Bazan, Elizabeth B
The Foreign Intelligence Surveillance Act, 50 U.S.C. 1801 (FISA) as passed in 1978, provided a statutory framework for the use of electronic surveillance in the context of foreign intelligence gathering...
Bazan, Elizabeth B
.... Subsequent legislation expanded federal laws dealing with foreign intelligence gathering to address physical searches, pen registers and trap and trace devices, and access to certain business records...
Bazan, Elizabeth B
.... Subsequent legislation expanded federal laws dealing with foreign intelligence gathering to address physical searches, pen registers and trap and trace devices, and access to certain business records...
Bazan, Elizabeth B
.... 107-108, and the Homeland Security Act of 2002, P.L. 107-296. In addressing international terrorism or espionage, the same factual situation may be the focus of both criminal investigations and foreign intelligence...
Schoemaker, R.M.; Sandbrink, R.D.J.; Voorthuijsen, G.P. van
Intelligence on abnormal and suspicious behaviour along roads in operational domains is extremely valuable for countering the IED (Improvised Explosive Device) threat. Local sensor networks at strategic spots can gather data for continuous monitoring of daily vehicle activity. Unattended intelligent
Huihuan, Qian; Xu, Yangsheng
As shortcomings such as high labor costs make intelligent surveillance systems more desirable, this practical book focuses on detecting abnormal behavior based on learning and the analysis of dangerous crowd behavior based on texture and optical flow.
Sutrisno Warsono Ibrahim
Full Text Available Intelligent surveillance system (ISS has received growing attention due to the increasing demand on security and safety. ISS is able to automatically analyze image, video, audio or other type of surveillance data without or with limited human intervention. The recent developments in sensor devices, computer vision, and machine learning have an important role in enabling such intelligent system. This paper aims to provide general overview of intelligent surveillance system and discuss some possible sensor modalities and their fusion scenarios such as visible camera (CCTV, infrared camera, thermal camera and radar. This paper also discusses main processing steps in ISS: background-foreground segmentation, object detection and classification, tracking, and behavioral analysis.
From the streets of London to subway stations in New York City, hundreds of thousands of surveillance cameras ubiquitously collect hundreds of thousands of videos, often running 24/7. How can such vast volumes of video data be stored, analyzed, indexed, and searched? How can advanced video analysis and systems autonomously recognize people and detect targeted activities real-time? Collating and presenting the latest information Intelligent Video Surveillance: Systems and Technology explores these issues, from fundamentals principle to algorithmic design and system implementation.An Integrated
This project is to investigate and verify the feasibility for development of a methodological approach and corresponding tools for the management of intelligence, surveillance, and reconnaissance (ISR) systems...
Atrey, Pradeep K; Cavallaro, Andrea
Intelligent multimedia surveillance concerns the analysis of multiple sensing inputs including video and audio streams, radio-frequency identification (RFID), and depth data. These data are processed for the automated detection and tracking of people, vehicles, and other objects. The goal is to locate moving targets, to understand their behavior, and to detect suspicious or abnormal activities for crime prevention. Despite its benefits, there is societal apprehension regarding the use of such technology, so an important challenge in this research area is to balance public safety and privacy.
that the Army is even considering the development of intelligence- gathering airships .43 In comparison to the complex acquisition history of UAS, the...43 Walter Pincus, “Military Seeks an Intelligence-Gathering Airship ,” Washington Post, February 16, 2010, p. A11. Intelligence, Surveillance, and
... Insurgency (COIN) Intelligence, Surveillance and Reconnaissance (ISR) Operations AGENCY: Department of... Force on Counter Insurgency (COIN) Intelligence, Surveillance and Reconnaissance (ISR) Operations will... Defense. These meetings will identify how DoD intelligence can most effectively support COIN operations...
transfer of a task normally performed by an operator of a military aircraft to the control of an automated system, typically a digital computer.”9 Some...Pervasive Algorithms on Artificial Intelligence .” See “Bot for Teacher” Harper’s Magazine, June 2015, 14. Interestingly, Captain Byrnes’s work posits that...78 | Air & Space Power Journal A Commonsense Approach to Intelligence , Surveillance, and Reconnaissance Operations Maj William Giannetti, Virginia
Offering ready access to the security industry's cutting-edge digital future, Intelligent Network Video provides the first complete reference for all those involved with developing, implementing, and maintaining the latest surveillance systems. Pioneering expert Fredrik Nilsson explains how IP-based video surveillance systems provide better image quality, and a more scalable and flexible system at lower cost. A complete and practical reference for all those in the field, this volume:Describes all components relevant to modern IP video surveillance systemsProvides in-depth information about ima
operations due to the emphasis on collection statistics that do not account for operational realities . I argue that a strategy-oriented approach that...it was virtually meaningless to the past decade’s operations, and no framework has clearly arisen to replace it.28 Intelligence problems have become...transparency, empathy , and competence. Major Ives provides an example: “Our ISR team’s proficient grasp of collection manage- ment created a mutual trust
Full Text Available In the wake of the SARS and influenza epidemics of the past decade, one public health solution has become a refrain: surveillance systems for detection of disease outbreaks. This paper is an effort to understand how disease surveillance for outbreak detection gained such paramount rationality in contemporary public health. The epidemiologist Alexander Langmuir is well known as the creator of modern disease surveillance. But less well known is how he imagined disease surveillance as one part of what he called “epidemic intelligence.” Langmuir developed the practice of disease surveillance during an unprecedented moment in which the threat of biological warfare brought civil defense experts and epidemiologists together around a common problem. In this paper, I describe how Langmuir navigated this world, experimenting with new techniques and rationales of epidemic control. Ultimately, I argue, Langmuir′s experiments resulted in a set of techniques and infrastructures – a system of epidemic intelligence – that transformed the epidemic as an object of human art.
Schenk, A.; Germond, A. [Ecole Polytechnique Federale de Lausanne, Lausanne (Switzerland); Boss, P.; Lorin, P. [ABB Secheron SA, Geneve (Switzerland)
The article describes a new method for the continuous surveillance of power transformers based on the application of artificial intelligence (AI) techniques. An experimental pilot project on a specially equipped, strategically important power transformer is described. Traditional surveillance methods and the use of mathematical models for the prediction of faults are described. The article describes the monitoring equipment used in the pilot project and the AI principles such as self-organising maps that are applied. The results obtained from the pilot project and methods for their graphical representation are discussed.
By analysing intelligence-gathering reform legislation this article discusses access to justice for communications interception by the intelligence and security services. In the aftermath of the Snowden revelations, sophisticated oversight systems for bulk communications surveillance are being
Tahboub, Khalid; Gadgil, Neeraj; Ribera, Javier; Delgado, Blanca; Delp, Edward J.
Video surveillance systems are of a great value for public safety. With an exponential increase in the number of cameras, videos obtained from surveillance systems are often archived for forensic purposes. Many automatic methods have been proposed to do video analytics such as anomaly detection and human activity recognition. However, such methods face significant challenges due to object occlusions, shadows and scene illumination changes. In recent years, crowdsourcing has become an effective tool that utilizes human intelligence to perform tasks that are challenging for machines. In this paper, we present an intelligent crowdsourcing system for forensic analysis of surveillance video that includes the video recorded as a part of search and rescue missions and large-scale investigation tasks. We describe a method to enhance crowdsourcing by incorporating human detection, re-identification and tracking. At the core of our system, we use a hierarchal pyramid model to distinguish the crowd members based on their ability, experience and performance record. Our proposed system operates in an autonomous fashion and produces a final output of the crowdsourcing analysis consisting of a set of video segments detailing the events of interest as one storyline.
INCREASING INTELLIGENCE, SURVEILLANCE, AND RECONNAISSANCE (ISR) OPERATIONAL AGILITY THROUGH MISSION COMMAND A thesis presented to...other works incorporated into this manuscript. A work of the United States Government is not subject to copyright, however further publication or...Intelligence, Surveillance, and Reconnaissance (ISR) Operational Agility through Mission Command 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c
The present study investigates the link between personality traits (OCEAN Personality test), emotional intelligence (EI) (Trait Emotional Intelligence Questionnaire) and the notion of "feeling different" while using a foreign language among 102 Polish-English bilinguals and Polish L2 users of English who were immersed in a foreign language and…
Pishghadam, Reza; Khajavy, Gholam Hassan
This study examined the role of metacognition and intelligence in foreign language achievement on a sample of 143 Iranian English as a Foreign Language (EFL) learners. Participants completed Raven's Advanced Progressive Matrices as a measure of intelligence, and Metacognitive Awareness Inventory as a measure of metacognition. Learners' scores at…
Miyazawa, Tatsuo; Suzuki, Kazumi; Fujie, Hideo; Fujii, Masaaki; Asai, Takashi; Sugimoto, Hiroshi.
Recently, the research and development of robotizing the patrol and works in nuclear power plants have been actively carried out since the TMI-2 accident in March, 1979. In this paper, among these robots, six examples of the movable robots, of which the working and movement were intellectualized by using information processing techniques and others, are reported, and their intellectualization is concretely discussed. In Japan, the development of the supporting system for nuclear power generation was carried out for five years from fiscal year 1980 as the project subsidized by the Ministry of International Trade and Industry, and during this period, the inspection robots for LWR plants were developed. The development of the robots for ultimate working as the large scale project of the Agency of Industrial Science and Technology aiming at further heightening the function is in progress as the eight-year project from fiscal year 1983. Monorail type automatic surveillance robots, system maintenance robots 'AMOOTY', variable crawler type intelligent movable robots, hybrid running type intelligent movable robots, monorail running type small checkup robots, and floor running type checkup and light work robots are reported. Sense information processing control and a robot language processor for expanding the function of autonomous control are outlined. (Kako, I.)
Shirey, Russell G.; Borntrager, Luke A.; Soine, Andrew T.; Green, David M.
