversation between the peers, relative to comparison children. The virtual Chat Room Task may be useful to assess social skills deficits using a controlled paradigm, resulting in the identification of common social deficiencies cross-culturally.

  20. Practice and Evaluation of Ability Grouping Lecture on Information Literacy Using a Chat Tool

    Science.gov (United States)

    Fujinaga, Kiyohisa

    A teaching methodology on information literacy that skilled and inexperienced students learn through different specific contents in a class is proposed. Skilled students collaboratively work using an e-Learning environment while a conventional projector-based lecture on how to use a computer is given for inexperienced students. The methodology had been put into practice for two years. Skilled students were divided into a few groups and members in a group collaboratively made a PowerPoint slide show using a chat tool as the communication media. The slide shows were evaluated by means of questionnaire to the inexperienced students. The results were nearly the same as those of teachers. The practice of the methodology resulted in that the concentration of the skilled students was promoted and the learning attitude of the inexperienced students was improved, compared with the case that the both skilled and inexperienced students learned through the same contents.

  1. Room Acoustical Fields

    CERN Document Server

    Mechel, Fridolin

    2013-01-01

    This book presents the theory of room acoustical fields and revises the Mirror Source Methods for practical computational use, emphasizing the wave character of acoustical fields.  The presented higher methods include the concepts of “Mirror Point Sources” and “Corner sources which allow for an excellent approximation of complex room geometries and even equipped rooms. In contrast to classical description, this book extends the theory of sound fields describing them by their complex sound pressure and the particle velocity. This approach enables accurate descriptions of interference and absorption phenomena.

  2. Virtual Seminar Room

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Fosgerau, Anders; Hansen, Peter Søren Kirk

    1999-01-01

    The initial design considerations and research goals for an ATM network based virtual seminar room with 5 sites are presented.......The initial design considerations and research goals for an ATM network based virtual seminar room with 5 sites are presented....

  3. Cyberspace, identities, and everyday life: new perspectives on mediated interactions / Ciberespaço, cotidiano e identidades: novas leituras sobre interações mediadas

    Directory of Open Access Journals (Sweden)

    Francis Oliveira Bezerra

    2011-10-01

    Full Text Available This article aims to discuss the analysis of mechanisms of social interaction operationalized in cyberspace. Our point of view is directed by Simmel's thinking about the game of interests between individuals, and subjects of interaction, when placed within a new area of virtual environments such as relationships and building their everyday relationships in this environment. This would not only be a possible side in the analysis of social reality, but also operated one of the identities and social roles, which would be rearranged and incorporated as a process of forming a meaningful unity of the subject, streamlined by a constant idea of being active in mode 'on' and ‘offline' as a means of enhancing their experiences. Our study will consider the contributions of Erving Goffman, Jean Baudrillard, Anthony Giddens, among others.

  4. The French Version of the Modified-Checklist for Autism in Toddlers (M-CHAT): A Validation Study on a French Sample of 24 Month-Old Children

    Science.gov (United States)

    Baduel, Sophie; Guillon, Quentin; Afzali, Mohammad H.; Foudon, Nadège; Kruck, Jeanne; Rogé, Bernadette

    2017-01-01

    Early ASD screening has the potential to reduce delays between initial parental concerns and diagnosis, and promote early intervention. The aim of this study was to validate the M-CHAT on a French population sample of 24 month-old children. This study included a low-risk sample of 1,227 children. A total of 20 children screened positive on the…

  5. Using 'WeChat' online social networking in a real-world needs analysis of family members of youths at clinical high risk of psychosis.

    Science.gov (United States)

    Zhang, TianHong; Xu, LiHua; Tang, YingYing; Cui, HuiRu; Li, HuiJun; Wei, YanYan; Xu, YangYang; Jiang, LiJuan; Zhu, YiKang; Li, ChunBo; Jiang, KaiDa; Xiao, ZePing; Wang, JiJun

    2018-04-01

    The argument surrounding the safety and effectiveness of interventions for the population of individuals at a clinical high risk of developing psychosis has been ongoing for the past 30 years. However, few studies have assessed the needs of this special young population, who are struggling with the recent onset of psychotic symptoms. The sample consisted of 171 family members of 108 clinical high-risk individuals included from the ShangHai at Risk for Psychosis research programme. A 'WeChat' group was established to provide mutual support. There were 22,007 valid messages sent within the group between 1 April 2015 and 27 June 2016. Chat records were subsequently analysed to determine the needs of families during intervention at the early stages of psychosis. Families of clinical high-risk individuals were highly involved in the entire medical process, and the major concerns of the families of clinical high-risk individuals focused on both functional recovery and medication. The themes of 'take medication', 'go to school' and 'study in school' were often discussed within the group. A family-focused intervention targeting functional recovery and real-time professional explanations of medication would meet the major needs of families of Chinese clinical high-risk individuals.

  6. MS PHD'S Professional Development Program: A Scientific Renaissance in Cyberspace

    Science.gov (United States)

    Powell, J. M.; Williamson, V. A.; Griess, C. A.; Pyrtle, A. J.

    2004-12-01

    successful cyberspace programs and networks. Through the examination of the transformation, expansion and democratization of the Earth system science community, new knowledge will be obtained on how a cyber-community fuses science, diversity and technology to form dialectics between creating and analyzing a Scientific Renaissance.

  7. The Effect of Synchronous and Asynchronous Participation on Students' Performance in Online Accounting Courses

    Science.gov (United States)

    Duncan, Keith; Kenworthy, Amy; McNamara, Ray

    2012-01-01

    This article examines the relationship between MBA students' performance and participation in two online environments: a synchronous forum (chat room) and an asynchronous forum (discussion board) at an Australian university. The "quality" and "quantity" of students' participation is used to predict their final examination and…

  8. Experimentally Measured Susceptibility to Peer Influence and Adolescent Sexual Behavior Trajectories: A Preliminary Study

    Science.gov (United States)

    Choukas-Bradley, Sophia; Giletta, Matteo; Widman, Laura; Cohen, Geoffrey L.; Prinstein, Mitchell J.

