WorldWideScience

Sample records for foreign intelligence surveillance

  1. Foreign Intelligence Surveillance Act: Selected Legislation from the 108th Congress

    National Research Council Canada - National Science Library

    Bazan, Elizabeth B

    2005-01-01

    The Foreign Intelligence Surveillance Act, 50 U.S.C. 1801 (FISA) as passed in 1978, provided a statutory framework for the use of electronic surveillance in the context of foreign intelligence gathering...

  2. The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and U.S. Foreign Intelligence Surveillance Court and U.S. Foreign Intelligence Surveillance Court of Review Decisions

    National Research Council Canada - National Science Library

    Bazan, Elizabeth B

    2007-01-01

    .... Subsequent legislation expanded federal laws dealing with foreign intelligence gathering to address physical searches, pen registers and trap and trace devices, and access to certain business records...

  3. The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and Recent Judicial Decisions

    National Research Council Canada - National Science Library

    Bazan, Elizabeth B

    2005-01-01

    .... Subsequent legislation expanded federal laws dealing with foreign intelligence gathering to address physical searches, pen registers and trap and trace devices, and access to certain business records...

  4. The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and Recent Judicial Decisions

    National Research Council Canada - National Science Library

    Bazan, Elizabeth B

    2004-01-01

    .... Subsequent legislation expanded federal laws dealing with foreign intelligence gathering to address physical searches, pen registers and trap and trace devices, and access to certain business records...

  5. The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and Recent Judicial Decisions

    National Research Council Canada - National Science Library

    Bazan, Elizabeth B

    2004-01-01

    .... 107-108, and the Homeland Security Act of 2002, P.L. 107-296. In addressing international terrorism or espionage, the same factual situation may be the focus of both criminal investigations and foreign intelligence...

  6. Science and engineering intelligent surveillance systems

    CERN Document Server

    Huihuan, Qian; Xu, Yangsheng

    2011-01-01

    As shortcomings such as high labor costs make intelligent surveillance systems more desirable, this practical book focuses on detecting abnormal behavior based on learning and the analysis of dangerous crowd behavior based on texture and optical flow.

  7. Military Transformation: Intelligence, Surveillance and Reconnaissance

    National Research Council Canada - National Science Library

    Chizek, Judy G

    2003-01-01

    .... As the military services attempt to increase the agility and versatility of their weapon systems, they also see a need to increase the capabilities of military intelligence, surveillance and reconnaissance (ISR...

  8. A comprehensive review on intelligent surveillance systems

    Directory of Open Access Journals (Sweden)

    Sutrisno Warsono Ibrahim

    2016-05-01

    Full Text Available Intelligent surveillance system (ISS has received growing attention due to the increasing demand on security and safety. ISS is able to automatically analyze image, video, audio or other type of surveillance data without or with limited human intervention. The recent developments in sensor devices, computer vision, and machine learning have an important role in enabling such intelligent system. This paper aims to provide general overview of intelligent surveillance system and discuss some possible sensor modalities and their fusion scenarios such as visible camera (CCTV, infrared camera, thermal camera and radar. This paper also discusses main processing steps in ISS: background-foreground segmentation, object detection and classification, tracking, and behavioral analysis.

  9. Intelligent video surveillance systems and technology

    CERN Document Server

    Ma, Yunqian

    2009-01-01

    From the streets of London to subway stations in New York City, hundreds of thousands of surveillance cameras ubiquitously collect hundreds of thousands of videos, often running 24/7. How can such vast volumes of video data be stored, analyzed, indexed, and searched? How can advanced video analysis and systems autonomously recognize people and detect targeted activities real-time? Collating and presenting the latest information Intelligent Video Surveillance: Systems and Technology explores these issues, from fundamentals principle to algorithmic design and system implementation.An Integrated

  10. Intelligent multimedia surveillance current trends and research

    CERN Document Server

    Atrey, Pradeep K; Cavallaro, Andrea

    2013-01-01

    Intelligent multimedia surveillance concerns the analysis of multiple sensing inputs including video and audio streams, radio-frequency identification (RFID), and depth data. These data are processed for the automated detection and tracking of people, vehicles, and other objects. The goal is to locate moving targets, to understand their behavior, and to detect suspicious or abnormal activities for crime prevention. Despite its benefits, there is societal apprehension regarding the use of such technology, so an important challenge in this research area is to balance public safety and privacy.

  11. Robust Behavior Recognition in Intelligent Surveillance Environments

    Directory of Open Access Journals (Sweden)

    Ganbayar Batchuluun

    2016-06-01

    Full Text Available Intelligent surveillance systems have been studied by many researchers. These systems should be operated in both daytime and nighttime, but objects are invisible in images captured by visible light camera during the night. Therefore, near infrared (NIR cameras, thermal cameras (based on medium-wavelength infrared (MWIR, and long-wavelength infrared (LWIR light have been considered for usage during the nighttime as an alternative. Due to the usage during both daytime and nighttime, and the limitation of requiring an additional NIR illuminator (which should illuminate a wide area over a great distance for NIR cameras during the nighttime, a dual system of visible light and thermal cameras is used in our research, and we propose a new behavior recognition in intelligent surveillance environments. Twelve datasets were compiled by collecting data in various environments, and they were used to obtain experimental results. The recognition accuracy of our method was found to be 97.6%, thereby confirming the ability of our method to outperform previous methods.

  12. Automated intelligent video surveillance system for ships

    Science.gov (United States)

    Wei, Hai; Nguyen, Hieu; Ramu, Prakash; Raju, Chaitanya; Liu, Xiaoqing; Yadegar, Jacob

    2009-05-01

    To protect naval and commercial ships from attack by terrorists and pirates, it is important to have automatic surveillance systems able to detect, identify, track and alert the crew on small watercrafts that might pursue malicious intentions, while ruling out non-threat entities. Radar systems have limitations on the minimum detectable range and lack high-level classification power. In this paper, we present an innovative Automated Intelligent Video Surveillance System for Ships (AIVS3) as a vision-based solution for ship security. Capitalizing on advanced computer vision algorithms and practical machine learning methodologies, the developed AIVS3 is not only capable of efficiently and robustly detecting, classifying, and tracking various maritime targets, but also able to fuse heterogeneous target information to interpret scene activities, associate targets with levels of threat, and issue the corresponding alerts/recommendations to the man-in- the-loop (MITL). AIVS3 has been tested in various maritime scenarios and shown accurate and effective threat detection performance. By reducing the reliance on human eyes to monitor cluttered scenes, AIVS3 will save the manpower while increasing the accuracy in detection and identification of asymmetric attacks for ship protection.

  13. Intelligent agents for adaptive security market surveillance

    Science.gov (United States)

    Chen, Kun; Li, Xin; Xu, Baoxun; Yan, Jiaqi; Wang, Huaiqing

    2017-05-01

    Market surveillance systems have increasingly gained in usage for monitoring trading activities in stock markets to maintain market integrity. Existing systems primarily focus on the numerical analysis of market activity data and generally ignore textual information. To fulfil the requirements of information-based surveillance, a multi-agent-based architecture that uses agent intercommunication and incremental learning mechanisms is proposed to provide a flexible and adaptive inspection process. A prototype system is implemented using the techniques of text mining and rule-based reasoning, among others. Based on experiments in the scalping surveillance scenario, the system can identify target information evidence up to 87.50% of the time and automatically identify 70.59% of cases depending on the constraints on the available information sources. The results of this study indicate that the proposed information surveillance system is effective. This study thus contributes to the market surveillance literature and has significant practical implications.

  14. Foreign accent, cognitive load and intelligibility of EMI lectures

    DEFF Research Database (Denmark)

    Jensen, Christian; Thøgersen, Jacob

    2017-01-01

    This study investigated the effect of foreign accent on the understanding of spoken texts in two different contexts: (1) when listeners extract surface level meaning of simple utterances, labelled “intelligibility in simple tasks” (IS) below, and (2) when they answer content questions to a complex...

  15. Epidemic Intelligence. Langmuir and the Birth of Disease Surveillance

    Directory of Open Access Journals (Sweden)

    Lyle Fearnley

    2010-12-01

    Full Text Available In the wake of the SARS and influenza epidemics of the past decade, one public health solution has become a refrain: surveillance systems for detection of disease outbreaks. This paper is an effort to understand how disease surveillance for outbreak detection gained such paramount rationality in contemporary public health. The epidemiologist Alexander Langmuir is well known as the creator of modern disease surveillance. But less well known is how he imagined disease surveillance as one part of what he called “epidemic intelligence.” Langmuir developed the practice of disease surveillance during an unprecedented moment in which the threat of biological warfare brought civil defense experts and epidemiologists together around a common problem. In this paper, I describe how Langmuir navigated this world, experimenting with new techniques and rationales of epidemic control. Ultimately, I argue, Langmuir′s experiments resulted in a set of techniques and infrastructures – a system of epidemic intelligence – that transformed the epidemic as an object of human art.

  16. Intelligent Surveillance Robot with Obstacle Avoidance Capabilities Using Neural Network

    Directory of Open Access Journals (Sweden)

    Widodo Budiharto

    2015-01-01

    Full Text Available For specific purpose, vision-based surveillance robot that can be run autonomously and able to acquire images from its dynamic environment is very important, for example, in rescuing disaster victims in Indonesia. In this paper, we propose architecture for intelligent surveillance robot that is able to avoid obstacles using 3 ultrasonic distance sensors based on backpropagation neural network and a camera for face recognition. 2.4 GHz transmitter for transmitting video is used by the operator/user to direct the robot to the desired area. Results show the effectiveness of our method and we evaluate the performance of the system.

  17. Continuous surveillance of transformers using artificial intelligence methods; Surveillance continue des transformateurs: application des methodes d'intelligence artificielle

    Energy Technology Data Exchange (ETDEWEB)

    Schenk, A.; Germond, A. [Ecole Polytechnique Federale de Lausanne, Lausanne (Switzerland); Boss, P.; Lorin, P. [ABB Secheron SA, Geneve (Switzerland)

    2000-07-01

    The article describes a new method for the continuous surveillance of power transformers based on the application of artificial intelligence (AI) techniques. An experimental pilot project on a specially equipped, strategically important power transformer is described. Traditional surveillance methods and the use of mathematical models for the prediction of faults are described. The article describes the monitoring equipment used in the pilot project and the AI principles such as self-organising maps that are applied. The results obtained from the pilot project and methods for their graphical representation are discussed.

  18. Artificial intelligence and foreign policy decision-making

    OpenAIRE

    Berkoff, Russ H.

    1997-01-01

    Approved for public release; distribution is unlimited With the advent of a global information society, the US will seek to tap the potential of advanced computing capability to enhance its ability to conduct foreign policy decision making. This thesis explores the potential for improving individual and organizational decision making capabilities by means of artificial intelligence (AI). The use of AI will allow us to take advantage of the plethora of information available to obtain an edg...

  19. Access to Justice for Communications Surveillance and Interception : Scrutinising Intelligence Gathering Reform Legislation

    NARCIS (Netherlands)

    Quirine Eijkman

    2018-01-01

    By analysing intelligence-gathering reform legislation this article discusses access to justice for communications interception by the intelligence and security services. In the aftermath of the Snowden revelations, sophisticated oversight systems for bulk communications surveillance are being

  20. WANDERER IN THE MIST: THE SEARCH FOR INTELLIGENCE, SURVEILLANCE, AND RECONNAISSANCE (ISR) STRATEGY

    Science.gov (United States)

    2017-06-01

    the production of over 383,000 photographic prints to support various intelligence , mapping, and 15...WANDERER IN THE MIST: THE SEARCH FOR INTELLIGENCE , SURVEILLANCE, AND RECONNAISSANCE (ISR) STRATEGY BY MAJOR RYAN D. SKAGGS, USAF...program from the University of California at Los Angeles (UCLA) in 2004. He is a career intelligence officer with over 13 years of experience across a

  1. What Has Personality and Emotional Intelligence to Do with "Feeling Different" while Using a Foreign Language?

    Science.gov (United States)

    Ozanska-Ponikwia, Katarzyna

    2012-01-01

    The present study investigates the link between personality traits (OCEAN Personality test), emotional intelligence (EI) (Trait Emotional Intelligence Questionnaire) and the notion of "feeling different" while using a foreign language among 102 Polish-English bilinguals and Polish L2 users of English who were immersed in a foreign language and…

  2. Intelligence and Metacognition as Predictors of Foreign Language Achievement: A Structural Equation Modeling Approach

    Science.gov (United States)

    Pishghadam, Reza; Khajavy, Gholam Hassan

    2013-01-01

    This study examined the role of metacognition and intelligence in foreign language achievement on a sample of 143 Iranian English as a Foreign Language (EFL) learners. Participants completed Raven's Advanced Progressive Matrices as a measure of intelligence, and Metacognitive Awareness Inventory as a measure of metacognition. Learners' scores at…

  3. Intelligent robots for nuclear power plant inspection and surveillance

    International Nuclear Information System (INIS)

    Miyazawa, Tatsuo; Suzuki, Kazumi; Fujie, Hideo; Fujii, Masaaki; Asai, Takashi; Sugimoto, Hiroshi.

    1986-01-01

    Recently, the research and development of robotizing the patrol and works in nuclear power plants have been actively carried out since the TMI-2 accident in March, 1979. In this paper, among these robots, six examples of the movable robots, of which the working and movement were intellectualized by using information processing techniques and others, are reported, and their intellectualization is concretely discussed. In Japan, the development of the supporting system for nuclear power generation was carried out for five years from fiscal year 1980 as the project subsidized by the Ministry of International Trade and Industry, and during this period, the inspection robots for LWR plants were developed. The development of the robots for ultimate working as the large scale project of the Agency of Industrial Science and Technology aiming at further heightening the function is in progress as the eight-year project from fiscal year 1983. Monorail type automatic surveillance robots, system maintenance robots 'AMOOTY', variable crawler type intelligent movable robots, hybrid running type intelligent movable robots, monorail running type small checkup robots, and floor running type checkup and light work robots are reported. Sense information processing control and a robot language processor for expanding the function of autonomous control are outlined. (Kako, I.)

  4. Epidemic Intelligence. Langmuir and the Birth of Disease Surveillance

    OpenAIRE

    Lyle Fearnley

    2010-01-01

    In the wake of the SARS and influenza epidemics of the past decade, one public health solution has become a refrain: surveillance systems for detection of disease outbreaks. This paper is an effort to understand how disease surveillance for outbreak detection gained such paramount rationality in contemporary public health. The epidemiologist Alexander Langmuir is well known as the creator of modern disease surveillance. But less well known is how he imagined disease surveillance as one part o...

  5. Blue Guardian: open architecture intelligence, surveillance, and reconnaissance (ISR) demonstrations

    Science.gov (United States)

    Shirey, Russell G.; Borntrager, Luke A.; Soine, Andrew T.; Green, David M.

    2017-04-01

    The Air Force Research Laboratory (AFRL) - Sensors Directorate has developed the Blue Guardian program to demonstrate advanced sensing technology utilizing open architectures in operationally relevant environments. Blue Guardian has adopted the core concepts and principles of the Air Force Rapid Capabilities Office (AFRCO) Open Mission Systems (OMS) initiative to implement an open Intelligence, Surveillance and Reconnaissance (ISR) platform architecture. Using this new OMS standard provides a business case to reduce cost and program schedules for industry and the Department of Defense (DoD). Blue Guardian is an early adopting program of OMS and provides much needed science and technology improvements, development, testing, and implementation of OMS for ISR purposes. This paper presents results and lessons learned under the Blue Guardian Project Shepherd program which conducted Multi-INT operational demonstrations in the Joint Interagency Task Force - South (JIATF-S) and USSOUTHCOM area of operations in early 2016. Further, on-going research is discussed to enhance Blue Guardian Multi-INT ISR capabilities to support additional mission sets and platforms, including unmanned operations over line of sight (LOS) and beyond line of sight (BLOS) datalinks. An implementation of additional OMS message sets and services to support off-platform sensor command and control using OMS/UCI data structures and dissemination of sensor product data/metadata is explored. Lastly, the Blue Guardian team is working with the AgilePod program to use OMS in a full Government Data Rights Pod to rapidly swap these sensors to different aircraft. The union of the AgilePod (which uses SOSA compliant standards) and OMS technologies under Blue Guardian programs is discussed.

  6. The Nigerian health care system: Need for integrating adequate medical intelligence and surveillance systems

    Directory of Open Access Journals (Sweden)

    Menizibeya Osain Welcome

    2011-01-01

    Full Text Available Objectives : As an important element of national security, public health not only functions to provide adequate and timely medical care but also track, monitor, and control disease outbreak. The Nigerian health care had suffered several infectious disease outbreaks year after year. Hence, there is need to tackle the problem. This study aims to review the state of the Nigerian health care system and to provide possible recommendations to the worsening state of health care in the country. To give up-to-date recommendations for the Nigerian health care system, this study also aims at reviewing the dynamics of health care in the United States, Britain, and Europe with regards to methods of medical intelligence/surveillance. Materials and Methods : Databases were searched for relevant literatures using the following keywords: Nigerian health care, Nigerian health care system, and Nigerian primary health care system. Additional keywords used in the search were as follows: United States (OR Europe health care dynamics, Medical Intelligence, Medical Intelligence systems, Public health surveillance systems, Nigerian medical intelligence, Nigerian surveillance systems, and Nigerian health information system. Literatures were searched in scientific databases Pubmed and African Journals OnLine. Internet searches were based on Google and Search Nigeria. Results : Medical intelligence and surveillance represent a very useful component in the health care system and control diseases outbreak, bioattack, etc. There is increasing role of automated-based medical intelligence and surveillance systems, in addition to the traditional manual pattern of document retrieval in advanced medical setting such as those in western and European countries. Conclusion : The Nigerian health care system is poorly developed. No adequate and functional surveillance systems are developed. To achieve success in health care in this modern era, a system well grounded in routine

  7. Integrated design of intelligent surveillance systems and their user interface

    NARCIS (Netherlands)

    Toet, A.

    2005-01-01

    Modern complex surveillance systems consisting of multiple and heterogeneous sensors, automatic information registration and data analysis techniques, and decision support tools should provide the human operator an integrated, transparent and easily comprehensible view of the surveyed scene.

  8. Is It Possible To Use Intelligent Systems To Design A Profitable Foreign Exchange Trading Agent?

    OpenAIRE

    Julian, Pomfret-Pudelsky

    2009-01-01

    In this paper, a trading agent is developed using a basket of intelligent systems with the goal of trading the GBPUSD currency pair profitably in the Foreign Exchange market. The basket of intelligent system consists of two regression models: a radial basis neural network and a TSK-fuzzy inference system; and three classification models: k-nearest neighbour, support vector machine and a decision tree. The trading strategy combines the predictions of each model using a Kalman-type filter to...

  9. Manned Airborne Intelligence, Surveillance, and Reconnaissance: Strategic, Tactical . . . Both?

    Science.gov (United States)

    2012-12-01

    Program, 1996), 97, http://www.dtic.mil /cgi-bin/GetTRDoc?AD=ADA442835&Location=U2&doc=GetTRDoc.pdf. 17. Quoted in William E. Burrows , By Any Means...41. Larry Tart and Robert Keefe, The Price of Vigilance: Attacks on American Surveillance Flights (New York: Ballantine Books, 2001), 196. 42. Ibid

  10. Parallel Computational Intelligence-Based Multi-Camera Surveillance System

    OpenAIRE

    Orts-Escolano, Sergio; Garcia-Rodriguez, Jose; Morell, Vicente; Cazorla, Miguel; Azorin-Lopez, Jorge; García-Chamizo, Juan Manuel

    2014-01-01

    In this work, we present a multi-camera surveillance system based on the use of self-organizing neural networks to represent events on video. The system processes several tasks in parallel using GPUs (graphic processor units). It addresses multiple vision tasks at various levels, such as segmentation, representation or characterization, analysis and monitoring of the movement. These features allow the construction of a robust representation of the environment and interpret the behavior of mob...

  11. Listening Comprehension Performance Viewed in the Light of Emotional Intelligence and Foreign Language Listening Anxiety

    Science.gov (United States)

    Valizadeh, Mohammad Reza; Alavinia, Parviz

    2013-01-01

    The researchers in the current study were after probing the potential relationship between emotional intelligence, foreign language listening anxiety (FLLA), and listening comprehension performance of Iranian EFL learners. To this end, 233 participants, studying English language and literature at three different Universities in Urmia, were…

  12. Using Multiple Intelligences To Improve Retention in Foreign Language Vocabulary Study.

    Science.gov (United States)

    Anderson, Virginia B.

    The report describes an experiment for increasing retention of foreign language vocabulary by using multiple intelligence approaches and memory enhancement tools. The targeted population was approximately 100 seventh- and eighth-grade Latin students. Student difficulty with vocabulary retention had been ascribed to the teacher's emphasis on…

  13. Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance.

    Science.gov (United States)

    Smith, Frank L

    2016-01-01

    Malicious software and infectious diseases are similar is several respects, as are the functional requirements for surveillance and intelligence to defend against these threats. Given these similarities, this article compares and contrasts the actors, relationships, and norms at work in cyber intelligence and disease surveillance. Historical analysis reveals that civilian cyber defense is more decentralized, private, and voluntary than public health in the United States. Most of these differences are due to political choices rather than technical necessities. In particular, political resistance to government institutions has shaped cyber intelligence over the past 30 years, which is a troubling sign for attempts to improve disease surveillance through local, state, and federal health departments. Information sharing about malware is also limited, despite information technology being integral to cyberspace. Such limits suggest that automation through electronic health records will not automatically improve public health surveillance. Still, certain aspects of information sharing and analysis for cyber defense are worth emulating or, at the very least, learning from to help detect and manage health threats.

  14. Further development of NPP surveillance and diagnostic systems by use of intelligent technologies

    International Nuclear Information System (INIS)

    Wach, D.; Ding, Y.

    1998-01-01

    Recent development work at ISTec/GRS has been directed to more automation of surveillance techniques by utilization of the technological progress and existing tools. Neural nets, fuzzy techniques and rule-based methods were investigated for application in feature classification and automated identification of anomalies. First applications were aimed at classification of useful patterns and suppression of non-relevant signal components in order to avoid false alarms (e.g. in acoustic monitoring) and at signal validation under normal and disturbed plant conditions. Other on-going projects are aimed at the application of the successful methods to other surveillance tasks such as on-line assessment of sensor behaviour and ageing phenomena of instrumentation. The paper gives an insight in the intelligent analysis techniques and highlights their potential use for other surveillance tasks in nuclear power plants. (author)

  15. Parallel Computational Intelligence-Based Multi-Camera Surveillance System

    Directory of Open Access Journals (Sweden)

    Sergio Orts-Escolano

    2014-04-01

    Full Text Available In this work, we present a multi-camera surveillance system based on the use of self-organizing neural networks to represent events on video. The system processes several tasks in parallel using GPUs (graphic processor units. It addresses multiple vision tasks at various levels, such as segmentation, representation or characterization, analysis and monitoring of the movement. These features allow the construction of a robust representation of the environment and interpret the behavior of mobile agents in the scene. It is also necessary to integrate the vision module into a global system that operates in a complex environment by receiving images from multiple acquisition devices at video frequency. Offering relevant information to higher level systems, monitoring and making decisions in real time, it must accomplish a set of requirements, such as: time constraints, high availability, robustness, high processing speed and re-configurability. We have built a system able to represent and analyze the motion in video acquired by a multi-camera network and to process multi-source data in parallel on a multi-GPU architecture.

  16. Improved Space Surveillance Network (SSN) Scheduling using Artificial Intelligence Techniques

    Science.gov (United States)

    Stottler, D.

    There are close to 20,000 cataloged manmade objects in space, the large majority of which are not active, functioning satellites. These are tracked by phased array and mechanical radars and ground and space-based optical telescopes, collectively known as the Space Surveillance Network (SSN). A better SSN schedule of observations could, using exactly the same legacy sensor resources, improve space catalog accuracy through more complementary tracking, provide better responsiveness to real-time changes, better track small debris in low earth orbit (LEO) through efficient use of applicable sensors, efficiently track deep space (DS) frequent revisit objects, handle increased numbers of objects and new types of sensors, and take advantage of future improved communication and control to globally optimize the SSN schedule. We have developed a scheduling algorithm that takes as input the space catalog and the associated covariance matrices and produces a globally optimized schedule for each sensor site as to what objects to observe and when. This algorithm is able to schedule more observations with the same sensor resources and have those observations be more complementary, in terms of the precision with which each orbit metric is known, to produce a satellite observation schedule that, when executed, minimizes the covariances across the entire space object catalog. If used operationally, the results would be significantly increased accuracy of the space catalog with fewer lost objects with the same set of sensor resources. This approach inherently can also trade-off fewer high priority tasks against more lower-priority tasks, when there is benefit in doing so. Currently the project has completed a prototyping and feasibility study, using open source data on the SSN's sensors, that showed significant reduction in orbit metric covariances. The algorithm techniques and results will be discussed along with future directions for the research.

  17. Enhanced surveillance for tuberculosis among foreign-born persons, Finland, 2014-2016.

    Science.gov (United States)

    Räisänen, Pirre E; Soini, Hanna; Turtiainen, Pirjo; Vasankari, Tuula; Ruutu, Petri; Nuorti, J Pekka; Lyytikäinen, Outi

    2018-05-09

    Tuberculosis (TB) in foreign-born residents is increasing in many European countries including Finland. We conducted enhanced TB surveillance to collect supplementary information on TB cases among recent immigrants and their children to provide data for revising TB control policies in Finland to take into account the decrease in native cases and increase in foreign-born cases. TB cases were identified from the National Infectious Diseases Register. Data on foreign-born (if not available, most recent nationality other than Finnish) TB cases notified during 2014-2016 (country of birth, date of arrival to Finland, participation in TB screening, date of first symptoms, and details of possible contact tracing) were requested from physicians responsible for regional communicable disease control through a web-based questionnaire. Questionnaires were returned for 203 (65%) of 314 foreign-born TB cases; 36 (18%) were paediatric cases TB was detected in arrival screening in 42 (21%) and during contact tracing of another TB case in 18 (9%); 143 (70%) cases sought care for symptoms or were identified by chance (e.g. chest x-ray because of an accident). Of cases with data available, 48 (24%) cases were diagnosed within 3 months of arrival to Finland, 55 (27%) cases between 3 months and 2 years from arrival, and 84 (42%) cases after 2 years from arrival. Of all the foreign-born cases, 17% had been in a reception centre in Finland and 15% had been in a refugee camp abroad. In addition to asylum seekers and refugees, TB screening should be considered for immigrants arriving from high TB incidence countries, since the majority of TB cases were detected among persons who immigrated to Finland due to other reasons, presumably work or study. Further evaluation of the target group and timing of TB screening is warranted to update national screening guidance.

  18. Extracting foreground ensemble features to detect abnormal crowd behavior in intelligent video-surveillance systems

    Science.gov (United States)

    Chan, Yi-Tung; Wang, Shuenn-Jyi; Tsai, Chung-Hsien

    2017-09-01

    Public safety is a matter of national security and people's livelihoods. In recent years, intelligent video-surveillance systems have become important active-protection systems. A surveillance system that provides early detection and threat assessment could protect people from crowd-related disasters and ensure public safety. Image processing is commonly used to extract features, e.g., people, from a surveillance video. However, little research has been conducted on the relationship between foreground detection and feature extraction. Most current video-surveillance research has been developed for restricted environments, in which the extracted features are limited by having information from a single foreground; they do not effectively represent the diversity of crowd behavior. This paper presents a general framework based on extracting ensemble features from the foreground of a surveillance video to analyze a crowd. The proposed method can flexibly integrate different foreground-detection technologies to adapt to various monitored environments. Furthermore, the extractable representative features depend on the heterogeneous foreground data. Finally, a classification algorithm is applied to these features to automatically model crowd behavior and distinguish an abnormal event from normal patterns. The experimental results demonstrate that the proposed method's performance is both comparable to that of state-of-the-art methods and satisfies the requirements of real-time applications.

  19. Kestrel: force protection and Intelligence, Surveillance, and Reconnaissance (ISR) persistent surveillance on aerostats

    Science.gov (United States)

    Luber, David R.; Marion, John E.; Fields, David

    2012-05-01

    Logos Technologies has developed and fielded the Kestrel system, an aerostat-based, wide area persistent surveillance system dedicated to force protection and ISR mission execution operating over forward operating bases. Its development included novel imaging and stabilization capability for day/night operations on military aerostat systems. The Kestrel system's contribution is a substantial enhancement to aerostat-based, force protection systems which to date have relied on narrow field of view ball gimbal sensors to identify targets of interest. This inefficient mechanism to conduct wide area field of view surveillance is greatly enhanced by Kestrel's ability to maintain a constant motion imagery stare of the entire forward operating base (FOB) area. The Kestrel airborne sensor enables 360° coverage out to extended ranges which covers a city sized area at moderate resolution, while cueing a narrow field of view sensor to provide high resolution imagery of targets of interest. The ground station exploitation system enables operators to autonomously monitor multiple regions of interest in real time, and allows for backtracking through the recorded imagery, while continuing to monitor ongoing activity. Backtracking capability allows operators to detect threat networks, their CONOPS, and locations of interest. Kestrel's unique advancement has already been utilized successfully in OEF operations.

  20. A generic flexible and robust approach for intelligent real-time video-surveillance systems

    Science.gov (United States)

    Desurmont, Xavier; Delaigle, Jean-Francois; Bastide, Arnaud; Macq, Benoit

    2004-05-01

    In this article we present a generic, flexible and robust approach for an intelligent real-time video-surveillance system. A previous version of the system was presented in [1]. The goal of these advanced tools is to provide help to operators by detecting events of interest in visual scenes and highlighting alarms and compute statistics. The proposed system is a multi-camera platform able to handle different standards of video inputs (composite, IP, IEEE1394 ) and which can basically compress (MPEG4), store and display them. This platform also integrates advanced video analysis tools, such as motion detection, segmentation, tracking and interpretation. The design of the architecture is optimised to playback, display, and process video flows in an efficient way for video-surveillance application. The implementation is distributed on a scalable computer cluster based on Linux and IP network. It relies on POSIX threads for multitasking scheduling. Data flows are transmitted between the different modules using multicast technology and under control of a TCP-based command network (e.g. for bandwidth occupation control). We report here some results and we show the potential use of such a flexible system in third generation video surveillance system. We illustrate the interest of the system in a real case study, which is the indoor surveillance.

  1. An Investigation into Emotional Intelligence, Foreign Language Anxiety and Empathy through a Cognitive-Affective Course in an EFL Context

    Directory of Open Access Journals (Sweden)

    Rouhani, Ali

    2008-01-01

    Full Text Available Emotional intelligence, as concerned with how an individual recognizes and regulates his or her emotions, has been in limelight quite recently. The present study seeks to fill a small gap in the literature on emotional intelligence, together with foreign language anxiety and empathy. To this end, short literary readings are used in a cognitive-affective reading-based course to see how emotional intelligence, foreign language anxiety and empathy are affected. Mayer, Salovey and Caruso (2002 Emotional Intelligence Test (MSCEIT, Cooper's (1996/1997 EQ-Map, Horwitz, Horwitz and Cope's (1986 Foreign Language Classroom Anxiety Test (FLCAS and Caruso and Mayer's (1998 Multi-Dimensional Emotional Empathy Scale (MDEES were administered to 70 Iranian EFL undergraduate students in a pretest posttest quasi-experimental design. MANOVA and ANCOVA were conducted. The results revealed that the cognitive-affective reading-based course in which literary readings were used significantly improved the subjects' emotional intelligence scores from the MSCEIT measure as well as empathy (MDEES scores, but significantly decreased their foreign language anxiety (FLCAS scores. The pedagogical implications for learners, teachers, educators and materials developers are presented.

  2. Artificial intelligence applications to the surveillance and diagnostics of nuclear power plants

    International Nuclear Information System (INIS)

    Zwingelstein, G.; Monnier, B.

    1985-01-01

    Artificial intelligence has come of age; it can be applied with benefits in the nuclear industry for various applications to improve both plant safety and availability. This paper presents four rule-based expert systems currently under development at Electricite de France for the surveillance and the diagnostics of pressurized water reactors (PWRs). The objectives of these experiences with expert system projects are to demonstrate their feasibility, to provide an evaluation of their potential benefits through on-site implementation, to identify the problems due to the knowledge extraction and representation, and finally to specify the classes of problems where expert systems are needed and useful. The specific goals of these expert systems are to provide an aid for the detection and location of failures occurring in nuclear plants

  3. Integration of artificial intelligence systems for nuclear power plants surveillance and diagnostics

    International Nuclear Information System (INIS)

    Chetry, Moon K.

    2012-01-01

    The objective of this program is to design, construct operate, test, and evaluate a prototype integrated monitoring and diagnostic system for a nuclear power plant. It is anticipated that this technology will have wide application to other complex systems (e.g., fossil power plants, chemical processing plants, and possibly air traffic control systems). Over the past decade, the University of Tennessee (UT) and others have carried out many projects utilizing various methodologies of artificial intelligence (expert systems, neural networks, fuzzy systems and genetic algorithms) to enhance the performance (safety, efficiency, reliability, and availability) of nuclear power plants. Investigations and studies have included a) instrumentation surveillance and calibration validation, b) inferential sensing to calibration of feed water venture flow during fouling, c) thermodynamic performance modeling with iterative improvement of plant heat rate, d) diagnosis of nuclear power plant transients

  4. On Using Intelligent Computer-Assisted Language Learning in Real-Life Foreign Language Teaching and Learning

    Science.gov (United States)

    Amaral, Luiz A.; Meurers, Detmar

    2011-01-01

    This paper explores the motivation and prerequisites for successful integration of Intelligent Computer-Assisted Language Learning (ICALL) tools into current foreign language teaching and learning (FLTL) practice. We focus on two aspects, which we argue to be important for effective ICALL system development and use: (i) the relationship between…

  5. LoRaWAN-Based Energy-Efficient Surveillance by Drones for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Vishal Sharma

    2018-03-01

    Full Text Available Urban networks aim at facilitating users for better experience and services through smart platforms such as the Intelligent Transportation System (ITS. ITS focuses on information acquisition, sensing, contrivance control, data processing and forwarding to ground devices via user-specific application-interfaces. The utility of ITS is further improved via the Internet of Things (IoT, which supports “Connectivity to All”. One of the key applications of IoT-ITS is urban surveillance. Current surveillance in IoT-ITS is performed via fixed infrastructure-based sensing applications which consume an excessive amount of energy leading to several overheads and failures in the network. Such issues can be overcome by the utilization of on-demand nodes, such as drones, etc. However, drones-assisted surveillance requires efficient communication setup as drones are battery operated and any extemporaneous maneuver during monitoring may result in loss of drone or complete failure of the network. The novelty in terms of network layout can be procured by the utilization of drones with LoRaWAN, which is the protocol designated for Low-Power Wide Area Networks (LPWAN. However, even this architectural novelty alone cannot ascertain the formation of fail-safe, highly resilient, low-overhead, and non-redundant network, which is additionally the problem considered in this paper. To resolve such problem, this paper uses drones as LoRaWAN gateway and proposes a communication strategy based on the area stress, resilient factor, and energy consumption that avail in the efficient localization, improved coverage and energy-efficient surveillance with lower overheads, lower redundancy, and almost zero-isolations. The proposed approach is numerically simulated and the results show that the proposed approach can conserve a maximum of 39.2% and a minimum of 12.6% of the total network energy along with an improvement in the area stress between 89.7% and 53.0% for varying

  6. Surveillance

    DEFF Research Database (Denmark)

    Albrechtslund, Anders; Coeckelbergh, Mark; Matzner, Tobias

    Studying surveillance involves raising questions about the very nature of concepts such as information, technology, identity, space and power. Besides the maybe all too obvious ethical issues often discussed with regard to surveillance, there are several other angles and approaches that we should...... like to encourage. Therefore, our panel will focus on the philosophical, yet non-ethical issues of surveillance in order to stimulate an intense debate with the audience on the ethical implications of our enquiries. We also hope to provide a broader and deeper understanding of surveillance....

  7. An evolutionary algorithm technique for intelligence, surveillance, and reconnaissance plan optimization

    Science.gov (United States)

    Langton, John T.; Caroli, Joseph A.; Rosenberg, Brad

    2008-04-01

    To support an Effects Based Approach to Operations (EBAO), Intelligence, Surveillance, and Reconnaissance (ISR) planners must optimize collection plans within an evolving battlespace. A need exists for a decision support tool that allows ISR planners to rapidly generate and rehearse high-performing ISR plans that balance multiple objectives and constraints to address dynamic collection requirements for assessment. To meet this need we have designed an evolutionary algorithm (EA)-based "Integrated ISR Plan Analysis and Rehearsal System" (I2PARS) to support Effects-based Assessment (EBA). I2PARS supports ISR mission planning and dynamic replanning to coordinate assets and optimize their routes, allocation and tasking. It uses an evolutionary algorithm to address the large parametric space of route-finding problems which is sometimes discontinuous in the ISR domain because of conflicting objectives such as minimizing asset utilization yet maximizing ISR coverage. EAs are uniquely suited for generating solutions in dynamic environments and also allow user feedback. They are therefore ideal for "streaming optimization" and dynamic replanning of ISR mission plans. I2PARS uses the Non-dominated Sorting Genetic Algorithm (NSGA-II) to automatically generate a diverse set of high performing collection plans given multiple objectives, constraints, and assets. Intended end users of I2PARS include ISR planners in the Combined Air Operations Centers and Joint Intelligence Centers. Here we show the feasibility of applying the NSGA-II algorithm and EAs in general to the ISR planning domain. Unique genetic representations and operators for optimization within the ISR domain are presented along with multi-objective optimization criteria for ISR planning. Promising results of the I2PARS architecture design, early software prototype, and limited domain testing of the new algorithm are discussed. We also present plans for future research and development, as well as technology

  8. Infrared and visible image fusion using discrete cosine transform and swarm intelligence for surveillance applications

    Science.gov (United States)

    Paramanandham, Nirmala; Rajendiran, Kishore

    2018-01-01

    A novel image fusion technique is presented for integrating infrared and visible images. Integration of images from the same or various sensing modalities can deliver the required information that cannot be delivered by viewing the sensor outputs individually and consecutively. In this paper, a swarm intelligence based image fusion technique using discrete cosine transform (DCT) domain is proposed for surveillance application which integrates the infrared image with the visible image for generating a single informative fused image. Particle swarm optimization (PSO) is used in the fusion process for obtaining the optimized weighting factor. These optimized weighting factors are used for fusing the DCT coefficients of visible and infrared images. Inverse DCT is applied for obtaining the initial fused image. An enhanced fused image is obtained through adaptive histogram equalization for a better visual understanding and target detection. The proposed framework is evaluated using quantitative metrics such as standard deviation, spatial frequency, entropy and mean gradient. The experimental results demonstrate the outperformance of the proposed algorithm over many other state- of- the- art techniques reported in literature.

  9. Integration of artificial intelligence systems for nuclear power plant surveillance and diagnostics

    International Nuclear Information System (INIS)

    Uhrig, R.E.; Hines, J.W.; Nelson, W.R.

    1998-01-01

    The objective of this program is to design, construct, operate, test, and evaluate a prototype integrated monitoring and diagnostic system for a nuclear power plant. It is anticipated that this technology will have wide application to other complex systems (e.g., fossil power plants, chemical processing plants, and possibly air traffic control systems). Over the past decade, the University of Tennessee (UT) and others have carried out many projects utilizing various methodologies of artificial intelligence (expert systems, neural networks, fuzzy systems, and genetic algorithms) to enhance the performance (safety, efficiency, reliability, and availability) of nuclear power plants. Investigations and studies have included a) instrumentation surveillance and calibration validation, b) inferential sensing to calibration of feedwater venturi flow during fouling, c) thermodynamic performance modeling with iterative improvement of plant beat rate, d) diagnosis of nuclear power plant transients, and e) increase in thermal power through monitoring of DNBR (Departure from Nucleate Boiling Regime). To increase the likelihood of these individual systems being used in a nuclear power plant, they must be integrated into a single system that operates virtually autonomously, collecting, interpreting, and providing information to the operators in a simple and understandable format. (author)

  10. Integration of artificial intelligence systems for nuclear power plant surveillance and diagnostics

    Energy Technology Data Exchange (ETDEWEB)

    Uhrig, R.E.; Hines, J.W.; Nelson, W.R.