The Air Force Research Laboratory (AFRL) - Sensors Directorate has developed the Blue Guardian program to demonstrate advanced sensing technology utilizing open architectures in operationally relevant environments. Blue Guardian has adopted the core concepts and principles of the Air Force Rapid Capabilities Office (AFRCO) Open Mission Systems (OMS) initiative to implement an open Intelligence, Surveillance and Reconnaissance (ISR) platform architecture. Using this new OMS standard provides a business case to reduce cost and program schedules for industry and the Department of Defense (DoD). Blue Guardian is an early adopting program of OMS and provides much needed science and technology improvements, development, testing, and implementation of OMS for ISR purposes. This paper presents results and lessons learned under the Blue Guardian Project Shepherd program which conducted Multi-INT operational demonstrations in the Joint Interagency Task Force - South (JIATF-S) and USSOUTHCOM area of operations in early 2016. Further, on-going research is discussed to enhance Blue Guardian Multi-INT ISR capabilities to support additional mission sets and platforms, including unmanned operations over line of sight (LOS) and beyond line of sight (BLOS) datalinks. An implementation of additional OMS message sets and services to support off-platform sensor command and control using OMS/UCI data structures and dissemination of sensor product data/metadata is explored. Lastly, the Blue Guardian team is working with the AgilePod program to use OMS in a full Government Data Rights Pod to rapidly swap these sensors to different aircraft. The union of the AgilePod (which uses SOSA compliant standards) and OMS technologies under Blue Guardian programs is discussed.
In the wake of the SARS and influenza epidemics of the past decade, one public health solution has become a refrain: surveillance systems for detection of disease outbreaks. This paper is an effort to understand how disease surveillance for outbreak detection gained such paramount rationality in contemporary public health. The epidemiologist Alexander Langmuir is well known as the creator of modern disease surveillance. But less well known is how he imagined disease surveillance as one part o...
Ankara : The Department of Teaching English as a Foreign Language, Bilkent University, 2009. Thesis (Master's) -- Bilkent University, 2009. Includes bibliographical references leaves 84-92. It is becoming increasingly difficult to ignore the rising trend of emotional intelligence in education. So far, however, there has been very little discussion about the relationship between emotional intelligence and foreign language anxiety. The main objectives of the this study were a)...
Wallace, Richard Le Roy Wayne
The purpose of this qualitative study was to examine and gain a clearer understanding of the perceptions of foreign language learning of adult foreign language learners attending a South-West Missouri community college. This study was based on the Multiple Intelligence (MI) theory of Howard Gardner. It examined the perceptions of adult language…
Intelligent video-surveillance is at present one of the most active research fields in computer science. It brings together a wide variety of computer vision and machine learning techniques to provide useful tools for surveillance operators and forensic video analytics. Person re-identification is among these tools; it consists of recognising whether an individual has already been observed over a network of cameras. Person re-identification has various possible applications, e.g., off-line...
Modern complex surveillance systems consisting of multiple and heterogeneous sensors, automatic information registration and data analysis techniques, and decision support tools should provide the human operator an integrated, transparent and easily comprehensible view of the surveyed scene.
Machine Team Levels of Control 7 Artificial Intelligence (AI) and Algorithms – As autonomy describes a level of control where machines are...Force Research Lab AFSC Alliance Future Surveillance and Control AI Artificial Intelligence AOR Area of Responsibility ATC Air Traffic Control...Process, Exploit, and Disseminate PNT Precise Navigation and Timing RF Radio Frequency RPA Remotely Piloted Aircraft SIGINT Signals Intelligence
Tian, Feng; Xie, Yanming
Following more and more new drugs are authorized into market, new, serious or unexpected adverse drug reactions appear frequently, which is a serious threat to people health and life. Through making laws and guidelines, governments of various countries aim to strengthen and standardize the surveillance and reporting of postmarketing drugs. The drugs management department of our country are doing related jobs positively, but there are some problems, such as drug risk-menagement is not emphasized well, and the management department lacks clarity on operating related regulations. This article tries to explore foreign countries' laws and regulations on the surveillance and reporting of postmarketing drugs, aiming to provide reference for our courtry.
Smith, Frank L
Malicious software and infectious diseases are similar is several respects, as are the functional requirements for surveillance and intelligence to defend against these threats. Given these similarities, this article compares and contrasts the actors, relationships, and norms at work in cyber intelligence and disease surveillance. Historical analysis reveals that civilian cyber defense is more decentralized, private, and voluntary than public health in the United States. Most of these differences are due to political choices rather than technical necessities. In particular, political resistance to government institutions has shaped cyber intelligence over the past 30 years, which is a troubling sign for attempts to improve disease surveillance through local, state, and federal health departments. Information sharing about malware is also limited, despite information technology being integral to cyberspace. Such limits suggest that automation through electronic health records will not automatically improve public health surveillance. Still, certain aspects of information sharing and analysis for cyber defense are worth emulating or, at the very least, learning from to help detect and manage health threats.
The purpose of this qualitative research study was to explore and comprehend the role of Howard Gardner's theory of multiple intelligences (MI) in foreign language learning by analyzing the perspectives of college students in a German immersion program at a liberal arts college in the Midwest. Data collection included 10 in-depth student…
Bradley Manning and Edward Snowden , both who leaked classified information which was subsequently published on the WikiLeaks website, have had a negative... surveillance flights in the area. As the effort unfolded, the planners determined that the best method of diminishing the flow of drugs was denial of the air
Byoung Chul Ko
Full Text Available Human detection using visible surveillance sensors is an important and challenging work for intruder detection and safety management. The biggest barrier of real-time human detection is the computational time required for dense image scaling and scanning windows extracted from an entire image. This paper proposes fast human detection by selecting optimal levels of image scale using each level’s adaptive region-of-interest (ROI. To estimate the image-scaling level, we generate a Hough windows map (HWM and select a few optimal image scales based on the strength of the HWM and the divide-and-conquer algorithm. Furthermore, adaptive ROIs are arranged per image scale to provide a different search area. We employ a cascade random forests classifier to separate candidate windows into human and nonhuman classes. The proposed algorithm has been successfully applied to real-world surveillance video sequences, and its detection accuracy and computational speed show a better performance than those of other related methods.
later. During a visit to Buckley AFB, Colorado, in December 2014, Gen John E. Hyten, commander of Air Force Space Command (AFSPC), stressed a mind-set...Technology Exposition, Lt Gen Robert P. Otto, deputy chief of staff for intelligence, surveillance, and reconnaissance, stressed the “need to leverage...space. In accor- dance with AFI 36-3701, Space Professional Development Program, for nonspace AFSCs, “depth . . . generally equates to two or three space
Wach, D.; Ding, Y.
Recent development work at ISTec/GRS has been directed to more automation of surveillance techniques by utilization of the technological progress and existing tools. Neural nets, fuzzy techniques and rule-based methods were investigated for application in feature classification and automated identification of anomalies. First applications were aimed at classification of useful patterns and suppression of non-relevant signal components in order to avoid false alarms (e.g. in acoustic monitoring) and at signal validation under normal and disturbed plant conditions. Other on-going projects are aimed at the application of the successful methods to other surveillance tasks such as on-line assessment of sensor behaviour and ageing phenomena of instrumentation. The paper gives an insight in the intelligent analysis techniques and highlights their potential use for other surveillance tasks in nuclear power plants. (author)
Full Text Available In this work, we present a multi-camera surveillance system based on the use of self-organizing neural networks to represent events on video. The system processes several tasks in parallel using GPUs (graphic processor units. It addresses multiple vision tasks at various levels, such as segmentation, representation or characterization, analysis and monitoring of the movement. These features allow the construction of a robust representation of the environment and interpret the behavior of mobile agents in the scene. It is also necessary to integrate the vision module into a global system that operates in a complex environment by receiving images from multiple acquisition devices at video frequency. Offering relevant information to higher level systems, monitoring and making decisions in real time, it must accomplish a set of requirements, such as: time constraints, high availability, robustness, high processing speed and re-configurability. We have built a system able to represent and analyze the motion in video acquired by a multi-camera network and to process multi-source data in parallel on a multi-GPU architecture.
There are close to 20,000 cataloged manmade objects in space, the large majority of which are not active, functioning satellites. These are tracked by phased array and mechanical radars and ground and space-based optical telescopes, collectively known as the Space Surveillance Network (SSN). A better SSN schedule of observations could, using exactly the same legacy sensor resources, improve space catalog accuracy through more complementary tracking, provide better responsiveness to real-time changes, better track small debris in low earth orbit (LEO) through efficient use of applicable sensors, efficiently track deep space (DS) frequent revisit objects, handle increased numbers of objects and new types of sensors, and take advantage of future improved communication and control to globally optimize the SSN schedule. We have developed a scheduling algorithm that takes as input the space catalog and the associated covariance matrices and produces a globally optimized schedule for each sensor site as to what objects to observe and when. This algorithm is able to schedule more observations with the same sensor resources and have those observations be more complementary, in terms of the precision with which each orbit metric is known, to produce a satellite observation schedule that, when executed, minimizes the covariances across the entire space object catalog. If used operationally, the results would be significantly increased accuracy of the space catalog with fewer lost objects with the same set of sensor resources. This approach inherently can also trade-off fewer high priority tasks against more lower-priority tasks, when there is benefit in doing so. Currently the project has completed a prototyping and feasibility study, using open source data on the SSN's sensors, that showed significant reduction in orbit metric covariances. The algorithm techniques and results will be discussed along with future directions for the research.
Ferreira, Anita; Atkinson, John
In this paper, we provide a model of corrective feedback generation for an intelligent tutoring system for Spanish as a Foreign Language. We have studied two kind of strategies: ( 1) Giving-Answer Strategies (GAS), where the teacher directly gives the desired target form or indicates the location of the error, and (2) Prompting-Answer Strategies (PAS), where the teacher pushes the student less directly to notice and repair their own error. Based on different experimental settings and comparisons with face-to-face tutoring mode, we propose the design of a component of effective teaching strategies into ITS for Spanish as a foreign language.
Chan, Yi-Tung; Wang, Shuenn-Jyi; Tsai, Chung-Hsien
Public safety is a matter of national security and people's livelihoods. In recent years, intelligent video-surveillance systems have become important active-protection systems. A surveillance system that provides early detection and threat assessment could protect people from crowd-related disasters and ensure public safety. Image processing is commonly used to extract features, e.g., people, from a surveillance video. However, little research has been conducted on the relationship between foreground detection and feature extraction. Most current video-surveillance research has been developed for restricted environments, in which the extracted features are limited by having information from a single foreground; they do not effectively represent the diversity of crowd behavior. This paper presents a general framework based on extracting ensemble features from the foreground of a surveillance video to analyze a crowd. The proposed method can flexibly integrate different foreground-detection technologies to adapt to various monitored environments. Furthermore, the extractable representative features depend on the heterogeneous foreground data. Finally, a classification algorithm is applied to these features to automatically model crowd behavior and distinguish an abnormal event from normal patterns. The experimental results demonstrate that the proposed method's performance is both comparable to that of state-of-the-art methods and satisfies the requirements of real-time applications.