    2014-01-01

    A performance-based measure of peer influence susceptibility was examined as a moderator of the longitudinal association between peer norms and trajectories of adolescents' number of sexual intercourse partners. Seventy-one 9th grade adolescents (52% female) participated in an experimental "chat room" paradigm involving…

  9. Cyber safety education in developing countries

    CSIR Research Space (South Africa)

    Von Solms, R

    2015-01-01

    Full Text Available on the potential risks that are faced when using Internet communication tools, such as the social media, chat rooms, online gaming, email and instant messaging [1],[2] When users are educated about these risks, the users' vulnerability to malware attacks, cyber-bullying...

  10. Cyber safety education in developing countries

    CSIR Research Space (South Africa)

    Von Solms, R

    2015-07-01

    Full Text Available on the potential risks that are faced when using Internet communication tools, such as the social media, chat rooms, online gaming, email and instant messaging [1],[2] When users are educated about these risks, the users' vulnerability to malware attacks, cyber-bullying...

  11. 78 FR 68016 - Disadvantaged Business Enterprise: Program Implementation Modifications

    Science.gov (United States)

    2013-11-13

    ..., including: Revisions to personal net worth, application, and reporting forms; modifications to various... (Personal Net Worth, Certification Application, Uniform Report on Awards/ Commitments; DBE Payment Data... may be provided through the chat room). The registration form will ask you to identify the party you...

  12. The Internet: A Bridge between Research and Practice.

    Science.gov (United States)

    Kuster, Judith Maginnis; Poburka, Bruce J.

    1998-01-01

    Examines Internet capabilities such as World Wide Web home pages, electronic journals, on-line bibliographies, mailing lists, and chat rooms in building bridges between research and practice in speech-language pathology. Numerous examples are provided. Cautions in using Internet resources are also noted. (Author/DB)

  13. Guidelines for control room design reviews

    International Nuclear Information System (INIS)

    1981-09-01

    The control room design review is part of a broad program being undertaken by the nuclear industry and the government to ensure consideration of human factors in nuclear power plant design and operation. The purpose of the control room design review described by these guidelines is to (1) review and evaluate the control room workspace, instrumentation, controls, and other equipment from a human factors engineering point of view that takes into account both system demands and operator capabilities; and (2) to identify, assess, and implement control room design modifications that correct inadequate or unsuitable items. The scope of the control room design review described by these guidelines covers the human engineering review of completed control rooms; i.e., operational control rooms or those at that stage of the licensing process where control room design and equipment selection are committed. These guidelines should also be of use during the design process for new control rooms. However, additional analyses to optimize the allocation of functions to man and machine, and further examination of advanced control system technology, are recommended for new control rooms. Guidelines and references for comprehensive system analyses designed to incorporate human factors considerations into the design and development of new control rooms are presented in Appendix B. Where possible, a generic approach to the control room design review process is encouraged; for example, when control room designs are replicated wholly or in part in two or more units. Even when designs are not replicated exactly, generic reviews which can be modified to account for specific differences in particular control rooms should be considered. Industry organizations and owners groups are encouraged to coordinate joint efforts and share data to develop generic approaches to the design review process. The control room design review should accomplish the following specific objectives. To determine

  14. Student Safety from Cyberbullies, in Chat Rooms, and in Instant Messaging

    Science.gov (United States)

    Wolfsberg, Jeffrey S.

    2006-01-01

    Once, targets of bullying had to endure it only at school. Now, with the increasing prevalence of cyberbullying it can follow them home and go on 24 hours a day. For students who have been exposed to cyberbullying themselves, for parents who have either been exposed to it or are seeing their child experience it, and for educators who have either…

  15. A Case Study of Foreigner’s Intercultural Identity in China via WeChat Moments

    Directory of Open Access Journals (Sweden)

    Bei Ju

    2017-01-01

    Full Text Available The study of communication and culture are interrelated with each other and with semiotics. This study attempts to explore the intercultural identity of foreigners via their use of social media in China. As the most popular social media used in China, a foreign teacher from America (named as Liz’s posts via WeChat Moments from 2013 to 2015 were coded based upon photos and texts to indicate her identity in China. As a result of semiotic analyses, five main themes were identified in her posts, ranging from personal interests and needs, occupation, family, Chinese traits to American traits. Based upon these identified themes, Liz’s intercultural identity as Chinese culture experiencer and promoter is reflected by her description of Chinese traditions, showing contrasts between American and Chinese culture, and using Chinese characters in writing. Overall, not much anxiety and stress during Liz’s acculturation process are shown while most cultural posts reflect her active and ongoing adaption to Chinese culture.

  16. The Effect of Text Chat Assisted with Word Processors on Saudi English Major Students' Writing Accuracy and Productivity of Authentic Texts

    Directory of Open Access Journals (Sweden)

    Ahmad Mosa Batianeh

    2014-10-01

    Full Text Available Abstractــ-This study explored the effects of using online chat and word processors on students' writing skills that include; organizing a text, spelling, punctuation, grammar, phrasal verbs, idioms, idiomatic expressions, pragmatics, creativity, vocabulary growth, content, relational words, conjunctions, authenticity, figures of speech, imagination, coherence, style, socio-cultural aspects, language use, and the production of authentic text. The study group consisted of students in the Department of Languages and Translation at Taibah University who registered for the Writing Two course in the first semester of the 2012 - 2013 academic year. Fourty subjects were divided into two sections: section one was assigned as an experimental group (supported by Facebook and Skype and section two was assigned as a control group and was asked to write their essays with paper and pencil. Facebook and Skype accounts were created for every student in the experimental group. Data was analyzed from pre-test and post-test results to evaluate the question posed by the study: Does the use of online text chat assisted with word processors help undergraduate students develop their writing skills more than traditional methods of teaching? The results revealed that students who worked with Facebook and Skype showed a significant improvement in their writing skills when compared to the control group. In light of these findings, it is recommended that online discussions via Facebook, Skype, and other social media sites should be utilized when teaching writing and the other language skills.

