WorldWideScience

Sample records for discusses key findings

  1. Language Learning at Key Stage 2: Findings from a Longitudinal Study

    Science.gov (United States)

    Cable, Carrie; Driscoll, Patricia; Mitchell, Rosamond; Sing, Sue; Cremin, Teresa; Earl, Justine; Eyres, Ian; Holmes, Bernardette; Martin, Cynthia; Heins, Barbara

    2012-01-01

    This paper discusses some of the findings from a 3-year longitudinal study of language learning in the upper stage of English primary schools, i.e. at Key Stage 2. This largely qualitative study (commissioned by the then Department for Children, Schools and Families) was designed to explore and document developing provision and practice in a…

  2. Finding Malicious Cyber Discussions in Social Media

    Science.gov (United States)

    2016-02-02

    reverse engineering, security, malware , blackhat) were labeled as cyber and posts on non- cyber topics (e.g., astronomy, electronics, beer, biology, mu...firewall, hash, infect, inject, install, key, malicious, malware , network, obfuscate, overflow, packet, password, payload, request, risk, scan, script...cyber vulnerabilities (e.g., malware , overflow, attack). The keyword system lacked the keywords used in Heartbleed discussions, and thus suffered from

  3. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-09-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  4. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag; Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2011-01-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  5. Non-coherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-06-01

    We study the Rayleigh fading non-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have access to instantaneous channel state information (CSI) of any channel. We present two results. At high Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low-SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  6. Non-coherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag; Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2011-01-01

    We study the Rayleigh fading non-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have access to instantaneous channel state information (CSI) of any channel. We present two results. At high Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low-SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  7. Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint

    KAUST Repository

    Zorgui, Marwen

    2016-04-06

    This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint A on the channel input. The optimal input distribution is proved to be discrete with finite support. To overcome the computationally heavy search for the optimal discrete distribution, several suboptimal schemes are proposed and shown numerically to perform close to the capacity. Moreover, lower and upper bounds for the secret-key capacity are provided and used to prove that the secret-key capacity converges for asymptotic high values of A, to the secret-key capacity with an average power constraint A2. Finally, when the amplitude constraint A is small (A ! 0), the secret-key capacity is proved to be asymptotically equal to the capacity of the legitimate user with an amplitude constraint A and no secrecy constraint.

  8. Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2016-01-01

    This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint A on the channel input. The optimal input distribution is proved to be discrete with finite support. To overcome the computationally heavy search for the optimal discrete distribution, several suboptimal schemes are proposed and shown numerically to perform close to the capacity. Moreover, lower and upper bounds for the secret-key capacity are provided and used to prove that the secret-key capacity converges for asymptotic high values of A, to the secret-key capacity with an average power constraint A2. Finally, when the amplitude constraint A is small (A ! 0), the secret-key capacity is proved to be asymptotically equal to the capacity of the legitimate user with an amplitude constraint A and no secrecy constraint.

  9. Human Health Effects of Trichloroethylene: Key Findings and Scientific Issues

    Science.gov (United States)

    Jinot, Jennifer; Scott, Cheryl Siegel; Makris, Susan L.; Cooper, Glinda S.; Dzubow, Rebecca C.; Bale, Ambuja S.; Evans, Marina V.; Guyton, Kathryn Z.; Keshava, Nagalakshmi; Lipscomb, John C.; Barone, Stanley; Fox, John F.; Gwinn, Maureen R.; Schaum, John; Caldwell, Jane C.

    2012-01-01

    Background: In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) completed a toxicological review of trichloroethylene (TCE) in September 2011, which was the result of an effort spanning > 20 years. Objectives: We summarized the key findings and scientific issues regarding the human health effects of TCE in the U.S. EPA’s toxicological review. Methods: In this assessment we synthesized and characterized thousands of epidemiologic, experimental animal, and mechanistic studies, and addressed several key scientific issues through modeling of TCE toxicokinetics, meta-analyses of epidemiologic studies, and analyses of mechanistic data. Discussion: Toxicokinetic modeling aided in characterizing the toxicological role of the complex metabolism and multiple metabolites of TCE. Meta-analyses of the epidemiologic data strongly supported the conclusions that TCE causes kidney cancer in humans and that TCE may also cause liver cancer and non-Hodgkin lymphoma. Mechanistic analyses support a key role for mutagenicity in TCE-induced kidney carcinogenicity. Recent evidence from studies in both humans and experimental animals point to the involvement of TCE exposure in autoimmune disease and hypersensitivity. Recent avian and in vitro mechanistic studies provided biological plausibility that TCE plays a role in developmental cardiac toxicity, the subject of substantial debate due to mixed results from epidemiologic and rodent studies. Conclusions: TCE is carcinogenic to humans by all routes of exposure and poses a potential human health hazard for noncancer toxicity to the central nervous system, kidney, liver, immune system, male reproductive system, and the developing embryo/fetus. PMID:23249866

  10. Institutional Data Management in Higher Education. ECAR Key Findings

    Science.gov (United States)

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  11. Audio Key Finding: Considerations in System Design and Case Studies on Chopin's 24 Preludes

    Directory of Open Access Journals (Sweden)

    Elaine Chew

    2007-01-01

    Full Text Available We systematically analyze audio key finding to determine factors important to system design, and the selection and evaluation of solutions. First, we present a basic system, fuzzy analysis spiral array center of effect generator algorithm, with three key determination policies: nearest-neighbor (NN, relative distance (RD, and average distance (AD. AD achieved a 79% accuracy rate in an evaluation on 410 classical pieces, more than 8% higher RD and NN. We show why audio key finding sometimes outperforms symbolic key finding. We next propose three extensions to the basic key finding system—the modified spiral array (mSA, fundamental frequency identification (F0, and post-weight balancing (PWB—to improve performance, with evaluations using Chopin's Preludes (Romantic repertoire was the most challenging. F0 provided the greatest improvement in the first 8 seconds, while mSA gave the best performance after 8 seconds. Case studies examine when all systems were correct, or all incorrect.

  12. Dioxins levels in Australia. Key findings of studies

    Energy Technology Data Exchange (ETDEWEB)

    Ivory, A.; Mobbs, C. [Australian Government Department of the Environment and Heritage (Australia)

    2004-09-15

    The Australian Government established the National Dioxins Program (NDP) in 2001 to improve knowledge about levels of dioxins in Australia. The program aims to determine levels, assess the risks to Australians and the environment, and to consider appropriate management actions. Starting in mid 2001and completed in 2004, the studies constituted the largest survey of dioxin levels ever undertaken in Australia. The findings will contribute to debate on how to deal with dioxins in Australia, as well as helping to meet obligations under the Stockholm Convention on Persistent Organic Pollutants, which Australia ratified on 20 May 2004. These studies will also contribute to a better understanding about dioxins in the southern hemisphere. This paper provides a summary of the key findings of these studies and the risk assessments.

  13. Highlights from panel discussion on key issues for future developments in microwave processing

    International Nuclear Information System (INIS)

    Gac, F.D.; Iskander, M.F.

    1992-01-01

    This paper reports on highlights from a panel discussion on Key Issues for Future Development in Microwave Processing. Although the panelists represented a mix of individuals from government, academia, and industry, only one aspect of industry was represented, namely microwave system manufacturers. For further panel discussions, it is recommended that the materials manufacturing (i.e., microwave user) sector also be represented. Three important points emerged from the panel discussion. The first deals with the credibility and usability of information, be it dielectric property measurements, experimental procedures, or microwave processing results. Second, a considerable communication and education gap continues to exist between the materials community and microwave engineers. Finally, a more realistic approach should be taken in identifying where microwave processing makes sense

  14. Key Findings and Recommendations for Technology Transfer at the ITS JPO

    Science.gov (United States)

    2011-03-18

    This report provides key findings and recommendations for technology transfer at the Intelligent Transportation Systems Joint Program Office (ITS JPO) based upon an assessment of best practices in technology transfer in other industries, such as nati...

  15. Integrated vehicle-based safety systems light-vehicle field operational test key findings report.

    Science.gov (United States)

    2011-01-01

    "This document presents key findings from the light-vehicle field operational test conducted as part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of analyses performed by the University of Michigan Transportat...

  16. Perceptions of key participants about Botswana adolescents' risks of unplanned pregnancy, sexually transmitted diseases, and HIV: Qualitative findings.

    Science.gov (United States)

    Magowe, Mabel K M; Seloilwe, Esther; Dithole, Kefalotse; St Lawrence, Janet

    2017-10-01

    The qualitative research findings are reported on the perceptions of key participants in Botswana about adolescent sexuality problems and the feasibility (with suggestions) of an adolescent prevention intervention. Twenty adult key participants who were selected through purposive sampling from schools and youth centers responded to open-ended questions during face-to-face individual in-depth interviews that were conducted between December, 2011 and January, 2012 in Gaborone, Botswana. The data were analyzed by using an inductive content analysis. Five major themes and 12 subthemes emerged from the interviews. The key participants discussed situations that exposed adolescents to HIV, sexually transmitted infections, and pregnancy. They also discussed unsafe sexual practices, the consequences of unprotected sex, poor parent-adolescent communication on sexuality, and the need for a sexuality education program. Policy changes are needed to improve collaboration between adolescents, parents, teachers, and youth officers in order to address adolescent sexuality problems. Further research is needed to explore the ways in which to improve sexuality communication between these groups. The results of the study provide valuable information on the sexuality risks that expose adolescents to HIV, pregnancy, and sexually transmitted infections and the strategies for the prevention of these risks, thus informing targeted interventions for risk reduction for adolescents. © 2017 Japan Academy of Nursing Science.

  17. Secret-key agreement over spatially correlated fast-fading multiple-antenna channels with public discussion

    KAUST Repository

    Zorgui, Marwen

    2015-06-14

    We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. First, we derive the expression of the secret-key capacity under the considered setup. Then, we prove that the optimal transmit strategy achieving the secret-key capacity consists in transmitting independent Gaussian signals along the eingenvectors of the transmit correlation matrix. The powers allocated to each channel mode are determined as the solution to a numerical optimization problem that we derive. A necessary and sufficient condition for beamforming (i.e., transmitting along the strongest channel mode) to be capacity-achieving is derived. Finally, we analyze the impact of correlation matrices on the system performance and provide closed-form expressions of the gain/loss due to correlation in the high power regime.

  18. 40 CFR 63.2831 - Where can I find definitions of key words used in this subpart?

    Science.gov (United States)

    2010-07-01

    ... words used in this subpart? 63.2831 Section 63.2831 Protection of Environment ENVIRONMENTAL PROTECTION... Vegetable Oil Production What This Subpart Covers § 63.2831 Where can I find definitions of key words used in this subpart? You can find definitions of key words used in this subpart in § 63.2872. ...

  19. International Off-grid Renewable Energy Conference 2012: Key Findings and Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    IRENA co-organised the International Off-grid Renewable Energy Conference (IOREC) along with the ECOWAS Regional Centre for Renewable Energy and Energy Efficiency (ECREEE) and the Alliance for Rural Electrification (ARE), in Accra, Ghana, on 1-2 November 2012. This report presents the key findings and recommendations that emerged from the roundtable discussions during IOREC. The report highlights that off-grid renewable energy systems, stand-alone and mini-grids, have the potential to play a significant role in achieving the goal of universal electricity access. In recognition of this role, their development needs to be integrated into the mainstream rural electrification strategies. While several successful deployment approaches exist, there is a need to scale up. What is required is a shift from the prevalent project-by-project approach, to one that focusses on the creation of a sustainable environment that facilitates large-scale deployment. Involvement of the private sector, and in particular of local enterprises, will be instrumental in extending electricity access in rural areas, rapidly and sustainably, and hence needs to be promoted. Off-grid renewable energy technologies produce striking synergies with sectors critical for human development, and play an important role in improving access to water supply while also extending healthcare and telecommunication services in rural areas.

  20. Chronic subjective dizziness versus conversion disorder: discussion of clinical findings and rehabilitation.

    Science.gov (United States)

    Honaker, Julie A; Gilbert, Jane M; Staab, Jeffrey P

    2010-06-01

    Audiologists frequently encounter patients who complain of chronic dizziness or imbalance, in the absence of active vestibular or neurological deficits. Knowledge about conditions that cause this clinical presentation will allow audiologists to make important contributions to accurate diagnosis and effective management of these patients. This article reviews 2 such conditions, chronic subjective dizziness (CSD) and conversion disorder. A case of CSD and another of conversion disorder are presented, with a literature review of their clinical presentations, key diagnostic features, and treatment strategies. The role of the audiologist in assessing patients with these conditions and facilitating appropriate treatment referrals is discussed. The audiologist is in a key position to identify individuals with CSD and conversion disorder, 2 conditions that can be effectively managed if properly recognized. The authors demonstrate an effective team approach program that includes the audiologist's contribution to differential diagnosis, education of patients and other clinicians about these conditions, and development of recommendations for neurological, psychiatric, otologic, and physical therapy referrals.

  1. On the Ergodic Secret-Key Agreement over Spatially Correlated Multiple-Antenna Channels with Public Discussion

    KAUST Repository

    Zorgui, Marwen

    2015-09-28

    We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. First, we derive the expression of the secret-key capacity under the considered setup. We prove that the optimal transmit strategy achieving the secret-key capacity consists in transmitting independent Gaussian signals along the eingenvectors of the transmit correlation matrix. The powers allocated to each channel mode are determined as the solution to a numerical optimization problem. A necessary and sufficient condition for beamforming (i.e., transmitting along the strongest channel mode) to be capacity-achieving is derived. Moreover, we analyze the impact of correlation matrices on the system performance. Finally, we study the system’s performance in the two extreme power regimes. In the high-power regime, we provide closed-form expressions of the gain/loss due to correlation. In the low signal-to-noise ratio (SNR) regime, we investigate the energy efficiency of the system by determining the minimum energy required for sharing a secret-key bit and the wideband slope while highlighting the impact of correlation matrices.

  2. [Discussion on appraisal methods and key technologies of arbuscular mycorrhizal fungi and medicinal plant symbiosis system].

    Science.gov (United States)

    Chen, Meilan; Guo, Lanping; Yang, Guang; Chen, Min; Yang, Li; Huang, Luqi

    2011-11-01

    Applications of arbuscular mycorrhizal fungi in research of medicinal plant cultivation are increased in recent years. Medicinal plants habitat is complicated and many inclusions are in root, however crop habitat is simple and few inclusions in root. So appraisal methods and key technologies about the symbiotic system of crop and arbuscular mycorrhizal fungi can't completely suitable for the symbiotic system of medicinal plants and arbuscular mycorrhizal fungi. This article discuss the appraisal methods and key technologies about the symbiotic system of medicinal plant and arbuscular mycorrhizal fungi from the isolation and identification of arbuscular mycorrhiza, and the appraisal of colonization intensity. This article provides guidance for application research of arbuscular mycorrhizal fungi in cultivation of medicinal plants.

  3. Alternative IT Sourcing Strategies: From the Campus to the Cloud. ECAR Key Findings

    Science.gov (United States)

    Goldstein, Philip J.

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study, "Alternative IT Sourcing Strategies: From the Campus to the Cloud," by Philip J. Goldstein. The study explores a multitude of strategies used by colleges and university information technology organizations to deliver the breadth of technologies…

  4. Discussion: some new findings from surface subsidence monitoring over longwall panels

    International Nuclear Information System (INIS)

    Luo, Y.; Peng, S.S.; Arioglu, E.

    1992-01-01

    The article consists of a discussion of the paper, 'some new findings from surface subsidence monitoring over longwall panels' and a reply by the paper's authors, Luo and Peng. The reviewer, Arioglu, regards the paper favourably but suggests that surface subsidence can be represented by an exponential expression, and that there is a regression equation linking possible subsidence, pillar loading and the height-to-width ratio of the pillars left. Luo and Peng reply with their reasons for preferring their original linear regression model to the non-linear models suggested by Arioglu. 4 figs

  5. Identifying Key Features of Effective Active Learning: The Effects of Writing and Peer Discussion

    Science.gov (United States)

    Pangle, Wiline M.; Wyatt, Kevin H.; Powell, Karli N.; Sherwood, Rachel E.

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. PMID:25185230

  6. 40 CFR 63.1176 - Where can I find definitions of key words used in this subpart?

    Science.gov (United States)

    2010-07-01

    ... words used in this subpart? 63.1176 Section 63.1176 Protection of Environment ENVIRONMENTAL PROTECTION... Production § 63.1176 Where can I find definitions of key words used in this subpart? The definitions of key words used in this subpart are in the Clean Air Act (Act), in § 63.2 of the general provisions in...

  7. MycoKey round table discussions of future directions in research on chemical detection methods, genetics and biodiversity of mycotoxins

    Science.gov (United States)

    MycoKey, an EU-funded Horizon 2020 project, includes a series of “Roundtable Discussions” to gather information on trending research areas in the field of mycotoxicology. This presentation includes summaries of the Roundtable Discussions on the role of Genetics and Biodiversity in mycotoxin product...

  8. Finding Malicious Cyber Discussions in Social Media

    Science.gov (United States)

    2015-12-11

    automatically filter cyber discussions from Stack Exchange, Reddit, and Twitter posts written in English. Criminal hackers often use social media...monitoring hackers on Facebook and in private chat rooms. As a result, system administrators were prepared to counter distributed denial-of-service

  9. [Research progress on standards of commodity classes of Chinese materia medica and discussion on several key problems].

    Science.gov (United States)

    Yang, Guang; Zeng, Yan; Guo, Lan-Ping; Huang, Lu-Qi; Jin, Yan; Zheng, Yu-Guang; Wang, Yong-Yan

    2014-05-01

    Standards of commodity classes of Chinese materia medica is an important way to solve the "Lemons Problem" of traditional Chinese medicine market. Standards of commodity classes are also helpful to rebuild market mechanisms for "high price for good quality". The previous edition of commodity classes standards of Chinese materia medica was made 30 years ago. It is no longer adapted to the market demand. This article researched progress on standards of commodity classes of Chinese materia medica. It considered that biological activity is a better choice than chemical constituents for standards of commodity classes of Chinese materia medica. It is also considered that the key point to set standards of commodity classes is finding the influencing factors between "good quality" and "bad quality". The article also discussed the range of commodity classes of Chinese materia medica, and how to coordinate standards of pharmacopoeia and commodity classes. According to different demands, diversiform standards can be used in commodity classes of Chinese materia medica, but efficacy is considered the most important index of commodity standard. Decoction pieces can be included in standards of commodity classes of Chinese materia medica. The authors also formulated the standards of commodity classes of Notoginseng Radix as an example, and hope this study can make a positive and promotion effect on traditional Chinese medicine market related research.

  10. Identifying key features of effective active learning: the effects of writing and peer discussion.

    Science.gov (United States)

    Linton, Debra L; Pangle, Wiline M; Wyatt, Kevin H; Powell, Karli N; Sherwood, Rachel E

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. © 2014 D. L. Linton et al. CBE—Life Sciences Education © 2014 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  11. Designing Biodiversity Friendly Communities. Liveable Cities Forum: Key outcomes and findings

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-10-15

    The Liveable Cities Forum, held 21-22 August in Montreal Canada, created a platform to share best practices on biodiversity management and application at the local level. The Forum also highlighted the importance of partnership building and presented instruments (such as the Singapore Index on Cities' Biodiversity) that help to move the biodiversity agenda forward. A findings report on the Forum has recently been released, offering panel and workshop summaries, key outcomes, and a scope of future opportunities for local governments. Some of the key outcomes are as follows: Biodiversity protection is at its core a local issue, and in order to mitigate biodiversity loss in cities, there is an undeniable need for local governments to come together and work through solutions collectively; Urban centers influence local, regional and global biodiversity. Therefore, it is important that cities con-serve their local biodiversity through the sustainable use of resources beyond their borders; It is important for municipalities to engage and partner with local residents, academic institutions, and organizations, not only to have a finger on the pulse, but also to have local allies and secure long-term support; and Integrated policies help drive action. To effectively mainstream biodiversity at the local level, it is important to incorporate biodiversity considerations into multiple departments, plans and programs.

  12. EPA's Reanalysis of Key Issues Related to Dioxin Toxicity and Response to NAS Comments (Volume 1) (Interagency Science Discussion Draft)

    Science.gov (United States)

    EPA is releasing the draft report, EPA's Reanalysis of Key Issues Related to Dioxin Toxicity and Response to NAS Comments (Volume 1), that was distributed to Federal agencies and White House Offices for comment during the Science Discussion step of the Small Group Discussion as a Key Component in Online Assessment Training for Enhanced Student Learning in Web-Based Peer Assessment

    Science.gov (United States)

    Liu, Xiongyi; Li, Lan; Zhang, Zhihong

    2018-01-01

    The purpose of this study is to examine the effect of online assessment training, with synchronous group discussion as a key component, on subsequent web-based peer assessment results. Participants included 81 college students, mostly women, taking a business writing class. After initial submission of a draft counter-offer letter, they completed…

  13. Commenting on Findings in Qualitative and Quantitative Research Articles’ Discussion Sections in Applied Linguistics

    Directory of Open Access Journals (Sweden)

    Leila Dobakhti

    2013-09-01

    Full Text Available Research articles have received a wide interest in discourse studies particularly in genre analysis over the last few decades. A vast number of studies have focused on identifying the organizational patterns of research articles in various fields. However, to date, no study has been conducted on generic structure of qualitative and quantitative research articles. This study investigates the importance of commenting on findings in Discussion section of qualitative and quantitative research articles and the strategies that these two types of articles employ in making comments. The analysis shows that while commenting on findings is an important feature in both sets of articles, different strategies of commenting are favored in each type of articles. The differences can be attributed to the different epistemology of qualitative and quantitative research.

  14. Assessment of Health Effects of Exogenous Urea: Summary and Key Findings.

    Science.gov (United States)

    Dickerson, Aisha S; Lee, Janice S; Keshava, Channa; Hotchkiss, Andrew; Persad, Amanda S

    2018-05-01

    Urea has been utilized as a reductant in diesel fuels to lower emission of nitrogen oxides, igniting interest in probable human health hazards associated with exposure to exogenous urea. Here, we summarize and update key findings on potential health effects of exogenous urea, including carcinogenicity. No definitive target organs for oral exposure were identified; however, results in animal studies suggest that the liver and kidney could be potential target organs of urea toxicity. The available human-subject literature suggests that the impact on lung function is minimal. Based on the literature on exogenous urea, we concluded that there was inadequate information to assess the carcinogenic potential of urea, or perform a quantitative assessment to derive reference values. Given the limited information on exogenous urea, additional research to address gaps for exogenous urea should include long-term cancer bioassays, two-generation reproductive toxicity studies, and mode-of-action investigations.

  15. Yucca Mountain Socioeconomic Project: The 1991 Nevada State telephone survey: Key findings

    International Nuclear Information System (INIS)

    Flynn, J.H.; Mertz, C.K.; Slovic, P.

    1991-05-01

    The 1991 Nevada State Telephone Survey was implemented by Decision Research on behalf of the State of Nevada, Agency for Nuclear Projects/Nuclear Waste Project Office (NWPO) as part of an ongoing socioeconomic impact assessment study. The scope of this survey was considerably smaller than a previous survey conducted in 1989 and focused more upon public evaluations of the Yucca Mountain repository program and the trust Nevadans currently addressing the siting issues. In order to provide place in key public officials who are Longitudinal data on the repository program, the 1991 questionnaire consisted of questions that were used in the 1989 NWPO survey which was conducted by Mountain West Research. As a result, the findings from this survey are compared with analogous items from the 1989 survey, and with the results from a survey commissioned by the Las Vegas Review-Journal and reported in their issue of October 21, 1990. The Review-Journal survey was conducted by Bruce Merri11 of the Arizona State University Media Research Center. A more complete comparison of the 1989 and 1991 surveys sponsored by NWPO is possible since the researchers at Decision Research had access to both these databases. The only source of information for the Review-Journal findings was the articles published in the Fall, 1990. The findings of the 1991 survey show that Nevadans oppose the federal government attempts to locate a high-level radioactive waste repository at Yucca Mountain. They support a policy of opposition on the part of Nevada officials. They believe that Nevadans should have the final say in whether to accept the repository or not, and they reject the proposition that benefits from the repository program will outweigh the harms. These findings are very similar to survey results from 1989 and 1990 and once again demonstrate very widespread public opposition by Nevadans to the current federal repository program

  16. Monitoring HIV Prevention Programme Outcomes among Key Populations in Kenya: Findings from a National Survey.

    Directory of Open Access Journals (Sweden)

    Parinita Bhattacharjee

    Full Text Available In preparation for the implementation of the Kenya AIDS Strategic Framework 2014/15-2018/19, the Kenya National AIDS and STI Control Programme facilitated a national polling booth survey as part of a baseline assessment of HIV-related risk behaviours among FSWs, MSM, and PWID, and their utilization of existing preventive interventions, as well as structural factors that may influence KPs' vulnerability to HIV. The survey was conducted among "key populations" (female sex workers, men who have sex with men, and people who inject drugs to understand current HIV risk and prevention behaviours, utilization of existing programmes and services, and experiences of violence. In total, 3,448 female sex workers, 1,308 men who have sex with men, and 690 people who inject drugs were randomly selected to participate in polling booth survey sessions from seven priority sites. Survey responses were aggregated and descriptive statistics derived. In general, reported condom use among all key populations was quite high with paying clients, and lower with regular, non-paying partners. Many participants reported unavailability of condoms or clean injecting equipment within the past month. Exposure to, and utilization of, existing HIV prevention services varied significantly among the groups, and was reported least commonly by female sex workers. Encouragingly, approximately three-quarters of all key population members reported receiving an HIV test in the past three months. All key population groups reported experiencing high levels of physical and sexual violence from partners/clients, and/or arrest and violence by law enforcement officials. Although some of the findings are encouraging, there is room for improvement in HIV prevention programmes and services for key populations across Kenya.

  17. Acanthaleyrodes elevatus sp. n. (Hemiptera: Aleyrodidae) from India, with key to species and discussion of tuberculate setae.

    Science.gov (United States)

    Dubey, Anil Kumar; Singh, Sudhir; Martin, Jon H

    2014-11-03

    The genus Acanthaleyrodes Takahashi is reported for the first time from India. Acanthaleyrodes elevatus sp. n. is described from Bridelia retusa in Kerala, India, with a key to puparia of Acanthaleydes species. The new species differs in its exceptionally elevated eighth abdominal tergite, circular vasiform orifice and eight pairs of subdorsal setae. The generic characteristics of Acanthaleyrodes are redefined and distinguished from those of Tuberaleyrodes Takahashi. A. styraci Takahashi is re-described in detail with illustrations of puparia and immatures from Hong Kong. A lectotype puparium is designated for A. callicarpae Takahashi. The development of tuberculate setae is discussed, in whitefly puparia and earlier nymphal instars, and considered to be subject to environmental modification.

  18. Functional Imaging of Autonomic Regulation: Methods and Key Findings

    Directory of Open Access Journals (Sweden)

    Paul M Macey

    2016-01-01

    Full Text Available Central nervous system processing of autonomic function involves a network of regions throughout the brain which can be visualized and measured with neuroimaging techniques, notably functional magnetic resonance imaging (fMRI. The development of fMRI procedures has both confirmed and extended earlier findings from animal models, and human stroke and lesion studies. Assessments with fMRI can elucidate interactions between different central sites in regulating normal autonomic patterning, and demonstrate how disturbed systems can interact to produce aberrant regulation during autonomic challenges. Understanding autonomic dysfunction in various illnesses reveals mechanisms that potentially lead to interventions in the impairments. The objectives here are to: 1 describe the fMRI neuroimaging methodology for assessment of autonomic neural control, 2 outline the widespread, lateralized distribution of function in autonomic sites in the normal brain which includes structures from the neocortex through the medulla and cerebellum, 3 illustrate the importance of the time course of neural changes when coordinating responses, and how those patterns are impacted in conditions of sleep-disordered breathing, and 4 highlight opportunities for future research studies with emerging methodologies. Methodological considerations specific to autonomic testing include timing of challenges relative to the underlying fMRI signal, spatial resolution sufficient to identify autonomic brainstem nuclei, blood pressure and blood oxygenation influences on the fMRI signal, and the sustained timing, often measured in minutes of challenge periods and recovery. Key findings include the lateralized nature of autonomic organization, which is reminiscent of asymmetric motor, sensory and language pathways. Testing brain function during autonomic challenges demonstrate closely-integrated timing of responses in connected brain areas during autonomic challenges, and the involvement with

  19. Disclosing finding and development costs

    International Nuclear Information System (INIS)

    Janisch, M.L.

    1998-01-01

    The importance of finding and development costs in the petroleum industry and the issue of how they can be either manipulated or misunderstood was discussed. Finding and development costs are usually expressed in terms of $/BOE (barrel of oil equivalents) and reflect the total capital expenditures divided by the total reserves replaced and added. Various examples of the importance of finding and development costs in making investment decisions were used to illustrate the effects of potential bias by the resource company, and the need for care and understanding of what the numbers issued by the company actually mean. In general, low and consistent finding and development costs, combined with good netbacks, are the key to value added for shareholders. tabs

  1. Multiple Paths to Mathematics Practice in Al-Kashi's Key to Arithmetic

    Science.gov (United States)

    Taani, Osama

    2014-01-01

    In this paper, I discuss one of the most distinguishing features of Jamshid al-Kashi's pedagogy from his Key to Arithmetic, a well-known Arabic mathematics textbook from the fifteenth century. This feature is the multiple paths that he includes to find a desired result. In the first section light is shed on al-Kashi's life and his contributions to mathematics and astronomy. Section 2 starts with a brief discussion of the contents and pedagogy of the Key to Arithmetic. Al-Kashi's multiple approaches are discussed through four different examples of his versatility in presenting a topic from multiple perspectives. These examples are multiple definitions, multiple algorithms, multiple formulas, and multiple methods for solving word problems. Section 3 is devoted to some benefits that can be gained by implementing al-Kashi's multiple paths approach in modern curricula. For this discussion, examples from two teaching modules taken from the Key to Arithmetic and implemented in Pre-Calculus and mathematics courses for preservice teachers are discussed. Also, the conclusions are supported by some aspects of these modules. This paper is an attempt to help mathematics educators explore more benefits from reading from original sources.

  2. [Key ethic discussions in hospice/palliative care].

    Science.gov (United States)

    Jusić, Anica

    2008-12-01

    The goal of palliative care is to provide the best possible quality of life for patients and their families in the process of dying as well as before, during the course of illness. Emphasis is on the role of team approach in every aspect of patient care. The moral principles of sacredness of life and the right of personal autonomy may occasionally come in conflict. The basic principle of the respect of life prohibits killing, which has been accepted in one way or another by all societies - for the reasons of survival. Similar to this, modern morality supports the principle of respecting autonomy and self-management based on informed, conscious personality of an individual. Still, if the needs of another person appear to be more important or desirable than reaching certain individual goals, then the right of an individual regarding autonomy may be legitimately limited. Decisions on not applying or terminating certain procedures must be based on thorough discussion and consideration of the nature and expected result of treatment. If the patient is not competent, then the discussion should involve a team providing care for the patient and a representative of the patient. When the physician and the team can clearly see that unfavorable effects of treatment will outweigh therapeutic benefits, then, according to medical ethics of the respecting beneficiary, the team is not obliged to provide that form of treatment. Except for palliative care, there is no medical treatment that is always obligatory. A physician that does not accept the patient's request to be killed does not limit the patient's autonomy. Autonomy is self-management and capability of the patient to kill him/herself is not limited by the physician's refusal to do so. Even in those cases when patients for various reasons say that death will be a relief, it does not mean that the physician is obliged to terminate life. The superior obligation of physicians is to alleviate pain. If euthanasia would be legal

  3. Key Findings from the U.S.-India Partnership for Climate Resilience Workshop on Development and Application of Downscaling Climate Projections

    Science.gov (United States)

    Kunkel, K.; Dissen, J.; Easterling, D. R.; Kulkarni, A.; Akhtar, F. H.; Hayhoe, K.; Stoner, A. M. K.; Swaminathan, R.; Thrasher, B. L.

    2017-12-01

    s part of the Department of State U.S.-India Partnership for Climate Resilience (PCR), scientists from NOAA NCEI, CICS-NC, Texas Tech University (TTU), Stanford University (SU), and the Indian Institute of Tropical Meteorology (IITM) held a workshop at IITM in Pune, India during 7-9 March 2017 on the development, techniques and applications of downscaled climate projections. Workshop participants from TTU, SU, and IITM presented state-of-the-art climate downscaling techniques using the ARRM method, NASA NEX climate products, CORDEX-South Asia and analysis tools for resilience planning and sustainable development. PCR collaborators in attendance included Indian practitioners, researchers and other NGO including the WRI Partnership for Resilience and Preparedness (PREP), The Energy and Resources Institute (TERI), and NIH. The scientific techniques were provided to workshop participants in a software package written in R by TTU scientists and several sessions were devoted to hands-on experience with the software package. The workshop further examined case studies on the use of downscaled climate data for decision making in a range of sectors, including human health, agriculture, and water resources management as well as to inform the development of the India State Action Plans. This talk will discuss key outcomes including information needs for downscaling climate projections, importance of QA/QC of the data, key findings from select case studies, and the importance of collaborations and partnerships to apply downscaling projections to help inform the development of the India State Action Plans.

  4. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  5. Evaluation criteria for dialogue processes: key findings from RISCOM II

    International Nuclear Information System (INIS)

    Atherton, Elizabeth

    2003-01-01

    As part of Work Package 4 (undertaken by a consortium of partners from the United Kingdom) in the joint European project RISCOM II, work was undertaken on evaluation criteria for determining the success of dialogue processes; this note outlines its key findings as, in order to continue the development of dialogue processes, it is important to evaluate and learn from the experience of engaging with stakeholders. Criteria can be developed to evaluate how successful a process has been, these can range from very practical criteria relating to how well the process worked or be linked to more subjective criteria developed from the aims of the dialogue process itself. Some criteria are particularly relevant to dialogue processes that aim to encourage deliberation and the development of stakeholders' views through participation in the dialogue process: transparency, legitimacy, equality of access, 'being able to speak', a deliberative environment, openness of framing, developing insight into range of issues (new meanings are generated), inclusive and 'best' knowledge elicited, producing acceptable/tolerable and usable outcomes/decisions, improvement of trust and understanding between participants, developing a sense of shared responsibility and common good. Evaluation will incur a cost in terms of time and money, but will help practitioners to be able to develop processes that meet the needs of those who participate and improve the way that we try to engage people in the debate

  6. Connecting the Dots: A Discussion on Key Concepts in Contemporary Entrepreneurship Education

    Science.gov (United States)

    Hägg, Gustav; Kurczewska, Agnieszka

    2016-01-01

    Purpose: The purpose of this paper is to justify, elaborate and elucidate the concepts of action, experience and reflection, and how they are intertwined when discussing contemporary entrepreneurship education. These concepts have been given a meaning in entrepreneurship education, but have not been discussed in-depth, and by that have been…

  7. Managing and developing key supplier relationships : An introduction to the special issue, discussion and implications

    NARCIS (Netherlands)

    Ivens, B.; van de Vijver, M.A.R.; Vos, G.C.J.M.

    2013-01-01

    This article provides an introduction to this special issue on managing and developing key supplier relationships. Key suppliers are increasingly seen as strategic assets of buying companies which need careful nurturing to fully utilize their potential for value creation. The six articles of this

  8. Modelling efforts needed to advance herpes simplex virus (HSV) vaccine development: Key findings from the World Health Organization Consultation on HSV Vaccine Impact Modelling.

    Science.gov (United States)

    Gottlieb, Sami L; Giersing, Birgitte; Boily, Marie-Claude; Chesson, Harrell; Looker, Katharine J; Schiffer, Joshua; Spicknall, Ian; Hutubessy, Raymond; Broutet, Nathalie

    2017-06-21

    Development of a vaccine against herpes simplex virus (HSV) is an important goal for global sexual and reproductive health. In order to more precisely define the health and economic burden of HSV infection and the theoretical impact and cost-effectiveness of an HSV vaccine, in 2015 the World Health Organization convened an expert consultation meeting on HSV vaccine impact modelling. The experts reviewed existing model-based estimates and dynamic models of HSV infection to outline critical future modelling needs to inform development of a comprehensive business case and preferred product characteristics for an HSV vaccine. This article summarizes key findings and discussions from the meeting on modelling needs related to HSV burden, costs, and vaccine impact, essential data needs to carry out those models, and important model components and parameters. Copyright © 2017. Published by Elsevier Ltd.

  9. MycoKey Round Table Discussions of Future Directions in Research on Chemical Detection Methods, Genetics and Biodiversity of Mycotoxins

    Directory of Open Access Journals (Sweden)

    John F. Leslie

    2018-03-01

    Full Text Available MycoKey, an EU-funded Horizon 2020 project, includes a series of “Roundtable Discussions” to gather information on trending research areas in the field of mycotoxicology. This paper includes summaries of the Roundtable Discussions on Chemical Detection and Monitoring of mycotoxins and on the role of genetics and biodiversity in mycotoxin production. Discussions were managed by using the nominal group discussion technique, which generates numerous ideas and provides a ranking for those identified as the most important. Four questions were posed for each research area, as well as two questions that were common to both discussions. Test kits, usually antibody based, were one major focus of the discussions at the Chemical Detection and Monitoring roundtable because of their many favorable features, e.g., cost, speed and ease of use. The second area of focus for this roundtable was multi-mycotoxin detection protocols and the challenges still to be met to enable these protocols to become methods of choice for regulated mycotoxins. For the genetic and biodiversity group, both the depth and the breadth of trending research areas were notable. For some areas, e.g., microbiome studies, the suggested research questions were primarily of a descriptive nature. In other areas, multiple experimental approaches, e.g., transcriptomics, proteomics, RNAi and gene deletions, are needed to understand the regulation of toxin production and mechanisms underlying successful biological controls. Answers to the research questions will provide starting points for developing acceptable prevention and remediation processes. Forging a partnership between scientists and appropriately-placed communications experts was recognized by both groups as an essential step to communicating risks, while retaining overall confidence in the safety of the food supply and the integrity of the food production chain.

  10. MycoKey Round Table Discussions of Future Directions in Research on Chemical Detection Methods, Genetics and Biodiversity of Mycotoxins

    Science.gov (United States)

    Lattanzio, Veronica; Cary, Jeffrey; Chulze, Sofia N.; Gerardino, Annamaria; Liao, Yu-Cai; Maragos, Chris M.; Meca, Giuseppe; Moretti, Antonio; Munkvold, Gary; Mulè, Giuseppina; Njobeh, Patrick; Pecorelli, Ivan; Pietri, Amedeo; Proctor, Robert H.; Rahayu, Endang S.; Ramírez, Maria L.; Samson, Robert; Stroka, Jörg; Sumarah, Mark; Zhang, Qi; Zhang, Hao; Logrieco, Antonio F.

    2018-01-01

    MycoKey, an EU-funded Horizon 2020 project, includes a series of “Roundtable Discussions” to gather information on trending research areas in the field of mycotoxicology. This paper includes summaries of the Roundtable Discussions on Chemical Detection and Monitoring of mycotoxins and on the role of genetics and biodiversity in mycotoxin production. Discussions were managed by using the nominal group discussion technique, which generates numerous ideas and provides a ranking for those identified as the most important. Four questions were posed for each research area, as well as two questions that were common to both discussions. Test kits, usually antibody based, were one major focus of the discussions at the Chemical Detection and Monitoring roundtable because of their many favorable features, e.g., cost, speed and ease of use. The second area of focus for this roundtable was multi-mycotoxin detection protocols and the challenges still to be met to enable these protocols to become methods of choice for regulated mycotoxins. For the genetic and biodiversity group, both the depth and the breadth of trending research areas were notable. For some areas, e.g., microbiome studies, the suggested research questions were primarily of a descriptive nature. In other areas, multiple experimental approaches, e.g., transcriptomics, proteomics, RNAi and gene deletions, are needed to understand the regulation of toxin production and mechanisms underlying successful biological controls. Answers to the research questions will provide starting points for developing acceptable prevention and remediation processes. Forging a partnership between scientists and appropriately-placed communications experts was recognized by both groups as an essential step to communicating risks, while retaining overall confidence in the safety of the food supply and the integrity of the food production chain. PMID:29494529

  11. The village/commune safety policy and HIV prevention efforts among key affected populations in Cambodia: finding a balance

    Directory of Open Access Journals (Sweden)

    Thomson Nick

    2012-07-01

    Full Text Available Abstract The Village/Commune Safety Policy was launched by the Ministry of Interior of the Kingdom of Cambodia in 2010 and, due to a priority focus on “cleaning the streets”, has created difficulties for HIV prevention programs attempting to implement programs that work with key affected populations including female sex workers and people who inject drugs. The implementation of the policy has forced HIV program implementers, the UN and various government counterparts to explore and develop collaborative ways of delivering HIV prevention services within this difficult environment. The following case study explores some of these efforts and highlights the promising development of a Police Community Partnership Initiative that it is hoped will find a meaningful balance between the Village/Commune Safety Policy and HIV prevention efforts with key affected populations in Cambodia.

  12. Discussion of Extinction-Based Behavioral Sleep Interventions for Young Children and Reasons Why Parents May Find Them Difficult.

    Science.gov (United States)

    Etherton, Hayley; Blunden, Sarah; Hauck, Yvonne

    2016-11-15

    The majority of behavioral sleep interventions for young children involve extinction procedures where parents must ignore their child's cries for a period. Many parents have difficulties with this, contributing to attrition, non-compliance, and treatment avoidance. Yet why these methods are difficult to implement has rarely been addressed in the literature. This paper discusses seven potential reasons why parents may find extinction sleep interventions difficult: enduring crying, practical considerations, fear of repercussions, misinformation, incongruence with personal beliefs, different cultural practices, and parent wellness. These reasons are discussed in relation to the current literature. Practicing health professionals and sleep researchers could benefit from an awareness of these issues when suggesting extinction interventions and offering alternatives which may be more appropriate for family circumstances and facilitate parental informed choice. © 2016 American Academy of Sleep Medicine

  13. Climate Change and Its Causes, A Discussion About Some Key Issues

    OpenAIRE

    Scafetta, Nicola

    2010-01-01

    This article discusses the limits of the Anthropogenic Global Warming Theory advocated by the Intergovernmental Panel on Climate Change. A phenomenological theory of climate change based on the physical properties of the data themselves is proposed. At least 60% of the warming of the Earth observed since 1970 appears to be induced by natural cycles which are present in the solar system. A climatic stabilization or cooling until 2030-2040 is forecast by the phenomenological model.

  14. An Agent Based Approach To Finding Expertise In The Engineering Design Environment

    OpenAIRE

    Crowder, Richard; Hughes, Gareth; Hall, Wendy

    2003-01-01

    During the engineering design process people need to locate colleagues with knowledge to resolve a problem. As identified by discussions with practicing designers the use of computer based systems that assist users with finding such expertise will become increasingly important. In this paper we discuss the development of an agent based Expertise Finder suitable for use within an engineering design environment. A key feature of our approach is that the Expertise Finder returns both recommended...

  15. Male mental health problems, psychopathy, and personality traits: key findings from the first 14 years of the Pittsburgh Youth Study.

    Science.gov (United States)

    Loeber, R; Farrington, D P; Stouthamer-Loeber, M; Moffitt, T E; Caspi, A; Lynam, D

    2001-12-01

    This paper reviews key findings on juvenile mental health problems in boys, psychopathy, and personality traits, obtained in the first 14 years of studies using data from the Pittsburgh Youth Study. This is a study of 3 samples, each of about 500 boys initially randomly drawn from boys in the 1st, 4th, and 7th grades of public schools in Pittsburgh. The boys have been followed regularly, initially each half year, and later at yearly intervals. Currently, the oldest boys are about 25 years old, whereas the youngest boys are about 19. Findings are presented on the prevalence and interrelation of disruptive behaviors, ADHD, and depressed mood. Results concerning risk factors for these outcomes are reviewed. Psychological factors such as psychopathy, impulsivity, and personality are described. The paper closes with findings on service delivery of boys with mental health problems.

  16. Summary of group discussions

    International Nuclear Information System (INIS)

    2009-01-01

    A key aspect of the workshop was the interaction and exchange of ideas and information among the 40 participants. To facilitate this activity the workshop participants were divided into five discussions groups. These groups reviewed selected subjects and reported back to the main body with summaries of their considerations. Over the 3 days the 5 discussion groups were requested to focus on the following subjects: the characteristics and capabilities of 'good' organisations; how to ensure sufficient resources; how to ensure competence within the organisation; how to demonstrate organisational suitability; the regulatory oversight processes - including their strengths and weaknesses. A list of the related questions that were provided to the discussion groups can be found in Appendix 3. Also included in Appendix 3 are copies of the slides the groups prepared that summarised their considerations

  17. A natural language processing program effectively extracts key pathologic findings from radical prostatectomy reports.

    Science.gov (United States)

    Kim, Brian J; Merchant, Madhur; Zheng, Chengyi; Thomas, Anil A; Contreras, Richard; Jacobsen, Steven J; Chien, Gary W

    2014-12-01

    Natural language processing (NLP) software programs have been widely developed to transform complex free text into simplified organized data. Potential applications in the field of medicine include automated report summaries, physician alerts, patient repositories, electronic medical record (EMR) billing, and quality metric reports. Despite these prospects and the recent widespread adoption of EMR, NLP has been relatively underutilized. The objective of this study was to evaluate the performance of an internally developed NLP program in extracting select pathologic findings from radical prostatectomy specimen reports in the EMR. An NLP program was generated by a software engineer to extract key variables from prostatectomy reports in the EMR within our healthcare system, which included the TNM stage, Gleason grade, presence of a tertiary Gleason pattern, histologic subtype, size of dominant tumor nodule, seminal vesicle invasion (SVI), perineural invasion (PNI), angiolymphatic invasion (ALI), extracapsular extension (ECE), and surgical margin status (SMS). The program was validated by comparing NLP results to a gold standard compiled by two blinded manual reviewers for 100 random pathology reports. NLP demonstrated 100% accuracy for identifying the Gleason grade, presence of a tertiary Gleason pattern, SVI, ALI, and ECE. It also demonstrated near-perfect accuracy for extracting histologic subtype (99.0%), PNI (98.9%), TNM stage (98.0%), SMS (97.0%), and dominant tumor size (95.7%). The overall accuracy of NLP was 98.7%. NLP generated a result in report. This novel program demonstrated high accuracy and efficiency identifying key pathologic details from the prostatectomy report within an EMR system. NLP has the potential to assist urologists by summarizing and highlighting relevant information from verbose pathology reports. It may also facilitate future urologic research through the rapid and automated creation of large databases.

  18. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  19. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  20. A Discussion of Oxygen Recovery Definitions and Key Performance Parameters for Closed-Loop Atmosphere Revitalization Life Support Technology Development

    Science.gov (United States)

    Abney, Morgan B.; Perry, Jay L.