Chetry, Moon K.
The objective of this program is to design, construct operate, test, and evaluate a prototype integrated monitoring and diagnostic system for a nuclear power plant. It is anticipated that this technology will have wide application to other complex systems (e.g., fossil power plants, chemical processing plants, and possibly air traffic control systems). Over the past decade, the University of Tennessee (UT) and others have carried out many projects utilizing various methodologies of artificial intelligence (expert systems, neural networks, fuzzy systems and genetic algorithms) to enhance the performance (safety, efficiency, reliability, and availability) of nuclear power plants. Investigations and studies have included a) instrumentation surveillance and calibration validation, b) inferential sensing to calibration of feed water venture flow during fouling, c) thermodynamic performance modeling with iterative improvement of plant heat rate, d) diagnosis of nuclear power plant transients
Zwingelstein, G.; Monnier, B.
Artificial intelligence has come of age; it can be applied with benefits in the nuclear industry for various applications to improve both plant safety and availability. This paper presents four rule-based expert systems currently under development at Electricite de France for the surveillance and the diagnostics of pressurized water reactors (PWRs). The objectives of these experiences with expert system projects are to demonstrate their feasibility, to provide an evaluation of their potential benefits through on-site implementation, to identify the problems due to the knowledge extraction and representation, and finally to specify the classes of problems where expert systems are needed and useful. The specific goals of these expert systems are to provide an aid for the detection and location of failures occurring in nuclear plants
Full Text Available Urban networks aim at facilitating users for better experience and services through smart platforms such as the Intelligent Transportation System (ITS. ITS focuses on information acquisition, sensing, contrivance control, data processing and forwarding to ground devices via user-specific application-interfaces. The utility of ITS is further improved via the Internet of Things (IoT, which supports “Connectivity to All”. One of the key applications of IoT-ITS is urban surveillance. Current surveillance in IoT-ITS is performed via fixed infrastructure-based sensing applications which consume an excessive amount of energy leading to several overheads and failures in the network. Such issues can be overcome by the utilization of on-demand nodes, such as drones, etc. However, drones-assisted surveillance requires efficient communication setup as drones are battery operated and any extemporaneous maneuver during monitoring may result in loss of drone or complete failure of the network. The novelty in terms of network layout can be procured by the utilization of drones with LoRaWAN, which is the protocol designated for Low-Power Wide Area Networks (LPWAN. However, even this architectural novelty alone cannot ascertain the formation of fail-safe, highly resilient, low-overhead, and non-redundant network, which is additionally the problem considered in this paper. To resolve such problem, this paper uses drones as LoRaWAN gateway and proposes a communication strategy based on the area stress, resilient factor, and energy consumption that avail in the efficient localization, improved coverage and energy-efficient surveillance with lower overheads, lower redundancy, and almost zero-isolations. The proposed approach is numerically simulated and the results show that the proposed approach can conserve a maximum of 39.2% and a minimum of 12.6% of the total network energy along with an improvement in the area stress between 89.7% and 53.0% for varying
Albrechtslund, Anders; Coeckelbergh, Mark; Matzner, Tobias
Studying surveillance involves raising questions about the very nature of concepts such as information, technology, identity, space and power. Besides the maybe all too obvious ethical issues often discussed with regard to surveillance, there are several other angles and approaches that we should...... like to encourage. Therefore, our panel will focus on the philosophical, yet non-ethical issues of surveillance in order to stimulate an intense debate with the audience on the ethical implications of our enquiries. We also hope to provide a broader and deeper understanding of surveillance....
Paramanandham, Nirmala; Rajendiran, Kishore
A novel image fusion technique is presented for integrating infrared and visible images. Integration of images from the same or various sensing modalities can deliver the required information that cannot be delivered by viewing the sensor outputs individually and consecutively. In this paper, a swarm intelligence based image fusion technique using discrete cosine transform (DCT) domain is proposed for surveillance application which integrates the infrared image with the visible image for generating a single informative fused image. Particle swarm optimization (PSO) is used in the fusion process for obtaining the optimized weighting factor. These optimized weighting factors are used for fusing the DCT coefficients of visible and infrared images. Inverse DCT is applied for obtaining the initial fused image. An enhanced fused image is obtained through adaptive histogram equalization for a better visual understanding and target detection. The proposed framework is evaluated using quantitative metrics such as standard deviation, spatial frequency, entropy and mean gradient. The experimental results demonstrate the outperformance of the proposed algorithm over many other state- of- the- art techniques reported in literature.
the objective area. • Unmanned systems, such as unmanned aircraft and unmanned underwater vehicles, which could loiter to provide intelligence ...systems, such as unmanned aircraft and unmanned underwater vehicles, which could loiter to provide intelligence collection or fires in the objective area...conjunction with NASA through their “Quantum Artificial Intelligence Lab”. Google hired Sergio Boixio from USC, who had been a lead in studying whether
The relationship between intelligence, language, and learning is a challenging field of study. One way to study how this relationship occurs and works is to investigate the perceptions of advanced language learners. Therefore, this paper reports a study that was conducted to explore 160 pre-service English language teachers' perceptions about…
Full Text Available The essay focuses on West German foreign-correspondents in the USSR in the post-Stalin era of the 1950s and early 1960s and their efforts to create a normal perspective on the antagonist within the Cold War. Not only the obtaining of information but also the journalists' private life was influenced by the constant control and surveillance of Soviet authorities and the special living conditions in Moscow. The correspondents assessed and managed these measures in different ways due to their differing biographical backgrounds and professional experience. In fact, these measures gave the journalists a view of the authorities impact on Soviet society, in Moscow and the rural areas as well.
Monnier, B.; Ricard, B.; Doutre, J.L.; Martin-Mattei, C.; Fernandes, A.
This paper presents three expert systems in the field of surveillance and diagnosis of nuclear power plants. Each application is described from the point of view of knowledge modeling. Then, a general knowledge model is proposed for a class of diagnosis problems. At the end, the paper shows the future frame of the surveillance of the nuclear power plant main components at EDF in which the greatest part of those expert systems will run
O V Yaglova
Full Text Available The article introduces different approaches to the emotional intelligence (EI definition and research, the main trends of the concept critique and proves the importance of the further research of the link between the emotional intelligence and workplace performance.
Arnold, Jane; Fonseca, Mª Carmen
Gardner's Multiple Intelligences theory is presented as a cognitive perspective on intelligence which has profound implications for education in general. More specifically, it has led to the application of eight of these frames to language teaching and learning. In this chapter, we will argue in favour of the application of MIT to the EFL…
Full Text Available Since 9/11, financial institutions have found themselves placed squarely on the front line of efforts to combat terrorism: countering terrorist financing has been a core element of the global counter-terrorism architecture since President George W Bush signed Executive Order 13224 promising to starve terrorists of funding. Financial institutions have played valuable “post-event” forensic roles, but despite the apparently immense troves of data they hold, their effective involvement in the identification and disruption of terrorist intentions or activity remains elusive. With global authorities consumed with the mushrooming growth of “foreign terrorist fighters” (FTFs, it seems timely to revisit the question of how financial institutions can play a more preventative role in countering terrorist threats. As the intergovernmental Financial Action Task Force (FATF noted recently, “greater domestic cooperation among AML/CFT [anti-money laundering and countering the financing of terrorism] bodies and other authorities” is needed to tackle funding of FTFs. Banks must play a key role in the development of this architecture. The issue of FTFs flowing to and from the conflict in Syria is likely to shape the international security agenda for the foreseeable future. Identifying citizens who have joined terrorist groups in Syria and Iraq pose a threat to the UK. The UK is certainly not alone in Europe in facing this threat. Evidence suggests these fears are now being realised. Both the scale of the issue in the context of the Syrian conflict and the speed with which the numbers have risen have caught international security authorities off guard, which – it would seem – have only belatedly appreciated the magnitude of the challenge. Whilst there has been much discussion and debate about who these travelling fighters are, their motivations, and the threats they pose, the majority of this analysis has focused on the role of social media in this
Full Text Available Gardner's Multiple Intelligences theory is presented as a cognitive perspective on intelligence which has profound implications for education in general. More specifically, it has led to the application of eight of these frames to language teaching and learning. In this chapter, we will argue in favour of the application of MIT to the EFL classroom, using as support some of the major insights for language teaching from brain science.
In this paper a theoretical and system conceptual model is outlined for the instrumentation, core assessment and surveillance and anomaly detection of a nuclear power plant. The system specified is based on the statistical on-line analysis of optimally placed instrumentation sensed fluctuating signals in terms of such variates as coherence, correlation function, zero-crossing and spectral density
In this paper a theoretical and system conceptual model is outlined for the instrumentation, core assessment and surveillance and anomaly detection of a nuclear power plant. The system specified is based on the statistical on-line analysis of optimally placed instrumentation sensed fluctuating signals in terms of such variates as coherence, correlation function, zero-crossing and spectral density
Al-Nawashi, Malek; Al-Hazaimeh, Obaida M; Saraee, Mohamad
Abnormal activity detection plays a crucial role in surveillance applications, and a surveillance system that can perform robustly in an academic environment has become an urgent need. In this paper, we propose a novel framework for an automatic real-time video-based surveillance system which can simultaneously perform the tracking, semantic scene learning, and abnormality detection in an academic environment. To develop our system, we have divided the work into three phases: preprocessing phase, abnormal human activity detection phase, and content-based image retrieval phase. For motion object detection, we used the temporal-differencing algorithm and then located the motions region using the Gaussian function. Furthermore, the shape model based on OMEGA equation was used as a filter for the detected objects (i.e., human and non-human). For object activities analysis, we evaluated and analyzed the human activities of the detected objects. We classified the human activities into two groups: normal activities and abnormal activities based on the support vector machine. The machine then provides an automatic warning in case of abnormal human activities. It also embeds a method to retrieve the detected object from the database for object recognition and identification using content-based image retrieval. Finally, a software-based simulation using MATLAB was performed and the results of the conducted experiments showed an excellent surveillance system that can simultaneously perform the tracking, semantic scene learning, and abnormality detection in an academic environment with no human intervention.