  17. O estar-com o outro no ciberespaço/Being-with-other on the cyberspace

    Directory of Open Access Journals (Sweden)

    Maria Aparecida Viggiani Bicudo

    2009-06-01

    Full Text Available Esse tema é tratado em uma abordagem fenomenológica, notadamente a husserliana, destacando-se a concepção de corpo-próprio. A idéia central trabalhada concerne à intencionalidade e aos respectivos atos da consciência como sendo o “quê” nos mantém unidos ao outro no ciberespaço. O virtual será enfocado no contexto da filosofia, em que ele se mostra como dimensões do real. São trabalhadas as concepções de não-atual, referindo-se ao potencial, virtual, provável, e de atual, entendido como o realizado por atos, fazendo com que o não-atual se torne atual. We focus on the mentioned subject on a phenomenological perspective, chiefly the husserlian one, putting on evidence the proper-body conception. The main arguments of the work are the ideas of intentionality and the conscious acts as being the “what” keep us linked to the other on the cyberspace. We focus on the “virtual” on the philosophical context where it presents itself as one of the dimensions of the “real”. We work on the “non-actual” conception, comprehending the potential, virtual probable aspects of reality and “actual” conception comprehending the becoming actual acts.

  18. Can human-like Bots control collective mood: agent-based simulations of online chats

    International Nuclear Information System (INIS)

    Tadić, Bosiljka; Šuvakov, Milovan

    2013-01-01

    Using an agent-based modeling approach, in this paper, we study self-organized dynamics of interacting agents in the presence of chat Bots. Different Bots with tunable ‘human-like’ attributes, which exchange emotional messages with agents, are considered, and the collective emotional behavior of agents is quantitatively analyzed. In particular, using detrended fractal analysis we determine persistent fluctuations and temporal correlations in time series of agent activity and statistics of avalanches carrying emotional messages of agents when Bots favoring positive/negative affects are active. We determine the impact of Bots and identify parameters that can modulate that impact. Our analysis suggests that, by these measures, the emotional Bots induce collective emotion among interacting agents by suitably altering the fractal characteristics of the underlying stochastic process. Positive emotion Bots are slightly more effective than negative emotion Bots. Moreover, Bots which periodically alternate between positive and negative emotion can enhance fluctuations in the system, leading to avalanches of agent messages that are reminiscent of self-organized critical states. (paper)

  19. CSN's New Emergency Room

    International Nuclear Information System (INIS)

    Sendin, P.

    2005-01-01

    During the month of July 2005 the physical renovation works and technological updating of the basic infrastructures of the CSN Emergency Room (SALEM) were finished, allowing the Room to now have greater functionality and a broader technical capacity. Nevertheless, the technological improvement process of SALEM will reach its full potential within the next few years, once the installation currently underway of the new information integration and monitoring systems and the decision making support systems have been completed. This article describes the improvements introduced to the Room and the objectives pursued in this renovation project to convert the SALEM into a new generation room in accordance with its current technological context. (Author) 4 refs

  20. Our Urban Living Room

    DEFF Research Database (Denmark)

    Hjortshøj, Rasmus

    2016-01-01

    Our Urban Living Room is an exhibition and a book, created by Cobe. The theme is based on Cobe’s ten years of practice, grounded in social livability and urban democracy, and our aim to create buildings and spaces that invite Copenhageners to use and define them; as an extended living room, where...... the boundaries between private and public space become fluid. Based on specific Cobe projects, Our Urban Living Room tells stories about the architectural development of Copenhagen, while exploring the progression of the Danish Capital - from an industrial city into an urban living room, known as one...... of the world’s most livable places. Photography by Rasmus Hjortshøj....

  1. Gas explosion in a room with a window and passage to an adjacent room

    Directory of Open Access Journals (Sweden)

    Polandov Yuri

    2016-01-01

    Full Text Available Some publications describe an effect, produced during a physical model experiment, when an adjacent gas-free room influences the gas explosion pressure in a room with a window. The explosion pressure in this case significantly exceeds (2.5 times the explosion pressure in a room without an adjacent room. This result has been confirmed by our studies. Based on other available information about the influence of the ignition point location on the explosion pressure in one room, it was suggested that this could be true for an explosion in two rooms. In our studies we used a test unit with two connected chambers, each having a volume of 1.125 m3. It turned out that this influence of the adjacent volume was not so unambiguous as it was described in those publications. It was found out that the maximum effect of explosion pressure amplification by the adjacent room is achieved, when the igniter is located in the chamber filled with a gas-air mixture in the area between the center of the chamber and the window (maximum amplification by more than 3 times. This effect is lower directly by the window (1.8 times and is practically absent in case of ignition within the area near the passage connecting the chamber with the adjacent room. This suggests that the effect discovered earlier is a special case of the general dependence of the gas explosion pressure in two chambers on the igniter location.

  2. Boredom Proneness, Social Connectedness, and Sexual Addiction among Men Who Have Sex with Male Internet Users

    Science.gov (United States)

    Chaney, Michael P.; Blalock, Andrew C.

    2006-01-01

    The authors collected surveys from 517 men who have sex with men (MSM) recruited from Internet chat rooms to examine the relationships among boredom, social connectedness, and sexual addiction. The results provide addictions professionals psychosocial factors to assess when working with sexually addicted MSM. (Contains 3 tables.)