    1998-07-01

    The objective of this program is to design, construct, operate, test, and evaluate a prototype integrated monitoring and diagnostic system for a nuclear power plant. It is anticipated that this technology will have wide application to other complex systems (e.g., fossil power plants, chemical processing plants, and possibly air traffic control systems). Over the past decade, the University of Tennessee (UT) and others have carried out many projects utilizing various methodologies of artificial intelligence (expert systems, neural networks, fuzzy systems, and genetic algorithms) to enhance the performance (safety, efficiency, reliability, and availability) of nuclear power plants. Investigations and studies have included a) instrumentation surveillance and calibration validation, b) inferential sensing to calibration of feedwater venturi flow during fouling, c) thermodynamic performance modeling with iterative improvement of plant beat rate, d) diagnosis of nuclear power plant transients, and e) increase in thermal power through monitoring of DNBR (Departure from Nucleate Boiling Regime). To increase the likelihood of these individual systems being used in a nuclear power plant, they must be integrated into a single system that operates virtually autonomously, collecting, interpreting, and providing information to the operators in a simple and understandable format. (author)

  11. European human rights, criminal surveillance, and intelligence surveillance : Towards “good enough” oversight, preferably but not necessarily by judges

    NARCIS (Netherlands)

    Malgieri, G.; de Hert, Paul; Gray, David C.; Henderson, Stephen

    2017-01-01

    The two European Courts (the European Court of Human Rights, ECtHR and, to a lesser degree, the European Union Court of Justice, EUCJ) have contributed greatly to the development of a legal framework for surveillance by either law enforcement agencies in the criminal law area or by secret services.

  12. Space Surveillance Network: New Way Proposed To Support Commercial and Foreign Entities

    National Research Council Canada - National Science Library

    Shays, Christopher

    2002-01-01

    DOD uses the U.S. space surveillance network to track active and inactive satellites and space debris generated from launch vehicles and satellite breakups, and the agency catalogs and provides these data to DOD organizations, U.S...

  13. State of the reactor vessel surveillance programs in Korea and foreign countries

    International Nuclear Information System (INIS)

    Kim, Jeong Kyu; Hwang, Jong Keun; Park, Keon Woo; Kim, Bum Sik; Jeong, Kyung Hoon

    1996-06-01

    ASTM standards are dominating all over the world in the field of the reactor vessel surveillance program. They are mainly used directly or that the national standards in use correspond quite well with ASTM. According to, however, increasing concerns about the protection of environment and safety of nuclear plant, various approaches to establish and reinforce the national standards are made actively in Europe. In addition, some methods to share the nuclear data by integrating the existing test, analysis procedures and units system are considered. For nuclear plants in Korea, MOST Notice No. 92-20 should be applied for all PWRs after UCN units 3 and 4 since it was promulgated at Dec. 1992. The notice almost reflects the contents of ASTM E 185. But, the notice has much to be desired to provide the technical back-ground for reactor vessel surveillance program because it is not a standard such as ASTM or ASME code but regulation such as CFR or RG. Several Korean Standards are also used in limited area of the surveillance program. Therefore, practical requirements and rules for surveillance program are in accordance with the ASTM and CFR. In this report, the state of application of the standards to the surveillance program in Korea and Europe are reviewed and their national standards re compared with US standards or regulations. Current level and the future prospect of surveillance technology for PWR vessel are discussed at this point of view. 15 tabs., 12 figs., 38 refs. (Author)

  14. Pre-Service English as a Foreign Language Teachers' Perceptions of the Relationship between Multiple Intelligences and Foreign Language Learning

    Science.gov (United States)

    Savas, Perihan

    2012-01-01

    The relationship between intelligence, language, and learning is a challenging field of study. One way to study how this relationship occurs and works is to investigate the perceptions of advanced language learners. Therefore, this paper reports a study that was conducted to explore 160 pre-service English language teachers' perceptions about…

  15. Report of the Defense Science Board Task Force on Defense Intelligence - Counterinsurgency (COIN) Intelligence, Surveillance, and Reconnaissance (ISR) Operations

    Science.gov (United States)

    2011-02-01

    Thomas,  Jason.  “The  Cognitive   Dissonance   of COIN: Right Doctrine, Wrong War.” Small  Wars Journal (13 August 2010).  Thompson, Gary H. and David...no  mechanisms  for  systematically recording and following up on the  satisfaction  of intelligence requirements as  they  pertain  to  the

  16. Application of artificial intelligence for nuclear power plant surveillance and diagnosis problems

    International Nuclear Information System (INIS)

    Monnier, B.; Ricard, B.; Doutre, J.L.; Martin-Mattei, C.; Fernandes, A.

    1991-01-01

    This paper presents three expert systems in the field of surveillance and diagnosis of nuclear power plants. Each application is described from the point of view of knowledge modeling. Then, a general knowledge model is proposed for a class of diagnosis problems. At the end, the paper shows the future frame of the surveillance of the nuclear power plant main components at EDF in which the greatest part of those expert systems will run

  17. Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

    Directory of Open Access Journals (Sweden)

    Tom Keatinge

    2015-07-01

    Full Text Available Since 9/11, financial institutions have found themselves placed squarely on the front line of efforts to combat terrorism: countering terrorist financing has been a core element of the global counter-terrorism architecture since President George W Bush signed Executive Order 13224 promising to starve terrorists of funding. Financial institutions have played valuable “post-event” forensic roles, but despite the apparently immense troves of data they hold, their effective involvement in the identification and disruption of terrorist intentions or activity remains elusive. With global authorities consumed with the mushrooming growth of “foreign terrorist fighters” (FTFs, it seems timely to revisit the question of how financial institutions can play a more preventative role in countering terrorist threats. As the intergovernmental Financial Action Task Force (FATF noted recently, “greater domestic cooperation among AML/CFT [anti-money laundering and countering the financing of terrorism] bodies and other authorities” is needed to tackle funding of FTFs. Banks must play a key role in the development of this architecture. The issue of FTFs flowing to and from the conflict in Syria is likely to shape the international security agenda for the foreseeable future. Identifying citizens who have joined terrorist groups in Syria and Iraq pose a threat to the UK. The UK is certainly not alone in Europe in facing this threat. Evidence suggests these fears are now being realised. Both the scale of the issue in the context of the Syrian conflict and the speed with which the numbers have risen have caught international security authorities off guard, which – it would seem – have only belatedly appreciated the magnitude of the challenge. Whilst there has been much discussion and debate about who these travelling fighters are, their motivations, and the threats they pose, the majority of this analysis has focused on the role of social media in this

  18. MULTIPLE INTELLIGENCE THEORY AND FOREIGN LANGUAGE LEARNING:A BRAIN-BASED PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Jane Arnold

    2004-06-01

    Full Text Available Gardner's Multiple Intelligences theory is presented as a cognitive perspective on intelligence which has profound implications for education in general. More specifically, it has led to the application of eight of these frames to language teaching and learning. In this chapter, we will argue in favour of the application of MIT to the EFL classroom, using as support some of the major insights for language teaching from brain science.

  19. Stochastic pattern recognition techniques and artificial intelligence for nuclear power plant surveillance and anomaly detection

    Energy Technology Data Exchange (ETDEWEB)

    Kemeny, L.G

    1998-12-31

    In this paper a theoretical and system conceptual model is outlined for the instrumentation, core assessment and surveillance and anomaly detection of a nuclear power plant. The system specified is based on the statistical on-line analysis of optimally placed instrumentation sensed fluctuating signals in terms of such variates as coherence, correlation function, zero-crossing and spectral density

  20. A novel framework for intelligent surveillance system based on abnormal human activity detection in academic environments.

    Science.gov (United States)

    Al-Nawashi, Malek; Al-Hazaimeh, Obaida M; Saraee, Mohamad

    2017-01-01

    Abnormal activity detection plays a crucial role in surveillance applications, and a surveillance system that can perform robustly in an academic environment has become an urgent need. In this paper, we propose a novel framework for an automatic real-time video-based surveillance system which can simultaneously perform the tracking, semantic scene learning, and abnormality detection in an academic environment. To develop our system, we have divided the work into three phases: preprocessing phase, abnormal human activity detection phase, and content-based image retrieval phase. For motion object detection, we used the temporal-differencing algorithm and then located the motions region using the Gaussian function. Furthermore, the shape model based on OMEGA equation was used as a filter for the detected objects (i.e., human and non-human). For object activities analysis, we evaluated and analyzed the human activities of the detected objects. We classified the human activities into two groups: normal activities and abnormal activities based on the support vector machine. The machine then provides an automatic warning in case of abnormal human activities. It also embeds a method to retrieve the detected object from the database for object recognition and identification using content-based image retrieval. Finally, a software-based simulation using MATLAB was performed and the results of the conducted experiments showed an excellent surveillance system that can simultaneously perform the tracking, semantic scene learning, and abnormality detection in an academic environment with no human intervention.

  1. Stochastic pattern recognition techniques and artificial intelligence for nuclear power plant surveillance and anomaly detection

    International Nuclear Information System (INIS)

    Kemeny, L.G.

    1998-01-01

    In this paper a theoretical and system conceptual model is outlined for the instrumentation, core assessment and surveillance and anomaly detection of a nuclear power plant. The system specified is based on the statistical on-line analysis of optimally placed instrumentation sensed fluctuating signals in terms of such variates as coherence, correlation function, zero-crossing and spectral density

  2. Efficient large-scale graph data optimization for intelligent video surveillance

    Science.gov (United States)

    Shang, Quanhong; Zhang, Shujun; Wang, Yanbo; Sun, Chen; Wang, Zepeng; Zhang, Luming

    2017-08-01

    Society is rapidly accepting the use of a wide variety of cameras Location and applications: site traffic monitoring, parking Lot surveillance, car and smart space. These ones here the camera provides data every day in an analysis Effective way. Recent advances in sensor technology Manufacturing, communications and computing are stimulating.The development of new applications that can change the traditional Vision system incorporating universal smart camera network. This Analysis of visual cues in multi camera networks makes wide Applications ranging from smart home and office automation to large area surveillance and traffic surveillance. In addition, dense Camera networks, most of which have large overlapping areas of cameras. In the view of good research, we focus on sparse camera networks. One Sparse camera network using large area surveillance. As few cameras as possible, most cameras do not overlap Each other’s field of vision. This task is challenging Lack of knowledge of topology Network, the specific changes in appearance and movement Track different opinions of the target, as well as difficulties Understanding complex events in a network. In this review in this paper, we present a comprehensive survey of recent studies Results to solve the problem of topology learning, Object appearance modeling and global activity understanding sparse camera network. In addition, some of the current open Research issues are discussed.

  3. Purposeful Development of the Intelligence, Surveillance, and Reconnaissance for Space Cadre

    Science.gov (United States)

    2016-07-13

    This article would not have been possible without the invaluable thoughts and perspectives provided by Col Gay “Charlie” McGillis, USAF, retired, and...should move on to a Twenty-Fifth Air Force or intelligence community assignment that allows them to fulfill ISR requirements that, when answered

  4. 75 FR 43943 - Defense Science Board; Task Force on Counter Insurgency (COIN) Intelligence, Surveillance and...

    Science.gov (United States)

    2010-07-27

    ... and what emerging science and technology would have the greatest intelligence potential in this type... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Counter... Defense (DoD). ACTION: Notice of advisory committee meetings. SUMMARY: The Defense Science Board Task...

  5. Learner Differences among Children Learning a Foreign Language: Language Anxiety, Strategy Use, and Multiple Intelligences

    Science.gov (United States)

    Liu, Hui-ju; Chen, Ting-Han

    2014-01-01

    This study mainly investigates language anxiety and its relationship to the use of learning strategies and multiple intelligences among young learners in an EFL educational context. The participants were composed of 212 fifth- and sixth-graders from elementary schools in central Taiwan. Findings indicated that most participants generally…

  6. Intelligence

    Science.gov (United States)

    Sternberg, Robert J.

    2012-01-01

    Intelligence is the ability to learn from experience and to adapt to, shape, and select environments. Intelligence as measured by (raw scores on) conventional standardized tests varies across the lifespan, and also across generations. Intelligence can be understood in part in terms of the biology of the brain—especially with regard to the functioning in the prefrontal cortex—and also correlates with brain size, at least within humans. Studies of the effects of genes and environment suggest that the heritability coefficient (ratio of genetic to phenotypic variation) is between .4 and .8, although heritability varies as a function of socioeconomic status and other factors. Racial differences in measured intelligence have been observed, but race is a socially constructed rather than biological variable, so such differences are difficult to interpret. PMID:22577301

  7. Intelligence.

    Science.gov (United States)

    Sternberg, Robert J

    2012-03-01

    Intelligence is the ability to learn from experience and to adapt to, shape, and select environments. Intelligence as measured by (raw scores on) conventional standardized tests varies across the lifespan, and also across generations. Intelligence can be understood in part in terms of the biology of the brain-especially with regard to the functioning in the prefrontal cortex-and also correlates with brain size, at least within humans. Studies of the effects of genes and environment suggest that the heritability coefficient (ratio of genetic to phenotypic variation) is between .4 and .8, although heritability varies as a function of socioeconomic status and other factors. Racial differences in measured intelligence have been observed, but race is a socially constructed rather than biological variable, so such differences are difficult to interpret.

  8. A vision-based driver nighttime assistance and surveillance system based on intelligent image sensing techniques and a heterogamous dual-core embedded system architecture.

    Science.gov (United States)

    Chen, Yen-Lin; Chiang, Hsin-Han; Chiang, Chuan-Yen; Liu, Chuan-Ming; Yuan, Shyan-Ming; Wang, Jenq-Haur

    2012-01-01

    This study proposes a vision-based intelligent nighttime driver assistance and surveillance system (VIDASS system) implemented by a set of embedded software components and modules, and integrates these modules to accomplish a component-based system framework on an embedded heterogamous dual-core platform. Therefore, this study develops and implements computer vision and sensing techniques of nighttime vehicle detection, collision warning determination, and traffic event recording. The proposed system processes the road-scene frames in front of the host car captured from CCD sensors mounted on the host vehicle. These vision-based sensing and processing technologies are integrated and implemented on an ARM-DSP heterogamous dual-core embedded platform. Peripheral devices, including image grabbing devices, communication modules, and other in-vehicle control devices, are also integrated to form an in-vehicle-embedded vision-based nighttime driver assistance and surveillance system.

  9. Intelligent video surveillance systems

    CERN Document Server

    Dufour, Jean-Yves

    2012-01-01

    Belonging to the wider academic field of computer vision, video analytics has aroused a phenomenal surge of interest since the current millennium. Video analytics is intended to solve the problem of the incapability of exploiting video streams in real time for the purpose of detection or anticipation. It involves analyzing the videos using algorithms that detect and track objects of interest over time and that indicate the presence of events or suspect behavior involving these objects.The aims of this book are to highlight the operational attempts of video analytics, to identify possi

  10. A Mexican Study of Multiple Intelligences for Pre-Service Teachers of English as a Foreign Language

    Directory of Open Access Journals (Sweden)

    Rebeca Elena Tapia Carlín

    2013-10-01

    Full Text Available This article describes a study conducted in a Mexican English teacher education program about multiple intelligences. Seventy-four first year students participated in the study. Findings reveal that the highest kinds of intelligences were the bodily kinesthetic, the interpersonal, the intrapersonal, and the musical; the lowest ones were the naturalist, the existential, the verbal linguistic, the logical mathematical, and the visual spatial. The authors suggest that it is important to diagnose and promote these intelligences in trainees in a systematic way in order to equip them with knowledge and experience of multiple intelligences in order to use them in their future teacher practice.

  11. A Mexican Study of Multiple Intelligences for Pre-Service Teachers of English as a Foreign Language

    Science.gov (United States)

    Tapia Carlín, Rebeca Elena; Castillo Salazar, María del Carmen; Velázquez Cortés, Susana

    2013-01-01

    This article describes a study conducted in a Mexican English teacher education program about multiple intelligences. Seventy-four first year students participated in the study. Findings reveal that the highest kinds of intelligences were the bodily kinesthetic, the interpersonal, the intrapersonal, and the musical; the lowest ones were the…

  12. Energy Logic (EL): a novel fusion engine of multi-modality multi-agent data/information fusion for intelligent surveillance systems

    Science.gov (United States)

    Rababaah, Haroun; Shirkhodaie, Amir

    2009-04-01

    The rapidly advancing hardware technology, smart sensors and sensor networks are advancing environment sensing. One major potential of this technology is Large-Scale Surveillance Systems (LS3) especially for, homeland security, battlefield intelligence, facility guarding and other civilian applications. The efficient and effective deployment of LS3 requires addressing number of aspects impacting the scalability of such systems. The scalability factors are related to: computation and memory utilization efficiency, communication bandwidth utilization, network topology (e.g., centralized, ad-hoc, hierarchical or hybrid), network communication protocol and data routing schemes; and local and global data/information fusion scheme for situational awareness. Although, many models have been proposed to address one aspect or another of these issues but, few have addressed the need for a multi-modality multi-agent data/information fusion that has characteristics satisfying the requirements of current and future intelligent sensors and sensor networks. In this paper, we have presented a novel scalable fusion engine for multi-modality multi-agent information fusion for LS3. The new fusion engine is based on a concept we call: Energy Logic. Experimental results of this work as compared to a Fuzzy logic model strongly supported the validity of the new model and inspired future directions for different levels of fusion and different applications.

  13. Quality control of intelligence research

    International Nuclear Information System (INIS)

    Lu Yan; Xin Pingping; Wu Jian

    2014-01-01

    Quality control of intelligence research is the core issue of intelligence management, is a problem in study of information science This paper focuses on the performance of intelligence to explain the significance of intelligence research quality control. In summing up the results of the study on the basis of the analysis, discusses quality control methods in intelligence research, introduces the experience of foreign intelligence research quality control, proposes some recommendations to improve quality control in intelligence research. (authors)

  14. Multi-modal low cost mobile indoor surveillance system on the Robust Artificial Intelligence-based Defense Electro Robot (RAIDER)

    Science.gov (United States)

    Nair, Binu M.; Diskin, Yakov; Asari, Vijayan K.

    2012-10-01

    We present an autonomous system capable of performing security check routines. The surveillance machine, the Clearpath Husky robotic platform, is equipped with three IP cameras with different orientations for the surveillance tasks of face recognition, human activity recognition, autonomous navigation and 3D reconstruction of its environment. Combining the computer vision algorithms onto a robotic machine has given birth to the Robust Artificial Intelligencebased Defense Electro-Robot (RAIDER). The end purpose of the RAIDER is to conduct a patrolling routine on a single floor of a building several times a day. As the RAIDER travels down the corridors off-line algorithms use two of the RAIDER's side mounted cameras to perform a 3D reconstruction from monocular vision technique that updates a 3D model to the most current state of the indoor environment. Using frames from the front mounted camera, positioned at the human eye level, the system performs face recognition with real time training of unknown subjects. Human activity recognition algorithm will also be implemented in which each detected person is assigned to a set of action classes picked to classify ordinary and harmful student activities in a hallway setting.The system is designed to detect changes and irregularities within an environment as well as familiarize with regular faces and actions to distinguish potentially dangerous behavior. In this paper, we present the various algorithms and their modifications which when implemented on the RAIDER serves the purpose of indoor surveillance.

  15. The relationship between multiple intelligence profiles and reading strategy use of successful English as a Foreign Language (EFL readers

    Directory of Open Access Journals (Sweden)

    Orhan lyitoglu

    2015-05-01

    Full Text Available This study relied on Sheorey and Mokhtari's (2001 metacognitive knowledge about reading strategies,which was influenced by a number of factors, including previous experiences, beliefs, culture-specific instructional practices and proficiency in a second language (L2. This study is thereby built on the premise that EFL readers' metacognitive awareness of reading strategies was also influenced by their multiple intelligence profiles. The purpose of this study is to explore the integrated impact of multiple intelligences and reading strategies on EFL learners' reading performance. This was an explanatory sequential study, combining quantitative and qualitative research design. A convenience sample of 60 high school EFL learners from one of the Anatolian high schools in Istanbul, Turkey participated in this study. Two quantitative surveys and an achievement test, followed by a qualitative observation checklist, were used in this study to collect the data. The results of the study indicated that females were found to be more successful than males in EFL reading in addition to employing more support and problem solving reading strategies. In addition, this study also found that successful readers in EFL seemed to use more global strategies and tended to support reading strategies if they were dominant in musical, intrapersonal intelligences. Moreover, successful musically or verbally intelligent readers were found to use more problem-solving strategies. As a result, this study provides EFL teachers and curriculum designers with valuable information that will foster awareness of the role of these intelligence-strategy relations may play in triggering success in EFL reading, and thus, in their overall proficiency in the language.

  16. Developing Students' Intelligent Character through Linguistic Politeness: The Case of English as a Foreign Language for Indonesian Students

    Science.gov (United States)

    Mariani, Nanik

    2016-01-01

    English is a foreign language that must be taught at school, particularly in secondary school. Based on a preliminary observation of several secondary schools in Banjarmasin, it appears that the English taught focuses most on concepts or language formulas. Most of the students who interact in English during the learning process do not use…

  17. A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System

    Science.gov (United States)

    Kim, Min-Gu; Moon, Hae-Min; Chung, Yongwha; Pan, Sung Bum

    2012-01-01

    Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing. PMID:22919273

  18. A survey and proposed framework on the soft biometrics technique for human identification in intelligent video surveillance system.

    Science.gov (United States)

    Kim, Min-Gu; Moon, Hae-Min; Chung, Yongwha; Pan, Sung Bum

    2012-01-01

    Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing.

  19. A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System

    Directory of Open Access Journals (Sweden)

    Min-Gu Kim

    2012-01-01

    Full Text Available Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing.

  20. A Multi-Resolution Mode CMOS Image Sensor with a Novel Two-Step Single-Slope ADC for Intelligent Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Daehyeok Kim

    2017-06-01

    Full Text Available In this paper, we present a multi-resolution mode CMOS image sensor (CIS for intelligent surveillance system (ISS applications. A low column fixed-pattern noise (CFPN comparator is proposed in 8-bit two-step single-slope analog-to-digital converter (TSSS ADC for the CIS that supports normal, 1/2, 1/4, 1/8, 1/16, 1/32, and 1/64 mode of pixel resolution. We show that the scaled-resolution images enable CIS to reduce total power consumption while images hold steady without events. A prototype sensor of 176 × 144 pixels has been fabricated with a 0.18 μm 1-poly 4-metal CMOS process. The area of 4-shared 4T-active pixel sensor (APS is 4.4 μm × 4.4 μm and the total chip size is 2.35 mm × 2.35 mm. The maximum power consumption is 10 mW (with full resolution with supply voltages of 3.3 V (analog and 1.8 V (digital and 14 frame/s of frame rates.

  1. A Multi-Resolution Mode CMOS Image Sensor with a Novel Two-Step Single-Slope ADC for Intelligent Surveillance Systems.

    Science.gov (United States)

    Kim, Daehyeok; Song, Minkyu; Choe, Byeongseong; Kim, Soo Youn

    2017-06-25

    In this paper, we present a multi-resolution mode CMOS image sensor (CIS) for intelligent surveillance system (ISS) applications. A low column fixed-pattern noise (CFPN) comparator is proposed in 8-bit two-step single-slope analog-to-digital converter (TSSS ADC) for the CIS that supports normal, 1/2, 1/4, 1/8, 1/16, 1/32, and 1/64 mode of pixel resolution. We show that the scaled-resolution images enable CIS to reduce total power consumption while images hold steady without events. A prototype sensor of 176 × 144 pixels has been fabricated with a 0.18 μm 1-poly 4-metal CMOS process. The area of 4-shared 4T-active pixel sensor (APS) is 4.4 μm × 4.4 μm and the total chip size is 2.35 mm × 2.35 mm. The maximum power consumption is 10 mW (with full resolution) with supply voltages of 3.3 V (analog) and 1.8 V (digital) and 14 frame/s of frame rates.

  2. Close ISR Support: Re-organizing the Combined Forces Air Component Commander’s Intelligence, Surveillance and Reconnaissance Processes and Agencies

    Science.gov (United States)

    2009-12-01

    Intelligence IO–Information Operations IOT –In Order To IP–Iraqi Police IPB–Intelligence Preparation of the Battlespace IR–infrared xxiii IROC... forensic backtracking highlighted potential cache sites or improvised explosive device (IED) emplacement areas which could then be better analyzed by the...target indicator (GMTI) forensic backtracking to link suspicious GMTI movements with other intelligence signatures.388 As will be discussed in

  3. Japanese attitudes towards foreign languages.

    Science.gov (United States)

    Abe, Keiko

    2004-01-01

    The purpose of this study is to clarify Japanese attitudes towards foreign languages based on the kinds and changes of TV and radio programs that aired on the Japanese national broadcasting station (NHK) between 1955 and 2000. Foreign language programs are classified into three groups according to their content: 1) cultivation, 2) education, or 3) communication. For Japanese people, foreign languages are the measures of intelligence and intellect. Studying a foreign language is considered a sign of intelligence whether or not it is used for actual communication. The number of foreign language programs has increased tremendously since 1965 in part because the global economy has brought many countries in such close contact. Since 1990, programs for the purpose of communication have increased because of the necessity to communicate with foreign people. Japanese attitudes towards studying foreign languages have been changing gradually from an intellectual purpose to a communication purpose.

  4. Understanding the Globalization of Intelligence

    DEFF Research Database (Denmark)

    Svendsen, Adam David Morgan

    "This book provides an introduction to the complexities of contemporary Western Intelligence and its dynamics during an era of globalization. Towards an understanding of the globalization of intelligence process, Svendsen focuses on the secretive phenomenon of international or foreign intelligence...... cooperation ('liaison'), as it occurs in both theory and practice. Reflecting a complex coexistence plurality of several different and overlapping concepts in action, the challenging process of the globalization of intelligence emerges as essential for complex issue management purposes during a globalized era...

  5. Intelligence in Artificial Intelligence

    OpenAIRE

    Datta, Shoumen Palit Austin

    2016-01-01

    The elusive quest for intelligence in artificial intelligence prompts us to consider that instituting human-level intelligence in systems may be (still) in the realm of utopia. In about a quarter century, we have witnessed the winter of AI (1990) being transformed and transported to the zenith of tabloid fodder about AI (2015). The discussion at hand is about the elements that constitute the canonical idea of intelligence. The delivery of intelligence as a pay-per-use-service, popping out of ...

  6. Foreign Body

    Science.gov (United States)

    ... SearchingPediatrics.com Pediatrics Common Questions, Quick Answers Foreign Body Donna D'Alessandro, M.D. Lindsay Huth, B. ... I call the doctor? What is a foreign body? A foreign body is when an object is ...

  7. The U.S. Intelligence Budget: A Basic Overview

    National Research Council Canada - National Science Library

    Daggett, Stephen

    2004-01-01

    The 9/11 Commission recommended that a new National Intelligence Director (NID) should have control over the personnel and budgets of all agencies that collect and analyze national foreign intelligence to foster more cooperation...

  8. Introduction to surveillance studies

    CERN Document Server

    Petersen, JK

    2012-01-01

    Introduction & OverviewIntroduction Brief History of Surveillance Technologies & TechniquesOptical SurveillanceAerial Surveillance Audio Surveillance Radio-Wave SurveillanceGlobal Positioning Systems Sensors Computers & the Internet Data Cards Biochemical Surveillance Animal Surveillance Biometrics Genetics Practical ConsiderationsPrevalence of Surveillance Effectiveness of Surveillance Freedom & Privacy IssuesConstitutional Freedoms Privacy Safeguards & Intrusions ResourcesReferences Glossary Index

  9. Privacy preserving surveillance and the tracking-paradox

    OpenAIRE

    Greiner, S.; Birnstill, Pascal; Krempel, Erik; Beckert, B.; Beyerer, Jürgen

    2013-01-01

    Increasing capabilities of intelligent video surveillance systems impose new threats to privacy while, at the same time, offering opportunities for reducing the privacy invasiveness of surveillance measures as well as their selectivity. We show that aggregating more data about observed people does not necessarily lead to less privacy, but can increase the selectivity of surveillance measures. In case of video surveillance in a company environment, if we enable the system to authenticate emplo...

  10. Surveillance Culture

    DEFF Research Database (Denmark)

    2017-01-01

    What does it mean to live in a world full of surveillance? In this documentary film, we take a look at everyday life in Denmark and how surveillance technologies and practices influence our norms and social behaviour. Researched and directed by Btihaj Ajana and Anders Albrechtslund....

  11. Intelligible Artificial Intelligence

    OpenAIRE

    Weld, Daniel S.; Bansal, Gagan

    2018-01-01

    Since Artificial Intelligence (AI) software uses techniques like deep lookahead search and stochastic optimization of huge neural networks to fit mammoth datasets, it often results in complex behavior that is difficult for people to understand. Yet organizations are deploying AI algorithms in many mission-critical settings. In order to trust their behavior, we must make it intelligible --- either by using inherently interpretable models or by developing methods for explaining otherwise overwh...

  12. Open source intelligence, open social intelligence and privacy by design

    OpenAIRE

    Casanovas, Pompeu; Royal Melbourne Institute of Technology (Austràlia). Centre for Applied Social Research

    2014-01-01

    Ponència presentada a European Conference on Social Intelligence (ECSI-2014) OSINT stands for Open Source Intelligence, (O)SI for (Open) Social Intelligence, PbD for Privacy by Design. The CAPER project has built an OSINT solution oriented to the prevention of organized crime. How to balance freedom and security? This position paper describes a way to embed the legal and ethical issues raised by the General Data Reform Package (GDRP) in Europe into this kind of surveillance platforms. It f...

  13. Surveillance Pleasures

    DEFF Research Database (Denmark)

    Albrechtslund, Anders

    The notorious intensification and digitalization of surveillance technologies and practices in today’s society has brought about numerous changes. These changes have been widely noticed, described and discussed across many academic disciplines. However, the contexts of entertainment, play...

  14. Customer Surveillance: Consumer Attitudes and Management Strategies

    OpenAIRE

    Plangger, Kirk Anton

    2015-01-01

    Due to technological advances, customer surveillance (i.e., the collection, capture, use, or storage of customers’ personal data) is becoming less expensive and more covert. Brands use these personal data that contain needs, preferences, characteristics, behavior, attitudes, or other customer attributes (i.e., market intelligence) to develop more competitive products and services. Customer surveillance also can put stress on customer relationships with brands, thus brands must conduct custome...

  15. Semantic web technologies for video surveillance metadata

    OpenAIRE

    Poppe, Chris; Martens, Gaëtan; De Potter, Pieterjan; Van de Walle, Rik

    2012-01-01

    Video surveillance systems are growing in size and complexity. Such systems typically consist of integrated modules of different vendors to cope with the increasing demands on network and storage capacity, intelligent video analytics, picture quality, and enhanced visual interfaces. Within a surveillance system, relevant information (like technical details on the video sequences, or analysis results of the monitored environment) is described using metadata standards. However, different module...

  16. Foreign aid

    DEFF Research Database (Denmark)

    Tarp, Finn

    2008-01-01

    Foreign aid has evolved significantly since the Second World War in response to a dramatically changing global political and economic context. This article (a) reviews this process and associated trends in the volume and distribution of foreign aid; (b) reviews the goals, principles...

  17. Foreign aid

    DEFF Research Database (Denmark)

    Tarp, Finn

    2008-01-01

    Foreign aid has evolved significantly since the Second World War in response to a dramatically changing global political and economic context. This article (a) reviews this process and associated trends in the volume and distribution of foreign aid; (b) reviews the goals, principles and instituti......Foreign aid has evolved significantly since the Second World War in response to a dramatically changing global political and economic context. This article (a) reviews this process and associated trends in the volume and distribution of foreign aid; (b) reviews the goals, principles...... and institutions of the aid system; and (c) discusses whether aid has been effective. While much of the original optimism about the impact of foreign aid needed modification, there is solid evidence that aid has indeed helped further growth and poverty reduction...

  18. Artificial intelligence

    CERN Document Server

    Hunt, Earl B

    1975-01-01

    Artificial Intelligence provides information pertinent to the fundamental aspects of artificial intelligence. This book presents the basic mathematical and computational approaches to problems in the artificial intelligence field.Organized into four parts encompassing 16 chapters, this book begins with an overview of the various fields of artificial intelligence. This text then attempts to connect artificial intelligence problems to some of the notions of computability and abstract computing devices. Other chapters consider the general notion of computability, with focus on the interaction bet

  19. Intelligent mechatronics; Intelligent mechatronics

    Energy Technology Data Exchange (ETDEWEB)

    Hashimoto, H. [The University of Tokyo, Tokyo (Japan). Institute of Industrial Science

    1995-10-01

    Intelligent mechatronics (IM) was explained as follows: a study of IM essentially targets realization of a robot namely, but in the present stage the target is a creation of new values by intellectualization of machine, that is, a combination of the information infrastructure and the intelligent machine system. IM is also thought to be constituted of computers positively used and micromechatronics. The paper next introduces examples of IM study, mainly those the author is concerned with as shown below: sensor gloves, robot hands, robot eyes, tele operation, three-dimensional object recognition, mobile robot, magnetic bearing, construction of remote controlled unmanned dam, robot network, sensitivity communication using neuro baby, etc. 27 figs.

  20. Relationship between Emotional Intelligence and

    Directory of Open Access Journals (Sweden)

    Vahid Rafieyan

    2014-07-01

    Full Text Available Language learners’ awareness of target language pragmatic features is influenced by individual difference variables, the least explored one being emotional intelligence. To investigate the relationship between emotional intelligence and pragmatic awareness, the current study was conducted over 120 Iranian senior undergraduates of English as a Foreign Language at a university in Iran. Pragmatic awareness was measured through a 12-scenario contextualized pragmatic judgment task. Emotional intelligence was also measured through the EQ-i. The results of the Pearson correlation revealed a strong positive relationship between emotional intelligence and pragmatic awareness. The pedagogical implications of the findings suggested incorporation of emotion-driven authentic materials in English language classes to invoke emotional intelligence in language learners.

  1. Juvenile technologies in foreign publications

    Directory of Open Access Journals (Sweden)

    Shpagina E.M.

    2012-09-01

    Full Text Available The article provides the review of foreign publications, concerning the juvenile technologies used in France, Canada, Germany and Switzerland. The paper presents legal, social and psychotherapeutic aspects of juvenile judiciary in foreign countries. The authors paid special attention to the complexity of approaches to young children and teenagers who found themselves in complicated life circumstances or got into trouble with the law. The article gives examples of using the following techniques: cognitive-behavioral intervention, mediation, family therapy (including family background and family history, relations theory, narrative practices, utilization of «emotional intelligence» resources.

  2. Present situation and trend of precision guidance technology and its intelligence

    Science.gov (United States)

    Shang, Zhengguo; Liu, Tiandong

    2017-11-01

    This paper first introduces the basic concepts of precision guidance technology and artificial intelligence technology. Then gives a brief introduction of intelligent precision guidance technology, and with the help of development of intelligent weapon based on deep learning project in foreign: LRASM missile project, TRACE project, and BLADE project, this paper gives an overview of the current foreign precision guidance technology. Finally, the future development trend of intelligent precision guidance technology is summarized, mainly concentrated in the multi objectives, intelligent classification, weak target detection and recognition, intelligent between complex environment intelligent jamming and multi-source, multi missile cooperative fighting and other aspects.

  3. Artificial Intelligence and Moral intelligence

    OpenAIRE

    Laura Pana

    2008-01-01

    We discuss the thesis that the implementation of a moral code in the behaviour of artificial intelligent systems needs a specific form of human and artificial intelligence, not just an abstract intelligence. We present intelligence as a system with an internal structure and the structural levels of the moral system, as well as certain characteristics of artificial intelligent agents which can/must be treated as 1- individual entities (with a complex, specialized, autonomous or selfdetermined,...

  4. Foreign Trade

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Foreign Trade database has monthly volume and value information for US imports, exports, and re-exports of fishery or fishery derived products. Data is...

  5. Influenza surveillance

    Directory of Open Access Journals (Sweden)

    Karolina Bednarska

    2016-04-01

    Full Text Available Influenza surveillance was established in 1947. From this moment WHO (World Health Organization has been coordinating international cooperation, with a goal of monitoring influenza virus activity, effective diagnostic of the circulating viruses and informing society about epidemics or pandemics, as well as about emergence of new subtypes of influenza virus type A. Influenza surveillance is an important task, because it enables people to prepare themselves for battle with the virus that is constantly mutating, what leads to circulation of new and often more virulent strains of influenza in human population. As vaccination is the most effective method of fighting the virus, one of the major tasks of GISRS is developing an optimal antigenic composition of the vaccine for the current epidemic season. European Influenza Surveillance Network (EISN has also developed over the years. EISN is running integrated epidemiological and virological influenza surveillance, to provide appropriate data to public health experts in member countries, to enable them undertaking relevant activities based on the current information about influenza activity. In close cooperation with GISRS and EISN are National Influenza Centres - national institutions designated by the Ministry of Health in each country.

  6. Surveillance Angels

    NARCIS (Netherlands)

    Rothkrantz, L.J.M.

    2014-01-01

    The use of sensor networks has been proposed for military surveillance and environmental monitoring applications. Those systems are composed of a heterogeneous set of sensors to observe the environment. In centralised systems the observed data will be conveyed to the control room to process the

  7. Microprocessor-based integrated LMFBR core surveillance

    International Nuclear Information System (INIS)

    Gmeiner, L.

    1984-06-01

    This report results from a joint study of KfK and INTERATOM. The aim of this study is to explore the advantages of microprocessors and microelectronics for a more sophisticated core surveillance, which is based on the integration of separate surveillance techniques. Due to new developments in microelectronics and related software an approach to LMFBR core surveillance can be conceived that combines a number of measurements into a more intelligent decision-making data processing system. The following techniques are considered to contribute essentially to an integrated core surveillance system: - subassembly state and thermal hydraulics performance monitoring, - temperature noise analysis, - acoustic core surveillance, - failure characterization and failure prediction based on DND- and cover gas signals, and - flux tilting techniques. Starting from a description of these techniques it is shown that by combination and correlation of these individual techniques a higher degree of cost-effectiveness, reliability and accuracy can be achieved. (orig./GL) [de

  8. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... Physician Resources Professions Site Index A-Z Foreign Body Retrieval Foreign body retrieval is the removal of ... foreign body detection and removal? What is Foreign Body Retrieval? Foreign body retrieval involves the removal of ...

  9. “Veillant Panoptic Assemblage”: Mutual Watching and Resistance to Mass Surveillance after Snowden

    Directory of Open Access Journals (Sweden)

    Vian Bakir

    2015-10-01

    Full Text Available The Snowden leaks indicate the extent, nature, and means of contemporary mass digital surveillance of citizens by their intelligence agencies and the role of public oversight mechanisms in holding intelligence agencies to account. As such, they form a rich case study on the interactions of “veillance” (mutual watching involving citizens, journalists, intelligence agencies and corporations. While Surveillance Studies, Intelligence Studies and Journalism Studies have little to say on surveillance of citizens’ data by intelligence agencies (and complicit surveillant corporations, they offer insights into the role of citizens and the press in holding power, and specifically the political-intelligence elite, to account. Attention to such public oversight mechanisms facilitates critical interrogation of issues of surveillant power, resistance and intelligence accountability. It directs attention to the veillant panoptic assemblage (an arrangement of profoundly unequal mutual watching, where citizens’ watching of self and others is, through corporate channels of data flow, fed back into state surveillance of citizens. Finally, it enables evaluation of post-Snowden steps taken towards achieving an equiveillant panoptic assemblage (where, alongside state and corporate surveillance of citizens, the intelligence-power elite, to ensure its accountability, faces robust scrutiny and action from wider civil society.

  10. Artificial Intelligence.

    Science.gov (United States)

    Information Technology Quarterly, 1985

    1985-01-01

    This issue of "Information Technology Quarterly" is devoted to the theme of "Artificial Intelligence." It contains two major articles: (1) Artificial Intelligence and Law" (D. Peter O'Neill and George D. Wood); (2) "Artificial Intelligence: A Long and Winding Road" (John J. Simon, Jr.). In addition, it contains two sidebars: (1) "Calculating and…

  11. Competitive Intelligence.

    Science.gov (United States)

    Bergeron, Pierrette; Hiller, Christine A.