Shang, Quanhong; Zhang, Shujun; Wang, Yanbo; Sun, Chen; Wang, Zepeng; Zhang, Luming
Society is rapidly accepting the use of a wide variety of cameras Location and applications: site traffic monitoring, parking Lot surveillance, car and smart space. These ones here the camera provides data every day in an analysis Effective way. Recent advances in sensor technology Manufacturing, communications and computing are stimulating.The development of new applications that can change the traditional Vision system incorporating universal smart camera network. This Analysis of visual cues in multi camera networks makes wide Applications ranging from smart home and office automation to large area surveillance and traffic surveillance. In addition, dense Camera networks, most of which have large overlapping areas of cameras. In the view of good research, we focus on sparse camera networks. One Sparse camera network using large area surveillance. As few cameras as possible, most cameras do not overlap Each other’s field of vision. This task is challenging Lack of knowledge of topology Network, the specific changes in appearance and movement Track different opinions of the target, as well as difficulties Understanding complex events in a network. In this review in this paper, we present a comprehensive survey of recent studies Results to solve the problem of topology learning, Object appearance modeling and global activity understanding sparse camera network. In addition, some of the current open Research issues are discussed.
Buchler, Norbou; Marusich, Laura R.; Sokoloff, Stacey
A unique and promising intelligent agent plug-in technology for Mission Command Systems— the Warfighter Associate (WA)— is described that enables individuals and teams to respond more effectively to the cognitive challenges of Mission Command, such as managing limited intelligence, surveillance, and reconnaissance (ISR) assets and information sharing in a networked environment. The WA uses a doctrinally-based knowledge representation to model role-specific workflows and continuously monitors the state of the operational environment to enable decision-support, delivering the right information to the right person at the right time. Capabilities include: (1) analyzing combat events reported in chat rooms and other sources for relevance based on role, order-of-battle, time, and geographic location, (2) combining seemingly disparate pieces of data into meaningful information, (3) driving displays to provide users with map based and textual descriptions of the current tactical situation, and (4) recommending courses of action with respect to necessary staff collaborations, execution of battle-drills, re-tasking of ISR assets, and required reporting. The results of a scenario-based human-in-the-loop experiment are reported. The underlying WA knowledge-graph representation serves as state traces, measuring aspects of Soldier decision-making performance (e.g. improved efficiency in allocating limited ISR assets) across runtime as dynamic events unfold on a simulated battlefield.
other major Air Force commands. The lead agency tasked to develop the NTISR road map is AF/A2 (USAF Deputy Chief of Staff for Intelligence...challenge is to develop a road map that includes potential platform and sensor mixes, requirements for commu- nication pathways, personnel training...This identifies how ground units figured out how to circum- navigate the red tape involved at the higher coordination levels, finding ingenious ways
Liu, Hui-ju; Chen, Ting-Han
This study mainly investigates language anxiety and its relationship to the use of learning strategies and multiple intelligences among young learners in an EFL educational context. The participants were composed of 212 fifth- and sixth-graders from elementary schools in central Taiwan. Findings indicated that most participants generally…
combinant les renseignements obtenus des nouvelles technologies des capteurs et d’autres ministres, les données étant partagées par le biais...opérationnel estime que l’identification visuelle est la forme de renseignement de surveillance la plus digne de confiance, même si des capteurs peuvent...l’efficacité des activités RSR maritimes pendant une période définie. Recherche future : Avec l’ajout constant de nouveaux capteurs et d’outils de fusion
Sternberg, Robert J
Intelligence is the ability to learn from past experience and, in general, to adapt to, shape, and select environments. Aspects of intelligence are measured by standardized tests of intelligence. Average raw (number-correct) scores on such tests vary across the life span and also across generations, as well as across ethnic and socioeconomic groups. Intelligence can be understood in part in terms of the biology of the brain-especially with regard to the functioning in the prefrontal cortex. Measured values correlate with brain size, at least within humans. The heritability coefficient (ratio of genetic to phenotypic variation) is between 0.4 and 0.8. But genes always express themselves through environment. Heritability varies as a function of a number of factors, including socioeconomic status and range of environments. Racial-group differences in measured intelligence have been reported, but race is a socially constructed rather than biological variable. As a result, these differences are difficult to interpret. Different cultures have different conceptions of the nature of intelligence, and also require different skills in order to express intelligence in the environment. WIREs Cogn Sci 2012 doi: 10.1002/wcs.1193 For further resources related to this article, please visit the WIREs website. Copyright © 2012 John Wiley & Sons, Ltd.
Sternberg, Robert J.
Intelligence is the ability to learn from experience and to adapt to, shape, and select environments. Intelligence as measured by (raw scores on) conventional standardized tests varies across the lifespan, and also across generations. Intelligence can be understood in part in terms of the biology of the brain—especially with regard to the functioning in the prefrontal cortex—and also correlates with brain size, at least within humans. Studies of the effects of genes and environment suggest that the heritability coefficient (ratio of genetic to phenotypic variation) is between .4 and .8, although heritability varies as a function of socioeconomic status and other factors. Racial differences in measured intelligence have been observed, but race is a socially constructed rather than biological variable, so such differences are difficult to interpret. PMID:22577301
Sternberg, Robert J
Intelligence is the ability to learn from experience and to adapt to, shape, and select environments. Intelligence as measured by (raw scores on) conventional standardized tests varies across the lifespan, and also across generations. Intelligence can be understood in part in terms of the biology of the brain-especially with regard to the functioning in the prefrontal cortex-and also correlates with brain size, at least within humans. Studies of the effects of genes and environment suggest that the heritability coefficient (ratio of genetic to phenotypic variation) is between .4 and .8, although heritability varies as a function of socioeconomic status and other factors. Racial differences in measured intelligence have been observed, but race is a socially constructed rather than biological variable, so such differences are difficult to interpret.
Chen, Yen-Lin; Chiang, Hsin-Han; Chiang, Chuan-Yen; Liu, Chuan-Ming; Yuan, Shyan-Ming; Wang, Jenq-Haur
This study proposes a vision-based intelligent nighttime driver assistance and surveillance system (VIDASS system) implemented by a set of embedded software components and modules, and integrates these modules to accomplish a component-based system framework on an embedded heterogamous dual-core platform. Therefore, this study develops and implements computer vision and sensing techniques of nighttime vehicle detection, collision warning determination, and traffic event recording. The proposed system processes the road-scene frames in front of the host car captured from CCD sensors mounted on the host vehicle. These vision-based sensing and processing technologies are integrated and implemented on an ARM-DSP heterogamous dual-core embedded platform. Peripheral devices, including image grabbing devices, communication modules, and other in-vehicle control devices, are also integrated to form an in-vehicle-embedded vision-based nighttime driver assistance and surveillance system.
Full Text Available This study proposes a vision-based intelligent nighttime driver assistance and surveillance system (VIDASS system implemented by a set of embedded software components and modules, and integrates these modules to accomplish a component-based system framework on an embedded heterogamous dual-core platform. Therefore, this study develops and implements computer vision and sensing techniques of nighttime vehicle detection, collision warning determination, and traffic event recording. The proposed system processes the road-scene frames in front of the host car captured from CCD sensors mounted on the host vehicle. These vision-based sensing and processing technologies are integrated and implemented on an ARM-DSP heterogamous dual-core embedded platform. Peripheral devices, including image grabbing devices, communication modules, and other in-vehicle control devices, are also integrated to form an in-vehicle-embedded vision-based nighttime driver assistance and surveillance system.
Belonging to the wider academic field of computer vision, video analytics has aroused a phenomenal surge of interest since the current millennium. Video analytics is intended to solve the problem of the incapability of exploiting video streams in real time for the purpose of detection or anticipation. It involves analyzing the videos using algorithms that detect and track objects of interest over time and that indicate the presence of events or suspect behavior involving these objects.The aims of this book are to highlight the operational attempts of video analytics, to identify possi
and Support Available, Time Available, Civil Considerations MI Military Intelligence MICO Military Intelligence Company MM&D Mission Management...continues. With an increasing collection capability, reduction in collective MI experience influencing the BCT MI Company ( MICO ), and an ongoing rift...military doctrine as a key integrating medium for an increasingly complex military bureaucracy.… The manual attempted to rationalize everything the
Rebeca Elena Tapia Carlín
Full Text Available This article describes a study conducted in a Mexican English teacher education program about multiple intelligences. Seventy-four first year students participated in the study. Findings reveal that the highest kinds of intelligences were the bodily kinesthetic, the interpersonal, the intrapersonal, and the musical; the lowest ones were the naturalist, the existential, the verbal linguistic, the logical mathematical, and the visual spatial. The authors suggest that it is important to diagnose and promote these intelligences in trainees in a systematic way in order to equip them with knowledge and experience of multiple intelligences in order to use them in their future teacher practice.
Full Text Available The recent exposure of the NSA documents has raised a great deal of concerns with regards to the effective control of companies that cooperate with intelligence agencies. It also exposed a network of secret government spying partnerships used to go around existing domestic guarantees and to spy on one’s own citizens through the back door. The dread that both legal and technological means designed with legitimate purposes such as counter-terrorism and crime prevention are also employed for total social control is now out there. In many aspects it looks like we are experiencing the end of privacy and opting for a ‘surveillance society’ instead. In the clutter of pressing issues, most of the recent scholarly attention has focused on the assessment and reform proposals of the existing, but as it turns out inadequate with respect to actual rights protection, domestic legal frameworks. This has left the obligations of the intruders under international human rights law unconsidered. Therefore, the present paper aims at evaluating the legality of such surveillance programs under the International Covenant on Civil and Political Rights and the European Convention on Human Rights.
Tapia Carlín, Rebeca Elena; Castillo Salazar, María del Carmen; Velázquez Cortés, Susana
This article describes a study conducted in a Mexican English teacher education program about multiple intelligences. Seventy-four first year students participated in the study. Findings reveal that the highest kinds of intelligences were the bodily kinesthetic, the interpersonal, the intrapersonal, and the musical; the lowest ones were the…
Lu Yan; Xin Pingping; Wu Jian
Quality control of intelligence research is the core issue of intelligence management, is a problem in study of information science This paper focuses on the performance of intelligence to explain the significance of intelligence research quality control. In summing up the results of the study on the basis of the analysis, discusses quality control methods in intelligence research, introduces the experience of foreign intelligence research quality control, proposes some recommendations to improve quality control in intelligence research. (authors)
This thesis treats about production systems dynamic monitoring using artificial intelligent techniques.The main contributions consist in a new dynamic neural network called recurrent radial basis function network, able to offer very intereting and promissiong solutions for dynamic monitoring, in particular for degradation and false alarm early detection.The production system's fault tree (FT) is also exploited using a fuzzy Petri net. This approach permit us to do a dynamic monitoring of the ...