  3. Power Versus Affiliation in Political Ideology: Robust Linguistic Evidence for Distinct Motivation-Related Signatures.

    Science.gov (United States)

    Fetterman, Adam K; Boyd, Ryan L; Robinson, Michael D

    2015-09-01

    Posited motivational differences between liberals and conservatives have historically been controversial. This motivational interface has recently been bridged, but the vast majority of studies have used self-reports of values or motivation. Instead, the present four studies investigated whether two classic social motive themes--power and affiliation--vary by political ideology in objective linguistic analysis terms. Study 1 found that posts to liberal chat rooms scored higher in standardized affiliation than power, whereas the reverse was true of posts to conservative chat rooms. Study 2 replicated this pattern in the context of materials posted to liberal versus conservative political news websites. Studies 3 and 4, finally, replicated a similar interactive (ideology by motive type) pattern in State of the State and State of the Union addresses. Differences in political ideology, these results suggest, are marked by, and likely reflective of, mind-sets favoring affiliation (liberal) or power (conservative). © 2015 by the Society for Personality and Social Psychology, Inc.

  4. Evaluating the auralization of a small room in a virtual sound environment using objective room acoustic measures

    DEFF Research Database (Denmark)

    Ahrens, Axel; Marschall, Marton; Dau, Torsten

    2016-01-01

    To study human auditory perception in realistic environments, loudspeaker-based reproduction techniques have recently become state-of-the-art. To evaluate the accuracy of a simulation-based room auralization of a small room, objective measures, such as early-decay-time (EDT), reverberation time...... of the room. The auralizations were generated using the loudspeaker-based room auralization toolbox (LoRA; Favrot and Buchholz, 2010) and reproduced in a 64-channel loudspeaker array, set up in an anechoic chamber. Differences between the objective measures evaluated in the real and the virtual room were......, clarity, interaural cross-correlation (IACC), and the speech transmission index were measured in an IEC listening room for 28 source-receiver combinations. The room was then modeled in the room acoustics software ODEON, and the same objective measures were also evaluated for the auralized version...

  5. Safety measures in exposure room

    International Nuclear Information System (INIS)

    Muhammad Jamal Md Isa

    2004-01-01

    The contents of this chapter are follows - The exposure room: location and dimension, material and thickness, windows, doors and other openings; Position of the Irradiating Apparatus, Use of Space Adjoining the Room, Warning Signs/Light, Dark Room. Materials and Apparatus: Classification of Areas, Local Rules, Other General Safety Requirements

  6. Fire protection for clean rooms

    International Nuclear Information System (INIS)

    Kirson, D.

    1990-01-01

    The fire protection engineer often must decide what size fire can be tolerated before automatic fire suppression systems actuate. Is it a wastepaper basket fire, a bushel basket fire...? In the case of state-of-the-art clean rooms, the answer clearly is not even an incipient fire. Minor fires in clean rooms can cause major losses. This paper discusses what a clean room is and gives a brief overview of the unique fire protection challenges encountered. The two major causes of fire related to clean rooms in the semiconductor industry are flammable/pyrophoric gas fires in plastic ducts and polypropylene wet bench fires. This paper concentrates on plastic ductwork in clean rooms, sprinkler protection in ductwork, and protection for wet benches

  7. "No Boundaries"? Girls' Interactive, Online Learning about Femininities

    Science.gov (United States)

    Kelly, Deirdre M.; Pomerantz, Shauna; Currie, Dawn H.

    2006-01-01

    This article explores girls' learning about issues of femininity that takes place in the presence of others online, connected through chat rooms, instant messaging, and role-playing games. Informed by critical and poststructuralist feminist theorizing of gendered subjectivity, agency, and power, the article draws from qualitative interviews with…

  8. Further Classification and Methodological Considerations of Evaluations for Online Discussion in Instructional Settings

    Science.gov (United States)

    Spatariu, Alexandru; Winsor, Denise L.; Simpson, Cynthia; Hosman, Eric

    2016-01-01

    With the rapid advancements of technology, online communication in both K-12 and post-secondary instruction has been widely implemented. Instructors as well as researchers have used various frameworks to evaluate different aspects of online discussions' quality. The online discussions take place synchronously or asynchronously in chat rooms,…

  9. Room for caring

    DEFF Research Database (Denmark)

    Timmermann, Connie; Uhrenfeldt, Lisbeth; Birkelund, Regner

    2015-01-01

    Aim This study explores how seriously ill hospitalized patients' experience and assign meaning to their patient room. Background Modern hospitals and the rational underlying care and treatment of today have their emphasis on diagnosis, cure and treatment. Consequently, aesthetics in the patient...... rooms such as a view of nature or natural light entering the room are often neglected in caring for these patients. Method A phenomenological-hermeneutic study design was applied and data was collected through multiple qualitative interviews combined with observations at a teaching hospital in Denmark......-being, relief and hope for the patients during serious illness. Therefore, these sensory impressions should be thought of as holding palliative potential and should be included as a part of caring for the seriously ill patients....

  10. Control room design

    International Nuclear Information System (INIS)

    Zinke, H.