    2002-01-01

    Reviews the evolution of competitive intelligence since 1994, including terminology and definitions and analytical techniques. Addresses the issue of ethics; explores how information technology supports the competitive intelligence process; and discusses education and training opportunities for competitive intelligence, including core competencies…

  12. Sonoma Persistent Surveillance System

    Energy Technology Data Exchange (ETDEWEB)

    Pennington, D M

    2006-03-24

    Sonoma offers the first cost-effective, broad-area, high-resolution, real-time motion imagery system for surveillance applications. Sonoma is unique in its ability to provide continuous, real-time video imagery of an area the size of a small city with resolutions sufficient to track 8,000 moving objects in the field of view. At higher resolutions and over smaller areas, Sonoma can even track the movement of individual people. The visual impact of the data available from Sonoma is already causing a paradigm shift in the architecture and operation of other surveillance systems. Sonoma is expected to cost just one-tenth the price of comparably sized sensor systems. Cameras mounted on an airborne platform constantly monitor an area, feeding data to the ground for real-time analysis. Sonoma was designed to provide real-time data for actionable intelligence in situations such as monitoring traffic, special events, border security, and harbors. If a Sonoma system had been available in the aftermath of the Katrina and Rita hurricanes, emergency responders would have had real-time information on roads, water levels, and traffic conditions, perhaps saving many lives.

  13. Air surveillance

    International Nuclear Information System (INIS)

    Patton, G.W.

    1995-01-01

    This section of the 1994 Hanford Site Environmental Report summarizes the air surveillance and monitoring programs currently in operation at that Hanford Site. Atmospheric releases of pollutants from Hanford to the surrounding region are a potential source of human exposure. For that reason, both radioactive and nonradioactive materials in air are monitored at a number of locations. The influence of Hanford emissions on local radionuclide concentrations was evaluated by comparing concentrations measured at distant locations within the region to concentrations measured at the Site perimeter. This section discusses sample collection, analytical methods, and the results of the Hanford air surveillance program. A complete listing of all analytical results summarized in this section is reported separately by Bisping (1995)

  14. Air surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Patton, G.W.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the air surveillance and monitoring programs currently in operation at that Hanford Site. Atmospheric releases of pollutants from Hanford to the surrounding region are a potential source of human exposure. For that reason, both radioactive and nonradioactive materials in air are monitored at a number of locations. The influence of Hanford emissions on local radionuclide concentrations was evaluated by comparing concentrations measured at distant locations within the region to concentrations measured at the Site perimeter. This section discusses sample collection, analytical methods, and the results of the Hanford air surveillance program. A complete listing of all analytical results summarized in this section is reported separately by Bisping (1995).

  15. Rinderpest surveillance

    International Nuclear Information System (INIS)

    2003-01-01

    Rinderpest is probably the most lethal virus disease of cattle and buffalo and can destroy whole populations; damaging economies; undermining food security and ruining the livelihood of farmers and pastoralists. The disease can be eradicated by vaccination and control of livestock movement. The Department of Technical Co-operation is sponsoring a programme, with technical support from the Joint FAO/IAEA Division to provide advice, training and materials to thirteen states through the 'Support for Rinderpest Surveillance in West Asia' project. (IAEA)

  16. Health surveillance

    International Nuclear Information System (INIS)

    1981-01-01

    The Code includes a number of requirements for the health surveillance of employees associated with the mining and milling of radioactive ores. This guideline is particularly directed at determining the level of fitness of employees and prospective employees, detecting any symptom which might contraindicate exposure to the environment encountered in mine/mill situations, examination of any employee who may have been exposed to radiation in excess of defined limits and the accumulation and provision of data on the health of employees

  17. Foreign correspondence

    CERN Document Server

    Hamilton, John Maxwell

    2013-01-01

    Despite the importance of foreign news, its history, transformation and indeed its future have not been much studied. The scholarly community often calls attention to journalism's shortcomings covering the world, yet the topic has not been systematically examined across countries or over time. The need to redress this neglect and the desire to assess the impact of new media technologies on the future of journalism - including foreign correspondence - provide the motivation for this stimulating, exciting and thought-provoking book. While the old economic models supporting news have crumbled in

  18. Intelligence Ethics:

    DEFF Research Database (Denmark)

    Rønn, Kira Vrist

    2016-01-01

    Questions concerning what constitutes a morally justified conduct of intelligence activities have received increased attention in recent decades. However, intelligence ethics is not yet homogeneous or embedded as a solid research field. The aim of this article is to sketch the state of the art...... of intelligence ethics and point out subjects for further scrutiny in future research. The review clusters the literature on intelligence ethics into two groups: respectively, contributions on external topics (i.e., the accountability of and the public trust in intelligence agencies) and internal topics (i.......e., the search for an ideal ethical framework for intelligence actions). The article concludes that there are many holes to fill for future studies on intelligence ethics both in external and internal discussions. Thus, the article is an invitation – especially, to moral philosophers and political theorists...

  19. Intelligence Naturelle et Intelligence Artificielle

    OpenAIRE

    Dubois, Daniel

    2011-01-01

    Cet article présente une approche systémique du concept d’intelligence naturelle en ayant pour objectif de créer une intelligence artificielle. Ainsi, l’intelligence naturelle, humaine et animale non-humaine, est une fonction composée de facultés permettant de connaître et de comprendre. De plus, l'intelligence naturelle reste indissociable de la structure, à savoir les organes du cerveau et du corps. La tentation est grande de doter les systèmes informatiques d’une intelligence artificielle ...

  20. Nutritional surveillance.

    Science.gov (United States)

    Mason, J B; Mitchell, J T

    1983-01-01

    The concept of nutritional surveillance is derived from disease surveillance, and means "to watch over nutrition, in order to make decisions that lead to improvements in nutrition in populations". Three distinct objectives have been defined for surveillance systems, primarily in relation to problems of malnutrition in developing countries: to aid long-term planning in health and development; to provide input for programme management and evaluation; and to give timely warning of the need for intervention to prevent critical deteriorations in food consumption. Decisions affecting nutrition are made at various administrative levels, and the uses of different types of nutritional surveillance information can be related to national policies, development programmes, public health and nutrition programmes, and timely warning and intervention programmes. The information should answer specific questions, for example concerning the nutritional status and trends of particular population groups.Defining the uses and users of the information is the first essential step in designing a system; this is illustrated with reference to agricultural and rural development planning, the health sector, and nutrition and social welfare programmes. The most usual data outputs are nutritional outcome indicators (e.g., prevalence of malnutrition among preschool children), disaggregated by descriptive or classifying variables, of which the commonest is simply administrative area. Often, additional "status" indicators, such as quality of housing or water supply, are presented at the same time. On the other hand, timely warning requires earlier indicators of the possibility of nutritional deterioration, and agricultural indicators are often the most appropriate.DATA COME FROM TWO MAIN TYPES OF SOURCE: administrative (e.g., clinics and schools) and household sample surveys. Each source has its own advantages and disadvantages: for example, administrative data often already exist, and can be

  1. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... percent of foreign body ingestions occur among children. Most foreign bodies pass through the gastrointestinal tract without ... fainting and shock. Foreign bodies in the airway: Most foreign bodies in the airway are usually expelled ...

  2. Fusing Intelligence With Law Enforcement Information: An Analytic Imperative

    National Research Council Canada - National Science Library

    Thornlow, Christopher C

    2005-01-01

    ... and Law Enforcement Communities to fuse and analyze foreign threat intelligence with domestic law enforcement information in a timely fashion to provide adequate indications and warning of such an...

  3. Surveillance and Critical Theory

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2015-09-01

    Full Text Available In this comment, the author reflects on surveillance from a critical theory approach, his involvement in surveillance research and projects, and the status of the study of surveillance. The comment ascertains a lack of critical thinking about surveillance, questions the existence of something called “surveillance studies” as opposed to a critical theory of society, and reflects on issues such as Edward Snowden’s revelations, and Foucault and Marx in the context of surveillance.

  4. Comparison of Selective Attention and Intelligence Profile in Bilingual and Monolingual Adolescents

    Directory of Open Access Journals (Sweden)

    Rahim Yousefi

    2018-01-01

    Conclusion Learning a foreign language (e.g. English may be an effective factor in selective attention and intelligence profile of adolescents. Therefore, the role of learning a foreign language should be considered in selective attention and intelligence profile of adolescents.

  5. Terrorist Surveillance Act of 2006. S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act of 2006

    National Research Council Canada - National Science Library

    Bazan, Elizabeth B

    2006-01-01

    ...., to address electronic surveillance programs. In addition, the measures would amend other provisions of FISA dealing with electronic surveillance without a warrant pursuant to an Attorney General certification, applications for a Foreign...

  6. Artificial Intelligence.

    Science.gov (United States)

    Wash, Darrel Patrick

    1989-01-01

    Making a machine seem intelligent is not easy. As a consequence, demand has been rising for computer professionals skilled in artificial intelligence and is likely to continue to go up. These workers develop expert systems and solve the mysteries of machine vision, natural language processing, and neural networks. (Editor)

  7. Intelligent Design

    DEFF Research Database (Denmark)

    Hjorth, Poul G.

    2005-01-01

    Forestillingen om at naturen er designet af en guddommelig 'intelligens' er et smukt filosofisk princip. Teorier om Intelligent Design som en naturvidenskabeligt baseret teori er derimod helt forfærdelig.......Forestillingen om at naturen er designet af en guddommelig 'intelligens' er et smukt filosofisk princip. Teorier om Intelligent Design som en naturvidenskabeligt baseret teori er derimod helt forfærdelig....

  8. Smart sensing surveillance system

    Science.gov (United States)

    Hsu, Charles; Chu, Kai-Dee; O'Looney, James; Blake, Michael; Rutar, Colleen

    2010-04-01

    An effective public safety sensor system for heavily-populated applications requires sophisticated and geographically-distributed infrastructures, centralized supervision, and deployment of large-scale security and surveillance networks. Artificial intelligence in sensor systems is a critical design to raise awareness levels, improve the performance of the system and adapt to a changing scenario and environment. In this paper, a highly-distributed, fault-tolerant, and energy-efficient Smart Sensing Surveillance System (S4) is presented to efficiently provide a 24/7 and all weather security operation in crowded environments or restricted areas. Technically, the S4 consists of a number of distributed sensor nodes integrated with specific passive sensors to rapidly collect, process, and disseminate heterogeneous sensor data from near omni-directions. These distributed sensor nodes can cooperatively work to send immediate security information when new objects appear. When the new objects are detected, the S4 will smartly select the available node with a Pan- Tilt- Zoom- (PTZ) Electro-Optics EO/IR camera to track the objects and capture associated imagery. The S4 provides applicable advanced on-board digital image processing capabilities to detect and track the specific objects. The imaging detection operations include unattended object detection, human feature and behavior detection, and configurable alert triggers, etc. Other imaging processes can be updated to meet specific requirements and operations. In the S4, all the sensor nodes are connected with a robust, reconfigurable, LPI/LPD (Low Probability of Intercept/ Low Probability of Detect) wireless mesh network using Ultra-wide band (UWB) RF technology. This UWB RF technology can provide an ad-hoc, secure mesh network and capability to relay network information, communicate and pass situational awareness and messages. The Service Oriented Architecture of S4 enables remote applications to interact with the S4

  9. Are Women More Emotionally Skilled When It Comes to Expression of Emotions in the Foreign Language? Gender, Emotional Intelligence and Personality Traits in Relation to Emotional Expression in the L2

    Science.gov (United States)

    Ozanska-Ponikwia, Katarzyna

    2017-01-01

    The present study investigates the link between gender, emotional intelligence (EI), personality traits and self-reported emotional expression in the second language (L2). Data analysis suggests that gender might not influence self-perceived emotional expression in the L2, as the results of the t-test show that both males and females declare…

  10. Who is Surveilling Whom?

    DEFF Research Database (Denmark)

    Mortensen, Mette

    2014-01-01

    This article concerns the particular form of counter-surveillance termed “sousveillance”, which aims to turn surveillance at the institutions responsible for surveillance. Drawing on the theoretical perspectives “mediatization” and “aerial surveillance,” the article studies WikiLeaks’ publication...

  11. A review of zoonotic disease surveillance supported by the Armed Forces Health Surveillance Center.

    Science.gov (United States)

    Burke, R L; Kronmann, K C; Daniels, C C; Meyers, M; Byarugaba, D K; Dueger, E; Klein, T A; Evans, B P; Vest, K G

    2012-05-01

    The Armed Forces Health Surveillance Center (AFHSC), Division of Global Emerging Infections Surveillance and Response System conducts disease surveillance through a global network of US Department of Defense research laboratories and partnerships with foreign ministries of agriculture, health and livestock development in over 90 countries worldwide. In 2010, AFHSC supported zoonosis survey efforts were organized into four main categories: (i) development of field assays for animal disease surveillance during deployments and in resource limited environments, (ii) determining zoonotic disease prevalence in high-contact species which may serve as important reservoirs of diseases and sources of transmission, (iii) surveillance in high-risk human populations which are more likely to become exposed and subsequently infected with zoonotic pathogens and (iv) surveillance at the human-animal interface examining zoonotic disease prevalence and transmission within and between human and animal populations. These efforts have aided in the detection, identification and quantification of the burden of zoonotic diseases such as anthrax, brucellosis, Crimean Congo haemorrhagic fever, dengue fever, Hantaan virus, influenza, Lassa fever, leptospirosis, melioidosis, Q fever, Rift Valley fever, sandfly fever Sicilian virus, sandfly fever Naples virus, tuberculosis and West Nile virus, which are of military and public health importance. Future zoonotic surveillance efforts will seek to develop local capacity for zoonotic surveillance focusing on high risk populations at the human-animal interface. © 2011 Blackwell Verlag GmbH.

  12. Intelligent playgrounds

    DEFF Research Database (Denmark)

    Larsen, Lasse Juel

    2009-01-01

    This paper examines play, gaming and learning in regard to intelligent playware developed for outdoor use. The key questions are how does these novel artefacts influence the concept of play, gaming and learning. Up until now play and game have been understood as different activities. This paper...... examines if the sharp differentiation between the two can be uphold in regard to intelligent playware for outdoor use. Play and game activities will be analysed and viewed in conjunction with learning contexts. This paper will stipulate that intelligent playware facilitates rapid shifts in contexts...

  13. Artificial intelligence

    CERN Document Server

    Ennals, J R

    1987-01-01

    Artificial Intelligence: State of the Art Report is a two-part report consisting of the invited papers and the analysis. The editor first gives an introduction to the invited papers before presenting each paper and the analysis, and then concludes with the list of references related to the study. The invited papers explore the various aspects of artificial intelligence. The analysis part assesses the major advances in artificial intelligence and provides a balanced analysis of the state of the art in this field. The Bibliography compiles the most important published material on the subject of

  14. Artificial Intelligence

    CERN Document Server

    Warwick, Kevin

    2011-01-01

    if AI is outside your field, or you know something of the subject and would like to know more then Artificial Intelligence: The Basics is a brilliant primer.' - Nick Smith, Engineering and Technology Magazine November 2011 Artificial Intelligence: The Basics is a concise and cutting-edge introduction to the fast moving world of AI. The author Kevin Warwick, a pioneer in the field, examines issues of what it means to be man or machine and looks at advances in robotics which have blurred the boundaries. Topics covered include: how intelligence can be defined whether machines can 'think' sensory

  15. CONSTITUTIONALITY AND LEGALITY OF NSA SURVEILLANCE PROGRAM

    Science.gov (United States)

    2013-12-01

    Committee Headquarters in what would eventually culminate as the Watergate Scandal . While the far reaching consequences of the Watergate scandal are...the Church Committee that investigated the Watergate Scandal , recommended the FBI be limited to only investigating “conduct rather than ideas or...TSP wiretapping scandal , the Bush Administration instead attempted to codify into law greater surveillance powers for intelligence agencies. When TSP

  16. Mobile Surveillance and Monitoring Robots

    International Nuclear Information System (INIS)

    Kimberly, Howard R.; Shipers, Larry R.

    1999-01-01

    Long-term nuclear material storage will require in-vault data verification, sensor testing, error and alarm response, inventory, and maintenance operations. System concept development efforts for a comprehensive nuclear material management system have identified the use of a small flexible mobile automation platform to perform these surveillance and maintenance operations. In order to have near-term wide-range application in the Complex, a mobile surveillance system must be small, flexible, and adaptable enough to allow retrofit into existing special nuclear material facilities. The objective of the Mobile Surveillance and Monitoring Robot project is to satisfy these needs by development of a human scale mobile robot to monitor the state of health, physical security and safety of items in storage and process; recognize and respond to alarms, threats, and off-normal operating conditions; and perform material handling and maintenance operations. The system will integrate a tool kit of onboard sensors and monitors, maintenance equipment and capability, and SNL developed non-lethal threat response technology with the intelligence to identify threats and develop and implement first response strategies for abnormal signals and alarm conditions. System versatility will be enhanced by incorporating a robot arm, vision and force sensing, robust obstacle avoidance, and appropriate monitoring and sensing equipment

  17. Intelligent Advertising

    OpenAIRE

    Díaz Pinedo, Edilfredo Eliot

    2012-01-01

    Intelligent Advertisement diseña e implementa un sistema de publicidad para dispositivos móviles en un centro comercial, donde los clientes reciben publicidad de forma pasiva en sus dispositivos mientras están dentro.

  18. Event detection for car park entries by video-surveillance

    Science.gov (United States)

    Coquin, Didier; Tailland, Johan; Cintract, Michel

    2007-10-01

    Intelligent surveillance has become an important research issue due to the high cost and low efficiency of human supervisors, and machine intelligence is required to provide a solution for automated event detection. In this paper we describe a real-time system that has been used for detecting car park entries, using an adaptive background learning algorithm and two indicators representing activity and identity to overcome the difficulty of tracking objects.

  19. BUSINESS INTELLIGENCE

    OpenAIRE

    Bogdan Mohor Dumitrita

    2011-01-01

    The purpose of this work is to present business intelligence systems. These systems can be extremely complex and important in modern market competition. Its effectiveness also reflects in price, so we have to exlore their financial potential before investment. The systems have 20 years long history and during that time many of such tools have been developed, but they are rarely still in use. Business intelligence system consists of three main areas: Data Warehouse, ETL tools and tools f...

  20. Intelligent indexing

    International Nuclear Information System (INIS)

    Farkas, J.

    1992-01-01

    In this paper we discuss the relevance of artificial intelligence to the automatic indexing of natural language text. We describe the use of domain-specific semantically-based thesauruses and address the problem of creating adequate knowledge bases for intelligent indexing systems. We also discuss the relevance of the Hilbert space ι 2 to the compact representation of documents and to the definition of the similarity of natural language texts. (author). 17 refs., 2 figs

  1. Intelligent indexing

    Energy Technology Data Exchange (ETDEWEB)

    Farkas, J

    1993-12-31

    In this paper we discuss the relevance of artificial intelligence to the automatic indexing of natural language text. We describe the use of domain-specific semantically-based thesauruses and address the problem of creating adequate knowledge bases for intelligent indexing systems. We also discuss the relevance of the Hilbert space {iota}{sup 2} to the compact representation of documents and to the definition of the similarity of natural language texts. (author). 17 refs., 2 figs.

  2. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... top of page What are the benefits vs. risks? Benefits Removal of a foreign body will reduce ... good tool for guiding foreign body removal procedures. Risks While foreign body removal procedures are safe and ...

  3. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... 80 percent of foreign body ingestions occur among children. Most foreign bodies pass through the gastrointestinal tract ... blockages that may require surgical removal of magnets. Children account for about 80 percent of foreign body ...

  4. Ideology, Critique and Surveillance

    Directory of Open Access Journals (Sweden)

    Heidi Herzogenrath-Amelung

    2013-11-01

    Full Text Available The 2013 revelations concerning global surveillance programmes demonstrate in unprecedented clarity the need for Critical Theory of information and communication technologies (ICTs to address the mechanisms and implications of increasingly global, ubiquitous surveillance. This is all the more urgent because of the dominance of the “surveillance ideology” (the promise of security through surveillance that supports the political economy of surveillance. This paper asks which theoretical arguments and concepts can be useful for philosophically grounding a critique of this surveillance ideology. It begins by examining how the surveillance ideology works through language and introduces the concept of the ‘ideological packaging’ of ICTs to show how rhetoric surrounding the implementation of surveillance technologies reinforces the surveillance ideology. It then raises the problem of how ideology-critique can work if it relies on language itself and argues that Martin Heidegger’s philosophy can make a useful contribution to existing critical approaches to language.

  5. Foreign Relations.

    Science.gov (United States)

    De La Hoz, Alejandro; Díaz, Eduardo; Feinstein, Max Moses

    2017-05-01

    In a large Colombian teaching hospital, a fifty-five-year-old woman complaining of stomach pain is examined by a foreign-exchange medical student from the United States. Speaking in Spanish, the student elicits a medical history that suggests a possible recurrence of gallstones, but nothing further. Upon discussing the patient's case in private with the attending physician, the student is shocked to learn that the patient is suffering from terminal, metastatic gastric cancer but is unaware of her diagnosis. The attending physician explains that the patient's husband instructed the health care providers not to tell the patient what her diagnosis is. The medical student feels uncomfortable withholding the diagnosis from the patient. The thought of disclosure feels equally uncomfortable, however, as it would mean contradicting the instructions of the attending physician at the host hospital as well as violating what the student suspects, but is not sure, may be acceptable medical practice in Colombia. How should the medical student proceed? © 2017 The Hastings Center.

  6. Foreign Energy Company Competitiveness: Background information

    Energy Technology Data Exchange (ETDEWEB)

    Weimar, M.R.; Freund, K.A.; Roop, J.M.

    1994-10-01

    This report provides background information to the report Energy Company Competitiveness: Little to Do With Subsidies (DOE 1994). The main body of this publication consists of data uncovered during the course of research on this DOE report. This data pertains to major government energy policies in each country studied. This report also provides a summary of the DOE report. In October 1993, the Office of Energy Intelligence, US Department of Energy (formerly the Office of Foreign Intelligence), requested that Pacific Northwest Laboratory prepare a report addressing policies and actions used by foreign governments to enhance the competitiveness of their energy firms. Pacific Northwest Laboratory prepared the report Energy Company Competitiveness Little to Do With Subsidies (DOE 1994), which provided the analysis requested by DOE. An appendix was also prepared, which provided extensive background documentation to the analysis. Because of the length of the appendix, Pacific Northwest Laboratory decided to publish this information separately, as contained in this report.

  7. Intelligent systems

    CERN Document Server

    Irwin, J David

    2011-01-01

    Technology has now progressed to the point that intelligent systems are replacing humans in the decision making processes as well as aiding in the solution of very complex problems. In many cases intelligent systems are already outperforming human activities. Artificial neural networks are not only capable of learning how to classify patterns, such images or sequence of events, but they can also effectively model complex nonlinear systems. Their ability to classify sequences of events is probably more popular in industrial applications where there is an inherent need to model nonlinear system

  8. Intelligent Universe

    Energy Technology Data Exchange (ETDEWEB)

    Hoyle, F

    1983-01-01

    The subject is covered in chapters, entitled: chance and the universe (synthesis of proteins; the primordial soup); the gospel according to Darwin (discussion of Darwin theory of evolution); life did not originate on earth (fossils from space; life in space); the interstellar connection (living dust between the stars; bacteria in space falling to the earth; interplanetary dust); evolution by cosmic control (microorganisms; genetics); why aren't the others here (a cosmic origin of life); after the big bang (big bang and steady state); the information rich universe; what is intelligence up to; the intelligent universe.

  9. Artificial intelligence

    International Nuclear Information System (INIS)

    Perret-Galix, D.

    1992-01-01

    A vivid example of the growing need for frontier physics experiments to make use of frontier technology is in the field of artificial intelligence and related themes. This was reflected in the second international workshop on 'Software Engineering, Artificial Intelligence and Expert Systems in High Energy and Nuclear Physics' which took place from 13-18 January at France Telecom's Agelonde site at La Londe des Maures, Provence. It was the second in a series, the first having been held at Lyon in 1990

  10. A Multimedia-Based System for Foreign Language Listening and Reading Comprehension

    National Research Council Canada - National Science Library

    Lichtblau, Dale

    1999-01-01

    .... It describes how integrating existing and proven multimedia and artificial intelligence technology, and the World Wide Web may provide an innovative and effective approach to foreign language learning in DoD...

  11. FOREIGN LANGUAGES: Human Capital Approach Needed to Correct Staffing and Proficiency Shortfalls

    National Research Council Canada - National Science Library

    2002-01-01

    Although more than 70 federal agencies have foreign language needs, some of the largest programs are concentrated in the Army, the State Department, the Central Intelligence Agency, and the Federal...

  12. FOREIGN LANGUAGES: Human Capital Approach Needed to Correct Staffing and Proficiency Shortfalls

    National Research Council Canada - National Science Library

    2002-01-01

    .... The government also employs tens of thousands of individuals who use foreign language skills in positions such as cryptologic linguists, human intelligence collectors,4 FBI special agents and legal...

  13. Artificial Intelligence and Moral intelligence

    Directory of Open Access Journals (Sweden)

    Laura Pana

    2008-07-01

    Full Text Available We discuss the thesis that the implementation of a moral code in the behaviour of artificial intelligent systems needs a specific form of human and artificial intelligence, not just an abstract intelligence. We present intelligence as a system with an internal structure and the structural levels of the moral system, as well as certain characteristics of artificial intelligent agents which can/must be treated as 1- individual entities (with a complex, specialized, autonomous or selfdetermined, even unpredictable conduct, 2- entities endowed with diverse or even multiple intelligence forms, like moral intelligence, 3- open and, even, free-conduct performing systems (with specific, flexible and heuristic mechanisms and procedures of decision, 4 – systems which are open to education, not just to instruction, 5- entities with “lifegraphy”, not just “stategraphy”, 6- equipped not just with automatisms but with beliefs (cognitive and affective complexes, 7- capable even of reflection (“moral life” is a form of spiritual, not just of conscious activity, 8 – elements/members of some real (corporal or virtual community, 9 – cultural beings: free conduct gives cultural value to the action of a ”natural” or artificial being. Implementation of such characteristics does not necessarily suppose efforts to design, construct and educate machines like human beings. The human moral code is irremediably imperfect: it is a morality of preference, of accountability (not of responsibility and a morality of non-liberty, which cannot be remedied by the invention of ethical systems, by the circulation of ideal values and by ethical (even computing education. But such an imperfect morality needs perfect instruments for its implementation: applications of special logic fields; efficient psychological (theoretical and technical attainments to endow the machine not just with intelligence, but with conscience and even spirit; comprehensive technical

  14. Effective teaming of airborne and ground assets for surveillance and interdiction

    OpenAIRE

    Muratore, Mark J.

    2010-01-01

    Approved for public release; distribution is unlimited As Unmanned Aerial Vehicles (UAVs) become more prevalent on the battlefield, ground forces will have to increasingly rely on them for intelligence, surveillance, and reconnaissance (ISR), as well as target marking, and overwatch operations. The Situational Awareness for Surveillance and Interdiction Operations (SASIO) simulation analysis tool uses Design of Experiments (DOX) to study of aspects of UAV surveillance characteristics in co...

  15. SOA-surveillance Nederland

    NARCIS (Netherlands)

    Rijlaarsdam J; Bosman A; Laar MJW van de; CIE

    2000-01-01

    In May 1999 a working group was started to evaluate the current surveillance systems for sexually transmitted diseases (STD) and to make suggestions for a renewed effective and efficient STD surveillance system in the Netherlands. The surveillance system has to provide insight into the prevalence

  16. Containment and surveillance devices

    International Nuclear Information System (INIS)

    Campbell, J.W.; Johnson, C.S.; Stieff, L.R.

    The growing acceptance of containment and surveillance as a means to increase safeguards effectiveness has provided impetus to the development of improved surveillance and containment devices. Five recently developed devices are described. The devices include one photographic and two television surveillance systems and two high security seals that can be verified while installed

  17. Intelligent Model for Video Survillance Security System

    Directory of Open Access Journals (Sweden)

    J. Vidhya

    2013-12-01

    Full Text Available Video surveillance system senses and trails out all the threatening issues in the real time environment. It prevents from security threats with the help of visual devices which gather the information related to videos like CCTV’S and IP (Internet Protocol cameras. Video surveillance system has become a key for addressing problems in the public security. They are mostly deployed on the IP based network. So, all the possible security threats exist in the IP based application might also be the threats available for the reliable application which is available for video surveillance. In result, it may increase cybercrime, illegal video access, mishandling videos and so on. Hence, in this paper an intelligent model is used to propose security for video surveillance system which ensures safety and it provides secured access on video.

  18. Participatory Disease Surveillance in the Detection of Trans ...

    African Journals Online (AJOL)

    This paper reports the detection of trans-boundary animal diseases using participatory disease surveillance in Borno State. Participatory epidemiology is an emerging field that is based on the use of participatory techniques for harvesting qualitative epidemiological intelligence contained within community observations, ...

  19. Plant intelligence

    Science.gov (United States)

    Lipavská, Helena; Žárský, Viktor

    2009-01-01

    The concept of plant intelligence, as proposed by Anthony Trewavas, has raised considerable discussion. However, plant intelligence remains loosely defined; often it is either perceived as practically synonymous to Darwinian fitness, or reduced to a mere decorative metaphor. A more strict view can be taken, emphasizing necessary prerequisites such as memory and learning, which requires clarifying the definition of memory itself. To qualify as memories, traces of past events have to be not only stored, but also actively accessed. We propose a criterion for eliminating false candidates of possible plant intelligence phenomena in this stricter sense: an “intelligent” behavior must involve a component that can be approximated by a plausible algorithmic model involving recourse to stored information about past states of the individual or its environment. Re-evaluation of previously presented examples of plant intelligence shows that only some of them pass our test. “You were hurt?” Kumiko said, looking at the scar. Sally looked down. “Yeah.” “Why didn't you have it removed?” “Sometimes it's good to remember.” “Being hurt?” “Being stupid.”—(W. Gibson: Mona Lisa Overdrive) PMID:19816094

  20. Speech Intelligibility

    Science.gov (United States)

    Brand, Thomas

    Speech intelligibility (SI) is important for different fields of research, engineering and diagnostics in order to quantify very different phenomena like the quality of recordings, communication and playback devices, the reverberation of auditoria, characteristics of hearing impairment, benefit using hearing aids or combinations of these things.

  1. Video Analytics for Business Intelligence

    CERN Document Server

    Porikli, Fatih; Xiang, Tao; Gong, Shaogang

    2012-01-01

    Closed Circuit TeleVision (CCTV) cameras have been increasingly deployed pervasively in public spaces including retail centres and shopping malls. Intelligent video analytics aims to automatically analyze content of massive amount of public space video data and has been one of the most active areas of computer vision research in the last two decades. Current focus of video analytics research has been largely on detecting alarm events and abnormal behaviours for public safety and security applications. However, increasingly CCTV installations have also been exploited for gathering and analyzing business intelligence information, in order to enhance marketing and operational efficiency. For example, in retail environments, surveillance cameras can be utilised to collect statistical information about shopping behaviour and preference for marketing (e.g., how many people entered a shop; how many females/males or which age groups of people showed interests to a particular product; how long did they stay in the sho...

  2. Narrative intelligence and pedagogical success in english

    Directory of Open Access Journals (Sweden)

    Pishghadam, Reza

    2011-01-01

    Full Text Available The present study intends to investigate the relationship between English as a Foreign Language (EFL teachers’ narrative intelligence and their pedagogical success. Eighty EFL teachers along with 673 EFL learners participated in this study. Narrative Intelligence Scale (NIS and the Characteristics of the Successful Teachers Questionnaire (CSTQ were utilized to gather data in this study. The results revealed that there exists a significant association between EFL teachers’ pedagogical success and their narrative intelligence. Moreover, Genre-ation, among the subscales of narrative intelligence, was found to be the best predictor of teacher success. Finally, the results were discussed and pedagogical implications were provided in the context of language learning and teaching

  3. Computational intelligence in nuclear engineering

    International Nuclear Information System (INIS)

    Uhrig, Robert E.; Hines, J. Wesley

    2005-01-01

    Approaches to several recent issues in the operation of nuclear power plants using computational intelligence are discussed. These issues include 1) noise analysis techniques, 2) on-line monitoring and sensor validation, 3) regularization of ill-posed surveillance and diagnostic measurements, 4) transient identification, 5) artificial intelligence-based core monitoring and diagnostic system, 6) continuous efficiency improvement of nuclear power plants, and 7) autonomous anticipatory control and intelligent-agents. Several Changes to the focus of Computational Intelligence in Nuclear Engineering have occurred in the past few years. With earlier activities focusing on the development of condition monitoring and diagnostic techniques for current nuclear power plants, recent activities have focused on the implementation of those methods and the development of methods for next generation plants and space reactors. These advanced techniques are expected to become increasingly important as current generation nuclear power plants have their licenses extended to 60 years and next generation reactors are being designed to operate for extended fuel cycles (up to 25 years), with less operator oversight, and especially for nuclear plants operating in severe environments such as space or ice-bound locations

  4. Video surveillance using distance maps

    Science.gov (United States)

    Schouten, Theo E.; Kuppens, Harco C.; van den Broek, Egon L.

    2006-02-01

    Human vigilance is limited; hence, automatic motion and distance detection is one of the central issues in video surveillance. Hereby, many aspects are of importance, this paper specially addresses: efficiency, achieving real-time performance, accuracy, and robustness against various noise factors. To obtain fully controlled test environments, an artificial development center for robot navigation is introduced in which several parameters can be set (e.g., number of objects, trajectories and type and amount of noise). In the videos, for each following frame, movement of stationary objects is detected and pixels of moving objects are located from which moving objects are identified in a robust way. An Exact Euclidean Distance Map (E2DM) is utilized to determine accurately the distances between moving and stationary objects. Together with the determined distances between moving objects and the detected movement of stationary objects, this provides the input for detecting unwanted situations in the scene. Further, each intelligent object (e.g., a robot), is provided with its E2DM, allowing the object to plan its course of action. Timing results are specified for each program block of the processing chain for 20 different setups. So, the current paper presents extensive, experimentally controlled research on real-time, accurate, and robust motion detection for video surveillance, using E2DMs, which makes it a unique approach.

  5. The Real Rebalancing: American Diplomacy and the Tragedy of President Obama’s Foreign Policy

    Science.gov (United States)

    2015-10-01

    engagement” to its list of warfight- ing functions, along with mission command, move- ment and maneuver, intelligence , fires, sustainment, and protection...technologies, and foreign intelligence collection. Even earlier, see National Security Strategy, Washington, DC: The White House, August 1991, p. 8... Malnutrition , illiteracy and poverty put dangerous pressures on democratic institutions as hungry, uneducated or poorly 33 housed citizens are ripe for

  6. Artificial Intelligence.

    Science.gov (United States)

    Lawrence, David R; Palacios-González, César; Harris, John

    2016-04-01

    It seems natural to think that the same prudential and ethical reasons for mutual respect and tolerance that one has vis-à-vis other human persons would hold toward newly encountered paradigmatic but nonhuman biological persons. One also tends to think that they would have similar reasons for treating we humans as creatures that count morally in our own right. This line of thought transcends biological boundaries-namely, with regard to artificially (super)intelligent persons-but is this a safe assumption? The issue concerns ultimate moral significance: the significance possessed by human persons, persons from other planets, and hypothetical nonorganic persons in the form of artificial intelligence (AI). This article investigates why our possible relations to AI persons could be more complicated than they first might appear, given that they might possess a radically different nature to us, to the point that civilized or peaceful coexistence in a determinate geographical space could be impossible to achieve.

  7. Intelligent Tutor

    Science.gov (United States)

    1990-01-01

    NASA also seeks to advance American education by employing the technology utilization process to develop a computerized, artificial intelligence-based Intelligent Tutoring System (ITS) to help high school and college physics students. The tutoring system is designed for use with the lecture and laboratory portions of a typical physics instructional program. Its importance lies in its ability to observe continually as a student develops problem solutions and to intervene when appropriate with assistance specifically directed at the student's difficulty and tailored to his skill level and learning style. ITS originated as a project of the Johnson Space Center (JSC). It is being developed by JSC's Software Technology Branch in cooperation with Dr. R. Bowen Loftin at the University of Houston-Downtown. Program is jointly sponsored by NASA and ACOT (Apple Classrooms of Tomorrow). Other organizations providing support include Texas Higher Education Coordinating Board, the National Research Council, Pennzoil Products Company and the George R. Brown Foundation. The Physics I class of Clear Creek High School, League City, Texas are providing the classroom environment for test and evaluation of the system. The ITS is a spinoff product developed earlier to integrate artificial intelligence into training/tutoring systems for NASA astronauts flight controllers and engineers.

  8. ForeignAssistance.gov

    Data.gov (United States)

    US Agency for International Development — ForeignAssistance.gov provides a view of U.S. Government foreign assistance funds across agencies and enables users to explore, analyze, and review aid investments...

  9. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... the body. When your physician suspects that a blunt foreign body is stuck in the esophagus, you ... tract. Other drugs taken by mouth can help blunt foreign objects pass through the digestive tract by ...

  10. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... foreign objects that have been ingested through the mouth or airway or introduced into the soft tissues. ... through the digestive tract. Other drugs taken by mouth can help blunt foreign objects pass through the ...

  11. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... can leak into the bowel and cause mercury poisoning. Magnetic toys can obstruct the bowel when they ... soft tissue foreign body, contact your physician immediately. Treatment will depend on the type of foreign body ...

  12. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... tissues. top of page What are some common uses of the procedure? Foreign body retrieval is used ... bones also may be difficult to visualize. Additional evaluation is required when the suspected foreign body is ...

  13. Foreign Aid Explorer)

    Data.gov (United States)

    US Agency for International Development — The Foreign Aid Explorer shows the multi-dimensional picture of U.S. foreign assistance through a highly visual and interactive website. The website makes it easy...

  14. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... able to view the surgical instrument as it advances to the location of the foreign object in ... helps dilate, or widen, the esophagus. This helps advance the foreign body into the stomach, from where ...

  15. 7 CFR 2.43 - Administrator, Foreign Agricultural Service.

    Science.gov (United States)

    2010-01-01

    ... the provisions concerning the end-use certificate system authorized pursuant to section 321(f) of that... amended (7 U.S.C. 5601 et seq.). (15) Formulate policies and administer barter programs under which... intelligence and reporting system, including provision for foreign agricultural representation abroad to...

  16. Revolutionary Intelligence: The Expanding Intelligence Role of the Iranian Revolutionary Guard Corps

    Directory of Open Access Journals (Sweden)

    Udit Banerjea

    2015-09-01

    Full Text Available The Iranian Revolutionary Guard Corps (IRGC is a military and paramilitary organization that is meant to defend the ideals of the Iranian Islamic Revolution in 1979. Since its formation, the IRGC has grown in influence and its intelligence role has expanded. This paper examines the role of the IRGC in Iran’s intelligence system through a comprehensive analysis of the organization of the IRGC’s intelligence arm, along with its operations and capabilities. In doing so, the scope, objectives, resources, customers, and sponsors of the IRGC’s intelligence activities are also analyzed. Additionally, this paper explores how the IRGC interacts with the government of Iran, the Ministry of Intelligence and Security (MOIS, other key internal stakeholders, and foreign client organizations. A key focus of this analysis is the evolution of the relationship between the IRGC and the MOIS and the growing influence of the IRGC in Iran’s intelligence community over the last decade. The paper concludes that the IRGC has now eclipsed the MOIS within Iran’s intelligence community and is one of the most powerful institutions in Iranian politics today, using its intelligence activities as its key means of maintaining power and influence within the country.

  17. Intelligent Design and Intelligent Failure

    Science.gov (United States)

    Jerman, Gregory

    2015-01-01

    Good Evening, my name is Greg Jerman and for nearly a quarter century I have been performing failure analysis on NASA's aerospace hardware. During that time I had the distinct privilege of keeping the Space Shuttle flying for two thirds of its history. I have analyzed a wide variety of failed hardware from simple electrical cables to cryogenic fuel tanks to high temperature turbine blades. During this time I have found that for all the time we spend intelligently designing things, we need to be equally intelligent about understanding why things fail. The NASA Flight Director for Apollo 13, Gene Kranz, is best known for the expression "Failure is not an option." However, NASA history is filled with failures both large and small, so it might be more accurate to say failure is inevitable. It is how we react and learn from our failures that makes the difference.