    2016-01-01

    Over the last 55 years, NASA has evolved life support for crewed space exploration vehicles from simple resupply during Project Mercury to the complex and highly integrated system of systems aboard the International Space Station. As NASA targets exploration destinations farther from low Earth orbit and mission durations of 500 to 1000 days, life support systems must evolve to meet new requirements. In addition to having more robust, reliable, and maintainable hardware, limiting resupply becomes critical for managing mission logistics and cost. Supplying a crew with the basics of food, water, and oxygen become more challenging as the destination ventures further from Earth. Aboard ISS the Atmosphere Revitalization Subsystem (ARS) supplies the crew's oxygen demand by electrolyzing water. This approach makes water a primary logistics commodity that must be managed carefully. Chemical reduction of metabolic carbon dioxide (CO2) provides a method of recycling oxygen thereby reducing the net ARS water demand and therefore minimizing logistics needs. Multiple methods have been proposed to achieve this recovery and have been reported in the literature. However, depending on the architecture and the technology approach, "oxygen recovery" can be defined in various ways. This discontinuity makes it difficult to compare technologies directly. In an effort to clarify community discussions of Oxygen Recovery, we propose specific definitions and describe the methodology used to arrive at those definitions. Additionally, we discuss key performance parameters for Oxygen Recovery technology development including challenges with comparisons to state-of-the-art.

  1. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  2. Transforming the energy efficiency market in California: Key findings, lessons learned and future directions from California's market effects studies

    International Nuclear Information System (INIS)

    Vine, Edward

    2013-01-01

    In the last three years, the California Institute for Energy and Environment (CIEE), along with the California Public Utilities Commission (CPUC), managed three market effects studies that were funded by the CPUC. This paper summarizes the key findings from these studies that focused on compact fluorescent lamps (CFLs), residential new construction (RNC), and high bay lighting (HBL), with a particular focus on changes to California's market effects evaluation protocol and lessons learned during the evaluation of market effects. This paper also summarizes the key results from a survey that was conducted by CIEE in February 2011 to determine what additional studies should be conducted in the evaluation of market effects. - Highlights: • We summarize three market effects studies and provide lessons learned. • Collect baseline market data as early as possible and throughout program lifecycle. • Estimate market effects throughout a program's lifecycle. • Require hypothesis testing as part of the evaluation. • Include elements of market effects evaluation in other program evaluations

  3. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  4. Communicating with individuals receiving home mechanical ventilation: the experiences of key communication partners.

    Science.gov (United States)

    Laakso, Katja; Markström, Agneta; Havstam, Christina; Idvall, Markus; Hartelius, Lena

    2014-01-01

    The aim of the study was to explore the communication experiences of key communications partners (CPs) of individuals receiving home mechanical ventilation (HMV), with particular emphasis on the possibilities, difficulties and limitations CPs experienced in communication, possible support given to facilitate communication and exploring what made a skilled communicator. A qualitative research design using interviews was used. The participants included 19 key CPs of individuals receiving HMV. The analysis resulted in five themes: Encountering communication limitations, Functional communication strategies, Being a communication facilitator, Role insecurity and Emotional reactions and coping. The findings revealed that CPs needed to develop partly new reference frames for communication. In particular, participants emphasised the need to understand and interpret subtle details in the communicative interaction. The findings are discussed in the light of previous research, in particular an earlier study exploring another perspective; the ventilator-supported individuals' experiences of communication. Issues relating to the educational needs of CPs of individuals receiving HMV are discussed. The results are intended to enhance understanding of the challenges that individuals receiving HMV and their CPs face with communication, which should be of relevance not only to speech therapists, but for all healthcare practitioners in the field of HMV.

  5. Key findings from the artist project on aerosol retention in a dry steam generator

    International Nuclear Information System (INIS)

    Dehbi, Abedeloahab; Suckow, Deltef; Lind, Tettaliisa; Guentat, Salih; Danner, Steffen; Mukin, Roman

    2016-01-01

    A steam generator tube rupture (SGTR) event with a stuck-open safety relief valve constitutes one of the most serious accident sequences in pressurized water reactors (PWRs) because it may create an open path for radioactive aerosol release into the environment. The release may be mitigated by the deposition of fission product particles on a steam generator's (SG's) dry tubes and structures or by scrubbing in the secondary coolant. However, the absence of empirical data, the complexity of the geometry, and the controlling processes have, until recently, made any quantification of retention difficult to justify. As a result, past risk assessment studies typically took little or no credit for aerosol retention in SGTR sequences. To provide these missing data, the Paul Scherrer Institute (PSI) initiated the Aerosol Trapping In Steam GeneraTor (ARTIST) Project, which aimed to thoroughly investigate various aspects of aerosol removal in the secondary side of a breached steam generator. Between 2003 and 2011, the PSI has led the ARTIST Project, which involved intense collaboration between nearly 20 international partners. This summary paper presents key findings of experimental and analytical work conducted at the PSI within the ARTIST program

  6. Key findings from the artist project on aerosol retention in a dry steam generator

    Energy Technology Data Exchange (ETDEWEB)

    Dehbi, Abedeloahab; Suckow, Deltef; Lind, Tettaliisa; Guentat, Salih; Danner, Steffen; Mukin, Roman [Nuclear Energy and Safety Research Department, Paul Scherrer Institute, Villigen (Switzerland)

    2016-08-15

    A steam generator tube rupture (SGTR) event with a stuck-open safety relief valve constitutes one of the most serious accident sequences in pressurized water reactors (PWRs) because it may create an open path for radioactive aerosol release into the environment. The release may be mitigated by the deposition of fission product particles on a steam generator's (SG's) dry tubes and structures or by scrubbing in the secondary coolant. However, the absence of empirical data, the complexity of the geometry, and the controlling processes have, until recently, made any quantification of retention difficult to justify. As a result, past risk assessment studies typically took little or no credit for aerosol retention in SGTR sequences. To provide these missing data, the Paul Scherrer Institute (PSI) initiated the Aerosol Trapping In Steam GeneraTor (ARTIST) Project, which aimed to thoroughly investigate various aspects of aerosol removal in the secondary side of a breached steam generator. Between 2003 and 2011, the PSI has led the ARTIST Project, which involved intense collaboration between nearly 20 international partners. This summary paper presents key findings of experimental and analytical work conducted at the PSI within the ARTIST program.

  7. Key Findings from the Artist Project on Aerosol Retention in a Dry Steam Generator

    Directory of Open Access Journals (Sweden)

    Abdelouahab Dehbi

    2016-08-01

    Full Text Available A steam generator tube rupture (SGTR event with a stuck-open safety relief valve constitutes one of the most serious accident sequences in pressurized water reactors (PWRs because it may create an open path for radioactive aerosol release into the environment. The release may be mitigated by the deposition of fission product particles on a steam generator's (SG's dry tubes and structures or by scrubbing in the secondary coolant. However, the absence of empirical data, the complexity of the geometry, and the controlling processes have, until recently, made any quantification of retention difficult to justify. As a result, past risk assessment studies typically took little or no credit for aerosol retention in SGTR sequences. To provide these missing data, the Paul Scherrer Institute (PSI initiated the Aerosol Trapping In Steam GeneraTor (ARTIST Project, which aimed to thoroughly investigate various aspects of aerosol removal in the secondary side of a breached steam generator. Between 2003 and 2011, the PSI has led the ARTIST Project, which involved intense collaboration between nearly 20 international partners. This summary paper presents key findings of experimental and analytical work conducted at the PSI within the ARTIST program.

  8. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  9. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  10. "I would like to discuss it further with an expert": a focus group study of Finnish adults' perspectives on genetic secondary findings.

    Science.gov (United States)

    Vornanen, M; Aktan-Collan, K; Hallowell, N; Konttinen, H; Kääriäinen, H; Haukkala, A

    2018-01-16

    Lowered costs of genomic sequencing facilitate analyzing large segments of genetic data. Ethical debate has focused on whether and what kind of incidental or secondary findings (SFs) to report, and how to obtain valid informed consent. However, people's support needs after receiving SFs have received less attention. We explored Finnish adults' perspectives on reporting genetic SFs. In this qualitative study which included four focus group discussions (N = 23) we used four vignette letters, each reporting a genetic SF predisposing to a different disease: familial hypercholesterolemia, long QT syndrome, Lynch syndrome, and Li-Fraumeni syndrome. Transcribed focus group discussions were analyzed using inductive thematic analysis. Major themes were immediate shock, dealing with worry and heightened risk, fear of being left alone to deal with SFs, disclosing to family, and identified support needs. Despite their willingness to receive SFs, participants were concerned about being left alone to deal with them. Empathetic expert support and timely access to preventive care were seen as essential to coping with shock and worry, and disclosing SFs to family. Discussion around SFs needs to concern not only which findings to report, but also how healthcare systems need to prepare for providing timely access to preventive care and support for individuals and families.

  11. The National Television Violence Study: Key Findings and Recommendations.

    Science.gov (United States)

    Young Children, 1996

    1996-01-01

    Summarizes findings of the Television Violence Study indicating that the context of much television violence is dangerous to viewers, perpetrators go unpunished in the majority of programs, negative consequences of violence are often ignored, guns feature prominently, and presentation of violence differs greatly across networks and across…

  12. IPCC Climate Change 2013: Mitigation of Climate Change - Key Findings and Lessons Learned

    Science.gov (United States)

    Sokona, Youba

    2014-05-01

    The Working Group III contribution to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change, Mitigation of Climate Change, examines the results of scientific research about mitigation, with special attention on how knowledge has evolved since the Fourth Assessment Report published in 2007. Throughout, the focus is on the implications of its findings for policy, without being prescriptive about the particular policies that governments and other important participants in the policy process should adopt. The report begins with a framing of important concepts and methods that help to contextualize the findings presented throughout the assessment. The valuation of risks and uncertainties, ethical concepts and the context of sustainable development and equity are among the guiding principles for the assessment of mitigation strategies. The report highlights past trends in stocks and flows of greenhouse gases and the factors that drive emissions at global, regional, and sectoral scales including economic growth, technology or population changes. It provides analyses of the technological, economic and institutional requirements of long-term mitigation scenarios and details on mitigation measures and policies that are applied in different economic sectors and human settlements. It then discusses interactions of mitigation policies and different policy instrument types at national, regional and global governance levels and between economic sectors, The Working Group III report comprises 16 chapters and in assembling this assessment authors were guided by the principles of the IPCC mandate: to be explicit about mitigation options, to be explicit about their costs and about their risks and opportunities vis-à-vis other development priorities, and to be explicit about the underlying criteria, concepts, and methods for evaluating alternative policies.

  13. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  14. Mars’ First Billion Years: Key Findings, Key Unsolved Paradoxes, and Future Exploration

    Science.gov (United States)

    Ehlmann, Bethany

    2017-10-01

    In the evolution of terrestrial planets, the first billion years are the period most shrouded in mystery: How vigorous is early atmospheric loss? How do planetary climates respond to a brightening sun? When and how are plate tectonic recycling processes initiated? How do voluminous volcanism and heavy impact bombardment influence the composition of the atmosphere? Under what conditions might life arise? Looking outward to terrestrial planets around other stars, the record from Venus, Earth and Mars in this solar system is crucial for developing models of physical can chemical processes. Of these three worlds, Mars provides the longest record of planetary evolution from the first billion years, comprising >50% of exposed geologic units, which are only lightly overprinted by later processes.Orbital observations of the last decade have revealed abundant evidence for surface waters in the form of lakes, valley networks, and evidence of chemically open-system near-surface weathering. Groundwaters at temperatures ranging from just above freezing to hydrothermal have also left a rich record of process in the mineralogical record. A rsuite of environments - similar in diversity to Earth’s - has been discovered on Mars with water pH, temperature, redox, and chemistries varying in space and time.Here, I will focus on the consequences of the aqueous alteration of the Martian crust on the composition of the atmosphere based on recent work studying aspects of the volatile budget (Usui et al., 2015; Edwards & Ehlmann, 2015; Hu et al., 2015; Jakosky et al., 2017, Wordsworth et al., 2017, and Ehlmann, in prep.). The solid crust and mantle of Mars act as volatile reservoirs and volatile sources through volcanism, mineral precipitation, and release of gases. We examine the extent to which the budget is understood or ill-understood for hydrogen and carbon, and associated phases H2O, CO2, and CH4. Additionally, I identify some key stratigraphies where a combination of focused in

  15. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  16. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  17. A Discussion of Future Time Perspective

    Science.gov (United States)

    McInerney, Dennis M.

    2004-01-01

    A growing area of research in educational psychology is future time perspective and its relationship to desired educational outcomes. This article discusses and critiques five reviews of current research on future time perspective. Key questions addressed are when do individuals begin to articulate a future, how far into the future does this…

  18. [Discussion on the key points of building modern theory of acupuncture treatment].

    Science.gov (United States)

    Yang, Guang

    2013-10-01

    Acupuncture treatment is different from treatment of materia medica. However, syndrome differentiation system of internal medicine is adopted all the time for the present acupuncture textbooks. It is held that the characteristics of acupuncture can not be fully reflexed, and advantages of acupuncture can not be brought into full play. Therefore, it's urgent to build up a modem theory on acupuncture treatment which is fit for the clinical practice of acupuncture and can give a better play for the treatment of acupuncture. A clear target is one of the characteristics of acupuncture treatment. And it is based on the understanding of the location of disease, therefore, disease differentiation is held as the basis of acupuncture treatment. The aim of meridian differentiation is to select distal effective points on the base of diseases differentiation, which is also taken as the characteristics of acupuncture treatment. Syndrome differentiation is a process of understanding the general pathological states of the human body, it is an important process to enhance the therapeutic effect of acupuncture. Thus, the key point for establishing the modern acupuncture theory is clarifying the values of disease differentiation, meridian differentiation and syndrome differentiation.

  19. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  20. Focus group discussions

    CERN Document Server

    Hennink, Monique M

    2014-01-01

    The Understanding Research series focuses on the process of writing up social research. The series is broken down into three categories: Understanding Statistics, Understanding Measurement, and Understanding Qualitative Research. The books provide researchers with guides to understanding, writing, and evaluating social research. Each volume demonstrates how research should be represented, including how to write up the methodology as well as the research findings. Each volume also reviews how to appropriately evaluate published research. Focus Group Discussions addresses the challenges associated with conducting and writing focus group research. It provides detailed guidance on the practical and theoretical considerations in conducting focus group discussions including: designing the discussion guide, recruiting participants, training a field team, moderating techniques and ethical considerations. Monique Hennink describes how a methodology section is read and evaluated by others, such as journal reviewers or ...

  1. Energy use and carbon dioxide emissions in the steel sector in key developing countries

    Energy Technology Data Exchange (ETDEWEB)

    Price, L.K.; Phylipsen, G.J.M.; Worrell, E.

    2001-04-01

    Iron and steel production consumes enormous quantities of energy, especially in developing countries where outdated, inefficient technologies are still used to produce iron and steel. Carbon dioxide emissions from steel production, which range between 5 and 15% of total country emissions in key developing countries (Brazil, China, India, Mexico, and South Africa), will continue to grow as these countries develop and as demand for steel products such as materials, automobiles, and appliances increases. In this report, we describe the key steel processes, discuss typical energy-intensity values for these processes, review historical trends in iron and steel production by process in five key developing countries, describe the steel industry in each of the five key developing countries, present international comparisons of energy use and carbon dioxide emissions among these countries, and provide our assessment of the technical potential to reduce these emissions based on best-practice benchmarking. Using a best practice benchmark, we find that significant savings, in the range of 33% to 49% of total primary energy used to produce steel, are technically possible in these countries. Similarly, we find that the technical potential for reducing intensities of carbon dioxide emissions ranges between 26% and 49% of total carbon dioxide emissions from steel production in these countries.

  2. Erotylidae (Insecta, Coleoptera) of Poland - problematic taxa, updated keys and new records.

    Science.gov (United States)

    Ruta, Rafał; Jałoszyński, Paweł; Sienkiewicz, Paweł; Konwerski, Szymon

    2011-01-01

    New data concerning the occurrence of pleasing fungus beetles (Coleoptera: Erotylidae) in Poland are given, with a focus on rare and difficult to identify Central European taxa. Cryptophilus cf. integer (Heer) (Cryptophilinae) is reported from the Polish territory for the first time based on adult and larval specimens collected in the Wielkopolska-Kujawy Lowland. Identification problems concerning species of Cryptophilus introduced to Europe are discussed. Triplax carpathica Reitter (Erotylinae) is recorded from the Białowieża Primeval Forest, which is the first known non-Carpathian finding of this species, located in the close proximity of the Polish-Belarussian UNESCO World Heritage Site "Białowieża Forest". Discussion of Triplax carpathica being conspecific with Siberian Triplax rufiventris Gebler is provided. New Polish localities of several other Erotylidae are reported, and an updated key to Central European species of Triplax is given. The Triplax key is supplemented with dorsal and ventral habitus images of all treated Triplax species. One of the rarest Central European erotyline species Combocerus glaber (Schaller) is recorded from xerothermic grasslands in North-West Poland.

  3. First- and third-party ground truth for key frame extraction from consumer video clips

    Science.gov (United States)

    Costello, Kathleen; Luo, Jiebo

    2007-02-01

    Extracting key frames (KF) from video is of great interest in many applications, such as video summary, video organization, video compression, and prints from video. KF extraction is not a new problem. However, current literature has been focused mainly on sports or news video. In the consumer video space, the biggest challenges for key frame selection from consumer videos are the unconstrained content and lack of any preimposed structure. In this study, we conduct ground truth collection of key frames from video clips taken by digital cameras (as opposed to camcorders) using both first- and third-party judges. The goals of this study are: (1) to create a reference database of video clips reasonably representative of the consumer video space; (2) to identify associated key frames by which automated algorithms can be compared and judged for effectiveness; and (3) to uncover the criteria used by both first- and thirdparty human judges so these criteria can influence algorithm design. The findings from these ground truths will be discussed.

  4. Finding and Improving the Key-Frames of Long Video Sequences for Face Recognition

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.

    2010-01-01

    Face recognition systems are very sensitive to the quality and resolution of their input face images. This makes such systems unreliable when working with long surveillance video sequences without employing some selection and enhancement algorithms. On the other hand, processing all the frames...... of such video sequences by any enhancement or even face recognition algorithm is demanding. Thus, there is a need for a mechanism to summarize the input video sequence to a set of key-frames and then applying an enhancement algorithm to this subset. This paper presents a system doing exactly this. The system...... uses face quality assessment to select the key-frames and a hybrid super-resolution to enhance the face image quality. The suggested system that employs a linear associator face recognizer to evaluate the enhanced results has been tested on real surveillance video sequences and the experimental results...

  5. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  6. Reconceptualising Moderation in Asynchronous Online Discussions Using Grounded Theory

    Science.gov (United States)

    Vlachopoulos, Panos; Cowan, John

    2010-01-01

    This article reports a grounded theory study of the moderation of asynchronous online discussions, to explore the processes by which tutors in higher education decide when and how to moderate. It aims to construct a theory of e-moderation based on some key factors which appear to influence e-moderation. It discusses previous research on the…

  7. WORKSHOP: Discussion, debate, deliberation

    NARCIS (Netherlands)

    Jeliazkova, Margarita I.

    2014-01-01

    Discussing, deliberating and debating are a core part of any democratic process. To organise these processes well, a great deal of knowledge and skill is required. It is not simple to find a good balance between a number of elements: appropriate language and terminology; paying attention to solid

  8. How Is Sexual Communication Different from Nonsexual Communication? A Moment-by-Moment Analysis of Discussions Between Romantic Partners.

    Science.gov (United States)

    Rehman, Uzma S; Lizdek, Ivana; Fallis, Erin E; Sutherland, Siobhan; Goodnight, Jackson A

    2017-11-01

    Our goal was to investigate whether systematic differences exist in how couples discuss sexual versus nonsexual conflicts in their relationships and to explore the nature of these differences. We compared sexual and nonsexual conflict discussions on two key dimensions of interpersonal behavior: warmth and dominance. Past theoretical work suggests that there are unique barriers to sexual communication that lead partners to perceive such communication as being more threatening to the relationship and to the self (Metts & Cupach, 1989). Empirical findings have supported this perspective by demonstrating that sexual communication tends to be avoided by couples (e.g., Byers, 2011). Extending this notion further, we reasoned that relationship partners should behave in ways to mitigate the increased perceived threat associated with sexual communication, leading to observable differences in how couples navigate sexual versus nonsexual relationship conflicts. We recruited a sample of 115 couples in established relationships and asked each couple to engage in two recorded interactions: one sexual and one nonsexual conflict discussion. Subsequently, each partner was coded continuously on the two dimensions of warmth and dominance. We found a number of differences in how couples discussed sexual versus nonsexual conflicts. Further, couples reported higher levels of anxiety in advance of sexual, as compared to nonsexual, conflict discussions. However, anxiety did not mediate the observed differences in communication. The theoretical and clinical implications of these findings are discussed.

  9. DISCUSSION METHODS: MODIFICATION AND TRANSFORMATION

    Directory of Open Access Journals (Sweden)

    A A Abbasova

    2015-12-01

    Full Text Available The article is devoted to the importance of selecting the optimal methods of stimulation and motivation for learning. In modern conditions it is very important that the teacher did not give the students ready knowledge, but pointed out the way for the acquisition of knowledge, taught them to gain knowledge. This demands from the philologist the choice of effective forms of working with texts of different types and styles of speech, listening, speaking. In this connection a special attention should be paid to the lessons of speech development. There is a special group of methods to stimulate the development of communicative competence. Among them, the method of discussion, which is increasingly being used during the Russian language lessons. The specificity of using this method in class for teaching Russian as a foreign language, its basic functions (teaching, developing, educating are considered. The key rules for conducting a discussion at the Russian language classes, the main and additional functions-roles of the teacher, the participants, the minute-taker are analyzed. The advantages of the discussion in Russian in comparison to the discussion in the students’ native language are summarized.

  10. The Discussion of Social Entrepreneurship: Review of the Literature

    Directory of Open Access Journals (Sweden)

    Daud@Fhiri Nur Suriaty

    2018-01-01

    Full Text Available The purpose of this article is to explore the various discussion of social entrepreneurship. Social entrepreneurship provides a unique opportunity and assumptions to question, challenge and rethink from different perspective of management and business research. This article offers a comparative analysis of commercial entrepreneurship and social entrepreneurship using a prevailing analytical model from commercial entrepreneurship. The analysis highlights key differences and similarities between commercial entrepreneurship and social entrepreneurship. This article also presents a framework on how to approach the social entrepreneurial process more effectively and systematically. Social entrepreneurship is a process of creating value by combining resources in new concepts. These process are intended primarily to get the opportunities to create social value by stimulating social change or achieve social needs. When viewed as a process, social entrepreneurship involves the offering of products and services but can also refer to the creation of new organizations. This article focuses and analyses the literature finding of social entrepreneurship.

  11. Terra Preta Sanitation: A Key Component for Sustainability in the Urban Environment

    Directory of Open Access Journals (Sweden)

    Thorsten Schuetze

    2014-11-01

    Full Text Available Terra Preta Sanitation (TPS plays a key role in sustainable sanitation (SuSan and in the sustainable management of resources such as water, energy, soil (agriculture, liquid and solid organic waste streams as well as in the development of sustainable urban environment and infrastructure systems. This paper discusses the advantages of, and requirements for, SuSan systems, focusing on TPS. Case studies showing the stepwise extension and re-development of conventional sanitation systems (CSS using TPS technologies and system approaches are presented and discussed. Decentralized TPS systems integrated in sustainable urban resource management were implemented in the German cities of Hamburg and Berlin. The compilation of best practice examples and findings using the newest TPS systems illustrates the immense potential of this approach for the transformation from conventional to SuSan systems. For this purpose, the potential savings of drinking water resources and the recycling potential of nutrient components are quantified. The results strongly suggest the need to encourage the development and application of innovative decentralized sanitation technologies, urban infrastructures, and resource management systems that have TP as a key component.

  12. Competitiveness of nuclear energy - Key findings from an OECD study

    International Nuclear Information System (INIS)

    Bertel, Evelyne

    2006-01-01

    Economic competitiveness always has been a cornerstone in decision making for electricity generation options but the liberalization of energy markets has enhanced its importance. For private investors in de-regulated markets the economic attractiveness of a project is often 'the' driving factor. For plant owners and operators reducing costs is a key objective. The relative competitiveness of nuclear energy as compared with alternatives has been investigated in a recent OECD study which noted some evolution in the ranking of different options as compared with results published seven years ago. In particular the volatility of fossil fuel prices, notably natural gas for electricity generation, along with technical progress enhancing the reliability and availability factor of nuclear power plants have had a significant influence on comparative economic performance of base-load options. Furthermore, as governments implement progressively policies to address global climate change threat, the moves to internalize the costs of carbon emissions is increasing the competitiveness of low-carbon options such as renewable energy sources and nuclear power versus coal and to a lesser extent gas. (authors)

  13. WGOE Discussion topic introduction: Counterfeit, Suspect, and Fraudulent parts

    International Nuclear Information System (INIS)

    Thorp, John

    2011-01-01

    This presentation (slides) provided an introduction to CSFI discussion. It presents: 1 - the many faces of counterfeiting (design and intellectual property, manufacturing and fabrication, product control, branding and document fraud), 2 - the key messages from the June 3, 2010 US-NRC Commission Briefing, 3 - the Regulator's role in ensuring nuclear plant safety, 4 - the CSFI survey status, 5 - the questions to be discussed during the meeting

  14. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  15. Key Lake Mining Corporation metallurgical complex

    International Nuclear Information System (INIS)

    Lendrum, F.C.

    1984-02-01

    The Key Lake uranium mine is located in Saskatchewan, 550 km northeast of Saskatoon. It began operations in 1983, and is licensed and regulated by both Saskatchewan government agencies and the Canadian Atomic Energy Control Board. This report examines the metallurgical processes used at the mill and discusses the spills that occurred in the first four months the mine was in operation. It finds that all spills of an acidic nature in the mill were small amounts in the CCD or solution pretreatment sections. Contingency procedures are in place and sumps are capable of handling spills. The only major change in design contemplated will be converting the secondary crushing from the use of an impact crusher to the use of a semi-autogeneous grinding mill. The monitoring program set out by the AECB and Saskatchewan Environment is thorough. It monitors effluents and water pathways, and includes aquatic biota and sediments. Air monitoring is also required by Saskatchewan Environment

  16. Il governo della performance dei processi di business : dai Key Performance Indicators ai Key Risk Indicators

    OpenAIRE

    Sergio Beretta; Saverio Bozzolan

    2013-01-01

    The recent paper issued by COSO ["Developing Key Risk Indicators to Strengthen Enterprise Risk Management" (Coso, 2010)] is the starting point of this article whose aim is to discuss the relevance of the business process dimension in the design and implementation of Key Risk Indicators. The Authors analyze the reasons of the systematic underestimation of the business process dimension in the COSO papers and debate the implications that the explicit consideration of the business process dimens...

  17. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Science.gov (United States)

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  18. The Structure of Discussions in an Online Communication Course: What Do Students Find Most Effective?

    Science.gov (United States)

    Jacobi, Laura

    2017-01-01

    The purpose of this study was to explore the perspectives of students regarding what was effective about the way in which the asynchronous discussions were structured in an upper level online organizational communication course. Surveys from 27 student participants were used, with questions focused upon the structure of discussions in the online…

  19. Discussion on AI Technology in Information Library Design

    OpenAIRE

    日比野, 省三; Shozo, HIBINO; 中京大学社会学部

    1987-01-01

    This paper deals with the discussion on the importance of AI (Artificial Intelligence) Technology in planning and designing a library information system in the near future. First of all, the history of Library and Information Science is reviewed and it is identified that the key technology in the future library will be AI as a mega-trend. After reviewing the concepts of AI technology, a model of a Knowledge-Base system is discussed as a case study, using micro-PROLOG.

  20. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    , and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character......Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case...... also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication. The objective is addressed in a literature review and a case study. The literature...

  1. Emotional discussions reduce memory recall.

    Science.gov (United States)

    Soleti, Emanuela; Wright, Daniel B; Curci, Antonietta

    2017-05-01

    People often discuss events they have seen and these discussions can influence later recollections. We investigated the effects of factual, emotional, and free retelling discussion on memory recollections of individuals who have witnessed an event. Participants were shown a video, made an initial individual recall, participated in one of the three retelling conditions (emotional versus factual versus free) or a control condition, and then recalled the event individually again. Participants in the factual and free retelling conditions reported more items not previously recalled than participants in the control condition did, while the emotional condition did not show the same advantage. Participants in all three retelling conditions failed to report more previously recalled items as compared with the control condition. Finally, a memory conformity effect was observed for all three retelling conditions. These findings suggest that eyewitnesses' discussions may influence the accuracy of subsequent memory reports, especially when these discussions are focused on emotional details and thoughts.

  2. Finding the key to success: A visitors' perspective at a National Arts Festival

    Directory of Open Access Journals (Sweden)

    M. Saayman

    2012-12-01

    Full Text Available Purpose and/or objectives: The purpose of this article was to segment festival visitors at the Klein Karoo National Arts Festival (KKNK based on their travel motives and their ratings of the Key Success Factors (KSFs in terms of their festival experience. Problem investigated: Previous research has indicated that the success and sustainability of an arts festival is dependent on the number of tickets sold for shows and productions during the festival. Therefore, success depends on attracting visitors who attend and buy tickets for different types of shows and productions. To achieve this festival organisers need to understand the aspects that visitors regard as satisfying their needs and which create a unique festival experience. Methodology: A survey was conducted using a questionnaire at the festival. A total of 450 questionnaires were administered and 443 completed questionnaires were included in the analysis. Factor analysis was used to identify visitors' motivation to travel to and attend the KKNK. Cluster analysis followed the factor analysis to segments visitors based their identified travel motives. ANOVAs, Chi-square tests, two-way frequency tables and Tukey's multiple comparisons were conducted to investigate and determine any significant differences between the clusters based on demographics, behavioural variables and KSFs. Analysis and interpretation of findings: The findings of this study revealed that the travel motives that are important to visitors to the arts festival are: Festival Attractiveness, Novelty and Escape and Socialisation. Furthermore, different markets have different travel motives, clustered as Escapists, Festival Junkies and Culture Seekers. These different clusters have different tastes and needs, for example the Culture Seekers are more interested in Rock shows and all three clusters enjoy Drama, Music Theatre and Cabaret and Comedy shows and productions. Different markets also focus on different KSFs that

  3. The dipteran family Celyphidae in the New World, with discussion of and key to world genera (Insecta, Diptera

    Directory of Open Access Journals (Sweden)

    Stephen D. Gaimari

    2017-10-01

    Full Text Available The family Celyphidae (Diptera, Lauxanioidea is verified as part of the New World fauna, with a second specimen discovered of a species described from French Guiana in 1844 by P.J.M. Macquart. As this species possesses characteristics that clearly suggest a separate lineage from the Old World celyphids, a new genus is proposed, Atopocelyphus gen. n., with the type species, Celyphus ruficollis Macquart, in the new combination Atopocelyphus ruficollis (Macquart, comb. n. A key to world genera of Celyphidae is presented, along with discussion of generic concepts. Chamaecelyphus Frey is synonymized under Spaniocelyphus Hendel, syn. n., resulting in the following 10 new combinations: Spaniocelyphus africanus (Walker, comb. n.; S. dichrous (Bezzi, comb. n.; S. gutta (Speiser, comb. n.; S. halticinus (Frey, comb. n.; S. kalongensis (Vanschuytbroek, comb. n.; S. ruwenzoriensis (Vanschuytbroek, comb. n.; S. straeleni (Vanschuytbroek, comb. n.; S. upembaensis (Vanschuytbroek, comb. n.; S. violaceus (Vanschuytbroek, comb. n.; S. vrydaghi (Vanschuytbroek, comb. n. The subgenera of Celyphus Dalman are elevated to genus rank, as Paracelyphus Bigot, stat. rev., and Hemiglobus Frey, stat. rev., resulting in the following 17 new and revised combinations: Hemiglobus cheni (Shi, comb. n.; H. eos (Frey, comb. n.; H. lacunosus Frey, comb. rev.; H. pellucidus Frey, comb. rev.; H. planitarsalis (Shi, comb. n.; H. porosus (Tenorio, comb. n.; H. pulchmaculatus (Liu & Yang, comb. n.; H. quadrimaculatus (Tenorio, comb. n.; H. resplendens Frey, comb. rev.; H. rugosus (Tenorio, comb. n.; H. testaceus (Malloch, comb. n.; H. trichoporis (Shi, comb. n.; H. unicolor Frey, comb. rev.; H. violaceus Chen, comb. rev.; Paracelyphus hyacinthus Bigot, comb. rev.; P. medogis (Shi, comb. n.; P. vittalis (Shi, comb. n.

  4. Erotylidae (Insecta, Coleoptera of Poland – problematic taxa, updated keys and new records

    Directory of Open Access Journals (Sweden)

    Rafal Ruta

    2011-10-01

    Full Text Available New data concerning the occurrence of pleasing fungus beetles (Coleoptera: Erotylidae in Poland are given, with a focus on rare and difficult to identify Central European taxa. Cryptophilus cf. integer (Heer (Cryptophilinae is reported from the Polish territory for the first time based on adult and larval specimens collected in the Wielkopolska-Kujawy Lowland. Identification problems concerning species of Cryptophilus introduced to Europe are discussed. Triplax carpathica Reitter (Erotylinae is recorded from the Białowieża Primeval Forest, which is the first known non-Carpathian finding of this species, located in the close proximity of the Polish-Belarussian UNESCO World Heritage Site “Białowieża Forest”. Discussion of T. carpathica being conspecific with Siberian T. rufiventris Gebler is provided. New Polish localities of several other Erotylidae are reported, and an updated key to Central European species of Triplax is given. The Triplax key is supplemented with dorsal and ventral habitus images of all treated Triplax species. One of the rarest Central European erotyline species Combocerus glaber (Schaller is recorded from xerothermic grasslands in North-West Poland.

  5. Erotylidae (Insecta, Coleoptera) of Poland – problematic taxa, updated keys and new records

    Science.gov (United States)

    Ruta, Rafał; Jałoszyński, Paweł; Sienkiewicz, Paweł; Konwerski, Szymon

    2011-01-01

    Abstract New data concerning the occurrence of pleasing fungus beetles (Coleoptera: Erotylidae) in Poland are given, with a focus on rare and difficult to identify Central European taxa. Cryptophilus cf. integer (Heer) (Cryptophilinae) is reported from the Polish territory for the first time based on adult and larval specimens collected in the Wielkopolska-Kujawy Lowland. Identification problems concerning species of Cryptophilus introduced to Europe are discussed. Triplax carpathica Reitter (Erotylinae) is recorded from the Białowieża Primeval Forest, which is the first known non-Carpathian finding of this species, located in the close proximity of the Polish-Belarussian UNESCO World Heritage Site “Białowieża Forest”. Discussion of Triplax carpathica being conspecific with Siberian Triplax rufiventris Gebler is provided. New Polish localities of several other Erotylidae are reported, and an updated key to Central European species of Triplax is given. The Triplax key is supplemented with dorsal and ventral habitus images of all treated Triplax species. One of the rarest Central European erotyline species Combocerus glaber (Schaller) is recorded from xerothermic grasslands in North-West Poland. PMID:22140339

  6. Key Features of the Manufacturing Vision Development Process

    DEFF Research Database (Denmark)

    Dukovska-Popovska, Iskra; Riis, Jens Ove; Boer, Harry

    2005-01-01

    of action research. The methodology recommends wide participation of people from different hierarchical and functional positions, who engage in a relatively short, playful and creative process and come up with a vision (concept) for the future manufacturing system in the company. Based on three case studies......This paper discusses the key features of the process of Manufacturing Vision Development, a process that enables companies to develop their future manufacturing concept. The basis for the process is a generic five-phase methodology (Riis and Johansen 2003) developed as a result of ten years...... of companies going through the initial phases of the methodology, this research identified the key features of the Manufacturing Vision Development process. The paper elaborates the key features by defining them, discussing how and when they can appear, and how they influence the process....

  7. Key mediators modulating TAG synthesis and accumulation in ...

    African Journals Online (AJOL)

    the key mediators on TAG synthesis and accumulation, among which diacylglycerol acyltransferases (DGATs) is discussed for its clear role in TAG amount and composition. Furthermore TAG-accosiated proteins called oleosins are also discussed in depth due to their determination on the amount and size of oil bodies.

  8. Key Elements of Strategy in the Telecommunication Industry – Overview of Discussion

    Directory of Open Access Journals (Sweden)

    Ladislav Možný

    2017-10-01

    Full Text Available The purpose of this article is to examine current empirical and theoretical approaches to the strategies of companies operating in the telecommunication industry and to identify important strategy elements for the telecommunication industry. These elements are systematically categorized into the overall strategic framework. Strategic elements not covered in current literature are identified as topics for future research. As the first conclusion, the article identifies the most frequent strategic element discussed in connection with the strategy in the telecommunication industry which is Market offering/Value proposition including its more detailed structure. Highly debated elements of Market offering are Price and Product and their features. On the other hand, only limited attention is paid to Resources and no attention at all is paid to Value chain in the selected articles. Thus, there is space for future research regarding strategy in telecommunications mainly in the areas of Value chain and Resources (both tangible and intangible. Even Market offering is highly debated, the strategic element Availability (sales and service channels from the Market offering/Value proposition is covered only marginally and thus it should be a subject for future research.

  9. Key findings from HSC's 2010 site visits: health care markets weather economic downturn, brace for health reform.

    Science.gov (United States)

    Felland, Laurie E; Grossman, Joy M; Tu, Ha T

    2011-05-01

    Lingering fallout--loss of jobs and employer coverage--from the great recession slowed demand for health care services but did little to slow aggressive competition by dominant hospital systems for well-insured patients, according to key findings from the Center for Studying Health System Change's (HSC) 2010 site visits to 12 nationally representative metropolitan communities. Hospitals with significant market clout continued to command high payment rate increases from private insurers, and tighter hospital-physician alignment heightened concerns about growing provider market power. High and rising premiums led to increasing employer adoption of consumer-driven health plans and continued increases in patient cost sharing, but the broader movement to educate and engage consumers in care decisions did not keep pace. State and local budget deficits led to some funding cuts for safety net providers, but an influx of federal stimulus funds increased support to community health centers and shored up Medicaid programs, allowing many people who lost private insurance because of job losses to remain covered. Hospitals, physicians and insurers generally viewed health reform coverage expansions favorably, but all worried about protecting revenues as reform requirements phase in.

  10. Redescription of four species of Mehdiella from Testudinidae, with a key to the species and discussion on the relationships among the species of this genus

    Directory of Open Access Journals (Sweden)

    Bouamer S.

    2003-12-01

    Full Text Available Four species of the genus Mehdiella Seurat, 1918 are redescribed: M. cristata Petter, 1966 and M. stylosa dollfusi Petter, 1966, parasite of Pyxix arachnoides Bell, 1827 from Madagascar, M. s. stylosa (Thapar, 1 925 and M. uncinata (Drasche, 1884, parasite of Testudo graeca Linneaus, 1758, Testudo hermanni Gmelin, 1789 and Testudo horsfieldii (Gray, 1844 from Palaearctic region. Light microscopy and scanning electron microscopy (SEM studies revealed new informations on the morphology of these species. On the basis of this morphological study, the sub-species Mehdiella stylosa dollfusi and M. s. stylosa are raised to level of species. The position of Mehdiella cristata among the species of the genus Mehdiella and the relationships among the species of the genus Mehdiella are discussed. A key to the eight valid species Mehdiella is given.

  11. Redescription of four species of Mehdiella from Testudinidae, with a key to the species and discussion on the relationships among the species of this genus.

    Science.gov (United States)

    Bouamer, S; Morand, S; Kara, M

    2003-12-01

    Four species of the genus Mehdiella Seurat, 1918 are redescribed: M. cristata Petter, 1966 and M. stylosa dollfusi Petter, 1966, parasite of Pyxix arachnoides Bell, 1827 from Madagascar, M. s. stylosa (Thapar, 1925) and M. uncinata (Drasche, 1884), parasite of Testudo graeca Linneaus, 1758, Testudo hermanni Gmelin, 1789 and Testudo horsfieldii (Gray, 1844) from Palaearctic region. Light microscopy and scanning electron microscopy (SEM) studies revealed new informations on the morphology of these species. On the basis of this morphological study, the sub-species Mehdiella stylosa dollfusi and M. s. stylosa are raised to level of species. The position of Mehdiella cristata among the species of the genus Mehdiella and the relationships among the species of the genus Mehdiella are discussed. A key to the eight valid species Mehdiella is given.

  12. International Policy Framework for Protecting Critical Information Infrastructure: A Discussion Paper Outlining Key Policy Issues

    NARCIS (Netherlands)

    Brown, B.; Goetz, E.; Verhoest, P.; Helmus, S.; Luiijf, H.A.M.; Bruce, R.; Dynes, S.; Brechbuhl, H.

    2005-01-01

    Cyber security is a uniquely challenging policy issue with a wide range of public and private stakeholders within countries and beyond national boundaries. This executive summary and the full discussion paper delineate the need on a high priority basis to address cyber security issues and develop an

  13. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  14. 02 - Düvel & Terblanché - Finding the key to successful …

    African Journals Online (AJOL)

    annaline

    Terblanché & Düvel. 22 consequently it is usually of a recipe nature and does not promote ... Figure 2: Respondents' perception of the current and recommended extension ... As the first of a series of research projects aimed at finding guidelines for improved and more successful farmer settlement, the purpose of this study.

  15. Academic Primer Series: Key Papers About Competency-Based Medical Education

    Directory of Open Access Journals (Sweden)

    Robert Cooney

    2017-05-01

    Full Text Available Introduction: Competency-based medical education (CBME presents a paradigm shift in medical training. This outcome-based education movement has triggered substantive changes across the globe. Since this transition is only beginning, many faculty members may not have experience with CBME nor a solid foundation in the grounding literature. We identify and summarize key papers to help faculty members learn more about CBME. Methods: Based on the online discussions of the 2016–2017 ALiEM Faculty Incubator program, a series of papers on the topic of CBME was developed. Augmenting this list with suggestions by a guest expert and by an open call on Twitter for other important papers, we were able to generate a list of 21 papers in total. Subsequently, we used a modified Delphi study methodology to narrow the list to key papers that describe the importance and significance for educators interested in learning about CBME. To determine the most impactful papers, the mixed junior and senior faculty authorship group used three-round voting methodology based upon the Delphi method. Results: Summaries of the five most highly rated papers on the topic of CBME, as determined by this modified Delphi approach, are presented in this paper. Major themes include a definition of core CBME themes, CBME principles to consider in the design of curricula, a history of the development of the CBME movement, and a rationale for changes to accreditation with CBME. The application of the study findings to junior faculty and faculty developers is discussed. Conclusion: We present five key papers on CBME that junior faculty members and faculty experts identified as essential to faculty development. These papers are a mix of foundational and explanatory papers that may provide a basis from which junior faculty members may build upon as they help to implement CBME programs.

  16. Academic Primer Series: Key Papers About Competency-Based Medical Education.

    Science.gov (United States)

    Cooney, Robert; Chan, Teresa M; Gottlieb, Michael; Abraham, Michael; Alden, Sylvia; Mongelluzzo, Jillian; Pasirstein, Michael; Sherbino, Jonathan

    2017-06-01

    Competency-based medical education (CBME) presents a paradigm shift in medical training. This outcome-based education movement has triggered substantive changes across the globe. Since this transition is only beginning, many faculty members may not have experience with CBME nor a solid foundation in the grounding literature. We identify and summarize key papers to help faculty members learn more about CBME. Based on the online discussions of the 2016-2017 ALiEM Faculty Incubator program, a series of papers on the topic of CBME was developed. Augmenting this list with suggestions by a guest expert and by an open call on Twitter for other important papers, we were able to generate a list of 21 papers in total. Subsequently, we used a modified Delphi study methodology to narrow the list to key papers that describe the importance and significance for educators interested in learning about CBME. To determine the most impactful papers, the mixed junior and senior faculty authorship group used three-round voting methodology based upon the Delphi method. Summaries of the five most highly rated papers on the topic of CBME, as determined by this modified Delphi approach, are presented in this paper. Major themes include a definition of core CBME themes, CBME principles to consider in the design of curricula, a history of the development of the CBME movement, and a rationale for changes to accreditation with CBME. The application of the study findings to junior faculty and faculty developers is discussed. We present five key papers on CBME that junior faculty members and faculty experts identified as essential to faculty development. These papers are a mix of foundational and explanatory papers that may provide a basis from which junior faculty members may build upon as they help to implement CBME programs.

  17. Career planning and mentorship: a few key considerations for trainees.

    Science.gov (United States)

    Badawy, Sherif M

    2017-01-01

    Publishing and securing funding are considered our "academic currency", and therefore, both should be emphasized during training, both residency and fellowship. Trainees should make an effort to find funding opportunities at or outside of their institutions and try to identify their short- and long-term goals. Establishing a track record of publications can help trainees get hired, funded, and promoted as junior faculty, and effective networking and mentorship are critical determinants of academic success. Given the positive effects of mentorship, trainees should understand what comprises a good mentor-mentee relationship and how to optimize the mentoring process. The objective of this article is to discuss few key considerations for trainees in residency or fellowship regarding mentorship and career planning in academic medicine.

  18. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  19. Summary of the presentations and discussions

    International Nuclear Information System (INIS)

    Massaut, Vincent

    2006-01-01

    The first two presentations were given by specialists in human science, and focused more on the ethical aspects of the funding for decommissioning. Some new aspects or approaches were presented, which allowed to highlight the egalitarian and utilitarian approaches of inter-generational equity. The different ethical principles led to conclude on the need of a democratic debate on the subject, and the need of ethical guidance at international level. Some other key points, like the preservation of competences, funding and resources, were also considered in the light of the inter-generational community. The session was concluded by a presentation on the application of the ethical principles for the funding. Session 2: Actual experience in funding. The various mechanisms for funding have been analyses on their principle, current practice and merits. Three main aspects were analysed: How funds are raised? How are the funds managed? How to disburse when needed? The actual experience in different countries showed different mechanisms and return of experience. Session 3: Uncertainties. In most large industrial projects (construction, civil works, aerospace...), the return of experience shows that overrun (in time and cost) is a rather general tendency. But it depends on the type of project, on the degree of innovation, etc. Some means to avoid these overrun were presented. In the case of D and D, the main uncertainties affecting funding can be found in: cost estimate, inflow of resources, management of resources, time factor: when will the costs occur? Moreover, these uncertainties sources can also be inter-linked. One of the conclusions from this analysis is that the existing uncertainties in funding are good reasons not to postpone decommissioning operations to a too distant future. Presentations on return of experience were presented by several countries. Plenary discussions: The plenary discussions allowed to tackle the different aspects presented during the day. Some

  20. Public-key encryption with chaos

    Science.gov (United States)

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  1. Key Performance Parameter Driven Technology Goals for Electric Machines and Power Systems

    Science.gov (United States)

    Bowman, Cheryl; Jansen, Ralph; Brown, Gerald; Duffy, Kirsten; Trudell, Jeffrey

    2015-01-01

    Transitioning aviation to low carbon propulsion is one of the crucial strategic research thrust and is a driver in the search for alternative propulsion system for advanced aircraft configurations. This work requires multidisciplinary skills coming from multiple entities. The feasibility of scaling up various electric drive system technologies to meet the requirements of a large commercial transport is discussed in terms of key parameters. Functional requirements are identified that impact the power system design. A breakeven analysis is presented to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  2. Identifying Key Drivers of Return Reversal with Dynamical Bayesian Factor Graph.