    1980-01-01

    To control a 1300 megawatt nuclear power plant, about 15000 plant parameters must be collected together to control and operate the plant. The control room design therefore is of particular importance. The main design criteria are: Required functions of the power plant process - Level of Automation - Ergonomics - Available Technology. Extensive analysis has resulted in a control room design method. This ensures that an objective solution will be reached. Resulting from this methodical approach are: 1. Scope, position and appearance of the instrumentation. 2. Scope, position and appearance of the operator controls. Process analysis dictates what instrumentation and operator controls are needed. The priority and importance of the control and instrumentation (this we define as the utilisation areas), dictates the rough layout of the control room. (orig./RW)

  11. A 3-Arm randomised controlled trial of Communicating Healthy Beginnings Advice by Telephone (CHAT to mothers with infants to prevent childhood obesity

    Directory of Open Access Journals (Sweden)

    Li Ming Wen

    2017-01-01

    Full Text Available Abstract Background With an increasing prevalence of obesity in young children globally, there is an urgent need for the development of effective early interventions. A previous Healthy Beginnings Trial using a nurse-led home visiting program has demonstrated that providing mothers with evidence-based advice can improve maternal practice regarding obesity prevention, and can reduce Body Mass Index (BMI in the first few years of life. However, the costs for scale-up of home visiting limit its population reach. This trial aims to determine the efficacy of Communicating Healthy Beginnings Advice by Telephone (CHAT to mothers with infants in improving infant feeding practices and preventing the early onset of childhood overweight and obesity. Methods/Design We propose a 3-arm randomised controlled trial (RCT with a consecutive sample of 1056 mothers with their newborn children in New South Wales (NSW Australia. Pregnant women who are between weeks 28 and 34 of their pregnancy will be invited to participate in the CHAT trial. Informed consent will be obtained, and after baseline data collection, participants will be randomly allocated to the telephone intervention, text messaging intervention, or the control group. The intervention comprises telephone consultations or text messages, together with 6 intervention packages being mailed at specific times from the third trimester of pregnancy until 12 months post birth. The main trial outcome measures include a duration of breastfeeding, b timing of introduction of solids, c nutrition behaviours, physical activity and television viewing, and d weight and BMI z-score at 12 and 24 months, e cost-effectiveness, as well as f feasibility and acceptability of the interventions. Discussion The results will ascertain whether early intervention using telephone consultation or text messaging together with staged mailed intervention resources can be feasible and effective in improving infant feeding practices

  12. First installation of a dual-room IVR-CT system in the emergency room.

    Science.gov (United States)

    Wada, Daiki; Nakamori, Yasushi; Kanayama, Shuji; Maruyama, Shuhei; Kawada, Masahiro; Iwamura, Hiromu; Hayakawa, Koichi; Saito, Fukuki; Kuwagata, Yasuyuki

    2018-03-05

    Computed tomography (CT) embedded in the emergency room has gained importance in the early diagnostic phase of trauma care. In 2011, we implemented a new trauma workflow concept with a sliding CT scanner system with interventional radiology features (IVR-CT) that allows CT examination and emergency therapeutic intervention without relocating the patient, which we call the Hybrid emergency room (Hybrid ER). In the Hybrid ER, all life-saving procedures, CT examination, damage control surgery, and transcatheter arterial embolisation can be performed on the same table. Although the trauma workflow realized in the Hybrid ER may improve mortality in severe trauma, the Hybrid ER can potentially affect the efficacy of other in/outpatient diagnostic workflow because one room is occupied by one severely injured patient undergoing both emergency trauma care and CT scanning for long periods. In July 2017, we implemented a new trauma workflow concept with a dual-room sliding CT scanner system with interventional radiology features (dual-room IVR-CT) to increase patient throughput. When we perform emergency surgery or interventional radiology for a severely injured or ill patient in the Hybrid ER, the sliding CT scanner moves to the adjacent CT suite, and we can perform CT scanning of another in/outpatient. We believe that dual-room IVR-CT can contribute to the improvement of both the survival of severely injured or ill patients and patient throughput.

  13. Adolescent Susceptibility to Peer Influence in Sexual Situations.

    Science.gov (United States)

    Widman, Laura; Choukas-Bradley, Sophia; Helms, Sarah W; Prinstein, Mitchell J

    2016-03-01

    One consistent predictor of adolescents' engagement in sexual risk behavior is their belief that peers are engaging in similar behavior; however, not all youth are equally susceptible to these peer influence effects. Understanding individual differences in susceptibility to peer influence is critical to identifying adolescents at risk for negative health outcomes. The purpose of this project was to identify predictors of susceptibility to peer influence using a novel performance-based measure of sexual risk taking. Participants were 300 early adolescents (Mage = 12.6 years; 53% female; 44% Caucasian) who completed (1) a pretest assessment of demographics, sexual attitudes, and hypothetical scenarios measuring the likelihood of engaging in sexual risk behavior and (2) a subsequent experimental procedure that simulated an Internet chat room in which youth believed that they were communicating with peers regarding these same hypothetical scenarios. In reality, these "peers" were computer-programmed e-confederates. Changes in responses to the sexual scenarios in the private pretest versus during the public chat room provided a performance-based measure of peer influence susceptibility. In total, 78% of youth provided more risky responses in the chat room than those in pretest. The most robust predictor of this change was gender, with boys significantly more susceptible to peer influence than girls. Significant interactions also were noted, with greater susceptibility among boys with later pubertal development and African-American boys. Results confirm that not all youth are equally susceptible to peer influence. Consistent with sexual script theory, boys evidence greater susceptibility to social pressure regarding sexual behavior than girls. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  14. The Virtual Dressing Room

    DEFF Research Database (Denmark)

    Holte, Michael Boelstoft; Gao, Yi; Petersson, Eva

    2015-01-01

    This paper presents the design and evaluation of a usability and user experience test of a virtual dressing room. First, we motivate and introduce our recent developed prototype of a virtual dressing room. Next, we present the research and test design grounded in related usability and user...... experience studies. We give a description of the experimental setup and the execution of the designed usability and user experience test. To this end, we report interesting results and discuss the results with respect to user-centered design and development of a virtual dressing room....