Nair, Binu M.; Diskin, Yakov; Asari, Vijayan K.
We present an autonomous system capable of performing security check routines. The surveillance machine, the Clearpath Husky robotic platform, is equipped with three IP cameras with different orientations for the surveillance tasks of face recognition, human activity recognition, autonomous navigation and 3D reconstruction of its environment. Combining the computer vision algorithms onto a robotic machine has given birth to the Robust Artificial Intelligencebased Defense Electro-Robot (RAIDER). The end purpose of the RAIDER is to conduct a patrolling routine on a single floor of a building several times a day. As the RAIDER travels down the corridors off-line algorithms use two of the RAIDER's side mounted cameras to perform a 3D reconstruction from monocular vision technique that updates a 3D model to the most current state of the indoor environment. Using frames from the front mounted camera, positioned at the human eye level, the system performs face recognition with real time training of unknown subjects. Human activity recognition algorithm will also be implemented in which each detected person is assigned to a set of action classes picked to classify ordinary and harmful student activities in a hallway setting.The system is designed to detect changes and irregularities within an environment as well as familiarize with regular faces and actions to distinguish potentially dangerous behavior. In this paper, we present the various algorithms and their modifications which when implemented on the RAIDER serves the purpose of indoor surveillance.
English is a foreign language that must be taught at school, particularly in secondary school. Based on a preliminary observation of several secondary schools in Banjarmasin, it appears that the English taught focuses most on concepts or language formulas. Most of the students who interact in English during the learning process do not use…
visit and the email addresses with which they correspond to their Internet service providers; and the books, groceries , and medications they purchase to...Reauthorization, December 14, 2009, 3. 164 Foreign Intelligence Surveillance Court (FISC), Supplemental Opinion and Order, Docket Number: BR 09-15, November 5...National Security, 1. 224 FISC, Supplemental Opinion, BR 09-15, 2009, 5. 225 “Mobile Technology Fact Sheet,” Pew Research Center, December 27, 2013
Kim, Min-Gu; Moon, Hae-Min; Chung, Yongwha; Pan, Sung Bum
Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing. PMID:22919273
Full Text Available Biometrics verification can be efficiently used for intrusion detection and intruder identification in video surveillance systems. Biometrics techniques can be largely divided into traditional and the so-called soft biometrics. Whereas traditional biometrics deals with physical characteristics such as face features, eye iris, and fingerprints, soft biometrics is concerned with such information as gender, national origin, and height. Traditional biometrics is versatile and highly accurate. But it is very difficult to get traditional biometric data from a distance and without personal cooperation. Soft biometrics, although featuring less accuracy, can be used much more freely though. Recently, many researchers have been made on human identification using soft biometrics data collected from a distance. In this paper, we use both traditional and soft biometrics for human identification and propose a framework for solving such problems as lighting, occlusion, and shadowing.
Full Text Available In this paper, we present a multi-resolution mode CMOS image sensor (CIS for intelligent surveillance system (ISS applications. A low column fixed-pattern noise (CFPN comparator is proposed in 8-bit two-step single-slope analog-to-digital converter (TSSS ADC for the CIS that supports normal, 1/2, 1/4, 1/8, 1/16, 1/32, and 1/64 mode of pixel resolution. We show that the scaled-resolution images enable CIS to reduce total power consumption while images hold steady without events. A prototype sensor of 176 × 144 pixels has been fabricated with a 0.18 μm 1-poly 4-metal CMOS process. The area of 4-shared 4T-active pixel sensor (APS is 4.4 μm × 4.4 μm and the total chip size is 2.35 mm × 2.35 mm. The maximum power consumption is 10 mW (with full resolution with supply voltages of 3.3 V (analog and 1.8 V (digital and 14 frame/s of frame rates.
Full Text Available Taking France as a case study, this article reflects on the ongoing legalisation strategies pursued by liberal states as they seek to secure and expand the Internet surveillance programs of their domestic and foreign intelligence agencies. Following the path to legalisation prior and after the Snowden disclosures of 2013, the article shows how post-Snowden controversies helped mobilise advocacy groups against the extra judicial surveillance of Internet communications, a policy area which had hitherto been overlooked by French human rights groups. It also points to the dilemma that post-Snowden contention created for governments. On the one hand, the disclosures helped document the growing gap between the existing legal framework and actual surveillance practices, exposing them to litigation and thereby reinforcing the rationale for legalisation. On the other hand, they made such a legislative reform politically risky and unpredictable. In France, policy-makers navigated these constraints through a cautious mix of silence, denials, and securitisation. After the Paris attacks of January 2015 and a hasty deliberation in Parliament, the Intelligence Act was passed, making it the most extensive piece of legislation ever adopted in France to regulate secret state surveillance. The article concludes by pointing to the paradoxical effect of post-Snowden contention: French law now provides for clear rules authorising large-scale surveillance, to a degree of detail that was hard to imagine just a few years ago.
The purpose of this study is to clarify Japanese attitudes towards foreign languages based on the kinds and changes of TV and radio programs that aired on the Japanese national broadcasting station (NHK) between 1955 and 2000. Foreign language programs are classified into three groups according to their content: 1) cultivation, 2) education, or 3) communication. For Japanese people, foreign languages are the measures of intelligence and intellect. Studying a foreign language is considered a sign of intelligence whether or not it is used for actual communication. The number of foreign language programs has increased tremendously since 1965 in part because the global economy has brought many countries in such close contact. Since 1990, programs for the purpose of communication have increased because of the necessity to communicate with foreign people. Japanese attitudes towards studying foreign languages have been changing gradually from an intellectual purpose to a communication purpose.
Jurdak, Raja; Elfes, Alberto; Kusy, Branislav; Tews, Ashley; Hu, Wen; Hernandez, Emili; Kottege, Navinda; Sikka, Pavan
The global movement of people and goods has increased the risk of biosecurity threats and their potential to incur large economic, social, and environmental costs. Conventional manual biosecurity surveillance methods are limited by their scalability in space and time. This article focuses on autonomous surveillance systems, comprising sensor networks, robots, and intelligent algorithms, and their applicability to biosecurity threats. We discuss the spatial and temporal attributes of autonomous surveillance technologies and map them to three broad categories of biosecurity threat: (i) vector-borne diseases; (ii) plant pests; and (iii) aquatic pests. Our discussion reveals a broad range of opportunities to serve biosecurity needs through autonomous surveillance. Crown Copyright © 2015. Published by Elsevier Ltd. All rights reserved.
Datta, Shoumen Palit Austin
The elusive quest for intelligence in artificial intelligence prompts us to consider that instituting human-level intelligence in systems may be (still) in the realm of utopia. In about a quarter century, we have witnessed the winter of AI (1990) being transformed and transported to the zenith of tabloid fodder about AI (2015). The discussion at hand is about the elements that constitute the canonical idea of intelligence. The delivery of intelligence as a pay-per-use-service, popping out of ...
Bücker, J.J.L.E.; Furrer, O.F.G.; Poutsma, F.; Buyens, D.
Cultural intelligence (CQ) is an important construct attracting growing attention in academic literature and describing cross-cultural competencies. To date, researchers have only partially tested the relationship between CQ and its dependent variables, such as performance. In this study, the
... SearchingPediatrics.com Pediatrics Common Questions, Quick Answers Foreign Body Donna D'Alessandro, M.D. Lindsay Huth, B. ... I call the doctor? What is a foreign body? A foreign body is when an object is ...
... Links Tetanus Vaccination Maternal and Neonatal Tetanus Elimination Surveillance Recommend on Facebook Tweet Share Compartir Reported tetanus ... date on their 10-year booster shots. National surveillance for tetanus is monitored by the National Notifiable ...
The 9/11 Commission recommended that a new National Intelligence Director (NID) should have control over the personnel and budgets of all agencies that collect and analyze national foreign intelligence to foster more cooperation...
Svendsen, Adam David Morgan
cooperation ('liaison'), as it occurs in both theory and practice. Reflecting a complex coexistence plurality of several different and overlapping concepts in action, the challenging process of the globalization of intelligence emerges as essential for complex issue management purposes during a globalized era......"This book provides an introduction to the complexities of contemporary Western Intelligence and its dynamics during an era of globalization. Towards an understanding of the globalization of intelligence process, Svendsen focuses on the secretive phenomenon of international or foreign intelligence...
The control room of a nuclear power plant can represent a hostile work environment for all but a highly trained operating team. Whilst disciplined training and long professional experience will guarantee assurance of safety and reliability in nuclear plant operation, any surveillance system which has the ability to minimise human error and provide additional safeguards is a desirable asset. This paper proposes a scheme whereby some key parameters of a nuclear power plant, precisely known through detailed calculation and accurate measurement are stored as a data base in an on-line computer. Through the systematic statistical analysis of key stochastic variates a comparison is made by the on-line system with the data base at regular intervals. These time intervals may be as short as seconds during periods of reactor transients such as at start-up or shut down. Alternatively, during steady state operation, the parameters are calculated and displayed at intervals of an hour or greater. An anomaly, or an indication of unusual operational behaviour is indicated both numerically and graphically by the computer if it detects a variance greater than a few percent from the mean value of the reference data base. (author)
Introduction & OverviewIntroduction Brief History of Surveillance Technologies & TechniquesOptical SurveillanceAerial Surveillance Audio Surveillance Radio-Wave SurveillanceGlobal Positioning Systems Sensors Computers & the Internet Data Cards Biochemical Surveillance Animal Surveillance Biometrics Genetics Practical ConsiderationsPrevalence of Surveillance Effectiveness of Surveillance Freedom & Privacy IssuesConstitutional Freedoms Privacy Safeguards & Intrusions ResourcesReferences Glossary Index
and leisure have not been studied with the same intensity as e.g. policing, civil liberties and social sorting. This paper offers a study of trends in surveillance pleasures, i.e. watching and eavesdropping in popular culture. My focus is the existential aspects and ethical dilemmas of surveillance...
What does it mean to live in a world full of surveillance? In this documentary film, we take a look at everyday life in Denmark and how surveillance technologies and practices influence our norms and social behaviour. Researched and directed by Btihaj Ajana and Anders Albrechtslund....
Hoepli, Nancy, Ed.