    Directory of Open Access Journals (Sweden)

    Shuai Zhao

    Full Text Available In the stock market, return reversal occurs when investors sell overbought stocks and buy oversold stocks, reversing the stocks' price trends. In this paper, we develop a new method to identify key drivers of return reversal by incorporating a comprehensive set of factors derived from different economic theories into one unified dynamical Bayesian factor graph. We then use the model to depict factor relationships and their dynamics, from which we make some interesting discoveries about the mechanism behind return reversals. Through extensive experiments on the US stock market, we conclude that among the various factors, the liquidity factors consistently emerge as key drivers of return reversal, which is in support of the theory of liquidity effect. Specifically, we find that stocks with high turnover rates or high Amihud illiquidity measures have a greater probability of experiencing return reversals. Apart from the consistent drivers, we find other drivers of return reversal that generally change from year to year, and they serve as important characteristics for evaluating the trends of stock returns. Besides, we also identify some seldom discussed yet enlightening inter-factor relationships, one of which shows that stocks in Finance and Insurance industry are more likely to have high Amihud illiquidity measures in comparison with those in other industries. These conclusions are robust for return reversals under different thresholds.

  3. Round table discussion during session 1

    International Nuclear Information System (INIS)

    Aebersold, M.

    2004-01-01

    The round table discussions of the first session of the Belgium Workshop addressed the following questions: - Accepting or refusing a person, an institution or a grouping as a legitimate Stakeholder who makes the decision and how? - How are the local partnerships built and organised? - How to obtain community support for the partnership's legitimate decisions/findings? - Experience teaches that no decision is reached solely by formal and legal processes. What role do informal processes play? - How can the informal procedures be accepted? Do they need to be made explicit? Discussion took place after the plenary presentations, at tables grouping Belgian stakeholders and FSC delegates. After the discussion, each table's findings were reported to the plenary. Most of the discussion concerned the local partnerships. Important findings were that the statutes for the partnerships were developed by the partnerships themselves and there were no legally binding rules handed down by the federal level. The partnerships are part of an informal process. A legally binding participation (i.e. within the EIA) will be initiated at a later stage. As the partnerships function outside of the formal legal procedure, they can function in a more flexible way. It was noted that the partnerships make recommendations, but it is not clear what the government will do with these recommendations. It was also argued that the process may cause conflicts between neighboring communities. As in other contexts visited by the FSC, the importance of the right of veto of the community was stressed, although this may cause a conflict between technical suitability and social acceptance. Access of the community to the local partnership is necessary. Finally it was accepted that time is needed to explain the recommendations to the broader community before any decisions are taken. (author)

  4. The Influence of Setting on Findings Produced in Qualitative Health Research: A Comparison between Face-to-Face and Online Discussion Groups about HIV/AIDS

    Directory of Open Access Journals (Sweden)

    Guendalina Graffigna

    2006-09-01

    Full Text Available The authors focus their analysis in this article on online focus groups (FGs, in an attempt to describe how the setting shapes the conversational features of the discussion and influences data construction. Starting from a review of current dominant viewpoints, they compare face-to-face discussion groups with different formats of online FGs about AIDS, from a discourse analysis perspective. They conducted 2 face-to-face FGs, 2 chats, 2 forums, and 2 forums+plus+chat involving 64 participants aged 18 to 25 and living in Italy. Their findings seem not only to confirm the hypothesis of a general difference between a face-to-face discussion setting and an Internet-mediated one but also reveal differences among the forms of online FG, in terms of both the thematic articulation of discourse and the conversational and relational characteristics of group exchange, suggesting that exchanges on HIV/AIDS are characterized by the setting. This characterization seems to be important for situating the choice of tool, according to research objectives, and for better defining the technical aspects of the research project.

  5. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  6. Semiquantum-key distribution using less than four quantum states

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen; Li Lvzhou; Wu Lihua; Li Lvjun

    2009-01-01

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  7. Finding solid ground: law enforcement, key populations and their health and rights in South Africa.

    Science.gov (United States)

    Scheibe, Andrew; Howell, Simon; Müller, Alexandra; Katumba, Munyaradzi; Langen, Bram; Artz, Lillian; Marks, Monique

    2016-01-01

    Sex workers, people who use drugs, men who have sex with men, women who have sex with women and transgender people in South Africa frequently experience high levels of stigma, abuse and discrimination. Evidence suggests that such abuse is sometimes committed by police officers, meaning that those charged with protection are perpetrators. This reinforces cycles of violence, increases the risk of HIV infection, undermines HIV prevention and treatment interventions and violates the constitutional prescriptions that the police are mandated to protect. This paper explores how relationship building can create positive outcomes while taking into account the challenges associated with reforming police strategies in relation to key populations, and vice versa. We argue that relationships between law enforcement agencies and key populations need to be re-examined and reconstituted to enable appropriate responses and services. The antagonistic positioning, "othering" and blame assignment frequently seen in interactions between law enforcement officials and key populations can negatively influence both, albeit for different reasons. In addressing these concerns, we argue that mediation based on consensual dialogue is required, and can be harnessed through a process that highlights points of familiarity that are often shared, but not understood, by both parties. Rather than laying blame, we argue that substantive changes need to be owned and executed by all role-players, informed by a common language that is cognisant of differing perspectives. Relational approaches can be used to identify programmes that align goals that are part of law enforcement, human rights and public health despite not always being seen as such. Law enforcement champions and representatives of key populations need to be identified and supported to promote interventions that are mutually reinforcing, and address perceived differences by highlighting commonality. Creating opportunities to share experiences

  8. Long-distance quantum key distribution with imperfect devices

    International Nuclear Information System (INIS)

    Lo Piparo, Nicoló; Razavi, Mohsen

    2014-01-01

    Quantum key distribution over probabilistic quantum repeaters is addressed. We compare, under practical assumptions, two such schemes in terms of their secure key generation rate per memory, R QKD . The two schemes under investigation are the one proposed by Duan et al. in [Nat. 414, 413 (2001)] and that of Sangouard et al. proposed in [Phys. Rev. A 76, 050301 (2007)]. We consider various sources of imperfections in the latter protocol, such as a nonzero double-photon probability for the source, dark count per pulse, channel loss and inefficiencies in photodetectors and memories, to find the rate for different nesting levels. We determine the maximum value of the double-photon probability beyond which it is not possible to share a secret key anymore. We find the crossover distance for up to three nesting levels. We finally compare the two protocols

  9. Feasibility of satellite quantum key distribution

    OpenAIRE

    Bonato, Cristian; Tomaello, Andrea; Da Deppo, Vania; Naletto, Giampiero; Villoresi, Paolo

    2009-01-01

    In this paper we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected e...

  10. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  11. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  12. Diffie-Hellman Key Exchange through Steganographied Images

    Directory of Open Access Journals (Sweden)

    Amine Khaldi

    2018-05-01

    Full Text Available Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.

  13. Experimental aspects of deterministic secure quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Walenta, Nino; Korn, Dietmar; Puhlmann, Dirk; Felbinger, Timo; Hoffmann, Holger; Ostermeyer, Martin [Universitaet Potsdam (Germany). Institut fuer Physik; Bostroem, Kim [Universitaet Muenster (Germany)

    2008-07-01

    Most common protocols for quantum key distribution (QKD) use non-deterministic algorithms to establish a shared key. But deterministic implementations can allow for higher net key transfer rates and eavesdropping detection rates. The Ping-Pong coding scheme by Bostroem and Felbinger[1] employs deterministic information encoding in entangled states with its characteristic quantum channel from Bob to Alice and back to Bob. Based on a table-top implementation of this protocol with polarization-entangled photons fundamental advantages as well as practical issues like transmission losses, photon storage and requirements for progress towards longer transmission distances are discussed and compared to non-deterministic protocols. Modifications of common protocols towards a deterministic quantum key distribution are addressed.

  14. Causes, consequences, and policy responses to the migration of health workers: key findings from India.

    Science.gov (United States)

    Walton-Roberts, Margaret; Runnels, Vivien; Rajan, S Irudaya; Sood, Atul; Nair, Sreelekha; Thomas, Philomina; Packer, Corinne; MacKenzie, Adrian; Tomblin Murphy, Gail; Labonté, Ronald; Bourgeault, Ivy Lynn

    2017-04-05

    This study sought to better understand the drivers of skilled health professional migration, its consequences, and the various strategies countries have employed to mitigate its negative impacts. The study was conducted in four countries-Jamaica, India, the Philippines, and South Africa-that have historically been "sources" of health workers migrating to other countries. The aim of this paper is to present the findings from the Indian portion of the study. Data were collected using surveys of Indian generalist and specialist physicians, nurses, midwives, dentists, pharmacists, dieticians, and other allied health therapists. We also conducted structured interviews with key stakeholders representing government ministries, professional associations, regional health authorities, health care facilities, and educational institutions. Quantitative data were analyzed using descriptive statistics and regression models. Qualitative data were analyzed thematically. Shortages of health workers are evident in certain parts of India and in certain specialty areas, but the degree and nature of such shortages are difficult to determine due to the lack of evidence and health information. The relationship of such shortages to international migration is not clear. Policy responses to health worker migration are also similarly embedded in wider processes aimed at health workforce management, but overall, there is no clear policy agenda to manage health worker migration. Decision-makers in India present conflicting options about the need or desirability of curtailing migration. Consequences of health work migration on the Indian health care system are not easily discernable from other compounding factors. Research suggests that shortages of skilled health workers in India must be examined in relation to domestic policies on training, recruitment, and retention rather than viewed as a direct consequence of the international migration of health workers.

  15. Learning and adapting to societal requirements for radioactive waste management. Key findings and experience of the forum on stakeholder confidence

    International Nuclear Information System (INIS)

    2004-01-01

    The Forum on Stakeholder Confidence (FSC) is an ongoing initiative of the Nea Radioactive Waste Management Committee (RWMC). The FSC is composed of nominees from Nea member countries and consists mostly of representatives of national organisations (implementers, regulators, policy makers, research and development personnel) with responsibility for, and experience of, interacting with stakeholders. The FSC mandate includes the following: to define, oversee and carry out work programme activities in the strategic area of public perception and stakeholder confidence, as assigned by the RWMC; to advise the RWMC on major and emerging issues in the area of public perception and stakeholder confidence related to waste management; to act as a forum to share experience in achieving stakeholder confidence and, in particular, in how to obtain the confidence of local communities and their representatives and intermediaries with the technical decision makers; to analyse today processes for embedding waste management programmes into a socio-political, decision-making context; to identify opportunities for harmonized views of member countries regarding successful and unsuccessful experiences in interacting with stakeholders, technical concerns of stakeholders, effective means of communicating with technical and nontechnical audiences. This report presents the key FSC findings based on the substantial documentation and experience developed by the Forum during its first four years of activity (2000-2004). The historical context within which the FSC was established is also described and provides a perspective to those findings. An appendix recounts the collective experience of the FSC members, including their views of the impact of FSC activities on participating organisations. The FSC will build upon the present findings during its next phase of work. (author)

  16. Key components of financial-analysis education for clinical nurses.

    Science.gov (United States)

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  17. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  18. No drama: key elements to the success of an HIV/STI-prevention mass-media campaign.

    Science.gov (United States)

    Pedrana, Alisa E; Hellard, Margaret E; Higgs, Peter; Asselin, Jason; Batrouney, Colin; Stoovè, Mark

    2014-05-01

    We qualitatively examined gay men's reactions to the national "Drama Downunder" HIV/STI social marketing campaign targeting gay men in Australia to identify key campaign elements that underpinned the demonstrated effectiveness of the campaign. We present findings from six qualitative focus groups held with 49 participants as part of the evaluation of the sexual-health-promotion campaign over 2008-2009. Participants identified attention-grabbing images, a humorous approach, positive and simple tailored messaging, and the use of mainstream media as campaign features crucial in normalizing sexual health testing, driving campaign engagement, and ensuring high message exposure. Our results suggest that designers of future campaigns should strive to balance positive and negative campaign images and messages, and find new ways to engage men with sexual health topics, particularly younger gay men. We discuss the implications of our findings about campaign effectiveness for future health-promotion campaigns and message design.

  19. Deducing trapdoor primitives in public key encryption schemes

    Science.gov (United States)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  20. Key-value Storage Systems (and Beyond with Python

    Directory of Open Access Journals (Sweden)

    2010-09-01

    Full Text Available Web application developers often use RDBMS systems such as MySql or PostgreSql but there are many other types of databases out there. Key-value storage, schema and schema-less document storage, and column-oriented DBMS systems abound. These kind of database systems are becoming more popular when developing scalable web applications but many developers are unsure how to integrate them into their projects. This talk will focus on the key-value class of data storage systems, weigh the strengths and drawbacks of each and discuss typical use cases for key value storage.

  1. Facilitating consumer participation: an approach to finding the 'right' consumer.

    Science.gov (United States)

    Happell, Brenda

    2010-01-01

    Contemporary health care increasingly dictates that consumers of services should become active participants in the health care system. This has placed responsibility on administrators, managers and clinicians to include consumers in key strategic and decision making initiatives. However, this direction has not been accompanied by clear policies or guidelines. Consequently confusion about selecting consumers able to provide valuable input is identified as a barrier to active consumer involvement. The purpose of this paper is to address some concerns raised in the quest to find the "right" consumer, including: finding a consumer without an axe to grind; ensuring the consumer is representative of broader views; health professionals as consumer representatives. While these concerns are common they have not yet been extensively debated and discussed in the broader Literature. Strategies necessary to support consumers in participatory roles are also considered and the controversial subject of financial remuneration for consumers is also explored.

  2. SpaceWire Tiger Team Findings and Suggestions

    Science.gov (United States)

    Ishac, Joseph A.

    2011-01-01

    This technical report intends to highlight the key findings and recommendations of the SpaceWire Tiger Team for the CoNNeCT project. It covers findings which are technical in nature, covering design concepts and approaches.

  3. Increase in physical activities in kindergarten children with cerebral palsy by employing MaKey-MaKey-based task systems.

    Science.gov (United States)

    Lin, Chien-Yu; Chang, Yu-Ming

    2014-09-01

    In this study, we employed Flash- and Scratch-based multimedia by using a MaKey-MaKey-based task system to increase the motivation level of children with cerebral palsy to perform physical activities. MaKey MaKey is a circuit board that converts physical touch to a digital signal, which is interpreted by a computer as a keyboard message. In this study, we used conductive materials to control this interaction. This study followed single-case design using ABAB models in which A indicated the baseline and B indicated the intervention. The experiment period comprised 1 month and a half. The experimental results demonstrated that in the case of two kindergarten children with cerebral palsy, their scores were considerably increased during the intervention phrases. The developmental applications of the results are also discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Mapping key antecedents of employee-driven innovations

    DEFF Research Database (Denmark)

    Smith, Pernille; Ulhøi, John Parm; Kesting, Peter

    2012-01-01

    Research on employee-driven innovation (EDI) is still in its infancy, and as yet there is no independent body of literature on the topic. The aim of this paper is to review existing insights into the key antecedents of EDI in other research contexts. In particular, we focus on: leader support......, autonomy, collaboration, and organisational norms of exploration. The main contribution of this paper is to discuss how these key antecedents apply to the specific case of EDI and to identify an agenda for new research....

  5. Discovering Genres of Online Discussion Threads via Text Mining

    Science.gov (United States)

    Lin, Fu-Ren; Hsieh, Lu-Shih; Chuang, Fu-Tai

    2009-01-01

    As course management systems (CMS) gain popularity in facilitating teaching. A forum is a key component to facilitate the interactions among students and teachers. Content analysis is the most popular way to study a discussion forum. But content analysis is a human labor intensity process; for example, the coding process relies heavily on manual…

  6. Using Linked Electronic Health Records to Estimate Healthcare Costs: Key Challenges and Opportunities.

    Science.gov (United States)

    Asaria, Miqdad; Grasic, Katja; Walker, Simon

    2016-02-01

    This paper discusses key challenges and opportunities that arise when using linked electronic health records (EHR) in health economics and outcomes research (HEOR), with a particular focus on estimating healthcare costs. These challenges and opportunities are framed in the context of a case study modelling the costs of stable coronary artery disease in England. The challenges and opportunities discussed fall broadly into the categories of (1) handling and organising data of this size and sensitivity; (2) extracting clinical endpoints from datasets that have not been designed and collected with such endpoints in mind; and (3) the principles and practice of costing resource use from routinely collected data. We find that there are a number of new challenges and opportunities that arise when working with EHR compared with more traditional sources of data for HEOR. These call for greater clinician involvement and intelligent use of sensitivity analysis.

  7. Panel discussion on health effects of low-dose ionizing radiation. Scientific findings and non-threshold hypothesis

    International Nuclear Information System (INIS)

    1995-06-01

    This is a record of a panel discussion in the IAEA Interregional Training Course. In current radiation work, protection measures are taken on the assumption that any amount of radiation, however small, entails a risk of deleterious effects. This so-called non-threshold assumption of radiation effects, on the one hand, creates public distrust of radiation use. However, because the health effects of low-dose ionizing radiation are difficult to verify, wide views ranging from the non-threshold hypothesis to one which sees small amounts of radiation as rather useful and necessary are presented. In this panel discussion, how the health effects of low-dose ionizing radiation should be considered from the standpoint of radiation protection was discussed. Panelists included such eminent scientists as Dr. Sugahara and Dr. Okada, who are deeply interested in this field and are playing leading parts in radiobiology research in Japan, and Dr. Stather, deputy Director of NRPB, UK, who, in UNSCEAR and ICRP, is actively participating in the international review of radiation effects and the preparation of reports on radiation protection recommendations. They agreed with each other that although it is reasonable, under the current scientific understanding, to follow the recommendation of ICRP, research in this area should be strongly promoted hereafter, for basing radiation protection on firm scientific grounds. Many participants actively asked about and discussed problems in their own field. (author)

  8. Invisible Wounds of War: Summary of Key Findings on Psychological and Cognitive Injuries

    National Research Council Canada - National Science Library

    Jaycox, Lisa H

    2008-01-01

    My testimony will briefly discuss the prevalence of post-traumatic stress disorder and depression, as well as the incidence of traumatic brain injury among service members returning from Operations...

  9. Voicing on Virtual and Face to Face Discussion

    Science.gov (United States)

    Yamat, Hamidah

    2013-01-01

    This paper presents and discusses findings of a study conducted on pre-service teachers' experiences in virtual and face to face discussions. Technology has brought learning nowadays beyond the classroom context or time zone. The learning context and process no longer rely solely on face to face communications in the presence of a teacher.…

  10. Finding costs methodology - alternative approaches

    International Nuclear Information System (INIS)

    Gaddis, D.

    1992-01-01

    Though the context may vary, the topic of the day in the oil and gas industry is ''finding costs per barrel.'' First, there have been numerous articles in both the popular media and the industry press that have argued it is cheaper for companies to buy reserves that find them with the drill bit. Financial analysts have emphasized the importance of comparing relative finding costs when evaluating different companies. The success of failure of a company's management has been judged on the basis of finding costs. In discussing oil and gas prices, economists commonly refer to the relationship between the market prices of oil and gas and their finding costs, and no discussion of the U.S. petroleum industry and the development of a national energy policy is complete without reference to finding costs. (Author)

  11. Key-space analysis of double random phase encryption technique

    Science.gov (United States)

    Monaghan, David S.; Gopinathan, Unnikrishnan; Naughton, Thomas J.; Sheridan, John T.

    2007-09-01

    We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack.

  12. Key Findings for Interpersonal Skills

    Science.gov (United States)

    2013-12-04

    along in patrol cars; (b) SPD-1, which all include a use of force and are collected by a dashcam ; (c) SPD-2, collected by dashcam ; and (d) a Midwest...Traffic corpus, also collected by dashcam . For quantitative analysis, a subset of encounters was selected according to the following criteria: 1. Audio

  13. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  14. Local and regional energy companies offering energy services: Key activities and implications for the business model

    International Nuclear Information System (INIS)

    Kindström, Daniel; Ottosson, Mikael

    2016-01-01

    Highlights: • Many companies providing energy services are experiencing difficulties. • This research identifies key activities for the provision of energy services. • Findings are aggregated to the business-model level providing managerial insights. • This research identifies two different business model innovation paths. • Energy companies may need to renew parts of, or the entire, business model. - Abstract: Energy services play a key role in increasing energy efficiency in the industry. The key actors in these services are the local and regional energy companies that are increasingly implementing energy services as part of their market offering and developing service portfolios. Although expectations for energy services have been high, progress has so far been limited, and many companies offering energy services, including energy companies, are experiencing difficulties in implementing energy services and providing them to the market. Overall, this research examines what is needed for local and regional energy companies to successfully implement energy services (and consequently provide them to the market). In doing this, a two-stage process is used: first, we identify key activities for the successful implementation of energy services, and second, we aggregate the findings to the business model level. This research demonstrates that to succeed in implementing energy services, an energy company may need to renew parts or all of its existing product-based business model, formulate a new business model, or develop coexisting multiple business models. By discussing two distinct business model innovation processes, this research demonstrates that there can be different paths to success.

  15. LBTool: A stochastic toolkit for leave-based key updates

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Quantitative techniques have been successfully employed in verification of information and communication systems. However, the use of such techniques are still rare in the area of security. In this paper, we present a toolkit that implements transient analysis on a key update method for wireless...... sensor networks. The analysis aims to find out the probability of a network key being compromised at a specific time point, which result in fluctuations over time for a specific key update method called Leave-based key update. For such a problem, the use of current tools is limited in many ways...

  16. American Society of Clinical Oncology Summit on Addressing Obesity Through Multidisciplinary Provider Collaboration: Key Findings and Recommendations for Action.

    Science.gov (United States)

    Ligibel, Jennifer A; Alfano, Catherine M; Hershman, Dawn L; Merrill, Janette K; Basen-Engquist, Karen; Bloomgarden, Zachary T; Demark-Wahnefried, Wendy; Dixon, Suzanne; Hassink, Sandra G; Jakicic, John M; Morton, John Magaña; Okwuosa, Tochi M; Powell-Wiley, Tiffany M; Rothberg, Amy E; Stephens, Mark; Streett, Sarah E; Wild, Robert A; Westman, Eric A; Williams, Ronald J; Wollins, Dana S; Hudis, Clifford A

    2017-11-01

    Given the increasing evidence that obesity increases the risk of developing and dying from malignancy, the American Society of Clinical Oncology (ASCO) launched an Obesity Initiative in 2013 that was designed to increase awareness among oncology providers and the general public of the relationship between obesity and cancer and to promote research in this area. Recognizing that the type of societal change required to impact the obesity epidemic will require a broad-based effort, ASCO hosted the "Summit on Addressing Obesity through Multidisciplinary Collaboration" in 2016. This meeting was held to review current challenges in addressing obesity within the respective health care provider communities and to identify priorities that would most benefit from a collective and cross-disciplinary approach. Efforts focused on four key areas: provider education and training; public education and activation; research; and policy and advocacy. Summit attendees discussed current challenges in addressing obesity within their provider communities and identified priorities that would most benefit from multidisciplinary collaboration. A synopsis of recommendations to facilitate future collaboration, as well as examples of ongoing cooperative efforts, provides a blueprint for multidisciplinary provider collaboration focused on obesity prevention and treatment. © 2017 The Obesity Society.

  17. Parents' views on childhood obesity: qualitative analysis of discussion board postings.

    Science.gov (United States)

    Appleton, Jessica; Fowler, Cathrine; Brown, Nicola

    2017-08-01

    Childhood obesity is an increasing concern for parents and health professionals alike. Parents' perception of obesity as a current health issue for their children is important for the everyday parenting and health choices parents make. As parents are frequently going online to seek and exchange information about parenting and child health, asynchronous online discussion forums provide an opportunity to investigate their perceptions and concerns. Understanding parents' perceptions, beliefs and attitudes is important in any childhood obesity prevention and intervention. To explore parents' perceptions, perspectives and concerns regarding childhood obesity expressed on asynchronous online discussion forums. A qualitative descriptive approach using template analysis to analyse a novel data collection strategy of 34 purposefully sampled threads from two Australian-based asynchronous online discussion forums. Parents on the discussion forum displayed an understanding of childhood obesity as a public health concern, the discussion incorporated issues such as providing a healthy diet and lifestyle for children. Parents shared their own opinions and experiences that challenged or conceded to the status quo of the discussion. Parents discussed the role of health professionals in obesity prevention. There were varied opinions on the relevance of health professionals, particularly nurses, monitoring of growth and risk of obesity. This exploratory study highlights that parents perceive childhood obesity as an important public health concern, and that they understand the key public health messages of prevention and intervention. Yet, for many it is difficult to successfully implement these messages into their everyday lives. Health professionals need to play a key role in providing non-judgemental, innovative support and advice to parents to successfully implement prevention and intervention strategies.

  18. The Discussion of Social Entrepreneurship: Review of the Literature

    OpenAIRE

    Daud@Fhiri Nur Suriaty; Diyana Ishak Siti Intan; Abdullah Suhairimi; Azmi A. A.; Ishak Aida Shakila; Ahmad Z.

    2018-01-01

    The purpose of this article is to explore the various discussion of social entrepreneurship. Social entrepreneurship provides a unique opportunity and assumptions to question, challenge and rethink from different perspective of management and business research. This article offers a comparative analysis of commercial entrepreneurship and social entrepreneurship using a prevailing analytical model from commercial entrepreneurship. The analysis highlights key differences and similarities betwee...

  19. Key Ethical Issues Discussed at CDC-Sponsored International, Regional Meetings to Explore Cultural Perspectives and Contexts on Pandemic Influenza Preparedness and Response.

    Science.gov (United States)

    Lor, Aun; Thomas, James C; Barrett, Drue H; Ortmann, Leonard W; Herrera Guibert, Dionisio J

    2016-05-17

    Recognizing the importance of having a broad exploration of how cultural perspectives may shape thinking about ethical considerations, the Centers for Disease Control and Prevention (CDC) funded four regional meetings in Africa, Asia, Latin America, and the Eastern Mediterranean to explore these perspectives relevant to pandemic influenza preparedness and response. The meetings were attended by 168 health professionals, scientists, academics, ethicists, religious leaders, and other community members representing 40 countries in these regions. We reviewed the meeting reports, notes and stories and mapped outcomes to the key ethical challenges for pandemic influenza response described in the World Health Organization's (WHO's) guidance, Ethical Considerations in Developing a Public Health Response to Pandemic Influenza: transparency and public engagement, allocation of resources, social distancing, obligations to and of healthcare workers, and international collaboration. The important role of transparency and public engagement were widely accepted among participants. However, there was general agreement that no "one size fits all" approach to allocating resources can address the variety of economic, cultural and other contextual factors that must be taken into account. The importance of social distancing as a tool to limit disease transmission was also recognized, but the difficulties associated with this measure were acknowledged. There was agreement that healthcare workers often have competing obligations and that government has a responsibility to assist healthcare workers in doing their job by providing appropriate training and equipment. Finally, there was agreement about the importance of international collaboration for combating global health threats. Although some cultural differences in the values that frame pandemic preparedness and response efforts were observed, participants generally agreed on the key ethical principles discussed in the WHO's guidance

  20. Panel discussion: LNG's future in Asia

    International Nuclear Information System (INIS)

    Ohashi, Tadahiko

    1992-01-01

    The panelists convened to: (1) identify and evaluate the role which LNG is likely to play in the changing energy scene; (2) to examine the future supply and demand structure of the LNG trade; (3) to discover the key obstacles to continued growth in LNG trade; and (4) to find solutions to these problems. The panelists identified and outlined growing opportunities for LNG utilization in Asia during the next two decades. They shared the opinion that the structure of the supply and demand balance for LNG in Asia will shift during the next decade, providing considerable room for new projects. The key obstacles to continued growth in LNG trade are the lack of: long-distance transmission networks and an efficient competitive market pricing mechanism for LNG in the Asian region. The major importers in the region are keen on developing a range of new long-term supply alternatives, not simply within the Asia-Pacific region, but also from a wider perspective. These alternatives include: financing the expansion of production from existing facilities, development of new fields, and construction of long-distance pipelines

  1. Online discussion: Enhancing students' critical thinking skills

    Science.gov (United States)

    Rathakrishnan, Mohan; Ahmad, Rahayu; Suan, Choo Ling

    2017-10-01

    Online discussion has become one of the important strategies for the teacher to teach the students to think critically when conveying their ideas and become more proactive and creative. In this paper, padlet online discussion communication was conducted to examine its effectiveness in enhancing critical thinking. In this study, there are two types of critical thinking: macro and micro critical thinking. A total of 70 Universiti Utara Malaysia Management Foundation Programme students involved in this experimental research design. The students in treatment class are divided to few groups. Every group uses padlet online discussion to discuss the topic given. All the group members discuss and write their ideas in padlet. Ideas that are posted in padlet will be displayed in front of the class so that the entire group in the treatment class could see the given ideas. Paul's (1993) model was used to analyze student's macro and micro critical thinking in padlet online discussion and communication. The finding shows that students who used padlet online discussion backchannel communication have greater macro and micro critical thinking level than students who do not use online discussion.

  2. Transmission access and retail wheeling. The key questions

    International Nuclear Information System (INIS)

    Casazza, J.A.

    1996-01-01

    The key questions involving transmission access and retail wheeling are discussed, distinguishing between opposing views regarding the effect on system costs and the environment, particularly on optimal planning involving matching capacity and demand, generation use, demand side management, and economic operations. Also discussed are contrasting views regarding the effect of cost control pressures, regulatory advantages and disadvantages, the impact on system reliability, and the stranding of investment. The author's key concern is the effect of retail wheeling upon optimal planning and operation i.e., will competitors be willing to provide one another with the cost and technical information required for coordination? In his worst scenario, retail wheeling may lead to substantial production cost increases, lessened reliability, and unfair cost-shifting between customer classes. More optimistically, production costs and reliability may be unaffected and the cost-shifting could be salubrious. 7 figs., 11 refs

  3. Key factors impacting on diagnosis and treatment for vulvar cancer for Indigenous women: findings from Australia.

    Science.gov (United States)

    McGrath, Pam; Rawson, Nicole

    2013-10-01

    To date, there has been limited research on the topic of vulvar cancer. This paper provides findings from a qualitative study conducted with Indigenous women in East Arnhem Land, Northern Territory, Australia on the psychosocial impact of diagnosis and treatment for vulvar cancer. The insights from the study outlined in this paper not only make a contribution to deepening our understanding of the experience of vulvar cancer for Indigenous women, but provide practical recommendations to ensure effective and early engagement for diagnosis and treatment. A qualitative research method was employed through in-depth, open-ended interviews. The participants of the study were a purposive sample of Indigenous women with the condition, health professionals, and Aboriginal health workers. There were a total of 40 participants; with twelve (n = 12) Indigenous women affected with the condition, fourteen (n = 14) Aboriginal Health Workers, ten (n = 10) nurses, three (n = 3) doctors, and one (n = 1) community member. This paper addresses three key issues highlighted by the participants which include the fact that the private nature of the disease makes the condition 'women's business', that there is a sense of shame associated with the condition, and that there is fear and worry generated by the seriousness of the condition. The private nature of the disease and the sense of shame associated with the condition impact upon the diagnosis and treatment for many Indigenous women. In addition, the limitation of resources for health service delivery for East Arnhem Land exacerbates the problems faced by these communities. This paper puts forward suggestions to facilitate early diagnosis and treatment for women affected with the condition.

  4. Quantum key distribution on Hannover Campus

    Energy Technology Data Exchange (ETDEWEB)

    Duhme, Joerg; Franz, Torsten; Werner, Reinhard F. [Leibniz Universitaet Hannover, Institut fuer Theoretische Physik, AG Quanteninformation (Germany); Haendchen, Vitus; Eberle, Tobias; Schnabel, Roman [Albert Einstein Institut, Quantum Interferometry (Germany)

    2012-07-01

    We report on the progress of the implementation of an entanglement-based quantum key distribution on Hannover campus using squeezed gaussian states (continuous variables). This poster focuses on the theoretical aspects of the project. Experimental data has been compared with the theoretical simulation of the experimental setup. We especially discuss effects of the homodyne detection and postprocessing in use on the measurement outcome.

  5. Find-me and eat-me signals in apoptotic cell clearance: progress and conundrums

    Science.gov (United States)

    2010-01-01

    Everyday we turnover billions of cells. The quick, efficient, and immunologically silent disposal of the dying cells requires a coordinated orchestration of multiple steps, through which phagocytes selectively recognize and engulf apoptotic cells. Recent studies have suggested an important role for soluble mediators released by apoptotic cells that attract phagocytes (“find-me” signals). New information has also emerged on multiple receptors that can recognize phosphatidylserine, the key “eat-me” signal exposed on the surface of apoptotic cells. This perspective discusses recent exciting progress, gaps in our understanding, and the conflicting issues that arise from the newly acquired knowledge. PMID:20805564

  6. Key Competences in vocational education and training

    DEFF Research Database (Denmark)

    Andersen, Ole Dibbern; Kruse, Katrine

    This article presents and discusses how key competences in the school based learning are embedded in the VET curricula during the last five years. It gives an overview of how their role has developed in light of the comprehensive Danish VET reform agreed in 2014 and implemented since August 2015....

  7. Cryptanalysis on a parallel keyed hash function based on chaotic maps

    International Nuclear Information System (INIS)

    Guo Wei; Wang Xiaoming; He Dake; Cao Yang

    2009-01-01

    This Letter analyzes the security of a novel parallel keyed hash function based on chaotic maps, proposed by Xiao et al. to improve the efficiency in parallel computing environment. We show how to devise forgery attacks on Xiao's scheme with differential cryptanalysis and give the experiment results of two kinds of forgery attacks firstly. Furthermore, we discuss the problem of weak keys in the scheme and demonstrate how to utilize weak keys to construct collision.

  8. Boundary-layer processes: key findings from MATERHORN-X field campaigns

    Science.gov (United States)

    Di Sabatino, Silvana; Leo, Laura S.; Pardyjak, Eric R.; Fernando, Harindra JS

    2017-04-01

    Understanding of atmospheric boundary-layer processes in complex terrain continues to be an active area of research considering its profound implications on numerical weather prediction (WP). It is largely recognized that nocturnal circulation, non-stationary processes involved in evening and morning transitions as well gusty conditions near mountains are poorly captured by current WP models. The search for novel understanding of boundary-layer phenomena especially in critical conditions for WP models has been one of the goals of the interdisciplinary Mountain Terrain Atmospheric Modeling and Observations (MATERHORN) program (2011-2016). The program developed with four main pillars: modelling (MATERHORN-M), experiments (MATERHORN-X), technology (MATERHORN-T), and parameterizations (MATERHORN-P), all synergistically working to meet new scientific challenges, address them effectively through dedicated field and laboratory studies, and transfer the acquired knowledge for model improvements. Specifically, MATERHORN-X is at the core of the MATERHORN program. It was built upon two major field experiments carried out in 31 September-October 2012 and in May 2013 at the Granite Mountain Atmospheric Science Testbed 32 (GMAST) of the Dugway Proving Ground (DPG). In this talk we will focus on results of data analyses from MATERHORN-X with emphasis on several aspects of the nocturnal circulation under low synoptic forcing when stable stratification occurs. The first part of the talk will discuss the evolution of nocturnal flows including both evening transitions on slopes and valleys as well as the occurrence of isolated flow bursts under very stable conditions. As far as the former is concerned we report on our latest understanding of mechanisms leading to evening transitions (e.g. shadow front, slab flow, and transitional front). As far as the latter is concerned, it is hypothesized that a link exists between isolated bursts in turbulent kinetic energy and low-level jets

  9. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  10. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  11. Key insights for the future of urban ecosystem services research

    Directory of Open Access Journals (Sweden)

    Peleg Kremer

    2016-06-01

    Full Text Available Understanding the dynamics of urban ecosystem services is a necessary requirement for adequate planning, management, and governance of urban green infrastructure. Through the three-year Urban Biodiversity and Ecosystem Services (URBES research project, we conducted case study and comparative research on urban biodiversity and ecosystem services across seven cities in Europe and the United States. Reviewing > 50 peer-reviewed publications from the project, we present and discuss seven key insights that reflect cumulative findings from the project as well as the state-of-the-art knowledge in urban ecosystem services research. The insights from our review indicate that cross-sectoral, multiscale, interdisciplinary research is beginning to provide a solid scientific foundation for applying the ecosystem services framework in urban areas and land management. Our review offers a foundation for seeking novel, nature-based solutions to emerging urban challenges such as wicked environmental change issues.

  12. Empowerment: a conceptual discussion.

    Science.gov (United States)

    Tengland, Per-Anders

    2008-06-01

    The concept of 'empowerment' is used frequently in a number of professional areas, from psychotherapy to social work. But even if the same term is used, it is not always clear if the concept denotes the same goals or the same practice in these various fields. The purpose of this paper is to clarify the discussion and to find a plausible and useful definition of the concept that is suitable for work in various professions. Several suggestions are discussed in the paper, for example control over life or health, autonomy, ability, self-efficacy, self-esteem, and freedom, and it is concluded that there are two plausible complementary uses, one as a goal and one as a process or approach. Empowerment as a goal is to have control over the determinants of one's quality of life, and empowerment as a process is to create a professional relation where the client or community takes control over the change process, determining both the goals of this process and the means to use.

  13. Single Finds. The case of Roman Egypt

    DEFF Research Database (Denmark)

    Christiansen, Erik

    2006-01-01

    Survery of single or stray finds from Roman Egypt and discussion of them as evidence for the circulation and use of coins......Survery of single or stray finds from Roman Egypt and discussion of them as evidence for the circulation and use of coins...

  14. Old Wine in New Skins: The Sensitivity of Established Findings to New Methods

    Science.gov (United States)

    Foster, E. Michael; Wiley-Exley, Elizabeth; Bickman, Leonard

    2009-01-01

    Findings from an evaluation of a model system for delivering mental health services to youth were reassessed to determine the robustness of key findings to the use of methodologies unavailable to the original analysts. These analyses address a key concern about earlier findings--that the quasi-experimental design involved the comparison of two…

  15. Group Discussion and Cooperation in Social Dilemmas.

    Science.gov (United States)

    Bouas, Kelly S.; Komorita, S. S.

    1996-01-01

    Face-to-face discussion has been shown to increase cooperation behavior in social dilemmas. Two general explanations of this effect were tested: group identity and perception of consensus. Female undergraduate students (N=160) participated in four-person groups in one of four experimental conditions. Findings indicate the most plausible…

  16. The High/Scope Preschool Key Experiences: Essential Elements of Young Children's Learning.

    Science.gov (United States)

    Hohmann, Mary

    2002-01-01

    Discusses High/Scope's preschool key experiences (a set of 58 statements that describe young children's social, cognitive, and physical development). The key experiences are grouped into 10 major developmental areas (creative representation, language and literacy, social relations, movement, music, classification, seriation, number, space, and…

  17. Panel Discussion : Report of the APS Ad-Hoc Committee on LGBT Issues

    Science.gov (United States)

    Atherton, Tim; Barthelemy, Ramon; Garmon, Savannah; Reeves, Kyle; APS Ad-Hoc Committee on LGBT Issues Team

    Following the presentation of the findings and recommendations of the APS Ad-Hoc Committee on LGBT Issues (C-LGBT) by Committee Chair Michael Falk, a panel discussion will be held featuring several members of the committee. The discussion will focus on how APS can best ensure the recommendations of the committee are carried out in a timely fashion and other ideas on future APS efforts toward LGBT inclusion in physics. Discussion topics will also include the research and other input that shaped the committee's findings and recommendations.

  18. Curated Collections for Educators: Five Key Papers about Residents as Teachers Curriculum Development.

    Science.gov (United States)

    Krzyzaniak, Sara M; Cherney, Alan; Messman, Anne; Natesan, Sreeja; Overbeck, Michael; Schnapp, Benjamin; Boysen-Osborn, Megan

    2018-02-04

    The Accreditation Council for Graduate Medical Education (ACGME) requires residency programs to prepare residents to teach and assess medical students and other learners. In order to achieve this, many programs develop formal residents as teachers (RAT) curricula. Medical educators may seek the guidance of previously published literature during the development of RAT programs at their institutions. The authors sought to identify key articles published on the subject of RAT programs over the last 10 years. The authors utilized a formal literature search with the help of a medical librarian and identified additional articles from virtual discussions among the author group and an open call for articles on Twitter using the hashtag #MedEd. Virtual discussions occurred within an online community of practice, the Academic Life in Emergency Medicine (ALiEM) Faculty Incubator. The lead author conducted a four-round modified Delphi process among the author group in order to narrow the broad article list to five key articles on RAT programs. The authors summarize each article and provide considerations for junior faculty as well as faculty developers. Curriculum development and program evaluation should utilize established frameworks and evidence-based approaches. The papers identified by this Delphi process will help faculty use best practices when creating or revising new RAT curriculum. In addition, faculty tasked with guiding junior faculty in this process or creating faculty development programs around curriculum development will find these articles to be a great resource for building content.

  19. Key papers in prostate cancer.

    Science.gov (United States)

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  20. Research on key technologies for data-interoperability-based metadata, data compression and encryption, and their application

    Science.gov (United States)

    Yu, Xu; Shao, Quanqin; Zhu, Yunhai; Deng, Yuejin; Yang, Haijun

    2006-10-01

    With the development of informationization and the separation between data management departments and application departments, spatial data sharing becomes one of the most important objectives for the spatial information infrastructure construction, and spatial metadata management system, data transmission security and data compression are the key technologies to realize spatial data sharing. This paper discusses the key technologies for metadata based on data interoperability, deeply researches the data compression algorithms such as adaptive Huffman algorithm, LZ77 and LZ78 algorithm, studies to apply digital signature technique to encrypt spatial data, which can not only identify the transmitter of spatial data, but also find timely whether the spatial data are sophisticated during the course of network transmission, and based on the analysis of symmetric encryption algorithms including 3DES,AES and asymmetric encryption algorithm - RAS, combining with HASH algorithm, presents a improved mix encryption method for spatial data. Digital signature technology and digital watermarking technology are also discussed. Then, a new solution of spatial data network distribution is put forward, which adopts three-layer architecture. Based on the framework, we give a spatial data network distribution system, which is efficient and safe, and also prove the feasibility and validity of the proposed solution.

  1. Discussion and a new method of optical cryptosystem based on interference

    Science.gov (United States)

    Lu, Dajiang; He, Wenqi; Liao, Meihua; Peng, Xiang

    2017-02-01

    A discussion and an objective security analysis of the well-known optical image encryption based on interference are presented in this paper. A new method is also proposed to eliminate the security risk of the original cryptosystem. For a possible practical application, we expand this new method into a hierarchical authentication scheme. In this authentication system, with a pre-generated and fixed random phase lock, different target images indicating different authentication levels are analytically encoded into corresponding phase-only masks (phase keys) and amplitude-only masks (amplitude keys). For the authentication process, a legal user can obtain a specified target image at the output plane if his/her phase key, and amplitude key, which should be settled close against the fixed internal phase lock, are respectively illuminated by two coherent beams. By comparing the target image with all the standard certification images in the database, the system can thus verify the user's legality even his/her identity level. Moreover, in despite of the internal phase lock of this system being fixed, the crosstalk between different pairs of keys held by different users is low. Theoretical analysis and numerical simulation are both provided to demonstrate the validity of this method.

  2. Qualitative findings from focus group discussions on hand hygiene compliance among health care workers in Vietnam.

    Science.gov (United States)

    Salmon, Sharon; McLaws, Mary-Louise

    2015-10-01

    It is accepted by hospital clinical governance that every clinician's "duty of care" includes hand hygiene, yet globally, health care workers (HCWs) continue to struggle with compliance. Focus group discussions were conducted to explore HCWs' barriers to hand hygiene in Vietnam. Twelve focus group discussions were conducted with HCWs from 6 public hospitals across Hanoi, Vietnam. Discussions included participants' experiences with and perceptions concerning hand hygiene. Tape recordings were transcribed verbatim and then translated into English. Thematic analysis was conducted by 2 investigators. Expressed frustration with high workload, limited access to hand hygiene solutions, and complicated guidelines that are difficult to interpret in overcrowded settings were considered by participants to be bona fide reasons for noncompliance. No participant acknowledged hand hygiene as a duty of care practice for her or his patients. Justification for noncompliance was the observation that visitors did not perform hand hygiene. HCWs did acknowledge a personal duty of care when hand hygiene was perceived to benefit her or his own health, and then neither workload or environmental challenges influenced compliance. Limited resources in Vietnam are amplified by overcrowded conditions and dual bed occupancy. Yet without a systematic systemic duty of care to patient safety, changes to guidelines and resources might not immediately improve compliance. Thus, introducing routine hand hygiene must start with education programs focusing on duty of care. Copyright © 2015 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  3. DisVis: Visualizing Discussion Threads in Online Health Communities.

    Science.gov (United States)

    Nakikj, Drashko; Mamykina, Lena

    2016-01-01

    An increasing number of individuals turn to online health communities (OHC) for information, advice and support about their health condition or disease. As a result of users' active participation, these forums store overwhelming volumes of information, which can make access to this information challenging and frustrating. To help overcome this problem we designed a discussion visualization tool DisVis. DisVis includes features for overviewing, browsing and finding particular information in a discussion. In a between subjects study, we tested the impact of DisVis on individuals' ability to provide an overview of a discussion, find topics of interest and summarize opinions. The study showed that after using the tool, the accuracy of participants' answers increased by 68% (p-value = 0.023) while at the same time exhibiting trends for reducing the time to answer by 38% with no statistical significance (p-value = 0.082). Qualitative interviews showed general enthusiasm regarding tools for improving browsing and searching for information within discussion forums, suggested different usage scenarios, highlighted opportunities for improving the design of DisVis, and outlined new directions for visualizing user-generated content within OHCs.