  18. TITLE: OTIC FOREIGN BODIES

    African Journals Online (AJOL)

    Dr. A.O.A. Ogunleye

    A large variety of foreign bodies may be encountered in the external auditory meatus 1 . The objects may be organic or inorganic. Organic foreign bodies include paper, cotton wool, rubber, seeds, etc while inorganic objects include beads, ball bearings, stones, and crayons 1- 4. Foreign bodies are inserted into the ear.

  19. Redefining syndromic surveillance

    Directory of Open Access Journals (Sweden)

    Rebecca Katz

    2011-12-01

    Full Text Available With growing concerns about international spread of disease and expanding use of early disease detection surveillance methods, the field of syndromic surveillance has received increased attention over the last decade. The purpose of this article is to clarify the various meanings that have been assigned to the term syndromic surveillance and to propose a refined categorization of the characteristics of these systems. Existing literature and conference proceedings were examined on syndromic surveillance from 1998 to 2010, focusing on low- and middle-income settings. Based on the 36 unique definitions of syndromic surveillance found in the literature, five commonly accepted principles of syndromic surveillance systems were identified, as well as two fundamental categories: specific and non-specific disease detection. Ultimately, the proposed categorization of syndromic surveillance distinguishes between systems that focus on detecting defined syndromes or outcomes of interest and those that aim to uncover non-specific trends that suggest an outbreak may be occurring. By providing an accurate and comprehensive picture of this field’s capabilities, and differentiating among system types, a unified understanding of the syndromic surveillance field can be developed, encouraging the adoption, investment in, and implementation of these systems in settings that need bolstered surveillance capacity, particularly low- and middle-income countries.

  20. Airborne Video Surveillance

    National Research Council Canada - National Science Library

    Blask, Steven

    2002-01-01

    The DARPA Airborne Video Surveillance (AVS) program was established to develop and promote technologies to make airborne video more useful, providing capabilities that achieve a UAV force multiplier...

  1. Handbook of surveillance technologies

    CERN Document Server

    Petersen, JK

    2012-01-01

    From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry. The Handbook of Surveillance Technologies, Third Edition is the only comprehensive work to chronicle the background and current applications of the full-range of surveillance technologies--offering the latest in surveillance and privacy issues.Cutting-Edge--updates its bestselling predecessor with discussions on social media, GPS circuits in cell phones and PDAs, new GIS s

  2. Macroeconomic Issues in Foreign Aid

    DEFF Research Database (Denmark)

    Hjertholm, Peter; Laursen, Jytte; White, Howard

    foreign aid, macroeconomics of aid, gap models, aid fungibility, fiscal response models, foreign debt,......foreign aid, macroeconomics of aid, gap models, aid fungibility, fiscal response models, foreign debt,...

  3. Embedded Video Abstraction and Design of Intelligent Video Surveillance System%嵌入式视频摘要及智能视频监控系统设计

    Institute of Scientific and Technical Information of China (English)

    刘胜楠; 汪恭焰; 李京; 李鑫磊; 方明

    2017-01-01

    Compared with traditional PC-based image processing system, ARM-based embedded image processing sys-tem has the advantages of small size, low power consumption and low cost, this paper has implemented a video ab-straction algorithm based on the Tiny4412 friendly demo board. The algorithm extracts foreground of image by Vibe al-gorithm and creates an event by distinguishing start and end key frames, then connects the created events to construct video abstraction. Compared with original video,the abstracted video only contains valid events,solving the problem of massive video redundancy, which saves storage space and helps users to browse quickly afterwards. Meanwhile, the key frames are transmitted to the user via e-mail, achieving an alarm-in-time function. The result shows this system can realize the intelligent monitoring effectively,which is the beginning of marketization.%利用基于ARM嵌入式的图像处理系统和传统的PC系统相比具有体积小、功耗低、成本低、易于部署等优点,基于友善之臂的Tiny4412开发板设计并实现了视频摘要及智能视频监控算法.该算法通过Vibe算法提取前景事件,并区分起点关键帧和终点关键帧以形成有效事件帧,再连接有效事件帧形成摘要视频.摘要视频和原始视频相比,由于只包含有效事件帧,解决了海量视频冗余度过大的问题,有利于节省存储空间,并且有助于用户事后快速浏览.同时,系统将关键帧通过邮件发送给指定用户,达到了实时智能监控的目的.结果表明,该系统能有效的实现智能监控,是市场化的开端.

  4. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  5. Applying intelligent statistical methods on biometric systems

    OpenAIRE

    Betschart, Willie

    2005-01-01

    This master’s thesis work was performed at Optimum Biometric Labs, OBL, located in Karlskrona, Sweden. Optimum Biometric Labs perform independent scenario evaluations to companies who develop biometric devices. The company has a product Optimum preConTM which is surveillance and diagnosis tool for biometric systems. This thesis work’s objective was to develop a conceptual model and implement it as an additional layer above the biometric layer with intelligence about the biometric users. The l...

  6. A fiber Bragg grating acceleration sensor for ground surveillance

    Science.gov (United States)

    Jiang, Shaodong; Zhang, Faxiang; Lv, Jingsheng; Ni, Jiasheng; Wang, Chang

    2017-10-01

    Ground surveillance system is a kind of intelligent monitoring equipment for detecting and tracking the ground target. This paper presents a fiber Bragg grating (FBG) acceleration sensor for ground surveillance, which has the characteristics of no power supply, anti-electromagnetic interference, easy large-scale networking, and small size. Which make it able to achieve the advantage of the ground surveillance system while avoiding the shortcoming of the electric sensing. The sensor has a double cantilever beam structure with a sensitivity of 1000 pm/g. Field experiment has been carried out on a flood beach to examine the sensor performance. The result shows that the detection distance on the walking of personnel reaches 70m, and the detection distance on the ordinary motor vehicle reaches 200m. The performance of the FBG sensor can satisfy the actual needs of the ground surveillance system.

  7. An IKBS approach to surveillance for naval nuclear submarine propulsion

    International Nuclear Information System (INIS)

    Cadas, C.N.; Bowskill, J.; Mayfield, T.; Clarke, J.C.

    1995-01-01

    This Paper describes work being carried out to develop an intelligent knowledge-based system (IKBS) for use in the surveillance of naval nuclear submarine propulsion plant. In recent years, modern process plants have increased automation and installed surveillance equipment while reducing the level of manpower operating and monitoring the plant. As a result, some of the local watchkeeping tasks have been transferred to control room operators, and the data reduction and warning filtering expertise inherent in local plant operators has been lost, while an additional workload has been placed upon operators. The surveillance systems installed to date have therefore been less usable than anticipated. The solution being achieved for submarine power plant is to introduce IKBS into surveillance to replace lost expertise and return to a situation in which operators receive small amounts of high quality information rather than large amounts of low quality information. (author)

  8. EMOTIONAL INTELLIGENCE AND PARENTING STYLES INFLUENCE ON ADOLESCENT GIRLS

    OpenAIRE

    A V Krasnov

    2016-01-01

    Foreign psychologists believe that parenting may influence children’s development of emotional intelligence. However, little research has been done in this area. In view of the reviewed literature and given the scarcity of data, we conducted an exploratory study in an as yet unexplored field. The present study aims at examining relationships between the parenting practices and adolescents’ emotional intelligence. 74 students (17-18 years, females) were surveyed to assess their perception of p...

  9. Soil and vegetation surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Antonio, E.J.

    1995-06-01

    Soil sampling and analysis evaluates long-term contamination trends and monitors environmental radionuclide inventories. This section of the 1994 Hanford Site Environmental Report summarizes the soil and vegetation surveillance programs which were conducted during 1994. Vegetation surveillance is conducted offsite to monitor atmospheric deposition of radioactive materials in areas not under cultivation and onsite at locations adjacent to potential sources of radioactivity.

  10. Between visibility and surveillance

    DEFF Research Database (Denmark)

    Uldam, Julie

    As activists move from alternative media platforms to commercial social media platforms they face increasing challenges in protecting their online security and privacy. While government surveillance of activists is well-documented in both scholarly research and the media, corporate surveillance...

  11. Reassembling Surveillance Creep

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    2017-01-01

    We live in societies in which surveillance technologies are constantly introduced, are transformed, and spread to new practices for new purposes. How and why does this happen? In other words, why does surveillance “creep”? This question has received little attention either in theoretical developm......We live in societies in which surveillance technologies are constantly introduced, are transformed, and spread to new practices for new purposes. How and why does this happen? In other words, why does surveillance “creep”? This question has received little attention either in theoretical...... development or in empirical analyses. Accordingly, this article contributes to this special issue on the usefulness of Actor-Network Theory (ANT) by suggesting that ANT can advance our understanding of ‘surveillance creep’. Based on ANT’s model of translation and a historical study of the Danish DNA database......, we argue that surveillance creep involves reassembling the relations in surveillance networks between heterogeneous actors such as the watchers, the watched, laws, and technologies. Second, surveillance creeps only when these heterogeneous actors are adequately interested and aligned. However...

  12. Does Foreign Aid Increase Foreign Direct Investment?

    DEFF Research Database (Denmark)

    Selaya, Pablo; Sunesen, Eva Rytter

      The notion that foreign aid and foreign direct investment (FDI) are complementary sources of capital is conventional among governments and international cooperation agencies. This paper argues that the notion is incomplete. Within the framework of an open economy Solow model we show...... that the theoretical relationship between foreign aid and FDI is indeterminate. Aid may raise the marginal productivity of capital by financing complementary inputs, such as public infrastructure projects and human capital investment. However, aid may also crowd out productive private investments if it comes...... in the shape of physical capital transfers. We therefore turn to an empirical analysis of the relationship between FDI and disaggregated aid flows. Our results strongly support the hypotheses that aid invested in complementary inputs draws in foreign capital while aid invested in physical capital crowds out...

  13. Business Intelligence

    OpenAIRE

    Petersen, Anders

    2001-01-01

    Cílem této bakalářské práce je seznámení s Business Intelligence a zpracování vývojového trendu, který ovlivňuje podobu řešení Business Intelligence v podniku ? Business Activity Monitoring. Pro zpracování tohoto tématu byla použita metoda studia odborných pramenů, a to jak v českém, tak v anglickém jazyce. Hlavním přínosem práce je ucelený, v českém jazyce zpracovaný materiál pojednávající o Business Activity Monitoring. Práce je rozdělena do šesti hlavních kapitol. Prvních pět je věnováno p...

  14. The Intelligence Problem of Policymakers in Counterinsurgency: Asking And Answering the Right Questions

    Science.gov (United States)

    2013-12-01

    explosive device ISR intelligence, surveillance and reconnaissance J2 joint staff intelligence section NATO North Atlantic Treaty Organization OSINT open...commonly referring to the technical means of collection to the exclusion of HUMINT, open source intelligence ( OSINT ), and other information coming...is using to gain popular support or to delegitimize the supported government. The 10th Mountain Division determined OSINT was an important component

  15. Web Intelligence and Artificial Intelligence in Education

    Science.gov (United States)

    Devedzic, Vladan

    2004-01-01

    This paper surveys important aspects of Web Intelligence (WI) in the context of Artificial Intelligence in Education (AIED) research. WI explores the fundamental roles as well as practical impacts of Artificial Intelligence (AI) and advanced Information Technology (IT) on the next generation of Web-related products, systems, services, and…

  16. Foreign Investors Able to Establish Foreign- exclusively Exhibition Corporations

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Foreign Investors Able to Establish Foreign-exclusively Exhibition Corporations In Feb, Ministry of Commerce issued its 1st decree on temporary regulation for foreign-investing corporations; the regulation allows foreign investors to set up foreign-investing convention & exhibition corporations exclusively or through cooperation with other Chinese corporations, enterprises or organizations. With legal protection on their regulatory management and legal rights, these foreign-investing corporations are in the charge of Department of Foreign Investment Administration, Ministry of Commerce.

  17. An Autonomous Mobile Robotic System for Surveillance of Indoor Environments

    Directory of Open Access Journals (Sweden)

    Donato Di Paola

    2010-02-01

    Full Text Available The development of intelligent surveillance systems is an active research area. In this context, mobile and multi-functional robots are generally adopted as means to reduce the environment structuring and the number of devices needed to cover a given area. Nevertheless, the number of different sensors mounted on the robot, and the number of complex tasks related to exploration, monitoring, and surveillance make the design of the overall system extremely challenging. In this paper, we present our autonomous mobile robot for surveillance of indoor environments. We propose a system able to handle autonomously general-purpose tasks and complex surveillance issues simultaneously. It is shown that the proposed robotic surveillance scheme successfully addresses a number of basic problems related to environment mapping, localization and autonomous navigation, as well as surveillance tasks, like scene processing to detect abandoned or removed objects and people detection and following. The feasibility of the approach is demonstrated through experimental tests using a multisensor platform equipped with a monocular camera, a laser scanner, and an RFID device. Real world applications of the proposed system include surveillance of wide areas (e.g. airports and museums and buildings, and monitoring of safety equipment.

  18. An Autonomous Mobile Robotic System for Surveillance of Indoor Environments

    Directory of Open Access Journals (Sweden)

    Donato Di Paola

    2010-03-01

    Full Text Available The development of intelligent surveillance systems is an active research area. In this context, mobile and multi-functional robots are generally adopted as means to reduce the environment structuring and the number of devices needed to cover a given area. Nevertheless, the number of different sensors mounted on the robot, and the number of complex tasks related to exploration, monitoring, and surveillance make the design of the overall system extremely challenging. In this paper, we present our autonomous mobile robot for surveillance of indoor environments. We propose a system able to handle autonomously general-purpose tasks and complex surveillance issues simultaneously. It is shown that the proposed robotic surveillance scheme successfully addresses a number of basic problems related to environment mapping, localization and autonomous navigation, as well as surveillance tasks, like scene processing to detect abandoned or removed objects and people detection and following. The feasibility of the approach is demonstrated through experimental tests using a multisensor platform equipped with a monocular camera, a laser scanner, and an RFID device. Real world applications of the proposed system include surveillance of wide areas (e.g. airports and museums and buildings, and monitoring of safety equipment.

  19. Intelligence and negotiating

    International Nuclear Information System (INIS)

    George, D.G.

    1990-01-01

    This paper discusses the role of US intelligence during arms control negotiations between 1982 and 1987. It also covers : the orchestration of intelligence projects; an evaluation of the performance of intelligence activities; the effect intelligence work had on actual arms negotiations; and suggestions for improvements in the future

  20. Intelligent products : A survey

    NARCIS (Netherlands)

    Meyer, G.G.; Främling, K.; Holmström, J.

    This paper presents an overview of the field of Intelligent Products. As Intelligent Products have many facets, this paper is mainly focused on the concept behind Intelligent Products, the technical foundations, and the achievable practical goals of Intelligent Products. A novel classification of

  1. Intelligence Issues for Congress

    Science.gov (United States)

    2013-04-23

    open source information— osint (newspapers...by user agencies. Section 1052 of the Intelligence Reform Act expressed the sense of Congress that there should be an open source intelligence ...center to coordinate the collection, analysis, production, and dissemination of open source intelligence to other intelligence agencies. An Open Source

  2. Intelligent Governmentality

    Directory of Open Access Journals (Sweden)

    Willem de Lint

    2008-10-01

    Full Text Available Recently, within liberal democracies, the post-Westphalian consolidation of security and intelligence has ushered in the normalization not only of security in ‘securitization’ but also of intelligence in what is proposed here as ‘intelligencification.’ In outlining the features of intelligencified governance, my aim is to interrogate the view that effects or traces, and productivity rather than negation is as persuasive as commonly thought by the constructivists. After all, counter-intelligence is both about purging and reconstructing the archive for undisclosed values. In practice, what is being normalized is the authorized and legalized use of release and retention protocols of politically actionable information. The intelligencification of governmentality affords a sovereignty shell-game or the instrumentalization of sovereign power by interests that are dependent on, yet often inimical to, the power of state, national, and popular sovereignty. On voit le politique et le social comme dépendant de contingences exclusives. Récemment, au sein des démocraties libérales, la consolidation de la sécurité et des services de renseignements de sécurité qui a suivi les traités de la Westphalie a donné lieu à la normalisation non seulement de la sécurité en «sécurisation» mais aussi des services de renseignements de sécurité en ce qui est proposé ici comme «intelligencification» [terme anglais créé par l’auteur, dérivé du mot anglais «intelligence» dans le sens de renseignements des écurité]. En particulier, ce que l’on normalise dans le but de contourner des contingences exclusives est l’utilisation autorisée et légalisée de protocoles de communication et de rétention d’information qui, politiquement, pourrait mener à des poursuites. En esquissant les traits de la gouvernance «intelligencifiée», mon but est d’interroger le point de vue que les effets ou les traces, et la productivité plutôt que la

  3. Pathogen intelligence

    Directory of Open Access Journals (Sweden)

    Michael eSteinert

    2014-01-01

    Full Text Available Different species inhabit different sensory worlds and thus have evolved diverse means of processing information, learning and memory. In the escalated arms race with host defense, each pathogenic bacterium not only has evolved its individual cellular sensing and behaviour, but also collective sensing, interbacterial communication, distributed information processing, joint decision making, dissociative behaviour, and the phenotypic and genotypic heterogeneity necessary for epidemiologic success. Moreover, pathogenic populations take advantage of dormancy strategies and rapid evolutionary speed, which allow them to save co-generated intelligent traits in a collective genomic memory. This review discusses how these mechanisms add further levels of complexity to bacterial pathogenicity and transmission, and how mining for these mechanisms could help to develop new anti-infective strategies.

  4. Intelligent Routines

    CERN Document Server

    Anastassiou, George A

    Intelligent Routines II: Solving Linear Algebra and Differential Geometry with Sage” contains numerous of examples and problems as well as many unsolved problems. This book extensively applies the successful software Sage, which can be found free online http://www.sagemath.org/. Sage is a recent and popular software for mathematical computation, available freely and simple to use. This book is useful to all applied scientists in mathematics, statistics and engineering, as well for late undergraduate and graduate students of above subjects. It is the first such book in solving symbolically with Sage problems in Linear Algebra and Differential Geometry. Plenty of SAGE applications are given at each step of the exposition.

  5. 10 Standards for Oversight and Transparency of National Intelligence Services

    NARCIS (Netherlands)

    Eskens, S.; van Daalen, O.; van Eijk, N.

    2016-01-01

    This report aims to enhance the policy debate on surveillance by intelligence services by focusing on two key components: oversight and transparency. Both oversight and transparency are essential to devising checks and balances in a way that respects human rights. By offering this concise list of

  6. A generic model for camera based intelligent road crowd control ...

    African Journals Online (AJOL)

    This research proposes a model for intelligent traffic flow control by implementing camera based surveillance and feedback system. A series of cameras are set minimum three signals ahead from the target junction. The complete software system is developed to help integrating the multiple camera on road as feedback to ...

  7. Intelligence: Real or artificial?

    OpenAIRE

    Schlinger, Henry D.

    1992-01-01

    Throughout the history of the artificial intelligence movement, researchers have strived to create computers that could simulate general human intelligence. This paper argues that workers in artificial intelligence have failed to achieve this goal because they adopted the wrong model of human behavior and intelligence, namely a cognitive essentialist model with origins in the traditional philosophies of natural intelligence. An analysis of the word “intelligence” suggests that it originally r...

  8. Advanced digital video surveillance for safeguard and physical protection

    International Nuclear Information System (INIS)

    Kumar, R.

    2002-01-01

    Full text: Video surveillance is a very crucial component in safeguard and physical protection. Digital technology has revolutionized the surveillance scenario and brought in various new capabilities like better image quality, faster search and retrieval of video images, less storage space for recording, efficient transmission and storage of video, better protection of recorded video images, and easy remote accesses to live and recorded video etc. The basic safeguard requirement for verifiably uninterrupted surveillance has remained largely unchanged since its inception. However, changes to the inspection paradigm to admit automated review and remote monitoring have dramatically increased the demands on safeguard surveillance system. Today's safeguard systems can incorporate intelligent motion detection with very low rate of false alarm and less archiving volume, embedded image processing capability for object behavior and event based indexing, object recognition, efficient querying and report generation etc. It also demands cryptographically authenticating, encrypted, and highly compressed video data for efficient, secure, tamper indicating and transmission. In physical protection, intelligent on robust video motion detection, real time moving object detection and tracking from stationary and moving camera platform, multi-camera cooperative tracking, activity detection and recognition, human motion analysis etc. is going to play a key rote in perimeter security. Incorporation of front and video imagery exploitation tools like automatic number plate recognition, vehicle identification and classification, vehicle undercarriage inspection, face recognition, iris recognition and other biometric tools, gesture recognition etc. makes personnel and vehicle access control robust and foolproof. Innovative digital image enhancement techniques coupled with novel sensor design makes low cost, omni-directional vision capable, all weather, day night surveillance a reality

  9. Linguistic coding deficits in foreign language learners.

    Science.gov (United States)

    Sparks, R; Ganschow, L; Pohlman, J

    1989-01-01

    As increasing numbers of colleges and universities require a foreign language for graduation in at least one of their degree programs, reports of students with difficulties in learning a second language are multiplying. Until recently, little research has been conducted to identify the nature of this problem. Recent attempts by the authors have focused upon subtle but ongoing language difficulties in these individuals as the source of their struggle to learn a foreign language. The present paper attempts to expand upon this concept by outlining a theoretical framework based upon a linguistic coding model that hypothesizes deficits in the processing of phonological, syntactic, and/or semantic information. Traditional psychoeducational assessment batteries of standardized intelligence and achievement tests generally are not sensitive to these linguistic coding deficits unless closely analyzed or, more often, used in conjunction with a more comprehensive language assessment battery. Students who have been waived from a foreign language requirement and their proposed type(s) of linguistic coding deficits are profiled. Tentative conclusions about the nature of these foreign language learning deficits are presented along with specific suggestions for tests to be used in psychoeducational evaluations.

  10. The Copyright Surveillance Industry

    Directory of Open Access Journals (Sweden)

    Mike Zajko

    2015-09-01

    Full Text Available Creative works are now increasingly distributed as digital “content” through the internet, and copyright law has created powerful incentives to monitor and control these flows. This paper analyzes the surveillance industry that has emerged as a result. Copyright surveillance systems identify copyright infringement online and identify persons to hold responsible for infringing acts. These practices have raised fundamental questions about the nature of identification and attribution on the internet, as well as the increasing use of algorithms to make legal distinctions. New technologies have threatened the profits of some media industries through copyright infringement, but also enabled profitable forms of mass copyright surveillance and enforcement. Rather than a system of perfect control, copyright enforcement continues to be selective and uneven, but its broad reach results in systemic harm and provides opportunities for exploitation. It is only by scrutinizing copyright surveillance practices and copyright enforcement measures that we can evaluate these consequences.

  11. Deployment Health Surveillance

    National Research Council Canada - National Science Library

    DeNicola, Anthony D

    2004-01-01

    ... of stress in causing chronic illness. The lack of comprehensive deployment health surveillance has made it difficult to determine possible causes of adverse health effects reported by Gulf War veterans...

  12. 522 Postmarket Surveillance Studies

    Data.gov (United States)

    U.S. Department of Health & Human Services — The 522 Postmarket Surveillance Studies Program encompasses design, tracking, oversight, and review responsibilities for studies mandated under section 522 of the...

  13. Sanitary surveillance and bioethics

    Directory of Open Access Journals (Sweden)

    Volnei Garrafa

    2017-08-01

    Full Text Available Regulatory practices in the field of health surveillance are indispensable. The aim of this study is to show ‒ taking the Brazilian National Surveillance Agency, governing body of sanitary surveillance in Brazil as a reference ‒ that bioethics provides public bodies a series of theoretical tools from the field of applied ethics for the proper exercise and control of these practices. To that end, the work uses two references of bioethics for the development of a comparative and supportive analysis to regulatory activities in the field of health surveillance: the Universal Declaration on Bioethics and Human Rights of Unesco and the theory of intervention bioethics. We conclude that organizations and staff working with regulatory activities can take advantage of the principles and frameworks proposed by bioethics, especially those related to the Declaration and the theory of intervention bioethics, the latter being set by the observation and use of the principles of prudence, precaution, protection and prevention.

  14. COMPETITIVE INTELLIGENCE ANALYSIS - SCENARIOS METHOD

    Directory of Open Access Journals (Sweden)

    Ivan Valeriu

    2014-07-01

    Full Text Available Keeping a company in the top performing players in the relevant market depends not only on its ability to develop continually, sustainably and balanced, to the standards set by the customer and competition, but also on the ability to protect its strategic information and to know in advance the strategic information of the competition. In addition, given that economic markets, regardless of their profile, enable interconnection not only among domestic companies, but also between domestic companies and foreign companies, the issue of economic competition moves from the national economies to the field of interest of regional and international economic organizations. The stakes for each economic player is to keep ahead of the competition and to be always prepared to face market challenges. Therefore, it needs to know as early as possible, how to react to others’ strategy in terms of research, production and sales. If a competitor is planning to produce more and cheaper, then it must be prepared to counteract quickly this movement. Competitive intelligence helps to evaluate the capabilities of competitors in the market, legally and ethically, and to develop response strategies. One of the main goals of the competitive intelligence is to acknowledge the role of early warning and prevention of surprises that could have a major impact on the market share, reputation, turnover and profitability in the medium and long term of a company. This paper presents some aspects of competitive intelligence, mainly in terms of information analysis and intelligence generation. Presentation is theoretical and addresses a structured method of information analysis - scenarios method – in a version that combines several types of analysis in order to reveal some interconnecting aspects of the factors governing the activity of a company.

  15. Public Health Intelligence: Learning From the Ebola Crisis

    Science.gov (United States)

    Weber, David Jay

    2015-01-01

    Today’s public health crises, as exemplified by the Ebola outbreak, lead to dramatic calls to action that typically include improved electronic monitoring systems to better prepare for, and respond to, similar occurrences in the future. Even a preliminary public health informatics evaluation of the current Ebola crisis exposes the need for enhanced coordination and sharing of trustworthy public health intelligence. We call for a consumer-centric model of public health intelligence and the formation of a national center to guide public health intelligence gathering and synthesis. Sharing accurate and actionable information with government agencies, health care practitioners, policymakers, and, critically, the general public, will mark a shift from doing public health surveillance on people to doing public health surveillance for people. PMID:26180978

  16. Enhancing Arctic Surveillance With Space-Based Radars

    Science.gov (United States)

    2013-06-01

    180 degrees (Sellers, 2005). xvii Right Ascension of the Ascending Node: from a geocentric origin perspective, describes how an orbital plane...fascination with remote sensing and intelligence, surveillance, and reconnaissance from space. • Dr. Ray Buettner, my co-advisor, whose positive approach ...48 N; 169 W (northwest maritime corner) • 74 43 N; 156 34 W (uppermost maritime point in the Beaufort Sea approaching the Arctic Ocean) • 72 53 N

  17. Employing Artificial Intelligence To Minimise Internet Fraud

    Directory of Open Access Journals (Sweden)

    Edward Wong Sek Khin

    2009-12-01

    Full Text Available Internet fraud is increasing on a daily basis with new methods for extracting funds from government, corporations, businesses in general, and persons appearing almost hourly. The increases in on-line purchasing and the constant vigilance of both seller and buyer have meant that the criminal seems to be one-step ahead at all times. To pre-empt or to stop fraud before it can happen occurs in the non-computer based daily transactions of today because of the natural intelligence of the players, both seller and buyer. Currently, even with advances in computing techniques, intelligence is not the current strength of any computing system of today, yet techniques are available which may reduce the occurrences of fraud, and are usually referred to as artificial intelligence systems.This paper provides an overview of the use of current artificial intelligence (AI techniques as a means of combating fraud.Initially the paper describes how artificial intelligence techniques are employed in systems for detecting credit card fraud (online and offline fraud and insider trading.Following this, an attempt is made to propose the using of MonITARS (Monitoring Insider Trading and Regulatory Surveillance Systems framework which use a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing. Finally, the paper discusses future research agenda to the role of using MonITARS system.

  18. Foreign Body Retrieval

    Science.gov (United States)

    ... to the location of the foreign object in real-time. Your physician also may locate soft-tissue objects by probing the wound. Additional tests ... magnets pulling together parts of bowel. Removal of soft-tissue foreign bodies will ... provides real-time imaging, making it a good tool for guiding ...

  19. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... to the location of the foreign object in real-time. Your physician also may locate soft-tissue objects by probing the wound. Additional tests ... magnets pulling together parts of bowel. Removal of soft-tissue foreign bodies will ... provides real-time imaging, making it a good tool for guiding ...

  20. Foreign Body Retrieval

    Medline Plus

    Full Text Available Toggle navigation Test/Treatment Patient Type Screening/Wellness Disease/Condition Safety En Español More Info Images/Videos About Us News Physician Resources Professions Site Index A-Z Foreign Body Retrieval Foreign ...

  1. Foreign Languages and Careers

    Science.gov (United States)

    Honig, Lucille J.; Brod, Richard I.

    1974-01-01

    Gives employment opportunity information in the following fields where foreign language can be used as an auxiliary skill: 1) Business, Industry, Commerce; 2) Civil Service; 3) Education; 4) Law; 5) Library Science; 6) Media; 7) Science; 8) Service; 9) Social Sciences; 10) Travel, Tourism. The fields of foreign language teaching and interpretation…

  2. Foreign Investment Welcome

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ New procedures will help facilitate mergers and acquisitions by foreign companies in China The State Council, or China's cabinet, said in a February statement that China will establish a ministerial panel to review foreign firms' attempts to buy, or merge with, domestic companies.

  3. Foreign Investment Welcome

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    New procedures will help facilitate mergers and acquisitions by foreign companies in China The State Council,or China’s cabinet,said in a February statement that China will establish a ministerial panel to review foreign firms’ attempts to buy,or merge with,domestic companies.The committee, led by the National Development and Reform Commission and the Ministry of

  4. An Intelligent Computer Assisted Language Learning System for Arabic Learners

    Science.gov (United States)

    Shaalan, Khaled F.

    2005-01-01

    This paper describes the development of an intelligent computer-assisted language learning (ICALL) system for learning Arabic. This system could be used for learning Arabic by students at primary schools or by learners of Arabic as a second or foreign language. It explores the use of Natural Language Processing (NLP) techniques for learning…

  5. Foreign Firms, Domestic Wages

    DEFF Research Database (Denmark)

    Malchow-Møller, Nikolaj; Markusen, James R.; Schjerning, Bertel

    to the firm?s productivity. Foreign-owned firms have, on average, higher productivity in equilibrium due to entry costs, which means that low-productivity foreign firms cannot enter. Foreign firms have higher wage growth and, with some exceptions, pay higher average wages, but not when compared to similarly...... large domestic firms. The empirical implications of the model are tested on matched employer-employee data from Denmark. Consistent with the theory, we find considerable evidence of higher wages and wage growth in large and/or foreign-owned firms. These effects survive controlling for individual...... characteristics, but, as expected, are reduced significantly when controlling for unobservable firm heterogeneity. Furthermore, acquired skills in foreign-owned and large firms appear to be transferable to both subsequent wage work and self-employment...

  6. Realism in Foreign Policy Analysis

    DEFF Research Database (Denmark)

    Wivel, Anders

    2017-01-01

    'Realism in Foreign Policy Analysis' traces how realist thinking on foreign policy has developed over the years and discusses the challenges and opportunities faced by various strands of realism when applied to foreign policy analysis....

  7. Educational Programs for Intelligence Professionals.

    Science.gov (United States)

    Miller, Jerry P.

    1994-01-01

    Discusses the need for education programs for competitive intelligence professionals. Highlights include definitions of intelligence functions, focusing on business intelligence; information utilization by decision makers; information sources; competencies for intelligence professionals; and the development of formal education programs. (38…

  8. A New Dimension of Business Intelligence: Location-based Intelligence

    OpenAIRE

    Zeljko Panian

    2012-01-01

    Through the course of this paper we define Locationbased Intelligence (LBI) which is outgrowing from process of amalgamation of geolocation and Business Intelligence. Amalgamating geolocation with traditional Business Intelligence (BI) results in a new dimension of BI named Location-based Intelligence. LBI is defined as leveraging unified location information for business intelligence. Collectively, enterprises can transform location data into business intelligence applic...

  9. Intelligent Extruder

    Energy Technology Data Exchange (ETDEWEB)

    AlperEker; Mark Giammattia; Paul Houpt; Aditya Kumar; Oscar Montero; Minesh Shah; Norberto Silvi; Timothy Cribbs

    2003-04-24

    ''Intelligent Extruder'' described in this report is a software system and associated support services for monitoring and control of compounding extruders to improve material quality, reduce waste and energy use, with minimal addition of new sensors or changes to the factory floor system components. Emphasis is on process improvements to the mixing, melting and de-volatilization of base resins, fillers, pigments, fire retardants and other additives in the :finishing'' stage of high value added engineering polymer materials. While GE Plastics materials were used for experimental studies throughout the program, the concepts and principles are broadly applicable to other manufacturers materials. The project involved a joint collaboration among GE Global Research, GE Industrial Systems and Coperion Werner & Pleiderer, USA, a major manufacturer of compounding equipment. Scope of the program included development of a algorithms for monitoring process material viscosity without rheological sensors or generating waste streams, a novel detection scheme for rapid detection of process upsets and an adaptive feedback control system to compensate for process upsets where at line adjustments are feasible. Software algorithms were implemented and tested on a laboratory scale extruder (50 lb/hr) at GE Global Research and data from a production scale system (2000 lb/hr) at GE Plastics was used to validate the monitoring and detection software. Although not evaluated experimentally, a new concept for extruder process monitoring through estimation of high frequency drive torque without strain gauges is developed and demonstrated in simulation. A plan to commercialize the software system is outlined, but commercialization has not been completed.

  10. Human-Interaction Challenges in UAV-Based Autonomous Surveillance

    Science.gov (United States)

    Freed, Michael; Harris, Robert; Shafto, Michael G.

    2004-01-01

    Autonomous UAVs provide a platform for intelligent surveillance in application domains ranging from security and military operations to scientific information gathering and land management. Surveillance tasks are often long duration, requiring that any approach be adaptive to changes in the environment or user needs. We describe a decision- theoretic model of surveillance, appropriate for use on our autonomous helicopter, that provides a basis for optimizing the value of information returned by the UAV. From this approach arise a range of challenges in making this framework practical for use by human operators lacking specialized knowledge of autonomy and mathematics. This paper describes our platform and approach, then describes human-interaction challenges arising from this approach that we have identified and begun to address.

  11. Will smart surveillance systems listen, understand and speak Slovene?

    Directory of Open Access Journals (Sweden)

    Simon Dobrišek

    2013-12-01

    Full Text Available The paper deals with the spoken language technologies that could enable the so-called smart (intelligent surveillance systems to listen, understand and speak Slovenian in the near future. Advanced computational methods of artificial perception and pattern recognition enable such systems to be at least to some extent aware of the environment, the presence of people and other phenomena that could be subject to surveillance. Speech is one such phenomenon that has the potential to be a key source of information in certain security situations. Technologies that enable automatic speech and speaker recognition as well as their psychophysical state by computer analysis of acoustic speech signals provide an entirely new dimension to the development of smart surveillance systems. Automatic recognition of spoken threats, screaming and crying for help, as well as a suspicious psycho-physical state of a speaker provide such systems to some extent with intelligent behaviour. The paper investigates the current state of development of these technologies and the requirements and possibilities of these systems to be used for the Slovenian spoken language, as well as different possible security application scenarios. It also addresses the broader legal and ethical issues raised by the development and use of such technologies, especially as audio surveillance is one of the most sensitive issues of privacy protection.

  12. Surveillance of antibiotic resistance

    Science.gov (United States)

    Johnson, Alan P.

    2015-01-01

    Surveillance involves the collection and analysis of data for the detection and monitoring of threats to public health. Surveillance should also inform as to the epidemiology of the threat and its burden in the population. A further key component of surveillance is the timely feedback of data to stakeholders with a view to generating action aimed at reducing or preventing the public health threat being monitored. Surveillance of antibiotic resistance involves the collection of antibiotic susceptibility test results undertaken by microbiology laboratories on bacteria isolated from clinical samples sent for investigation. Correlation of these data with demographic and clinical data for the patient populations from whom the pathogens were isolated gives insight into the underlying epidemiology and facilitates the formulation of rational interventions aimed at reducing the burden of resistance. This article describes a range of surveillance activities that have been undertaken in the UK over a number of years, together with current interventions being implemented. These activities are not only of national importance but form part of the international response to the global threat posed by antibiotic resistance. PMID:25918439

  13. [Foreign Body in Esophagus].

    Science.gov (United States)

    Domeki, Yasushi; Kato, Hiroyuki

    2015-07-01

    An esophageal foreign body is the term for a foreign body in the esophagus. The 2 age groups most prone to this condition are children age 9 and under (and especially toddlers age 4 and under) and elderly individuals age 70 and over. A foreign body often lodges where the esophagus is most constricted. In toddlers, the foreign body is often currency or coins or a toy. In adults, the body is often a piece of fish, dentures, a piece of meat, a pin or needle, or a drug in its blister pack packaging. In children, an esophageal foreign body is treated by fluoroscopically guided removal of the body with a balloon catheter or magnetic catheter or removal of the body via endoscopy or direct esophagoscopy under general anesthesia. In adults, the best choice for treating an esophageal foreign body is removing the body with an endoscope but there are instances where surgery is performed because the body is hard to remove endoscopically, a puncture has occurred, or empyema or mediastinitis has developed. This paper reviews the diagnosis and treatment of an esophageal foreign body.

  14. Performance Assessment of Intelligence, Surveillance, and Reconnaissance (ISR) Enterprise Workflows

    National Research Council Canada - National Science Library

    Hurley, M. B; Jones, P. B

    2007-01-01

    ... on how to assess the performance of these systems. The framework delineates how measurements from laboratory tests, operational experiments, and field deployments can be analyzed to produce accurate, quantitative descriptions of system performance...

  15. Overhauling the Airborne Intelligence, Surveillance, and Reconnaissance Systems Procurement Process

    Science.gov (United States)

    2011-03-18

    over 300,000 returning troops suffering from major depression or post-traumatic stress disorder and at least 320,000 brain injuries received6, the...Accessed December 31, 2010) 24 “Aviation Fuel,” linked from the U.S. Centennial of Flight Commission Home Page at “Essays,” http

  16. A Commonsense Approach to Intelligence, Surveillance, and Reconnaissance Operations

    Science.gov (United States)

    2016-09-01

    Prince et al., “Reassessment of Psychological Distress and Post-Traumatic Stress Disorder in United States Air Force Distributed Common Ground ...connaissance using MQ-1 Predators and MQ-9 Reapers to monitor current and anticipated crises abroad. According to February 2016 figures , the US Air Force...and its distributed common ground system (DCGS) fly 61 CAPs per day.2 Looking forward four years’ time, without significant increase in either US or

  17. Transforming Airborne Command and Control and Intelligence, Surveillance, and Reconnaissance

    Science.gov (United States)

    2012-06-01

    the US Government, Department of Defense, the United States Air Force, or Air University. In accordance with Air Force Instruction 51-303, it is not...Staff level. Lt Col Roger “Charlie” Brown offered key perspective at the Major Command level. Lt Col Herb “Weed” Maraman, Sqn Ldr Mike Lyttle...studied the feasibility of using space-based radar (SBR) platforms as well as large manned aircraft like the E-10A to meet USAF C2 and ISR operational

  18. Airborne Intelligence, Surveillance, and Reconnaissance: Mission Command and Centralized Control

    Science.gov (United States)

    2014-12-10

    short stint in Texas, Stuart reported to Fort Leavenworth, where he began his career as a cavalryman and found himself confronted with the torrent of...found themselves back at the War Department in a meeting with Secretary Floyd and President James Buchanan.50 The Secretary of War placed Lee in command...and Aldie. Those fights were tactical victories for the Union cavalry and Stuart had lost 500 men , but his cavalry had served its operational

  19. Intelligent Mission Controller Node

    National Research Council Canada - National Science Library

    Perme, David

    2002-01-01

    The goal of the Intelligent Mission Controller Node (IMCN) project was to improve the process of translating mission taskings between real-world Command, Control, Communications, Computers, and Intelligence (C41...