Eight selected U.S. foreign policy issues are explored in this study and discussion guide. Issue 1, "U.S. Foreign Policy: Projecting U.S. Influence," describes United States involvement in diplomacy, military power, intelligence, trade, and foreign aid since World War II. U.S.-Mexico relations are considered in issue 2, "Mexico and…
Plangger, Kirk Anton
Due to technological advances, customer surveillance (i.e., the collection, capture, use, or storage of customers’ personal data) is becoming less expensive and more covert. Brands use these personal data that contain needs, preferences, characteristics, behavior, attitudes, or other customer attributes (i.e., market intelligence) to develop more competitive products and services. Customer surveillance also can put stress on customer relationships with brands, thus brands must conduct custome...
Hunt, Earl B
Artificial Intelligence provides information pertinent to the fundamental aspects of artificial intelligence. This book presents the basic mathematical and computational approaches to problems in the artificial intelligence field.Organized into four parts encompassing 16 chapters, this book begins with an overview of the various fields of artificial intelligence. This text then attempts to connect artificial intelligence problems to some of the notions of computability and abstract computing devices. Other chapters consider the general notion of computability, with focus on the interaction bet
Hashimoto, H. [The University of Tokyo, Tokyo (Japan). Institute of Industrial Science
Intelligent mechatronics (IM) was explained as follows: a study of IM essentially targets realization of a robot namely, but in the present stage the target is a creation of new values by intellectualization of machine, that is, a combination of the information infrastructure and the intelligent machine system. IM is also thought to be constituted of computers positively used and micromechatronics. The paper next introduces examples of IM study, mainly those the author is concerned with as shown below: sensor gloves, robot hands, robot eyes, tele operation, three-dimensional object recognition, mobile robot, magnetic bearing, construction of remote controlled unmanned dam, robot network, sensitivity communication using neuro baby, etc. 27 figs.
Full Text Available Language learners’ awareness of target language pragmatic features is influenced by individual difference variables, the least explored one being emotional intelligence. To investigate the relationship between emotional intelligence and pragmatic awareness, the current study was conducted over 120 Iranian senior undergraduates of English as a Foreign Language at a university in Iran. Pragmatic awareness was measured through a 12-scenario contextualized pragmatic judgment task. Emotional intelligence was also measured through the EQ-i. The results of the Pearson correlation revealed a strong positive relationship between emotional intelligence and pragmatic awareness. The pedagogical implications of the findings suggested incorporation of emotion-driven authentic materials in English language classes to invoke emotional intelligence in language learners.
Shang, Zhengguo; Liu, Tiandong
This paper first introduces the basic concepts of precision guidance technology and artificial intelligence technology. Then gives a brief introduction of intelligent precision guidance technology, and with the help of development of intelligent weapon based on deep learning project in foreign: LRASM missile project, TRACE project, and BLADE project, this paper gives an overview of the current foreign precision guidance technology. Finally, the future development trend of intelligent precision guidance technology is summarized, mainly concentrated in the multi objectives, intelligent classification, weak target detection and recognition, intelligent between complex environment intelligent jamming and multi-source, multi missile cooperative fighting and other aspects.
Foreign aid has evolved significantly since the Second World War in response to a dramatically changing global political and economic context. This article (a) reviews this process and associated trends in the volume and distribution of foreign aid; (b) reviews the goals, principles...
Full Text Available The article provides the review of foreign publications, concerning the juvenile technologies used in France, Canada, Germany and Switzerland. The paper presents legal, social and psychotherapeutic aspects of juvenile judiciary in foreign countries. The authors paid special attention to the complexity of approaches to young children and teenagers who found themselves in complicated life circumstances or got into trouble with the law. The article gives examples of using the following techniques: cognitive-behavioral intervention, mediation, family therapy (including family background and family history, relations theory, narrative practices, utilization of «emotional intelligence» resources.
This report results from a joint study of KfK and INTERATOM. The aim of this study is to explore the advantages of microprocessors and microelectronics for a more sophisticated core surveillance, which is based on the integration of separate surveillance techniques. Due to new developments in microelectronics and related software an approach to LMFBR core surveillance can be conceived that combines a number of measurements into a more intelligent decision-making data processing system. The following techniques are considered to contribute essentially to an integrated core surveillance system: - subassembly state and thermal hydraulics performance monitoring, - temperature noise analysis, - acoustic core surveillance, - failure characterization and failure prediction based on DND- and cover gas signals, and - flux tilting techniques. Starting from a description of these techniques it is shown that by combination and correlation of these individual techniques a higher degree of cost-effectiveness, reliability and accuracy can be achieved. (orig./GL) [de
generator in itself.4 Yet surveillance unconstrained by legal frameworks, human rights protections, and the rule of law has the ... Analysis of the potential adverse implications of using personal information is often completely ..... acknowledge the potential of new information technologies to strengthen electoral processes,.
Foreign aid has evolved significantly since the Second World War in response to a dramatically changing global political and economic context. This article (a) reviews this process and associated trends in the volume and distribution of foreign aid; (b) reviews the goals, principles...... and institutions of the aid system; and (c) discusses whether aid has been effective. While much of the original optimism about the impact of foreign aid needed modification, there is solid evidence that aid has indeed helped further growth and poverty reduction...
National Oceanic and Atmospheric Administration, Department of Commerce — The Foreign Trade database has monthly volume and value information for US imports, exports, and re-exports of fishery or fishery derived products. Data is...
Full Text Available ... Physician Resources Professions Site Index A-Z Foreign Body Retrieval Foreign body retrieval is the removal of ... foreign body detection and removal? What is Foreign Body Retrieval? Foreign body retrieval involves the removal of ...
Full Text Available The Snowden leaks indicate the extent, nature, and means of contemporary mass digital surveillance of citizens by their intelligence agencies and the role of public oversight mechanisms in holding intelligence agencies to account. As such, they form a rich case study on the interactions of “veillance” (mutual watching involving citizens, journalists, intelligence agencies and corporations. While Surveillance Studies, Intelligence Studies and Journalism Studies have little to say on surveillance of citizens’ data by intelligence agencies (and complicit surveillant corporations, they offer insights into the role of citizens and the press in holding power, and specifically the political-intelligence elite, to account. Attention to such public oversight mechanisms facilitates critical interrogation of issues of surveillant power, resistance and intelligence accountability. It directs attention to the veillant panoptic assemblage (an arrangement of profoundly unequal mutual watching, where citizens’ watching of self and others is, through corporate channels of data flow, fed back into state surveillance of citizens. Finally, it enables evaluation of post-Snowden steps taken towards achieving an equiveillant panoptic assemblage (where, alongside state and corporate surveillance of citizens, the intelligence-power elite, to ensure its accountability, faces robust scrutiny and action from wider civil society.
Pennington, D M
Sonoma offers the first cost-effective, broad-area, high-resolution, real-time motion imagery system for surveillance applications. Sonoma is unique in its ability to provide continuous, real-time video imagery of an area the size of a small city with resolutions sufficient to track 8,000 moving objects in the field of view. At higher resolutions and over smaller areas, Sonoma can even track the movement of individual people. The visual impact of the data available from Sonoma is already causing a paradigm shift in the architecture and operation of other surveillance systems. Sonoma is expected to cost just one-tenth the price of comparably sized sensor systems. Cameras mounted on an airborne platform constantly monitor an area, feeding data to the ground for real-time analysis. Sonoma was designed to provide real-time data for actionable intelligence in situations such as monitoring traffic, special events, border security, and harbors. If a Sonoma system had been available in the aftermath of the Katrina and Rita hurricanes, emergency responders would have had real-time information on roads, water levels, and traffic conditions, perhaps saving many lives.
The Code includes a number of requirements for the health surveillance of employees associated with the mining and milling of radioactive ores. This guideline is particularly directed at determining the level of fitness of employees and prospective employees, detecting any symptom which might contraindicate exposure to the environment encountered in mine/mill situations, examination of any employee who may have been exposed to radiation in excess of defined limits and the accumulation and provision of data on the health of employees
Rinderpest is probably the most lethal virus disease of cattle and buffalo and can destroy whole populations; damaging economies; undermining food security and ruining the livelihood of farmers and pastoralists. The disease can be eradicated by vaccination and control of livestock movement. The Department of Technical Co-operation is sponsoring a programme, with technical support from the Joint FAO/IAEA Division to provide advice, training and materials to thirteen states through the 'Support for Rinderpest Surveillance in West Asia' project. (IAEA)
Rønn, Kira Vrist
.e., the search for an ideal ethical framework for intelligence actions). The article concludes that there are many holes to fill for future studies on intelligence ethics both in external and internal discussions. Thus, the article is an invitation – especially, to moral philosophers and political theorists......Questions concerning what constitutes a morally justified conduct of intelligence activities have received increased attention in recent decades. However, intelligence ethics is not yet homogeneous or embedded as a solid research field. The aim of this article is to sketch the state of the art...... of intelligence ethics and point out subjects for further scrutiny in future research. The review clusters the literature on intelligence ethics into two groups: respectively, contributions on external topics (i.e., the accountability of and the public trust in intelligence agencies) and internal topics (i...