  15. Üksildus küberruumis: autori individuaalsus ja teksti autonoomia. Solitude in Cyberspace: the Individuality of an Author and the Autonomy of a Text

    Directory of Open Access Journals (Sweden)

    Virve Sarapik

    2012-06-01

    Full Text Available The keywords in analyses of digital literature and cybertexts (literature that has been created by and is read on a computer mostly derive from the vocabulary of increasing collectivism: shared authorship, readerviewer interaction, their active participation in creating text etc. However, this article focuses on the opposite phenomenon: the essence of individualism in the process of digital text creation, that is, solitude. At the same time, the paradoxes related to collectivism and solitude are also addressed. In this article, solitude is regarded as a technical term, indicating the number of different agents in a creative process. This primarily means: whether the text can be associated with one author and his intention, or whether authorship is distributed between several people who have participated in the creation of the text, as well as if and how much texts presume activity on the part of the reader. We can claim that when writers write their texts they are usually on their own. A text is born in the writer’s head and he or she needs some kind of form to present it. When the form of literature was mostly what was recorded on paper, we could say that the author formalised his text in solitude – writing alone on pieces of paper. Only after the manuscript was handed in were other participants added, such as the editor, designer and printer, who took part in the completion process of the literary work. However, when the end result of production is not a printed book, but a cyber- or hypertext, we can assume that these relationships change significantly in the case of digital literature. In addition to the author of the text, cybertexts and hypertexts need active co-authors: programmers, designers etc. Creating a cybertext is, therefore, basically a collective act (although there are of course exceptions. The author of a cybertext is no longer the only and unique creator. At the same time, the solitude of a creative work in cyberspace

  16. Detecting themes of public concern: a text mining analysis of the Centers for Disease Control and Prevention's Ebola live Twitter chat.

    Science.gov (United States)

    Lazard, Allison J; Scheinfeld, Emily; Bernhardt, Jay M; Wilcox, Gary B; Suran, Melissa

    2015-10-01

    A diagnosis of Ebola on US soil triggered widespread panic. In response, the Centers for Disease Control and Prevention held a live Twitter chat to address public concerns. This study applied a textual analytics method to reveal insights from these tweets that can inform communication strategies. User-generated tweets were collected, sorted, and analyzed to reveal major themes. The public was concerned with symptoms and lifespan of the virus, disease transfer and contraction, safe travel, and protection of one's body. Copyright © 2015 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  17. Cyberbullying Knows No Borders

    Science.gov (United States)

    Miller, Jerold D.; Hufstedler, Shirley M.

    2009-01-01

    Cyberbullying is a global problem with a wide range of incidents reported in many countries. This form of bullying may be defined as harassment using technology such as social websites (MySpace/Facebook), email, chat rooms, mobile phone texting and cameras, picture messages (including sexting), IM (instant messages), or blogs. Cyberbullying…

  18. Effectively digitizing communication with Turnitin for improved ...

    African Journals Online (AJOL)

    Electronic interviews with learners and focus group discussions in a specially created chat room with other FAL teachers in the school were conducted to collect data. ... Findings indicate that the innovative application of Turnitin, a tool that provides a similarity index, to provide written corrective feedback (WCF), started an ...

  19. A Review of Research Ethics in Internet-Based Research

    Science.gov (United States)

    Convery, Ian; Cox, Diane

    2012-01-01

    Internet-based research methods can include: online surveys, web page content analysis, videoconferencing for online focus groups and/or interviews, analysis of "e-conversations" through social networking sites, email, chat rooms, discussion boards and/or blogs. Over the last ten years, an upsurge in internet-based research (IBR) has led…

  20. Teaching with Technology

    Science.gov (United States)

    Martineau, Pamela

    2009-01-01

    In an era when technology seems to be changing almost daily, school boards, administrators, and teachers need to revisit their technology policies almost as rapidly, education experts advise. Internet chat rooms, online video games, and other electronic features that once seemed inappropriate for the classroom are proving useful for meeting many…

  1. Cyberbullying among Adolescents: A General Strain Theory Perspective

    Science.gov (United States)

    Paez, Gabriel R.

    2018-01-01

    Cyber bullying has become more pervasive as a result of advances in communication technology such as email, text messaging, chat rooms, and social media sites. Despite the growth in research on correlates associated with engagement in cyber bullying, few studies test the applicability of criminological theories to explain engagement in cyber…

  2. Democratic Use of Blogs and Online Discussion Boards in Social Studies Education

    Science.gov (United States)

    Hostetler, Andrew L.

    2012-01-01

    The author experienced the introduction of the Internet as a high school student. Reflecting on that experience, he now realizes that he did not understand the possibilities offered by chat rooms, instant messaging, and other Internet-based communication tools to increase sociopolitical connectedness. As the teacher of an eleventh grade social…

  3. Usage Patterns of Communication Interfaces for Social Support among At-Risk Adolescents

    Science.gov (United States)

    Passig, David

    2014-01-01

    Social and interpersonal support has mostly been carried out face-to-face. However, the internet was able, in the last couple of decades, to facilitate social interactions through a range of computer-mediated communication (CMC) interfaces--from email applications, chat-rooms, forums, instant messages (IM), short text messages (SMS), social…

  4. Cyber-Evaluation: Evaluating a Distance Learning Program.

    Science.gov (United States)

    Henderson, Denise L.