  20. Algorithms in ambient intelligence

    NARCIS (Netherlands)

    Aarts, E.H.L.; Korst, J.H.M.; Verhaegh, W.F.J.; Verhaegh, W.F.J.; Aarts, E.H.L.; Korst, J.H.M.

    2004-01-01

    In this chapter, we discuss the new paradigm for user-centered computing known as ambient intelligence and its relation with methods and techniques from the field of computational intelligence, including problem solving, machine learning, and expert systems.

  1. Advanced intelligent systems

    CERN Document Server

    Ryoo, Young; Jang, Moon-soo; Bae, Young-Chul

    2014-01-01

    Intelligent systems have been initiated with the attempt to imitate the human brain. People wish to let machines perform intelligent works. Many techniques of intelligent systems are based on artificial intelligence. According to changing and novel requirements, the advanced intelligent systems cover a wide spectrum: big data processing, intelligent control, advanced robotics, artificial intelligence and machine learning. This book focuses on coordinating intelligent systems with highly integrated and foundationally functional components. The book consists of 19 contributions that features social network-based recommender systems, application of fuzzy enforcement, energy visualization, ultrasonic muscular thickness measurement, regional analysis and predictive modeling, analysis of 3D polygon data, blood pressure estimation system, fuzzy human model, fuzzy ultrasonic imaging method, ultrasonic mobile smart technology, pseudo-normal image synthesis, subspace classifier, mobile object tracking, standing-up moti...

  2. 2008: A Year of Transition. DoD Global Emerging Infections Surveillance and Response System

    Science.gov (United States)

    2009-04-01

    Vibrio cholera O1 (1%). Significant antibiotic resistance was also documented. Migratory Bird Surveillance In collaboration with the National...ICEID). March 2008. Atlanta, Georgia. 3. Agustine W, Waslia L, Agtini M, Kasper MR, Listiyaningsih E, and Putnam SD. The Presentation of Vibrio cholerae ...surveillance program to 72 countries, 20 Navy ships, 1 foreign ship, and 6 clinics along the Mexican border (four in California, two in Mexico

  3. Artificial Intelligence Project

    Science.gov (United States)

    1990-01-01

    Symposium on Aritificial Intelligence and Software Engineering Working Notes, March 1989. Blumenthal, Brad, "An Architecture for Automating...Artificial Intelligence Project Final Technical Report ARO Contract: DAAG29-84-K-OGO Artificial Intelligence LaboratO"ry The University of Texas at...Austin N>.. ~ ~ JA 1/I 1991 n~~~ Austin, Texas 78712 ________k A,.tificial Intelligence Project i Final Technical Report ARO Contract: DAAG29-84-K-0060

  4. Orchestrating Multiple Intelligences

    Science.gov (United States)

    Moran, Seana; Kornhaber, Mindy; Gardner, Howard

    2006-01-01

    Education policymakers often go astray when they attempt to integrate multiple intelligences theory into schools, according to the originator of the theory, Howard Gardner, and his colleagues. The greatest potential of a multiple intelligences approach to education grows from the concept of a profile of intelligences. Each learner's intelligence…

  5. Algorithms in ambient intelligence

    NARCIS (Netherlands)

    Aarts, E.H.L.; Korst, J.H.M.; Verhaegh, W.F.J.; Weber, W.; Rabaey, J.M.; Aarts, E.

    2005-01-01

    We briefly review the concept of ambient intelligence and discuss its relation with the domain of intelligent algorithms. By means of four examples of ambient intelligent systems, we argue that new computing methods and quantification measures are needed to bridge the gap between the class of

  6. Designing with computational intelligence

    CERN Document Server

    Lopes, Heitor; Mourelle, Luiza

    2017-01-01

    This book discusses a number of real-world applications of computational intelligence approaches. Using various examples, it demonstrates that computational intelligence has become a consolidated methodology for automatically creating new competitive solutions to complex real-world problems. It also presents a concise and efficient synthesis of different systems using computationally intelligent techniques.

  7. Reflection on robotic intelligence

    NARCIS (Netherlands)

    Bartneck, C.

    2006-01-01

    This paper reflects on the development or robots, both their physical shape as well as their intelligence. The later strongly depends on the progress made in the artificial intelligence (AI) community which does not yet provide the models and tools necessary to create intelligent robots. It is time

  8. The politics of surveillance policy: UK regulatory dynamics after Snowden

    Directory of Open Access Journals (Sweden)

    Arne Hintz

    2016-09-01

    Full Text Available The revelations by NSA whistleblower Edward Snowden have illustrated the scale and extent of digital surveillance carried out by different security and intelligence agencies. The publications have led to a variety of concerns, public debate, and some diplomatic fallout regarding the legality of the surveillance, the extent of state interference in civic life, and the protection of civil rights in the context of security. Debates about the policy environment of surveillance emerged quickly after the leaks began, but actual policy change is only starting. In the UK, a draft law (Investigatory Powers Bill has been proposed and is currently discussed. In this paper, we will trace the forces and dynamics that have shaped this particular policy response. Addressing surveillance policy as a site of struggle between different social forces and drawing on different fields across communication policy research, we suggest eight dynamics that, often in conflicting ways, have shaped the regulatory framework of surveillance policy in the UK since the Snowden leaks. These include the governmental context; national and international norms; court rulings; civil society advocacy; technical standards; private sector interventions; media coverage; and public opinion. We investigate how state surveillance has been met with criticism by parts of the technology industry and civil society, and that policy change was required as a result of legal challenges, review commissions and normative interventions. However a combination of specific government compositions, the strong role of security agendas and discourses, media justification and a muted reaction by the public have hindered a more fundamental review of surveillance practices so far and have moved policy debate towards the expansion, rather than the restriction, of surveillance in the aftermath of Snowden.

  9. Benefits of Applying Predictive Intelligence to the Space Situational Awareness (SSA) Mission

    Science.gov (United States)

    Lane, B.; Mann, B.; Millard, C.

    Recent events have heightened the interest in providing improved Space Situational Awareness (SSA) to the warfighter using novel techniques that are affordable and effective. The current Space Surveillance Network (SSN) detects, tracks, catalogs and identifies artificial objects orbiting earth and provides information on Resident Space Objects (RSO) as well as new foreign launch (NFL) satellites. The reactive nature of the SSN provides little to no warning on changes to the expected states of these RSOs or NFLs. This paper will detail the use of the historical data collected on RSOs to characterize what their steady state is, proactively help identify when changes or anomalies have occurred using a pattern-of-like activity based intelligence approach, and apply dynamic, adaptive mission planning to the observables that lead up to a NFL. Multiple hypotheses will be carried along with the intent or the changes to the steady state to assist the SSN in tasking the various sensors in the network to collect the relevant data needed to help prune the number of hypotheses by assigning likelihood to each of those activities. Depending on the hypothesis and thresholds set, these likelihoods will then be used in turn to alert the SSN operator with changes to the steady state, prioritize additional data collections, and provide a watch list of likely next activities.

  10. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... may become lodged in the esophagus and cause pain, even though they are able to swallow. Larger ... the stomach or intestines can cause severe abdominal pain, fever, fainting and shock. Foreign bodies in the ...

  11. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... taking and allergies, especially to iodinated contrast materials. Leave jewelry at home and wear loose, comfortable clothing. ... blood vessels, so your physician may choose to leave it in place. The majority of foreign bodies ...

  12. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... tissue, such as a splinter embedded under the skin, you may undergo an ultrasound, x-ray or ... that gets embedded in the tissue under the skin. Soft tissue foreign bodies can cause infection and ...

  13. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... digestive tract. Other drugs taken by mouth can help blunt foreign objects pass through the digestive tract ... a thin tube that can be used to help trap smooth objects like a marble, or to ...

  14. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... into the soft tissues. Commonly swallowed objects include coins, buttons, pins, nails, glass pieces, toothpicks, batteries, small ... or a special detector. Many foreign bodies, like coins and batteries, are radio-opaque, meaning that x- ...

  15. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... saved. Using an ultrasound transducer to visualize the location of the object, the physician may make an ... the surgical instrument as it advances to the location of the foreign object in real-time. Your ...

  16. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... in the esophagus, you may receive an intravenous drug to relax the esophagus and allow the object to pass through the digestive tract. Other drugs taken by mouth can help blunt foreign objects ...

  17. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... small toys or pieces of toys and fish bones. Swallowing of magnets can cause significant problems including ... like toothpicks. Small esophageal foreign bodies like fish bones also may be difficult to visualize. Additional evaluation ...

  18. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... extended over the patient while an x-ray film holder or image recording plate is placed beneath ... through the body, recording an image on photographic film or a special detector. Many foreign bodies, like ...

  19. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... the large intestine, causing cramps, bloating, loss of appetite, vomiting, and sometimes fever. A sharp object that ... top of page What are the benefits vs. risks? Benefits Removal of a foreign body will reduce ...

  20. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... pregnant. Many imaging tests are not performed during pregnancy so as not to expose the fetus to ... See the Safety page for more information about pregnancy and x-rays. If the foreign body is ...

  1. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... object is solid or filled with fluid). In medicine, ultrasound is used to detect changes in appearance, ... Anesthesia Safety X-ray, Interventional Radiology and Nuclear Medicine Radiation Safety Videos related to Foreign Body Retrieval ...

  2. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... only 10 to 20 percent of the time. Evaluation and treatment will depend on the type of ... bones also may be difficult to visualize. Additional evaluation is required when the suspected foreign body is ...

  3. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... batteries, small toys or pieces of toys and fish bones. Swallowing of magnets can cause significant problems ... bodies like toothpicks. Small esophageal foreign bodies like fish bones also may be difficult to visualize. Additional ...

  4. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... two snares. The catheter is guided into place just beyond the foreign object using x-ray fluoroscopy. ... perform surgery using ultrasound guidance. Ultrasound provides real-time imaging, making it a good tool for guiding ...

  5. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... recording an image on photographic film or a special detector. Many foreign bodies, like coins and batteries, ... or white on x-ray. Fluoroscopy is a special x-ray technique that makes it possible to ...

  6. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... include coins, buttons, pins, nails, glass pieces, toothpicks, batteries, small toys or pieces of toys and fish ... foreign body ingestions. Sometimes problems occur when button batteries are swallowed as mercury within the batteries can ...

  7. Foreign Data Library

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Foreign Data Library consists of meteorological data from nations other than the United States. The data are on original observational forms, in publications,...

  8. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... related to Foreign Body Retrieval Sponsored by Please note RadiologyInfo.org is not a medical facility. Please ... is further reviewed by committees from the American College of Radiology (ACR) and the Radiological Society of ...

  9. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... pieces of toys and fish bones. Swallowing of magnets can cause significant problems including bowel blockages that may require surgical removal of magnets. Children account for about 80 percent of foreign ...

  10. Foreign object - swallowed

    Science.gov (United States)

    ... Nelson Textbook of Pediatrics . 20th ed. Philadelphia, PA: Elsevier; 2016:chap 327. Pfau PR, Hancock SM. Foreign ... Gastrointestinal and Liver Disease . 10th ed. Philadelphia, PA: Elsevier Saunders; 2016:chap 27. Schoem SR, Rosbe KW, ...

  11. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... tissues. top of page What are some common uses of the procedure? Foreign body retrieval is used ... community, you can search the ACR-accredited facilities database . This website does not provide cost information. The ...

  12. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... as infection. top of page What are the benefits vs. risks? Benefits Removal of a foreign body will reduce your ... cancer from excessive exposure to radiation. However, the benefit of an accurate diagnosis far outweighs the risk. ...

  13. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... especially to iodinated contrast materials. Leave jewelry at home and wear loose, comfortable clothing. You may be ... relative or friend accompany you and drive you home afterward. Foreign bodies are typically dealt with in ...

  14. Foreign material exclusion program

    International Nuclear Information System (INIS)

    Perez Moreno, J.; Folguera Mateo, M.

    2015-01-01

    Foreign material is any element that is not part of the system as it has been designed. For example dirt, loose parts, wires, chips, etc. that may affect the operation of the system or component. (Author)

  15. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... bodies. top of page How does the procedure work? Your physician may use an x-ray or ... not a bowel obstruction from the magnets pulling together parts of bowel. Removal of soft-tissue foreign ...

  16. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... that may require surgical removal of magnets. Children account for about 80 percent of foreign body ingestions. ... anesthesia) and no IV. top of page Additional Information and Resources Society of Interventional Radiology (SIR) - Patient ...

  17. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... stuck in their throat or esophagus. Drooling and difficulty swallowing are common symptoms. A small sharp object ... able to view the surgical instrument as it advances to the location of the foreign object in ...

  18. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... you ingest a foreign body or witness a child ingest one or suspect the presence of a ... have special pediatric considerations. The teddy bear denotes child-specific content. Related Articles and Media Computed Tomography ( ...

  19. The plays and arts of surveillance: studying surveillance as entertainment

    NARCIS (Netherlands)

    Albrechtslund, Anders; Dubbeld, L.

    2006-01-01

    This paper suggests a direction in the development of Surveillance Studies that goes beyond current attention for the caring, productive and enabling aspects of surveillance practices. That is, surveillance could be considered not just as positively protective, but even as a comical, playful,

  20. Esophageal Foreign Bodies

    Directory of Open Access Journals (Sweden)

    Ufuk Cobanoglu

    2014-04-01

    Full Text Available Esophageal foreign body aspiration is a common event which can cause serious morbidity and mortality in the children and adult population. For that reason, early diagnosis and treatment are crucial for preventing these life threateining complications. Children most often ingest coins and toys whereas adults commonly tend to have problems with meat and bones. Esophageal foreign bodies are located at the cricopharyngeus muscle level in 70%, the thoracic esophagus in 15% and the gastroesophageal junction in the remaining 15%. Symptoms can vary according to the shape and structure of the ingested object, type of location, patient%u2019s age and complications caused by the foreign body. Delay in treatment, esophageal perforation and an underlying esophageal disease are poor prognostic factors. In treatment, observation, foley catheter, rigid or flexible esophagoscopy and removing the foreign body with a Magill forceps, pushing the foreign body into the stomach, giving intravenous glucagon and surgical treatment methods can be used. Rigid esophagoscopy is an effective and safe procedure for foreign body diagnosis and removal. Improved endoscopic experience and clinical management of thoracic surgeons led to reduced morbidity and mortality in recent years. Most of those emergencies of childhood are preventable. Family education is very important.

  1. Creating National Attraction: Military Intelligence Sharing Building Foreign Military Interdependence

    Science.gov (United States)

    2015-05-21

    the Brazilian military.57 The establishment of an enduring program, even after the departure of US personnel, indicated the successful nature of...United States, coming to support the United States in a time of crisis went a long way to begin rebuilding a relationship that was in decline since the

  2. Foreign language reading and spelling in gifted students with dyslexia in secondary education

    OpenAIRE

    van Viersen, Sietske; de Bree, Elise H.; Kalee, Lilian; Kroesbergen, Evelyn H.; de Jong, Peter F.

    2017-01-01

    A few studies suggest that gifted children with dyslexia have better literacy skills than averagely intelligent children with dyslexia. This finding aligns with the hypothesis that giftedness-related factors provide compensation for poor reading. The present study investigated whether, as in the native language (NL), the level of foreign language (FL) literacy of gifted students with dyslexia is higher than the literacy level of averagely intelligent students with dyslexia and whether this di...

  3. ‘ SILENT’ LARYNGEAL FOREIGN BODY

    OpenAIRE

    Chandrasekhar; Sreenivas

    2015-01-01

    Laryngeal foreign bodies in adults are rare. The foreign bodies accidentally entering the larynx are symptomatic in the form of choking , stridor or even death. We are presenting a rare case of foreign body in the larynx in a 42 year old male who was symptom free except for dysphonia. The foreign body was removed successfully under local anesthesia.

  4. An Empirical Examination of the Association between Multiple Intelligences and Language Learning Self-Efficacy among TEFL University Students

    Science.gov (United States)

    Moafian, Fatemeh; Ebrahimi, Mohammad Reza

    2015-01-01

    The current study investigated the association between multiple intelligences and language learning efficacy expectations among TEFL (Teaching English as a Foreign Language) university students. To fulfill the aim of the study, 108 junior and senior TEFL students were asked to complete the "Multiple Intelligence Developmental Assessment…

  5. Conic surveillance evasion

    NARCIS (Netherlands)

    Lewin, J.; Olsder, G.J.

    1979-01-01

    A surveillance-evasion differential game of degree with a detection zone in the shape of a two-dimensional cone is posed. The nature of the optimal strategies and the singular phenomena of the value function are described and correlated to subsets of the space of all possible parameter combinations,

  6. Laser surveillance system (LASSY)

    International Nuclear Information System (INIS)

    Boeck, H.; Hammer, J.

    1988-01-01

    The development progress during the reporting period 1988 of the laser surveillance system of spent fuel pools is summarized. The present engineered system comes close to a final version for field application as all technical questions have been solved in 1988. 14 figs., 1 tab. (Author)

  7. Laser surveillance system (LASSY)

    International Nuclear Information System (INIS)

    Boeck, H.

    1991-09-01

    Laser Surveillance System (LASSY) is a beam of laser light which scans a plane above the water or under-water in a spent-fuel pond. The system can detect different objects and estimates its coordinates and distance as well. LASSY can operate in stand-alone configuration or in combination with a video surveillance to trigger signal to a videorecorder. The recorded information on LASSY computer's disk comprises date, time, start and stop angle of detected alarm, the size of the disturbance indicated in number of deviated points and some other information. The information given by the laser system cannot be fully substituted by TV camera pictures since the scanning beam creates a horizontal surveillance plan. The engineered prototype laser system long-term field test has been carried out in Soluggia (Italy) and has shown its feasibility and reliability under the conditions of real spent fuel storage pond. The verification of the alarm table on the LASSY computer with the recorded video pictures of TV surveillance system confirmed that all alarm situations have been detected. 5 refs

  8. Infectieziekten Surveillance Informatie Systeem

    NARCIS (Netherlands)

    Sprenger MJW; van Pelt W; CIE

    1994-01-01

    In the Netherlands an electronic network has been proposed for structured data transfer and communication concerning the control of infectious diseases. This project has been baptized ISIS (Infectious diseases Surveillance Information System). It is an initiative of the Dutch Government. ISIS

  9. Surveillance and Communication

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Albrechtslund, Anders; Lauritsen, Peter

    2017-01-01

    , and acquaintances are up to on social media. In turn, they also leave trails of digital footprints that may be collected and analyzed by governments, businesses, or hackers. The imperceptible nature of this new surveillance raises some pressing concerns about our digital lives as our data doubles increasingly...

  10. Social intelligence, human intelligence and niche construction.

    Science.gov (United States)

    Sterelny, Kim

    2007-04-29

    This paper is about the evolution of hominin intelligence. I agree with defenders of the social intelligence hypothesis in thinking that externalist models of hominin intelligence are not plausible: such models cannot explain the unique cognition and cooperation explosion in our lineage, for changes in the external environment (e.g. increasing environmental unpredictability) affect many lineages. Both the social intelligence hypothesis and the social intelligence-ecological complexity hybrid I outline here are niche construction models. Hominin evolution is hominin response to selective environments that earlier hominins have made. In contrast to social intelligence models, I argue that hominins have both created and responded to a unique foraging mode; a mode that is both social in itself and which has further effects on hominin social environments. In contrast to some social intelligence models, on this view, hominin encounters with their ecological environments continue to have profound selective effects. However, though the ecological environment selects, it does not select on its own. Accidents and their consequences, differential success and failure, result from the combination of the ecological environment an agent faces and the social features that enhance some opportunities and suppress others and that exacerbate some dangers and lessen others. Individuals do not face the ecological filters on their environment alone, but with others, and with the technology, information and misinformation that their social world provides.

  11. Automated surveillance of reactor coolant pump performance

    International Nuclear Information System (INIS)

    Gross, K.C.; Singer, R.M.; Humenik, K.E.

    1992-01-01

    An artificial intelligence based expert system has been developed for continuous surveillance and diagnosis of centrifugal-type reactor coolant pump (RCP) performance and operability. The expert system continuously monitors digitized signals from a variety of physical variables (speed, vibration level, motor power, discharge pressure) associated with RCP performance for annunciation of the incipience or onset of off-normal operation. The system employs an extremely sensitive pattern-recognition technique, the sequential probability ratio test (SPRT) for rapid identification of pump operability degradation. The sequential statistical analysis of the signal noise has been shown to provide the theoretically shortest sampling time to detect disturbances and thus has the potential of providing incipient fault detection information to operators sufficiently early to avoid forced plant shutdowns. The sensitivity and response time of the expert system are analyzed in this paper using monte carlo simulation techniques

  12. USBcat - Towards an Intrusion Surveillance Toolset

    Directory of Open Access Journals (Sweden)

    Chris Chapman

    2014-10-01

    Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.

  13. The Relationship between Iranian EFL Learners’ Multiple Intelligences and their Writing Performance across Different Genders

    Directory of Open Access Journals (Sweden)

    Helen Alizadeh

    2014-05-01

    Full Text Available After Gardner’s Multiple Intelligences Theory (MIT, some language teaching practitioners set out to teach students in a way to help their dominant intelligence(s blossom. In an EFL context, usually teachers’ main focus is to develop communication skills. Nowadays, writing is one of the main ways by which people communicate. Thus, this study aimed at investigating possible relationship between Multiple Intelligences and writing performance of Iranian EFL learners across different genders. To conduct this study, 15 male and 15 female advanced EFL learners from a reputable institute in Tabriz participated.  They passed through a placement test to enter the course, yet the researchers administered a Test of English as a Foreign Language (TOEFL to ensure homogeneity in the group. After a session of introducing the project’s purpose, Multiple Intelligence Developmental Assessment (MIDAS questionnaire was administered for obtaining participants’ Multiple Intelligence profile.  Later, the participants were given a text and asked to read and summarize it. The collected writings were analyzed for grammatical accuracy, complexity and quality of the writing based on Jacob et al.’s (1981 scale. The results of the correlational analysis revealed that overall Multiple Intelligences correlated positively with the quality of the female learners’ writing. The findings suggest that English teachers consider the role of multiple intelligences in learning and teaching process and provide more effective activities to help learners of different intelligences improve their foreign language writing skill.

  14. Development of a special topics course on intelligent transportation systems for the Zachry Department of Civil Engineering of Texas A&M University.

    Science.gov (United States)

    2009-08-31

    With Intelligent Transportation Systems (ITS), engineers and system integrators blend emerging : detection/surveillance, communications, and computer technologies with transportation management and : control concepts to improve the safety and mobilit...

  15. Vector-borne disease intelligence: Strategies to deal with disease burden and threats

    Directory of Open Access Journals (Sweden)

    Marieta eBraks

    2014-12-01

    Full Text Available Owing to the complex nature of vector-borne diseases, whereby monitoring of human case patients does not suffice, public health authorities experience challenges in surveillance and control of vector-borne diseases. Knowledge on the presence and distribution of vectors and the pathogens they transmit is vital to a risk assessment process to permit effective early warning, surveillance and control of vector-borne diseases. Upon accepting this reality, public health authorities face the phenomenon of an exponential rise in the number of possible surveillance targets and how to decide which are essential. Here, . we propose a comprehensive approach that integrates three surveillance strategies: population-based surveillance, disease-based surveillance and context-based surveillance for EU member states to tailor the best surveillance strategy for control of vector-borne diseases in their geographic region. By classifying the surveillance structure into 5 different contexts, we hope to provide guidance in optimizing surveillance efforts. Contextual surveillance strategies for vector-borne diseases entail combining organization and data collection approaches that result in disease intelligence rather than a preset static structure.

  16. Does Foreign Aid increase Foreign Direct Investment?

    DEFF Research Database (Denmark)

    Selaya, Pablo; Sunesen, Eva Rytter

    2012-01-01

    We examine the idea that aid and FDI are complementary sources of foreign capital. We argue that the relationship between aid and FDI is theoretically ambiguous: aid raises the marginal productivity of capital when used to finance complementary inputs (like public infrastructure and human capital...... investments), but aid may crowd out private investments when it comes in the shape of pure physical capital transfers. Empirically, we find that aid invested in complementary inputs draws in FDI, while aid invested in physical capital crowds it out. The paper shows that the composition of aid matters for its...

  17. Wireless intelligent network: infrastructure before services?

    Science.gov (United States)

    Chu, Narisa N.

    1996-01-01

    The Wireless Intelligent Network (WIN) intends to take advantage of the Advanced Intelligent Network (AIN) concepts and products developed from wireline communications. However, progress of the AIN deployment has been slow due to the many barriers that exist in the traditional wireline carriers' deployment procedures and infrastructure. The success of AIN has not been truly demonstrated. The AIN objectives and directions are applicable to the wireless industry although the plans and implementations could be significantly different. This paper points out WIN characteristics in architecture, flexibility, deployment, and value to customers. In order to succeed, the technology driven AIN concept has to be reinforced by the market driven WIN services. An infrastructure suitable for the WIN will contain elements that are foreign to the wireline network. The deployment process is expected to seed with the revenue generated services. Standardization will be achieved by simplifying and incorporating the IS-41C, AIN, and Intelligent Network CS-1 recommendations. Integration of the existing and future systems impose the biggest challenge of all. Service creation has to be complemented with service deployment process which heavily impact the carriers' infrastructure. WIN deployment will likely start from an Intelligent Peripheral, a Service Control Point and migrate to a Service Node when sufficient triggers are implemented in the mobile switch for distributed call control. The struggle to move forward will not be based on technology, but rather on the impact to existing infrastructure.

  18. Integrated Air Surveillance Concept of Operations

    Science.gov (United States)

    2011-11-01

    Intelligence (SIGINT) Human Intelligence (HUMINT) Measurement and Signature Intelligence (MASINT) Open Source Intelligence ( OSINT ) In...Office of Management and Budget OpsCon: Operational Concept OSINT : Open Source Intelligence OSTP: Office of Science & Technology Policy Pt–to-Pt...data, all- source intelligence , law enforcement information and relevant open - source data from public and private sectors,

  19. Brain Intelligence: Go Beyond Artificial Intelligence

    OpenAIRE

    Lu, Huimin; Li, Yujie; Chen, Min; Kim, Hyoungseop; Serikawa, Seiichi

    2017-01-01

    Artificial intelligence (AI) is an important technology that supports daily social life and economic activities. It contributes greatly to the sustainable growth of Japan's economy and solves various social problems. In recent years, AI has attracted attention as a key for growth in developed countries such as Europe and the United States and developing countries such as China and India. The attention has been focused mainly on developing new artificial intelligence information communication ...

  20. Are Emotionally Intelligent EFL Teachers More Satisfied Professionally?

    Directory of Open Access Journals (Sweden)

    Mohammad Hossein Hekmatzadeh

    2016-03-01

    Full Text Available Despite the fact that Intelligence Quotient (IQ is an important factor in one’s success in terms of working environment, it is believed that emotional quotient or EQ plays a more important role. With that in mind, this study investigated the relationship between emotional intelligence and job satisfaction of English as Foreign Language (EFL teachers who work at private language institutes in Iran/Shiraz. Furthermore, this study tried to answer whether there is a significant difference between emotional intelligence and job satisfaction of Iranian’s EFL teachers in terms of gender.  A 90-item Bar-On questionnaire was used to measure the teachers’ emotional intelligence; also, a modified version of Karavas’s (2010 job satisfaction scale was used to see how satisfied our teachers are with their teaching career. To answer the research question, Pearson Product-Moment Correlation Coefficient statistical test was run. The results showed that there was a positive and significant correlation between emotional intelligence and job satisfaction of EFL teachers in Iran/Shiraz. Furthermore, the results revealed that there was a statistically significant difference in emotional intelligence between EFL male and female teachers, but there was no statistically significant relationship between Iranian EFL teachers’ job satisfaction in terms of gender. Based on our findings, it is suggested that some preparatory courses aiming at enhancing the important psychological traits such as emotional intelligence should be incorporated in educational programs designed for novice teachers so that it will contribute to pedagogical improvement.

  1. The neural processing of foreign-accented speech and its relationship to listener bias

    Directory of Open Access Journals (Sweden)

    Han-Gyol eYi

    2014-10-01

    Full Text Available Foreign-accented speech often presents a challenging listening condition. In addition to deviations from the target speech norms related to the inexperience of the nonnative speaker, listener characteristics may play a role in determining intelligibility levels. We have previously shown that an implicit visual bias for associating East Asian faces and foreignness predicts the listeners’ perceptual ability to process Korean-accented English audiovisual speech (Yi et al., 2013. Here, we examine the neural mechanism underlying the influence of listener bias to foreign faces on speech perception. In a functional magnetic resonance imaging (fMRI study, native English speakers listened to native- and Korean-accented English sentences, with or without faces. The participants’ Asian-foreign association was measured using an implicit association test (IAT, conducted outside the scanner. We found that foreign-accented speech evoked greater activity in the bilateral primary auditory cortices and the inferior frontal gyri, potentially reflecting greater computational demand. Higher IAT scores, indicating greater bias, were associated with increased BOLD response to foreign-accented speech with faces in the primary auditory cortex, the early node for spectrotemporal analysis. We conclude the following: (1 foreign-accented speech perception places greater demand on the neural systems underlying speech perception; (2 face of the talker can exaggerate the perceived foreignness of foreign-accented speech; (3 implicit Asian-foreign association is associated with decreased neural efficiency in early spectrotemporal processing.

  2. Surface-water surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Saldi, K.A.; Dirkes, R.L.; Blanton, M.L.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the Surface water on and near the Hanford Site is monitored to determine the potential effects of Hanford operations. Surface water at Hanford includes the Columbia River, riverbank springs, ponds located on the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site. Columbia River sediments are also included in this discussion. Tables 5.3.1 and 5.3.2 summarize the sampling locations, sample types, sampling frequencies, and sample analyses included in surface-water surveillance activities during 1994. Sample locations are also identified in Figure 5.3.1. This section describes the surveillance effort and summarizes the results for these aquatic environments. Detailed analytical results are reported by Bisping (1995).

  3. Water radiological surveillance (II)

    International Nuclear Information System (INIS)

    Pablo San Martin de, M.

    2008-01-01

    This paper summarizes the characteristics of the Environmental Surveillance Radiological Networks (ESRN) currently operating in CEDEX. In the first part, the Spanish Continental Waters ESRN has been presented. This second one describes Spanish Costal Waters ESRN and the High Sensitivity Networks in Continental and Marine Waters. It also presents the Radiological Surveillance of Drinking Waters that CEDEX carries out in waters of public consumption management by the Canal de Isabel II (CYII) and by the Mancomunity of Canals Taibilla (M.C.T.). The legislation applicable in each case is reviewed as well. Due to its extension the article has been divided into two parts. As Spanish Continental Waters ESRN has been reviewed in the first part, the others ESRN are discussed in this second one. (Author) 10 refs

  4. Disaster prevention surveillance system

    International Nuclear Information System (INIS)

    Nara, Satoru; Kamiya, Eisei

    2001-01-01

    Fuji Electric Co., Ltd. has supplied many management systems to nuclear reactor institution. 'The nuclear countermeasures-against-calamities special-measures' was enforced. A nuclear entrepreneur has devised the measure about expansion prevention and restoration of a calamity while it endeavors after prevention of generating of a nuclear calamity. Our company have supplied the 'disaster prevention surveillance system' to the Japan Atomic Energy Research Institute Tokai Research Establishment aiming at strengthening of the monitoring function at the time (after the accident) of the accident used as one of the above-mentioned measures. A 'disaster prevention surveillance system' can share the information on the accident spot in an on-site command place, an activity headquarters, and support organizations, when the serious accident happens. This system is composed of various sensors (temperature, pressure and radiation), cameras, computers and network. (author)

  5. Surface-water surveillance

    International Nuclear Information System (INIS)

    Saldi, K.A.; Dirkes, R.L.; Blanton, M.L.

    1995-01-01

    This section of the 1994 Hanford Site Environmental Report summarizes the Surface water on and near the Hanford Site is monitored to determine the potential effects of Hanford operations. Surface water at Hanford includes the Columbia River, riverbank springs, ponds located on the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site. Columbia River sediments are also included in this discussion. Tables 5.3.1 and 5.3.2 summarize the sampling locations, sample types, sampling frequencies, and sample analyses included in surface-water surveillance activities during 1994. Sample locations are also identified in Figure 5.3.1. This section describes the surveillance effort and summarizes the results for these aquatic environments. Detailed analytical results are reported by Bisping (1995)

  6. Nadzor vazdušnog prostora pasivnim multisenzorskim sistemima / Air surveillance by passive multisensor systems

    Directory of Open Access Journals (Sweden)

    Miljko Erić

    2004-05-01

    Full Text Available Za sprovođenje savremenih operacija, kako na operativno-strategijskom, tako i na taktič kom nivou, izuzetno je važno da se obezbedi kontinuirani nadzor vazdušnog prostora. Poznato je da su aktivni radarski sistemi, na kojima se kod nas trenutno zasniva nadzor vazdušnog prostora, u ratnim uslovima veoma ranjivi i podložni elektronskim i borbenim dejstvima protivnika, što je u toku rata 1999. godine i praktično potvrđeno. Kao alternativa aktivnim radarskim sistemima nameće se koncept pasivnog nadzora vazdušnog prostora korišćenjem distribuiranih multisenzorskih sistema. Predmet širih istraživanja predstavljaju tehnička rešenja integrisanog multisenzorskog sistema za pasivan nadzor vazdušnog prostora, koji se sastoji od sledećih podsistema za nadzor vazdušnog prostora: na radio-gonimetarskom principu u frekvencijskom opsegu 20-3000 MHz, na zvukometrijskom principu, na principu vizuelnih osmatračkih stanica, na termovizijskom i televizijskom principu. U ovom radu analizirani su opšti principi pasivnog nadzora vazdušnog prostora multisenzorskim sistemima i predložena je tehnička koncepcija radio-goniometarskog i zvukometrijskog podsistema. / It is very important to provide continuous air surveillance in to realize modern operations on the operational-strategic level and tactical, as well. It is well known that active radar systems, on which air surveillance is based in our country, are very vulnerable in war times and susceptible to the electronic counter and combat attacks of the enemy, what is shown practically in 1999 war. Air surveillance by passive multi-sensor systems is a possible alternative to the air surveillance by the active radar systems. Subjects of our wider research are technical solutions of integrated multi-sensor systems for passive air surveillance which consists of the following subsystems: a subsystem for the air communication intelligence within the frequency range 20-3000 MHz based on intercept

  7. Medical Surveillance Monthly Report

    Science.gov (United States)

    2016-12-01

    Illness Prevention and Sun Safety. “Sun Safety.” https:// phc.amedd.army.mil/ topics /discond/hipss/Pages/ SunSafety.aspx. Accessed on 7 December 2016. 22...febrile illness; however, after its wide- spread introduction into immunologically MSMR Vol. 23 No. 12 December 2016 Page 8 naïve populations, a...October 2016 (data as of 22 November 2016) MSMR’s Invitation to Readers Medical Surveillance Monthly Report (MSMR) invites readers to submit topics for

  8. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  9. History of trichinellosis surveillance

    Directory of Open Access Journals (Sweden)

    Blancou J.

    2001-06-01

    Full Text Available The origin of trichinellosis, which existed in ancient times as testified by the discovery of parasite larvae on an Egyptian mummy, unfolded in several stages: discovery of encapsulated larvae (in the 1820s, identification and scientific description of these larvae (Paget Owen, 1835, followed by experimental infestations of animals (dogs, pigs, rabbits, mice or of humans as from 1850.The main occurrences of trichinellosis were followed with particular attention in Europe (Germany, Denmark, France, etc. and in the United States of America at the end of the XIXth century. They affected numerous domestic animal species (pigs, horses, etc. or wildlife and humans. Germany paid the heaviest toll with regard to the disease in humans, between 1860 and 1880, with several thousands of patients and more than 500 deaths.Different trichinellosis surveillance systems were set up in the relevant countries in the 1860s. In humans, this surveillance was carried out on affected living patients by a biopsy of the biceps muscles and subsequently by an analysis of eosinophilia (1895. In animals, surveillance was for a long time solely based on postmortem examination of the muscles of the affected animals. This method was used for the first time in 863 in Germany, and from the 1 890s, on several hundreds of thousands of pigs in Europe or in the United States of America.

  10. FOREIGN CURRENCY RISK HEDGING

    Directory of Open Access Journals (Sweden)

    Mihaela SUDACEVSCHI

    2017-05-01

    Full Text Available This paper presents the traditional types of exchange rate risk faced by firms and some of principal methods of exchange risk management that a company which make foreign currency operations can use. Foreign currency risk management involves both assessing the risk faced by the companies and adopting measures for the risk hedging or reduce the damage it may cause. The damages result from the company’s unfavorable difference between the exchange rates of the currencies in which the transactions are made.

  11. Quo Vadis, Artificial Intelligence?

    OpenAIRE

    Berrar, Daniel; Sato, Naoyuki; Schuster, Alfons

    2010-01-01

    Since its conception in the mid 1950s, artificial intelligence with its great ambition to understand and emulate intelligence in natural and artificial environments alike is now a truly multidisciplinary field that reaches out and is inspired by a great diversity of other fields. Rapid advances in research and technology in various fields have created environments into which artificial intelligence could embed itself naturally and comfortably. Neuroscience with its desire to understand nervou...

  12. Principles of artificial intelligence

    CERN Document Server

    Nilsson, Nils J

    1980-01-01

    A classic introduction to artificial intelligence intended to bridge the gap between theory and practice, Principles of Artificial Intelligence describes fundamental AI ideas that underlie applications such as natural language processing, automatic programming, robotics, machine vision, automatic theorem proving, and intelligent data retrieval. Rather than focusing on the subject matter of the applications, the book is organized around general computational concepts involving the kinds of data structures used, the types of operations performed on the data structures, and the properties of th

  13. Intelligence of programs

    Energy Technology Data Exchange (ETDEWEB)

    Novak, D

    1982-01-01

    A general discussion about the level of artificial intelligence in computer programs is presented. The suitability of various languages for the development of complex, intelligent programs is discussed, considering fourth-generation language as well as the well established structured COBOL language. It is concluded that the success of automation in many administrative fields depends to a large extent on the development of intelligent programs.

  14. Intelligence analysis – the royal discipline of Competitive Intelligence

    OpenAIRE

    František Bartes

    2011-01-01

    The aim of this article is to propose work methodology for Competitive Intelligence teams in one of the intelligence cycle’s specific area, in the so-called “Intelligence Analysis”. Intelligence Analysis is one of the stages of the Intelligence Cycle in which data from both the primary and secondary research are analyzed. The main result of the effort is the creation of added value for the information collected. Company Competiitve Intelligence, correctly understood and implemented in busines...

  15. Machine listening intelligence

    Science.gov (United States)

    Cella, C. E.

    2017-05-01

    This manifesto paper will introduce machine listening intelligence, an integrated research framework for acoustic and musical signals modelling, based on signal processing, deep learning and computational musicology.

  16. STANFORD ARTIFICIAL INTELLIGENCE PROJECT.

    Science.gov (United States)

    ARTIFICIAL INTELLIGENCE , GAME THEORY, DECISION MAKING, BIONICS, AUTOMATA, SPEECH RECOGNITION, GEOMETRIC FORMS, LEARNING MACHINES, MATHEMATICAL MODELS, PATTERN RECOGNITION, SERVOMECHANISMS, SIMULATION, BIBLIOGRAPHIES.

  17. Intelligent Optics Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Intelligent Optics Laboratory supports sophisticated investigations on adaptive and nonlinear optics; advancedimaging and image processing; ground-to-ground and...

  18. Intelligence and childlessness.

    Science.gov (United States)

    Kanazawa, Satoshi

    2014-11-01

    Demographers debate why people have children in advanced industrial societies where children are net economic costs. From an evolutionary perspective, however, the important question is why some individuals choose not to have children. Recent theoretical developments in evolutionary psychology suggest that more intelligent individuals may be more likely to prefer to remain childless than less intelligent individuals. Analyses of the National Child Development Study show that more intelligent men and women express preference to remain childless early in their reproductive careers, but only more intelligent women (not more intelligent men) are more likely to remain childless by the end of their reproductive careers. Controlling for education and earnings does not at all attenuate the association between childhood general intelligence and lifetime childlessness among women. One-standard-deviation increase in childhood general intelligence (15 IQ points) decreases women's odds of parenthood by 21-25%. Because women have a greater impact on the average intelligence of future generations, the dysgenic fertility among women is predicted to lead to a decline in the average intelligence of the population in advanced industrial nations. Copyright © 2014 Elsevier Inc. All rights reserved.