  4. Corporate Author Entry Records Retrieved by Use of Derived Truncated Search Keys

    Directory of Open Access Journals (Sweden)

    Alan L. Landgraf

    1973-09-01

    Full Text Available An experiment was conducted to design a corporate author index to a large bibliographic file. The nature of corporate entries necessitates a different search key construction from that of personal names or titles. Derivation of a search key to select distinct corporate entry records is discussed.

  5. The transit oil and gas pipeline and the role of bargaining: A non-technical discussion

    International Nuclear Information System (INIS)

    Omonbude, Ekpen J.

    2007-01-01

    Transit oil and gas pipelines are growing in relevance, and face a number of topical problems. One of such issues is the problem of potential disruption from a number of sources, notably post-construction behaviour of the transit country. Present and future pipelines face the risk of continuous conflict over legal, economic and political issues. Once the pipeline is built and in operation, the threat of disruption of the pipeline by the transit country over disputed transit terms exists. This is due to two key problems: first, a shift in bargaining powers to the transit country upon construction and operation of the pipeline and, second, changes in the value of the throughput imply price changes that can affect the behaviour of the transit country. This paper discusses the role of basic bargaining principles in cross-border oil and gas pipelines involving transit through one or more countries. It finds that the motive behind the pipeline plays a key role in the prevention of potential disruptions to the pipeline due to rent squeezing. Also, although the potential of such disruptions does exist, there are a number of factors that could serve to mute the consequences of shifts in bargaining power to the transit countries

  6. A critical discussion of the physics of wood–water interactions

    DEFF Research Database (Denmark)

    Thybring, Emil Engelund; Thygesen, L. G.; Svensson, Staffan

    2013-01-01

    This paper reviews recent findings on wood–water interaction and puts them into context of established knowledge in the field. Several new findings challenge prevalent theories and are critically discussed in an attempt to advance current knowledge and highlight gaps. The focus of this review...... is put on water in the broadest concept of wood products, that is, the living tree is not considered. Moreover, the review covers the basic wood–water relation, states and transitions. Secondary effects such as the ability of water to alter physical properties of wood are only discussed in cases where...

  7. Sexual and dating violence among adolescents and young adults in Chile: a review of findings from a survey of university students.

    Science.gov (United States)

    Lehrer, Jocelyn A; Lehrer, Evelyn L; Koss, Mary P

    2013-01-01

    This paper synthesises and discusses results from the 2005 Survey of Student Well-Being, a closed-ended questionnaire administered to students attending general education courses at a major public university in Santiago (n = 484 women, 466 men). The survey included questions on sexual violence (SV) and dating violence (DV), public health problems that have received little attention in Chile and other Latin-American countries. This paper highlights key findings from a series of papers based on these data, noting lessons learned in the Chilean context that may be useful for other Latin-American countries. Important gaps in the international literature on SV and DV are also discussed. A central finding is the high prevalence of SV and DV in this sample of university students, warranting further public health attention to these problems. Potentially, the findings will contribute to changes in awareness, policy and practice along similar lines to efforts that transformed the US landscape regarding SV and DV on college campuses in the 1980s.

  8. The messages presented in online electronic cigarette promotions and discussions: a scoping review protocol.

    Science.gov (United States)

    McCausland, Kahlia; Maycock, Bruce; Jancey, Jonine

    2017-11-08

    Electronic cigarettes have become increasingly popular over the last 10 years. These devices represent a new paradigm for tobacco control offering smokers an opportunity to inhale nicotine without inhaling tobacco smoke. To date there are no definite conclusions regarding the safety and long-term health effects of electronic cigarettes; however, there is evidence that they are being marketed online as a healthier alternative to traditional cigarettes. This scoping review aims to identify and describe the breadth of messages (eg, health, smoking-cessation and price related claims) presented in online electronic cigarette promotions and discussions. A scoping review will be undertaken adhering to the methodology outlined in The Joanna Briggs Institute Manual for Scoping Reviews. Six key electronic databases will be searched to identify eligible studies. Studies must be published in English between 2007 and 2017, examine and/or analyse content captured from online electronic cigarette promotions or discussions and report results for electronic cigarettes separately to other forms of tobacco delivery. Studies will be screened initially by title and abstract, followed by full-text review. Results of the search strategy will be reported in a PRISMA flow diagram and presented in tabular form with accompanying narrative summary. The methodology consists of reviewing and collecting data from publicly available studies, and therefore does not require ethics approval. Results will be published in a peer reviewed journal and be presented at national/international conferences. Additionally, findings will be disseminated via social media and online platforms. Advocacy will be key to informing policy makers of regulatory and health issues that need to be addressed. The review was registered prospectively with The Joanna Briggs Institute Systematic Reviews database. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights

  9. Application of quantum key distribution for mutual identification - experimental realization

    International Nuclear Information System (INIS)

    Dusek, M.; Haderka, O.; Hendrych, M.

    1998-01-01

    A secure quantum identification system combining a classical identification procedure and quantum key distribution is proposed. Each identification sequence is always used just once and new sequences are 're fuelled' from a shared secret key transferred over a quantum channel. The question of authentication of information sent over a public channel is discussed. An apparatus using two unbalanced Mach-Zehnder interferometers has been built, and quantum key distribution and 'quantum identification' have been successfully tested through a single-mode optical fibre at 830 nm, employing low intensity coherent states (below 0,1 photons per pulse). (author)

  10. Discussion meet on electroanalytical techniques and their applications

    International Nuclear Information System (INIS)

    Aggarwal, S.K.; Gopinath, N.; Govindan, R.

    2008-02-01

    Electrochemistry is truly an interdisciplinary science and plays an important role in different branches of science and technology. The present Discussion Meet on ElectroAnalytical Techniques (DM- ELANTE-2008) is focused on the update of various electroanalytical techniques which have brought out a substantial change in electroanalytical chemistry. The aim of this Discussion Meet is to provide a forum to all the electroanalytical scientists to discuss their recent findings and information, learn from the mutual experiences and interests, and to promote cooperation both nationally and internationally. It is proposed to have tutorial lectures as well as invited talks during the Discussion Meet on various electroanalytical techniques including Electrochemical Impedance Spectroscopy (EIS), Spectro-electrochemistry, Scanning Electrochemical Microscopy (SECM), Electrochemical Quartz Crystal Microbalance (EQCM), Surface Plasmon Resonance (SPR) etc. Papers relevant to INIS are indexed separately

  11. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  12. Theses "Discussion" Sections: A Structural Move Analysis

    Science.gov (United States)

    Nodoushan, Mohammad Ali Salmani; Khakbaz, Nafiseh

    2011-01-01

    The current study aimed at finding the probable differences between the move structure of Iranian MA graduates' thesis discussion subgenres and those of their non-Iranian counterparts, on the one hand, and those of journal paper authors, on the other. It also aimed at identifying the moves that are considered obligatory, conventional, or optional…

  13. Unbelievable security : Matching AES using public key systems

    NARCIS (Netherlands)

    Lenstra, A.K.; Boyd, C.

    2001-01-01

    The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching public key sizes for RSA and the ElGamal family of protocols. For the latter both traditional multiplicative groups of finite

  14. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Science.gov (United States)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  15. Data Linkage in VET Research: Opportunities, Challenges and Principles. Discussion Paper

    Science.gov (United States)

    Osborne, Kristen; Fowler, Craig; Circelli, Michelle

    2018-01-01

    This discussion paper explores the possibilities and risks that data linkage presents for the vocational education and training (VET) sector. Along with a broad overview of the nature of data linkage, it highlights possible applications for data linkage in the VET sector and examines the key challenges associated with its use. A number of case…

  16. Implementation of Period-Finding Algorithm by Means of Simulating Quantum Fourier Transform

    Directory of Open Access Journals (Sweden)

    Zohreh Moghareh Abed

    2010-01-01

    Full Text Available In this paper, we introduce quantum fourier transform as a key ingredient for many useful algorithms. These algorithms make a solution for problems which is considered to be intractable problems on a classical computer. Quantum Fourier transform is propounded as a key for quantum phase estimation algorithm. In this paper our aim is the implementation of period-finding algorithm.Quantum computer solves this problem, exponentially faster than classical one. Quantum phase estimation algorithm is the key for the period-finding problem .Therefore, by means of simulating quantum Fourier transform, we are able to implement the period-finding algorithm. In this paper, the simulation of quantum Fourier transform is carried out by Matlab software.

  17. Ten key elements for implementing interprofessional learning in ...

    African Journals Online (AJOL)

    This paper discusses 10 key elements for the design and implementation of interprofessional education (IPE) in a skills centre. The elements are based on published literature as well as on the experience of an IPE initiative, simulating the management of a multiple-traumatised patient in the acute and rehabilitation phases, ...

  18. Investigating ideomotor cognition with motorvisual priming paradigms: Key findings, methodological challenges, and future directions

    Directory of Open Access Journals (Sweden)

    Roland eThomaschke

    2012-11-01

    Full Text Available Ideomotor theory claims that perceptual representations of action effects are functionally involved in the planning of actions. Strong evidence for this claim comes from a phenomenon called motorvisual priming. Motorvisual priming refers to the finding that action planning directly affects perception, and that the effects are selective for stimuli that share features with the planned action. Motorvisual priming studies have provided detailed insights into the processing of perceptual representations in action planning. One important finding is that such representations in action planning have a categorical format, whereas metric representations are not anticipated in planning. Further essential findings regard the processing mechanisms and the time course of ideomotor cognition. Perceptual representations of action effects are first activated by action planning and then bound into a compound representation of the action plan. This compound representation is stabilized throughout the course of the action by the shielding of all involved representations from other cognitive processes. Despite a rapid growth in the number of motorvisual priming studies in the current literature, there are still many aspects of ideomotor cognition which have not yet been investigated. These aspects include the scope of ideomotor processing with regard to action types and stimulus types, as well as the exact nature of the binding and shielding mechanisms involved.

  19. On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels

    KAUST Repository

    Zorgui, Marwen

    2014-09-01

    We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to \\'steal\\' only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.

  20. On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2014-01-01

    We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to 'steal' only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.

  1. GENERALIZED MATRIXES OF GALOIS PROTOCOLS EXCHANGE ENCRYPTION KEYS

    Directory of Open Access Journals (Sweden)

    Anatoly Beletsky

    2016-03-01

    Full Text Available The methods of construction of matrix formation the secret protocols legalized subscribers of public communications networks encryption keys. Based key exchange protocols laid asymmetric cryptography algorithms. The solution involves the calculation of one-way functions and is based on the use of generalized Galois arrays of isomorphism relationship with forming elements, and depending on the selected irreducible polynomial generating matrix. A simple method for constructing generalized Galois matrix by the method of filling the diagonal. In order to eliminate the isomorphism of Galois arrays and their constituent elements, limiting the possibility of building one-way functions, Galois matrix subjected to similarity transformation carried out by means of permutation matrices. The variant of the organization of the algebraic attacks on encryption keys sharing protocols and discusses options for easing the consequences of an attack.

  2. Model of key success factors for Business Intelligence implementation

    Directory of Open Access Journals (Sweden)

    Peter Mesaros

    2016-07-01

    Full Text Available New progressive technologies recorded growth in every area. Information-communication technologies facilitate the exchange of information and it facilitates management of everyday activities in enterprises. Specific modules (such as Business Intelligence facilitate decision-making. Several studies have demonstrated the positive impact of Business Intelligence to decision-making. The first step is to put in place the enterprise. The implementation process is influenced by many factors. This article discusses the issue of key success factors affecting to successful implementation of Business Intelligence. The article describes the key success factors for successful implementation and use of Business Intelligence based on multiple studies. The main objective of this study is to verify the effects and dependence of selected factors and proposes a model of key success factors for successful implementation of Business Intelligence. Key success factors and the proposed model are studied in Slovak enterprises.

  3. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  4. Exploring drivers and barriers to sustainability green business practices within small medium sized enterprises: primary findings

    Directory of Open Access Journals (Sweden)

    Amir Aghelie

    2017-03-01

    Full Text Available Presently the conducted studies on how SMEs should integrate sustainability align with their core business principle is limited. Most of the discussion on this field is emphasized to address issues for larger organizations and very limited effort on small firms. The drivers and barriers of approaching sustainability practices in SMEs are different from those in large organizations since SMEs lack technical specialist, experience and money required to make such strategy. Since SMEs play a significant role in nation’s economic growth, it is essential to study and find their drivers and barriers toward sustainability business practices constitutes main motivation of this paper. This is a primary finding that aims to understand the SME motivation and barriers that are facing in implementing green sustainable business practices to offer insight look to small firms to find key factors that influence adoption of sustainability business approach within their management practices.

  5. Three key points along an intrinsic reaction coordinate

    Indian Academy of Sciences (India)

    Unknown

    Abstract. The concept of the reaction force is presented and discussed in detail. For typical processes with energy barriers, it has a universal form which defines three key points along an intrinsic reaction co- ordinate: the force minimum, zero and maximum. We suggest that the resulting four zones be interpreted as involving ...

  6. Discussing dementia-related behaviors during medical visits for people with Alzheimer's disease.

    Science.gov (United States)

    Hunsaker, Amanda E; Schmidt, Karen; Lingler, Jennifer H

    2010-05-01

    Research suggests that caregivers appreciate support from primary care physicians (PCPs) regarding dementia care; however, there remains a need for studies examining the role that PCPs play in behavior management. The purpose of this study was to quantitatively characterize the discussion on dementia-related behaviors (DRBs) during PCP visits and compare findings to an independently administered assessment of DRBs exhibited within a period of 4 weeks prior to the PCP visit. Twenty-five PCP visits of persons with dementia, in which caregivers coattended the visit, were audio-recorded and analyzed for occurrence of DRB discussion. Disruptive behaviors were reported by 80% of caregivers via independent assessment, yet discussed in 23% of medical visits. Dementia-related behavior discussion occurred in visits where caregivers independently reported significantly higher behavior frequency and behavior-related burden. Implications of findings for ways PCPs can assist the caregiver in behavior management are discussed.

  7. Trojan horse attacks on counterfactual quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Xiuqing, E-mail: xqqyang@163.com [School of Science, Beijing Jiaotong University, Beijing 100044 (China); College of Science, Inner Mongolia University of Technology, 010051 Hohhot (China); Wei, Kejin; Ma, Haiqiang [School of Science, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Sun, Shihai, E-mail: shsun@nudt.edu.cn [Department of Physics, National University of Defense Technology, Changsha 410073 (China); Du, Yungang [College of Science, Inner Mongolia University of Technology, 010051 Hohhot (China); Wu, Lingan [Laboratory of Optical Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100080 (China)

    2016-04-22

    There has been much interest in “counterfactual quantum cryptography” (T.-G. Noh, 2009 [10]). It seems that the counterfactual quantum key distribution protocol without any photon carrier through the quantum channel provides practical security advantages. However, we show that it is easy to break counterfactual quantum key distribution systems in practical situations. We introduce the two types of Trojan horse attacks that are available for the two-way protocol and become possible for practical counterfactual systems with our eavesdropping schemes. - Highlights: • We find the attacks available for the two-way protocol become possible for the practical counterfactual systems. • It does not require the assumption that it works on the counterfactual systems only in a finite key scenario. • Compared to the other attack models, our scheme is relatively simple for an eavesdropper.

  8. Good Research and Faculty Buy-in: 2 Keys to Effective Marketing

    Science.gov (United States)

    Blumenstyk, Goldie

    2008-01-01

    Effective marketing requires more than a sleek new logo. This article presents excerpts of an online discussion on the dos and don'ts of college marketing with Mary R. Stagaman, associate vice president for external relations at the University of Cincinnati. In this discussion, she noted that good research and faculty buy-in are the two keys to…

  9. Prospecting and exploration of the Key Lake uranium deposits, Saskatchewan, Canada

    International Nuclear Information System (INIS)

    Tan, B.H.

    1980-01-01

    The research activities which led to the detection of the Key Lake deposit and their model character for uranium prospecting in this area are discussed. The genesis of the ores and the surrounding rocks are described, and the possible genesis of the deposit is discussed on the basis of the present state of knowledge. (HP) [de

  10. Methodological challenges in qualitative content analysis: A discussion paper.

    Science.gov (United States)

    Graneheim, Ulla H; Lindgren, Britt-Marie; Lundman, Berit

    2017-09-01

    This discussion paper is aimed to map content analysis in the qualitative paradigm and explore common methodological challenges. We discuss phenomenological descriptions of manifest content and hermeneutical interpretations of latent content. We demonstrate inductive, deductive, and abductive approaches to qualitative content analysis, and elaborate on the level of abstraction and degree of interpretation used in constructing categories, descriptive themes, and themes of meaning. With increased abstraction and interpretation comes an increased challenge to demonstrate the credibility and authenticity of the analysis. A key issue is to show the logic in how categories and themes are abstracted, interpreted, and connected to the aim and to each other. Qualitative content analysis is an autonomous method and can be used at varying levels of abstraction and interpretation. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Key Frame Extraction in the Summary Space.

    Science.gov (United States)

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  12. Key Research Issues in Clostridium difficile

    Directory of Open Access Journals (Sweden)

    George Zhanel

    2005-01-01

    Full Text Available Clostridium difficile is an emerging pathogen that causes C difficile-associated diarrhea, an important nosocomial infection. Control of this infection remains a challenge, and much needs to be determined about the antimicrobial resistance of the organism, antibiotic stewardship, contamination of the patient environment, and various host factors that determine susceptibility or resistance to infection. A national symposium focusing on C difficile infections, the Clostridium difficile Symposium on Emerging Issues and Research, was hosted on November 23, 2004, by the Department of Medical Microbiology and Infectious Diseases at the University of Manitoba, Winnipeg, Manitoba, in partnership with the Canadian Institutes of Health Research. This symposium, which aimed to summarize key research issues regarding C difficile infections in Canada, had the following objectives: to provide a forum for learning and discussion about C difficile and its impact on the health of Canadians; to identify the key research issues that should be addressed; and to explore potential research funding opportunities and collaboration. The present report summarizes key research issues identified for C difficile infections in Canada by addressing four major themes: diagnosis and surveillance, infection prevention and control, antibiotic stewardship, and clinical management.

  13. Multi-user quantum key distribution based on Bell states with mutual authentication

    International Nuclear Information System (INIS)

    Lin Song; Huang Chuan; Liu Xiaofen

    2013-01-01

    A new multi-user quantum key distribution protocol with mutual authentication is proposed on a star network. Here, two arbitrary users are able to perform key distribution with the assistance of a semi-trusted center. Bell states are used as information carriers and transmitted in a quantum channel between the center and one user. A keyed hash function is utilized to ensure the identities of three parties. Finally, the security of this protocol with respect to various kinds of attacks is discussed. (paper)

  14. Engagement in the HIV Care Continuum among Key Populations in Tijuana, Mexico.

    Science.gov (United States)

    Smith, Laramie R; Patterson, Thomas L; Magis-Rodriguez, Carlos; Ojeda, Victoria D; Burgos, Jose Luis; Rojas, Sarah A; Zúñiga, María Luisa; Strathdee, Steffanie A

    2016-05-01

    In Tijuana, Mexico, HIV is concentrated in sub-epidemics of key populations: persons who inject drugs (PWID), sex workers (SW), and men who have sex with men (MSM). To date, data on engagement in the HIV care continuum among these key populations, particularly in resource-constrained settings, are sparse. We pooled available epidemiological data from six studies (N = 3368) to examine HIV testing and treatment uptake in these key populations; finding an overall HIV prevalence of 5.7 %. Of the 191 identified HIV-positive persons, only 11.5 % knew their HIV-positive status and 3.7 % were on ART. Observed differences between these HIV-positive key populations suggest PWID (vs. non-PWID) were least likely to have previously tested or initiate HIV care. MSM (vs. non-MSM) were more likely to have previously tested but not more likely to know their HIV-positive status. Of persons aware of their HIV-positive status, SW (vs. non-SW) were more likely to initiate HIV care. Findings suggest engagement of key populations in HIV treatment is far below estimates observed for similarly resource-constrained generalized epidemics in sub-Saharan Africa. These data provide one of the first empirical-snapshots highlighting the extent of HIV treatment disparities in key populations.

  15. Power quality event classification: an overview and key issues ...

    African Journals Online (AJOL)

    ... used for PQ events' classifications. Various artificial intelligent techniques which are used in PQ event classification are also discussed. Major Key issues and challenges in classifying PQ events are critically examined and outlined. Keywords: Power quality, PQ event classifiers, artificial intelligence techniques, PQ noise, ...

  16. KEY LINES TO IMPROVE COMPETITIVENESS OF SMALL INNOVATIVE BUSINESSES

    Directory of Open Access Journals (Sweden)

    K. Yu. Reshetov

    2015-01-01

    Full Text Available The study discusses the importance of small innovative businesses in the modern global economy. The article also deals with the key lines to improve their competitiveness, and the author makes the conclusion how spread and promising the strategies are in Russia.

  17. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  18. Evaluating Critical Thinking in Computer Mediated Communication Discussions

    Directory of Open Access Journals (Sweden)

    Faizah Mohamad

    2008-06-01

    Full Text Available This paper presents an investigation of whether computer mediated communication (CMC can develop critical thinking in language classrooms. The research was conducted at a university branch campus in Malaysia over a period of 12 weeks. It involved three groups of learners in which each group was exposed to different discussion modes. The first group was exposed to a CMC discussion mode, the second group was exposed to a mixed mode of CMC and face-to-face (F2F discussions and the third group had only the face-to-face mode of discussion. The critical thinking development in these three conditions was evaluated based on the content analysis method used by Newman, Johnson, Cochrane and Webb (1995. This research reports the findings which hopefully will give some insight to other teaching practitioners who are interested in incorporating IT in their classrooms

  19. Key Findings of AAP Store Survey

    Science.gov (United States)

    Melendes, Bob; And Others

    1977-01-01

    Results of the Association of American Publishers "College Bookstore Marketing Survey" in the fall of 1976 are summarized. The intent was to improve college textbook publisher services to college stores in the areas of order fulfillment, publication scheduling, print quantities, shipping, billing, and processing of returns. (LBH)

  20. Key finding and messages (Rapporteur's report)

    International Nuclear Information System (INIS)

    Brown, Peter

    2003-01-01

    It is clear that the fundamental environmental principle of User Pays is being applied to waste management. This is very important, as the principle is one of the basic tenets of the environmental movement. For Radioactive waste management to be in accord with the principle is a powerful and positive statement. There are Acts of Parliament, Decrees, or Directives, which provide the authority for the funds to be established and preserved. This is important as it demonstrates, at the highest possible level, that there will be funds available to deal with the issue of waste management, including disposal, in the future. This is a powerful message that makes clear that the issue is important and that it will be addressed. Some countries establish decommissioning and waste management funds together. In other cases the two funds are separate. In addition to a moral requirement based in the principle of User Pays, and a legal requirement to establish funds for decommissioning and/or disposal there is a clear statement in the IAEA Convention on Safety or Spent Fuel and Radioactive Waste Management (1997) that adequate financial resources be available for long-term management and disposal. These three fundamental requirements clearly signal that this is an important financial issue, and that the nuclear community takes it seriously. We clearly pay homage to the principle of User Pays and have identified the requirement to establish funds not only in state legislation but also as a requirement in an international convention. Clearly there is a capability to determine the dimension and magnitude of all of the potential waste liabilities and to develop a waste management strategy to deal with these liabilities. However, the cost estimation of these liabilities contain considerable uncertainties as they are projected over many years into the future. There are considerable uncertainties related to the growth of the funds as a result of the chosen investment strategy, the management/mismanagement of the fund, and the inflation rate. These suggest that a balance is required between the rate of return and the preservation of the fund value in order to preserve the fund value for future implementation of waste management and/or disposal programs. Sooner is better than later in order to reduce these liabilities. However, the decisions related to implementation are clearly within the purview of society and governments

  1. Physician-patient discussions of controversial cancer screening tests.

    Science.gov (United States)

    Dunn, A S; Shridharani, K V; Lou, W; Bernstein, J; Horowitz, C R

    2001-02-01

    Screening mammography for younger women and prostate-specific antigen (PSA) measurement have controversial benefits and known potential adverse consequences. While providing informed consent and eliciting patient preference have been advocated for these tests, little is known about how often these discussions take place or about barriers to these discussions. We administered a survey to medical house staff and attending physicians practicing primary care. The survey examined physicians' likelihood of discussing screening mammography and PSA testing, and factors influencing the frequency and quality of these discussions. For the three scenarios, 16% to 34% of physicians stated that they do not discuss the screening tests. The likelihood of having a discussion was significantly associated with house staff physicians' belief that PSA screening is advantageous; house staff and attending physicians' intention to order a PSA test, and attending physicians' intention to order a mammogram; and a controversial indication for screening. The most commonly identified barriers to discussions were lack of time, the complexity of the topic, and a language barrier. Physicians report they often do not discuss cancer screening tests with their patients. Our finding that physicians' beliefs and intention to order the tests, and extraneous factors such as time constraints and a language barrier, are associated with discussions indicates that some patients may be inappropriately denied the opportunity to choose whether to screen for breast and prostate cancer.

  2. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  3. Mourning and melancholia revisited: correspondences between principles of Freudian metapsychology and empirical findings in neuropsychiatry.

    Science.gov (United States)

    Carhart-Harris, Robin L; Mayberg, Helen S; Malizia, Andrea L; Nutt, David

    2008-07-24

    Freud began his career as a neurologist studying the anatomy and physiology of the nervous system, but it was his later work in psychology that would secure his place in history. This paper draws attention to consistencies between physiological processes identified by modern clinical research and psychological processes described by Freud, with a special emphasis on his famous paper on depression entitled 'Mourning and melancholia'. Inspired by neuroimaging findings in depression and deep brain stimulation for treatment resistant depression, some preliminary physiological correlates are proposed for a number of key psychoanalytic processes. Specifically, activation of the subgenual cingulate is discussed in relation to repression and the default mode network is discussed in relation to the ego. If these correlates are found to be reliable, this may have implications for the manner in which psychoanalysis is viewed by the wider psychological and psychiatric communities.

  4. Factors influencing subject selection in upper secondary education (Key Stage 4 for males and females in England

    Directory of Open Access Journals (Sweden)

    Joanne Vaughan

    2015-08-01

    Full Text Available Background Research to date has investigated the potential factors that influence students’ decisions in opting to study certain subjects during their upper secondary education. Trends in subject selection at this level (Key Stage 4 have been maintained over time and have consistently displayed comparable differences for males and females. It is recognised that males typically opt for subjects such as physical education and science, while females are traditionally noted as favouring the arts and humanities. These educational decisions may impact on future occupational directions. In light of recent initiatives, such as the English Baccalaureate, it is of interest to explore whether such measures have had an influence on this noted gender gap. Participants and procedure The present study investigates the potential predictors of subject selection, while controlling for gender, offering a specific focus on the education system in England. Attention is given to students’ perceived academic ability and attitude toward school, and how such factors may guide subject choice. Participants (N = 276 were students currently in the process of selecting optional modules for Key Stage 4 study. Results The findings demonstrate that female students are less likely than their male counterparts to opt for physical education (PE and business studies/information and communication technology (ICT as preferred modules, in comparison to ‘creative and performance’ subjects (reference category. Higher levels of reported masculinity were also shown to relate to the up-take of PE at Key Stage 4. Conclusions The implications of these findings are discussed in relation to existing research and practical contributions to the educational arena.

  5. Discussion on building safety culture inside a nuclear safety regulatory body

    International Nuclear Information System (INIS)

    Fan Yumao

    2013-01-01

    A strong internal safety culture plays a key role in improving the performance of a nuclear regulatory body. This paper discusses the definition of internal safety culture of nuclear regulatory bodies, and explains the functions that the safety culture to facilitate the nuclear safety regulation and finally puts forward some thoughts about building internal safety culture inside regulatory bodies. (author)

  6. A Peek into the Life of Online Learning Discussion Forums: Implications for Web-Based Distance Learning

    Science.gov (United States)

    Allan, Mary

    2004-01-01

    Supporting quality learning in online discussion forums is an intricate task, particularly for e-tutors aspiring to facilitate vigorous interactive learning environments. I argue that the key to successful online discussion forums is the ability of e-tutors to provide learners with feedback well informed in the meaning making and knowledge…

  7. Village health volunteers: key issues facing agencies in Malawi ...

    African Journals Online (AJOL)

    The participants discussed recruitment, training, rewards, retention, and roles of village health volunteers. This paper presents background data on village health volunteers in Malawi and elsewhere and reviews the key issues facing health care providers in working with village health volunteers. A copy of the workshop ...

  8. Imaging findings in fetal diaphragmatic abnormalities

    Energy Technology Data Exchange (ETDEWEB)

    Alamo, Leonor; Gudinchet, Francois [University Hospital Center of Lausanne, Unit of Radiopediatrics, Department of Radiology, Lausanne (Switzerland); Meuli, Reto [University Hospital Center of Lausanne, Department of Radiology, Lausanne (Switzerland)

    2015-12-15

    Imaging plays a key role in the detection of a diaphragmatic pathology in utero. US is the screening method, but MRI is increasingly performed. Congenital diaphragmatic hernia is by far the most often diagnosed diaphragmatic pathology, but unilateral or bilateral eventration or paralysis can also be identified. Extralobar pulmonary sequestration can be located in the diaphragm and, exceptionally, diaphragmatic tumors or secondary infiltration of the diaphragm from tumors originating from an adjacent organ have been observed in utero. Congenital abnormalities of the diaphragm impair normal lung development. Prenatal imaging provides a detailed anatomical evaluation of the fetus and allows volumetric lung measurements. The comparison of these data with those from normal fetuses at the same gestational age provides information about the severity of pulmonary hypoplasia and improves predictions about the fetus's outcome. This information can help doctors and families to make decisions about management during pregnancy and after birth. We describe a wide spectrum of congenital pathologies of the diaphragm and analyze their embryological basis. Moreover, we describe their prenatal imaging findings with emphasis on MR studies, discuss their differential diagnosis and evaluate the limits of imaging methods in predicting postnatal outcome. (orig.)

  9. Road map for selected key measurements from LHCb

    CERN Document Server

    Adeva, B.; Affolder, A.; Ajaltouni, Z.; Albrecht, J.; Alessio, F.; Alexander, M.; Alvarez Cartelle, P.; Alves, A.A., Jr; Amato, S.; Amhis, Y.; Amoraal, J.; Anderson, J.; Aquines Gutierrez, O.; Arrabito, L.; Artuso, M.; Aslanides, E.; Auriemma, G.; Bachmann, S.; Bagaturia, Y.; Bailey, D.S.; Balagura, V.; Baldini, W.; Pazos, MdC.Barandela; Barlow, R.J.; Barsuk, S.; Bates, A.; Bauer, C.; Bauer, Th.; Bay, A.; Bediaga, I.; Belous, K.; Belyaev, I.; Benayoun, M.; Bencivenni, G.; Bernet, R.; Bettler, M.O.; Bizzeti, A.; Blake, T.; Blanc, F.; Blanks, C.; Blouw, J.; Blusk, S.; Bobrov, A.; Bocci, V.; Bondar, A.; Bondar, N.; Bonivento, W.; Borghi, S.; Borgia, A.; Bos, E.; Bowcock, T.J.V.; Bozzi, C.; Bressieux, J.; Brisbane, S.; Britsch, M.; Brook, N.H.; Brown, H.; Buchler-Germann, A.; Buytaert, J.; Cachemiche, J.P.; Cadeddu, S.; Caicedo Carvajal, J.M.; Callot, O.; Calvi, M.; Calvo Gomez, M.; Camboni, A.; Cameron, W.; Campana, P.; Carbone, A.; Carboni, G.; Cardini, A.; Carson, L.; Carvalho Akiba, K.; Casse, G.; Cattaneo, M.; Charles, M.; Charpentier, Ph.; Chlopik, A.; Ciambrone, P.; Cid Vidal, X.; Clark, P.J.; Clarke, P.E.L.; Clemencic, M.; Cliff, H.V.; Closier, J.; Coca, C.; Coco, V.; Cogan, J.; Collins, P.; Constantin, F.; Conti, G.; Contu, A.; Corti, G.; Cowan, G.A.; D'Almagne, B.; D'Ambrosio, C.; d'Enterria, D.G.; Da Silva, W.; David, P.; De Bonis, I.; De Capua, S.; De Cian, M.; De Lorenzi, F.; De Miranda, J.M.; De Paula, L.; De Simone, P.; De Vries, H.; Decamp, D.; Degaudenzi, H.; Deissenroth, M.; Del Buono, L.; Deplano, C.; Deschamps, O.; Dettori, F.; Dickens, J.; Dijkstra, H.; Dima, M.; Donleavy, S.; Reis, A.C.dos; Dovbnya, A.; Pree, T.Du; Duval, P.Y.; Dwyer, L.; Dzhelyadin, R.; Eames, C.; Easo, S.; Egede, U.; Egorychev, V.; Eisele, F.; Eisenhardt, S.; Eklund, L.; Esperante Pereira, D.; Esteve, L.; Eydelman, S.; Fanchini, E.; Farber, C.; Fardell, G.; Farinelli, C.; Farry, S.; Fave, V.; Fernandez Albor, V.; Ferro-Luzzi, M.; Filippov, S.; Fitzpatrick, C.; Fontanelli, F.; Forty, R.; Frank, M.; Frei, C.; Frosini, M.; Fungueirino Pazos, J.L.; Furcas, S.; Gallas Torreira, A.; Galli, D.; Gandelman, M.; Gao, Y.; Garnier, J-C.; Garrido, L.; Gaspar, C.; Gauvin, N.; Gersabeck, M.; Gershon, T.; Ghez, Ph.; Gibson, V.; Gilitsky, Yu.; Gligorov, V.V.; Gobel, C.; Golubkov, D.; Golutvin, A.; Gomes, A.; Grabalosa Gandara, M.; Graciani Diaz, R.; Granado Cardoso, L.A.; Grauges, E.; Graziani, G.; Grecu, A.; Guerrer, G.; Gushchin, E.; Guz, Yu.; Guzik, Z.; Gys, T.; Hachon, F.; Haefeli, G.; Haines, S.C.; Hampson, T.; Hansmann-Menzemer, S.; Harji, R.; Harnew, N.; Harrison, P.F.; He, J.; Hennessy, K.; Henrard, P.; Hernando Morata, J.A.; Hicheur, A.; Hicks, E.; Hofmann, W.; Holubyev, K.; Hopchev, P.; Hulsbergen, W.; Hunt, P.; Huse, T.; Huston, R.S.; Hutchcroft, D.; Iakovenko, V.; Escudero, C.Iglesias; Imong, J.; Jacobsson, R.; Jahjah Hussein, M.; Jans, E.; Jansen, F.; Jaton, P.; Jean-Marie, B.; John, M.; Jones, C.R.; Jost, B.; Kapusta, F.; Karbach, T.M.; Keaveney, J.; Kerzel, U.; Ketel, T.; Keune, A.; Khalil, S.; Khanji, B.; Kim, Y.M.; Knecht, M.; Knopf, J.; Koblitz, S.; Konoplyannikov, A.; Koppenburg, P.; Korolko, I.; Kozlinskiy, A.; Krasowski, M.; Kravchuk, L.; Krokovny, P.; Kruzelecki, K.; Kucharczyk, M.; Kudryashov, I.; Kvaratskheliya, T.; Lacarrere, D.; Lai, A.; Lambert, R.W.; Lanfranchi, G.; Langenbruch, C.; Latham, T.; Le Gac, R.; Lefevre, R.; Leflat, A.; Lefrancois, J.; Leroy, O.; Lessnoff, K.; Li, L.; Li, Y.Y.; Libby, J.; Lieng, M.; Lindner, R.; Lindsey, S.; Linn, C.; Liu, B.; Liu, G.; Lopes, J.H.; Lopez Asamar, E.; Luisier, J.; Machefert, F.; Machikhiliyan, I.; Maciuc, F.; Maev, O.; Magnin, J.; Maier, A.; Mamunur, R.M.D.; Manca, G.; Mancinelli, G.; Mangiafave, N.; Marconi, U.; Marin, F.; Marks, J.; Martellotti, G.; Martens, A.; Martin, L.; Martinez Santos, D.; Mathe, Z.; Matteuzzi, C.; Matveev, V.; Mazurov, A.; McGregor, G.; Mcharek, B.; Mclean, C.; McNulty, R.; Merk, M.; Merkel, J.; Merkin, M.; Messi, R.; Metlica, F.C.D.; Michalowski, J.; Miglioranzi, S.; Minard, M.N.; Monteil, S.; Moran, D.; Morris, J.V.; Mountain, R.; Mous, I.; Muheim, F.; Muresan, R.; Murtas, F.; Muryn, B.; Musy, M.; Mylroie-Smith, J.; Naik, P.; Nakada, T.; Nandakumar, R.; Nardulli, J.; Natkaniec, Z.; Nedos, M.; Needham, M.; Neufeld, N.; Nicolas, L.; Nies, S.; Niess, V.; Nikitin, N.; Noor, A.; Oblakowska-Mucha, A.; Obraztsov, V.; Oggero, S.; Okhrimenko, O.; Oldeman, R.; Orlandea, M.; Ostankov, A.; Palacios, J.; Palutan, M.; Panman, J.; Papadelis, A.; Papanestis, A.; Pappagallo, M.; Parkes, C.; Passaleva, G.; Patel, G.D.; Patel, M.; Paterson, S.K.; Patrick, G.N.; Pauna, E.; Pauna, C.; Pavel, C.; Pazos Alvarez, A.; Pellegrino, A.; Penso, G.; Pepe Altarelli, M.; Perazzini, S.; Perego, D.L.; Perez-Calero Yzquierdo, A.; Perez Trigo, E.; Perret, P.; Pessina, G.; Petrella, A.; Petrolini, A.; Pietrzyk, B.; Pinci, D.; Playfer, S.; Plo Casasus, M.; Polok, G.; Poluektov, A.; Polycarpo, E.; Popov, D.; Popovici, B.; Poss, S.; Potterat, C.; Powell, A.; Pozzi, S.; Pugatch, V.; Puig Navarro, A.; Qian, W.; Rademacker, J.H.; Rakotomiaramanana, B.; Raniuk, I.; Raven, G.; Redford, S.; Reece, W.; Ricciardi, S.; Rinnert, K.; Robbe, P.; Rodrigues, E.; Rodrigues, F.; Rodriguez Cobo, C.; Rodriguez Perez, P.; Rogers, G.J.; Romanovsky, V.; Rospabe, G.; Ruf, T.; Ruiz, H.; Sabatino, G.; Saborido Silva, J.J.; Sagidova, N.; Saitta, B.; Salzmann, C.; Sambade Varela, A.; Sannino, M.; Santacesaria, R.; Santinelli, R.; Santovetti, E.; Sapunov, M.; Sarti, A.; Satriano, C.; Satta, A.; Savrie, M.; Savrina, D.; Schaack, P.; Schiller, M.; Schleich, S.; Schmelling, M.; Schmidt, B.; Schneider, O.; Schopper, A.; Schune, M.H.; Schwemmer, R.; Sciubba, A.; Seco, M.; Semennikov, A.; Senderowska, K.; Serra, N.; Serrano, J.; Shao, B.; Shapkin, M.; Shapoval, I.; Shatalov, P.; Shcheglov, Y.; Shears, T.; Shekhtman, L.; Shevchenko, V.; Simioni, E.; Skottowe, H.P.; Skwarnicki, T.; Smith, A.C.; Sobczak, K.; Soler, F.J.P.; Solomin, A.; Somogy, P.; Soomro, F.; De Paula, B.Souza; Spaan, B.; Sparkes, A.; Spiridenkov, E.; Spradlin, P.; Stagni, F.; Steinkamp, O.; Stoica, S.; Stone, S.; Straumann, U.; Styles, N.; Syryczynski, K.; Szczekowski, M.; Szczypka, P.; Szumlak, T.; T'Jampens, S.; Terrier, H.; Teubert, F.; Thomas, C.; Thomas, E.; Tobin, M.; Topp-Joergensen, S.; Tran, M.T.; Traynor, S.; Tsaregorodtsev, A.; Tuning, N.; Ukleja, A.; Ullaland, O.; Uwer, U.; Vagnoni, V.; Valenti, G.; van Beuzekom, M.; van den Brand, J.; van Eijk, D.; van Herwijnen, E.; van Lysebetten, A.; van Tilburg, J.; Vazquez Gomez, R.; Vazquez Regueiro, P.; Vecchi, S.; Velthuis, J.J.; Veltri, M.; Vervink, K.; Viaud, B.; Videau, I.; Vilasis-Cardona, X.; Vollhardt, A.; Vorobyev, A.; Vorobyev, An.; Voss, H.; Wacker, K.; Wandernoth, S.; Wang, J.; Ward, D.R.; Websdale, D.; Whitehead, M.; Wiedner, D.; Wiggers, L.; Wilkinson, G.; Williams, M.; Wilson, F.F.; Witek, M.; Witzeling, W.; Wotton, S.A.; Wyllie, K.; Xie, Y.; Xing, F.; Yang, Z.; Ybeles Smit, G.; Young, R.; Yushchenko, O.; Zhang, L.; Zhang, Y.; Zhelezov, A.; Zwahlen, N.

    2010-01-01

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  10. Adaptation to climate change. Key terms

    International Nuclear Information System (INIS)

    Levina, E.; Tirpak, D.

    2006-05-01

    Adaptation has become an important issue in international and domestic discussions on climate change. Numerous terms and concepts have come into common usage as a result of IPCC reports, discussions in the context of the UNFCCC and dialogs by the climate community at large. This paper examines the key adaptation terms and concepts used by the climate change community and other institutions. Conflicts and contradictions are noted with the aim of sensitizing different bodies to the differences, but particularly the Parties to the Convention and experts participating in the IPCC. Given the need to promote a common understanding among various stakeholders and the potential financial implications of various definitions, it appears important for the IPCC and the UNFCCC to work toward common definitions, at least for a core set of terms and concepts

  11. Unconditional security of quantum key distribution and the uncertainty principle

    International Nuclear Information System (INIS)

    Koashi, Masato

    2006-01-01

    An approach to the unconditional security of quantum key distribution protocols is presented, which is based on the uncertainty principle. The approach applies to every case that has been treated via the argument by Shor and Preskill, but it is not necessary to find quantum error correcting codes. It can also treat the cases with uncharacterized apparatuses. The proof can be applied to cases where the secret key rate is larger than the distillable entanglement

  12. Workplace Integration: Key Considerations for Internationally Educated Nurses and Employers

    Directory of Open Access Journals (Sweden)

    Zubeida Ramji

    2018-02-01

    Full Text Available Integration of internationally educated nurses (IENs in the workplace over the long term, has not been a clear focus in nursing. The role of the employer organization in facilitating workplace integration for IENs has also not been emphasized in research. The overall aim of this paper is to highlight findings from an instrumental qualitative case study research informed by critical social theory, which examined workplace integration of IENs. The study explored what is meant by ‘integration’ and how the employer organizational context affects workplace integration of IENs. A purposeful sample of twenty-eight participants was involved. The participants included: stakeholders from various vantage points within the case organization as well as IENs from diverse backgrounds who were beyond the process of transitioning into the Canadian workplace—they had worked in Canada for an average of eleven years. Four methods of data collection were used: semi-structured interviews; socio-demographic survey; review of documents; and focus group discussions (FGDs. Thematic analysis methods guided the within subcase analysis first, followed by an across subcase analysis. FGDs were used as a platform for member-checking to establish the credibility of study findings. The resulting definition and conceptual framework point to workplace integration of IENs as a two-way process requiring efforts on the part of the IENs as well as the employer organization. This paper elaborates on selected themes of how beyond transition, workplace integration entails IENs progressing on their leadership journey, while persevering to overcome challenges. Organizational factors such as workforce diversity, leadership commitment to equity and engagement with the broader community serve as critical enablers and the importance of workplaces striving to avoid common pitfalls in addressing the priority of IEN integration are also discussed. This paper concludes with implications and

  13. Table talk: How mothers and adolescents across socioeconomic status discuss food.

    Science.gov (United States)

    Fielding-Singh, Priya; Wang, Jennifer

    2017-08-01

    This article reports findings from a qualitative study of food practices among families of differing socioeconomic circumstances. Using in-depth interviews from sixty-two families in the San Francisco Bay Area in 2015-2016, we find socioeconomic differences in how mothers and adolescents talk about food. Across SES, mothers and adolescents engage in discussions about healthy eating. However, these conversations are more commonplace and embedded within high-SES family life than among low-SES families. Beyond conversations about 1) healthy eating, the topics of 2) food quality and 3) price are discussed to varying degrees across SES. Within high-SES families, frequent discussions of healthy eating are paired with dialogue highlighting the importance of consuming higher quality food. Price is largely absent as a topic of conversation among high-SES families. On the other end of the socioeconomic spectrum, low-SES mothers and adolescents frequently engage in conversations about price when discussing food. Mentions of food quality are rare, but when they do occur, they underscore important trade-offs between food's healthiness, quality and price. Given prior research showing the impact of dialogue between parents and adolescents on adolescents' dietary behaviors, these findings help us understand how family discussions contribute to shaping adolescents' approaches to food. An important implication is that high-SES families' discussions of food quality may strengthen messages about healthy eating, while conversations about affordability within low-SES families may highlight financial barriers to healthy eating. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Continuous Variable Quantum Key Distribution Using Polarized Coherent States

    Science.gov (United States)

    Vidiella-Barranco, A.; Borelli, L. F. M.

    We discuss a continuous variables method of quantum key distribution employing strongly polarized coherent states of light. The key encoding is performed using the variables known as Stokes parameters, rather than the field quadratures. Their quantum counterpart, the Stokes operators Ŝi (i=1,2,3), constitute a set of non-commuting operators, being the precision of simultaneous measurements of a pair of them limited by an uncertainty-like relation. Alice transmits a conveniently modulated two-mode coherent state, and Bob randomly measures one of the Stokes parameters of the incoming beam. After performing reconciliation and privacy amplification procedures, it is possible to distill a secret common key. We also consider a non-ideal situation, in which coherent states with thermal noise, instead of pure coherent states, are used for encoding.

  15. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken......“Now I can actually play soccer with the young people without fearing that my colleagues think I am escaping the paper work.” These were the words from a participant in a social pedagogy training course in England a few years ago. This understanding emerged through in-depth discussions...

  16. Employees as Individually and Collectively Acting Subjects—Key Contributions from Nordic Working Life Research

    Directory of Open Access Journals (Sweden)

    Peter Hasle

    2013-09-01

    Full Text Available The Nordic countries—Denmark, Finland, Iceland, Norway, and Sweden—are societies that share many features among themselves that also distinguish them from other industrialized countries. The paper poses the question whether the distinct character of the Nordic societies has generated working life research that is clearly distinguishable from similar research in other countries in terms of distinctness in topics, methods, empirical findings, or theoretical concepts. The aim of this paper is to answer this question by identifying, analyzing, and discussing selected key contributions from Nordic working life research to understand how they research and construe the conditions of humans at work with a special focus on the psychosocial well-being of industrial workers. The paper concludes that the key contributions to Nordic working life research have a distinctive emphasis on collective employee voice and autonomy and an extensive use of empirical and actionoriented research methods. Employees are construed not only as workers resisting exploitations from management or as workers pursuing individual careers, but also as members of collectives who share ideas and aspirations and who legitimately influence the management (and research using cooperation and pressure.