Cet article présente une approche systémique du concept d’intelligence naturelle en ayant pour objectif de créer une intelligence artificielle. Ainsi, l’intelligence naturelle, humaine et animale non-humaine, est une fonction composée de facultés permettant de connaître et de comprendre. De plus, l'intelligence naturelle reste indissociable de la structure, à savoir les organes du cerveau et du corps. La tentation est grande de doter les systèmes informatiques d’une intelligence artificielle ...
and Ready: An Organizational Design Assessment of USMC Intelligence G-2 derived from -2 for intelligence in the Napoleonic staffing system; the...target acquisition S2 derived from -2 for intelligence in the Napoleonic staffing system; the intelligence staff (see also G-2) SIGINT signals...Command-and-control (C2) and intelligence, surveillance, and recon- naissance (ISR) capabilities will be integrated to the squad level to Strategic
Hamilton, John Maxwell
Despite the importance of foreign news, its history, transformation and indeed its future have not been much studied. The scholarly community often calls attention to journalism's shortcomings covering the world, yet the topic has not been systematically examined across countries or over time. The need to redress this neglect and the desire to assess the impact of new media technologies on the future of journalism - including foreign correspondence - provide the motivation for this stimulating, exciting and thought-provoking book. While the old economic models supporting news have crumbled in
Mason, J B; Mitchell, J T
The concept of nutritional surveillance is derived from disease surveillance, and means "to watch over nutrition, in order to make decisions that lead to improvements in nutrition in populations". Three distinct objectives have been defined for surveillance systems, primarily in relation to problems of malnutrition in developing countries: to aid long-term planning in health and development; to provide input for programme management and evaluation; and to give timely warning of the need for intervention to prevent critical deteriorations in food consumption. Decisions affecting nutrition are made at various administrative levels, and the uses of different types of nutritional surveillance information can be related to national policies, development programmes, public health and nutrition programmes, and timely warning and intervention programmes. The information should answer specific questions, for example concerning the nutritional status and trends of particular population groups.Defining the uses and users of the information is the first essential step in designing a system; this is illustrated with reference to agricultural and rural development planning, the health sector, and nutrition and social welfare programmes. The most usual data outputs are nutritional outcome indicators (e.g., prevalence of malnutrition among preschool children), disaggregated by descriptive or classifying variables, of which the commonest is simply administrative area. Often, additional "status" indicators, such as quality of housing or water supply, are presented at the same time. On the other hand, timely warning requires earlier indicators of the possibility of nutritional deterioration, and agricultural indicators are often the most appropriate.DATA COME FROM TWO MAIN TYPES OF SOURCE: administrative (e.g., clinics and schools) and household sample surveys. Each source has its own advantages and disadvantages: for example, administrative data often already exist, and can be
Hsu, Charles; Szu, Harold
An intelligent video surveillance system is able to detect and identify abnormal and alarming situations by analyzing object movement. The Smart Sensing Surveillance Video (S3V) System is proposed to minimize video processing and transmission, thus allowing a fixed number of cameras to be connected on the system, and making it suitable for its applications in remote battlefield, tactical, and civilian applications including border surveillance, special force operations, airfield protection, perimeter and building protection, and etc. The S3V System would be more effective if equipped with visual understanding capabilities to detect, analyze, and recognize objects, track motions, and predict intentions. In addition, alarm detection is performed on the basis of parameters of the moving objects and their trajectories, and is performed using semantic reasoning and ontologies. The S3V System capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments. It would be directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.
Thornlow, Christopher C
... and Law Enforcement Communities to fuse and analyze foreign threat intelligence with domestic law enforcement information in a timely fashion to provide adequate indications and warning of such an...
Full Text Available ... percent of foreign body ingestions occur among children. Most foreign bodies pass through the gastrointestinal tract without ... fainting and shock. Foreign bodies in the airway: Most foreign bodies in the airway are usually expelled ...
Full Text Available ... the limitations of foreign body detection and removal? What is Foreign Body Retrieval? Foreign body retrieval involves ... and damage to surrounding tissues. top of page What are some common uses of the procedure? Foreign ...
Conclusion Learning a foreign language (e.g. English may be an effective factor in selective attention and intelligence profile of adolescents. Therefore, the role of learning a foreign language should be considered in selective attention and intelligence profile of adolescents.
Howard Gardner's theory of Multiple Intelligences has had a huge influence on school education. But its credentials lack justification, as the first section of this paper shows via a detailed philosophical analysis of how the intelligences are identified. If we want to make sense of the theory, we need to turn from a philosophical to a historical…
García Sanz, Carolina
[EN]Spain became a centre of international espionage in 1914. Its strategic location in terms of the Anglo-French trade soon attracted German attention. The Germans waged an economic and propaganda war against the Allies from Spain, while the British took advantage of the Gibraltar Intelligence Centre. The French and Italian intelligence networks also spread out around Spain.
Hjorth, Poul G.
Forestillingen om at naturen er designet af en guddommelig 'intelligens' er et smukt filosofisk princip. Teorier om Intelligent Design som en naturvidenskabeligt baseret teori er derimod helt forfærdelig.......Forestillingen om at naturen er designet af en guddommelig 'intelligens' er et smukt filosofisk princip. Teorier om Intelligent Design som en naturvidenskabeligt baseret teori er derimod helt forfærdelig....
Wash, Darrel Patrick
Making a machine seem intelligent is not easy. As a consequence, demand has been rising for computer professionals skilled in artificial intelligence and is likely to continue to go up. These workers develop expert systems and solve the mysteries of machine vision, natural language processing, and neural networks. (Editor)
Full Text Available In this comment, the author reflects on surveillance from a critical theory approach, his involvement in surveillance research and projects, and the status of the study of surveillance. The comment ascertains a lack of critical thinking about surveillance, questions the existence of something called “surveillance studies” as opposed to a critical theory of society, and reflects on issues such as Edward Snowden’s revelations, and Foucault and Marx in the context of surveillance.
Full Text Available Crystallized intelligence is a pivotal broad ability factor in the major theories of intelligence including the Cattell-Horn-Carroll (CHC model, the three-stratum model, and the extended Gf-Gc (fluid intelligence-crystallized intelligence model and is usually measured by means of vocabulary tests and other verbal tasks. In this paper the C-Test, a text completion test originally proposed as a test of general proficiency in a foreign language, is introduced as an integrative measure of crystallized intelligence. Based on the existing evidence in the literature, it is argued that the construct underlying the C-Test closely matches the abilities underlying the language component of crystallized intelligence, as defined in the well-established theories of intelligence. It is also suggested that by carefully selecting texts from pertinent knowledge domains, the factual knowledge component of crystallized intelligence could also be measured by the C-Test.
Ennals, J R
Artificial Intelligence: State of the Art Report is a two-part report consisting of the invited papers and the analysis. The editor first gives an introduction to the invited papers before presenting each paper and the analysis, and then concludes with the list of references related to the study. The invited papers explore the various aspects of artificial intelligence. The analysis part assesses the major advances in artificial intelligence and provides a balanced analysis of the state of the art in this field. The Bibliography compiles the most important published material on the subject of
if AI is outside your field, or you know something of the subject and would like to know more then Artificial Intelligence: The Basics is a brilliant primer.' - Nick Smith, Engineering and Technology Magazine November 2011 Artificial Intelligence: The Basics is a concise and cutting-edge introduction to the fast moving world of AI. The author Kevin Warwick, a pioneer in the field, examines issues of what it means to be man or machine and looks at advances in robotics which have blurred the boundaries. Topics covered include: how intelligence can be defined whether machines can 'think' sensory
Larsen, Lasse Juel
This paper examines play, gaming and learning in regard to intelligent playware developed for outdoor use. The key questions are how does these novel artefacts influence the concept of play, gaming and learning. Up until now play and game have been understood as different activities. This paper...... examines if the sharp differentiation between the two can be uphold in regard to intelligent playware for outdoor use. Play and game activities will be analysed and viewed in conjunction with learning contexts. This paper will stipulate that intelligent playware facilitates rapid shifts in contexts...
Tevdovska Elena Spirovska
Full Text Available Emotional intelligence, a set of skills which are considered as necessary in the context of interaction with other people, was defined by a number of authors, including Goleman (1996, Gardner and Mayer & Salovey. A number of studies investigated the impact of emotional intelligence on learning, teaching and education. The focus of this article is to explore the definition of emotional intelligence and the impact that emotional intelligence and affective factors have in the context of foreign language learning and teaching. The article also focuses on research conducted with a group of 23 students and their self assessment of emotional intelligence as well as their perceptions of the ways emotional intelligence has an impact on foreign language learning. The article attempts to provide recommendations of implementing activities and teaching practices in the context of foreign language learning and teaching aiming to foster emotional intelligence development.
The present study investigates the link between gender, emotional intelligence (EI), personality traits and self-reported emotional expression in the second language (L2). Data analysis suggests that gender might not influence self-perceived emotional expression in the L2, as the results of the t-test show that both males and females declare…
This article concerns the particular form of counter-surveillance termed “sousveillance”, which aims to turn surveillance at the institutions responsible for surveillance. Drawing on the theoretical perspectives “mediatization” and “aerial surveillance,” the article studies WikiLeaks’ publication...
Burke, R L; Kronmann, K C; Daniels, C C; Meyers, M; Byarugaba, D K; Dueger, E; Klein, T A; Evans, B P; Vest, K G
The Armed Forces Health Surveillance Center (AFHSC), Division of Global Emerging Infections Surveillance and Response System conducts disease surveillance through a global network of US Department of Defense research laboratories and partnerships with foreign ministries of agriculture, health and livestock development in over 90 countries worldwide. In 2010, AFHSC supported zoonosis survey efforts were organized into four main categories: (i) development of field assays for animal disease surveillance during deployments and in resource limited environments, (ii) determining zoonotic disease prevalence in high-contact species which may serve as important reservoirs of diseases and sources of transmission, (iii) surveillance in high-risk human populations which are more likely to become exposed and subsequently infected with zoonotic pathogens and (iv) surveillance at the human-animal interface examining zoonotic disease prevalence and transmission within and between human and animal populations. These efforts have aided in the detection, identification and quantification of the burden of zoonotic diseases such as anthrax, brucellosis, Crimean Congo haemorrhagic fever, dengue fever, Hantaan virus, influenza, Lassa fever, leptospirosis, melioidosis, Q fever, Rift Valley fever, sandfly fever Sicilian virus, sandfly fever Naples virus, tuberculosis and West Nile virus, which are of military and public health importance. Future zoonotic surveillance efforts will seek to develop local capacity for zoonotic surveillance focusing on high risk populations at the human-animal interface. © 2011 Blackwell Verlag GmbH.
Kimberly, Howard R.; Shipers, Larry R.
Long-term nuclear material storage will require in-vault data verification, sensor testing, error and alarm response, inventory, and maintenance operations. System concept development efforts for a comprehensive nuclear material management system have identified the use of a small flexible mobile automation platform to perform these surveillance and maintenance operations. In order to have near-term wide-range application in the Complex, a mobile surveillance system must be small, flexible, and adaptable enough to allow retrofit into existing special nuclear material facilities. The objective of the Mobile Surveillance and Monitoring Robot project is to satisfy these needs by development of a human scale mobile robot to monitor the state of health, physical security and safety of items in storage and process; recognize and respond to alarms, threats, and off-normal operating conditions; and perform material handling and maintenance operations. The system will integrate a tool kit of onboard sensors and monitors, maintenance equipment and capability, and SNL developed non-lethal threat response technology with the intelligence to identify threats and develop and implement first response strategies for abnormal signals and alarm conditions. System versatility will be enhanced by incorporating a robot arm, vision and force sensing, robust obstacle avoidance, and appropriate monitoring and sensing equipment.