  19. Routledge companion to intelligence studies

    CERN Document Server

    Dover, Robert; Hillebrand, Claudia

    2013-01-01

    The Routledge Companion to Intelligence Studies provides a broad overview of the growing field of intelligence studies. The recent growth of interest in intelligence and security studies has led to an increased demand for popular depictions of intelligence and reference works to explain the architecture and underpinnings of intelligence activity. Divided into five comprehensive sections, this Companion provides a strong survey of the cutting-edge research in the field of intelligence studies: Part I: The evolution of intelligence studies; Part II: Abstract approaches to intelligence; Part III: Historical approaches to intelligence; Part IV: Systems of intelligence; Part V: Contemporary challenges. With a broad focus on the origins, practices and nature of intelligence, the book not only addresses classical issues, but also examines topics of recent interest in security studies. The overarching aim is to reveal the rich tapestry of intelligence studies in both a sophisticated and accessible way. This Companion...

  20. Intelligent Component Monitoring for Nuclear Power Plants

    International Nuclear Information System (INIS)

    Tsoukalas, Lefteri

    2010-01-01

    Reliability and economy are two major concerns for a nuclear power generation system. Next generation nuclear power reactors are being developed to be more reliable and economic. An effective and efficient surveillance system can generously contribute toward this goal. Recent progress in computer systems and computational tools has made it necessary and possible to upgrade current surveillance/monitoring strategy for better performance. For example, intelligent computing techniques can be applied to develop algorithm that help people better understand the information collected from sensors and thus reduce human error to a new low level. Incidents incurred from human error in nuclear industry are not rare and have been proven costly. The goal of this project is to develop and test an intelligent prognostics methodology for predicting aging effects impacting long-term performance of nuclear components and systems. The approach is particularly suitable for predicting the performance of nuclear reactor systems which have low failure probabilities (e.g., less than 10 -6 year -1 ). Such components and systems are often perceived as peripheral to the reactor and are left somewhat unattended. That is, even when inspected, if they are not perceived to be causing some immediate problem, they may not be paid due attention. Attention to such systems normally involves long term monitoring and possibly reasoning with multiple features and evidence, requirements that are not best suited for humans.

  1. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... to the location of the foreign object in real-time. Your physician also may locate soft-tissue objects by probing the wound. Additional tests ... prevent a potentially deadly infection of the nervous system. In some ... Ultrasound provides real-time imaging, making it a good tool for guiding ...

  2. Foreign Firms, Domestic Wages

    DEFF Research Database (Denmark)

    Malchow-Møller, Nikolaj; Schjerning, Bertel; R. Markusen, James

    2013-01-01

    Three types of theories have been used to explain the wage premium in foreign firms: the theories of heterogeneous workers, heterogeneous learning, and heterogeneous firms. We set up a model that explicitly encompasses two of these theories, and that can illustrate the third. This unifying...

  3. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... levels of sedative and anesthetic. Ultrasound may be used to guide the foreign body removal procedure. After you are positioned on the examination table, the radiologist or sonographer will apply some warm water-based gel on your skin and then place ...

  4. Danish foreign fighters

    DEFF Research Database (Denmark)

    Larsen, Chris Holmsted

    2017-01-01

    The aim of this contribution is, through a comparative historical perspective, to analyse the particular phenomenon of foreign fighters, which in recent years, as a consequence of the proliferation of conflicts in Syria, Iraq and Ukraine, have emerged in Danish society as a major security concern...

  5. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... endoscopic or surgical intervention is required only 10 to 20 percent of the time. Evaluation and treatment will depend on the type ... to view the surgical instrument as it advances to the location of the foreign object in real-time. Your physician also may locate soft-tissue objects ...

  6. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... advances to the location of the foreign object in real-time. Your physician also may locate soft-tissue objects ... perform surgery using ultrasound guidance. Ultrasound provides real-time imaging, making it a good tool for guiding removal procedures. In some cases, it is potentially more harmful to ...

  7. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... and push the object farther down. In some cases, prompt removal of the foreign body is necessary. Common procedures include: Flexible esophagoscopy Flexible esophagoscopy is a common diagnostic examination that enables a safe and detailed visual study of the esophagus while the patient is under ...

  8. Foreign language interactive didactics

    Directory of Open Access Journals (Sweden)

    Arnaldo Moisés Gómez

    2016-06-01

    Full Text Available Foreign Language Interactive Didactics is intended for foreign language teachers and would-be teachers since it is an interpretation of the foreign language teaching-learning process is conceived from a reflexive social interaction. This interpretation declares learning based on interactive tasks that provide learners with opportunities to interact meaningfully among them, as a way to develop interactional competence as objective in itself and as a means to obtain communicative competence. Foreign language interactive didactics claims for the unity of reflection and action while learning the language system and using it to communicate, by means of solving problems presented in interactive tasks. It proposes a kind of teaching that is interactive, developmental, collaborative, holist, cognitive, problematizing, reflexive, student centered, humanist, and with a strong affective component that empower the influencing psychological factors in learning. This conception appears in the book: DIDÁCTICA INTERACTIVA DE LENGUAS (2007 y 2010. The book is used as a textbook for the subject of Didactics that is part of the curriculum in language teachers’ formation of all the pedagogical sciences universities, in Spanish teachers’ formation who are not Spanish speaking people at Havana University, and also as a reference book for postgraduate courses, master’s and doctorate’ s degrees.

  9. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... sound waves), as well as the type of body structure and composition of body tissue through which the sound travels. A small ... complications. There is always a slight chance of cancer from excessive exposure ... limitations of foreign body detection and removal? The primary limitation of an ...

  10. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... Foreign Body Retrieval Sponsored by Please note RadiologyInfo.org is not a medical facility. Please contact your ... links: For the convenience of our users, RadiologyInfo .org provides links to relevant websites. RadiologyInfo.org , ACR ...

  11. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... so as not to expose the fetus to radiation. If an x-ray is necessary, precautions will be taken to minimize ... Safety page for more information about pregnancy and x-rays. If the foreign body is lodged in a ...

  12. Parliaments and Foreign Policy

    NARCIS (Netherlands)

    Wagner, W.M.; Haney, Patrick; Harnisch, Sebastian; Kaarbo, Juliet; Oppermann, Kai; Tago, Atsushi

    Parliaments differ enormously in their foreign policy competences. This is best documented in the area of “war powers,” understood as decision-making on the use of force. In other issue areas, such as treaty-making, defense budgets, sanctions, or arms exports, differences across countries are far

  13. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... on the type of foreign body and how it was introduced. If it was swallowed, you may undergo a direct examination ... and esophagus or an x-ray examination. If it is lodged in a soft tissue, such as ...

  14. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... of it. Esophageal bougienage For this procedure, you will sit upright while the physician passes a device from the mouth to the stomach that helps dilate, or widen, the esophagus. This helps advance the foreign body into the stomach, from where ...

  15. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... provides real-time imaging, making it a good tool for guiding removal procedures. In some cases, it is potentially more harmful to remove the ... provides real-time imaging, making it a good tool for guiding foreign body removal ... rare cases, the general anesthesia used during rigid esophagoscopy can ...

  16. Foreign Body Retrieval

    Medline Plus

    Full Text Available ... by a computer, which in turn creates a real-time picture on the monitor. One or more frames ... to the location of the foreign object in real-time. Your physician also may locate soft-tissue objects ...

  17. Artificial Consciousness or Artificial Intelligence

    OpenAIRE

    Spanache Florin

    2017-01-01

    Artificial intelligence is a tool designed by people for the gratification of their own creative ego, so we can not confuse conscience with intelligence and not even intelligence in its human representation with conscience. They are all different concepts and they have different uses. Philosophically, there are differences between autonomous people and automatic artificial intelligence. This is the difference between intelligence and artificial intelligence, autonomous versus a...

  18. 2015 Chinese Intelligent Systems Conference

    CERN Document Server

    Du, Junping; Li, Hongbo; Zhang, Weicun; CISC’15

    2016-01-01

    This book presents selected research papers from the 2015 Chinese Intelligent Systems Conference (CISC’15), held in Yangzhou, China. The topics covered include multi-agent systems, evolutionary computation, artificial intelligence, complex systems, computation intelligence and soft computing, intelligent control, advanced control technology, robotics and applications, intelligent information processing, iterative learning control, and machine learning. Engineers and researchers from academia, industry and the government can gain valuable insights into solutions combining ideas from multiple disciplines in the field of intelligent systems.

  19. Foreign Objects in the Rectum

    Science.gov (United States)

    ... Abscess Anorectal Fistula Foreign Objects in the Rectum Hemorrhoids Levator Syndrome Pilonidal Disease Proctitis Rectal Prolapse (See ... Abscess Anorectal Fistula Foreign Objects in the Rectum Hemorrhoids Levator Syndrome Pilonidal Disease Proctitis Rectal Prolapse NOTE: ...

  20. Foreign Language Reading and Spelling in Gifted Students with Dyslexia in Secondary Education

    Science.gov (United States)

    van Viersen, Sietske; de Bree, Elise H.; Kalee, Lilian; Kroesbergen, Evelyn H.; de Jong, Peter F.

    2017-01-01

    A few studies suggest that gifted children with dyslexia have better literacy skills than averagely intelligent children with dyslexia. This finding aligns with the hypothesis that giftedness-related factors provide compensation for poor reading. The present study investigated whether, as in the native language (NL), the level of foreign language…

  1. 75 FR 35684 - Defense Federal Acquisition Regulation Supplement; Ownership or Control by a Foreign Government...

    Science.gov (United States)

    2010-06-23

    ... Undersecretary of Defense for Intelligence. Additionally, subparagraph (a)(4) of DFARS 252.209-7002, Disclosure... Flexibility Act, 5 U.S.C. 601 et seq., because it only impacts companies that are owned or controlled by a... or controlled by a foreign government. DoD invites comments from small business concerns and other...

  2. The Lab of the Future: Using Technology to Teach Foreign Language.

    Science.gov (United States)

    Underwood, John H.

    1993-01-01

    Describes the role of technology in teaching foreign languages. Offers a brief history of language lab technologies, including computer use for drill-and-practice, text reconstruction, and simulations and games. Discusses tool programs, intelligent systems, video technology, satellite television, videodisc and interactive video, hypertext and…

  3. SARS in Singapore: surveillance strategies in a globalising city.

    Science.gov (United States)

    Teo, Peggy; Yeoh, Brenda S A; Ong, Shir Nee

    2005-06-01

    Public health measures employed to fight against the spread of SARS need to be guided by biomedical knowledge as well as an understanding of the social science aspects of the disease. Using Singapore as a case study, we explore how the state constructs the disease and implements measures targeted at creating a ring of defense around the island and using surveillance to monitor and prevent its spread. While there is support, there is also resentment among some Singaporeans who complain that their right to privacy has been invaded and that over surveillance may have actually occurred. Marginalisation and discrimination have not only affected the local population but in this open economy which is striving to achieve global city status, businesses, tourism, foreign talent, foreign contract workers and foreign students studying in Singapore have also been negatively affected. While Singapore has been applauded by WHO and used as an example of quick and effective response, a holistic approach to the management of infectious disease must address the social implications of strategies that are drawn from medical knowledge alone because it impinges on the social lives of people and how people interact with each other under stressful circumstances.

  4. Wallops Ship Surveillance System

    Science.gov (United States)

    Smith, Donna C.

    2011-01-01

    Approved as a Wallops control center backup system, the Wallops Ship Surveillance Software is a day-of-launch risk analysis tool for spaceport activities. The system calculates impact probabilities and displays ship locations relative to boundary lines. It enables rapid analysis of possible flight paths to preclude the need to cancel launches and allow execution of launches in a timely manner. Its design is based on low-cost, large-customer- base elements including personal computers, the Windows operating system, C/C++ object-oriented software, and network interfaces. In conformance with the NASA software safety standard, the system is designed to ensure that it does not falsely report a safe-for-launch condition. To improve the current ship surveillance method, the system is designed to prevent delay of launch under a safe-for-launch condition. A single workstation is designated the controller of the official ship information and the official risk analysis. Copies of this information are shared with other networked workstations. The program design is divided into five subsystems areas: 1. Communication Link -- threads that control the networking of workstations; 2. Contact List -- a thread that controls a list of protected item (ocean vessel) information; 3. Hazard List -- threads that control a list of hazardous item (debris) information and associated risk calculation information; 4. Display -- threads that control operator inputs and screen display outputs; and 5. Archive -- a thread that controls archive file read and write access. Currently, most of the hazard list thread and parts of other threads are being reused as part of a new ship surveillance system, under the SureTrak project.

  5. Foreign Investment Boosts Rural Economies.

    Science.gov (United States)

    Glasmeier, Amy; Glickman, Norman

    1990-01-01

    Through 1987, 10 percent of foreign investment was in nonmetro counties; 44 percent of this was in the South; and 38 percent of nonmetro foreign investment created new jobs (versus 17 percent in metro areas). Foreign investors chose nonmetro areas with low wages, lack of unionization history, good transportation access, and government incentives.…

  6. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1993-01-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest Laboratory (PNL) for the US Department of Energy (DOE). Samples are routinely collected and analyzed to determine the quality of air, surface water, ground water, soil, sediment, wildlife, vegetation, foodstuffs, and farm products at Hanford Site and surrounding communities. This document contains the planned schedule for routine sample collection for the Surface Environmental Surveillance Project (SESP) and Drinking Water Project, and Ground-Water Surveillance Project.

  7. Self-surveillance

    DEFF Research Database (Denmark)

    Albrechtslund, Anders

    Gadgets and applications are increasingly being developed and used for tracking, quantifying, and documenting everyday life activities and especially health and fitness devices such as GPS-enabled sports watches are well-known and popular. However, self-surveillance practices involving networked...... pressure, fitness activities, sleep cycles, etc. can be broadcasted, e.g. as tweets on Twitter or status updates on Facebook. Such quantification practices with monitoring technologies become co-producing when individuals constitute themselves as subjects engaging in self-tracking, self-care, and self...

  8. Surveillance test interval optimization

    International Nuclear Information System (INIS)

    Cepin, M.; Mavko, B.

    1995-01-01

    Technical specifications have been developed on the bases of deterministic analyses, engineering judgment, and expert opinion. This paper introduces our risk-based approach to surveillance test interval (STI) optimization. This approach consists of three main levels. The first level is the component level, which serves as a rough estimation of the optimal STI and can be calculated analytically by a differentiating equation for mean unavailability. The second and third levels give more representative results. They take into account the results of probabilistic risk assessment (PRA) calculated by a personal computer (PC) based code and are based on system unavailability at the system level and on core damage frequency at the plant level

  9. GSFC Supplier Surveillance

    Science.gov (United States)

    Kelly, Michael P.

    2011-01-01

    Topics covered include: Develop Program/Project Quality Assurance Surveillance Plans The work activities performed by the developer and/or his suppliers are subject to evaluation and audit by government-designated representatives. CSO supports project by selecting on-site supplier representative s by one of several methods: (1) a Defense Contract Management Agency (DCMA) person via a Letter Of Delegation (LOD), (2) an independent assurance contractor (IAC) via a contract Audits, Assessments, and Assurance (A3) Contract Code 300 Mission Assurance Support Contract (MASC)

  10. Distributed intelligence in CAMAC

    International Nuclear Information System (INIS)

    Kunz, P.F.

    1977-01-01

    The CAMAC digital interface standard has served us well since 1969. During this time there have been enormous advances in digital electronics. In particular, low cost microprocessors now make it feasible to consider use of distributed intelligence even in simple data acquisition systems. This paper describes a simple extension of the CAMAC standard which allows distributed intelligence at the crate level

  11. Intelligent design som videnskab?

    DEFF Research Database (Denmark)

    Klausen, Søren Harnow

    2007-01-01

    Diskuterer hvorvidt intelligent design kan betegnes som videnskab; argumenterer for at dette grundet fraværet af klare demarkationskriterier næppe kan afvises.......Diskuterer hvorvidt intelligent design kan betegnes som videnskab; argumenterer for at dette grundet fraværet af klare demarkationskriterier næppe kan afvises....

  12. Distributed intelligence in CAMAC

    International Nuclear Information System (INIS)

    Kunz, P.F.

    1977-01-01

    A simple extension of the CAMAC standard is described which allows distributed intelligence at the crate level. By distributed intelligence is meant that there is more than one source of control in a system. This standard is just now emerging from the NIM Dataway Working Group and its European counterpart. 1 figure

  13. Intelligence and treaty ratification

    International Nuclear Information System (INIS)

    Cahn, A.H.

    1990-01-01

    This paper reports that there are two sets of questions applicable to the ratification phase: what is the role of intelligence in the ratification process? What effect did intelligence have on that process. The author attempts to answer these and other questions

  14. Applying Multiple Intelligences

    Science.gov (United States)

    Christodoulou, Joanna A.

    2009-01-01

    The ideas of multiple intelligences introduced by Howard Gardner of Harvard University more than 25 years ago have taken form in many ways, both in schools and in other sometimes-surprising settings. The silver anniversary of Gardner's learning theory provides an opportunity to reflect on the ways multiple intelligences theory has taken form and…

  15. Next generation Emotional Intelligence

    Science.gov (United States)

    J. Saveland

    2012-01-01

    Emotional Intelligence has been a hot topic in leadership training since Dan Goleman published his book on the subject in 1995. Emotional intelligence competencies are typically focused on recognition and regulation of emotions in one's self and social situations, yielding four categories: self-awareness, self-management, social awareness and relationship...

  16. Intelligence by consent

    DEFF Research Database (Denmark)

    Diderichsen, Adam; Rønn, Kira Vrist

    2017-01-01

    This article contributes to the current discussions concerning an adequate framework for intelligence ethics. The first part critically scrutinises the use of Just War Theory in intelligence ethics with specific focus on the just cause criterion. We argue that using self-defence as justifying cau...

  17. Intelligence and Physical Attractiveness

    Science.gov (United States)

    Kanazawa, Satoshi

    2011-01-01

    This brief research note aims to estimate the magnitude of the association between general intelligence and physical attractiveness with large nationally representative samples from two nations. In the United Kingdom, attractive children are more intelligent by 12.4 IQ points (r=0.381), whereas in the United States, the correlation between…

  18. Intelligence and treaty ratification

    International Nuclear Information System (INIS)

    Naftzinger, J.E.

    1990-01-01

    This paper describes the atmosphere leading up to the Senate INF hearings and then surveys the broad issues they raised. After that, the author highlights several aspects of the intelligence community's involvement and discusses the specific intelligence-related issues as the Senate committees saw them, notes their impact on the outcome, and finally draws several conclusions and lessons pertinent to the future

  19. Intelligence, Race, and Genetics

    Science.gov (United States)

    Sternberg, Robert J.; Grigorenko, Elena L.; Kidd, Kenneth K.

    2005-01-01

    In this article, the authors argue that the overwhelming portion of the literature on intelligence, race, and genetics is based on folk taxonomies rather than scientific analysis. They suggest that because theorists of intelligence disagree as to what it is, any consideration of its relationships to other constructs must be tentative at best. They…

  20. Multiple Intelligences in Action.

    Science.gov (United States)

    Campbell, Bruce

    1992-01-01

    Describes the investigation of the effects of a four-step model program used with third through fifth grade students to implement Gardener's concepts of seven human intelligences--linguistic, logical/mathematical, visual/spatial, musical, kinesthetic, intrapersonal, and interpersonal intelligence--into daily learning. (BB)

  1. The Reproduction of Intelligence

    Science.gov (United States)

    Meisenberg, Gerhard

    2010-01-01

    Although a negative relationship between fertility and education has been described consistently in most countries of the world, less is known about the relationship between intelligence and reproductive outcomes. Also the paths through which intelligence influences reproductive outcomes are uncertain. The present study uses the NLSY79 to analyze…

  2. Intelligent robot action planning

    Energy Technology Data Exchange (ETDEWEB)

    Vamos, T; Siegler, A

    1982-01-01

    Action planning methods used in intelligent robot control are discussed. Planning is accomplished through environment understanding, environment representation, task understanding and planning, motion analysis and man-machine communication. These fields are analysed in detail. The frames of an intelligent motion planning system are presented. Graphic simulation of the robot's environment and motion is used to support the planning. 14 references.

  3. Computational Intelligence in Intelligent Data Analysis

    CERN Document Server

    Nürnberger, Andreas

    2013-01-01

    Complex systems and their phenomena are ubiquitous as they can be found in biology, finance, the humanities, management sciences, medicine, physics and similar fields. For many problems in these fields, there are no conventional ways to mathematically or analytically solve them completely at low cost. On the other hand, nature already solved many optimization problems efficiently. Computational intelligence attempts to mimic nature-inspired problem-solving strategies and methods. These strategies can be used to study, model and analyze complex systems such that it becomes feasible to handle them. Key areas of computational intelligence are artificial neural networks, evolutionary computation and fuzzy systems. As only a few researchers in that field, Rudolf Kruse has contributed in many important ways to the understanding, modeling and application of computational intelligence methods. On occasion of his 60th birthday, a collection of original papers of leading researchers in the field of computational intell...

  4. Surface Environmental Surveillance Procedures Manual

    International Nuclear Information System (INIS)

    Hanf, Robert W.; Poston, Ted M.

    2000-01-01

    Shows and explains certain procedures needed for surface environmental surveillance. Hanford Site environmental surveillance is conducted by the Pacific Northwest National Laboratory (PNNL) for the U.S. Department of Energy (DOE) under the Surface Environmental Surveillance Project (SESP). The basic requirements for site surveillance are set fourth in DOE Order 5400.1, General Environmental Protection Program Requirements. Guidance for the SESP is provided in DOE Order 5484.1, Environmental Protection, Safety, and Health Protection Information Reporting Requirements and DOE Order 5400.5, Radiation Protection of the Public and Environment. Guidelines for environmental surveillance activities are provided in DOE/EH-0173T, Environmental Regulatory Guide for Radiological Effluent Monitoring and Environmental Surveillance. An environmental monitoring plan for the Hanford Site is outlined in DOE/RL 91-50 Rev. 2, Environmental Monitoring Plan, United States Department of Energy, Richland Operations Office. Environmental surveillance data are used in assessing the impact of current and past site operations on human health and the environment, demonstrating compliance with applicable local, state, and federal environmental regulations, and verifying the adequacy of containment and effluent controls. SESP sampling schedules are reviewed, revised, and published each calendar year in the Hanford Site Environmental Surveillance Master Sampling Schedule. Environmental samples are collected by SESP staff in accordance with the approved sample collection procedures documented in this manual. Personnel training requirements are documented in SESP-TP-01 Rev.2, Surface Environmental Surveillance Project Training Program.

  5. Foreign Remittances, Foreign Direct Investment, Foreign Imports and Economic Growth in Pakistan: A Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Muhammad Tahir

    2015-10-01

    Full Text Available This empirical research paper focuses on establishing a relationship between external determinants and economic growth of Pakistan economy. Empirical analyses are carried out with time series econometric techniques using data over the period of 1977-2013. The main finding is that external determinants such as foreign remittances, foreign direct investment, and foreign imports matter from a growth perspective. Foreign remittances and foreign direct investment have a significant positive role in the growth process of Pakistan economy. Furthermore, it is found that foreign imports have adversely influenced the economic growth of Pakistan. The study recommends that policy makers shall take appropriate steps to increase the inflow of both foreign remittances and foreign direct investment in order to achieve the long run economic growth.

  6. Intelligence and Prosocial Behavior

    DEFF Research Database (Denmark)

    Han, Ru; Shi, Jiannong; Yong, W.

    2012-01-01

    Results of prev ious studies of the relationship between prosocial behav ior and intelligence hav e been inconsistent. This study attempts to distinguish the dif f erences between sev eral prosocial tasks, and explores the way s in which cognitiv e ability inf luences prosocial behav ior. In Study...... One and Two, we reexamined the relationship between prosocial behav ior and intelligence by employ ing a costly signaling theory with f our games. The results rev ealed that the prosocial lev el of smarter children is higher than that of other children in more complicated tasks but not so in simple...... tasks. In Study Three, we tested the moderation ef f ect of the av erage intelligence across classes, and the results did not show any group intelligence ef f ect on the relationship between intelligence and prosocial behav ior....

  7. Business Intelligence Systems

    Directory of Open Access Journals (Sweden)

    Bogdan NEDELCU

    2014-02-01

    Full Text Available The aim of this article is to show the importance of business intelligence and its growing influence. It also shows when the concept of business intelligence was used for the first time and how it evolved over time. The paper discusses the utility of a business intelligence system in any organization and its contribution to daily activities. Furthermore, we highlight the role and the objectives of business intelligence systems inside an organization and the needs to grow the incomes and reduce the costs, to manage the complexity of the business environment and to cut IT costs so that the organization survives in the current competitive climate. The article contains information about architectural principles of a business intelligence system and how such a system can be achieved.

  8. Present status of metrology of electro-optical surveillance systems

    Science.gov (United States)

    Chrzanowski, K.

    2017-10-01

    There has been a significant progress in equipment for testing electro-optical surveillance systems over the last decade. Modern test systems are increasingly computerized, employ advanced image processing and offer software support in measurement process. However, one great challenge, in form of relative low accuracy, still remains not solved. It is quite common that different test stations, when testing the same device, produce different results. It can even happen that two testing teams, while working on the same test station, with the same tested device, produce different results. Rapid growth of electro-optical technology, poor standardization, limited metrology infrastructure, subjective nature of some measurements, fundamental limitations from laws of physics, tendering rules and advances in artificial intelligence are major factors responsible for such situation. Regardless, next decade should bring significant improvements, since improvement in measurement accuracy is needed to sustain fast growth of electro-optical surveillance technology.

  9. Inexpensive remote video surveillance system with microcomputer and solar cells

    International Nuclear Information System (INIS)

    Guevara Betancourt, Edder

    2013-01-01

    A low-cost prototype is developed with a RPI plate for remote video surveillance. Additionally, the theoretical basis to provide energy independence have developed through solar cells and a battery bank. Some existing commercial monitoring systems are studied and analyzed, components such as: cameras, communication devices (WiFi and 3G), free software packages for video surveillance, control mechanisms and theory remote photovoltaic systems. A number of steps are developed to implement the module and install, configure and test each of the elements of hardware and software that make up the module, exploring the feasibility of providing intelligence to the system using the software chosen. Events that have been generated by motion detection have been simple, intuitive way to view, archive and extract. The implementation of the module by a microcomputer video surveillance and motion detection software (Zoneminder) has been an option for a lot of potential; as the platform for monitoring and recording data has provided all the tools to make a robust and secure surveillance. (author) [es

  10. Tuberculosis control, and the where and why of artificial intelligence

    Directory of Open Access Journals (Sweden)

    Riddhi Doshi

    2017-06-01

    Full Text Available Countries aiming to reduce their tuberculosis (TB burden by 2035 to the levels envisaged by the World Health Organization End TB Strategy need to innovate, with approaches such as digital health (electronic and mobile health in support of patient care, surveillance, programme management, training and communication. Alongside the large-scale roll-out required for such interventions to make a significant impact, products must stay abreast of advancing technology over time. The integration of artificial intelligence into new software promises to make processes more effective and efficient, endowing them with a potential hitherto unimaginable. Users can benefit from artificial intelligence-enabled pattern recognition software for tasks ranging from reading radiographs to adverse event monitoring, sifting through vast datasets to personalise a patient's care plan or to customise training materials. Many experts forecast the imminent transformation of the delivery of healthcare services. We discuss how artificial intelligence and machine learning could revolutionise the management of TB.

  11. Tuberculosis control, and the where and why of artificial intelligence.

    Science.gov (United States)

    Doshi, Riddhi; Falzon, Dennis; Thomas, Bruce V; Temesgen, Zelalem; Sadasivan, Lal; Migliori, Giovanni Battista; Raviglione, Mario

    2017-04-01

    Countries aiming to reduce their tuberculosis (TB) burden by 2035 to the levels envisaged by the World Health Organization End TB Strategy need to innovate, with approaches such as digital health (electronic and mobile health) in support of patient care, surveillance, programme management, training and communication. Alongside the large-scale roll-out required for such interventions to make a significant impact, products must stay abreast of advancing technology over time. The integration of artificial intelligence into new software promises to make processes more effective and efficient, endowing them with a potential hitherto unimaginable. Users can benefit from artificial intelligence-enabled pattern recognition software for tasks ranging from reading radiographs to adverse event monitoring, sifting through vast datasets to personalise a patient's care plan or to customise training materials. Many experts forecast the imminent transformation of the delivery of healthcare services. We discuss how artificial intelligence and machine learning could revolutionise the management of TB.

  12. Tuberculosis control, and the where and why of artificial intelligence

    Science.gov (United States)

    Falzon, Dennis; Thomas, Bruce V.; Temesgen, Zelalem; Sadasivan, Lal; Raviglione, Mario

    2017-01-01

    Countries aiming to reduce their tuberculosis (TB) burden by 2035 to the levels envisaged by the World Health Organization End TB Strategy need to innovate, with approaches such as digital health (electronic and mobile health) in support of patient care, surveillance, programme management, training and communication. Alongside the large-scale roll-out required for such interventions to make a significant impact, products must stay abreast of advancing technology over time. The integration of artificial intelligence into new software promises to make processes more effective and efficient, endowing them with a potential hitherto unimaginable. Users can benefit from artificial intelligence-enabled pattern recognition software for tasks ranging from reading radiographs to adverse event monitoring, sifting through vast datasets to personalise a patient's care plan or to customise training materials. Many experts forecast the imminent transformation of the delivery of healthcare services. We discuss how artificial intelligence and machine learning could revolutionise the management of TB. PMID:28656130

  13. Expert system for surveillance and diagnosis of breach fuel elements

    Science.gov (United States)

    Gross, Kenny C.

    1989-01-01

    An apparatus and method are disclosed for surveillance and diagnosis of breached fuel elements in a nuclear reactor. A delayed neutron monitoring system provides output signals indicating the delayed neutron activity and age and the equivalent recoil areas of a breached fuel element. Sensors are used to provide outputs indicating the status of each component of the delayed neutron monitoring system. Detectors also generate output signals indicating the reactor power level and the primary coolant flow rate of the reactor. The outputs from the detectors and sensors are interfaced with an artificial intelligence-based knowledge system which implements predetermined logic and generates output signals indicating the operability of the reactor.

  14. Expert system for surveillance and diagnosis of breach fuel elements

    International Nuclear Information System (INIS)

    Gross, K.C.

    1989-01-01

    An apparatus and method are disclosed for surveillance and diagnosis of breached fuel elements in a nuclear reactor. A delayed neutron monitoring system provides output signals indicating the delayed neutron activity and age and the equivalent recoil areas of a breached fuel element. Sensors are used to provide outputs indicating the status of each component of the delayed neutron monitoring system. Detectors also generate output signals indicating the reactor power level and the primary coolant flow rate of the reactor. The outputs from the detectors and sensors are interfaced with an artificial intelligence-based knowledge system which implements predetermined logic and generates output signals indicating the operability of the reactor

  15. Wide area surveillance real-time motion detection systems

    CERN Document Server

    2014-01-01

    The book describes a system for visual surveillance using intelligent cameras. The camera uses robust techniques for detecting and tracking moving objects. The real time capture of the objects is then stored int he database. The tracking data stored in the database is analysed to study the camera view, detect and track objects, and study object behavior. These set of models provide a robust framework for coordinating the tracking of objects between overlapping and non-overlapping cameras, and recording the activity of objects detected by the system.

  16. Studies in Intelligence. Volume 53, Number 2, June 2009

    Science.gov (United States)

    2009-06-01

    intellig s of foreign states and similar organization lligence has both a defensive mission—prot n—and an offensive mission—finding out ir aims.–Office of...the fundamental question of how homas Powers The Basics of CI Differences in the conceptions of their missions, as well as the political, social...as a distinct subject area,” but he goes on to say that traditional international relations ( IR ) theory on “structural realism” provides a

  17. A Joint Watermarking and ROI Coding Scheme for Annotating Traffic Surveillance Videos

    Directory of Open Access Journals (Sweden)

    Su Po-Chyi

    2010-01-01

    Full Text Available We propose a new application of information hiding by employing the digital watermarking techniques to facilitate the data annotation in traffic surveillance videos. There are two parts in the proposed scheme. The first part is the object-based watermarking, in which the information of each vehicle collected by the intelligent transportation system will be conveyed/stored along with the visual data via information hiding. The scheme is integrated with H.264/AVC, which is assumed to be adopted by the surveillance system, to achieve an efficient implementation. The second part is a Region of Interest (ROI rate control mechanism for encoding traffic surveillance videos, which helps to improve the overall performance. The quality of vehicles in the video will be better preserved and a good rate-distortion performance can be attained. Experimental results show that this potential scheme works well in traffic surveillance videos.

  18. EMOTIONAL INTELLIGENCE AND PARENTING STYLES INFLUENCE ON ADOLESCENT GIRLS

    Directory of Open Access Journals (Sweden)

    A V Krasnov

    2016-12-01

    Full Text Available Foreign psychologists believe that parenting may influence children’s development of emotional intelligence. However, little research has been done in this area. In view of the reviewed literature and given the scarcity of data, we conducted an exploratory study in an as yet unexplored field. The present study aims at examining relationships between the parenting practices and adolescents’ emotional intelligence. 74 students (17-18 years, females were surveyed to assess their perception of parenting styles and their own emotional intelligence. Spearman’s rank correlation coefficients showed that adolescents’ emotional intelligence correlated with one of maternal parenting styles (positive attitude and four of paternal parenting styles (positive attitude, directivity, autonomy, incoherence. Positive interest of parents positively correlated with adolescents’ ability for understanding their own emotions. Paternal positive interest positively correlated with adolescents’ ability for managing their own emotions and emotional intelligence. Paternal directivity positively correlated with adolescents’ ability for understanding emotions (their own and other people’s. Paternal autonomy negatively correlated with adolescents’ emotional intelligence and ability for understanding other people’s emotions. Paternalincoherence negatively correlated with adolescents’ ability for understanding and managing their own emotions.

  19. Business Intelligence & Analytical Intelligence: hou het zakelijk

    OpenAIRE

    Van Nieuwenhuyse, Dries

    2013-01-01

    Technologie democratiseert, de markt consolideert, terwijl de hoeveelheid data explodeert. Het lijkt een ideale voedingsbodem voor projecten rond business intelligence en analytics. “Hoe minder de technologie het verschil zal maken, hoe prominenter de business aanwezig zal zijn.”

  20. Social Intelligence Design in Ambient Intelligence

    NARCIS (Netherlands)

    Nijholt, Antinus; Stock, Oliviero; Stock, O.; Nishida, T.; Nishida, Toyoaki

    2009-01-01

    This Special Issue of AI and Society contains a selection of papers presented at the 6th Social Intelligence Design Workshop held at ITC-irst, Povo (Trento, Italy) in July 2007. Being the 6th in a series means that there now is a well-established and also a growing research area. The interest in

  1. Spiritual Intelligence, Emotional Intelligence and Auditor’s Performance

    OpenAIRE

    Hanafi, Rustam

    2010-01-01

    The objective of this research was to investigate empirical evidence about influence audi-tor spiritual intelligence on the performance with emotional intelligence as a mediator variable. Linear regression models are developed to examine the hypothesis and path analysis. The de-pendent variable of each model is auditor performance, whereas the independent variable of model 1 is spiritual intelligence, of model 2 are emotional intelligence and spiritual intelligence. The parameters were estima...

  2. Naturalist Intelligence Among the Other Multiple Intelligences [In Bulgarian

    Directory of Open Access Journals (Sweden)

    R. Genkov

    2007-09-01

    Full Text Available The theory of multiple intelligences was presented by Gardner in 1983. The theory was revised later (1999 and among the other intelligences a naturalist intelligence was added. The criteria for distinguishing of the different types of intelligences are considered. While Gardner restricted the analysis of the naturalist intelligence with examples from the living nature only, the present paper considered this problem on wider background including objects and persons of the natural sciences.

  3. Intelligence and treaty ratification

    International Nuclear Information System (INIS)

    Sojka, G.L.

    1990-01-01

    What did the intelligence community and the Intelligence Committee di poorly in regard to the treaty ratification process for arms control? We failed to solve the compartmentalization problem/ This is a second-order problem, and, in general, analysts try to be very open; but there are problems nevertheless. There are very few, if any, people within the intelligence community who are cleared for everything relevant to our monitoring capability emdash short of probably the Director of Central Intelligence and the president emdash and this is a major problem. The formal monitoring estimates are drawn up by individuals who do not have access to all the information to make the monitoring judgements. This paper reports that the intelligence community did not present a formal document on either Soviet incentives of disincentives to cheat or on the possibility of cheating scenarios, and that was a mistake. However, the intelligence community was very responsive in producing those types of estimates, and, ultimately, the evidence behind them in response to questions. Nevertheless, the author thinks the intelligence community would do well to address this issue up front before a treaty is submitted to the Senate for advice and consent

  4. The Epistemic Status of Intelligence

    DEFF Research Database (Denmark)

    Rønn, Kira Vrist; Høffding, Simon

    2012-01-01

    We argue that the majority of intelligence definitions fail to recognize that the normative epistemic status of intelligence is knowledge and not an inferior alternative. We refute the counter-arguments that intelligence ought not to be seen as knowledge because of 1) its action-oriented scope...... and robustness of claims to intelligence-knowledge can be assessed....

  5. Moral Intelligence in the Schools

    Science.gov (United States)

    Clarken, Rodney H.

    2009-01-01

    Moral intelligence is newer and less studied than the more established cognitive, emotional and social intelligences, but has great potential to improve our understanding of learning and behavior. Moral intelligence refers to the ability to apply ethical principles to personal goals, values and actions. The construct of moral intelligence consists…

  6. 2012 Sexually Transmitted Diseases Surveillance

    Science.gov (United States)

    ... Data Appendix Tables A1 - A4 STD Surveillance Case Definitions Contributors Related Links STD Home STD Data & Statistics NCHHSTP Atlas Interactive STD Data - 1996-2013 STD Health Equity HIV/AIDS Surveillance & Statistics Follow STD STD on Twitter STD on Facebook File Formats Help: How do I view different ...

  7. The surveillance error grid.

    Science.gov (United States)

    Klonoff, David C; Lias, Courtney; Vigersky, Robert; Clarke, William; Parkes, Joan Lee; Sacks, David B; Kirkman, M Sue; Kovatchev, Boris

    2014-07-01

    Currently used error grids for assessing clinical accuracy of blood glucose monitors are based on out-of-date medical practices. Error grids have not been widely embraced by regulatory agencies for clearance of monitors, but this type of tool could be useful for surveillance of the performance of cleared products. Diabetes Technology Society together with representatives from the Food and Drug Administration, the American Diabetes Association, the Endocrine Society, and the Association for the Advancement of Medical Instrumentation, and representatives of academia, industry, and government, have developed a new error grid, called the surveillance error grid (SEG) as a tool to assess the degree of clinical risk from inaccurate blood glucose (BG) monitors. A total of 206 diabetes clinicians were surveyed about the clinical risk of errors of measured BG levels by a monitor. The impact of such errors on 4 patient scenarios was surveyed. Each monitor/reference data pair was scored and color-coded on a graph per its average risk rating. Using modeled data representative of the accuracy of contemporary meters, the relationships between clinical risk and monitor error were calculated for the Clarke error grid (CEG), Parkes error grid (PEG), and SEG. SEG action boundaries were consistent across scenarios, regardless of whether the patient was type 1 or type 2 or using insulin or not. No significant differences were noted between responses of adult/pediatric or 4 types of clinicians. Although small specific differences in risk boundaries between US and non-US clinicians were noted, the panel felt they did not justify separate grids for these 2 types of clinicians. The data points of the SEG were classified in 15 zones according to their assigned level of risk, which allowed for comparisons with the classic CEG and PEG. Modeled glucose monitor data with realistic self-monitoring of blood glucose errors derived from meter testing experiments plotted on the SEG when compared to

  8. Smart sensing surveillance system

    Science.gov (United States)

    Hsu, Charles; Chu, Kai-Dee; O'Looney, James; Blake, Michael; Rutar, Colleen

    2010-04-01

    Unattended ground sensor (UGS) networks have been widely used in remote battlefield and other tactical applications over the last few decades due to the advances of the digital signal processing. The UGS network can be applied in a variety of areas including border surveillance, special force operations, perimeter and building protection, target acquisition, situational awareness, and force protection. In this paper, a highly-distributed, fault-tolerant, and energyefficient Smart Sensing Surveillance System (S4) is presented to efficiently provide 24/7 and all weather security operation in a situation management environment. The S4 is composed of a number of distributed nodes to collect, process, and disseminate heterogeneous sensor data. Nearly all S4 nodes have passive sensors to provide rapid omnidirectional detection. In addition, Pan- Tilt- Zoom- (PTZ) Electro-Optics EO/IR cameras are integrated to selected nodes to track the objects and capture associated imagery. These S4 camera-connected nodes will provide applicable advanced on-board digital image processing capabilities to detect and track the specific objects. The imaging detection operations include unattended object detection, human feature and behavior detection, and configurable alert triggers, etc. In the S4, all the nodes are connected with a robust, reconfigurable, LPI/LPD (Low Probability of Intercept/ Low Probability of Detect) wireless mesh network using Ultra-wide band (UWB) RF technology, which can provide an ad-hoc, secure mesh network and capability to relay network information, communicate and pass situational awareness and messages. The S4 utilizes a Service Oriented Architecture such that remote applications can interact with the S4 network and use the specific presentation methods. The S4 capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded

  9. [Entomological surveillance in Mauritius].