  17. The University of Canberra quantum key distribution testbed

    International Nuclear Information System (INIS)

    Ganeshkumar, G.; Edwards, P.J.; Cheung, W.N.; Barbopoulos, L.O.; Pham, H.; Hazel, J.C.

    1999-01-01

    Full text: We describe the design, operation and preliminary results obtained from a quantum key distribution (QKD) testbed constructed at the University of Canberra. Quantum cryptographic systems use shared secret keys exchanged in the form of sequences of polarisation coded or phase encoded single photons transmitted over an optical communications channel. Secrecy of this quantum key rests upon fundamental laws of quantum physics: measurements of linear or circular photon polarisation states introduce noise into the conjugate variable and so reveal eavesdropping. In its initial realisation reported here, pulsed light from a 650nm laser diode is attenuated by a factor of 10 6 , plane-polarised and then transmitted through a birefringent liquid crystal modulator (LCM) to a polarisation sensitive single photon receiver. This transmitted key sequence consists of a 1 kHz train of weak coherent 100ns wide light pulses, polarisation coded according to the BB84 protocol. Each pulse is randomly assigned one of four polarisation states (two orthogonal linear and two orthogonal circular) by computer PCA operated by the sender ('Alice'). This quaternary polarisation shift keyed photon stream is detected by the receiver ('Bob') whose computer (PCB) randomly chooses either a linear or a circular polarisation basis. Computer PCB is also used for final key selection, authentication, privacy amplification and eavesdropping. We briefly discuss the realisation of a mesoscopic single photon QKD source and the use of the testbed to simulate a global quantum key distribution system using earth satellites. Copyright (1999) Australian Optical Society

  18. Understanding Protein Synthesis: An Interactive Card Game Discussion

    Science.gov (United States)

    Lewis, Alison; Peat, Mary; Franklin, Sue

    2005-01-01

    Protein synthesis is a complex process and students find it difficult to understand. This article describes an interactive discussion "game" used by first year biology students at the University of Sydney. The students, in small groups, use the game in which the processes of protein synthesis are actioned by the students during a…

  19. Public assessment of key performance indicators of healthcare in a Canadian province: the effect of age and chronic health problems.

    Science.gov (United States)

    Nurullah, Abu Sadat; Northcott, Herbert C; Harvey, Michael D

    2014-01-15

    This study explores the effect of age and chronic conditions on public perceptions of the health system, as measured by the Key Performance Indicators (KPIs) of healthcare, in the province of Alberta in Canada. Drawing from data collected by Government of Alberta's Department of Health and Wellness, this research examines two key questions: (1) Do people in the 65+ age group rate the KPIs of healthcare (i.e., availability, accessibility, quality, outcome, and satisfaction) more favorably compared to people in younger age groups in Alberta? (2) Does the rating of KPIs of healthcare in Alberta vary with different chronic conditions (i.e., no chronic problem, chronic illnesses without pain, and chronic pain)? The findings indicate that people in the older age group tend to rate the KPIs of healthcare more favorably compared to younger age groups in Alberta, net of socio-demographic factors, self-reported health status, and knowledge and utilization of health services. However, people experiencing chronic pain are less likely to rate the KPIs of healthcare favorably compared to people with no chronic health problem in Alberta. Discussion includes implications of the findings for the healthcare system in the province.

  20. Budgeting in an Academic Library: A Lively Lunch Discussion

    OpenAIRE

    Wikoff, Karin

    2017-01-01

    Are you always seeking to improve budgeting in your academic library? Are you fascinated by the challenge of predicting costs for subscriptions? I went on an "Academic Library Budgeting Roadshow," and had discussions with peers at seven other institutions. In this session, I will present a summary of my findings, then pose the same questions to the group. We'll discuss everything from the budget process and timeline, to allocating funds, to predicting subscription costs, to what you do if you...

  1. Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks

    International Nuclear Information System (INIS)

    Patel, K. A.; Dynes, J. F.; Lucamarini, M.; Choi, I.; Sharpe, A. W.; Yuan, Z. L.; Shields, A. J.; Penty, R. V.

    2014-01-01

    We demonstrate quantum key distribution (QKD) with bidirectional 10 Gb/s classical data channels in a single fiber using dense wavelength division multiplexing. Record secure key rates of 2.38 Mbps and fiber distances up to 70 km are achieved. Data channels are simultaneously monitored for error-free operation. The robustness of QKD is further demonstrated with a secure key rate of 445 kbps over 25 km, obtained in the presence of data lasers launching conventional 0 dBm power. We discuss the fundamental limit for the QKD performance in the multiplexing environment

  2. Regional chiefs meet to discuss key issues / Ella Karapetyan

    Index Scriptorium Estoniae

    Karapetyan, Ella

    2009-01-01

    Stockholmis toimunud Põhja- ja Baltimaade peaministrite kohtumisel räägiti energiajulgeolekust, praegusest majandusolukorrast ja detsembris toimuva ÜRO kliimakonverentsi ettevalmistustest. Andrus Ansip rõhutas uue rahvusvahelise kliimalepingu tähtsust

  3. Physician–Patient Discussions of Controversial Cancer Screening Tests

    Science.gov (United States)

    Dunn, Andrew S.; Shridharani, Kanan V.; Lou, Wendy; Bernstein, Jeffrey; Horowitz, Carol R.

    2016-01-01

    Background Screening mammography for younger women and prostate-specific antigen (PSA) measurement have controversial benefits and known potential adverse consequences. While providing informed consent and eliciting patient preference have been advocated for these tests, little is known about how often these discussions take place or about barriers to these discussions. Methods We administered a survey to medical house staff and attending physicians practicing primary care. The survey examined physicians’ likelihood of discussing screening mammography and PSA testing, and factors influencing the frequency and quality of these discussions. Results For the three scenarios, 16% to 34% of physicians stated that they do not discuss the screening tests. The likelihood of having a discussion was significantly associated with house staff physicians’ belief that PSA screening is advantageous; house staff and attending physicians’ intention to order a PSA test, and attending physicians’ intention to order a mammogram; and a controversial indication for screening. The most commonly identified barriers to discussions were lack of time, the complexity of the topic, and a language barrier. Conclusions Physicians report they often do not discuss cancer screening tests with their patients. Our finding that physicians’ beliefs and intention to order the tests, and extraneous factors such as time constraints and a language barrier, are associated with discussions indicates that some patients may be inappropriately denied the opportunity to choose whether to screen for breast and prostate cancer. PMID:11165455

  4. Advanced practice for therapy radiographers - A discussion paper

    International Nuclear Information System (INIS)

    Eddy, Angela

    2008-01-01

    Purpose: The purpose of this discussion paper is to explore issues related to advanced practice for therapy radiographers. Key themes: The paper will focus on key themes that have impacted on advanced practice for therapy radiographers such as government initiatives and policy, confounding terminology associated with advanced practice such as role extension, role expansion, role development, and expert practice. The theory and development of expert practice is explored and paralleled to existing roles in therapy using the Benner model to define stages of professional development and competence. Evidence for advanced practice, and education and training will also be explored. All of these issues will be considered within the perspective of the current clinical and political environment that therapy radiographers operate in. Conclusions: The application of advanced practice can and should incorporate elements of role extension and role development, with some tangible skills ladder to guide and shape the development of potential consultant practitioners. There is a need to identify the current position of advanced practice nationally, and to monitor existing and emerging roles, possibly though a longitudinal study. The skill mix as a whole within departments need to be part of an ongoing evaluation with close collaboration between the professional body, departmental managers and higher education institutes to develop curricula to support existing and emerging roles. There are also key lessons to be learned from other professions with more experience with advanced practitioners if recruitment and retention is not going to continue to be a problem

  5. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  6. Barriers to Managing Fertility: Findings From the Understanding Fertility Management in Contemporary Australia Facebook Discussion Group.

    Science.gov (United States)

    Holton, Sara; Rowe, Heather; Kirkman, Maggie; Jordan, Lynne; McNamee, Kathleen; Bayly, Christine; McBain, John; Sinnott, Vikki; Fisher, Jane

    2016-02-15

    As part of research investigating the complexities of managing fertility in Australia, public opinions about how Australians manage their fertility were sought from women and men. To identify public opinion about sexual and reproductive health in Australia. To ensure access to a diverse group of people throughout Australia, an online group was advertised and convened on Facebook from October through December 2013. In a closed-group moderated discussion, participants responded to questions about how people in Australia attempt to manage three aspects of fertility: avoiding pregnancy, achieving pregnancy, and difficulties conceiving. Nonidentifiable demographic information was sought; no personal accounts of fertility management were requested. The discussion transcript was analyzed thematically. There were 61 female and 2 male Facebook users aged 18 to 50 years living in Australia participating in the study. Four main themes about fertility management were identified: access, geographical location, knowledge, and cost. Participants reported that young people and people from rural areas face barriers accessing contraception and fertility services. Limited knowledge about sex and reproduction and the cost of fertility services and contraception were also said to impede effective fertility management. Reasons for inequalities in effective fertility management that are amenable to change were identified. Facebook is an effective method for gaining insights into public opinion about sexual and reproductive health.

  7. Assessment of Biotechnology Policies and International Trade in Key Markets for U.S. Agriculture

    OpenAIRE

    Marchant, Mary A.; Song, Baohui

    2005-01-01

    The United States leads the world in agricultural biotechnology research, adoption, commercialization, and exports. Our biotech commodities are highly dependent on international markets. Thus, any biotech policy changes by key importing countries may affect U.S. agricultural biotech product exports. This article identifies key markets for U.S. agricultural exports including biotech commodities and discusses current and proposed biotech policies in key markets for U.S. agricultural exports foc...

  8. KEY PERFORMANCE INDICATORS DISCLOSURES BY THE INTEGRATED REPORTING

    Directory of Open Access Journals (Sweden)

    BOBITAN ROXANA-IOANA

    2016-02-01

    Full Text Available We are in a new era of corporate reporting where the corporate reporting landscape was changed. Institutional and small investors, financial analysts and other key stakeholders are demanding more information about long-term strategies and profitability of companies. Also, the increasing complexity of business models, growing awareness of climate change and resource scarcity and communication are expectations of the role of business in the 21st century and which the key of performance indicators (KPIs is. The companies must change the way these KPIs are being incorporated throughout the annual report and how these are linked to the company’s strategy and business model, their risks and risk mitigation, and their incentive schemes. Regarding this, integrated reporting, continue to gain momentum, the spotlight on the depth, breadth and quality of KPIs being reported will only strengthen. The aim of this discussion paper is to describe which are the most important key performance indicators in sprit of integrating reporting. A good and very known example for the integrated reporting is Philips Electronics, the Dutch healthcare and lighting company, a pioneer that embrace this concept, and the paper make an analysis of the most important key performance indicators.

  9. Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data

    Science.gov (United States)

    Fröschle, Sibylle; Steel, Graham

    We extend Delaune, Kremer and Steel’s framework for analysis of PKCS#11-based APIs from bounded to unbounded fresh data. We achieve this by: formally defining the notion of an attribute policy; showing that a well-designed API should have a certain class of policy we call complete; showing that APIs with complete policies may be safely abstracted to APIs where the attributes are fixed; and proving that these static APIs can be analysed in a small bounded model such that security properties will hold for the unbounded case. We automate analysis in our framework using the SAT-based security protocol model checker SATMC. We show that a symmetric key management subset of the Eracom PKCS#11 API, used in their ProtectServer product, preserves the secrecy of sensitive keys for unbounded numbers of fresh keys and handles, i.e. pointers to keys. We also show that this API is not robust: if an encryption key is lost to the intruder, SATMC finds an attack whereby all the keys may be compromised.

  10. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Kizhvatov, Ilya; Manzoor, Kamran

    2016-01-01

    , this algorithm outputs the full combined keys in the optimal order – from more likely to less likely ones. OKEA uses plenty of memory by its nature though, which limits its practical efficiency. Especially in the cases where the side-channel traces are noisy, the memory and running time requirements to find...... the right key can be prohibitively high. To tackle this problem, we propose a score-based key enumeration algorithm (SKEA). Though it is suboptimal in terms of the output order of candidate combined keys, SKEA’s memory and running time requirements are more practical than those of OKEA. We verify...... the advantage at the example of a DPA attack on an 8-bit embedded software implementation of AES-128. We vary the number of traces available to the adversary and report a significant increase in the success rate of the key recovery due to SKEA when compared to OKEA, within practical limitations on time...

  11. Network Information Management: The Key To Providing High WAN Availability.

    Science.gov (United States)

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  12. [Discussion on developing a data management plan and its key factors in clinical study based on electronic data capture system].

    Science.gov (United States)

    Li, Qing-na; Huang, Xiu-ling; Gao, Rui; Lu, Fang

    2012-08-01

    Data management has significant impact on the quality control of clinical studies. Every clinical study should have a data management plan to provide overall work instructions and ensure that all of these tasks are completed according to the Good Clinical Data Management Practice (GCDMP). Meanwhile, the data management plan (DMP) is an auditable document requested by regulatory inspectors and must be written in a manner that is realistic and of high quality. The significance of DMP, the minimum standards and the best practices provided by GCDMP, the main contents of DMP based on electronic data capture (EDC) and some key factors of DMP influencing the quality of clinical study were elaborated in this paper. Specifically, DMP generally consists of 15 parts, namely, the approval page, the protocol summary, role and training, timelines, database design, creation, maintenance and security, data entry, data validation, quality control and quality assurance, the management of external data, serious adverse event data reconciliation, coding, database lock, data management reports, the communication plan and the abbreviated terms. Among them, the following three parts are regarded as the key factors: designing a standardized database of the clinical study, entering data in time and cleansing data efficiently. In the last part of this article, the authors also analyzed the problems in clinical research of traditional Chinese medicine using the EDC system and put forward some suggestions for improvement.

  13. Study findings on evaluation of integrated family planning programme performance.

    Science.gov (United States)

    1980-01-01

    In 1976 the United Nations's Economic and Social Commission for Asia and the Pacific launched a comparative study on integrated family planning programs in a number of countries in the region. In November 1979 the study directors from the participating countries meet in Bangkok to discuss the current status of the studies in their countries. The Korean and Malaysian studies were completed, the Bangladesh study was in the data collecting phase, and the Pakistani research design phase was completed. The meeting participants focused their attention on the findings and policy implications of the 2 completed studies and also discussed a number of theorectical and methodological issues which grew out of their research experience. The Malaysian study indicated that group structure, financial resources, and the frequency and quality of worker-client contact were the most significant variables determining program effectiveness. In the Korean Study, leadership, financial resources, and the frequency and quality of contact between agencies were the key variables in determining program effectiveness. In the Malaysian study there was a positive correlation between maternal and child health service performance measures and family planning service performance measures. This finding supported the contention that these 2 types of service provision are not in conflict with each other but instead serve to reinforce each other. Policy implications of the Korean study were 1) family planning should be an integral part of all community activities; 2) family planning workers should be adequately supported by financial and supply allocations; and 3) adequate record keeping and information exchange procedures should be incorporated in the programs.

  14. Case-based discussion supporting learning and practice in optometry.

    Science.gov (United States)

    Bullock, Alison; Barnes, Emma; Ryan, Barbara; Sheen, Nik

    2014-09-01

    To enhance continuing professional development and address the risk that professional isolation poses, the UK General Optical Council introduced a requirement for all optometrists to engage in at least one case-based discussion per 3 year cycle of continuing education. In this paper, we explore participants' impression of the acceptability, effectiveness and long-term impact-on-practice of case-based discussion as a mode of continuing education. Case-based discussion participants attended an evening session comprising a lecture and a group discussion. They completed three questionnaires: prior to the session, immediately post-session and 3-4 months post-session. We coded the questionnaires to allow matching. Seventy-five case-based discussion groups were held with 379 participants; 377 completed both pre- and post-questionnaires and 331 (88%) returned a follow-up questionnaire. Case-based discussions were an acceptable method of learning, with many preferring it to distance-learning. Prior to the event, women, employees and part-time workers were more likely to have concerns about participating. In terms of learning, gaps in knowledge were more likely to be revealed in those who work in isolation. The respondents highlighted social aspects, reassurance of practice as well as new learning. Participants significantly improved self-confidence ratings in all key learning areas. At three months post-session, the majority (75%) self-reported that they had implemented their intended changes to practice. The evaluation showed that participants felt that case-based discussion developed their knowledge, notably for sole practitioners, and influenced later workplace practice. The peer interaction of this mode of continuing education can combat professional isolation. © 2014 The Authors Ophthalmic & Physiological Optics © 2014 The College of Optometrists.

  15. Knowledge translation of research findings

    Directory of Open Access Journals (Sweden)

    Grimshaw Jeremy M

    2012-05-01

    Full Text Available Abstract Background One of the most consistent findings from clinical and health services research is the failure to translate research into practice and policy. As a result of these evidence-practice and policy gaps, patients fail to benefit optimally from advances in healthcare and are exposed to unnecessary risks of iatrogenic harms, and healthcare systems are exposed to unnecessary expenditure resulting in significant opportunity costs. Over the last decade, there has been increasing international policy and research attention on how to reduce the evidence-practice and policy gap. In this paper, we summarise the current concepts and evidence to guide knowledge translation activities, defined as T2 research (the translation of new clinical knowledge into improved health. We structure the article around five key questions: what should be transferred; to whom should research knowledge be transferred; by whom should research knowledge be transferred; how should research knowledge be transferred; and, with what effect should research knowledge be transferred? Discussion We suggest that the basic unit of knowledge translation should usually be up-to-date systematic reviews or other syntheses of research findings. Knowledge translators need to identify the key messages for different target audiences and to fashion these in language and knowledge translation products that are easily assimilated by different audiences. The relative importance of knowledge translation to different target audiences will vary by the type of research and appropriate endpoints of knowledge translation may vary across different stakeholder groups. There are a large number of planned knowledge translation models, derived from different disciplinary, contextual (i.e., setting, and target audience viewpoints. Most of these suggest that planned knowledge translation for healthcare professionals and consumers is more likely to be successful if the choice of knowledge

  16. Discussing Dementia-Related Behaviors During Medical Visits for People With Alzheimer’s Disease

    Science.gov (United States)

    Hunsaker, Amanda E.; Schmidt, Karen; Lingler, Jennifer H.

    2011-01-01

    Research suggests that caregivers appreciate support from primary care physicians (PCPs) regarding dementia care; however, there remains a need for studies examining the role that PCPs play in behavior management. The purpose of this study was to quantitatively characterize the discussion on dementia-related behaviors (DRBs) during PCP visits and compare findings to an independently administered assessment of DRBs exhibited within a period of 4 weeks prior to the PCP visit. Twenty-five PCP visits of persons with dementia, in which caregivers coattended the visit, were audio-recorded and analyzed for occurrence of DRB discussion. Disruptive behaviors were reported by 80% of caregivers via independent assessment, yet discussed in 23% of medical visits. Dementia-related behavior discussion occurred in visits where caregivers independently reported significantly higher behavior frequency and behavior-related burden. Implications of findings for ways PCPs can assist the caregiver in behavior management are discussed. PMID:20147601

  17. Mourning and melancholia revisited: correspondences between principles of Freudian metapsychology and empirical findings in neuropsychiatry

    Directory of Open Access Journals (Sweden)

    Malizia Andrea L

    2008-07-01

    Full Text Available Abstract Freud began his career as a neurologist studying the anatomy and physiology of the nervous system, but it was his later work in psychology that would secure his place in history. This paper draws attention to consistencies between physiological processes identified by modern clinical research and psychological processes described by Freud, with a special emphasis on his famous paper on depression entitled 'Mourning and melancholia'. Inspired by neuroimaging findings in depression and deep brain stimulation for treatment resistant depression, some preliminary physiological correlates are proposed for a number of key psychoanalytic processes. Specifically, activation of the subgenual cingulate is discussed in relation to repression and the default mode network is discussed in relation to the ego. If these correlates are found to be reliable, this may have implications for the manner in which psychoanalysis is viewed by the wider psychological and psychiatric communities.

  18. Sharing Research Findings with Research Participants and Communities

    Directory of Open Access Journals (Sweden)

    LE Ferris

    2011-06-01

    Full Text Available In occupational and environmental health research, individual, group and community research participants have a unique and vested interest in the research findings. The ethical principles of autonomy, non-maleficence and beneficence are helpful in considering the ethical issues in the disclosure of research findings in occupational and environmental health research. Researchers need to include stakeholders, such as groups and communities, in these discussions and in planning for the dissemination of research findings. These discussions need to occur early in the research process.

  19. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  20. Strategies in Managing Rapport in Classroom Discussion

    OpenAIRE

    Reski Reski

    2018-01-01

    This paper aims to find out the strategies, applied by students in classroom interaction particularly in discussion, to maintain their interpersonal rapport as well as to enhance their rapport management with their fellow students. There are five strategies based on Spencer-Oatey (2008) that the interactants apply in social interactions. The strategies are request, compliments, apologies, gratitude and disagreement. The research is done to see whether the students realize the management of ra...

  1. Barriers to Managing Fertility: Findings From the Understanding Fertility Management in Contemporary Australia Facebook Discussion Group

    Science.gov (United States)

    Rowe, Heather

    2016-01-01

    Background As part of research investigating the complexities of managing fertility in Australia, public opinions about how Australians manage their fertility were sought from women and men. Objective To identify public opinion about sexual and reproductive health in Australia. Methods To ensure access to a diverse group of people throughout Australia, an online group was advertised and convened on Facebook from October through December 2013. In a closed-group moderated discussion, participants responded to questions about how people in Australia attempt to manage three aspects of fertility: avoiding pregnancy, achieving pregnancy, and difficulties conceiving. Nonidentifiable demographic information was sought; no personal accounts of fertility management were requested. The discussion transcript was analyzed thematically. Results There were 61 female and 2 male Facebook users aged 18 to 50 years living in Australia participating in the study. Four main themes about fertility management were identified: access, geographical location, knowledge, and cost. Participants reported that young people and people from rural areas face barriers accessing contraception and fertility services. Limited knowledge about sex and reproduction and the cost of fertility services and contraception were also said to impede effective fertility management. Conclusions Reasons for inequalities in effective fertility management that are amenable to change were identified. Facebook is an effective method for gaining insights into public opinion about sexual and reproductive health. PMID:26878865

  2. Stahlschüssel key to steel

    CERN Document Server

    Wegst, W S

    2016-01-01

    The Key to Steel (Stahlschlüssel/Stahlschluessel) cross reference book will help you to decode / decipher steel designations and find equivalent materials worldwide. The 2016 edition includes more than 70,000 standard designations and trade names from approximately 300 steelmakers and suppliers. Presentation is trilingual: English, French, and German. Materials covered include structural steels, tool steels, valve steels, high temperature steels and alloys, stainless and heat-resisting steels, and more. Standards and designations from 25 countries are cross-referenced.

  3. Self-Esteem: The Key to a Child's Success and Happiness.

    Science.gov (United States)

    Cutright, Melitta C.

    1992-01-01

    The article discusses self-esteem as the key to parenting a successful, happy child. It notes ways parents can help foster self-esteem starting at a very early age. Ten suggestions for building a child's self-esteem, developed by the National PTA, are listed. (SM)

  4. Supporting Inferential Thinking in Preschoolers: Effects of Discussion on Children's Story Comprehension

    Science.gov (United States)

    Collins, Molly F.

    2016-01-01

    Research Findings: This study examines the effects of low- and high-cognitive demand discussion on children's story comprehension and identifies contributions of discussion, initial vocabularies, and parent reading involvement. A total of 70 English learner preschoolers took baseline vocabulary tests in Portuguese and English, were randomly…

  5. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  6. Best Friends’ Discussions of Social Dilemmas

    Science.gov (United States)

    McDonald, Kristina L.; Malti, Tina; Killen, Melanie; Rubin, Kenneth H.

    2013-01-01

    Peer relationships, particularly friendships, have been theorized to contribute to how children and adolescents think about social and moral issues. The current study examined how young adolescent best friends (191 dyads; 53.4% female) reason together about multifaceted social dilemmas and how their reasoning is related to friendship quality. Mutually-recognized friendship dyads were videotaped discussing dilemmas entailing moral, social-conventional and prudential/pragmatic issues. Both dyad members completed a self-report measure of friendship quality. Dyadic data analyses guided by the Actor-Partner Interdependence Model indicated that adolescent and friend's reports of friendship qualities were related to the forms of reasoning used during discussion. Friends who both reported that they could resolve conflicts in a constructive way were more likely to use moral reasoning than friends who reported that their conflict resolution was poor or disagreed on the quality of their conflict resolution. The findings provide evidence for the important role that friendship interaction may play in adolescents’ social and moral development. PMID:23666555

  7. Best friends' discussions of social dilemmas.

    Science.gov (United States)

    McDonald, Kristina L; Malti, Tina; Killen, Melanie; Rubin, Kenneth H

    2014-02-01

    Peer relationships, particularly friendships, have been theorized to contribute to how children and adolescents think about social and moral issues. The current study examined how young adolescent best friends (191 dyads; 53.4% female) reason together about multifaceted social dilemmas and how their reasoning is related to friendship quality. Mutually-recognized friendship dyads were videotaped discussing dilemmas entailing moral, social-conventional and prudential/pragmatic issues. Both dyad members completed a self-report measure of friendship quality. Dyadic data analyses guided by the Actor-Partner Interdependence Model indicated that adolescent and friend reports of friendship qualities were related to the forms of reasoning used during discussion. Friends who both reported that they could resolve conflicts in a constructive way were more likely to use moral reasoning than friends who reported that their conflict resolution was poor or disagreed on the quality of their conflict resolution. The findings provide evidence for the important role that friendship interaction may play in adolescents' social and moral development.

  8. Key Issues and Research Agendas in Lone Wolf Terrorism

    NARCIS (Netherlands)

    Spaaij, R.; Hamm, M.S.

    2015-01-01

    This article builds on recent contributions to the academic literature on lone wolf terrorism to critically examine key issues that are germane to the current state of play in this field of study. It finds that, overall, the recent academic literature still suffers from considerable problems

  9. Extracting key information from historical data to quantify the transmission dynamics of smallpox

    Directory of Open Access Journals (Sweden)

    Brockmann Stefan O

    2008-08-01

    Full Text Available Abstract Background Quantification of the transmission dynamics of smallpox is crucial for optimizing intervention strategies in the event of a bioterrorist attack. This article reviews basic methods and findings in mathematical and statistical studies of smallpox which estimate key transmission parameters from historical data. Main findings First, critically important aspects in extracting key information from historical data are briefly summarized. We mention different sources of heterogeneity and potential pitfalls in utilizing historical records. Second, we discuss how smallpox spreads in the absence of interventions and how the optimal timing of quarantine and isolation measures can be determined. Case studies demonstrate the following. (1 The upper confidence limit of the 99th percentile of the incubation period is 22.2 days, suggesting that quarantine should last 23 days. (2 The highest frequency (61.8% of secondary transmissions occurs 3–5 days after onset of fever so that infected individuals should be isolated before the appearance of rash. (3 The U-shaped age-specific case fatality implies a vulnerability of infants and elderly among non-immune individuals. Estimates of the transmission potential are subsequently reviewed, followed by an assessment of vaccination effects and of the expected effectiveness of interventions. Conclusion Current debates on bio-terrorism preparedness indicate that public health decision making must account for the complex interplay and balance between vaccination strategies and other public health measures (e.g. case isolation and contact tracing taking into account the frequency of adverse events to vaccination. In this review, we summarize what has already been clarified and point out needs to analyze previous smallpox outbreaks systematically.

  10. Reliable LED Lighting Technologies: Key Factors and Procurement Guidance

    Energy Technology Data Exchange (ETDEWEB)

    Davis, Lynn; Arquit Niederberger, Anne

    2015-10-08

    Abstract— Lighting systems have the ability to transform the economic and educational infrastructure of disadvantaged communities, and eradicating “light poverty” has become one of the primary goals of the International Year of Light 2015. Solid-state lighting (SSL) technology, based on light-emitting diode (LED) light sources, has emerged as the next generation of lighting technology, with a current global market penetration of roughly 5%. This paper will report on recent research on understanding SSL lighting system reliability (failure modes, environmental stressors, electrical power quality); discuss the implications of SSL technology reliability for providing lighting services; and suggest practical approaches to ensure SSL reliability to benefit humanity. Among the key findings from this work is that LED sources can be extremely reliable, withstanding a broad range of environmental stresses without failure. Nonetheless, SSL lighting systems can have a negative impact on electrical power reliability, as well as on the affordability of lighting services, without attention to the quality of the accompanying power infrastructure. It is therefore critical to ensure that the performance of the power supply electronics used in lighting systems is matched to the quality of the power source, when evaluating energy efficient lighting choices.

  11. Discussion on mass concrete construction of wind turbine generator foundation

    Science.gov (United States)

    Shang, Liang; Wu, Chaoxiang; Yin, Xiaoyong

    2018-04-01

    Wind power is one of the main power sources currently. China has rich wind power resources, wind power plants are developed faster and faster. However, China wind power construction started late, which is lack of relevant experience technology. It is easy to produce quality problems. The key to the construction quality of wind power plant is the construction quality of mass concrete construction. Therefore, construction technology and quality control of wind turbine generator foundation mass concrete are discussed and analyzed in the paper.

  12. Metasynthesis findings: potential versus reality.

    Science.gov (United States)

    Finfgeld-Connett, Deborah

    2014-11-01

    Early on, qualitative researchers predicted that metasynthesis research had the potential to significantly push knowledge development forward. More recently, scholars have questioned whether this is actually occurring. To examine this concern, a randomly selected sample of metasynthesis articles was systematically reviewed to identify the types of findings that have been produced. Based on this systematic examination, it appears that findings from metasynthesis investigations might not be reaching their full potential. Metasynthesis investigations frequently result in isolated findings rather than findings in relationship, and opportunities to generate research hypotheses and theoretical models are not always fully realized. With this in mind, methods for moving metasynthesis findings into relationship are discussed. © The Author(s) 2014.

  13. Key thrusts in next generation CANDU. Annex 10

    International Nuclear Information System (INIS)

    Shalaby, B.A.; Torgerson, D.F.; Duffey, R.B.

    2002-01-01

    Current electricity markets and the competitiveness of other generation options such as CCGT have influenced the directions of future nuclear generation. The next generation CANDU has used its key characteristics as the basis to leap frog into a new design featuring improved economics, enhanced passive safety, enhanced operability and demonstrated fuel cycle flexibility. Many enabling technologies spinning of current CANDU design features are used in the next generation design. Some of these technologies have been developed in support of existing plants and near term designs while others will need to be developed and tested. This paper will discuss the key principles driving the next generation CANDU design and the fuel cycle flexibility of the CANDU system which provide synergism with the PWR fuel cycle. (author)

  14. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  15. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    Science.gov (United States)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  16. Scientists Shaping the Discussion

    Science.gov (United States)

    Abraham, J. A.; Weymann, R.; Mandia, S. A.; Ashley, M.

    2011-12-01

    Scientific studies which directly impact the larger society require an engagement between the scientists and the larger public. With respect to research on climate change, many third-party groups report on scientific findings and thereby serve as an intermediary between the scientist and the public. In many cases, the third-party reporting misinterprets the findings and conveys inaccurate information to the media and the public. To remedy this, many scientists are now taking a more active role in conveying their work directly to interested parties. In addition, some scientists are taking the further step of engaging with the general public to answer basic questions related to climate change - even on sub-topics which are unrelated to scientists' own research. Nevertheless, many scientists are reluctant to engage the general public or the media. The reasons for scientific reticence are varied but most commonly are related to fear of public engagement, concern about the time required to properly engage the public, or concerns about the impact to their professional reputations. However, for those scientists who are successful, these engagement activities provide many benefits. Scientists can increase the impact of their work, and they can help society make informed choices on significant issues, such as mitigating global warming. Here we provide some concrete steps that scientists can take to ensure that their public engagement is successful. These steps include: (1) cultivating relationships with reporters, (2) crafting clear, easy to understand messages that summarize their work, (3) relating science to everyday experiences, and (4) constructing arguments which appeal to a wide-ranging audience. With these steps, we show that scientists can efficiently deal with concerns that would otherwise inhibit their public engagement. Various resources will be provided that allow scientists to continue work on these key steps.

  17. Using findings in multimedia learning to inform technology-based behavioral health interventions.

    Science.gov (United States)

    Aronson, Ian David; Marsch, Lisa A; Acosta, Michelle C

    2013-09-01

    Clinicians and researchers are increasingly using technology-based behavioral health interventions to improve intervention effectiveness and to reach underserved populations. However, these interventions are rarely informed by evidence-based findings of how technology can be optimized to promote acquisition of key skills and information. At the same time, experts in multimedia learning generally do not apply their findings to health education or conduct research in clinical contexts. This paper presents an overview of some key aspects of multimedia learning research that may allow those developing health interventions to apply informational technology with the same rigor as behavioral science content. We synthesized empirical multimedia learning literature from 1992 to 2011. We identified key findings and suggested a framework for integrating technology with educational and behavioral science theory. A scientific, evidence-driven approach to developing technology-based interventions can yield greater effectiveness, improved fidelity, increased outcomes, and better client service.

  18. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Science.gov (United States)

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  19. CT findings in abdominal actinomycosis

    International Nuclear Information System (INIS)

    Lee, In Jae; Ha, Hyun Kwon; Lee, Moon Gyu; Kim, Pyo Nyun; Auh, Yong Ho

    1999-01-01

    Abdominal actinomycosis is a chronic, progressive, suppurative disease with a favorable response to intravenous treatment with penicillin. In many instances, however, its clinical and radiological findings may overlap with those of other inflammatory and neoplastic conditions, and the familiarity with the various radiological features can thus avoid diagnostic delays. The purpose of this paper is to describe and discuss the CT findings of abdominal actinomycosis

  20. The social context of motorcycle riding and the key determinants influencing rider behavior: a qualitative investigation.

    Science.gov (United States)

    Tunnicliff, Deborah; Watson, Barry; White, Katherine M; Lewis, Ioni; Wishart, Darren

    2011-08-01

    Given the increasing popularity of motorcycle riding and heightened risk of injury or death associated with being a rider, this study explored rider behavior as a determinant of rider safety and, in particular, key beliefs and motivations that influence such behavior. To enhance the effectiveness of future education and training interventions, it is important to understand riders' own views about what influences how they ride. Specifically, this study sought to identify key determinants of riders' behaviors in relation to the social context of riding, including social and identity-related influences relating to the group (group norms and group identity) as well as the self (moral/personal norm and self-identity). Qualitative research was undertaken via group discussions with motorcycle riders (n = 41). The findings revealed that those in the group with which one rides represent an important source of social influence. Also, the motorcyclist (group) identity was associated with a range of beliefs, expectations, and behaviors considered to be normative. Exploration of the construct of personal norm revealed that riders were most cognizant of the "wrong things to do" when riding; among those issues raised was the importance of protective clothing (albeit for the protection of others and, in particular, pillion passengers). Finally, self-identity as a motorcyclist appeared to be important to a rider's self-concept and was likely to influence on-road behavior. Overall, the insight provided by the current study may facilitate the development of interventions including rider training as well as public education and mass media messages. The findings suggest that these interventions should incorporate factors associated with the social nature of riding in order to best align it with some of the key beliefs and motivations underpinning riders' on-road behaviors.

  1. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  2. A Bargaining Experiment To Motivate a Discussion on Fairness.

    Science.gov (United States)

    Dickinson, David L.

    2002-01-01

    Employs a classroom version of the research game, the Ultimatum Game, to teach undergraduate students how fairness affects behavior. Focuses on three concepts related to fairness. Finds that classroom results motivate discussion about a downward sloping demand curve for fairness. Provides an appendix that includes instructional materials. (JEH)

  3. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    Science.gov (United States)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  4. Metabolic engineering of Saccharomyces cerevisiae: a key cell factory platform for future biorefineries.

    Science.gov (United States)

    Hong, Kuk-Ki; Nielsen, Jens

    2012-08-01

    Metabolic engineering is the enabling science of development of efficient cell factories for the production of fuels, chemicals, pharmaceuticals, and food ingredients through microbial fermentations. The yeast Saccharomyces cerevisiae is a key cell factory already used for the production of a wide range of industrial products, and here we review ongoing work, particularly in industry, on using this organism for the production of butanol, which can be used as biofuel, and isoprenoids, which can find a wide range of applications including as pharmaceuticals and as biodiesel. We also look into how engineering of yeast can lead to improved uptake of sugars that are present in biomass hydrolyzates, and hereby allow for utilization of biomass as feedstock in the production of fuels and chemicals employing S. cerevisiae. Finally, we discuss the perspectives of how technologies from systems biology and synthetic biology can be used to advance metabolic engineering of yeast.

  5. Literature Discussion: Encouraging Reading Interest and Comprehension in Struggling Middle School Readers

    Science.gov (United States)

    Pittman, Pamela; Honchell, Barbara

    2014-01-01

    The purpose of this qualitative study was to explore how literature discussion affects middle school struggling readers. The focus was on 16 middle school struggling readers in a rural Title I school in the southeastern United States. Findings indicated that (a) literature discussion increased student enjoyment of reading, and (b) students…

  6. Case Method Instruction: 25 Minutes of Discussion Can Make a Difference

    National Research Council Canada - National Science Library

    Zbylut, Michelle L; Brunner, Jason M; Vowels, Christopher L; Kim, Julia M

    2007-01-01

    .... Findings indicated that students produced better quality answers and were better able to diagnose leadership problems in the scenario after participating in discussion, even though the time allotted...

  7. HUMAN CAPITAL: Major Human Capital Challenges at SEC and Key Trade Agencies

    National Research Council Canada - National Science Library

    Hillman, Richard

    2002-01-01

    We appreciate the opportunity to appear here today to discuss the human capital challenges facing the agencies that play key roles in monitoring publicly traded companies and enforcing our nation's trade laws...

  8. World energy demand down for the first time in 30 years. Key findings of the world energy demand in 2009 by Enerdata based its global energy database - 8 June 2010

    International Nuclear Information System (INIS)

    2010-01-01

    Key findings of the world energy demand in 2009 by Enerdata based its global energy database: World energy demand down for the first time in 30 years. The first 2009 world energy industry data, now available in the Enerdata Yearbook, confirms trends identified in May 2010 by Enerdata analysts. The economic and financial crisis resulted in a reduction of world energy demand in 2009 by 1% or 130 Mtoe. It is the first demand decrease in 30 years, and the first decrease in electricity demand since World War II. (authors)

  9. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  10. Mobious syndrome: MR findings

    Directory of Open Access Journals (Sweden)

    Maskal Revanna Srinivas

    2016-01-01

    Full Text Available Möbius syndrome is an extremely rare congenital disorder. We report a case of Möbius syndrome in a 2-year-old girl with bilateral convergent squint and left-sided facial weakness. The characteristic magnetic resonance imaging (MRI findings of Möbius syndrome, which include absent bilateral abducens nerves and absent left facial nerve, were noted. In addition, there was absence of left anterior inferior cerebellar artery (AICA and absence of bilateral facial colliculi. Clinical features, etiology, and imaging findings are discussed.

  11. Distributed Factorization Computation on Multiple Volunteered Mobile Resource to Break RSA Key

    Science.gov (United States)

    Jaya, I.; Hardi, S. M.; Tarigan, J. T.; Zamzami, E. M.; Sihombing, P.

    2017-01-01

    Similar to common asymmeric encryption, RSA can be cracked by usmg a series mathematical calculation. The private key used to decrypt the massage can be computed using the public key. However, finding the private key may require a massive amount of calculation. In this paper, we propose a method to perform a distributed computing to calculate RSA’s private key. The proposed method uses multiple volunteered mobile devices to contribute during the calculation process. Our objective is to demonstrate how the use of volunteered computing on mobile devices may be a feasible option to reduce the time required to break a weak RSA encryption and observe the behavior and running time of the application on mobile devices.

  12. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  13. Non-equilibrium physics and evolution—adaptation, extinction, and ecology: a Key Issues review

    International Nuclear Information System (INIS)

    Kussell, E; Vucelja, M

    2014-01-01

    Evolutionary dynamics in nature constitute an immensely complex non-equilibrium process. We review the application of physical models of evolution, by focusing on adaptation, extinction, and ecology. In each case, we examine key concepts by working through examples. Adaptation is discussed in the context of bacterial evolution, with a view toward the relationship between growth rates, mutation rates, selection strength, and environmental changes. Extinction dynamics for an isolated population are reviewed, with emphasis on the relation between timescales of extinction, population size, and temporally correlated noise. Ecological models are discussed by focusing on the effect of spatial interspecies interactions on diversity. Connections between physical processes—such as diffusion, turbulence, and localization—and evolutionary phenomena are highlighted. (key issues reviews)

  14. Anyone Can Become a Troll: Causes of Trolling Behavior in Online Discussions

    OpenAIRE

    Cheng, Justin; Bernstein, Michael; Danescu-Niculescu-Mizil, Cristian; Leskovec, Jure

    2017-01-01

    In online communities, antisocial behavior such as trolling disrupts constructive discussion. While prior work suggests that trolling behavior is confined to a vocal and antisocial minority, we demonstrate that ordinary people can engage in such behavior as well. We propose two primary trigger mechanisms: the individual's mood, and the surrounding context of a discussion (e.g., exposure to prior trolling behavior). Through an experiment simulating an online discussion, we find that both negat...

  15. Frequency of Faith and Spirituality Discussion in Health Care.

    Science.gov (United States)

    Bergamo, David; White, Dawn

    2016-04-01

    Faith and spirituality are important in the lives of many individuals, and therefore, many patients. This study was performed to determine whether faith and spirituality are active part of the healthcare field and patients' receipt of these sometimes delicate topics. The nuances of the concepts of faith, spirituality, and religion and their implications in the healthcare setting are discussed. Benefits and detriments of faith and spirituality are reviewed in terms of how they relate to the health of the patient and to the healthcare field. With the focus of healthcare shifting to holistic care, this conversation may be more necessary than ever in practice, yet it seems many providers are not discussing these matters with patients. The study analyzes whether healthcare providers are discussing these topics with patients and how the discussion is received or would be received by patients. Findings demonstrate the infrequency of the discussion regardless of the fact that the majority of patients consider themselves faithful or spiritual. This study was approved by the Clarkson University Institutional Review Board on June 18, 2104.

  16. Online discussions with pregnant and parenting adolescents: perspectives and possibilities.

    Science.gov (United States)

    Valaitis, Ruta K; Sword, Wendy A

    2005-10-01

    The Internet is an innovative strategy to increase public participation. It is important to include pregnant and parenting teens' perspectives when planning programs to meet their needs. This qualitative study explored online discussions as a strategy to enhance participation by this population. Findings showed that online communication was preferred over face-to-face group discussions. Being anonymous online encouraged open and honest feedback. Participants experienced various forms of social support, however, there was an overall lack of teen involvement online. Strategies to engage adolescents in online discussions and reduce barriers are discussed. Strategies included the use of teen moderators, home computer access, technical support, and engagement in naturally flowing online discussions to meet social support needs. Blending researchers' with teens' needs for social support in an online environment is encouraged. With careful planning and design, online communications can result in mutual benefits for researchers, service providers, and pregnant and parenting adolescents.

  17. Which model of truth and reconciliation applies to former Yugoslavia?: Some thoughts on the closing panel discussion

    Directory of Open Access Journals (Sweden)

    Tošić Jelena

    2002-01-01

    Full Text Available This paper represents a reflection on the final panel discussion of the conference "Which Model of Truth and Reconciliation applies to ex-Yugoslavia?". By the means of sequential and hierarchical analysis of the argumentative structure of the discussion, the author «extracts» key dimensions of the expert discourse on truth and reconciliation using the case of the mentioned panel discussion. By identifying the points of consensus the author seeks to describe the notion of truth and reconciliation as it emerged in the closing panel discussion of the conference.

  18. Securing quantum key distribution systems using fewer states

    Science.gov (United States)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  19. Key Questions in Building Defect Prediction Models in Practice

    Science.gov (United States)

    Ramler, Rudolf; Wolfmaier, Klaus; Stauder, Erwin; Kossak, Felix; Natschläger, Thomas

    The information about which modules of a future version of a software system are defect-prone is a valuable planning aid for quality managers and testers. Defect prediction promises to indicate these defect-prone modules. However, constructing effective defect prediction models in an industrial setting involves a number of key questions. In this paper we discuss ten key questions identified in context of establishing defect prediction in a large software development project. Seven consecutive versions of the software system have been used to construct and validate defect prediction models for system test planning. Furthermore, the paper presents initial empirical results from the studied project and, by this means, contributes answers to the identified questions.

  20. OECD, "Key Competencies" and the New Challenges of Educational Inequality

    Science.gov (United States)

    Takayama, Keita

    2013-01-01

    In this paper, I develop a critique of the Organization for Economic Cooperation and Development (OECD)-based lifelong learning policy discourse with a particular focus on "key competencies" (KCs) and its equity implications for school curricular policies. First, I review the discussion of KCs in the writings by the OECD-affiliated…

  1. Incidental findings in musculoskeletal radiology

    International Nuclear Information System (INIS)

    Wuennemann, F.; Rehnitz, C.; Weber, M.A.

    2017-01-01

    Increasing numbers of conventional X-rays, computed tomography and magnetic resonance imaging in the inpatient, outpatient and scientific routine leads to an increasing number of incidental findings. The correct interpretation of these incidental findings with respect to the relevance and the evaluation concerning further work-up is an important task of radiologists. Description of common incidental findings in musculoskeletal imaging and their clinical classification. A PubMed literature search was performed using the following terms: incidental findings, population-based imaging, musculoskeletal imaging, non-ossifying fibroma, enchondroma, osteodystrophia deformans, chondrosarcoma, fibrous dysplasia, simple bone cyst, unicameral bone cyst, solitary bone cyst, aneurysmal bone cyst, vertebral hemangioma, bone island, osteopoikilosis, Tarlov cyst and diffuse idiopathic skeletal hyperostosis (DISH). Incidental findings are observed in up to 40% of imaging procedures. In up to 6% these incidental findings involve the skeletal system. Common incidental findings are discussed and their clinical relevance is explained. (orig.) [de

  2. Local innovation: The key to globalisation

    Directory of Open Access Journals (Sweden)

    Srivardhini K. Jha

    2013-12-01

    Full Text Available The round table discussion draws the panellists to weigh in on how multinational enterprises from developed countries are innovating in and for emerging markets, the challenges faced, and lessons learnt. The key takeaways are that MNEs are increasingly innovating for the Indian market, alongside their contribution to global products. They are doing so by developing close relationships with field facing organisations, co-creating with customers, empowering engineers, and taking a clean slate approach to product development. This approach has given them dividends not only in the local market but also in the global market.