    This paper examines how the process of soliciting evaluation feedback from nonresident students in the Army Management Staff College (Virginia) program on leadership and management for civilian employees of the Army has evolved since 1995. Course design is briefly described, including the use of video-teleconferences, chat rooms, an electronic…

  5. A Population-Level Data Analytics Portal for Self-Administered Lifestyle and Mental Health Screening.

    Science.gov (United States)

    Zhang, Xindi; Warren, Jim; Corter, Arden; Goodyear-Smith, Felicity

    2016-01-01

    This paper describes development of a prototype data analytics portal for analysis of accumulated screening results from eCHAT (electronic Case-finding and Help Assessment Tool). eCHAT allows individuals to conduct a self-administered lifestyle and mental health screening assessment, with usage to date chiefly in the context of primary care waiting rooms. The intention is for wide roll-out to primary care clinics, including secondary school based clinics, resulting in the accumulation of population-level data. Data from a field trial of eCHAT with sexual health questions tailored to youth were used to support design of a data analytics portal for population-level data. The design process included user personas and scenarios, screen prototyping and a simulator for generating large-scale data sets. The prototype demonstrates the promise of wide-scale self-administered screening data to support a range of users including practice managers, clinical directors and health policy analysts.

  6. Crafting a Democratic Enclave on the Cyberspace: Case Studies of Malaysia, Indonesia, and Singapore

    Directory of Open Access Journals (Sweden)

    Yangyue Liu

    2011-01-01

    Full Text Available As an antithesis of “authoritarian enclave” which has been well-established in the comparative politics literature, “democratic enclave” points to the institution of a state or the unambiguous regulatory space in society “where the authoritarian regime’s writ is substantively limited and is replaced by an adherence to recognizably democratic norms and procedures” (Gilley 2010. In this sense, the Internet space, embodied by information and communication technologies, has great potential to play such a role, since its “inherited” properties of decentralization and anonymity would inevitably breach the authoritarian rules. However, a closer look at three Southeast Asian states, Malaysia, Singapore and the “New Order” Indonesia whose regimes were characterized by authoritarianism when Internet was initially developed, reveals different trajectories. In the “New Order” Indonesia and Malaysia, the governments consciously left the Internet space uncontrolled; the online media developed independently, vibrantly, and professionally, especially in the Malaysian case; and there were strong connections between online and offline contentious politics. These elements made the Internet space in Indonesia and Malaysia a successful case of democratic enclave. Based on these criteria, however, the Internet space in Singapore has not achieved similar status. This paper analyses the different outcomes of enclave creation on the cyberspace among these countries. It argues that elite conflict and the strength of civil society are the two major factors that shape the differences. In this sense, the political contexts are of great importance for the understanding of Internet’s political impacts.

  7. Plant a tree in cyberspace: metaphor and analogy as design elements in Web-based learning environments.

    Science.gov (United States)

    Wolfe, C R

    2001-02-01

    Analogy and metaphor are figurative forms of communication that help people integrate new information with prior knowledge to facilitate comprehension and appropriate inferences. The novelty and versatility of the Web place cognitive burdens on learners that can be overcome through the use of analogies and metaphors. This paper explores three uses of figurative communication as design elements in Web-based learning environments, and provides empirical illustrations of each. First, extended analogies can be used as the basis of cover stories that create an analogy between the learner's position and a hypothetical situation. The Dragonfly Web pages make extensive use of analogous cover stories in the design of interactive decision-making games. Feedback from visitors, patterns of usage, and external reviews provide evidence of effectiveness. A second approach is visual analogies based on the principles of ecological psychology. An empirical example suggests that visual analogies are most effective when there is a one-to-one correspondence between the base and visual target analogs. The use of learner-generated analogies is a third approach. Data from an offline study with undergraduate science students are presented indicating that generating analogies are associated with significant improvements in the ability to place events in natural history on a time line. It is concluded that cyberspace itself might form the basis of the next guiding metaphor of mind.

  8. Control room habitability during severe accidents

    International Nuclear Information System (INIS)

    Siu, R.P.

    1989-01-01

    The requirements for protection of control room personnel against radiation hazards are specified in 10CFR50, Appendix A, GDC 19. The conventional approach involves a mechanistic evaluation of the radiation doses to control room personnel during design-basis accidents. In this study, an assessment of control room habitability during severe accidents is conducted. The potential levels of radiation hazards to control room personnel are evaluated in terms of both magnitude and probability of occurrence. The expected values for the probabilities of exceeding GDC-19 limits and the cumulative probability distributions of control room doses are determined. In this study, a pressurized water reactor with a large dry containment has been selected for analysis. The types of control rooms evaluated in this study include designs with: (a) filtered local intakes only, (b) filtered recirculation only, (c) filtered local intakes and recirculation, and (d) filtered dual remote intakes and recirculation. From the observations, it is concluded that, except for control room D, all other control room designs may require improvements in order to provide adequate radiation protection during severe accidents, particularly in terms of reducing whole-body gamma doses and skin doses. Potential design improvements include reduction of intake flows for concepts relying on pressurization, reduction in overall leakages, and control room pressurization through the use of bottled air supply

  9. Films and dark room

    International Nuclear Information System (INIS)

    Abdul Nassir Ibrahim; Azali Muhammad; Ab. Razak Hamzah; Abd. Aziz Mohamed; Mohamad Pauzi Ismail

    2008-01-01

    After we know where the radiographic come from, then we must know about the film and also dark room. So, this chapter 5 discusses the two main components for radiography work that is film and dark room, places to process the film. Film are structured with three structured that are basic structured, emulsion and protection structured. So, this film can be classified either with their speed, screen and standard that used. The process to wash the film must be done in dark room otherwise the radiographer cannot get what are they inspected. The processing of film will be discussed briefly in next chapter.

  10. The conference hybrid control room

    International Nuclear Information System (INIS)

    Gieci, A.; Caucik, J.; Macko, J.