    Science.gov (United States)

    Gopaul, R

    1995-01-01

    The entomological surveillance is an essential link in the fight against malaria in Mauritius. Because of the large number of malaria-infected travellers in Mauritius and the presence of the vector Anopheles arabiensis, the risk of local transmission is very real. The medical entomology division together with the malaria control unit and the health appointees exert a rigorous entomological surveillance of malaria. Field agents make entomological investigations of pilot villages and around the harbor and airport, where there have been cases of malaria, in addition to a few randomly chosen regions. All of the inhabited regions are accessible because of a good highway infrastructure, which enables a complete coverage for the entomological prospectives. Entomological controls are also conducted in the airplanes and the ships. All of the captured mosquitos and the harvested larva are transferred to a laboratory for identification, dissection or sensibility tests, etc. The larva of A. arabiensis have not yet developed resistance to Temephos and the adults are still sensitive to DDT. Thus, the larval habitats are treated with Temephos and DDT is sprayed in the residences where there have been native cases of malaria. The entomology division studies the ecology and the evolution of the larval habitats, as well as the impact of the anti-larval fight on the anophelene density. In addition to the chemical fight, a biological control is being tried with larva-eating fish such as Lebistes and Tilapia. In general, the anophelene density in Mauritius is low, but after the big summer rains, especially during a period of cyclones, there is a considerable increase of larval habitats and consequently a higher number of A. arabiensis. Therefore during this season, it is necessary to make an even more rigorous entomological surveillance. A. arabiensis has a strong exophile tendency even if it is endophage and exophage. This mosquito is zoophile, mostly towards cattle, and the

  10. Real-Time Observation of Target Search by the CRISPR Surveillance Complex Cascade

    Directory of Open Access Journals (Sweden)

    Chaoyou Xue

    2017-12-01

    Full Text Available CRISPR-Cas systems defend bacteria and archaea against infection by bacteriophage and other threats. The central component of these systems are surveillance complexes that use guide RNAs to bind specific regions of foreign nucleic acids, marking them for destruction. Surveillance complexes must locate targets rapidly to ensure timely immune response, but the mechanism of this search process remains unclear. Here, we used single-molecule FRET to visualize how the type I-E surveillance complex Cascade searches DNA in real time. Cascade rapidly and randomly samples DNA through nonspecific electrostatic contacts, pausing at short PAM recognition sites that may be adjacent to the target. We identify Cascade motifs that are essential for either nonspecific sampling or positioning and readout of the PAM. Our findings provide a comprehensive structural and kinetic model for the Cascade target-search mechanism, revealing how CRISPR surveillance complexes can rapidly search large amounts of genetic material en route to target recognition.

  11. Surveillance theory and its implications for law

    NARCIS (Netherlands)

    Timan, Tjerk; Galic, Masa; Koops, Bert-Jaap; Brownsword, Roger; Scotford, Eloise; Yeung, Karen

    2017-01-01

    This chapter provides an overview of key surveillance theories and their implications for law and regulation. It presents three stages of theories that characterise changes in thinking about surveillance in society and the disciplining, controlling, and entertaining functions of surveillance.

  12. Reporting and Surveillance for Norovirus Outbreaks

    Science.gov (United States)

    ... Vaccine Surveillance Network (NVSN) Foodborne Diseases Active Surveillance Network (FoodNet) National Outbreak Reporting System (NORS) Estimates of Foodborne Illness in the United States CDC's Vessel Sanitation Program CDC Feature: Surveillance for Norovirus Outbreaks Top ...

  13. Advanced intelligence and mechanism approach

    Institute of Scientific and Technical Information of China (English)

    ZHONG Yixin

    2007-01-01

    Advanced intelligence will feature the intelligence research in next 50 years.An understanding of the concept of advanced intelligence as well as its importance will be provided first,and detailed analysis on an approach,the mechanism approach.suitable to the advanced intelligence research will then be flolowed.And the mutual relationship among mechanism approach,traditional approaches existed in artificial intelligence research,and the cognitive informatics will be discussed.It is interesting to discover that mechanism approach is a good one to the Advanced Intelligence research and a tmified form of the existed approaches to artificial intelligence.

  14. Intelligent environmental sensing

    CERN Document Server

    Mukhopadhyay, Subhas

    2015-01-01

    Developing environmental sensing and monitoring technologies become essential especially for industries that may cause severe contamination. Intelligent environmental sensing uses novel sensor techniques, intelligent signal and data processing algorithms, and wireless sensor networks to enhance environmental sensing and monitoring. It finds applications in many environmental problems such as oil and gas, water quality, and agriculture. This book addresses issues related to three main approaches to intelligent environmental sensing and discusses their latest technological developments. Key contents of the book include:   Agricultural monitoring Classification, detection, and estimation Data fusion Geological monitoring Motor monitoring Multi-sensor systems Oil reservoirs monitoring Sensor motes Water quality monitoring Wireless sensor network protocol  

  15. Is Intelligence Artificial?

    OpenAIRE

    Greer, Kieran

    2014-01-01

    Our understanding of intelligence is directed primarily at the level of human beings. This paper attempts to give a more unifying definition that can be applied to the natural world in general. The definition would be used more to verify a degree of intelligence, not to quantify it and might help when making judgements on the matter. A version of an accepted test for AI is then put forward as the 'acid test' for Artificial Intelligence itself. It might be what a free-thinking program or robot...

  16. Total process surveillance: (TOPS)

    International Nuclear Information System (INIS)

    Millar, J.H.P.

    1992-01-01

    A Total Process Surveillance system is under development which can provide, in real-time, additional process information from a limited number of raw measurement signals. This is achieved by using a robust model based observer to generate estimates of the process' internal states. The observer utilises the analytical reduncancy among a diverse range of transducers and can thus accommodate off-normal conditions which lead to transducer loss or damage. The modular hierarchical structure of the system enables the maximum amount of information to be assimilated from the available instrument signals no matter how diverse. This structure also constitutes a data reduction path thus reducing operator cognitive overload from a large number of varying, and possibly contradictory, raw plant signals. (orig.)

  17. Surveillance of the environmental radioactivity

    International Nuclear Information System (INIS)

    Schneider, Th.; Gitzinger, C.; Jaunet, P.; Eberbach, F.; Clavel, B.; Hemidy, P.Y.; Perrier, G.; Kiper, Ch.; Peres, J.M.; Josset, M.; Calvez, M.; Leclerc, M.; Leclerc, E.; Aubert, C.; Levelut, M.N.; Debayle, Ch.; Mayer, St.; Renaud, Ph.; Leprieur, F.; Petitfrere, M.; Catelinois, O.; Monfort, M.; Baron, Y.; Target, A.

    2008-01-01

    The objective of these days was to present the organisation of the surveillance of the environmental radioactivity and to allow an experience sharing and a dialog on this subject between the different actors of the radiation protection in france. The different presentations were as follow: evolution and stakes of the surveillance of radioactivity in environment; the part of the European commission, regulatory aspects; the implementation of the surveillance: the case of Germany; Strategy and logic of environmental surveillance around the EDF national centers of energy production; environmental surveillance: F.B.F.C. site of Romans on Isere; steps of the implementation 'analysis for release decree at the F.B.F.C./C.E.R.C.A. laboratory of Romans; I.R.S.N. and the environmental surveillance: situation and perspectives; the part of a non institutional actor, the citizenship surveillance done by A.C.R.O.; harmonization of sampling methods: the results of inter operators G.T. sampling; sustainable observatory of environment: data traceability and samples conservation; inter laboratories tests of radioactivity measurements; national network of environmental radioactivity measurement: laboratories agreements; the networks of environmental radioactivity telemetry: modernization positioning; programme of observation and surveillance of surface environment and installations of the H.A.-M.A.V.L. project (high activity and long life medium activity); Evolution of radionuclides concentration in environment and adaptation of measurements techniques to the surveillance needs; the national network of radioactivity measurement in environment; modes of data restoration of surveillance: the results of the Loire environment pilot action; method of sanitary impacts estimation in the area of ionizing radiations; the radiological impact of atmospheric nuclear tests in French Polynesia; validation of models by the measure; network of measurement and alert management of the atmospheric

  18. Secure surveillance videotapes

    International Nuclear Information System (INIS)

    Resnik, W.M.; Kadner, S.P.; Olsen, R.; Chitumbo, K.; Pepper, S.

    1995-01-01

    With assistance from the US Program for Technical Assistance to IAEA Safeguards (POTAS), Aquila Technologies Group developed the Tamper-Resistant Analog Media (TRAM-1000) system to provide standard VHS surveillance video tapes with an enhanced tamper-indicating capability. This project represents further implementation of the partnership approach in facilities including light water reactors with MOX facilities. These facilities use Uniplex Digiquad system video tapes. The partnership approach ensures that one organization can exchange the tapes in a machine without the presence of the other, without losing continuity of information. The TRAM-1000 system development project was accomplished in two stages. In the first stage of the project, the original system delivered to the IAEA, consists of three parts: (1) the tamper detection unit, (2) a specially augmented VHS video tape, and (3) an HP-95 reader. The tamper detection unit houses a VACOSS active fiber-optic seal and an electronic identification tag (E-TAG) reader. In the second stage of the project, the original TRAM-1000 was modified to its current design based on agency input. After delivery of the original TRAM-1000 system to the IAEA, it was reviewed by inspectors. The inspectors felt that the initial system's tape storage/transport method could be simplified. Rather than threading the fiber through the tape spindles, the inspectors suggested that the tape be placed in a bag capable of being sealed. Also, a more flexible fiber-optic cable was recommended. As a result of these suggestions, Aquila developed a tamper-proof bag specifically for holding a surveillance video tape and sealable with a VACOSS fiber optical seal

  19. Utility and potential of rapid epidemic intelligence from internet-based sources.

    Science.gov (United States)

    Yan, S J; Chughtai, A A; Macintyre, C R

    2017-10-01

    Rapid epidemic detection is an important objective of surveillance to enable timely intervention, but traditional validated surveillance data may not be available in the required timeframe for acute epidemic control. Increasing volumes of data on the Internet have prompted interest in methods that could use unstructured sources to enhance traditional disease surveillance and gain rapid epidemic intelligence. We aimed to summarise Internet-based methods that use freely-accessible, unstructured data for epidemic surveillance and explore their timeliness and accuracy outcomes. Steps outlined in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) checklist were used to guide a systematic review of research related to the use of informal or unstructured data by Internet-based intelligence methods for surveillance. We identified 84 articles published between 2006-2016 relating to Internet-based public health surveillance methods. Studies used search queries, social media posts and approaches derived from existing Internet-based systems for early epidemic alerts and real-time monitoring. Most studies noted improved timeliness compared to official reporting, such as in the 2014 Ebola epidemic where epidemic alerts were generated first from ProMED-mail. Internet-based methods showed variable correlation strength with official datasets, with some methods showing reasonable accuracy. The proliferation of publicly available information on the Internet provided a new avenue for epidemic intelligence. Methodologies have been developed to collect Internet data and some systems are already used to enhance the timeliness of traditional surveillance systems. To improve the utility of Internet-based systems, the key attributes of timeliness and data accuracy should be included in future evaluations of surveillance systems. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  20. Multiple Intelligences and quotient spaces

    OpenAIRE

    Malatesta, Mike; Quintana, Yamilet

    2006-01-01

    The Multiple Intelligence Theory (MI) is one of the models that study and describe the cognitive abilities of an individual. In [7] is presented a referential system which allows to identify the Multiple Intelligences of the students of a course and to classify the level of development of such Intelligences. Following this tendency, the purpose of this paper is to describe the model of Multiple Intelligences as a quotient space, and also to study the Multiple Intelligences of an individual in...

  1. Business Intelligence using Software Agents

    OpenAIRE

    Ana-Ramona BOLOGA; Razvan BOLOGA

    2011-01-01

    This paper presents some ideas about business intelligence today and the importance of developing real time business solutions. The authors make an exploration of links between business intelligence and artificial intelligence and focuses specifically on the implementation of software agents-based systems in business intelligence. There are briefly presented some of the few solutions proposed so far that use software agents properties for the benefit of business intelligence. The authors then...

  2. Engineering general intelligence

    CERN Document Server

    Goertzel, Ben; Geisweiller, Nil

    2014-01-01

    The work outlines a novel conceptual and theoretical framework for understanding Artificial General Intelligence and based on this framework outlines a practical roadmap for the development of AGI with capability at the human level and ultimately beyond.

  3. Understanding US National Intelligence

    DEFF Research Database (Denmark)

    Leander, Anna

    2014-01-01

    In July 2010, the Washington Post (WP) published the results of a project on “Top Secret America” on which twenty investigative journalists had been working for two years. The project drew attention to the change and growth in National Intelligence following 9/11 (Washington Post 2010a......). The initial idea had been to work on intelligence generally, but given that this proved overwhelming, the team narrowed down to focus only on intelligence qualified as “top secret.” Even so, the growth in this intelligence activity is remarkable. This public is returning, or in this case expanding...... at an impressive speed confirming the general contention of this volume. Between 2001 and 2010 the budget had increased by 250 percent, reaching $75 billion (the GDP of the Czech Republic). Thirty-three building complexes for top secret work had been or were under construction in the Washington area; 1...

  4. Engineering general intelligence

    CERN Document Server

    Goertzel, Ben; Geisweiller, Nil

    2014-01-01

    The work outlines a detailed blueprint for the creation of an Artificial General Intelligence system with capability at the human level and ultimately beyond, according to the Cog Prime AGI design and the Open Cog software architecture.

  5. Intelligence Issues for Congress

    National Research Council Canada - National Science Library

    Best, Jr, Richard A

    2007-01-01

    To address the challenges facing the U.S. Intelligence Community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis...

  6. Intelligence Issues for Congress

    National Research Council Canada - National Science Library

    Best, Jr, Richard A

    2006-01-01

    To address the challenges facing the U.S. Intelligence Community in the 21st Century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis...

  7. Intelligence Issues for Congress

    National Research Council Canada - National Science Library

    Best, Jr, Richard A

    2008-01-01

    To address the challenges facing the U.S. Intelligence Community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis...

  8. Intelligent Information Systems Institute

    National Research Council Canada - National Science Library

    Gomes, Carla

    2004-01-01

    ...) at Cornell during the first three years of operation. IISI's mandate is threefold: To perform and stimulate research in computational and data-intensive methods for intelligent decision making systems...

  9. Quo vadis, Intelligent Machine?

    Directory of Open Access Journals (Sweden)

    Rosemarie Velik

    2010-09-01

    Full Text Available Artificial Intelligence (AI is a branch of computer science concerned with making computers behave like humans. At least this was the original idea. However, it turned out that this is no task easy to be solved. This article aims to give a comprehensible review on the last 60 years of artificial intelligence taking a philosophical viewpoint. It is outlined what happened so far in AI, what is currently going on in this research area, and what can be expected in future. The goal is to mediate an understanding for the developments and changes in thinking in course of time about how to achieve machine intelligence. The clear message is that AI has to join forces with neuroscience and other brain disciplines in order to make a step towards the development of truly intelligent machines.

  10. Bibliography: Artificial Intelligence.

    Science.gov (United States)

    Smith, Richard L.

    1986-01-01

    Annotates reference material on artificial intelligence, mostly at an introductory level, with applications to education and learning. Topics include: (1) programing languages; (2) expert systems; (3) language instruction; (4) tutoring systems; and (5) problem solving and reasoning. (JM)

  11. Handbook of Intelligent Vehicles

    CERN Document Server

    2012-01-01

    The Handbook of Intelligent Vehicles provides a complete coverage of the fundamentals, new technologies, and sub-areas essential to the development of intelligent vehicles; it also includes advances made to date, challenges, and future trends. Significant strides in the field have been made to date; however, so far there has been no single book or volume which captures these advances in a comprehensive format, addressing all essential components and subspecialties of intelligent vehicles, as this book does. Since the intended users are engineering practitioners, as well as researchers and graduate students, the book chapters do not only cover fundamentals, methods, and algorithms but also include how software/hardware are implemented, and demonstrate the advances along with their present challenges. Research at both component and systems levels are required to advance the functionality of intelligent vehicles. This volume covers both of these aspects in addition to the fundamentals listed above.

  12. Genes, evolution and intelligence.

    Science.gov (United States)

    Bouchard, Thomas J

    2014-11-01

    I argue that the g factor meets the fundamental criteria of a scientific construct more fully than any other conception of intelligence. I briefly discuss the evidence regarding the relationship of brain size to intelligence. A review of a large body of evidence demonstrates that there is a g factor in a wide range of species and that, in the species studied, it relates to brain size and is heritable. These findings suggest that many species have evolved a general-purpose mechanism (a general biological intelligence) for dealing with the environments in which they evolved. In spite of numerous studies with considerable statistical power, we know of very few genes that influence g and the effects are very small. Nevertheless, g appears to be highly polygenic. Given the complexity of the human brain, it is not surprising that that one of its primary faculties-intelligence-is best explained by the near infinitesimal model of quantitative genetics.

  13. Modelling intelligent behavior

    Science.gov (United States)

    Green, H. S.; Triffet, T.

    1993-01-01

    An introductory discussion of the related concepts of intelligence and consciousness suggests criteria to be met in the modeling of intelligence and the development of intelligent materials. Methods for the modeling of actual structure and activity of the animal cortex have been found, based on present knowledge of the ionic and cellular constitution of the nervous system. These have led to the development of a realistic neural network model, which has been used to study the formation of memory and the process of learning. An account is given of experiments with simple materials which exhibit almost all properties of biological synapses and suggest the possibility of a new type of computer architecture to implement an advanced type of artificial intelligence.

  14. Emotional Intelligence: Requiring Attention

    Directory of Open Access Journals (Sweden)

    Monica Tudor

    2016-01-01

    Full Text Available This article aims to highlight the need for emotional intelligence. Two methods of measurementare presented in this research, in order to better understand the necessity of a correct result. Theresults of research can lead to recommendations for improving levels of emotional intelligence andare useful for obtaining data to better compare past and present result. The papers presented inthis research are significant for future study of this subject. The first paper presents the evolutionof emotional intelligence in the past two years, more specifically its decrease concerning certaincharacteristics. The second one presents a research on the differences between generations. Thethird one shows a difference in emotional intelligence levels of children from rural versus urbanenvironments and the obstacles that they encounter in their own development.

  15. Intelligence Issues for Congress

    National Research Council Canada - National Science Library

    Best. Jr, Richard A

    2006-01-01

    To address the challenges facing the U.S. Intelligence Community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis...

  16. Towards Intelligent Supply Chains

    DEFF Research Database (Denmark)

    Siurdyban, Artur; Møller, Charles

    2012-01-01

    applied to the context of organizational processes can increase the success rate of business operations. The framework is created using a set of theoretical based constructs grounded in a discussion across several streams of research including psychology, pedagogy, artificial intelligence, learning...... of deploying inapt operations leading to deterioration of profits. To address this problem, we propose a unified business process design framework based on the paradigm of intelligence. Intelligence allows humans and human-designed systems cope with environmental volatility, and we argue that its principles......, business process management and supply chain management. It outlines a number of system tasks combined in four integrated management perspectives: build, execute, grow and innovate, put forward as business process design propositions for Intelligent Supply Chains....

  17. North American Foreign Fighters

    Directory of Open Access Journals (Sweden)

    Michael Noonan

    2014-12-01

    Full Text Available While the phenomenon of so-called “foreign fighters” is in no way new the past thirty-plus years has shown a marked increase in the numbers of individuals traveling abroad to fight in civil conflicts in the Muslim world. The crisis in Syria (2011-present has created a massive influx of such individuals going to fight. Of particular concern in western capitals has been the numbers of individuals from those countries that have gone to fight in that conflict which has since crossed the border into neighboring Iraq with the establishment of the socalled “Islamic State” and threatens to broaden the conflict into a larger regional sectarian conflagration. While the numbers of such participants from Western Europe have been greater than those who have gone from the United States and Canada there are legitimate concerns in both Washington, DC, and Ottawa about American and Canadian citizens who have gone—or attempted to go—to fight there and in other locales such as the Maghreb and Somalia. The analysis here will provide some background on the foreign fighter phenomenon, discuss the foreign fighter flow model, explore the issue from both Canadian and US perspectives to include providing details of some original research categorizing the characteristics of a small sample of US and Canadian fighters and those who attempted to go and fight, discuss how both governments have attempted to deal with the issue, and offer some policy prescription for dealing with this issue that is of importance to both international security writ large and domestic security in the US and Canada.

  18. Business Intelligence Integrated Solutions

    Directory of Open Access Journals (Sweden)

    Cristescu Marian Pompiliu

    2017-01-01

    Full Text Available This paper shows how businesses make decisions better and faster in terms of customers, partners and operations by turning data into valuable business information. The paper describes how to bring together people's and business intelligence information to achieve successful business strategies. There is the possibility of developing business intelligence projects in large and medium-sized organizations only with the Microsoft product described in the paper, and possible alternatives can be discussed according to the required features.

  19. Artificial intelligence in medicine.

    OpenAIRE

    Ramesh, A. N.; Kambhampati, C.; Monson, J. R. T.; Drew, P. J.

    2004-01-01

    INTRODUCTION: Artificial intelligence is a branch of computer science capable of analysing complex medical data. Their potential to exploit meaningful relationship with in a data set can be used in the diagnosis, treatment and predicting outcome in many clinical scenarios. METHODS: Medline and internet searches were carried out using the keywords 'artificial intelligence' and 'neural networks (computer)'. Further references were obtained by cross-referencing from key articles. An overview of ...

  20. Artificial Intelligence Study (AIS).

    Science.gov (United States)

    1987-02-01

    ARTIFICIAL INTELLIGNECE HARDWARE ....... 2-50 AI Architecture ................................... 2-49 AI Hardware ....................................... 2...ftf1 829 ARTIFICIAL INTELLIGENCE STUDY (RIS)(U) MAY CONCEPTS 1/3 A~NLYSIS AGENCY BETHESA RD R B NOJESKI FED 6? CM-RP-97-1 NCASIFIED /01/6 M |K 1.0...p/ - - ., e -- CAA- RP- 87-1 SAOFŔ)11 I ARTIFICIAL INTELLIGENCE STUDY (AIS) tNo DTICFEBRUARY 1987 LECT 00 I PREPARED BY RESEARCH AND ANALYSIS

  1. Artificial Intelligence in Astronomy

    Science.gov (United States)

    Devinney, E. J.; Prša, A.; Guinan, E. F.; Degeorge, M.

    2010-12-01

    From the perspective (and bias) as Eclipsing Binary researchers, we give a brief overview of the development of Artificial Intelligence (AI) applications, describe major application areas of AI in astronomy, and illustrate the power of an AI approach in an application developed under the EBAI (Eclipsing Binaries via Artificial Intelligence) project, which employs Artificial Neural Network technology for estimating light curve solution parameters of eclipsing binary systems.

  2. Minimally Naturalistic Artificial Intelligence

    OpenAIRE

    Hansen, Steven Stenberg

    2017-01-01

    The rapid advancement of machine learning techniques has re-energized research into general artificial intelligence. While the idea of domain-agnostic meta-learning is appealing, this emerging field must come to terms with its relationship to human cognition and the statistics and structure of the tasks humans perform. The position of this article is that only by aligning our agents' abilities and environments with those of humans do we stand a chance at developing general artificial intellig...

  3. Artificial intelligence in cardiology

    OpenAIRE

    Bonderman, Diana

    2017-01-01

    Summary Decision-making is complex in modern medicine and should ideally be based on available data, structured knowledge and proper interpretation in the context of an individual patient. Automated algorithms, also termed artificial intelligence that are able to extract meaningful patterns from data collections and build decisions upon identified patterns may be useful assistants in clinical decision-making processes. In this article, artificial intelligence-based studies in clinical cardiol...

  4. Intelligent distributed computing

    CERN Document Server

    Thampi, Sabu

    2015-01-01

    This book contains a selection of refereed and revised papers of the Intelligent Distributed Computing Track originally presented at the third International Symposium on Intelligent Informatics (ISI-2014), September 24-27, 2014, Delhi, India.  The papers selected for this Track cover several Distributed Computing and related topics including Peer-to-Peer Networks, Cloud Computing, Mobile Clouds, Wireless Sensor Networks, and their applications.

  5. The intelligent data recorder

    International Nuclear Information System (INIS)

    Kojima, Mamoru; Hidekuma, Sigeru.

    1985-01-01

    The intelligent data recorder has been developed to data acquisition for a microwave interferometer. The 'RS-232C' which is the standard interface is used for data transmission to the host computer. Then, it's easy to connect with any computer which has general purpose serial port. In this report, the charcteristics of the intelligent data recorder and the way of developing the software are described. (author)

  6. Intelligent Lighting Control System

    OpenAIRE

    García, Elena; Rodríguez González, Sara; de Paz Santana, Juan F.; Bajo Pérez, Javier

    2014-01-01

    This paper presents an adaptive architecture that allows centralized control of public lighting and intelligent management, in order to economise on lighting and maintain maximum comfort status of the illuminated areas. To carry out this management, architecture merges various techniques of artificial intelligence (AI) and statistics such as artificial neural networks (ANN), multi-agent systems (MAS), EM algorithm, methods based on ANOVA and a Service Oriented Aproach (SOA). It performs optim...

  7. THE RELATIONSHIP BETWEEN TURKISH EFL STATE SCHOOL TEACHERS' CULTURAL INTELLIGENCE AND THEIR PROFESSIONAL WELL-BEING

    Directory of Open Access Journals (Sweden)

    İ. EFE EFEOĞLU

    2017-09-01

    Full Text Available Cultural intelligence is described as the ability of a person to behave adequately in culturally diverse environments. It involves comprehending the effects of cultural background on the attitudes of people for auspicious participation in any social setting. Cultural intelligence may be positively and significantly correlated with professional well-being among English as foreign language (EFL teachers. So, the present study sought to investigate the correlation between Turkish EFL state school teachers' cultural intelligence and their professional well-being. A sample including 120 EFL state school teachers completed two questionnaires: (1 Cultural Intelligence Scale developed by Cultural Intelligence Center (2005; and (2 the Scale of Teacher Perception of Professional Well-Being developed by Yildirim, Arastaman and Dasci (2016. The results of the study indicated significant correlations between Turkish EFL state school teachers' cultural intelligence and their professional well-being. This study may help English Language Teaching (ELT departments to implement materials to their curriculum for aiding EFL teachers in terms of developing cultural intelligence. Furthermore, this paper makes a unique contribution to the area of cultural intelligence by identifying whether there is a relationship between cultural intelligence and professional well-being.

  8. Gaps in EU Foreign Policy

    DEFF Research Database (Denmark)

    Larsen, Henrik

    of Capability-Expectations Gap in the study of European foreign policy. Through examples from relevant literature, Larsen not only demonstrates how this concept sets up standards for the EU as a foreign policy actor (that are not met by most other international actors) but also shows how this curtails analysis...... of EU foreign policy. The author goes on to discuss how the widespread use of the concept of ‘gap' affects the way in which EU foreign policy has been studied; and that it always produces the same result: the EU is an unfulfilled actor outside the realm of “normal” actors in IR. This volume offers new...... perspectives on European foreign policy research and advice and serves as an invaluable resource for students of EU foreign policy and, more broadly, European Studies....

  9. Professionalizing Intelligence Analysis

    Directory of Open Access Journals (Sweden)

    James B. Bruce

    2015-09-01

    Full Text Available This article examines the current state of professionalism in national security intelligence analysis in the U.S. Government. Since the introduction of major intelligence reforms directed by the Intelligence Reform and Terrorism Prevention Act (IRTPA in December, 2004, we have seen notable strides in many aspects of intelligence professionalization, including in analysis. But progress is halting, uneven, and by no means permanent. To consolidate its gains, and if it is to continue improving, the U.S. intelligence community (IC should commit itself to accomplishing a new program of further professionalization of analysis to ensure that it will develop an analytic cadre that is fully prepared to deal with the complexities of an emerging multipolar and highly dynamic world that the IC itself is forecasting. Some recent reforms in intelligence analysis can be assessed against established standards of more fully developed professions; these may well fall short of moving the IC closer to the more fully professionalized analytical capability required for producing the kind of analysis needed now by the United States.

  10. GABA predicts visual intelligence.

    Science.gov (United States)

    Cook, Emily; Hammett, Stephen T; Larsson, Jonas

    2016-10-06

    Early psychological researchers proposed a link between intelligence and low-level perceptual performance. It was recently suggested that this link is driven by individual variations in the ability to suppress irrelevant information, evidenced by the observation of strong correlations between perceptual surround suppression and cognitive performance. However, the neural mechanisms underlying such a link remain unclear. A candidate mechanism is neural inhibition by gamma-aminobutyric acid (GABA), but direct experimental support for GABA-mediated inhibition underlying suppression is inconsistent. Here we report evidence consistent with a global suppressive mechanism involving GABA underlying the link between sensory performance and intelligence. We measured visual cortical GABA concentration, visuo-spatial intelligence and visual surround suppression in a group of healthy adults. Levels of GABA were strongly predictive of both intelligence and surround suppression, with higher levels of intelligence associated with higher levels of GABA and stronger surround suppression. These results indicate that GABA-mediated neural inhibition may be a key factor determining cognitive performance and suggests a physiological mechanism linking surround suppression and intelligence. Copyright © 2016 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  11. Alzheimer's disease and intelligence.

    Science.gov (United States)

    Yeo, R A; Arden, R; Jung, R E

    2011-06-01

    A significant body of evidence has accumulated suggesting that individual variation in intellectual ability, whether assessed directly by intelligence tests or indirectly through proxy measures, is related to risk of developing Alzheimer's disease (AD) in later life. Important questions remain unanswered, however, such as the specificity of risk for AD vs. other forms of dementia, and the specific links between premorbid intelligence and development of the neuropathology characteristic of AD. Lower premorbid intelligence has also emerged as a risk factor for greater mortality across myriad health and mental health diagnoses. Genetic covariance contributes importantly to these associations, and pleiotropic genetic effects may impact diverse organ systems through similar processes, including inefficient design and oxidative stress. Through such processes, the genetic underpinnings of intelligence, specifically, mutation load, may also increase the risk of developing AD. We discuss how specific neurobiologic features of relatively lower premorbid intelligence, including reduced metabolic efficiency, may facilitate the development of AD neuropathology. The cognitive reserve hypothesis, the most widely accepted account of the intelligence-AD association, is reviewed in the context of this larger literature.

  12. Spillovers from Foreign Direct Investment

    DEFF Research Database (Denmark)

    Meyer, Klaus E.; Sinani, Evis

    2005-01-01

    The extensive empirical literature analyzing productivity spillovers from foreign direct investment to local firms provides inconclusive results. Some studies find that foreign presence has a positive impact on the productivity of domestic firms, while others find no evidence or a negative effect...... for industrialized countries in the 1990s. Transition economies may experience spillovers, but these have been declining in recent years. Keywords: developing countries, transition economies, spillovers, foreign direct investment, technology transfer, meta-analysis...

  13. Why foreign firms forsake franchises

    OpenAIRE

    Blajina, M.

    2013-01-01

    This article is devoted to the problem of franchising in Russia. The article informs about difficulties, which face foreign companies developing their business in our country. Doing business in franchising foreign companies have to overcome some challenges such as: obtain a credit, unpredictability of the economy and so on. But in spite of all these difficulties many foreign companies and Russian ones set up franchising in Russia and promote themselves at the Russian market, but never the les...

  14. Global Health and Foreign Policy

    Science.gov (United States)

    Feldbaum, Harley; Lee, Kelley; Michaud, Joshua

    2010-01-01

    Health has long been intertwined with the foreign policies of states. In recent years, however, global health issues have risen to the highest levels of international politics and have become accepted as legitimate issues in foreign policy. This elevated political priority is in many ways a welcome development for proponents of global health, and it has resulted in increased funding for and attention to select global health issues. However, there has been less examination of the tensions that characterize the relationship between global health and foreign policy and of the potential effects of linking global health efforts with the foreign-policy interests of states. In this paper, the authors review the relationship between global health and foreign policy by examining the roles of health across 4 major components of foreign policy: aid, trade, diplomacy, and national security. For each of these aspects of foreign policy, the authors review current and historical issues and discuss how foreign-policy interests have aided or impeded global health efforts. The increasing relevance of global health to foreign policy holds both opportunities and dangers for global efforts to improve health. PMID:20423936

  15. Global health and foreign policy.

    Science.gov (United States)

    Feldbaum, Harley; Lee, Kelley; Michaud, Joshua

    2010-01-01

    Health has long been intertwined with the foreign policies of states. In recent years, however, global health issues have risen to the highest levels of international politics and have become accepted as legitimate issues in foreign policy. This elevated political priority is in many ways a welcome development for proponents of global health, and it has resulted in increased funding for and attention to select global health issues. However, there has been less examination of the tensions that characterize the relationship between global health and foreign policy and of the potential effects of linking global health efforts with the foreign-policy interests of states. In this paper, the authors review the relationship between global health and foreign policy by examining the roles of health across 4 major components of foreign policy: aid, trade, diplomacy, and national security. For each of these aspects of foreign policy, the authors review current and historical issues and discuss how foreign-policy interests have aided or impeded global health efforts. The increasing relevance of global health to foreign policy holds both opportunities and dangers for global efforts to improve health.

  16. 78 FR 90 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2013-01-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: National Intelligence University, Defense Intelligence... hereby given that a closed meeting of the National Intelligence University Board of Visitors has been...

  17. Iranian EFL Learners' Emotional Intelligence, Learning Styles, Strategy Use, and Their L2 Achievement

    Science.gov (United States)

    Afshar, Hassan Soodmand; Tofighi, Somayyeh; Hamazavi, Raouf

    2016-01-01

    The idea that language learning is facilitated or inhibited by a multitude of factors has prompted scholars in the field to investigate variables considered to be crucial in the process of second or foreign language learning. This study investigated relationships between emotional intelligence, learning style, language learning strategy use, and…

  18. The Learning Styles and Multiple Intelligences of EFL College Students in Kuwait

    Science.gov (United States)

    Alrabah, Sulaiman; Wu, Shu-hua; Alotaibi, Abdullah M.

    2018-01-01

    The study aimed to investigate the learning styles and multiple intelligences of English as foreign language (EFL) college-level students. "Convenience sampling" (Patton, 2015) was used to collect data from a population of 250 students enrolled in seven different academic departments at the College of Basic Education in Kuwait. The data…

  19. Why Is an Application of Multiple Intelligences Theory Important for Language Learning and Teaching Speaking Ability?

    Science.gov (United States)

    Boonma, Malai; Phaiboonnugulkij, Malinee

    2014-01-01

    This article calls for a strong need to propose the theoretical framework of the Multiple Intelligences theory (MI) and provide a suitable answer of the doubt in part of foreign language teaching. The article addresses the application of MI theory following various sources from Howard Gardner and the authors who revised this theory for use in the…

  20. On the Relationship of Multiple Intelligences with Listening Proficiency and Attitudes among Iranian TEFL University Students

    Science.gov (United States)

    Naeini, Ma'ssoumeh Bemani; Pandian, Ambigapathy

    2010-01-01

    Gardner's (1983) Multiple Intelligences Theory (MIT) has been found to have profound implications in teaching English as a foreign language (TEFL) in that it provides a way for teachers to recognize learners' individual cognitive and affective differences by providing favorable motivational conditions for learning. However, little investigation…

  1. Cultural Intelligence and Writing Ability: Delving into Fluency, Accuracy and Complexity

    Science.gov (United States)

    Ghonsooly, Behzad; Shalchy, Somayye

    2013-01-01

    Over the recent decades, cultural intelligence, now referred to as CQ has become a burgeoning area of research in the domain of business and management. Given the paucity of research on the effects of CQ on second or foreign language learning especially writing, this study intends to examine the effects of CQ on L2 learners' written performance…

  2. Virtual Foreign Correspondence: Experimental Instructions in Digital Foreign News Reporting

    Science.gov (United States)

    Hahn, Oliver; Stalph, Florian; Steller, Tom

    2018-01-01

    Within a series of six qualitative studies over seven years, this research in instructing journalism students investigates whether or not covering foreign news from home via Internet technology can substitute foreign correspondents on-site to reduce costs. Co-orientation and decontextualization can be described as characteristic for virtual…

  3. Business Intelligence using Software Agents

    Directory of Open Access Journals (Sweden)

    Ana-Ramona BOLOGA

    2011-12-01

    Full Text Available This paper presents some ideas about business intelligence today and the importance of developing real time business solutions. The authors make an exploration of links between business intelligence and artificial intelligence and focuses specifically on the implementation of software agents-based systems in business intelligence. There are briefly presented some of the few solutions proposed so far that use software agents properties for the benefit of business intelligence. The authors then propose some basic ideas for developing real-time agent-based software system for business intelligence in supply chain management, using Case Base Reasoning Agents.

  4. Fluid intelligence: A brief history.

    Science.gov (United States)

    Kent, Phillip

    2017-01-01

    The concept of fluid and crystallized intelligence was introduced to the psychological community approximately 75 years ago by Raymond B. Cattell, and it continues to be an area of active research and controversy. The purpose of this paper is to provide a brief overview of the origin of the concept, early efforts to define intelligence and uses of intelligence tests to address pressing social issues, and the ongoing controversies associated with fluid intelligence and the structure of intelligence. The putative neuropsychological underpinnings and neurological substrates of fluid intelligence are discussed.

  5. Glass Foreign Body Hand Radiograph

    Directory of Open Access Journals (Sweden)

    Hamid Ehsani-Nia, DO

    2018-04-01

    Full Text Available History of present illness: A 27-year-old female sustained an injury to her left hand after she tripped and fell on a vase. She presented to the emergency department (ED complaining of pain over the laceration. Upon examination, patient presented with multiple small abrasions of the medial aspect of the left 5thdigit that are minimally tender. Additionally, she has one 0.5cm linear laceration of the medial aspect of the 5thmetacarpal with severe tenderness in the area and palpable underlying foreign body. Significant findings: Left hand plain radiography demonstrated a subcutaneous foreign body medial to the 5thmetacarpal that is radiopaque, trapezoidal in shape, and measures approximately 11mm x 3mm. Discussion: Laceration repairs are amongst the most common procedures in the emergency department; however, consideration for foreign body is often underdiagnosed. Imaging is performed in only about 11% of all traumatic wounds in the ED.1 Of those injuries relating to the hand that are subsequently imaged, about 15% are found to have a foreign body.2,3 Additionally, it is estimated that foreign bodies are present in 7% to 8.7% of all wounds caused by glass objects.4,5 Glass is among the most common foreign bodies in lacerations, and fortunately they are radiopaque and relatively well visualized radiographically. It has been demonstrated that 2mm glass foreign bodies have a 99% detection rate with radiography, and 1mm glass foreign bodies an 83% detection rate.6 Patient perception of foreign body has a positive predictive value of 31%, making it a poor source in influencing clinical decision-making to obtain wound radiographs.3 Clinicians should have a high suspicion for foreign body in lacerations, particularly those caused by glass, and utilize close physical examination and imaging for evaluation. Topics: Radiography, glass, foreign body, trauma

  6. Radioisotopic Thermoelectric Generator (RTG) Surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Mulford, Roberta Nancy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-29

    This lecture discusses stockpile stewardship efforts and the role surveillance plays in the process. Performance of the RTGs is described, and the question of the absence of anticipated He is addressed.