  3. Key Criteria of "Good Practice" for Constructive Diaspora Engagement in Peacebuilding

    OpenAIRE

    Sinatti, Giulia

    2010-01-01

    textabstractThis discussion paper focuses on the engagement of diasporas in peacebuilding processes in their countries of origin. The main argument put forward in this paper is that, given certain conditions, diasporas carry a potential to fruitfully engage in the field of peacebuilding. After substantiating this claim with a critical discussion of literature and research insight, the issue is further addressed by identifying and collating a set of key criteria of “good practice” for construc...

  4. Shor-Preskill-type security proof for quantum key distribution without public announcement of bases

    International Nuclear Information System (INIS)

    Hwang, Won-Young; Wang Xiangbin; Matsumoto, Keiji; Kim, Jaewan; Lee, Hai-Woong

    2003-01-01

    We give a Shor-Preskill-type security proof to quantum key distribution without public announcement of bases [W.Y. Hwang et al., Phys. Lett. A 244, 489 (1998)]. First, we modify the Lo-Chau protocol once more so that it finally reduces to the quantum key distribution without public announcement of bases. Then we show how we can estimate the error rate in the code bits based on that in the checked bits in the proposed protocol, which is the central point of the proof. We discuss the problem of imperfect sources and that of large deviation in the error rate distributions. We discuss when the bases sequence must be discarded

  5. Quantum key distribution with an unknown and untrusted source

    Science.gov (United States)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  6. Interpersonal amplification of risk? Citizen discussions and their impact on perceptions of risks and benefits of a biological research facility.

    Science.gov (United States)

    Binder, Andrew R; Scheufele, Dietram A; Brossard, Dominique; Gunther, Albert C

    2011-02-01

    Much risk communication research has demonstrated how mass media can influence individual risk perceptions, but lacks a comprehensive conceptual understanding of another key channel of communication: interpersonal discussion. Using the social amplification of risk as a theoretical framework, we consider the potential for discussions to function as amplification stations. We explore this possibility using data from a public opinion survey of residents living in potential locations for a new biological research facility in the United States. Controlling for a variety of key information variables, our results show that two dimensions of discussion-frequency and valence-have impacts on residents' perceptions of the facility's benefits and its risks. We also explore the possibility that an individual's overall attitude moderates the effect of discussion on their perceptions of risks and benefits. Our results demonstrate the potential for discussions to operate as amplifiers or attenuators of perceptions of both risks and benefits. © 2010 Society for Risk Analysis.

  7. Anetoderma due to secondary syphilis: Report of two cases and discussion of the histopathological findings.

    Science.gov (United States)

    Veasey, John V; Lellis, Rute F; Porto, Renê L; Mattei, Gladys Ma

    2017-12-01

    Anetoderma is a rare benign condition of diverse etiology whose characteristic is the diminution or absence of the dermal elastic fibers. Classified as primary and secondary, the latter associated with tumors, inflammatory, and infectious diseases. Although the etiology of the lesions is well described in literature, the pathogenesis is still poorly determined. Anetoderma in syphilis is rare, and occurs even in the most uncommon cutaneous manifestations of the disease, such as the nodular form. In order to better understand the changes that lead to elastolysis, we propose a better correlation with the histopathological findings of the lesions that precede it. We present two cases of anetoderma secondary to syphilis, whose clinical aspects resembled the pattern of their initial secondary syphilis rash.

  8. The ultimate security bounds of quantum key distribution protocols

    International Nuclear Information System (INIS)

    Nikolopoulos, G.M.; Alber, G.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols exploit quantum correlations in order to establish a secure key between two legitimate users. Recent work on QKD has revealed a remarkable link between quantum and secret correlations. In this talk we report on recent results concerning the ultimate upper security bounds of various QKD schemes (i.e., the maximal disturbance up to which the two legitimate users share quantum correlations) under the assumption of general coherent attacks. In particular, we derive an analytic expression for the ultimate upper security bound of QKD schemes that use two mutually unbiased bases. As long as the two legitimate users focus on the sifted key and treat each pair of data independently during the post processing, our results are valid for arbitrary dimensions of the information carriers. The bound we have derived is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is also discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions, however, such equivalence is generally no longer valid. (author)

  9. Undergraduate Students' Perspectives on the Value of Peer-Led Discussions

    Directory of Open Access Journals (Sweden)

    Monica E. McGlynn-Stewart

    2015-12-01

    Full Text Available With a view to improving the quality of class discussions of assigned articles, I implemented a new way of organizing small group seminars in an undergraduate early childhood education course. The seminars were led by student facilitators and had a balance of accountability and autonomy. Mid-way through the course, the students reflected anonymously on the experience of the seminars. They identified a variety of cognitive and social benefits of the seminars as well as key components that could be applied in a variety of post-secondary settings

  10. Discussion on unpacking inspection of imported civil nuclear safety equipment

    International Nuclear Information System (INIS)

    Li Chan; Zhang Wenguang; Li Maolin; Li Shixin; Jin Gang; Yao Yuan

    2014-01-01

    This paper introduces the purpose, contents, process and requirements of unpacking inspection which is the second stage of safety inspection of imported civil nuclear safety equipment, expresses review key points on application documents of unpacking inspection, processes of witness on-the-spot before unpacking inspection outside the civil nuclear facilities by the test agency, discusses understanding of unpacking inspection, supervision of manufacture, inspection prior to shipment, supervision of loading and acceptance by the unit operating civil nuclear facilities, reports on unpacking inspection. Some suggestions on reinforcing the unpacking inspection in China are concerned. (authors)

  11. The more friends, the less political talk? Predictors of Facebook discussions among college students.

    Science.gov (United States)

    Jang, S Mo; Lee, Hoon; Park, Yong Jin

    2014-05-01

    Although previous research has indicated that Facebook users, especially young adults, can cultivate their civic values by talking about public matters with their Facebook friends, little research has examined the predictors of political discussion on Facebook. Using survey data from 442 college students in the United States, this study finds that individual characteristics and network size influence college students' expressive behavior on Facebook related to two controversial topics: gay rights issues and politics. In line with previous studies about offline political discussion, the results show that conflict avoidance and ambivalence about target issues are negatively associated with Facebook discussions. Perhaps the most interesting finding is that users who have a large number of Facebook friends are less likely to talk about politics and gay rights issues on Facebook despite having access to increasing human and information resources. Theoretical implications of these findings and future directions are addressed.

  12. Focus group discussion in mathematical physics learning

    Science.gov (United States)

    Ellianawati; Rudiana, D.; Sabandar, J.; Subali, B.

    2018-03-01

    The Focus Group Discussion (FGD) activity in Mathematical Physics learning has helped students perform the stages of problem solving reflectively. The FGD implementation was conducted to explore the problems and find the right strategy to improve the students' ability to solve the problem accurately which is one of reflective thinking component that has been difficult to improve. The research method used is descriptive qualitative by using single subject response in Physics student. During the FGD process, one student was observed of her reflective thinking development in solving the physics problem. The strategy chosen in the discussion activity was the Cognitive Apprenticeship-Instruction (CA-I) syntax. Based on the results of this study, it is obtained the information that after going through a series of stages of discussion, the students' reflective thinking skills is increased significantly. The scaffolding stage in the CA-I model plays an important role in the process of solving physics problems accurately. Students are able to recognize and formulate problems by describing problem sketches, identifying the variables involved, applying mathematical equations that accord to physics concepts, executing accurately, and applying evaluation by explaining the solution to various contexts.

  13. Experimental interstellar organic chemistry - Preliminary findings

    Science.gov (United States)

    Khare, B. N.; Sagan, C.

    1973-01-01

    Review of the results of some explicit experimental simulation of interstellar organic chemistry consisting in low-temperature high-vacuum UV irradiation of condensed simple gases known or suspected to be present in the interstellar medium. The results include the finding that acetonitrile may be present in the interstellar medium. The implication of this and other findings are discussed.

  14. GREEN KEY AS A MOTIVATING FACTOR FOR STAFF LOYALTY AND SATISFACTION

    OpenAIRE

    Mozgov, Maxim

    2017-01-01

    This thesis is connected to staff motivation: which kind of motivation tools motivate employees, and does the Green Key motivate employees to work in the organization which is holding this eco label. The main goal of the thesis was determine the influence of the Green Key on motivation and sustainable development. The objectives of the thesis were to find out which motivational factors are present in the current hotel for employees to perform their job better. Which motivational factors are t...

  15. Encouraging Classroom Discussion

    Directory of Open Access Journals (Sweden)

    Robert Joseph McKee

    2014-10-01

    Full Text Available Classroom discussion has the potential to enhance the learning environment and encourages students to become active participants in the educational process. Student participation in classroom discussion has been shown to significantly improve the student learning experience. Research suggests that classroom discussion is an effective method for encouraging student classroom participation and for motivating student learning beyond the classroom. Participation in classroom discussion encourages students to become active collaborators in the learning process, while at the same time providing instructors with a practical method of assessing student learning. Classroom discussion is an effective tool for developing higher-level cognitive skills like critical thinking. Despite the potential discussion holds for student learning, many in academia lament the lack of participation in the classroom. The lack of student participation in classroom discussion is not a recent problem; it is one that has frustrated instructors for decades. Instructors report that some of the more current methods for encouraging classroom discussion can be exasperating and at times non-productive. This two-year study of 510 college and university students provides insight into the reasons why some students do not participate in classroom discussion. This study, which also elicited input from sixteen college and university professors and two high school teachers, offers some suggestions for creating and encouraging an environment conducive to student participation in the classroom.

  16. Short message service (SMS)-based intervention to improve treatment adherence among HIV-positive youth in Uganda: focus group findings.

    Science.gov (United States)

    Rana, Yashodhara; Haberer, Jessica; Huang, Haijing; Kambugu, Andrew; Mukasa, Barbara; Thirumurthy, Harsha; Wabukala, Peter; Wagner, Glenn J; Linnemayr, Sebastian

    2015-01-01

    This paper presents one of the first qualitative studies to discuss programmatic barriers to SMS-based interventions for HIV-positive youth and discusses pathways through which youth perceive them to work. We conducted six focus groups with 20 male and 19 female HIV-positive youths in two clinics in Kampala, Uganda. We find that youth commonly use SMS as over 90% of this study's youths knew how to read, write and send messages and almost three-fourths of them had phones. Youth strongly felt that the success of this intervention hinged on ensuring confidentiality about their HIV-positive status. Key programmatic challenges discussed where restrictions on phone use and phone sharing that could exclude some youth. Participants felt that the intervention would improve their adherence by providing them with needed reminders and social support. Youths' suggestions about intervention logistics related to content, frequency, timing and two-way messages will be helpful to practitioners in the field.

  17. Fuel ethanol discussion paper

    International Nuclear Information System (INIS)

    1992-01-01

    In recognition of the potential benefits of ethanol and the merits of encouraging value-added agricultural development, a committee was formed to develop options for the role of the Ontario Ministry of Agriculture and Food in the further development of the ethanol industry in Ontario. A consultation with interested parties produced a discussion paper which begins with an outline of the role of ethanol as an alternative fuel. Ethanol issues which require industry consideration are presented, including the function of ethanol as a gasoline oxygenate or octane enhancer, environmental impacts, energy impacts, agricultural impacts, trade and fiscal implications, and regulation. The ethanol industry and distribution systems in Ontario are then described. The current industry consists of one ethanol plant and over 30 retail stations. The key issue for expanding the industry is the economics of producing ethanol. At present, production of ethanol in the short term depends on tax incentives amounting to 23.2 cents/l. In the longer term, a significant reduction in feedstock costs and a significant improvement in processing technology, or equally significant gasoline price increases, will be needed to create a sustainable ethanol industry that does not need incentives. Possible roles for the Ministry are identified, such as support for ethanol research and development, financial support for construction of ethanol plants, and active encouragement of market demand for ethanol-blended gasolines

  18. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  19. A discussion of key values to inform the design and delivery of services for HIV-affected women and couples attempting pregnancy in resource-constrained settings.

    Science.gov (United States)

    Heffron, Renee; Davies, Natasha; Cooke, Ian; Kaida, Angela; Mergler, Reid; van der Poel, Sheryl; Cohen, Craig R; Mmeje, Okeoma

    2015-01-01

    HIV-affected women and couples often desire children and many accept HIV risk in order to attempt pregnancy and satisfy goals for a family. Risk reduction strategies to mitigate sexual and perinatal HIV transmission include biomedical and behavioural approaches. Current efforts to integrate HIV and reproductive health services offer prime opportunities to incorporate strategies for HIV risk reduction during pregnancy attempts. Key client and provider values about services to optimize pregnancy in the context of HIV risk provide insights for the design and implementation of large-scale "safer conception" programmes. Through our collective experience and discussions at a multi-disciplinary international World Health Organization-convened workshop to initiate the development of guidelines and an algorithm of care to support the delivery of services for HIV-affected women and couples attempting pregnancy, we identified four values that are key to the implementation of these programmes: (1) understanding fertility care and an ability to identify potential fertility problems; (2) providing equity of access to resources enabling informed decision-making about reproductive choices; (3) creating enabling environments that reduce stigma associated with HIV and infertility; and (4) creating enabling environments that encourage disclosure of HIV status and fertility status to partners. Based on these values, recommendations for programmes serving HIV-affected women and couples attempting pregnancy include the following: incorporation of comprehensive reproductive health counselling; training to support the transfer and exchange of knowledge between providers and clients; care environments that reduce the stigma of childbearing among HIV-affected women and couples; support for safe and voluntary disclosure of HIV and fertility status; and increased efforts to engage men in reproductive decision-making at times that align with women's desires. Programmes, policies and guidelines

  20. Discussion Paper Social and emotional learning for children with Learning Disability: Implications for inclusion.

    Directory of Open Access Journals (Sweden)

    Valeria Cavioni

    2017-11-01

    Full Text Available This paper discusses the key role of social and emotional learning programmes for children with Learning Disability (LD. The first part of the paper discusses the difficulties students with learning disability may encounter in their education, such as issues related to peer group acceptance, friendship and social isolation, low self-efficacy and self-esteem, and externalized and internalized behavior problems. The relationship between social and emotional learning programmes and learning disability is then discussed, underlining the benefits of social and emotional learning for students with LD. The paper concludes by highlighting the need for universal social and emotional learning as a vehicle for the academic and social inclusion of students with LD.

  1. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  2. Diversity of key players in the microbial ecosystems of the human body.

    Science.gov (United States)

    Jordán, Ferenc; Lauria, Mario; Scotti, Marco; Nguyen, Thanh-Phuong; Praveen, Paurush; Morine, Melissa; Priami, Corrado

    2015-10-30

    Coexisting bacteria form various microbial communities in human body parts. In these ecosystems they interact in various ways and the properties of the interaction network can be related to the stability and functional diversity of the local bacterial community. In this study, we analyze the interaction network among bacterial OTUs in 11 locations of the human body. These belong to two major groups. One is the digestive system and the other is the female genital tract. In each local ecosystem we determine the key species, both the ones being in key positions in the interaction network and the ones that dominate by frequency. Beyond identifying the key players and discussing their biological relevance, we also quantify and compare the properties of the 11 networks. The interaction networks of the female genital system and the digestive system show totally different architecture. Both the topological properties and the identity of the key groups differ. Key groups represent four phyla of prokaryotes. Some groups appear in key positions in several locations, while others are assigned only to a single body part. The key groups of the digestive and the genital tracts are totally different.

  3. Review and Discussion on the Key Assumptions and Challenges Surrounding the Use of {sup 7}Be as a Soil and Sediment Tracer

    Energy Technology Data Exchange (ETDEWEB)

    Mabit, L. [Soil and Water Management and Crop Nutrition Laboratory, IAEA (Austria); Taylor, A.; Blake, W. H. [School of Geography, Earth and Environmental Sciences, Plymouth University (United Kingdom); Smith, H. G. [School of Environmental Sciences, University of Liverpool (United Kingdom); Keith-Roach, M. J. [Kemakta Konsult, Stockholm (Sweden)

    2014-01-15

    Full text: The assumptions and challenges surrounding the use of {sup 7}Be to investigate soil and sediment in river basins have recently been reviewed (Taylor et al., 2013) to support the Coordinated Research Project D1.20.11 on Integrated Isotopic Approaches for an Area Wide Precision Conservation to Control the Impacts of Agricultural Practices on Land Degradation and Soil Erosion. This paper analyses the assumptions made in the context of hillslope erosion studies and additional implications for the use of {sup 7}Be as a tracer at a catchment-scale. A key assumption in hillslope erosion studies is that {sup 7}Be fallout is spatially uniform for a typical field or location. It is also important to assume that rainfall received prior to a study event is non-eroding to maintain a uniform inventory and enable estimates of soil redistribution to be attributed to a particular event. This requirement is well recognised by researchers in this field and these conditions have been met in studies shown in the literature. Little attention, however, has been given to the effects of other factors (e.g. atmospheric processes affecting the rainfall field across a site, topographic factors including the influence of vegetation cover), which could influence the uniformity of fallout and therefore the spatial variability of the {sup 7}Be inventory. Assumptions of spatially uniform fallout at the microscale has not been adequately supported by previous research. Studies demonstrated for example the variability in raindrop size distribution across short distances (i.e. 250 m). These factors are, however, likely to translate into minimal gradients in {sup 7}Be inventories and it is more likely that factors affecting the direct transfer of {sup 7}Be to soil, such as rain shadowing (by e.g. vegetation and topography) and interception by vegetation, will have a greater influence on spatial uniformity. These factors could present a fundamental challenge to the application of {sup 7}Be

  4. Shaping stereotypical behaviour through the discussion of social stereotypes.

    Science.gov (United States)

    Smith, Laura G E; Postmes, Tom

    2011-03-01

    In two studies, we demonstrate that small group discussions change the extent to which an activated stereotype affects performance in a relevant domain. In Study 1, female participants were asked why men are (or are not) better than them at maths. They generated their answers individually or through group discussion, and their subsequent maths performance was highest when they collectively challenged the stereotype and lowest when they collectively affirmed the stereotype. When participants affirmed the stereotype through discussion, they used more theories which supported the validity of the stereotype, compared to the individual thought condition; and consensus mediated the effect of group discussion on performance (relative to individual rumination). In Study 2, male and female participants affirmed or challenged the stereotype in same-gender discussion groups. After affirming the stereotype, women's performance decreased relative to their baseline scores and men's performance was 'lifted'. In contrast, when they challenged the stereotype, there was no difference between the performance of men and women on the maths test. This pattern of effects was mediated by confidence in mathematical ability. The findings support the idea that topical small group discussions can, in the short term, differentially alter the impact that stereotypes have on performance. ©2010 The British Psychological Society.

  5. Discussion on some problems in uranium hydrogeochemical prospecting

    International Nuclear Information System (INIS)

    Shi Weijun.

    1989-01-01

    The requirements for sampling density in uranium hydrogeochemical prospecting are discussed in this paper. The scales for regional hydrogeochemical survey, prospetcing survey and detailed prospecting survey are 1 : 200,000 - 1 : 100,000, 1 : 50,000 - 1 : 25,000 and 1 : 10,000 - 1 : 5,000 respectively. On the basis of explanation to the geological meaning of hydrogeochemical field defined in different stage, the principle, effect and technical requirements of small-medium scale hydrogeochemical prospecting are studied. The reason and advantage of the dispersion train prospecting using in the wet and rainy regions have been suggested. The key to the dispersion train prospecting is the sensitivity and precision of analytic methods. The general indications and salinity (conductivity) should be paid attention to in hydrogeochemical prospecting

  6. Selecting of key safety parameters in reactor nuclear safety supervision

    International Nuclear Information System (INIS)

    He Fan; Yu Hong

    2014-01-01

    The safety parameters indicate the operational states and safety of research reactor are the basis of nuclear safety supervision institution to carry out effective supervision to nuclear facilities. In this paper, the selecting of key safety parameters presented by the research reactor operating unit to National Nuclear Safety Administration that can express the research reactor operational states and safety when operational occurrence or nuclear accident happens, and the interrelationship between them are discussed. Analysis shows that, the key parameters to nuclear safety supervision of research reactor including design limits, operational limits and conditions, safety system settings, safety limits, acceptable limits and emergency action level etc. (authors)

  7. The MycoKey 3.1 DVD. Included in Knudsen, H. & Vesterholt, J. (eds.). Funga Nordica

    DEFF Research Database (Denmark)

    2008-01-01

    . It is, of course, also possible to do a direct search on a name in MycoKey in order to find a genus or a particular species. MycoKey gives access to more than 4,000 illustrations of fungi and more than 17,000 links to references. From within the genera you can also open the Funga Nordica keys in a a pdf-viwer......MycoKey enables the user to identify fungal genera (fruitbody forming Basidiomycota and discomycetes) by means of a digital, synoptical key. This key offers a very different way of choosing between genera than the traditional analytical key and the the two approaches complete each other nicely...

  8. Heisenberg Groups as Platform for the AAG key-exchange protocol

    OpenAIRE

    Kahrobaei, Delaram; Lam, Ha T.

    2014-01-01

    Garber, Kahrobaei, and Lam studied polycyclic groups generated by number field as platform for the AAG key-exchange protocol. In this paper, we discuss the use of a different kind of polycyclic groups, Heisenberg groups, as a platform group for AAG by submitting Heisenberg groups to one of AAG's major attacks, the length-based attack.

  9. Issues in Moderation of National Curriculum Assessment at Key Stage 3.

    Science.gov (United States)

    Cowling, Les

    1994-01-01

    Highlights the issues of moderation of teacher judgments for accountability and moderation for achieving consistent assessments. Discusses the meaning of moderation, the need for moderating teacher judgments, approaches to moderation, methods of moderation, and most appropriate methods of moderation at Key Stage 3. Presents an approach to…

  10. Key Challenges and Future Directions for Educational Research on Scientific Argumentation

    Science.gov (United States)

    Henderson, J. Bryan; McNeill, Katherine L.; González-Howard, María; Close, Kevin; Evans, Mat

    2018-01-01

    At the 2015 "NARST: A Worldwide Organization for Improving Science Teaching and Learning Through Research" Annual International Conference, a group of scholars held an extended pre-conference workshop to discuss key challenges and future directions faced by argumentation researchers around the world. This wide-ranging group of…

  11. Dynamical networks of influence in small group discussions.

    Science.gov (United States)

    Moussaïd, Mehdi; Noriega Campero, Alejandro; Almaatouq, Abdullah

    2018-01-01

    In many domains of life, business and management, numerous problems are addressed by small groups of individuals engaged in face-to-face discussions. While research in social psychology has a long history of studying the determinants of small group performances, the internal dynamics that govern a group discussion are not yet well understood. Here, we rely on computational methods based on network analyses and opinion dynamics to describe how individuals influence each other during a group discussion. We consider the situation in which a small group of three individuals engages in a discussion to solve an estimation task. We propose a model describing how group members gradually influence each other and revise their judgments over the course of the discussion. The main component of the model is an influence network-a weighted, directed graph that determines the extent to which individuals influence each other during the discussion. In simulations, we first study the optimal structure of the influence network that yields the best group performances. Then, we implement a social learning process by which individuals adapt to the past performance of their peers, thereby affecting the structure of the influence network in the long run. We explore the mechanisms underlying the emergence of efficient or maladaptive networks and show that the influence network can converge towards the optimal one, but only when individuals exhibit a social discounting bias by downgrading the relative performances of their peers. Finally, we find a late-speaker effect, whereby individuals who speak later in the discussion are perceived more positively in the long run and are thus more influential. The numerous predictions of the model can serve as a basis for future experiments, and this work opens research on small group discussion to computational social sciences.

  12. 5 keys to business analytics program success

    CERN Document Server

    Boyer, John; Green, Brian; Harris, Tracy; Van De Vanter, Kay

    2012-01-01

    With business analytics is becoming increasingly strategic to all types of organizations and with many companies struggling to create a meaningful impact with this emerging technology, this work-based on the combined experience of 10 organizations that display excellence and expertise on the subject-shares the best practices, discusses the management aspects and sociology that drives success, and uncovers the five key aspects behind the success of some of the top business analytics programs in the industry. Readers will learn about numerous topics, including how to create and manage a changing

  13. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  14. Non-resonant electromagnetic energy harvester for car-key applications

    Science.gov (United States)

    Li, X.; Hehn, T.; Thewes, M.; Kuehne, I.; Frey, A.; Scholl, G.; Manoli, Y.

    2013-12-01

    This paper presents a novel non-resonant electromagnetic energy harvester for application in a remote car-key, to extend the lifetime of the battery or even to realize a fully energy autonomous, maintenance-free car-key product. Characteristic for a car-key are low frequency and large amplitude motions during normal daily operation. The basic idea of this non-resonant generator is to use a round flat permanent magnet moving freely in a round flat cavity, which is packaged on both sides by printed circuit boards embedded with multi-layer copper coils. The primary goal of this structure is to easily integrate the energy harvester with the existing electrical circuit module into available commercial car-key designs. The whole size of the energy harvester is comparable to a CR2032 coin battery. To find out the best power-efficient and optimal design, several magnets with different dimensions and magnetizations, and various layouts of copper coils were analysed and built up for prototype testing. Experimental results show that with an axially magnetized NdFeB magnet and copper coils of design variant B a maximum open circuit voltage of 1.1V can be observed.

  15. 10 CFR 51.32 - Finding of no significant impact.

    Science.gov (United States)

    2010-01-01

    ... assessment is included, the finding need not repeat any of the discussion in the assessment but may... 10 Energy 2 2010-01-01 2010-01-01 false Finding of no significant impact. 51.32 Section 51.32... Section 102(2) Finding of No Significant Impact § 51.32 Finding of no significant impact. (a) A finding of...

  16. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    Energy Technology Data Exchange (ETDEWEB)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  17. Tanning and beauty: Mother and teenage daughters in discussion.

    Science.gov (United States)

    Hay, Jennifer L; Geller, Alan C; Schoenhammer, Maria; Gordon, Mallorie; Bishop, Marilyn; Shuk, Elyse; Oliveria, Susan; Halpern, Allan C

    2016-07-01

    Tanning increases dramatically through the teenage years, but the family context of this health risk behavior is relatively unstudied. We conducted videotaped conversations between teenage girls (10th and 11th grade) and their mothers. We developed a coding system for discussion content and highlight findings including inadequate knowledge concerning the harms of tanning and positive views of outdoor tanning over indoor tanning, yet agreement that all tans are attractive. Many teens believed that indoor tanning is sometimes necessary to achieve the tanned look. These findings can usefully guide intervention development regarding the harms of all tanning, rather than indoor or outdoor tanning specifically. © The Author(s) 2014.

  18. Chronic Absenteeism: A Key Indicator of Student Success. Policy Analysis

    Science.gov (United States)

    Rafa, Alyssa

    2017-01-01

    Research shows that chronic absenteeism can affect academic performance in later grades and is a key early warning sign that a student is more likely to drop out of high school. Several states enacted legislation to address this issue, and many states are currently discussing the utility of chronic absenteeism as an indicator of school quality or…

  19. LGBT Roundtable Discussion: Meet-up and Mentoring Discussion

    Science.gov (United States)

    2014-03-01

    The LGBT+ Physicists group welcomes those who identify as gender sexual minorities, as LGBTQQIAAP+, or as allies to participate in a round-table discussion on mentoring physicists. The session will provide an opportunity to learn and discuss successful mentoring strategies at different career stages for physicists in all environments, including academia, industry, etc. Attendees are encouraged to attend a social event to follow the panel to continue to network. Allies are especially welcome at this event to learn how to support and mentor LGBT+ physicists.

  20. Public health economics: a systematic review of guidance for the economic evaluation of public health interventions and discussion of key methodological issues.

    Science.gov (United States)

    Edwards, Rhiannon Tudor; Charles, Joanna Mary; Lloyd-Williams, Huw

    2013-10-24

    If Public Health is the science and art of how society collectively aims to improve health, and reduce inequalities in health, then Public Health Economics is the science and art of supporting decision making as to how society can use its available resources to best meet these objectives and minimise opportunity cost. A systematic review of published guidance for the economic evaluation of public health interventions within this broad public policy paradigm was conducted. Electronic databases and organisation websites were searched using a 22 year time horizon (1990-2012). References of papers were hand searched for additional papers for inclusion. Government reports or peer-reviewed published papers were included if they; referred to the methods of economic evaluation of public health interventions, identified key challenges of conducting economic evaluations of public health interventions or made recommendations for conducting economic evaluations of public health interventions. Guidance was divided into three categories UK guidance, international guidance and observations or guidance provided by individual commentators in the field of public health economics. An assessment of the theoretical frameworks underpinning the guidance was made and served as a rationale for categorising the papers. We identified 5 international guidance documents, 7 UK guidance documents and 4 documents by individual commentators. The papers reviewed identify the main methodological challenges that face analysts when conducting such evaluations. There is a consensus within the guidance that wider social and environmental costs and benefits should be looked at due to the complex nature of public health. This was reflected in the theoretical underpinning as the majority of guidance was categorised as extra-welfarist. In this novel review we argue that health economics may have come full circle from its roots in broad public policy economics. We may find it useful to think in this broader

  1. A Study on the Single-dose Oral Toxicity of Super Key in Sprague-Dawley Rats

    Directory of Open Access Journals (Sweden)

    Jinhee Kim

    2015-09-01

    Full Text Available Objectives: This study was performed to analyze the single-dose oral toxicity of the super key (processed sulfur. Methods: All experiments were conducted at Medvill, an institution authorized to perform non-clinical studies, under the Good Laboratory Practice (GLP regulations. In order to investigate the oral toxicity of super key We administered it orally to Sprague-Dawley (SD rats. The SD rats were divided into four groups of five male and five female animals per group: group 1 being the control group and groups 2, 3, and 4 being the experimental groups. Doses of super key 500 mg/kg, 1,000 mg/kg and 2,000 mg/kg were administered to the experimental groups, and a dose of normal saline solution, 10 mL/kg, was administered to the control group. We examined the survival rates, weights, clinical signs, gross findings and necropsy findings. This study was conducted under the approval of the Institutional Animal Ethics Committee. (Approval number: A01-14018. Results: No deaths or abnormalities occurred in any of the four groups. Although slight decreases in the weights of some female rats were noted, no significant changes in weights or differences in the gross findings between the control group and the experimental groups were observed. To check for abnormalities in organs, we used microscopy to examine representative histological sections of each specified organ; the results showed no significant differences in any of the organs. Conclusion: The results of this research showed that administration of 500 ─ 2,000 mg/kg of super key did not cause any changes in the weights or in the results of necropsy examinations. Neither did it result in any mortalities. The above findings suggest that treatment with super key is relatively safe. Further studies on this subject are needed to yield more concrete evidence.

  2. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  3. Collaboration: The key to integration of language and content in ...

    African Journals Online (AJOL)

    This contribution enters into dialogue with studies conducted both at school and university level on the effectiveness of interaction between subject teachers and language teachers to improve learners' subject-specific discourse literacies. An overview is given of the key findings of a report by the National Center for Literacy ...

  4. Discussion of manage mode for nuclear power construcation in China

    International Nuclear Information System (INIS)

    Gao Mingshi; Chen Hua

    2007-01-01

    This paper analyzed the development status of management mode for NPP construction and nuclear power engineering companies. Considering the national development plan of nuclear power, and making reference of the experiences of the successful construction of NPPs, the management mode for NPP construction in which the nuclear engineering companies are the main factors have been discussed. This paper proposed that EPC/TurnKey as the management mode for the nuclear power construction, led by the owner, and constructed by engineering companies according to the contracts, so as to establish a construction group with expertise knowledge. (authors)

  5. Traditional Chinese medicine information digitalization discussion.

    Science.gov (United States)

    Xie, Qi; Cui, Meng; Wu, Zhen-Dou; Zhao, Hong

    2010-11-01

    With the rapid development of information science, the ancient Traditional Chinese Medicine is combining with it rapidly, and forming a new discipline: Traditional Chinese Medicine (TCM) Informatics. TCM information digitalization is the process of digital processing, which uses modern information technology to obtain, process, store, and analyze TCM-related data, information, and knowledge. It gathers research, application development, and service in an integrated whole. This article systematically analyzes the key research issues of TCM informatics (e.g., on data resources, data standard, data system construction). Also, the methodology and technology of TCM information digitalization research are thoroughly discussed. The starting point of the research on traditional Chinese medical information digitalization was in question. The research from the current study research was drawn from collected information that was stored, transferred, and utilized. This process helped to place an emphasis on the topic, as well as extending its research areas. In addition, an innovative TCM information virtual study center was set up to support a great deal of fundamental work.

  6. Finding the Key Periods for Assimilating HJ-1A/B CCD Data and the WOFOST Model to Evaluate Heavy Metal Stress in Rice.

    Science.gov (United States)

    Zhao, Shuang; Qian, Xu; Liu, Xiangnan; Xu, Zhao

    2018-04-17

    Accurately monitoring heavy metal stress in crops is vital for food security and agricultural production. The assimilation of remote sensing images into the World Food Studies (WOFOST) model provides an efficient way to solve this problem. In this study, we aimed at investigating the key periods of the assimilation framework for continuous monitoring of heavy metal stress in rice. The Harris algorithm was used for the leaf area index (LAI) curves to select the key period for an optimized assimilation. To obtain accurate LAI values, the measured dry weight of rice roots (WRT), which have been proven to be the most stress-sensitive indicator of heavy metal stress, were incorporated into the improved WOFOST model. Finally, the key periods, which contain four dominant time points, were used to select remote sensing images for the RS-WOFOST model for continuous monitoring of heavy metal stress. Compared with the key period which contains all the available remote sensing images, the results showed that the optimal key period can significantly improve the time efficiency of the assimilation framework by shortening the model operation time by more than 50%, while maintaining its accuracy. This result is highly significant when monitoring heavy metals in rice on a large-scale. Furthermore, it can also offer a reference for the timing of field measurements in monitoring heavy metal stress in rice.

  7. Notes on a methodological discussion: autobiography, critique and time

    Directory of Open Access Journals (Sweden)

    Gunvor Løkken

    2010-06-01

    Full Text Available After having tried for some time to overview the contemporary field of qualitative research to give a lecture for a professorship in that area, my idea at the outset of writing this article was to address whether changes in qualitative research should be viewed as recurrent revolutions as highlighted by Denzin and Lincoln (2000; 2005, or as a field of continuing key themes and long-standing tensions, as conceptualized by Atkinson, Coffey and Delamont (2003. However, during my writing, after one detour into the May 2009 issue of Current Sociology and a second detour into the July 2009 issue of Qualitative Research, my attention focused on to how critical debate and review are displayed in different methodological positions of qualitative research. In my reading, the discussion in Current Sociology between main stream and postmodern methodological positioning revealed an utterly one-way feminist critique; this was also the case in one of three book reviews of The Handbook of Qualitative Research (Denzin and Lincoln, 2005 in the referred issue of Qualitative Research. My puzzle over this critical stance, and my third detour, into Yvonne Lincoln’s discussion of twenty-five years of qualitative and new paradigm research in the January 2010 Issue of Qualitative Inquiry, helped evolve the following notes on a methodological discussion. The notes are partly structured by a temporal narrative over personally lived qualitative research, and partly by an epistemological narrative of a methodological discussion, interwoven with the passing of time when writing.

  8. Where to Publish and Find Ontologies? A Survey of Ontology Libraries

    Science.gov (United States)

    d'Aquin, Mathieu; Noy, Natalya F.

    2011-01-01

    One of the key promises of the Semantic Web is its potential to enable and facilitate data interoperability. The ability of data providers and application developers to share and reuse ontologies is a critical component of this data interoperability: if different applications and data sources use the same set of well defined terms for describing their domain and data, it will be much easier for them to “talk” to one another. Ontology libraries are the systems that collect ontologies from different sources and facilitate the tasks of finding, exploring, and using these ontologies. Thus ontology libraries can serve as a link in enabling diverse users and applications to discover, evaluate, use, and publish ontologies. In this paper, we provide a survey of the growing—and surprisingly diverse—landscape of ontology libraries. We highlight how the varying scope and intended use of the libraries a ects their features, content, and potential exploitation in applications. From reviewing eleven ontology libraries, we identify a core set of questions that ontology practitioners and users should consider in choosing an ontology library for finding ontologies or publishing their own. We also discuss the research challenges that emerge from this survey, for the developers of ontology libraries to address. PMID:22408576

  9. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  10. Meetings and discussions

    CERN Document Server

    O'Driscoll, Nina

    1992-01-01

    This is part of a series of books, which gives training in key business communication skills. Emphasis is placed on building awareness of language appropriateness and fluency in typical business interactions. This new edition is in full colour.

  11. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  12. Midwifery education roundtable discussion: transitions to the workplace.

    Science.gov (United States)

    Lydon-Rochelle, Mona T; Kantrowitz-Gordon, Ira; Tower, Martha J Jody; Trego, Lori; Lagerberg, Ruth

    2002-01-01

    A snapshot of four graduates' views on their educational experience at a research institution as well as their perspective on how it prepared them for the challenges they faced in entering the workplace is presented. Discussants stated that research knowledge is a critical aspect to clinical practice. Their educational experience provided them with the ability to understand information technology applications, identify and access relevant scientific research, evaluate the integrity and comparability of research findings, and apply research findings to clinical practice. Areas within the curriculum that were identified as needing more content and/or greater emphasis included primary health care, how to work competently and effectively with persons from diverse cultural, socioeconomic, and racial and ethnic backgrounds, experience with public health providers, and content such as intimate partner violence and adolescent behaviors.

  13. 2nd Essen specialized discussions about repository mining

    International Nuclear Information System (INIS)

    Reinartz, Jerome

    2013-01-01

    The final storage of nuclear waste in Germany right now is more a political and societal than technical process. To promote the exchange of experience in the sophisticated field of mining technology, and put the focus back on finding a repository solution, the DMT in cooperation with GNS and DBE Technology initiated the Essen Specialized Discussions about Repository Mining. On February 28, more than 120 participants sought information about recent developments, exchanged experience, and maintained contacts. (orig.)

  14. Cryptanalysis of a chaotic block cipher with external key and its improved version

    International Nuclear Information System (INIS)

    Li Chengqing; Li Shujun; Alvarez, Gonzalo; Chen Guanrong; Lo, K.-T.

    2008-01-01

    Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: (1) a number of weak keys exist; (2) some important intermediate data of the cipher are not sufficiently random; (3) the whole secret key can be broken by a known-plaintext attack with only 120 consecutive known plain-bytes in one known plaintext. In addition, it is pointed out that an improved version of the chaotic cipher proposed by Wei et al. still suffers from all the same security defects

  15. GLOBAL TRADE. THE KEY TO TRANSATLANTIC COMPETITIVENESS

    Directory of Open Access Journals (Sweden)

    Mădălina Laura CUCIURIANU

    2015-04-01

    Full Text Available Global trade has an important characteristic in terms of open global markets by means of eliminating barriers to trade and investment. The United States and the European Union, two major international actors and competitors in the economic field, have both the opportunity to change the global trade by concluding the negotiations of the Transatlantic Trade and Investment Partnership. For this reason, this paper tries to find the connections between global trade and transatlantic competitiveness in the way that the global trade can be considered a key to transatlantic competitiveness. The United States and the European Union are global actors and competitors in the global economy and the play field is the global trade. In order to be aware of the importance ofglobal trade in the transatlantic competitiveness, this paper includes also an analysis of the concrete actions that both economic powers are taking in key-sectors of the transatlantic economy.

  16. KEY FACTORS IN MARKETING FOCUSED SERVICES BUSINESSES

    Directory of Open Access Journals (Sweden)

    Doris Yohanna Martínez Castrillón

    2016-07-01

    Full Text Available This article aims to identify the key success factors in the marketing area and describe them as managerial allies for companies that wish to position themselves in the market under a good sustainable performance , for it has been consulted theoretical references of Marketing as a management partner with collection and integration of data. Methodologically, it is located within the type of descriptive research field, with a design of transactional non-experimental, with an intentional non-probabilistic stratified sample of four reporting units. The findings established fifteen (15 points of influence called "key success factors (FCE in the area of marketing, and managerial allies of service companies in the security, surveillance and protection sector in industrial, commercial and residential sectors. Finally, it is intended that the actions of marketing service companies should focus to the welfare of both the organization, such as users, both in the environment, and economic, social and technological, characterized by ethics, sustainable development and transparency to respond appropriately.

  17. Discussion

    International Nuclear Information System (INIS)

    Sutcliffe, W.G.

    1991-01-01

    This is an edited transcript of the recorded discussions that followed the presentation of each paper and on the general comments at the conclusion of the session. No attempt was made to identity those who offered comments or asked questions

  18. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  19. Online discussion forums with embedded streamed videos on distance courses

    Directory of Open Access Journals (Sweden)

    Vicenc Fernandez

    2014-03-01

    Full Text Available Existing literature on education and technology has frequently highlighted the usefulness of online discussion forums for distance courses; however, the majority of such investigations have focused their attention only on text-based forums. The objective of this paper is to determine if the embedding of streamed videos in online discussion forums generates educational dialogue and consequently the feedback that students need in a Management Accounting Course. The findings suggest some interesting issues, such as: students prefer text answers except in complex questions, and videos never replace text commentaries and explanations, but rather complement them.

  20. Quantum hacking on quantum key distribution using homodyne detection

    Science.gov (United States)

    Huang, Jing-Zheng; Kunz-Jacques, Sébastien; Jouguet, Paul; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2014-03-01

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength-dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot-noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  1. Key Technologies of Phone Storage Forensics Based on ARM Architecture

    Science.gov (United States)

    Zhang, Jianghan; Che, Shengbing

    2018-03-01

    Smart phones are mainly running Android, IOS and Windows Phone three mobile platform operating systems. The android smart phone has the best market shares and its processor chips are almost ARM software architecture. The chips memory address mapping mechanism of ARM software architecture is different with x86 software architecture. To forensics to android mart phone, we need to understand three key technologies: memory data acquisition, the conversion mechanism from virtual address to the physical address, and find the system’s key data. This article presents a viable solution which does not rely on the operating system API for a complete solution to these three issues.

  2. Emission trading: A discussion paper

    International Nuclear Information System (INIS)

    1992-05-01

    Emission trading is a market-based incentive program designed to control air emissions in which a cap is placed on the total quantity of pollutants allowed to be emitted in an airshed. Appropriate shares of this amount are allocated among participating emission sources, and participants can buy or sell their shares. Advantages of emission trading include its potential to achieve air emission targets at a lower cost than the traditional command and control approach, and its ability to accommodate economic growth without compromising environmental quality. A study was conducted to evaluate the potential use of emission trading programs to achieve emission reduction goals set for nitrogen oxides, volatile organic compounds (VOC), and sulfur oxides. Emission trading programs in the USA are reviewed and a set of factors important for the success of emission trading are identified. Key policy and design issues related to an emission trading program are identified, explained, and discussed. Administrative issues are then analyzed, such as legislative authority, monitoring and enforcement requirements, and trading between jurisdictions. A preliminary assessment of emission trading for control of NOx and VOC in the Lower Fraser Valley indicates that emission trading would be feasible, but legislative authority to implement such a program would have to be introduced

  3. Containment-emergency-sump performance. Technical findings related to Unresolved Safety Issue A-43

    International Nuclear Information System (INIS)

    1983-04-01

    This report summarizes key technical findings related to the Unresolved Safety Issue A-43, Containment Emergency Sump Performance, and provides recommendations for resolution of attendant safety issues. The key safety questions relate to: (a) effects of insulation debris on sump performance; (b) sump hydraulic performance as determined by design features, submergence, and plant induced effects, and (c) recirculation pump performance wherein air and/or particulate ingestion can occur. The technical findings presented in this report provide information relevant to the design and performance evaluation of the containment emergency sump

  4. iPSC-Based Models to Unravel Key Pathogenetic Processes Underlying Motor Neuron Disease Development

    Directory of Open Access Journals (Sweden)

    Irene Faravelli

    2014-10-01

    Full Text Available Motor neuron diseases (MNDs are neuromuscular disorders affecting rather exclusively upper motor neurons (UMNs and/or lower motor neurons (LMNs. The clinical phenotype is characterized by muscular weakness and atrophy leading to paralysis and almost invariably death due to respiratory failure. Adult MNDs include sporadic and familial amyotrophic lateral sclerosis (sALS-fALS, while the most common infantile MND is represented by spinal muscular atrophy (SMA. No effective treatment is ccurrently available for MNDs, as for the vast majority of neurodegenerative disorders, and cures are limited to supportive care and symptom relief. The lack of a deep understanding of MND pathogenesis accounts for the difficulties in finding a cure, together with the scarcity of reliable in vitro models. Recent progresses in stem cell field, in particular in the generation of induced Pluripotent Stem Cells (iPSCs has made possible for the first time obtaining substantial amounts of human cells to recapitulate in vitro some of the key pathogenetic processes underlying MNDs. In the present review, recently published studies involving the use of iPSCs to unravel aspects of ALS and SMA pathogenesis are discussed with an overview of their implications in the process of finding a cure for these still orphan disorders.

  5. CASE STUDY: Lebanon — Researchers find new ways to resolve ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-12-13

    Dec 13, 2010 ... Communication is the key to conflict resolution A research team in ... as a model for a new applied research unit at the American University of Beirut. ... The LUN, for example, created a forum for discussing problems and ...

  6. Discussion in Postsecondary Classrooms

    Directory of Open Access Journals (Sweden)

    Curt Dudley-Marling

    2013-11-01

    Full Text Available Spoken language is, arguably, the primary means by which teachers teach and students learn. Much of the literature on language in classrooms has focused on discussion that is seen as both a method of instruction and a curricular outcome. While much of the research on discussion has focused on K-12 classrooms, there is also a body of research examining the efficacy of discussion in postsecondary settings. This article provides a review of this literature in order to consider the effect of discussion on student learning in college and university classrooms, the prevalence of discussion in postsecondary settings, and the quality of discussion in these settings. In general, the results of research on the efficacy of discussion in postsecondary settings are mixed. More seriously, researchers have not been explicit about the meaning of discussion and much of what is called discussion in this body of research is merely recitation with minimal levels of student participation. Although the research on discussion in college and university classrooms is inconclusive, some implications can be drawn from this review of the research including the need for future researchers to clearly define what they mean by “discussion.”

  7. Addressing the psychosocial and communication challenges posed by radiological/nuclear terrorism: key developments since NCRP Report No. 138.