    2008-01-01

    An original concept of a hybrid control room was developed for the Mochovce-3 and Mochovce-4 reactor units which are under construction. The basic idea underlying the concept is that the control room should be a main working place for the operators (reactor operator and turbine operator) and for the shift supervisor, designed as a comprehensive unit desk shaped so that all members of the control room crew are in a face-to-face contact constantly. The main desk consists of three clearly identified areas serving the operators and the unit supervisor as their main working places. A soft control system is installed at the main working places. A separate safety-related working place, designed as a panel with classical instrumentations at the conference hybrid control room, is provided in case of abnormal conditions or emergency situation. Principles of ergonomics and cognitive engineering were taken into account when designing the new conference hybrid control room for the Mochovce-3 and -4 reactor units. The sizes, propositions, shapes and disposition of the equipment at the control room have been created and verified by using virtual reality tools. (orig.)

  11. Modern control room for AHWR

    International Nuclear Information System (INIS)

    Verghese, Clement C.; Joseph, Jose; Biswas, B.B.; Patil, R.K.

    2005-01-01

    Advanced Heavy Water Reactor (AHWR) is a next generation nuclear power plant being developed by Bhabha Atomic Research Centre. A modern control room has been conceived for operation and monitoring of the plant in tune with the advanced features of the reactor. A state of the art C and I architecture based on extensive use of computers and networking has been conceived for this plant. This architecture enables the implementation of a fully computerised operator friendly control room with soft HMIs. Features of the modern control room and control room and concept of soft HMI based operator interfaces have been described in the paper. (author)

  12. Leadership in the control room

    International Nuclear Information System (INIS)

    McDougall, S.J.

    2006-01-01

    This paper discusses the importance of leadership within the control rooms at nuclear power facilities. the leadership capability of control room staff has a significant influence over the improvement of human performance and the development of an 'event free' culture within the business. The development of leadership competency in the control room must be an important part of any nuclear power utility business improvement plan. (author)

  13. Operating room manager game

    NARCIS (Netherlands)

    Hans, Elias W.; Nieberg, T.

    2007-01-01

    The operating room (OR) department of a hospital forms the heart of the organization, where the single largest cost is incurred. This document presents and reports on the “Operating Room Manager Game,” developed to give insight into managing a large hospital's OR department at various levels of

  14. Leadership in the control room

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, S.J. [Bruce Power, Bruce B Operations Div., Tiverton, Ontario (Canada)

    2006-07-01

    This paper discusses the importance of leadership within the control rooms at nuclear power facilities. the leadership capability of control room staff has a significant influence over the improvement of human performance and the development of an 'event free' culture within the business. The development of leadership competency in the control room must be an important part of any nuclear power utility business improvement plan. (author)

  15. Internet Use and Cognitive Development: A Theoretical Framework

    Science.gov (United States)

    Johnson, Genevieve

    2006-01-01

    The number of children and adolescents accessing the Internet as well as the amount of time online are steadily increasing. The most common online activities include playing video games, accessing web sites, and communicating via chat rooms, email, and instant messaging. A theoretical framework for understanding the effects of Internet use on…

  16. A Theoretical Framework for Organizing the Effect of the Internet on Cognitive Development

    Science.gov (United States)

    Johnson, Genevieve Marie

    2006-01-01

    The number of children and adolescents accessing the Internet as well as the amount of time online are steadily increasing. The most common online activities include playing video games, navigating web sites, and communicating via chat rooms, email, and instant messaging. A theoretical framework for understanding the effects of Internet use on…

  17. Earth Science Learning in SMALLab: A Design Experiment for Mixed Reality

    Science.gov (United States)

    Birchfield, David; Megowan-Romanowicz, Colleen

    2009-01-01

    Conversational technologies such as email, chat rooms, and blogs have made the transition from novel communication technologies to powerful tools for learning. Currently virtual worlds are undergoing the same transition. We argue that the next wave of innovation is at the level of the computer interface, and that mixed-reality environments offer…

  18. Adolescents Online: The Importance of Internet Activity Choices to Salient Relationships

    Science.gov (United States)

    Blais, Julie J.; Craig, Wendy M.; Pepler, Debra; Connolly, Jennifer

    2008-01-01

    The purpose of this study was to determine whether using the Internet for different activities affects the quality of close adolescent relationships (i.e., best friendships and romantic relationships). In a one-year longitudinal study of 884 adolescents (Mean age = 15, 46% male), we examined whether visiting chat rooms, using ICQ, using the…

  19. When Teens Turn Cyberbullies

    Science.gov (United States)

    Strom, Paris S.; Strom, Robert D.

    2005-01-01

    Cyber harassment involves using an electronic medium to threaten or harm others. E-mail, chat rooms, cell phones, instant messaging, pagers, text messaging, and online voting booths are tools used to inflict humiliation, fear, and a sense of helplessness. This type of intimidation differs from traditional bullying in several important ways. Unlike…

  20. Requirements for Control Room Computer-Based Procedures for use in Hybrid Control Rooms

    Energy Technology Data Exchange (ETDEWEB)

    Le Blanc, Katya Lee [Idaho National Lab. (INL), Idaho Falls, ID (United States); Oxstrand, Johanna Helene [Idaho National Lab. (INL), Idaho Falls, ID (United States); Joe, Jeffrey Clark [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-05-01

    Many plants in the U.S. are currently undergoing control room modernization. The main drivers for modernization are the aging and obsolescence of existing equipment, which typically results in a like-for-like replacement of analogue equipment with digital systems. However, the modernization efforts present an opportunity to employ advanced technology that would not only extend the life, but enhance the efficiency and cost competitiveness of nuclear power. Computer-based procedures (CBPs) are one example of near-term advanced technology that may provide enhanced efficiencies above and beyond like for like replacements of analog systems. Researchers in the LWRS program are investigating the benefits of advanced technologies such as CBPs, with the goal of assisting utilities in decision making during modernization projects. This report will describe the existing research on CBPs, discuss the unique issues related to using CBPs in hybrid control rooms (i.e., partially modernized analog control rooms), and define the requirements of CBPs for hybrid control rooms.