  7. Surveillance of nuclear power reactors

    International Nuclear Information System (INIS)

    Marini, J.

    1983-01-01

    Surveillance of nuclear power reactors is now a necessity imposed by such regulatory documents as USNRC Regulatory Guide 1.133. In addition to regulatory requirements, however, nuclear reactor surveillance offers plant operators significant economic advantages insofar as a single day's outage is very costly. The economic worth of a reactor surveillance system can be stated in terms of the improved plant availability provided through its capability to detect incidents before they occur and cause serious damage. Furthermore, the TMI accident has demonstrated the need for monitoring certain components to provide operators with clear information on their functional status. In response to the above considerations, Framatome has developed a line of products which includes: pressure vessel leakage detection systems, loose part detection systems, component vibration monitoring systems, and, crack detection and monitoring systems. Some of the surveillance systems developed by Framatome are described in this paper

  8. Youth Risk Behavior Surveillance System

    Science.gov (United States)

    ... Youth Risk Behavior Surveillance System (YRBSS) monitors six types of health-risk behaviors that contribute to the leading causes of death and disability among youth and adults, including— Behaviors that contribute ...

  9. Health surveillance - myth and reality

    International Nuclear Information System (INIS)

    Sharp, C.

    1998-01-01

    This paper discusses the principles, health benefit and cost-effectiveness of health surveillance in the occupational setting, which apply to exposure to ionising radiations in the same manner as to other hazards in the workplace. It highlights the techniques for undertaking health surveillance, discusses their relative advantages and disadvantages and illustrates these in relation to specific hazards. The responsibilities of the medical staff and of the worker are also discussed. (author)

  10. Surface Environmental Surveillance Procedures Manual

    Energy Technology Data Exchange (ETDEWEB)

    RW Hanf; TM Poston

    2000-09-20

    Environmental surveillance data are used in assessing the impact of current and past site operations on human health and the environment, demonstrating compliance with applicable local, state, and federal environmental regulations, and verifying the adequacy of containment and effluent controls. SESP sampling schedules are reviewed, revised, and published each calendar year in the Hanford Site Environmental Surveillance Master Sampling Schedule. Environmental samples are collected by SESP staff in accordance with the approved sample collection procedures documented in this manual.

  11. SCORPION II persistent surveillance system update

    Science.gov (United States)

    Coster, Michael; Chambers, Jon

    2010-04-01

    This paper updates the improvements and benefits demonstrated in the next generation Northrop Grumman SCORPION II family of persistent surveillance and target recognition systems produced by the Xetron Campus in Cincinnati, Ohio. SCORPION II reduces the size, weight, and cost of all SCORPION components in a flexible, field programmable system that is easier to conceal and enables integration of over fifty different Unattended Ground Sensor (UGS) and camera types from a variety of manufacturers, with a modular approach to supporting multiple Line of Sight (LOS) and Beyond Line of Sight (BLOS) communications interfaces. Since 1998 Northrop Grumman has been integrating best in class sensors with its proven universal modular Gateway to provide encrypted data exfiltration to Common Operational Picture (COP) systems and remote sensor command and control. In addition to feeding COP systems, SCORPION and SCORPION II data can be directly processed using a common sensor status graphical user interface (GUI) that allows for viewing and analysis of images and sensor data from up to seven hundred SCORPION system gateways on single or multiple displays. This GUI enables a large amount of sensor data and imagery to be used for actionable intelligence as well as remote sensor command and control by a minimum number of analysts.

  12. Traffic Flow Wide-Area Surveillance system

    Energy Technology Data Exchange (ETDEWEB)

    Allgood, G.O.; Ferrell, R.K.; Kercel, S.W.; Abston, R.A.

    1994-09-01

    Traffic management can be thought of as a stochastic queuing process where the serving time at one of its control points is dynamically linked to the global traffic pattern, which is, in turn, dynamically linked to the control point. For this closed-loop system to be effective, the traffic management system must sense and interpret a large spatial projection of data originating from multiple sensor suites. This concept is the basis for the development of a Traffic Flow Wide-Area Surveillance (TFWAS) system. This paper presents the results of a study by Oak Ridge National Laboratory to define the operational specifications and characteristics, to determine the constraints, and to examine the state of technology of a TFWAS system in terms of traffic management and control. In doing so, the functions and attributes of a TFWAS system are mapped into an operational structure consistent with the Intelligent Vehicle Highway System (IVHS) concept and the existing highway infrastructure. This mapping includes identifying candidate sensor suites and establishing criteria, requirements, and performance measures by which these systems can be graded in their ability and practicality to meet the operational requirements of a TFWAS system. In light of this, issues such as system integration, applicable technologies, impact on traffic management and control, and public acceptance are addressed.

  13. Traffic flow wide-area surveillance system

    Science.gov (United States)

    Allgood, Glenn O.; Ferrell, Regina K.; Kercel, Stephen W.; Abston, Ruth A.

    1995-01-01

    Traffic management can be thought of as a stochastic queuing process where the serving time at one of its control points is dynamically linked to the global traffic pattern, which is, in turn, dynamically linked to the control point. For this closed-loop system to be effective, the traffic management system must sense and interpret a large spatial projection of data originating from multiple sensor suites. This concept is the basis for the development of a traffic flow wide-area surveillance (TFWAS) system. This paper presents the results of a study by Oak Ridge National Laboratory to define the operational specifications and characteristics, to determine the constraints, and to examine the state of technology of a TFWAS system in terms of traffic management and control. In doing so, the functions and attributes of a TFWAS system are mapped into an operational structure consistent with the Intelligent Vehicle Highway System (IVHS) concept and the existing highway infrastructure. This mapping includes identifying candidate sensor suites and establishing criteria, requirements, and performance measures by which these systems can be graded in their ability and practicality to meet the operational requirements of a TFWAS system. In light of this, issues such as system integration, applicable technologies, impact on traffic management and control, and public acceptance are addressed.

  14. New Perspectives on Intelligence Collection and Processing

    Science.gov (United States)

    2016-06-01

    MASINT Measurement and Signature Intelligence NPS Naval Postgraduate School OSINT Open Source Intelligence pdf Probability Density Function SIGINT...MASINT): different types of sensors • Open Source Intelligence ( OSINT ): from all open sources • Signals Intelligence (SIGINT): intercepting the

  15. Trends in ambient intelligent systems the role of computational intelligence

    CERN Document Server

    Khan, Mohammad; Abraham, Ajith

    2016-01-01

    This book demonstrates the success of Ambient Intelligence in providing possible solutions for the daily needs of humans. The book addresses implications of ambient intelligence in areas of domestic living, elderly care, robotics, communication, philosophy and others. The objective of this edited volume is to show that Ambient Intelligence is a boon to humanity with conceptual, philosophical, methodical and applicative understanding. The book also aims to schematically demonstrate developments in the direction of augmented sensors, embedded systems and behavioral intelligence towards Ambient Intelligent Networks or Smart Living Technology. It contains chapters in the field of Ambient Intelligent Networks, which received highly positive feedback during the review process. The book contains research work, with in-depth state of the art from augmented sensors, embedded technology and artificial intelligence along with cutting-edge research and development of technologies and applications of Ambient Intelligent N...

  16. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  17. BRACEROS, MEXICO, AND FOREIGN TRADE.

    Science.gov (United States)

    1966

    CRITICISM OF GOVERNMENTAL POLICY RESTRICTING USE OF FOREIGN CONTRACT WORKERS ON AMERICAN FARMS IN 1965 EXPRESSES THREE POSSIBILITIES -- (1) A SEVERE DISRUPTION OF DOMESTIC FRUIT AND VEGETABLE PRODUCTION, (2) AN INCREASE OF AMERICAN INVESTMENT IN FOREIGN, PARTICULARLY MEXICAN, AGRICULTURAL PRODUCTION, AND (3) A LOSS OF UNITED STATES EXPORT MARKET…

  18. Foreign Language Study in Budapest.

    Science.gov (United States)

    Feinberg, Lilian O.; Tarjan, Jeno

    1968-01-01

    Foreign language study at the Karl Marx University of Economic Sciences in Budapest aims to develop the ability to use the language as a native would in a particular business or profession, and to help the student become fully aware of the political, historical, sociological, and geographical background of the foreign country and the…

  19. Foreign bodies in gastrointestinal tract

    Directory of Open Access Journals (Sweden)

    Ayşe Kefeli

    2014-03-01

    Full Text Available Objective: Ingested foreign bodies in gastrointestinal tract are a common event which can cause serious morbidity and mortality in the children and adult population. For this reason, early diagnosis and treatment are crucial for preventing these life threatening complications. In this study, we aimed to analyze the characteristics of the patients with upper gastrointestinal foreign bodies that were treated in our department. Methods: Patients diagnosed with upper gastrointestinal foreign bodies who were admitted to our hospital between February 2010 and August2013 were evaluated retrospectively. The data regarding their age, gender, clinical profile, type and localization of the esophageal foreign body, performed endoscopic procedure and initial symptoms of the patients were noted and analyzed statistically. Results: Thirty-eight patients with a diagnosis of gastrointestinal foreign body were included in this study. Of these patients, 21 were male and 17 were female. The youngest patient was 17 years old and the oldest patient was 79 years old. Most of the foreign bodies (%55.3 detected in the stomach. Food waste and metallic objects in 21 and 16 patients respectively. The most common complaint was dysphagia (%50. After endoscopic intervention three of the patients were directed to surgery. Conclusion: Early recognition and treatment of gastrointestinal foreign bodies is important as their complications are life threatening. The best method of removal of foreign bodies is controversial. Early management with upper gastrointestinal endoscopy is the most efficient and safe treatment method in current conditions.

  20. Uncommon, undeclared oesophageal foreign bodies

    African Journals Online (AJOL)

    2011-05-11

    May 11, 2011 ... presented with a sudden onset of total dysphagia and history of ingestion of foreign bodies was not volunteered by any despite direct questioning. Plain radiograph of the neck and chest in either case did not reveal presence of foreign body. Both were successfully removed through rigid oesophagoscopy.

  1. Evaluating of foreign trade security

    OpenAIRE

    Vasyliev Andriy

    2015-01-01

    A method of evaluating foreign trade security is considered based on horizontally integrated approach to research security issues, taking into account the conditions of management, factors, components and levels of external security. The work was based theories of security, economics, management theory, practice of state regulation of foreign trade.

  2. Foreign uranium supply. Final report

    International Nuclear Information System (INIS)

    McLeod, N.B.; Steyn, J.J.

    1978-04-01

    This report presents an assessment of the extent to which foreign uranium may be available to United States utilities in the short term (through 1980), the intermediate term (1981--1985), and the long term (1986--95). All free world foreign uranium producers and prospects are included, with particular emphasis on Australia, Canada, southern Africa, France, and French-speaking Africa. The assessment includes reserves, resources, exploration and prospects; firm and potential production capacity and prospects; national policies and relevant political and economic conditions; foreign uranium demand; etc. Conclusions are: Foreign supply capability is greater than foreign demand in the near term. The current availability of uncommitted future Australian production presents an unusual opportunity for establishing commercial relations with very substantial producers. Foreign uranium contracts represent an increase in diversity of supply and access to resources but have less assurance of supply than do domestic contracts. However, uncertainties can frequently be accommodated within an overall procurement program, thereby retaining the diversity and price advantages of foreign procurement. The practice of market pricing of contracts reduces the incentives for foreign contracting

  3. Foreign workers in South Korea

    Directory of Open Access Journals (Sweden)

    Su-Jin Lim

    2010-07-01

    Full Text Available In today’s global age many people cross national borders in search of better work and more wages. According to IOM, more than 100 000 000 workers leave their homeland and migrate to another country for this reason. Europe and North America have already experienced increase in foreign labor for many decades but nowadays, it is very common to see foreign laborers in Asian countries. As the number of foreign laborers rapidly increased, however, so did many social problems in relation to these workers. No country is safe from or immune to such social problems in regards to the foreign workers especially with a much easier and more efficient transportation system. In case of South Korea, the history of foreign labor may not be as long as other nations but as of 2007, it boasts of more than 250 000 foreign laborers and is thus facing just as many social problems as well. In order to investigate such social issues, this article explores the history of foreign laborers and their current situation in South Korea. Furthermore, this artticle examines both internal and external factors which may have caused exponential growth of foreign labor market in South Korea in the past decade.

  4. Integrated Foreign Exchange Risk Management

    DEFF Research Database (Denmark)

    Aabo, Tom; Høg, Esben; Kuhn, Jochen

    Empirical research has focused on export as a proxy for the exchange rate exposure and the use of foreign exchange derivatives as the instrument to deal with this exposure. This empirical study applies an integrated foreign exchange risk management approach with a particular focus on the role...

  5. Social Representations of Intelligence

    Directory of Open Access Journals (Sweden)

    Elena Zubieta

    2016-02-01

    Full Text Available The article stresses the relationship between Explicit and Implicit theories of Intelligence. Following the line of common sense epistemology and the theory of Social Representations, a study was carried out in order to analyze naive’s explanations about Intelligence Definitions. Based on Mugny & Carugati (1989 research, a self-administered questionnaire was designed and filled in by 286 subjects. Results are congruent with the main hyphotesis postulated: A general overlap between explicit and implicit theories showed up. According to the results Intelligence appears as both, a social attribute related to social adaptation and as a concept defined in relation with contextual variables similar to expert’s current discourses. Nevertheless, conceptions based on “gifted ideology” still are present stressing the main axes of Intelligence debate: biological and sociological determinism. In the same sense, unfamiliarity and social identity are reaffirmed as organizing principles of social representation. The distance with the object -measured as the belief in intelligence differences as a solve/non solve problem- and the level of implication with the topic -teachers/no teachers- appear as discriminating elements at the moment of supporting specific dimensions. 

  6. Mobile Situational Awareness Tool: Unattended Ground Sensor-Based Remote Surveillance System

    Science.gov (United States)

    2014-09-01

    Language 5 ISR intelligence, surveillance, and reconnaissance IV inter-visual LAMP Linux, Apache, MySQL , PHP LP/OP listening post / observation post...applications are coded in Java , while most iOS applications are coded in C# [43]. Also complicating the task, devices may have a different operating...build our application server utilizing a Linux, Apache, MySQL , PHP (LAMP) stack because of its open-source nature, widespread use on the Internet

  7. Video Surveillance using a Multi-Camera Tracking and Fusion System

    OpenAIRE

    Zhang , Zhong; Scanlon , Andrew; Yin , Weihong; Yu , Li; Venetianer , Péter L.

    2008-01-01

    International audience; Usage of intelligent video surveillance (IVS) systems is spreading rapidly. These systems are being utilized in a wide range of applications. In most cases, even in multi-camera installations, the video is processed independently in each feed. This paper describes a system that fuses tracking information from multiple cameras, thus vastly expanding its capabilities. The fusion relies on all cameras being calibrated to a site map, while the individual sensors remain lar...

  8. Foreign Firms, Domestic Wages

    DEFF Research Database (Denmark)

    Malchow-Møller, Nikolaj; Markusen, James R.; Schjerning, Bertel

    Many papers have documented a wage premium in foreign-owned and large firms. However, there is very little formal theory in the literature and empirical analyses are typically not based on hypotheses which are rigorously derived from theory. This paper contributes to the theory-empirics gap...... by developing a model that allows for two "pure" explanations for the wage premium. The first is a heterogenous-worker explanation along the lines of Yeaple (2005), where firms that select more scaleintensive technologies select ex-ante more productive workers. In this case, the wage premium is a pure selection...... phenomenon. The second explanation builds on the heterogeneous-firm model of Melitz (2003) combined with on-the-job learning as in Markusen (2001). Productivity differences between firms are internalized by ex-ante homogeneous workers, so the wage premium is a pure learning phenomenon due to ex-post higher...

  9. Schweizer RU-38A Twin-Condor: covert surveillance aircraft

    Science.gov (United States)

    O'Toole, Michael J.; Schweizer, Paul H.

    1997-11-01

    The world order has changed and with it, governments are now faced with waging a new type of `ware.' Regional instability, drug trafficking, environmental issues, international terrorism, and illegal immigration are examples of escalating problems that cross international boundaries and threaten the security of nations. The first and most important element in coping with these illegal activities is the ability to detect and monitor events in a timely and secure fashion. Conventional means of gathering intelligence such as large airborne collection systems and satellites lack the flexibility, dwell times, and cost effectiveness to meet many of today's needs. There is a growing requirement for airborne platforms that can covertly perform surveillance missions during either day or night and in a cost effective manner. To meet this need, Schweizer Aircraft has recently developed the RU-38A twin-engine surveillance aircraft. This paper discusses the evolution and principle design concepts of this aircraft and how its unique performance enables the RU-38A to achieve new levels of surveillance capability.

  10. Neurology of foreign language aptitude

    Directory of Open Access Journals (Sweden)

    Adriana Biedroń

    2015-01-01

    Full Text Available This state-of-the art paper focuses on the poorly explored issue of foreign language aptitude, attempting to present the latest developments in this field and reconceptualizations of the construct from the perspective of neuroscience. In accordance with this goal, it first discusses general directions in neurolinguistic research on foreign language aptitude, starting with the earliest attempts to define the neurological substrate for talent, sources of difficulties in the neurolinguistic research on foreign language aptitude and modern research methods. This is followed by the discussion of the research on the phonology of foreign language aptitude with emphasis on functional and structural studies as well as their consequences for the knowledge of the concept. The subsequent section presents the studies which focus on lexical and morphosyntactic aspects of foreign language aptitude. The paper ends with a discussion of the limitations of contemporary research, the future directions of such research and selec ed methodological issues.

  11. Sharing organs with foreign nationals.

    Science.gov (United States)

    Bruni, Rebecca; Wright, Linda

    2011-03-01

    Organs for transplantation are an absolute scarcity throughout the world, and many countries do not offer transplantation. Developed countries with transplant programs receive requests to list foreign nationals for transplantation. Any national standard deserves justification by a thorough exploration of the issues. In this article, the issues regarding organ transplantation for foreign nationals in Canada are explored. Currently Canada has no policy on listing foreign nationals for transplantation. Three topics are reviewed: (1) arguments for and against the transplantation of organs from deceased donors to foreign nationals, (2) relevant legislation and position statements, and (3) relevant practices in other countries. Finally, practical policy options are suggested. This article's analysis of the issues will provide guidance for health care professionals and policy makers in Canada and developed countries exploring listing foreign nationals for transplantation.

  12. Modelling traffic flows with intelligent cars and intelligent roads

    NARCIS (Netherlands)

    van Arem, Bart; Tampere, Chris M.J.; Malone, Kerry

    2003-01-01

    This paper addresses the modeling of traffic flows with intelligent cars and intelligent roads. It will describe the modeling approach MIXIC and review the results for different ADA systems: Adaptive Cruise Control, a special lane for Intelligent Vehicles, cooperative following and external speed

  13. Intelligence analysis – the royal discipline of Competitive Intelligence

    Directory of Open Access Journals (Sweden)

    František Bartes

    2011-01-01

    Full Text Available The aim of this article is to propose work methodology for Competitive Intelligence teams in one of the intelligence cycle’s specific area, in the so-called “Intelligence Analysis”. Intelligence Analysis is one of the stages of the Intelligence Cycle in which data from both the primary and secondary research are analyzed. The main result of the effort is the creation of added value for the information collected. Company Competiitve Intelligence, correctly understood and implemented in business practice, is the “forecasting of the future”. That is forecasting about the future, which forms the basis for strategic decisions made by the company’s top management. To implement that requirement in corporate practice, the author perceives Competitive Intelligence as a systemic application discipline. This approach allows him to propose a “Work Plan” for Competitive Intelligence as a fundamental standardized document to steer Competitive Intelligence team activities. The author divides the Competitive Intelligence team work plan into five basic parts. Those parts are derived from the five-stage model of the intelligence cycle, which, in the author’s opinion, is more appropriate for complicated cases of Competitive Intelligence.

  14. Elementary Surveillance (ELS) and Enhanced Surveillance (EHS) Validation via Mode S Secondary Radar Surveillance

    National Research Council Canada - National Science Library

    Grappel, Robert D; Harris, Garrett S; Kozar, Mark J; Wiken, Randall T

    2008-01-01

    ...) and Enhanced Surveillance (ERS) data link applications. The intended audience for this report is an engineering staff assigned the task of implementing a monitoring system used to determine ELS and EHS compliance...

  15. The Literature of Competitive Intelligence.

    Science.gov (United States)

    Walker, Thomas D.

    1994-01-01

    Describes competitive intelligence (CI) literature in terms of its location, quantity, authorship, length, and problems of bibliographic access. Highlights include subject access; competitive intelligence research; espionage and security; monographs; and journals. (21 references) (LRW)

  16. Artificial intelligence in nanotechnology.

    Science.gov (United States)

    Sacha, G M; Varona, P

    2013-11-15

    During the last decade there has been increasing use of artificial intelligence tools in nanotechnology research. In this paper we review some of these efforts in the context of interpreting scanning probe microscopy, the study of biological nanosystems, the classification of material properties at the nanoscale, theoretical approaches and simulations in nanoscience, and generally in the design of nanodevices. Current trends and future perspectives in the development of nanocomputing hardware that can boost artificial-intelligence-based applications are also discussed. Convergence between artificial intelligence and nanotechnology can shape the path for many technological developments in the field of information sciences that will rely on new computer architectures and data representations, hybrid technologies that use biological entities and nanotechnological devices, bioengineering, neuroscience and a large variety of related disciplines.

  17. Artificial intelligence in nanotechnology

    Science.gov (United States)

    Sacha, G. M.; Varona, P.

    2013-11-01

    During the last decade there has been increasing use of artificial intelligence tools in nanotechnology research. In this paper we review some of these efforts in the context of interpreting scanning probe microscopy, the study of biological nanosystems, the classification of material properties at the nanoscale, theoretical approaches and simulations in nanoscience, and generally in the design of nanodevices. Current trends and future perspectives in the development of nanocomputing hardware that can boost artificial-intelligence-based applications are also discussed. Convergence between artificial intelligence and nanotechnology can shape the path for many technological developments in the field of information sciences that will rely on new computer architectures and data representations, hybrid technologies that use biological entities and nanotechnological devices, bioengineering, neuroscience and a large variety of related disciplines.

  18. Intelligent environmental data warehouse

    International Nuclear Information System (INIS)

    Ekechukwu, B.

    1998-01-01

    Making quick and effective decisions in environment management are based on multiple and complex parameters, a data warehouse is a powerful tool for the over all management of massive environmental information. Selecting the right data from a warehouse is an important factor consideration for end-users. This paper proposed an intelligent environmental data warehouse system. It consists of data warehouse to feed an environmental researchers and managers with desire environmental information needs to their research studies and decision in form of geometric and attribute data for study area, and a metadata for the other sources of environmental information. In addition, the proposed intelligent search engine works according to a set of rule, which enables the system to be aware of the environmental data wanted by the end-user. The system development process passes through four stages. These are data preparation, warehouse development, intelligent engine development and internet platform system development. (author)

  19. Intelligent control systems 1990

    International Nuclear Information System (INIS)

    Shoureshi, R.

    1991-01-01

    The field of artificial intelligence (Al) has generated many useful ideas and techniques that can be integrated into the design of control systems. It is believed and, for special cases, has been demonstrated, that integration of Al into control systems would provide the necessary tools for solving many of the complex problems that present control techniques and Al algorithms are unable to do, individually. However, this integration requires the development of basic understanding and new fundamentals to provide scientific bases for achievement of its potential. This book presents an overview of some of the latest research studies in the area of intelligent control systems. These papers present techniques for formulation of intelligent control, and development of the rule-based control systems. Papers present applications of control systems in nuclear power plants and HVAC systems

  20. Artificial Intelligence in Cardiology.

    Science.gov (United States)

    Johnson, Kipp W; Torres Soto, Jessica; Glicksberg, Benjamin S; Shameer, Khader; Miotto, Riccardo; Ali, Mohsin; Ashley, Euan; Dudley, Joel T

    2018-06-12

    Artificial intelligence and machine learning are poised to influence nearly every aspect of the human condition, and cardiology is not an exception to this trend. This paper provides a guide for clinicians on relevant aspects of artificial intelligence and machine learning, reviews selected applications of these methods in cardiology to date, and identifies how cardiovascular medicine could incorporate artificial intelligence in the future. In particular, the paper first reviews predictive modeling concepts relevant to cardiology such as feature selection and frequent pitfalls such as improper dichotomization. Second, it discusses common algorithms used in supervised learning and reviews selected applications in cardiology and related disciplines. Third, it describes the advent of deep learning and related methods collectively called unsupervised learning, provides contextual examples both in general medicine and in cardiovascular medicine, and then explains how these methods could be applied to enable precision cardiology and improve patient outcomes. Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.

  1. Artificial intelligence in nanotechnology

    International Nuclear Information System (INIS)

    Sacha, G M; Varona, P

    2013-01-01

    During the last decade there has been increasing use of artificial intelligence tools in nanotechnology research. In this paper we review some of these efforts in the context of interpreting scanning probe microscopy, the study of biological nanosystems, the classification of material properties at the nanoscale, theoretical approaches and simulations in nanoscience, and generally in the design of nanodevices. Current trends and future perspectives in the development of nanocomputing hardware that can boost artificial-intelligence-based applications are also discussed. Convergence between artificial intelligence and nanotechnology can shape the path for many technological developments in the field of information sciences that will rely on new computer architectures and data representations, hybrid technologies that use biological entities and nanotechnological devices, bioengineering, neuroscience and a large variety of related disciplines. (topical review)

  2. Critical Surveillance Studies in the Information Society

    Directory of Open Access Journals (Sweden)

    Thomas Allmer

    2011-11-01

    Full Text Available The overall aim of this paper is to clarify how we can theorize and systemize economic surveillance. Surveillance studies scholars like David Lyon stress that economic surveillance such as monitoring consumers or the workplace are central aspects of surveillance societies. The approach that is advanced in this work recognizes the importance of the role of the economy in contemporary surveillance societies. The paper at hand constructs theoretically founded typologies in order to systemize the existing literature of surveillance studies and to analyze examples of surveillance. Therefore, it mainly is a theoretical approach combined with illustrative examples. This contribution contains a systematic discussion of the state of the art of surveillance and clarifies how different notions treat economic aspects of surveillance. In this work it is argued that the existing literature is insufficient for studying economic surveillance. In contrast, a typology of surveillance in the modern economy, which is based on foundations of a political economy approach, allows providing a systematic analysis of economic surveillance on the basis of current developments on the Internet. Finally, some political recommendations are drawn in order to overcome economic surveillance. This contribution can be fruitful for scholars who want to undertake a systematic analysis of surveillance in the modern economy and who want to study the field of surveillance critically.

  3. Social Networks for Surveillance and Security: ‘Using Online Techniques to make something happen in the real or cyber world’

    OpenAIRE

    Harbisher, Ben

    2017-01-01

    This chapter examines the use of Social Networks for Surveillance and Security in relation to the deployment of intelligence resources in the UK. The chapter documents the rise of Military Intelligence agencies during both World Wars (such as GCHQ and MI5), and the subsequent use of these institutions to maintain order during peacetime. In addition to the way in which military organisations have used clandestine techniques such as double agents, spies, and various programmes designed for cond...

  4. Artificial Intelligence and Economic Theories

    OpenAIRE

    Marwala, Tshilidzi; Hurwitz, Evan

    2017-01-01

    The advent of artificial intelligence has changed many disciplines such as engineering, social science and economics. Artificial intelligence is a computational technique which is inspired by natural intelligence such as the swarming of birds, the working of the brain and the pathfinding of the ants. These techniques have impact on economic theories. This book studies the impact of artificial intelligence on economic theories, a subject that has not been extensively studied. The theories that...

  5. Gastrointestinal Illnesses among French Forces Deployed to Djibouti: French Military Health Surveillance, 2005–2009

    Science.gov (United States)

    Ollivier, Lénaïck; Decam, Christophe; de Santi, Vincent Pommier; Darar, Houssein Y.; Dia, Aïssata; Nevin, Remington L.; Romand, Olivier; Bougère, Jacques; Deparis, Xavier; Boutin, Jean-Paul

    2010-01-01

    Despite an increase in foreign tourism and in the numbers of foreign military personnel deployed to Djibouti, little is known about the risk of gastrointestinal illness in this country in eastern Africa. To assess risk and to describe common features of gastrointestinal illnesses, reports of illness derived from military health surveillance data collected during 2005–2009 among French service members deployed to Djibouti were reviewed. Diarrhea was the most common problem; it had an annual incidence ranging from 260 to 349 cases per 1,000 person-years. The risk was higher among soldiers deployed short-term (four months) than among soldiers deployed long-term (two years). This five-year review of French health surveillance data documents a significant burden of diarrhea among French soldiers in Djibouti. The identification of factors associated with risk may permit efficient targeting of interventions to reduce morbidity from gastrointestinal illness. PMID:20889897

  6. Gastrointestinal illnesses among French forces deployed to Djibouti: French military health surveillance, 2005-2009.

    Science.gov (United States)

    Ollivier, Lénaïck; Decam, Christophe; Pommier de Santi, Vincent; Darar, Houssein Y; Dia, Aïssata; Nevin, Remington L; Romand, Olivier; Bougère, Jacques; Deparis, Xavier; Boutin, Jean-Paul

    2010-10-01

    Despite an increase in foreign tourism and in the numbers of foreign military personnel deployed to Djibouti, little is known about the risk of gastrointestinal illness in this country in eastern Africa. To assess risk and to describe common features of gastrointestinal illnesses, reports of illness derived from military health surveillance data collected during 2005-2009 among French service members deployed to Djibouti were reviewed. Diarrhea was the most common problem; it had an annual incidence ranging from 260 to 349 cases per 1,000 person-years. The risk was higher among soldiers deployed short-term (four months) than among soldiers deployed long-term (two years). This five-year review of French health surveillance data documents a significant burden of diarrhea among French soldiers in Djibouti. The identification of factors associated with risk may permit efficient targeting of interventions to reduce morbidity from gastrointestinal illness.

  7. Profile of tuberculosis among the foreign-born population in Japan, 2007-2014.

    Science.gov (United States)

    Kawatsu, Lisa; Uchimura, Kazuhiro; Izumi, Kiyohiko; Ohkado, Akihiro; Ishikawa, Nobukatsu

    2016-01-01

    The proportion of foreign-born people among the newly notified tuberculosis (TB) patients has been increasing in recent years and potentially poses a new challenge to TB control in Japan. In this report, we analysed the data from the Japan TB surveillance system between 2007 and 2014 to gain an overview of the trends and characteristics of foreign-born TB patients in Japan. We found that the proportion of foreign-born TB patients was especially high among the younger age groups - 44.1% among the 20-29 years age group in 2014. The largest groups of foreign-born patients were from China and the Philippines; however, the number of those from Nepal and Viet Nam was on the rise. Students comprised the second largest professional category group for TB after regular workers, and its proportion increased over the study period. Compared to Japan-born TB patients, foreign-born patients were more likely to be diagnosed through routine medical check-ups. Treatment successes and patients still on treatment were significantly lower among foreign-born patients than their Japan-born counterparts; and transferred-out and unknown outcomes were higher. Our results indicated that distinctive subgroups within the foreign-born population in Japan, especially students and regular workers, might have a higher risk of developing TB. Measures to ensure early diagnosis and treatment adherence should be adapted to such populations.

  8. Profile of tuberculosis among the foreign-born population in Japan, 2007–2014

    Science.gov (United States)

    Uchimura, Kazuhiro; Izumi, Kiyohiko; Ohkado, Akihiro; Ishikawa, Nobukatsu

    2016-01-01

    The proportion of foreign-born people among the newly notified tuberculosis (TB) patients has been increasing in recent years and potentially poses a new challenge to TB control in Japan. In this report, we analysed the data from the Japan TB surveillance system between 2007 and 2014 to gain an overview of the trends and characteristics of foreign-born TB patients in Japan. We found that the proportion of foreign-born TB patients was especially high among the younger age groups – 44.1% among the 20–29 years age group in 2014. The largest groups of foreign-born patients were from China and the Philippines; however, the number of those from Nepal and Viet Nam was on the rise. Students comprised the second largest professional category group for TB after regular workers, and its proportion increased over the study period. Compared to Japan-born TB patients, foreign-born patients were more likely to be diagnosed through routine medical check-ups. Treatment successes and patients still on treatment were significantly lower among foreign-born patients than their Japan-born counterparts; and transferred-out and unknown outcomes were higher. Our results indicated that distinctive subgroups within the foreign-born population in Japan, especially students and regular workers, might have a higher risk of developing TB. Measures to ensure early diagnosis and treatment adherence should be adapted to such populations. PMID:27508086

  9. Collective Intelligence in Crises

    DEFF Research Database (Denmark)

    Büscher, Monika; Liegl, Michael; Thomas, Vanessa

    2014-01-01

    New practices of social media use in emergency response seem to enable broader `situation awareness' and new forms of crisis management. The scale and speed of innovation in this field engenders disruptive innovation or a reordering of social, political, economic practices of emergency response....... By examining these dynamics with the concept of social collective intelligence, important opportunities and challenges can be examined. In this chapter we focus on socio-technical aspects of social collective intelligence in crises to discuss positive and negative frictions and avenues for innovation...

  10. Artificial intelligence executive summary

    International Nuclear Information System (INIS)

    Wamsley, S.J.; Purvis, E.E. III

    1984-01-01

    Artificial intelligence (AI) is a high technology field that can be used to provide problem solving diagnosis, guidance and for support resolution of problems. It is not a stand alone discipline, but can also be applied to develop data bases for retention of the expertise that is required for its own knowledge base. This provides a way to retain knowledge that otherwise may be lost. Artificial Intelligence Methodology can provide an automated construction management decision support system, thereby restoring the manager's emphasis to project management

  11. Artificial intelligence in cardiology.

    Science.gov (United States)

    Bonderman, Diana

    2017-12-01

    Decision-making is complex in modern medicine and should ideally be based on available data, structured knowledge and proper interpretation in the context of an individual patient. Automated algorithms, also termed artificial intelligence that are able to extract meaningful patterns from data collections and build decisions upon identified patterns may be useful assistants in clinical decision-making processes. In this article, artificial intelligence-based studies in clinical cardiology are reviewed. The text also touches on the ethical issues and speculates on the future roles of automated algorithms versus clinicians in cardiology and medicine in general.

  12. Intelligent Freigth Transport Systems

    DEFF Research Database (Denmark)

    Overø, Helene Martine; Larsen, Allan; Røpke, Stefan

    2009-01-01

    is to enhance the efficiency and lower the environmental impact in freight transport. In this paper, a pilot project involving real-time waste collection at a Danish waste collection company is described, and a solution approach is proposed. The problem corresponds to the dynamic version of the waste collection......The Danish innovation project entitled “Intelligent Freight Transport Systems” aims at developing prototype systems integrating public intelligent transport systems (ITS) with the technology in vehicles and equipment as well as the IT-systems at various transport companies. The objective...

  13. Bayesian artificial intelligence

    CERN Document Server

    Korb, Kevin B

    2003-01-01

    As the power of Bayesian techniques has become more fully realized, the field of artificial intelligence has embraced Bayesian methodology and integrated it to the point where an introduction to Bayesian techniques is now a core course in many computer science programs. Unlike other books on the subject, Bayesian Artificial Intelligence keeps mathematical detail to a minimum and covers a broad range of topics. The authors integrate all of Bayesian net technology and learning Bayesian net technology and apply them both to knowledge engineering. They emphasize understanding and intuition but also provide the algorithms and technical background needed for applications. Software, exercises, and solutions are available on the authors' website.

  14. Business Intelligence Integrated Solutions

    Directory of Open Access Journals (Sweden)

    Cristescu Marian Pompiliu

    2017-12-01

    Full Text Available A Business Intelligence solution concerns the simple, real-time access to complete information about the business shown in a relevant format of the report, graphic or dashboard type in order help the taking of strategic decisions regarding the direction in which the company goes. Business Intelligence does not produce data, but uses the data produced by the company’s applications. BI solutions extract their data from ERP (Enterprise Resource Planning, CRM (Customer Relationship Management, HCM (Human Capital Management, and Retail, eCommerce or other databases used in the company.

  15. The intelligent Universe

    International Nuclear Information System (INIS)

    Hoyle, F.

    1983-01-01

    The subject is covered in chapters, entitled: chance and the universe (synthesis of proteins; the 'primordial soup'); the gospel according to Darwin (discussion of Darwin theory of evolution); life did not originate on earth (fossils from space; life in space); the interstellar connection (living dust between the stars; bacteria in space falling to the earth; interplanetary dust); evolution by cosmic control (microorganisms; genetics); why aren't the others here (a cosmic origin of life); after the big bang (big bang and steady state); the information rich universe; what is intelligence up to; the intelligent universe. (U.K.)

  16. Harmonizing intelligence terminologies in business: Literature review

    Directory of Open Access Journals (Sweden)

    Sivave Mashingaidze

    2014-11-01

    Full Text Available The principal objective of this article is to do a literature review of different intelligence terminology with the aim of establishing the common attributes and differences, and to propose a universal and comprehensive definition of intelligence for common understanding amongst users. The findings showed that Competitive Intelligence has the broadest scope of intelligence activities covering the whole external operating environment of the company and targeting all levels of decision-making for instance; strategic intelligence, tactical intelligence and operative intelligence. Another terminology was found called Cyber IntelligenceTM which encompasses competitor intelligence, strategic intelligence, market intelligence and counterintelligence. In conclusion although CI has the broadest scope of intelligence and umbrella to many intelligence concepts, still Business Intelligence, and Corporate Intelligence are often used interchangeably as CI

  17. Panel Discussion: Near Real Time Imagery Intelligence How Will We Do It?

    Science.gov (United States)

    Andraitis, Arthur A.; Crane, Alfred C.; Daniels, George; Graham, Johnny; LaGesse, Francis R.

    1987-02-01

    This afternoon's panel discussion will address near real time imagery and intelligence--how will we do it? Our moderator is Arthur Andraitis, a consultant in intelligence reconnaissance systems and international marketing. He was commissioned in the United States Air Force out of the University of Idaho, and entered the Air Force in 1955 where he became an Image Intelligence Officer serving in a variety of intelligence and reconnaisance related assignments, including two tours each in Asia and Europe supporting tactical theater and national level operations. He also suffered through two Pentagon tours--one as Branch Chief of the Imagery Branch for the Assistant Chief of Staff for Intelligence. He was the U. S. National Coordinator for two NATO intelligence and reconnaissance panels, and served several assignments in support of special operations, which included a year with the special forces in Viet Nam where he flew many missions in L-19s, 01 and assault helicopters. He has been an advisor on intelligence and reconnaissance matters to several foreign countries. In 1978 he retired from the United States Air Force, went to work for Itek, and then became an independent consultant in intelligence and reconaissance systems. I would like to introduce Art Andraitis.

  18. Dental ethics and emotional intelligence.

    Science.gov (United States)

    Rosenblum, Alvin B; Wolf, Steve

    2014-01-01

    Dental ethics is often taught, viewed, and conducted as an intell enterprise, uninformed by other noncognitive factors. Emotional intelligence (EQ) is defined distinguished from the cognitive intelligence measured by Intelligence Quotient (IQ). This essay recommends more inclusion of emotional, noncognitive input to the ethical decision process in dental education and dental practice.

  19. Political Orientations, Intelligence and Education

    Science.gov (United States)

    Rindermann, Heiner; Flores-Mendoza, Carmen; Woodley, Michael A.

    2012-01-01

    The social sciences have traditionally assumed that education is a major determinant of citizens' political orientations and behavior. Several studies have also shown that intelligence has an impact. According to a theory that conceptualizes intelligence as a "burgher" (middle-class, civil) phenomenon--intelligence should promote civil…

  20. What Is Artificial Intelligence Anyway?

    Science.gov (United States)

    Kurzweil, Raymond

    1985-01-01

    Examines the past, present, and future status of Artificial Intelligence (AI). Acknowledges the limitations of AI but proposes possible areas of application and further development. Urges a concentration on the unique strengths of machine intelligence rather than a copying of human intelligence. (ML)