    Science.gov (United States)

    Becker, Steven M

    2005-11-01

    One of the most innovative aspects of NCRP Report No. 138 (Management of Terrorist Incidents Involving Radioactive Material) was the high priority it accorded to psychosocial and communication issues. While previous discussions of radiological and nuclear terrorism had occasionally referred to these topics, NCRP Report No. 138 was the first report of its kind to recognize the profound challenges posed by these issues and to place them at the heart of preparedness and response efforts. In the years since the report's release, a host of important developments have taken place in relation to psychosocial and communication issues. This paper reviews key changes and advances in five broad areas: (1) training exercises, (2) policy and guidance development, (3) findings on hospital and clinician needs, (4) survey research on public perceptions of radiological terrorism, and (5) risk communication for radiological and nuclear terrorism situations. The article concludes with a discussion of continuing psychosocial and communication challenges, including critical areas needing further attention as the nation moves to meet the threat of terrorism involving radioactive materials.

  8. Pre- and in-Service Teachers Reading and Discussing Informational Texts

    Directory of Open Access Journals (Sweden)

    Theresa A. Deeney

    2016-05-01

    Full Text Available This study investigates U.S. elementary (kindergarten-Grade 6, ages 5-12 pre- and in-service teachers’ discussions of informational texts to understand current practices and identify needs with respect to how teachers support students in building knowledge from complex informational text as specified in the grade-level expectations of the Common Core State Standards adopted in many U.S. states. Transcripts and reflections from 17 in-service and 31 pre-service teachers’ informational text discussions were analyzed for teachers’ focus on the text, background knowledge, and text/background knowledge. In addition, transcripts were analyzed for the types of text ideas teachers targeted (details/main ideas, the comprehension demands placed on students, how teachers used follow-up moves to encourage higher level thinking, and how teachers use transcripts of their discussions to analyze and critique their own practice. Findings suggest that both pre- and in-service teachers draw heavily on students’ background knowledge and text details in their questioning; but differences exist in how pre- and in-service teachers use follow-up responses to promote knowledge building. Findings also suggest that both pre- and in-service teachers can use their transcripts to recognize areas of need, and offer themselves suggestions to better support students’ understanding. Implications are offered for teacher education and professional development.

  9. Key issues concerning changes in the radiological protection system: some thoughts from the French Society for Radiation Protection (SFRP)

    International Nuclear Information System (INIS)

    Schieber, C.; Cordoliani, Y.S.

    2002-01-01

    In 1999, the International Radiological Protection Association (IRPA) asked for contributions to the debate on future changes to the radiological protection system proposed by the International Commission on Radiological Protection (ICRP). In response, the Board of the French Society for Radiation Protection (SFRP) created a working group to deal specifically with this issue. It met on several occasions between April and July and its findings were presented at the IRPA Congress in May 2000. They were also published in the French journal Radioprotection and in the British Journal of Radiological Protection. To further its discussions, the Board of the SFRP decided to create a second working group which became operational in September 2001. It has around 20 members representing the major players in the radiological protection field in France: authorities, experts and professionals from the nuclear, medical and research fields as well as one association representative (the list of members can be found at the end of this document). The working group was set up to produce proposals relating to the key issues likely to be raised, particularly by the ICRP, concerning the development of new radiological protection recommendations. The members of the working group analysed the ICRP memorandum published in the June 2001 edition of the Journal of Radiological Protection and used their own experience to determine what these key issues would be. The following issues were discussed: General thoughts on the new radiological protection system proposed by the ICRP, Individual and collective approaches to the radiological risk, Comparison with chemical risk management, Radiological protection of the environment, Changes in exposure levels and units of measurement. This paper, which has been approved by the Board of the SFRP, gives the main conclusions of the working group on the key issues in these areas. It is intended to reflect the various opinions expressed during the groups

  10. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  11. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  12. Studies of key success factors of product development success: A reinterpretation of results

    DEFF Research Database (Denmark)

    Plichta, Kirsten; Harmsen, Hanne

    In this paper the general validity of the research area of key factors of success in product development is discussed. To be more specific we argue that validity hinges on the causal relation between success and success factrors ­ a relation that unaccounted for in the empirical studies....... The theoretical tradition of the resource-based perspective provides ­ at least to some extent ­ an account of this causality. An important point in the paper is that the key factors of success in the empi studies are not factors causally related to success, but at the most a number of valuable resources and thus......, but in the studies problems concerning implementation are not discussed. When the lists factors of success are interprested as valuable resources and capabilities, we show that some implications on the implementability might be deduced from the resource-based perspective....

  13. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  14. Craniofacial and temporal bone CT findings in cleidocranial dysplasia

    International Nuclear Information System (INIS)

    Gonzalez, Guido E.; Caruso, Paul A.; Curtin, Hugh D.; Small, Juan E.; Jyung, Robert W.; Troulis, Maria J.

    2008-01-01

    Cleidocranial dysplasia (CCD) is a multistructural polyostotic genetic disorder that results from mutation of the CBFA1 gene. Hearing loss is a frequent finding in CCD. We describe the CT craniofacial findings in CCD and provide a comprehensive discussion of the CT temporal bone findings in these patients. (orig.)

  15. Key methods for sustaining quality engineering data in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Cook, A [Canatom Ltd., Montreal, PQ (Canada)

    1996-12-31

    This paper discusses key methods for sustaining quality engineering data, the fundamental principles that these methods are based on, and the methods for supporting the performance of nuclear power plants by the provision of quality engineering data at all times. The concept of an `engineering data foundation`, and a Configuration Management data model are developed. The concepts and methods for managing the integrity of engineering data across many different databases and document systems are developed, including the key concepts of data-positions and data-values, Master Data and Copy Data, and the concept of a `partnership between people and technology`. (author). 7 refs., 1 tab., 2 figs.

  16. Image encryption based on nonlinear encryption system and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Chi, Yingying

    2015-03-01

    Recently, optical asymmetric cryptosystem (OACS) has became the focus of discussion and concern of researchers. Some researchers pointed out that OACS was not tenable because of misunderstanding the concept of asymmetric cryptosystem (ACS). We propose an improved cryptosystem using RSA public-key algorithm based on existing OACS and the new system conforms to the basic agreement of public key cryptosystem. At the beginning of the encryption process, the system will produce an independent phase matrix and allocate the input image, which also conforms to one-time pad cryptosystem. The simulation results show that the validity of the improved cryptosystem and the high robustness against attack scheme using phase retrieval technique.

  17. Key methods for sustaining quality engineering data in nuclear power plants

    International Nuclear Information System (INIS)

    Cook, A.

    1995-01-01

    This paper discusses key methods for sustaining quality engineering data, the fundamental principles that these methods are based on, and the methods for supporting the performance of nuclear power plants by the provision of quality engineering data at all times. The concept of an 'engineering data foundation', and a Configuration Management data model are developed. The concepts and methods for managing the integrity of engineering data across many different databases and document systems are developed, including the key concepts of data-positions and data-values, Master Data and Copy Data, and the concept of a 'partnership between people and technology'. (author). 7 refs., 1 tab., 2 figs

  18. EMSODEV and EPOS-IP: key findings for effective management of EU research infrastructure projects

    Science.gov (United States)

    Materia, Paola; Bozzoli, Sabrina; Beranzoli, Laura; Cocco, Massimo; Favali, Paolo; Freda, Carmela; Sangianantoni, Agata

    2017-04-01

    -2019) is a project of 47 partners, 6 associate partners and several international organizations for a total of 25 countries involved. EPOS IP is a key step in EPOS' mission of a pan-European Earth science integrated platform. It will deliver not only a suite of domain-specific and multidisciplinary data and services in one platform, but also the legal, governance and financial frameworks to ensure the infrastructure future operation and sustainability (EPOS ERIC). INGV experience over the years indicates that effective management of EU RIs projects should contain 5 basic elements: 1.Defined life cycle and milestones: Map of phases, deliverables, key milestones and sufficiency criteria for each group involved in the project using project management tools and software. 2.Shared organization, systems, roles: Defined roles for team members and responsibilities for functional managers are crucial. Similarly, a system of communication and team involvement is essential to success. Leadership and interpersonal/organizational skills are also important. 3.Quality assurance: Quality dimension should be aligned to the project objectives and specific criteria should be identified for each phase of the project. 4.Tracking and variance analysis: Regular reports and periodic meetings of the teams are crucial to identify when things are off target. Schedule slips, cost overruns, open issues, new risks and problems must be dealt with as early as possible. 5.Impact assessment by monitoring the achievement of results and socio-economic impact.

  19. The dynamics of God's reign as a hermeneutic key to Jesus ...

    African Journals Online (AJOL)

    With this study, we seek to contribute to the theological discussion regarding the nature and the meaning of the Christian eschaton. We will argue that the dynamics of God's reign provide a hermeneutic key to Jesus' 'eschatological expectation'. It is not possible to grasp the full meaning of Jesus' urgent expectation of the ...

  20. Paediatric International Nursing Study: using person-centred key performance indicators to benchmark children's services.

    Science.gov (United States)

    McCance, Tanya; Wilson, Val; Kornman, Kelly

    2016-07-01

    The aim of the Paediatric International Nursing Study was to explore the utility of key performance indicators in developing person-centred practice across a range of services provided to sick children. The objective addressed in this paper was evaluating the use of these indicators to benchmark services internationally. This study builds on primary research, which produced indicators that were considered novel both in terms of their positive orientation and use in generating data that privileges the patient voice. This study extends this research through wider testing on an international platform within paediatrics. The overall methodological approach was a realistic evaluation used to evaluate the implementation of the key performance indicators, which combined an integrated development and evaluation methodology. The study involved children's wards/hospitals in Australia (six sites across three states) and Europe (seven sites across four countries). Qualitative and quantitative methods were used during the implementation process, however, this paper reports the quantitative data only, which used survey, observations and documentary review. The findings demonstrate the quality of care being delivered to children and their families across different international sites. The benchmarking does, however, highlight some differences between paediatric and general hospitals, and between the different key performance indicators across all the sites. The findings support the use of the key performance indicators as a novel method to benchmark services internationally. Whilst the data collected across 20 paediatric sites suggest services are more similar than different, benchmarking illuminates variations that encourage a critical dialogue about what works and why. The transferability of the key performance indicators and measurement framework across different settings has significant implications for practice. The findings offer an approach to benchmarking and celebrating

  1. Inspire and develop people, two key competence for safety leadership

    International Nuclear Information System (INIS)

    Gonzalez, F.; Perez, O.; Fernandez, M.; Alvarez, N.; Villadoniga, J. I.

    2014-01-01

    Developing leadership skills in organizations is key to ensuring the sustainability of excellent results in industries with high standards of safety and reliability element. In order to have a model of development of specific leadership for these organizations, Tecnatom in 2011, we initiated an internal project to find and adapt a competency model to these requirements. (Author)

  2. Measuring social inclusion--a key outcome in global mental health.

    Science.gov (United States)

    Baumgartner, Joy Noel; Burns, Jonathan K

    2014-04-01

    Social inclusion is increasingly recognized as a key outcome for evaluating global mental health programmes and interventions. Whereas social inclusion as an outcome is not a new concept in the field of mental health, its measurement has been hampered by varying definitions, concepts and instruments. To move the field forward, this paper reviews the currently available instruments which measure social inclusion and are reported in the literature, realizing that no single measure will be appropriate for all studies or contexts. A systematic literature search of English language peer-reviewed articles published through February 2013 was undertaken to identify scales specifically developed to measure social inclusion or social/community integration among populations with mental disorders. Five instruments were identified through the search criteria. The scales are discussed in terms of their theoretical underpinnings, domains and/or key items and their potential for use in global settings. Whereas numerous reviewed abstracts discussed mental health and social inclusion or social integration, very few were concerned with direct measurement of the construct. All identified scales were developed in high-income countries with limited attention paid to how the scale could be adapted for cross-cultural use. Social inclusion is increasingly highlighted as a key outcome for global mental health policies and programmes, yet its measurement is underdeveloped. There is need for a global cross-cultural measure that has been developed and tested in diverse settings. However, until that need is met, some of the scales presented here may be amenable to adaptation.

  3. Research on Key Technology and Applications for Internet of Things

    Science.gov (United States)

    Chen, Xian-Yi; Jin, Zhi-Gang

    The Internet of Things (IOT) has been paid more and more attention by the academe, industry, and government all over the world. The concept of IOT and the architecture of IOT are discussed. The key technologies of IOT, including Radio Frequency Identification technology, Electronic Product Code technology, and ZigBee technology are analyzed. The framework of digital agriculture application based on IOT is proposed.

  4. Key issues regarding digital libraries evaluation and integration

    CERN Document Server

    Shen, Rao; Fox, Edward A

    2013-01-01

    This is the second book based on the 5S (Societies, Scenarios, Spaces, Structures, Streams) approach to digital libraries (DLs). Leveraging the first volume, on Theoretical Foundations, we focus on the key issues of evaluation and integration. These cross-cutting issues serve as a bridge for those interested in DLs, connecting the introduction and formal discussion in the first book, with the coverage of key technologies in the third book, and of illustrative applications in the fourth book. These two topics have central importance in the DL field, allowing it to be treated scientifically as well as practically. In the scholarly world, we only really understand something if we know how to measure and evaluate it. In the Internet era of distributed information systems, we only can be practical at scale if we integrate across both systems and their associated content. Evaluation of DLs must take place atmultiple levels,so we can address the different entities and their associated measures. Thus, for digital obj...

  5. Challenges to code status discussions for pediatric patients.

    Directory of Open Access Journals (Sweden)

    Katherine E Kruse

    (p≤0.0001. Attending physicians and trainees perceive families as more receptive to code status discussions than nurses (p<0.0001 and p = 0.0018, respectively.Providers have poor understanding of code status options and differ significantly in their comfort having code status discussions and their perceptions of these discussions. These findings may reflect inherent differences among providers, but may also reflect discordant visions of appropriate care and function as a potential source of moral distress. Lack of knowledge of code status options and differences in provider perceptions are likely barriers to quality communication surrounding end-of-life options.

  6. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  7. Discussing agrochemical themes: an approach through socio-scientific controversies

    Directory of Open Access Journals (Sweden)

    Eril Medeiros da Fonseca

    2017-12-01

    Full Text Available The theme of "agro-toxicology" in the Rural Education pervades key issues to be problematized, such as the care of rural workers, from the concept of health as something broad, involving access to cultural goods, leisure and communication and still, the collective physical, mental and social well-being. The use of pesticides, in addition to compromising the health of those who work in the field and those who feed on what is produced in the field, brings with it a conception of health that, in addition to suffering and individualizing, affects our biological diversity. The objective of this study is to discuss pesticides and their implications for health, through the approach of Socio-Scientific Controversies (CSC in Science Teaching and Rural Education.

  8. CT findings of cerebral paragonimiasis in the chronic state

    International Nuclear Information System (INIS)

    Udaka, F.; Okuda, B.; Tsuji, T.; Kameyama, M.; Okada, M.

    1988-01-01

    The CT findings in 5 patients with cerebral paragonimiasis in the chronic state are presented. The findings were: 1) multiple, densely calcified areas with a variety of round or nodular shapes in the brain, 2) a large low density area surrounding or connecting with the calcified areas, and 3) cortical atrophy and ventricular dilatation. The relation between the CT findings and the previously reported plain skull X-ray findings or neuropathological findings are discussed. (orig.)

  9. Public health economics: a systematic review of guidance for the economic evaluation of public health interventions and discussion of key methodological issues

    Science.gov (United States)

    2013-01-01

    Background If Public Health is the science and art of how society collectively aims to improve health, and reduce inequalities in health, then Public Health Economics is the science and art of supporting decision making as to how society can use its available resources to best meet these objectives and minimise opportunity cost. A systematic review of published guidance for the economic evaluation of public health interventions within this broad public policy paradigm was conducted. Methods Electronic databases and organisation websites were searched using a 22 year time horizon (1990–2012). References of papers were hand searched for additional papers for inclusion. Government reports or peer-reviewed published papers were included if they; referred to the methods of economic evaluation of public health interventions, identified key challenges of conducting economic evaluations of public health interventions or made recommendations for conducting economic evaluations of public health interventions. Guidance was divided into three categories UK guidance, international guidance and observations or guidance provided by individual commentators in the field of public health economics. An assessment of the theoretical frameworks underpinning the guidance was made and served as a rationale for categorising the papers. Results We identified 5 international guidance documents, 7 UK guidance documents and 4 documents by individual commentators. The papers reviewed identify the main methodological challenges that face analysts when conducting such evaluations. There is a consensus within the guidance that wider social and environmental costs and benefits should be looked at due to the complex nature of public health. This was reflected in the theoretical underpinning as the majority of guidance was categorised as extra-welfarist. Conclusions In this novel review we argue that health economics may have come full circle from its roots in broad public policy economics. We may

  10. Promoting Discussion in Peer Instruction: Discussion Partner Assignment and Accountability Scoring Mechanisms

    Science.gov (United States)

    Chou, Chih-Yueh; Lin, Pin-Hsun

    2015-01-01

    Peer instruction (PI) involves students answering questions and peer discussion learning activities. PI can enhance student performance and engagement in classroom instruction. However, some students do not engage in the discussions. This study proposes two mechanisms, discussion partner assignment and accountability scoring mechanisms, to form…

  11. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  12. Key Learning Styles of Teaching English to Students from the Asian-Pacific Region

    Directory of Open Access Journals (Sweden)

    Kovalenko Natalia A.

    2016-01-01

    Full Text Available This article examines key styles of learning English as the second language, particularly for students from Asian-Pacific countries. It deals with the methods of improving their learning skills and abilities. The most traditional and popular ways of learning styles are pointed out. The authors also discuss teaching approaches for matching and interaction of learning styles in different cultures. The authors also discuss teaching approaches to matching and interaction of learning styles in different cultures.

  13. Generic Structure of Discussion Sections in ESP Research Articles across International and Iranian Journals

    Directory of Open Access Journals (Sweden)

    Masoud Khalili Sabet

    2015-04-01

    Full Text Available Reviewing literature reveals that identifying generic structure of research articles (RAs in different fields of study, especially ESP, has received much attention. The major purpose behind such trends of research has been raising researchers' awareness of the common conventions in writing RAs. Along with this universal trend, a lot of genre studies have been done in Iranian context; however, it seems that ESP RAs have not been paid due attention yet. Hence this study aimed at investigating the generic structure of ESP RAs in international and Iranian journals. Applying Kanoksilapatham's (2007 model to the compiled corpus, it was found that contextualizing the study (Move 1 and consolidating results (Move 2 were the obligatory moves in Discussion section of ESP RAs across international and Iranian journals. Evaluation of the findings was a new step found in international Discussion sections but absent in Iranian ones. Related discussion of these findings prepares the researchers for publishing in international and Iranian ESP journals. Keywords: ESP, Discussion section, Move, Step, Author presence, Generic structure

  14. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  15. Peru; Third Review and Inflation Consultation Under the Stand-By Arrangement and Request for Waiver of Applicability of Performance Criteria: Staff Report; Staff Supplement; Press Release on the Executive Board Discussion; and Statement by the Executive Director for Peru

    OpenAIRE

    International Monetary Fund

    2008-01-01

    This paper discusses key findings of the Third Review for Peru and Inflation Consultation Under the Stand-By Arrangement. All performance criteria for end-December 2007 and end-March 2008 were observed, but inflation in March exceeded the upper limit of the program’s consultation band around the official inflation target range. The end-March structural benchmark was observed and progress has been made on end-June benchmarks. The outlook for 2008 remains favorable, with the economy continuing ...

  16. The adenoid as a key factor in upper airway infections.

    Science.gov (United States)

    van Cauwenberge, P B; Bellussi, L; Maw, A R; Paradise, J L; Solow, B

    1995-06-01

    The adenoids (and the nasopharynx) play a key role in the normal functioning and in various pathologies of the upper respiratory tract. In this paper the role of adenoidal pathology and the beneficial effect of adenoidectomy in some upper respiratory tract and facial anomalies and diseases are discussed; otitis media with effusion, recurrent acute otitis media, sinusitis, snoring and sleep apnea and abnormal patterns in the midface growth and development.

  17. Extending Previous cG×I Findings on 5-HTTLPR's Moderation of Intervention Effects on Adolescent Substance Misuse Initiation.

    Science.gov (United States)

    Schlomer, Gabriel L; Cleveland, H Harrington; Feinberg, Mark E; Wolf, Pedro S A; Greenberg, Mark T; Spoth, Richard L; Redmond, Cleve; Tricou, Eric P; Vandenbergh, David J

    2017-11-01

    This study addresses replication in candidate gene × environment interaction (cG×E) research by investigating if the key findings from Brody, Beach, Philibert, Chen, and Murry (2009) can be detected using data (N = 1,809) from the PROSPER substance use preventive intervention delivery system. Parallel to Brody et al., this study tested the hypotheses that substance misuse initiation would increase faster from age 11 to age 14 and be higher at age 14 among: (a) 5-HTTLPR short carrier adolescents versus long homozygotes, (b) control versus intervention adolescents, and (c) 5-HTTLPR short carriers in the control condition versus all other participants. The hypotheses were generally supported and results were consistent with Brody et al.'s cG×I finding. Results are discussed in light of replication issues in cG×E research and implications for intervention. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.

  18. NCAP projection displays: key issues for commercialization

    Science.gov (United States)

    Tomita, Akira; Jones, Philip J.

    1992-06-01

    Recently there has been much interest in a new polymer nematic dispersion technology, often called as NCAP, PDLC, PNLC, LCPC, etc., since projection displays using this technology have been shown to produce much brighter display images than projectors using conventional twisted nematic (TN) lightvalves. For commercializing projection displays based on this polymer nematic dispersion technology, the new materials must not only meet various electro- optic requirements, e.g., operational voltage, `off-state'' scattering angle, voltage holding ratio and hysteresis, but must also be stable over the lifetime of the product. This paper reports recent progress in the development of NCAP based projection displays and discusses some of the key commercialization issues.

  19. Key Drivers for Cooperation toward Sustainable Development and the Management of CO2 Emissions: Comparative Analysis of Six Northeast Asian Countries

    Directory of Open Access Journals (Sweden)

    Andrew Chapman

    2018-01-01

    Full Text Available This study analyzes the key drivers of the relationship between economic growth and carbon emissions in six Northeast Asian countries (China, Japan, Republic of Korea, Democratic People’s Republic of Korea, Mongolia, and Russia from 1991 to 2015. We apply a decomposition analysis approach using Logarithmic Mean Divisia Index to identify the main contributing factors toward CO2 emission changes. To discuss the decomposition results in more in detail, we explain the energy portfolio change in each country to understand the energy and resource utilization strategy. From the results, we find that the key driving factors of CO2 emissions change and energy portfolio trends are different among Northeast Asian countries, driven by economic growth in China and Korea, reduced by energy efficiency improvements in Russia and the DPRK, while being relatively benign in Japan and Mongolia due to a combination of these factors. This result implies that we can better understand the regional cooperation policy for improving each driving factor to achieve sustainable development and management of CO2 emissions considering the characteristics of each country.

  20. Security bound of two-basis quantum-key-distribution protocols using qudits

    International Nuclear Information System (INIS)

    Nikolopoulos, Georgios M.; Alber, Gernot

    2005-01-01

    We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid

  1. Self-transcendence: Lonergan's key to integration of nursing theory, research, and practice.

    Science.gov (United States)

    Perry, Donna J

    2004-04-01

    This paper proposes that the philosophy of Bernard Lonergan can provide insight into the challenge of integrating nursing theory, research and practice. The author discusses Lonergan's work in regard to reflective understanding, authenticity and the human person as a subject of consciously developing unity. This is followed by a discussion of two key elements in Lonergan's work that relate to nursing: the subject-object challenge of nursing inquiry and common sense vs. scientific knowledge. The author suggests that integration of nursing theory, science and practice may be achieved through self-transcendence.

  2. Factors Affecting the Participation of Social Studies Teacher Candidates in Discussions on Controversial Issues

    Directory of Open Access Journals (Sweden)

    A. Figen ERSOY

    2013-05-01

    Full Text Available Social studies teachers employ discussions about controversial issues in their classrooms as an effective instructional tool in order to improve citizenship education. Therefore, teaching about controversial issues in preservice social studies programs is important for improving pre-service teachers’ understanding of their own abilities to teach about citizenship issues and their skills to teach about controversial issues in their classrooms as well. Preservice teachers ought to be encouraged to participate more in classroom discussions about controversial issues. Therefore, this study aim to understand and explain factors that affect social studies teacher candidates’ participation in classroom discussions about controversial issues and suggest how this process might be more efficient and effective in Turkey. 1957 pre-service social studies teachers from 12 different universities in Turkey participated in this study. A questionaire was used to collect data for this research. The questionaire included likert type 16 items regarding students’ personal information and factors that affect the level of participation in classroom discussions about controversial issues and one open-ended question regarding implications on how discussions can be improved in a way that help the discussions more effective and efficient. Chi-Square, frequency, and percentange tests were used to analyze the quantitative data. Inductive content analysis method was employed to analyze and code the qualitative data. The findings of the study showed that while 92.2 % pre-service social studies teachers stated that they participate in the dicussions on controversial issues when they only find it interested, 79.4 % participant pointed out that they do not participate in the discussions, if they believe they do not have enough knowledge about the topic of the dicussion. In addition, 47.5% of the participants stated that they do not want to participate in the discussions

  3. Discussion on teaching reform of environmental planning and management

    Science.gov (United States)

    Zhang, Qiugen; Chen, Suhua; Xie, Yu; Wei, Li'an; Ding, Yuan

    2018-05-01

    The curriculum of environmental planning and management is an environmental engineering major curriculum established by the teaching steering committee of environmental science and engineering of Education Ministry, which is the core curriculum of Chinese engineering education professional certification. It plays an important role in cultivating environmental planning and environmental management ability of environmental engineering major. The selection and optimization of the course teaching content of environmental planning and management were discussed which including curriculum teaching content updating and optimizing and teaching resource system construction. The comprehensive application of teaching method was discussed which including teaching method synthesis and teaching method. The final combination of the assessment method was also discussed which including the formative assessment normal grades and the final result of the course examination. Through the curriculum comprehensive teaching reform, students' knowledge had been broadened, the subject status and autonomy of learning had been enhanced, students' learning interest had been motivated, the ability of students' finding, analyzing and solving problems had been improved. Students' innovative ability and positive spirit had been well cultivated.

  4. Training: Who Needs It? Research Report 1995. Key Issues for Providers.

    Science.gov (United States)

    Hotel and Catering Training Co., London (England).

    Aimed at all those involved in the supply of training and vocational education for the hospitality industry, this report summarizes findings of the research report, "Training Who Needs It?" It draws out and explores in more detail key issues relating to the provision of training, support, and related initiatives for the industry. Section…

  5. Fragile X premutation carriers: A systematic review of neuroimaging findings.

    Science.gov (United States)

    Brown, Stephanie S G; Stanfield, Andrew C

    2015-05-15

    Expansion of the CGG repeat region of the FMR1 gene from less than 45 repeats to between 55 and 200 repeats is known as the fragile X premutation. Carriers of the fragile X premutation may develop a neurodegenerative disease called fragile X-associated tremor/ataxia syndrome (FXTAS). Recent evidence suggests that premutation carriers experience other psychiatric difficulties throughout their lifespan. Medline, EMBASE and PsychINFO were searched for all appropriate English language studies published between January 1990 and December 2013. 419 potentially relevant articles were identified and screened. 19 articles were included in the analysis. We discuss key structural magnetic resonance imaging (MRI) findings such as the MCP sign and white matter atrophy. Additionally, we discuss how functional MRI results have progressed our knowledge of how FXTAS may manifest, including reduced brain activation during social and memory tasks in multiple regions. This systematic review may have been limited by the search for articles on just 3 scientific databases. Differing techniques and methods of analyses between research groups and primary research articles may have caused differences in results between studies. Current MRI studies into the fragile X premutation have been important in the diagnosis of FXTAS and identifying potential pathophysiological mechanisms. Associations with blood based measures have also demonstrated that neurodevelopmental and neurodegenerative aspects of the fragile X premutation could be functionally and pathologically separate. Larger longitudinal studies will be required to investigate these conclusions. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. Parental discussion of G6PD deficiency and child health: implications for clinical practice.

    Science.gov (United States)

    Guan, Yue; Roter, Debra L; Huang, Aichu; Erby, Lori A H; Chien, Yin-Hsiu; Hwu, Wuh-Liang

    2014-03-01

    Parents are encouraged to discuss self-care with children affected by G6PD deficiency; however, little is known about the extent or impact of these discussions on the physical and psychosocial health of these children. The purpose of this study was to examine the nature of parental-child discussions of G6PD deficiency self-care and their relationship to child health. A quantitative cross-sectional survey of 178 Taiwanese parents of children with G6PD deficiency was conducted. The extent of parental-child self-care discussions was assessed in regards to coverage of nine key topics. Parent's G6PD deficiency status, knowledge of haemolytic anaemia symptoms and reported G6PD deficiency education from providers were examined as correlates of parental discussion. Child health was assessed with the child health questionnaire-parent form (Chinese version) and a 13-item haemolytic anaemia symptom list. Self-care discussions were positively correlated with parental G6PD deficiency status (β=2.08, p=0.03), accurate identification of haemolytic anaemia symptoms (β=0.18, p=0.01), the thoroughness and clarity of patient education (β=0.14, pchild age (β=1.04, pchild health (β=1.18, pchild G6PD deficiency self-care discussions are associated with better child health, and parental involvement in these discussions is facilitated by the thoroughness and clarity of patient education received from providers.

  7. A practical two-way system of quantum key distribution with untrusted source

    International Nuclear Information System (INIS)

    Chen Ming-Juan; Liu Xiang

    2011-01-01

    The most severe problem of a two-way 'plug-and-play' (p and p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an “untrusted source . This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered. (general)

  8. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  9. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  10. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  11. Cryptanalysis of the public key encryption based on multiple chaotic systems

    International Nuclear Information System (INIS)

    Zhang Linhua

    2008-01-01

    Recently, Ranjan proposed a novel public key encryption technique based on multiple chaotic systems [Phys Lett 2005;95]. Unfortunately, Wang soon gave a successful attack on its special case based on Parseval's theorem [Wang K, Pei W, Zhou L, et al. Security of public key encryption technique based on multiple chaotic system. Phys Lett A, in press]. In this letter, we give an improved example which can avoid the attack and point out that Wang cannot find the essential drawback of the technique. However, further experimental result shows Ruanjan's encryption technique is inefficient, and detailed theoretic analysis shows that the complexity to break the cryptosystem is overestimated

  12. Special Collections in ARL Libraries: A Discussion Report from the ARL Working Group on Special Collections

    Science.gov (United States)

    Association of Research Libraries, 2009

    2009-01-01

    This discussion report identifies key issues in the management of special collections material in the 21st century. The report uses a broad definition of "special collections," which encompasses distinctive material in all media and attendant library services. The group's main focus was on 19th- and 20th-century materials, including…

  13. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  14. Quality and Improvement in Scottish Education: Trends in Inspection Findings 2008-2011

    Science.gov (United States)

    Education Scotland, 2012

    2012-01-01

    The findings of Education Scotland's sectoral programme of inspections, which sample the providers of education at every stage from the early years to adult learning, provide a key source of evidence on how effectively one of its core public services is performing. The last published summary of inspection findings was produced in 2009 when Her…

  15. Bearings with a key role in nuclear reactor safety

    International Nuclear Information System (INIS)

    Jackson, J.

    1981-01-01

    The most critical period during the operation of heavy-duty pumps occurs at run-up, when sudden high loads coincide with below normal oil pressure. When those pumps are a key component of a nuclear reactor safety-system, reliability takes on a special meaning. Electricite de France recently invited a British company, Michell Bearings, to find a solution to these 'black-start' problems, the details of which are described in the following article

  16. Technical discussions on Emissions and Atmospheric Modeling (TEAM)

    Science.gov (United States)

    Frost, G. J.; Henderson, B.; Lefer, B. L.

    2017-12-01

    A new informal activity, Technical discussions on Emissions and Atmospheric Modeling (TEAM), aims to improve the scientific understanding of emissions and atmospheric processes by leveraging resources through coordination, communication and collaboration between scientists in the Nation's environmental agencies. TEAM seeks to close information gaps that may be limiting emission inventory development and atmospheric modeling and to help identify related research areas that could benefit from additional coordinated efforts. TEAM is designed around webinars and in-person meetings on particular topics that are intended to facilitate active and sustained informal communications between technical staff at different agencies. The first series of TEAM webinars focuses on emissions of nitrogen oxides, a criteria pollutant impacting human and ecosystem health and a key precursor of ozone and particulate matter. Technical staff at Federal agencies with specific interests in emissions and atmospheric modeling are welcome to participate in TEAM.

  17. To discuss illicit nuclear trafficking

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, Galya I [Los Alamos National Laboratory; Severe, William R [Los Alamos National Laboratory; Wallace, Richard K [Los Alamos National Laboratory

    2010-01-01

    The Illicit nuclear trafficking panel was conducted at the 4th Annual INMM workshop on Reducing the Risk from Radioactive and Nuclear Materials on February 2-3, 2010 in Washington DC. While the workshop occurred prior to the Nuclear Security Summit, April 12-13 2010 in Washington DC, some of the summit issues were raised during the workshop. The Communique of the Washington Nuclear Security Summit stated that 'Nuclear terrorism is one of the most challenging threats to international security, and strong nuclear security measures are the most effective means to prevent terrorists, criminals, or other unauthorized actors from acquiring nuclear materials.' The Illicit Trafficking panel is one means to strengthen nuclear security and cooperation at bilateral, regional and multilateral levels. Such a panel promotes nuclear security culture through technology development, human resources development, education and training. It is a tool which stresses the importance of international cooperation and coordination of assistance to improve efforts to prevent and respond to incidents of illicit nuclear trafficking. Illicit trafficking panel included representatives from US government, an international organization (IAEA), private industry and a non-governmental organization to discuss illicit nuclear trafficking issues. The focus of discussions was on best practices and challenges for addressing illicit nuclear trafficking. Terrorism connection. Workshop discussions pointed out the identification of terrorist connections with several trafficking incidents. Several trafficking cases involved real buyers (as opposed to undercover law enforcement agents) and there have been reports identifying individuals associated with terrorist organizations as prospective plutonium buyers. Some specific groups have been identified that consistently search for materials to buy on the black market, but no criminal groups were identified that specialize in nuclear materials or isotope

  18. Libraries and key performance indicators a framework for practitioners

    CERN Document Server

    Appleton, Leo

    2017-01-01

    Libraries and Key Performance Indicators: A Framework for Practitioners explores ways by which libraries across all sectors can demonstrate their value and impact to stakeholders through quality assurance and performance measurement platforms, including library assessment, evaluation methodologies, surveys, and annual reporting. Whilst several different performance measurement tools are considered, the book's main focus is on one tool in particular: Key Performance Indicators (KPIs). KPIs are increasingly being used to measure the performance of library and information services, however, linking KPIs to quality outcomes, such as impact and value can prove very difficult. This book discusses, in detail, the concept of KPIs in the broader context of library assessment and performance measurement. Through reviewing some of the applied theory around using KPIs, along with harvesting examples of current best practices in KPI usage from a variety of different libraries, the book demystifies library KPIs, providing ...

  19. Transmission fidelity is the key to the build-up of cumulative culture.

    Science.gov (United States)

    Lewis, Hannah M; Laland, Kevin N

    2012-08-05

    Many animals have socially transmitted behavioural traditions, but human culture appears unique in that it is cumulative, i.e. human cultural traits increase in diversity and complexity over time. It is often suggested that high-fidelity cultural transmission is necessary for cumulative culture to occur through refinement, a process known as 'ratcheting', but this hypothesis has never been formally evaluated. We discuss processes of information transmission and loss of traits from a cognitive viewpoint alongside other cultural processes of novel invention (generation of entirely new traits), modification (refinement of existing traits) and combination (bringing together two established traits to generate a new trait). We develop a simple cultural transmission model that does not assume major evolutionary changes (e.g. in brain architecture) and show that small changes in the fidelity with which information is passed between individuals can lead to cumulative culture. In comparison, modification and combination have a lesser influence on, and novel invention appears unimportant to, the ratcheting process. Our findings support the idea that high-fidelity transmission is the key driver of human cumulative culture, and that progress in cumulative culture depends more on trait combination than novel invention or trait modification.

  20. Key action items for the stem cell field: looking ahead to 2014.

    Science.gov (United States)

    Knoepfler, Paul S

    2013-12-01

    The stem cell field is at a critical juncture in late 2013. We find ourselves buoyed by building momentum for both transformative basic science discoveries and clinical translation of stem cells. Cellular reprogramming has given the field exciting new avenues as well. The overall prospect of novel stem cell-based therapies becoming a reality for patients in the coming years has never seemed higher. At the same time, we face serious challenges. Some of these challenges, such as stem cell tourism, are familiar to us, although even those are evolving in ways that require adaptability and action by the stem cell field. Other new challenges are also emerging, including an urgent need for formal physician training in stem cells, regulatory compliance balanced with innovation and U.S. Food and Drug Administration reform, and savvy educational outreach. Looking ahead to 2014, both the challenges and opportunities for the stem cell field require a proactive, thoughtful approach to maximize the potential for a positive impact from stem cell advances. In this study, I discuss the key action items for the field as we look ahead to the coming year and beyond.

  1. Why finding costs are now a major problem [in the US petroleum industry

    International Nuclear Information System (INIS)

    Gaddis, D.; Brock, H.; Boynton, C.

    1993-01-01

    A major problem facing the US petroleum industry is the higher average finding costs that now exist within the US compared to the average finding costs outside the US. It has been argued that federal lands and offshore areas need to be open for drilling in order to reduce average finding costs in the US. Certainly, the development of a national energy policy must acknowledge the importance of finding costs. Financial analysts for some time have acknowledged the importance of finding costs in evaluating individual energy firms. Analysts expect mergers when it is cheaper for companies to purchase reserves than to find them. Just as industry-average finding costs are a key determinant of long-term market prices for oil and gas, relative finding costs are a key determinant of a company's stock market value. Division managers are now judged regularly by top management on the basis of relative finding costs. The heavy use of finding costs data is causing its own problems, however, because there is as yet no standard for calculating and reporting those costs. This article analyzes the strengths and weaknesses of conventional techniques for determining finding costs. Our goal is a finding costs measure that is a reliable indicator of future profitability. Conceptually, a finding cost figure is a measurement of how much it costs a company to find a barrel of oil or an mcf of gas. The figure is arrived at by dividing the figure for costs incurred during a specified period by the volume (barrels or mcfs) of reserve added during the same period. (author)

  2. Key factors in the successful implementation of enterprise resource planning system

    Directory of Open Access Journals (Sweden)

    Farajollah Rahnavard

    2014-04-01

    Full Text Available Enterprise Resource Planning Systems (ERP are considered as the newest and most effective tools of enterprise resource planning and include an interconnected information, management and engineering system that meets all the needs of an organization. ERP implementation is costly and time-consuming and makes fundamental change in the process, if not implemented correctly it will cause challenges in most parts of the organization and will certainly fail. Therefore, the identification of key success factors in implementing ERP helps organizations avoid the loss of the project. This research aims to identify key success factors for ERP by examining 185 managers, professionals, experts of the Information and Communication Technology Institute associated with the Ministry of Communications and Information Technology of Iran. A questionnaire was used to collect data. Findings from exploratory factor analysis indicate that five factors: 1 user friendliness, flexible and consistency 2 establishment of project management; 3 alignment with user needs; 4 Management of organizational changes, and 5 observing the principles of successful implementation of ERP affect the institute and the corresponding suggestions are proposed consistent with these findings.

  3. Improving the creation and reporting of structured findings during digital pathology review

    Directory of Open Access Journals (Sweden)

    Ida Cervin

    2016-01-01

    Full Text Available Background: Today, pathology reporting consists of many separate tasks, carried out by multiple people. Common tasks include dictation during case review, transcription, verification of the transcription, report distribution, and report the key findings to follow-up registries. Introduction of digital workstations makes it possible to remove some of these tasks and simplify others. This study describes the work presented at the Nordic Symposium on Digital Pathology 2015, in Linköping, Sweden. Methods: We explored the possibility to have a digital tool that simplifies image review by assisting note-taking, and with minimal extra effort, populates a structured report. Thus, our prototype sees reporting as an activity interleaved with image review rather than a separate final step. We created an interface to collect, sort, and display findings for the most common reporting needs, such as tumor size, grading, and scoring. Results: The interface was designed to reduce the need to retain partial findings in the head or on paper, while at the same time be structured enough to support automatic extraction of key findings for follow-up registry reporting. The final prototype was evaluated with two pathologists, diagnosing complicated partial mastectomy cases. The pathologists experienced that the prototype aided them during the review and that it created a better overall workflow. Conclusions: These results show that it is feasible to simplify the reporting tasks in a way that is not distracting, while at the same time being able to automatically extract the key findings. This simplification is possible due to the realization that the structured format needed for automatic extraction of data can be used to offload the pathologists′ working memory during the diagnostic review.

  4. Learning through Discussions

    Science.gov (United States)

    Ellis, Robert A.; Calvo, Rafael; Levy, David; Tan, Kelvin

    2004-01-01

    Students studying a third-year e-commerce subject experienced face-to-face and online discussions as an important part of their learning experience. The quality of the students' experiences of learning through those discussions is investigated in this study. This study uses qualitative approaches to investigate the variation in the students'…

  5. Stress in hospital medicine: a problem for key hospital staff.

    Science.gov (United States)

    Allen, I

    2001-08-01

    Many factors which contribute to stress in the workplace apply to both consultants and ward sisters. Both groups find that their roles have become more complex while they have increasingly lost control of their own clinical and professional territory in a managerial culture. The erosion of the key relationship between consultants and ward sisters is of concern and the need for teamworking is insufficiently recognized.

  6. Dynamic test of the ITER blanket key and ceramic insulated pad

    International Nuclear Information System (INIS)

    Khomyakov, S.; Sysoev, G.; Strebkov, Yu.; Kucherov, A.; Ioki, K.

    2010-01-01

    The dynamic testing of the blanket module's key integrated into ITER vacuum vessel portion has been performed in 2008 to investigate its capability to react the electro-magnetic (EM) loads. The preliminary analysis showed the large dynamic amplification factor (DAF) of the reactions because of technological gaps between the blanket module and key. Shock load may yield the bronze pads, which protect the blanket electrical insulation from damage. However the dynamic analysis of such particularly non-linear system needs an experimental ground and confirmation. Toward this end, as well as demonstration of the key reliability, the special test facility has been made, and the full-scale mock-up of the inboard intermodular key was tested. So as not to scale non-linear dynamic parameters, 1-ton mass was built on the single flexible support. The key was welded in a 60-mm thick steel plate modeled with a fragment of the VV. The different gaps were set in between the bronze pad of the key and the mass shock worker. This system (supplemented with some additional constraints) has natural oscillations like as the 4-ton module built on four flexible supports. Thus the most critical radial torque might be modeled with a straight force. The objectives of the test were as follows: dynamic response, DAF and damping factor determination; measurement of the strain oscillations in the key's base and in the weld seam; comparison of the measured data with computation results. The paper will present the analytical grounds of the testing conditions, test facility description, analytical adaptation of the facility, experimental results, its comparison with analysis and discussion, and guidelines for the next experimental phase.

  7. Evaluation of water-hammer experience in nuclear power plants. Technical findings relevant to Unresolved Safety Issue A-1

    International Nuclear Information System (INIS)

    Serkiz, A.W.

    1983-05-01

    This report summarizes key technical findings relevant to the Unresolved Safety Issue A-1, Water Hammer. These findings were derived from studies of reported water hammer occurrences and underlying causes and provide key insights into means to minimize or eliminate further water hammer occurrences. It should also be noted that this report does not represent a substitute for current rules and regulations

  8. Evaluation of water hammer occurrence in nuclear power plants: technical findings relevant to unresolved safety issue A-1

    International Nuclear Information System (INIS)

    1984-03-01

    This report, which includes responses to public comments, summarizes key technical findings relevant to the Unresolved Safety Issue A-1, Water Hammer. These findings were derived from studies of reported water hammer occurrences and underlying causes and provide key insights into means to minimize or eliminate further water hammer occurrences. This report does not represent a substitute for current rules and regulations

  9. Identification key to Nephtyidae (Annelida of the Sea of Okhotsk

    Directory of Open Access Journals (Sweden)

    Inna L. Alalykina

    2017-07-01

    Full Text Available Currently, 15 species of Nephtyidae (Annelida are known from the Sea of Okhotsk (north-western Pacific. A new user-friendly identification key is presented with a brief description for each species. The taxonomic positions of three closely related species, Nephtys brachycephala Moore, 1903, N. schmitti Hartman, 1938 and N. paradoxa Malm, 1874, are revised. The distributions of two species, Nephtys discors Ehlers, 1968 and N. assignis Hartman, 1950, are discussed.

  10. EDITORIAL: 'Key issues' articles in Reports on Progress in Physics

    Science.gov (United States)

    Greene, Laura H.

    2007-03-01

    The Editorial Board of Reports on Progress in Physics has commissioned a series of short articles from world leaders on key physics issues in their field. These essays may raise the key issues, or ask open questions or may even suggest wild ideas. Basically, they give world leading physicists the opportunity to write what they think about the key issues in their field, free from the usual requirement to provide the fair and balanced presentations of the subject normally found in articles in Reports on Progress in Physics. We believe that the readers of the journal will be interested to learn about these exciting ideas. Just as Hilbert's famous paper of 1900 set the agenda for the next century or more in mathematics, so we hope that this series of papers will define the key issues and open questions in physics for the 21st Century and that the articles will be widely cited and downloaded. The first of these articles—'Insights from simulations of star formation' by Richard B Larson (Yale University, USA)—is published in the current issue. We trust that readers will find this article and its successors in the series to appear through 2007 and beyond entertaining and stimulating.

  11. Parents' online discussions about children's dental caries: A critical content analysis.

    Science.gov (United States)

    Milne, Avery; Weijs, Cynthia A; Haines-Saah, Rebecca J; McLaren, Lindsay

    2017-09-14

    Through an analysis of postings to an online parenting forum, we aimed to explore the many ways in which parents orient to (i.e., take up, challenge, re-articulate) information about child dental health in the context of their online interactions. Our analysis is anchored in Nettleton's theoretical work on dental authority and power, which we apply in a digital context. We examined discussion threads from the public online forums on BabyCenter Canada. We identified relevant threads using the site search function and keywords related to dental health, with a focus on dental caries (tooth decay), related care behaviours (e.g., toothbrushing), and the controversial issue of fluoride. Following descriptive content coding, we applied a critical lens to unpack themes related to expert knowledge, gender and parenting online cultures. We analyzed 479 relevant threads. Our findings focus on two central themes: the tension between parents' views and those of dental health professionals; and, the gendered, cultural roles and expectations that position mothers as primarily responsible for the care of children's dental health. Though these themes are not new, our findings show that they persist in the digital context where social divisions (e.g., expert/non-expert) may be blurred. Our analysis of online discussions provides an opportunity to think critically about ways in which parents engage with public health, in digital contexts. Although some mothers express disconnect when communicating with dental professionals, they are very engaged and concerned with dental health issues for their children. A challenge for dental public health is to find ways to shift perspective towards recognizing that the target population is empowered and already engaged in discussions of research evidence and clinical encounters on their own terms, facilitated by an online context.

  12. Sonographic Findings of Primary Tracheal Lymphoma: Case Report

    International Nuclear Information System (INIS)

    Kim, Min Sung; Ahn, Kook Jin; Kim, Jee Young; Kim, Hyo Lim; Park, Jeong Mi

    2010-01-01

    Primary lymphoma of the trachea is extremely rare and clinical presentation is nonspecific. CT findings are focal tracheal narrowing caused by a solitary mass or polypoid thickening of the tracheobronchial wall caused by diffuse infiltration of the submucosa. However, US finding of primary lymphoma of the trachea has been not reported. We experienced a case of primary lymphoma of the trachea presenting as a homogenous hypoechoic mass, and discuss ultrasonographic and CT findings of the case

  13. Death Discussion in Science Read-Alouds: Cognitive, Sociolinguistic, and Moral Processes

    Science.gov (United States)

    Oliveira, Alandeom W.; Reis, Giuliano; Chaize, Daniel O.; Snyder, Michele A.

    2014-01-01

    Little research has been conducted on how to address the complex topic of death when teaching science to children. The present paper addresses this issue by examining how three elementary teachers discuss the death of wild animals during science read-aloud sessions. Our findings reveal the variety of ways in which nonhuman death can be…

  14. 'Breaking Good News': Neurologists' experiences of discussing SUDEP with patients in Scotland.

    Science.gov (United States)

    Nisbet, Tom; Turbull, Sue; Mulhern, Sharon; Razvi, Saif

    2017-05-01

    Since the findings of a Fatal Accident Inquiry (FAI) in 2010, clinicians working in Scotland have been advised to discuss the risk of Sudden Unexpected Death in Epilepsy (SUDEP) with patients immediately or soon after a diagnosis of epilepsy is made. A thematic analysis was used to describe the experiences discussing SUDEP of 10 clinicians (six Consultant Neurologists and four Neurology Registrars) working in Scotland. Contrary to previous research, clinicians appear to be routinely discussing SUDEP in a standardized fashion with newly diagnosed patients and the FAI appears to have instigated this change in practice. Clinicians are ambivalent about the practice and whether this is a Breaking Bad News (BBN) experience. Clinicians appear to anticipate that patients will be anxious or distressed discussing SUDEP, despite their experiences that patients do not react this way. There are further concerns that the pressure to discuss SUDEP, as a result of the FAI, hinders effective communication of the SUDEP message. Implications for guideline development are discussed. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Present status and environmental implications of the different fuel cycles. Key issue paper no. 2

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-06-01

    For decades plutonium has been a key focus of international discussions of both non-proliferation and the future of the nuclear fuel cycle. This paper is intended to address the management of separated plutonium in the civil fuel cycle in the near term - until 2015 - describing both the technologies employed and the policies of key countries. This paper also addresses technology and policy for the management of weapons plutonium being declared excess to defence needs. Refs, figs, tabs.

  16. Finding of key factors in creating small business system’s success : The case study in Thai restaurants in Sweden

    OpenAIRE

    Maleekaew, Chiraluck; Sudthamnong, Sirinun

    2007-01-01

    Research Questions: Which factors are the actual impacts for the success of Thai restaurant in Sweden? Aims of Research: To investigate the key factors that may cause the success within a restaurant. The success of the restaurant in this research is a restaurant that has positive financial result, revenue more than cost. Positive financial result shows that they manage the quality of the restaurant effectively. Methodology: This thesis studies and analyzes the variables and factors in process...

  17. Incidental Cardiac Findings on Thoracic Imaging.

    LENUS (Irish Health Repository)

    Kok, Hong Kuan

    2013-02-07

    The cardiac structures are well seen on nongated thoracic computed tomography studies in the investigation and follow-up of cardiopulmonary disease. A wide variety of findings can be incidentally picked up on careful evaluation of the pericardium, cardiac chambers, valves, and great vessels. Some of these findings may represent benign variants, whereas others may have more profound clinical importance. Furthermore, the expansion of interventional and surgical practice has led to the development and placement of new cardiac stents, implantable pacemaker devices, and prosthetic valves with which the practicing radiologist should be familiar. We present a collection of common incidental cardiac findings that can be readily identified on thoracic computed tomography studies and briefly discuss their clinical relevance.

  18. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  19. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  20. HVDC: A key solution in future transmission systems

    Energy Technology Data Exchange (ETDEWEB)

    Heyman, Olof H.; Weimers, Lars; Bohl, Mie-Lotte

    2010-09-15

    With the transition of power grids, based on sustainable generation, HVDC is a key technology with new applications. This includes connection of remote wind parks and strengthening of existing AC grids. In addition, traditional applications, such as bulk hydropower transfer and interconnections between regions, play a major role in our transition to sustainable generation and the associated grids. The technology for regional grids with a limited number of nodes is already in place and commercial projects are commissioned. For extensive grids, development and verification are ongoing in parallel to industry standards being discussed in groups such as ENTSO-E and CIGRE.

  1. Musculoskeletal Findings in Behcet's Disease

    Directory of Open Access Journals (Sweden)

    Ali Bicer

    2012-01-01

    Full Text Available Behcet's disease is a multisystem disease characterized by recurrent oral and genital ulcers, relapsing uveitis, mucocutaneous, articular, gastrointestinal, neurologic, and vascular manifestations. Rheumatologic manifestations may also occur in Behcet's disease, and arthritis and arthralgia are the most common musculoskeletal findings followed by enthesopathy, avascular necrosis, myalgia, and myositis. Although the main pathology of Behcet's disease has been known to be the underlying vasculitis, the etiology and exact pathogenesis of the disease are still unclear. Musculoskeletal findings of Behcet's disease, the relationship between Behcet's disease and spondyloarthropathy disease complex, and the status of bone metabolism in patients with Behcet's disease were discussed in this paper.

  2. An optimized encoding method for secure key distribution by swapping quantum entanglement and its extension

    International Nuclear Information System (INIS)

    Gao Gan

    2015-01-01

    Song [Song D 2004 Phys. Rev. A 69 034301] first proposed two key distribution schemes with the symmetry feature. We find that, in the schemes, the private channels which Alice and Bob publicly announce the initial Bell state or the measurement result through are not needed in discovering keys, and Song’s encoding methods do not arrive at the optimization. Here, an optimized encoding method is given so that the efficiencies of Song’s schemes are improved by 7/3 times. Interestingly, this optimized encoding method can be extended to the key distribution scheme composed of generalized Bell states. (paper)

  3. Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations

    Science.gov (United States)

    Reid, M. D.

    2000-12-01

    Correlations of the type discussed by EPR in their original 1935 paradox for continuous variables exist for the quadrature phase amplitudes of two spatially separated fields. These correlations were first experimentally reported in 1992. We propose to use such EPR beams in quantum cryptography, to transmit with high efficiency messages in such a way that the receiver and sender may later determine whether eavesdropping has occurred. The merit of the new proposal is in the possibility of transmitting a reasonably secure yet predetermined key. This would allow relay of a cryptographic key over long distances in the presence of lossy channels.

  4. Academic Primer Series: Eight Key Papers about Education Theory.

    Science.gov (United States)

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-02-01

    Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.

  5. Study on the security of discrete-variable quantum key distribution over non-Markovian channels

    International Nuclear Information System (INIS)

    Huang Peng; Zhu Jun; He Guangqiang; Zeng Guihua

    2012-01-01

    The dynamic of the secret key rate of the discrete-variable quantum key distribution (QKD) protocol over the non-Markovian quantum channel is investigated. In particular, we calculate the secret key rate for the six-state protocol over non-Markovian depolarizing channels with coloured noise and Markovian depolarizing channels with Gaussian white noise, respectively. We find that the secure secret key rate for the non-Markovian depolarizing channel will be larger than the Markovian one under the same conditions even when their upper bounds of tolerable quantum bit error rate are equal. This indicates that this coloured noise in the non-Markovian depolarizing channel can enhance the security of communication. Moreover, we show that the secret key rate fluctuates near the secure point when the coupling strength of the system with the environment is high. The results demonstrate that the non-Markovian effects of the transmission channel can have a positive impact on the security of discrete-variable QKD. (paper)

  6. Academic Primer Series: Five Key Papers about Study Designs in Medical Education.

    Science.gov (United States)

    Gottlieb, Michael; Chan, Teresa M; Fredette, Jenna; Messman, Anne; Robinson, Daniel W; Cooney, Robert; Boysen-Osborn, Megan; Sherbino, Jonathan

    2017-06-01

    A proper understanding of study design is essential to creating successful studies. This is also important when reading or peer reviewing publications. In this article, we aimed to identify and summarize key papers that would be helpful for faculty members interested in learning more about study design in medical education research. The online discussions of the 2016-2017 Academic Life in Emergency Medicine Faculty Incubator program included a robust and vigorous discussion about education study design, which highlighted a number of papers on that topic. We augmented this list of papers with further suggestions by expert mentors. Via this process, we created a list of 29 papers in total on the topic of medical education study design. After gathering these papers, our authorship group engaged in a modified Delphi approach to build consensus on the papers that were most valuable for the understanding of proper study design in medical education. We selected the top five most highly rated papers on the topic domain of study design as determined by our study group. We subsequently summarized these papers with respect to their relevance to junior faculty members and to faculty developers. This article summarizes five key papers addressing study design in medical education with discussions and applications for junior faculty members and faculty developers. These papers provide a basis upon which junior faculty members might build for developing and analyzing studies.

  7. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  8. Astrology Pseudoscience and a Discussion About Its Threats to Society

    OpenAIRE

    Tevfik UYAR

    2016-01-01

    Astrology, a pseudoscience, is highly popular in Turkey. Astrologers, who are its practitioners, produce discourses in the scientific field at the media and at their own platforms. Furthermore, it is possible to find some instances of astrology related activities in Turkish universities. In this article, demarcation of science from pseudoscience and the pseudoscientific status of astrology were discussed in a first place. Next, threats of astrological discourse within economic, educational an...

  9. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2008-01-01

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ∼ 20%) and dark count probability (p dark ∼ 10 -7 )

  10. Primary lymphoma of appendix: Ultrasound finding

    International Nuclear Information System (INIS)

    Sotillos Parra, V.E.; Belda Serrano, J.; Mota Castilla, A.; Falomir Gil, G.; Abreu Maqueda, V.; Trigueris Sanchez, M.; Hernandez Barcelo, J.E.; Martinez Diaz, F.

    1994-01-01

    We present an uncommon case of primary lymphoma of the appendix in a patient who complained of discomfort in lower right quadrant. The findings revealed by ultrasound, barium enema and CT scan are reported and the diagnostic aspects of this appendiceal tumor and others are discussed. (Author) 6 refs

  11. A brief review on key technologies in the battery management system of electric vehicles

    Science.gov (United States)

    Liu, Kailong; Li, Kang; Peng, Qiao; Zhang, Cheng

    2018-04-01

    Batteries have been widely applied in many high-power applications, such as electric vehicles (EVs) and hybrid electric vehicles, where a suitable battery management system (BMS) is vital in ensuring safe and reliable operation of batteries. This paper aims to give a brief review on several key technologies of BMS, including battery modelling, state estimation and battery charging. First, popular battery types used in EVs are surveyed, followed by the introduction of key technologies used in BMS. Various battery models, including the electric model, thermal model and coupled electro-thermal model are reviewed. Then, battery state estimations for the state of charge, state of health and internal temperature are comprehensively surveyed. Finally, several key and traditional battery charging approaches with associated optimization methods are discussed.

  12. Communication and patient participation influencing patient recall of treatment discussions.

    Science.gov (United States)

    Richard, Claude; Glaser, Emma; Lussier, Marie-Thérèse

    2017-08-01

    Patient recall of treatment information is a key variable towards chronic disease (CD) management. It is unclear what communication and patient participation characteristics predict recall. To assess what aspects of doctor-patient communication predict patient recall of medication information. To describe lifestyle treatment recall, in CD primary care patients. Observational study within a RCT. Community-based primary care (PC) practices. Family physicians (n=18): practicing >5 years, with a CD patient caseload. Patients (n=159): >40 years old, English speaking, computer literate, off-target hypertension, type II diabetes and/or dyslipidaemia. Patient characteristics: age, education, number of CDs. Information characteristics: length of encounter, medication status, medication class. Communication variables: socio-emotional utterances, physician dominance and communication control scores and PACE (ask, check and express) utterances, measured by RIAS. Number of medication themes, dialogue and initiative measured by MEDICODE. Recall of CD, lifestyle treatment and medication information. Frequency of lifestyle discussions varied by topic. Patients recalled 43% (alcohol), 52% (diet) to 70% (exercise) of discussions. Two and a half of six possible medication themes were broached per medication discussion. Less than one was recalled. Discussing more themes, greater dialogue and patient initiative were significant predictors of improved medication information recall. Critical treatment information is infrequently exchanged. Active patient engagement and explicit conversations about medications are associated with improved treatment information recall in off-target CD patients followed in PC. Providers cannot take for granted that long-term off-target CD patients recall information. They need to encourage patient participation to improve recall of treatment information. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  13. Key considerations for preventing suicide in older adults: consensus opinions of an expert panel

    DEFF Research Database (Denmark)

    Erlangsen, Annette; Nordentoft, Merete; Conwell, Yeates

    2011-01-01

    BACKGROUND: The number of older adults is growing rapidly. This fact, combined with the high rates of suicide in later life, indicates that many more older adults will die by their own hands before rigorous trials can be conducted to fully understand the best approaches to prevent late life suicide....... AIMS: To disseminate key considerations for interventions addressing senior suicidal behavior. METHODS: An international expert panel has reviewed and discussed key considerations for interventions against suicide in older adults based on existing evidence, where available, and expert opinion. RESULTS...

  14. Barriers and facilitators to health care professionals discussing child weight with parents: A meta-synthesis of qualitative studies.

    Science.gov (United States)

    Bradbury, Daisy; Chisholm, Anna; Watson, Paula M; Bundy, Christine; Bradbury, Nicola; Birtwistle, Sarah

    2018-04-26

    Childhood obesity is one of the most serious global public health challenges. However, obesity and its consequences are largely preventable. As parents play an important role in their children's weight-related behaviours, good communication between parents and health care professionals (HCPs) is essential. This systematic review provides a meta-synthesis of qualitative studies exploring the barriers and facilitators experienced by HCPs when discussing child weight with parents. Searches were conducted using the following databases: MEDLINE (OVID), Psych INFO (OVID), EMBASE (OVID), Web of Knowledge and CINAHL. Thirteen full-text qualitative studies published in English language journals since 1985 were included. Included studies collected data from HCPs (e.g., nurses, doctors, dieticians, psychologists, and clinical managers) concerning their experiences of discussing child weight-related issues with parents. An inductive thematic analysis was employed to synthesize findings. Emerging subthemes were categorized using a socio-ecological framework into intra/interpersonal factors, organizational factors, and societal factors. Perceived barriers and facilitators most commonly related to intra/interpersonal level factors, that is, relating to staff factors, parental factors, or professional-parent interactions. HCPs also attributed a number of barriers, but not facilitators, at the organizational and societal levels. The findings of this review may help to inform the development of future weight-related communication interventions. Whilst intra/interpersonal interventions may go some way to improving health care practice, it is crucial that all stakeholders consider the wider organizational and societal context in which these interactions take place. Statement of contribution What is already known on the subject? Childhood obesity is one of the United Kingdom's most serious current public health challenges. Health care professionals are in a prime position to identify

  15. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  16. Engaging Young People: Deliberative Preferences in Discussions About News and Politics

    Directory of Open Access Journals (Sweden)

    Cynthia Peacock

    2016-03-01

    Full Text Available The Internet affords users a unique and low-cost way to engage with news, politics, and one another. Although young people are the most likely age cohort to go online, it is questionable whether young people take advantage of the Internet as a deliberative space. We examine the way college students perceive the online world as a venue for political discussion by analyzing responses from six focus groups conducted with college students across the United States. Using deliberative theory as a guide, we examine focus group participants’ thoughts about political discussion both online and offline. Our findings indicate that young people’s preferences for online discussions about politics and the news consistently link to the ideals of deliberation. Young people prefer engaging with others who are knowledgeable and remain flexible and calm during discussions. Goals for engaging in conversations about politics primarily revolved around sharing information and opinions. Participants preferred civil discourse that focuses on commonalities rather than differences between people. This study provides greater insight into how the rising generation currently engages with politics and the news and reasons why many people hesitate to participate in online discussions about public affairs.

  17. Session 1 - discussion

    International Nuclear Information System (INIS)

    Wells, C.; Richards, K.M.; McKerrow, J.F.

    1991-01-01

    This discussion session of the Landfill Gas-Energy and Environment 90 Conference covered the landfill gas potential, the setting up of the Non-Fossil Fuel Obligation; anticipated developments in the post 1998 period, the problem of smell for those who live near a landfill, and the length of time a landfill site is productive in terms of gas evolution. Relevant regulations in California are briefly discussed. (author)

  18. 2015 E-Truck Task Force: Key Barriers Affecting E-Truck Adoption, Industry and Policy Implications, and Recommendations to Move the Market Forward

    OpenAIRE

    Brotherton, Tom; Gilde, Alycia; Tomic, Jasna

    2016-01-01

    CALSTART’s E-Truck Task Force (ETTF) produced a report outlining the markets for electric drive trucks (E-Trucks), the prime barriers facing their success and provided key findings and recommendations to support expanding E-Truck adoption. Four key findings have been identified by the E-Truck Task Force as barriers currently affecting the growth and viability of E-Truck sales

  19. Introduction of a child and adolescent mental health link worker: education and health staff focus group findings.

    Science.gov (United States)

    Hunter, A; Playle, J; Sanchez, P; Cahill, J; McGowan, L

    2008-10-01

    Policy guidance suggests that outcomes for adolescents with mental health problems can be improved by secondary education services (SES) and child and adolescent mental health services (CAMHS) working more closely. This study reports on staff experiences of the introduction of a mental health link worker (MHLW). The findings of two focus groups are presented, conducted with staff from CAMHS and SES. These focus groups formed part of the overall wider evaluation of the MHLW role. The groups explored staff perceptions and experiences following the introduction of the MHLW, and elicited their views on the effectiveness of this innovative role. Qualitative methods were employed, and analysis was conducted using the principles of grounded theory and the constant comparative method. The findings revealed that the MHLW was well received by both groups, despite the identification of potential barriers. A number of key themes emerged, which included the ability of the link worker to improve communication and to encourage mutual understanding between services. The issues raised by these themes are discussed and recommendations are made for future practice and research.

  20. Finding the key to successful L2 learning in groups and individuals

    Directory of Open Access Journals (Sweden)

    Wander Lowie

    2017-03-01

    Full Text Available A large body studies into individual differences in second language learning has shown that success in second language learning is strongly affected by a set of relevant learner characteristics ranging from the age of onset to motivation, aptitude, and personality. Most studies have concentrated on a limited number of learner characteristics and have argued for the relative importance of some of these factors. Clearly, some learners are more successful than others, and it is tempting to try to find the factor or combination of factors that can crack the code to success. However, isolating one or several global individual characteristics can only give a partial explanation of success in second language learning. The limitation of this approach is that it only reflects on rather general personality characteristics of learners at one point in time, while both language development and the factors affecting it are instances of complex dynamic processes that develop over time. Factors that have been labelled as “individual differences” as well as the development of proficiency are characterized by nonlinear relationships in the time domain, due to which the rate of success cannot be simply deduced from a combination of factors. Moreover, in complex dynamic systems theory (CDST literature it has been argued that a generalization about the interaction of variables across individuals is not warranted when we acknowledge that language development is essentially an individual process (Molenaar, 2015. In this paper, the viability of these generalizations is investigated by exploring the L2 development over time for two identical twins in Taiwan who can be expected to be highly similar in all respects, from their environment to their level of English proficiency, to their exposure to English, and to their individual differences. In spite of the striking similarities between these learners, the development of their L2 English over time was very different

  1. Parametric Human Body Reconstruction Based on Sparse Key Points.

    Science.gov (United States)

    Cheng, Ke-Li; Tong, Ruo-Feng; Tang, Min; Qian, Jing-Ye; Sarkis, Michel

    2016-11-01

    We propose an automatic parametric human body reconstruction algorithm which can efficiently construct a model using a single Kinect sensor. A user needs to stand still in front of the sensor for a couple of seconds to measure the range data. The user's body shape and pose will then be automatically constructed in several seconds. Traditional methods optimize dense correspondences between range data and meshes. In contrast, our proposed scheme relies on sparse key points for the reconstruction. It employs regression to find the corresponding key points between the scanned range data and some annotated training data. We design two kinds of feature descriptors as well as corresponding regression stages to make the regression robust and accurate. Our scheme follows with dense refinement where a pre-factorization method is applied to improve the computational efficiency. Compared with other methods, our scheme achieves similar reconstruction accuracy but significantly reduces runtime.

  2. The key role of extracellular vesicles in the metastatic process.

    Science.gov (United States)

    Zhao, Hongyun; Achreja, Abhinav; Iessi, Elisabetta; Logozzi, Mariantonia; Mizzoni, Davide; Di Raimo, Rossella; Nagrath, Deepak; Fais, Stefano

    2018-01-01

    Extracellular vesicles (EVs), including exosomes, have a key role in the paracrine communication between organs and compartments. EVs shuttle virtually all types of biomolecules such as proteins, lipids, nucleic acids, metabolites and even pharmacological compounds. Their ability to transfer their biomolecular cargo into target cells enables EVs to play a key role in intercellular communication that can regulate cellular functions such as proliferation, apoptosis and migration. This has led to the emergence of EVs as a key player in tumor growth and metastasis through the formation of "tumor niches" in target organs. Recent data have also been shown that EVs may transform the microenvironment of primary tumors thus favoring the selection of cancer cells with a metastatic behavior. The release of EVs from resident non-malignant cells may contribute to the metastatic processes as well. However, cancer EVs may induce malignant transformation in resident mesenchymal stem cells, suggesting that the metastatic process is not exclusively due to circulating tumor cells. In this review, we outline and discuss evidence-based roles of EVs in actively regulating multiple steps of the metastatic process and how we can leverage EVs to impair metastasis. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

    Directory of Open Access Journals (Sweden)

    Rameez Asif

    2017-01-01

    Full Text Available There is current significant interest in Fiber-to-the-Home (FTTH networks, that is, end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile copper wire connections. However, in near future, it is envisaged that FTTH connections will exist, and a key offering would be the possibility of optical encryption that can best be implemented using Quantum Key Distribution (QKD. However, it is very important that the QKD infrastructure is compatible with the already existing networks for a smooth transition and integration with the classical data traffic. In this paper, we report the feasibility of using off-the-shelf telecommunication components to enable high performance Continuous Variable-Quantum Key Distribution (CV-QKD systems that can yield secure key rates in the range of 100 Mbits/s under practical operating conditions. Multilevel phase modulated signals (m-PSK are evaluated in terms of secure key rates and transmission distances. The traditional receiver is discussed, aided by the phase noise cancellation based digital signal processing module for detecting the complex quantum signals. Furthermore, we have discussed the compatibility of multiplexers and demultiplexers for wavelength division multiplexed Quantum-to-the-Home (QTTH network and the impact of splitting ratio is analyzed. The results are thoroughly compared with the commercially available high-cost encryption modules.

  4. The Topology of a Discussion: The #Occupy Case.

    Directory of Open Access Journals (Sweden)

    Floriana Gargiulo

    Full Text Available We analyse a large sample of the Twitter activity that developed around the social movement 'Occupy Wall Street', to study the complex interactions between the human communication activity and the semantic content of a debate.We use a network approach based on the analysis of the bipartite graph @Users-#Hashtags and of its projections: the 'semantic network', whose nodes are hashtags, and the 'users interest network', whose nodes are users. In the first instance, we find out that discussion topics (#hashtags present a high structural heterogeneity, with a relevant role played by the semantic hubs that are responsible to guarantee the continuity of the debate. In the users' case, the self-organisation process of users' activity, leads to the emergence of two classes of communicators: the 'professionals' and the 'amateurs'.Both the networks present a strong community structure, based on the differentiation of the semantic topics, and a high level of structural robustness when certain sets of topics are censored and/or accounts are removed.By analysing the characteristics of the dynamical networks we can distinguish three phases of the discussion about the movement. Each phase corresponds to a specific moment of the movement: from declaration of intent, organisation and development and the final phase of political reactions. Each phase is characterised by the presence of prototypical #hashtags in the discussion.

  5. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  6. "I Totally Agree with You": Gender Interactions in Educational Online Discussion Groups

    Science.gov (United States)

    Guiller, J.; Durndell, A.

    2006-01-01

    This paper discusses findings from an extensive project examining gender, language and computer-mediated communication (CMC) in the context of undergraduate psychology courses. The contributions of 197 introductory psychology students (148 females, 49 males) participating in asynchronous CMC as part of their course were collated and coded for…

  7. Summary discussions

    International Nuclear Information System (INIS)

    Ritchie, R.H.

    1982-01-01

    Remarks intended to highlight topics of importance for future research were made by three of the participants at the conclusion of the Seminar. A brief listing is given of topics discussed by each of these rapporteurs

  8. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  9. EVALUATING KEY ENVIRONMENTAL RISK FACTORS FOR POLLUTION AT INTERNATIONAL PORTS IN TAIWAN

    Directory of Open Access Journals (Sweden)

    Kuan-Hao Chang

    2017-01-01

    Full Text Available The main purpose of this paper is to use the fuzzy analytic hierarchy process (FAHP approach to evaluate the key environmental risk factors for pollution at international ports in Taiwan. Relying on the literature and experts’ opinions, a hierarchical structure with three risk aspects and thirteen risk factors is first constructed, and a FAHP model then proposed. Based on data from the AHP experts’ questionnaires, we use the FAHP approach to determine key environmental risk factors. Finally, the results show that: (1 Air pollution is the most important aspect of environmental pollution at international ports in Taiwan. (2 In order of relative importance, the top five key environmental risk factors for pollution at international ports in Taiwan are the oil leaks from ships, volatile organic compounds (VOCs, exhaust emissions from ships at berth, harmful coatings on ships' hulls, and ships' failure to use low-pollution fuel. Furthermore, some discussions are provided for port authority in Taiwan.

  10. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  11. The emerging role of Big Data in key development issues: Opportunities, challenges, and concerns

    Directory of Open Access Journals (Sweden)

    Nir Kshetri

    2014-12-01

    Full Text Available This paper presents a review of academic literature, policy documents from government organizations and international agencies, and reports from industries and popular media on the trends in Big Data utilization in key development issues and its worthwhileness, usefulness, and relevance. By looking at Big Data deployment in a number of key economic sectors, it seeks to provide a better understanding of the opportunities and challenges of using it for addressing key issues facing the developing world. It reviews the uses of Big Data in agriculture and farming activities in developing countries to assess the capabilities required at various levels to benefit from Big Data. It also provides insights into how the current digital divide is associated with and facilitated by the pattern of Big Data diffusion and its effective use in key development areas. It also discusses the lessons that developing countries can learn from the utilization of Big Data in big corporations as well as in other activities in industrialized countries.

  12. Anyone Can Become a Troll: Causes of Trolling Behavior in Online Discussions.

    Science.gov (United States)

    Cheng, Justin; Bernstein, Michael; Danescu-Niculescu-Mizil, Cristian; Leskovec, Jure

    2017-01-01

    In online communities, antisocial behavior such as trolling disrupts constructive discussion. While prior work suggests that trolling behavior is confined to a vocal and antisocial minority, we demonstrate that ordinary people can engage in such behavior as well. We propose two primary trigger mechanisms: the individual's mood, and the surrounding context of a discussion (e.g., exposure to prior trolling behavior). Through an experiment simulating an online discussion, we find that both negative mood and seeing troll posts by others significantly increases the probability of a user trolling, and together double this probability. To support and extend these results, we study how these same mechanisms play out in the wild via a data-driven, longitudinal analysis of a large online news discussion community. This analysis reveals temporal mood effects, and explores long range patterns of repeated exposure to trolling. A predictive model of trolling behavior shows that mood and discussion context together can explain trolling behavior better than an individual's history of trolling. These results combine to suggest that ordinary people can, under the right circumstances, behave like trolls.

  13. 40 CFR 1508.13 - Finding of no significant impact.

    Science.gov (United States)

    2010-07-01

    ... note any other environmental documents related to it (§ 1501.7(a)(5)). If the assessment is included, the finding need not repeat any of the discussion in the assessment but may incorporate it by... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Finding of no significant impact. 1508...

  14. 16-level differential phase shift keying (D16PSK) in direct detection optical communication systems

    DEFF Research Database (Denmark)

    Sambaraju, R.; Tokle, Torger; Jensen, J.B.

    2006-01-01

    Optical 16-level differential phase shift keying (D16PSK) carrying four bits for every symbol is proposed for direct detection optical communication systems. Transmitter and receiver schematics are presented, and the receiver sensitivity is discussed. We numerically investigate the impact...

  15. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  16. Development and pretest of key visual imagery in a campaign for the prevention of child maltreatment.

    Science.gov (United States)

    Charest, Émilie; Gagné, Marie-Hélène; Goulet, Julie

    2017-08-01

    This article discusses the development and pretesting of key visual imagery in a promotional campaign developed in Quebec, Canada. This campaign is the media-based component of a broader prevention strategy involving the use of the Triple P program (Sanders, 1999). The purpose was to pretest with parents the preliminary version of a poster that uses the campaign's key visual imagery prior to final production. In total, 26 parents from the regions of Quebec City and Montreal participated in four focus groups. Two general themes emerged from the focus groups: (i) emotions and reactions arising from the key visual imagery; and (ii) comprehension of the message being conveyed. Based on this information, recommendations were made to the marketing agency, which then modified the campaign's key visual imagery and proposed a final layout.

  17. A case of alkaptonuria - ultrasonographic findings.

    Science.gov (United States)

    Damian, Laura Otilia; Felea, Ioana; Boloşiu, Călin; Botar-Jid, Carolina; Fodor, Daniela; Rednic, Simona

    2013-12-01

    Alkaptonuria is a rare disease with autosomal recessive inheritance and variable expression. The weight-bearing joint involvement and spondylitis-like vertebral changes occur only after the 3rd decade. Musculoskeletal ultrasonographic findings in alkaptonuria were only rarely described, consisting mainly into enthesopathy and non-synovial tendon degeneration. We present the case of a 50 years old man with alkaptonuria and discuss the ultrasonographic findings and the relationship of the disease with chondrocalcinosis. The tendinous and synovial aspect may be peculiar and it could therefore allow recognition and screening for alkaptonuria, along with clinical and radiologic data.

  18. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  19. What nurses and midwives want: Findings from the national survey on workplace climate and well-being.

    Science.gov (United States)

    Holland, Peter J; Tham, Tse Leng; Gill, Fenella J

    2018-02-26

    A discussion of the findings from a nationwide study of workplace and well-being issues of Australian nurses and midwives. Current discourse only provides a fragmented understanding of a multifaceted nature of working conditions and well-being, necessitating a more holistic investigation to identify critical workplace issues within these professions. Discussion paper. A national survey conducted in July 2016 involving Australian Nursing and Midwifery Federation members. The literature supporting this paper focuses on the nursing and midwifery workforce and studies on attraction and retention issues. Workplace policies and practices in place in health care organizations that are within the control of management are key factors in the negative issues associated with the profession from the survey. Proactive and targeted interventions particularly aimed at salient issues of work intensification, declining engagement, and effective voice mechanisms are needed to address these crucial issues if the attrition of individuals from nursing and midwifery occupations is going to be ameliorated. To alleviate workforce issues pushing nurses and midwives to the tipping point of exiting the professions, health care organizations need to take a proactive stance in addressing issues under the control of management. © 2018 John Wiley & Sons Australia, Ltd.

  20. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    Science.gov (United States)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  1. Synovial hemangioma of the knee: MRI findings in two cases

    International Nuclear Information System (INIS)

    Llauger, J.; Monill, J.M.; Palmer, J.; Clotet, M.

    1995-01-01

    The findings in two patients with histologically proven synovial hemangioma of the knee are described. Both cases emphasize the typical appearance of this unusual tumor on magnetic resonance imaging. Additional radiologic findings, such as adjacent osseous insolvement, are discussed. The MRI findings of this tumor are highly suggestive of the diagnosis and MRI should eliminate the need for invasive angiographic procedures. (orig.)

  2. Security by quantum key distribution and IPSEC (SEQKEIP): feasibility

    International Nuclear Information System (INIS)

    Sfaxi, M.A.; Ghernaouti-Helie, S.; Ribordy, G; Gay, O.

    2005-01-01

    Full text: Classical cryptography algorithms are based on mathematical functions. The robustness of a given cryptosystem is based essentially on the secrecy of its (private) key and the difficulty with which the inverse of its one-way function(s) can be calculated. Unfortunately, there is no mathematical proof that will establish whether it is not possible to find the inverse of a given one-way function. On the contrary, quantum cryptography is a method for sharing secret keys, whose security can be formally demonstrated. It is based on the laws of physics. The possible applications of quantum cryptography are mainly linked to telecommunication services that require very high level of security. Quantum cryptography could be integrated in various existing concepts and protocols. One of the possible use of quantum cryptography is within IPSEC. The aim of this paper is to analyse the feasibility of using quantum cryptography in IPSEC and to present the estimated performances of this solution. (author)

  3. Autonomy and dignity: a discussion on contingency and dominance.

    Science.gov (United States)

    Van Brussel, Leen

    2014-06-01

    With dying increasingly becoming a medicalised experience in old age, we are witnessing a shift from concern over death itself to an interest in dying 'well'. Fierce discussions about end-of-life decision making and the permissibility of medical intervention in dying, discursively structured around the notion of a 'good' death, are evidence of this shift. This article focuses on 'autonomy' and 'dignity' as key signifiers in these discussions. Rather than being fully fixed and stable, both signifiers are contingent and carry a variety of meanings within different discursive projects. The article aims to distinguish the varieties of these signifiers by elaborating existing theoretical perspectives on autonomy and dignity, and also, starting from a perspective on mass media as sites of meaning production and contestation, to study the contingency of autonomy and dignity in Belgian newspaper coverage of four prominent euthanasia cases. By means of a discourse-theoretical textual analysis, this study exposes a dominant--yet contested--articulation of rational-personal autonomy and of dignity in external terms as something that can be obtained, retained or lost, rather than in terms of intrinsic human integrity. These logics of representation reflect a more general late modern dominance of liberal autonomy and of dignity as being closely connected to self-identity, but at the same time result in limited visibility of alternative ways of experiencing an autonomous and dignified death.

  4. ENDORSING REFLECTIVE TECHNIQUES TO PROLIFERATE STUDENTS’ INTERACTIONS AND UTTERANCES IN A DISCUSSION FORUM

    Directory of Open Access Journals (Sweden)

    Marwito Wihadi

    2012-12-01

    Full Text Available High Intermediate-2 students’ brief responses in a discussion forum cause a long-expected discussion last in a couple of minutes in mixed-ability classes, depicting a minority of students are overtly dominant, while others are precisely passive. What yields discussions endure immaturely stems from both unclear roles of participants and their inadequate techniques to expand both interactions and spoken discourse. Therefore, Teacher-researcher assigned each participant in a discussion group of three to put reflection into practice, referring to the self-selected and discussed topics. The data were gained through non-participant observations, in which the teacher-researcher observed and recorded a singled-out group. A sample recording was, subsequently, transcribed and analyzed regarding with the number of exchanges in a five-minute discussion intake and the number of content words that students generated. It was found that employing reflective techniques, students were able to keep a particular topic being discussed at full. As a result, the number of content words multiplied. These findings resulted classroom teachers in insightful use of reflective techniques as one of the ways to proliferate students’ benefits in a discussion forum. Adequately practiced, students would be able to employ the techniques preponderantly, multiplying interactions among discussion members.

  5. Illicit Drug Users in the Tanzanian Hinterland: Population Size Estimation Through Key Informant-Driven Hot Spot Mapping.

    Science.gov (United States)

    Ndayongeje, Joel; Msami, Amani; Laurent, Yovin Ivo; Mwankemwa, Syangu; Makumbuli, Moza; Ngonyani, Alois M; Tiberio, Jenny; Welty, Susie; Said, Christen; Morris, Meghan D; McFarland, Willi

    2018-02-12

    We mapped hot spots and estimated the numbers of people who use drugs (PWUD) and who inject drugs (PWID) in 12 regions of Tanzania. Primary (ie, current and past PWUD) and secondary (eg, police, service providers) key informants identified potential hot spots, which we visited to verify and count the number of PWUD and PWID present. Adjustments to counts and extrapolation to regional estimates were done by local experts through iterative rounds of discussion. Drug use, specifically cocaine and heroin, occurred in all regions. Tanga had the largest numbers of PWUD and PWID (5190 and 540, respectively), followed by Mwanza (3300 and 300, respectively). Findings highlight the need to strengthen awareness of drug use and develop prevention and harm reduction programs with broader reach in Tanzania. This exercise provides a foundation for understanding the extent and locations of drug use, a baseline for future size estimations, and a sampling frame for future research.

  6. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  7. Plutonium roundtable discussion

    International Nuclear Information System (INIS)

    Penneman, R.A.

    1982-01-01

    The roundtable discussion began with remarks by the chairman who pointed out the complicated nature of plutonium chemistry. Judging from the papers presented at this symposium, he noticed a pattern which indicated to him the result of diminished funding for investigation of basic plutonium chemistry and funding focused on certain problem areas. Dr. G.L. silver pointed to plutonium chemists' erroneous use of a simplified summary equation involving the disproportionation of Pu(EV) and their each of appreciation of alpha coefficients. To his appreciation of alpha coefficients. To his charges, Dr. J.T. Bell spoke in defense of the chemists. This discussion was followed by W.W. Schulz's comments on the need for experimental work to determine solubility data for plutonium in its various oxidation states under geologic repository conditions. Discussion then turned to plutonium pyrachemical process with Dana C. Christensen as the main speaker. This paper presents edited versions of participants' written version

  8. Clinical decision-making and secondary findings in systems medicine.

    Science.gov (United States)

    Fischer, T; Brothers, K B; Erdmann, P; Langanke, M

    2016-05-21

    Systems medicine is the name for an assemblage of scientific strategies and practices that include bioinformatics approaches to human biology (especially systems biology); "big data" statistical analysis; and medical informatics tools. Whereas personalized and precision medicine involve similar analytical methods applied to genomic and medical record data, systems medicine draws on these as well as other sources of data. Given this distinction, the clinical translation of systems medicine poses a number of important ethical and epistemological challenges for researchers working to generate systems medicine knowledge and clinicians working to apply it. This article focuses on three key challenges: First, we will discuss the conflicts in decision-making that can arise when healthcare providers committed to principles of experimental medicine or evidence-based medicine encounter individualized recommendations derived from computer algorithms. We will explore in particular whether controlled experiments, such as comparative effectiveness trials, should mediate the translation of systems medicine, or if instead individualized findings generated through "big data" approaches can be applied directly in clinical decision-making. Second, we will examine the case of the Riyadh Intensive Care Program Mortality Prediction Algorithm, pejoratively referred to as the "death computer," to demonstrate the ethical challenges that can arise when big-data-driven scoring systems are applied in clinical contexts. We argue that the uncritical use of predictive clinical algorithms, including those envisioned for systems medicine, challenge basic understandings of the doctor-patient relationship. Third, we will build on the recent discourse on secondary findings in genomics and imaging to draw attention to the important implications of secondary findings derived from the joint analysis of data from diverse sources, including data recorded by patients in an attempt to realize their

  9. Key factors regulating the mass delivery of macromolecules to model cell membranes

    DEFF Research Database (Denmark)

    Campbell, Richard A.; Watkins, Erik B.; Jagalski, Vivien

    2014-01-01

    We show that both gravity and electrostatics are key factors regulating interactions between model cell membranes and self-assembled liquid crystalline aggregates of dendrimers and phospholipids. The system is a proxy for the trafficking of reservoirs of therapeutic drugs to cell membranes for slow...... of the aggregates to activate endocytosis pathways on specific cell types is discussed in the context of targeted drug delivery applications....

  10. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  11. End of life discussion in an academic family health team in Kingston, Ontario, Canada

    Directory of Open Access Journals (Sweden)

    Reta French

    2013-01-01

    Full Text Available Background: End-of-life (EOL discussions remain difficult in non-terminal patients as death is often perceived as a taboo and uncertainty. However, the call for proper EOL discussions has recently received public attention and media coverage. Evidence also reveals that non-terminal patients are more satisfied with health-care encounters when EOL has been discussed. Objectives and Methods: The objective of this study was to explore the prevalence of EOL discussions in non-terminal adult patients, the perceived barriers to such discussions and suggested methods for improvement. A study mixed-methods study was performed by a group of PGY1 family medicine residents in an academic health team in Kingston, Ontario. Results: EOL discussion was performed in a very small proportion of non-terminal patient encounters. Compared with attending physicians, residents were less likely to discuss EOL issues and reported more perceived barriers. Conclusion: Our findings reflect the need for an early and open approach in conducting EOL discussion for non-terminal healthy patients.

  12. Qualitative Assessment of Learning Strategies among Medical Students Using Focus Group Discussions and In-depth Interviews.

    Science.gov (United States)

    Joshi, Anuradha Sujai; Ganjiwale, Jaishree Deepak; Varma, Jagdish; Singh, Praveen; Modi, Jyoti Nath; Singh, Tejinder

    2017-12-01

    Globally, students with top academic performance and high intellectual capacity usually opt to study medicine. However, once students get enrolled, their academic performance varies widely. Such variations appear to be determined by various factors, one of them being types of learning strategies adopted by students. The learning strategies utilized by the students with better academic performance are likely to be more effective learning strategies. The objective is to identify effective learning strategies used by medical students. This study was carried out among the MBBS students of Final Professional Part I. Students were categorized into three groups namely: high, average, and low rankers based on overall academic performance in second Professional University examination. First, a questionnaire consisting of closed- and open-ended questions was administered to students, to find their learning strategies. Subsequently, focus group discussion and in-depth interviews were conducted for high- and low-rankers. Discussions were audio-recorded, transcribed, and analyzed. Key statements were highlighted, collated, and categorized into general themes and sub-themes. Evident themes which emerged as effective strategies were hard work in the form of regularity of studies, meticulous preparation of notes, constructive use of time, utilization of e-learning, learning styles and deep learning approach and regular ward visits. Intrinsic motivation, family support, balancing physical activities and studies, guidance by seniors, teachers, dealing with nonacademic issues such as language barriers and stress were also identified as important strategies. Disseminating effective learning strategies in a systematic manner may be helpful to students in achieving better academic outcomes. Furthermore, educationists need to modulate their teaching strategies based on students' feedback.

  13. Advances in Clinical Cardiology 2016: A Summary of the Key Clinical Trials.

    Science.gov (United States)

    Gray, Alastair; McQuillan, Conor; Menown, Ian B A

    2017-07-01

    The findings of many new cardiology clinical trials over the last year have been published or presented at major international meetings. This paper aims to describe and place in context a summary of the key clinical trials in cardiology presented between January and December 2016. The authors reviewed clinical trials presented at major cardiology conferences during 2016 including the American College of Cardiology (ACC), European Association for Percutaneous Cardiovascular Interventions (EuroPCR), European Society of Cardiology (ESC), European Association for the Study of Diabetes (EASD), Transcatheter Cardiovascular Therapeutics (TCT), and the American Heart Association (AHA). Selection criteria were trials with a broad relevance to the cardiology community and those with potential to change current practice. A total of 57 key cardiology clinical trials were identified for inclusion. Here we describe and place in clinical context the key findings of new data relating to interventional and structural cardiology including delayed stenting following primary angioplasty, contrast-induced nephropathy, management of jailed wires, optimal duration of dual antiplatelet therapy (DAPT), stenting vs bypass for left main disease, new generation stents (BioFreedom, Orsiro, Absorb), transcatheter aortic valve implantation (Edwards Sapien XT, transcatheter embolic protection), and closure devices (Watchman, Amplatzer). New preventative cardiology data include trials of bariatric surgery, empagliflozin, liraglutide, semaglutide, PCSK9 inhibitors (evolocumab and alirocumab), and inclisiran. Antiplatelet therapy trials include platelet function monitoring and ticagrelor vs clopidogrel for peripheral vascular disease. New data are also presented in fields of heart failure (sacubitril/valsartan, aliskiren, spironolactone), atrial fibrillation (rivaroxaban in patients undergoing coronary intervention, edoxaban in DC cardioversion), cardiac devices (implantable cardioverter

  14. Ethnographic Findings in the Organizational Theatre

    DEFF Research Database (Denmark)

    Buur, Jacob; Torquet, Rosa

    2013-01-01

    ’ to inhabitants. We explore how theatre improvisation can convey such findings and thus support the provoking role that ethnography may play in organizations. Based on the study of two theatre sessions, we will articulate the importance of balance between playful and serious, of explorative discussion......, and of supportive event planning and space layout to achieve audience engagement....

  15. IPCC Climate Change 2013: Impacts, Adaptation and Vulnerability: Key findings and lessons learned

    Science.gov (United States)

    Giorgi, Filippo; Field, Christopher; Barros, Vicente

    2014-05-01

    submission, but it will be discussed in the report.

  16. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  17. Literature Discussion as Positioning: Examining Positions in Dialogic Discussions in a Third-Grade Classroom

    Science.gov (United States)

    Wee, Jongsun

    2010-01-01

    The purpose of the study is to examine positions of students and a teacher in dialogic discussion. In this study, dialogic discussion was defined with Bakhtin's (1981) dialogism, Nystrand's (1997) explanation of dialogically organized instruction, and Mercer's (1995) explanation of Exploratory Talk. Studies about literature discussion in…

  18. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

    Science.gov (United States)

    Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M

    2017-11-01

    Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

  19. The SECOQC quantum key distribution network in Vienna

    International Nuclear Information System (INIS)

    Peev, M; Pacher, C; Boxleitner, W; Happe, A; Hasani, Y; Alleaume, R; Diamanti, E; Barreiro, C; Fasel, S; Gautier, J-D; Gisin, N; Bouda, J; Debuisschert, T; Fossier, S; Dianati, M; Dynes, J F; Fuerst, M; Gay, O; Grangier, P; Hentschel, M

    2009-01-01

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARC ), an entangled photons system by University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Universite Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent-the SECOQC node module, which enables the authentic classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network

  20. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.