Kimberly, Howard R.; Shipers, Larry R.
Long-term nuclear material storage will require in-vault data verification, sensor testing, error and alarm response, inventory, and maintenance operations. System concept development efforts for a comprehensive nuclear material management system have identified the use of a small flexible mobile automation platform to perform these surveillance and maintenance operations. In order to have near-term wide-range application in the Complex, a mobile surveillance system must be small, flexible, and adaptable enough to allow retrofit into existing special nuclear material facilities. The objective of the Mobile Surveillance and Monitoring Robot project is to satisfy these needs by development of a human scale mobile robot to monitor the state of health, physical security and safety of items in storage and process; recognize and respond to alarms, threats, and off-normal operating conditions; and perform material handling and maintenance operations. The system will integrate a tool kit of onboard sensors and monitors, maintenance equipment and capability, and SNL developed non-lethal threat response technology with the intelligence to identify threats and develop and implement first response strategies for abnormal signals and alarm conditions. System versatility will be enhanced by incorporating a robot arm, vision and force sensing, robust obstacle avoidance, and appropriate monitoring and sensing equipment
In this paper we discuss the relevance of artificial intelligence to the automatic indexing of natural language text. We describe the use of domain-specific semantically-based thesauruses and address the problem of creating adequate knowledge bases for intelligent indexing systems. We also discuss the relevance of the Hilbert space ι 2 to the compact representation of documents and to the definition of the similarity of natural language texts. (author). 17 refs., 2 figs
Winfield, Alan F. T.
How intelligent is robot A compared with robot B? And how intelligent are robots A and B compared with animals (or plants) X and Y? These are both interesting and deeply challenging questions. In this paper we address the question "how intelligent is your intelligent robot?" by proposing that embodied intelligence emerges from the interaction and integration of four different and distinct kinds of intelligence. We then suggest a simple diagrammatic representation on which these kinds of intel...
Full Text Available ... 80 percent of foreign body ingestions occur among children. Most foreign bodies pass through the gastrointestinal tract ... blockages that may require surgical removal of magnets. Children account for about 80 percent of foreign body ...
Full Text Available ... procedure? Foreign body retrieval is used to remove one or more foreign objects that have been ingested ... a foreign body or witness a child ingest one or suspect the presence of a soft tissue ...
Yazdanfard, Younes; Heegard, Steffen; Fledelius, Hans C.
Ophthalmology, penetrating orbital injury, orbital foreign body, ultrasound, computed tomography (CT), histology......Ophthalmology, penetrating orbital injury, orbital foreign body, ultrasound, computed tomography (CT), histology...
A vivid example of the growing need for frontier physics experiments to make use of frontier technology is in the field of artificial intelligence and related themes. This was reflected in the second international workshop on 'Software Engineering, Artificial Intelligence and Expert Systems in High Energy and Nuclear Physics' which took place from 13-18 January at France Telecom's Agelonde site at La Londe des Maures, Provence. It was the second in a series, the first having been held at Lyon in 1990
Irwin, J David
Technology has now progressed to the point that intelligent systems are replacing humans in the decision making processes as well as aiding in the solution of very complex problems. In many cases intelligent systems are already outperforming human activities. Artificial neural networks are not only capable of learning how to classify patterns, such images or sequence of events, but they can also effectively model complex nonlinear systems. Their ability to classify sequences of events is probably more popular in industrial applications where there is an inherent need to model nonlinear system
Weimar, M.R.; Freund, K.A.; Roop, J.M.
This report provides background information to the report Energy Company Competitiveness: Little to Do With Subsidies (DOE 1994). The main body of this publication consists of data uncovered during the course of research on this DOE report. This data pertains to major government energy policies in each country studied. This report also provides a summary of the DOE report. In October 1993, the Office of Energy Intelligence, US Department of Energy (formerly the Office of Foreign Intelligence), requested that Pacific Northwest Laboratory prepare a report addressing policies and actions used by foreign governments to enhance the competitiveness of their energy firms. Pacific Northwest Laboratory prepared the report Energy Company Competitiveness Little to Do With Subsidies (DOE 1994), which provided the analysis requested by DOE. An appendix was also prepared, which provided extensive background documentation to the analysis. Because of the length of the appendix, Pacific Northwest Laboratory decided to publish this information separately, as contained in this report.
Full Text Available Video surveillance system senses and trails out all the threatening issues in the real time environment. It prevents from security threats with the help of visual devices which gather the information related to videos like CCTV’S and IP (Internet Protocol cameras. Video surveillance system has become a key for addressing problems in the public security. They are mostly deployed on the IP based network. So, all the possible security threats exist in the IP based application might also be the threats available for the reliable application which is available for video surveillance. In result, it may increase cybercrime, illegal video access, mishandling videos and so on. Hence, in this paper an intelligent model is used to propose security for video surveillance system which ensures safety and it provides secured access on video.
Muratore, Mark J.
Approved for public release; distribution is unlimited As Unmanned Aerial Vehicles (UAVs) become more prevalent on the battlefield, ground forces will have to increasingly rely on them for intelligence, surveillance, and reconnaissance (ISR), as well as target marking, and overwatch operations. The Situational Awareness for Surveillance and Interdiction Operations (SASIO) simulation analysis tool uses Design of Experiments (DOX) to study of aspects of UAV surveillance characteristics in co...
Although more than 70 federal agencies have foreign language needs, some of the largest programs are concentrated in the Army, the State Department, the Central Intelligence Agency, and the Federal...
.... It describes how integrating existing and proven multimedia and artificial intelligence technology, and the World Wide Web may provide an innovative and effective approach to foreign language learning in DoD...
.... The government also employs tens of thousands of individuals who use foreign language skills in positions such as cryptologic linguists, human intelligence collectors,4 FBI special agents and legal...
Lipavská, Helena; Žárský, Viktor
The concept of plant intelligence, as proposed by Anthony Trewavas, has raised considerable discussion. However, plant intelligence remains loosely defined; often it is either perceived as practically synonymous to Darwinian fitness, or reduced to a mere decorative metaphor. A more strict view can be taken, emphasizing necessary prerequisites such as memory and learning, which requires clarifying the definition of memory itself. To qualify as memories, traces of past events have to be not only stored, but also actively accessed. We propose a criterion for eliminating false candidates of possible plant intelligence phenomena in this stricter sense: an “intelligent” behavior must involve a component that can be approximated by a plausible algorithmic model involving recourse to stored information about past states of the individual or its environment. Re-evaluation of previously presented examples of plant intelligence shows that only some of them pass our test. “You were hurt?” Kumiko said, looking at the scar. Sally looked down. “Yeah.” “Why didn't you have it removed?” “Sometimes it's good to remember.” “Being hurt?” “Being stupid.”—(W. Gibson: Mona Lisa Overdrive) PMID:19816094
Corneal Intelligence. Ian Murdoch. Institute of Ophthalmology, Bath Street, London. In 2002, the ocular hypertension treatment study (OHTS) published their results. This study had taken 1636 ocular hypertensives. 1, 2. (IOP 24-32mmHg) and randomized them to receive therapy or no therapy. The primary outcome of the ...
Speech intelligibility (SI) is important for different fields of research, engineering and diagnostics in order to quantify very different phenomena like the quality of recordings, communication and playback devices, the reverberation of auditoria, characteristics of hearing impairment, benefit using hearing aids or combinations of these things.
Rijlaarsdam J; Bosman A; Laar MJW van de; CIE
In May 1999 a working group was started to evaluate the current surveillance systems for sexually transmitted diseases (STD) and to make suggestions for a renewed effective and efficient STD surveillance system in the Netherlands. The surveillance system has to provide insight into the prevalence
Campbell, J.W.; Johnson, C.S.; Stieff, L.R.
The growing acceptance of containment and surveillance as a means to increase safeguards effectiveness has provided impetus to the development of improved surveillance and containment devices. Five recently developed devices are described. The devices include one photographic and two television surveillance systems and two high security seals that can be verified while installed
This paper reports the detection of trans-boundary animal diseases using participatory disease surveillance in Borno State. Participatory epidemiology is an emerging field that is based on the use of participatory techniques for harvesting qualitative epidemiological intelligence contained within community observations, ...
Porikli, Fatih; Xiang, Tao; Gong, Shaogang
Closed Circuit TeleVision (CCTV) cameras have been increasingly deployed pervasively in public spaces including retail centres and shopping malls. Intelligent video analytics aims to automatically analyze content of massive amount of public space video data and has been one of the most active areas of computer vision research in the last two decades. Current focus of video analytics research has been largely on detecting alarm events and abnormal behaviours for public safety and security applications. However, increasingly CCTV installations have also been exploited for gathering and analyzing business intelligence information, in order to enhance marketing and operational efficiency. For example, in retail environments, surveillance cameras can be utilised to collect statistical information about shopping behaviour and preference for marketing (e.g., how many people entered a shop; how many females/males or which age groups of people showed interests to a particular product; how long did they stay in the sho...
Uhrig, Robert E.; Hines, J. Wesley
Approaches to several recent issues in the operation of nuclear power plants using computational intelligence are discussed. These issues include 1) noise analysis techniques, 2) on-line monitoring and sensor validation, 3) regularization of ill-posed surveillance and diagnostic measurements, 4) transient identification, 5) artificial intelligence-based core monitoring and diagnostic system, 6) continuous efficiency improvement of nuclear power plants, and 7) autonomous anticipatory control and intelligent-agents. Several Changes to the focus of Computational Intelligence in Nuclear Engineering have occurred in the past few years. With earlier activities focusing on the development of condition monitoring and diagnostic techniques for current nuclear power plants, recent activities have focused on the implementation of those methods and the development of methods for next generation plants and space reactors. These advanced techniques are expected to become increasingly important as current generation nuclear power plants have their licenses extended to 60 years and next generation reactors are being designed to operate for extended fuel cycles (up to 25 years), with less operator oversight, and especially for nuclear plants operating in severe environments such as space or ice-bound locations
Schouten, Theo E.; Kuppens, Harco C.; van den Broek, Egon L.
Human vigilance is limited; hence, automatic motion and distance detection is one of the central issues in video surveillance. Hereby, many aspects are of importance, this paper specially addresses: efficiency, achieving real-time performance, accuracy, and robustness against various noise factors. To obtain fully controlled test environments, an artificial development center for robot navigation is introduced in which several parameters can be set (e.g., number of objects, trajectories and type and amount of noise). In the videos, for each following frame, movement of stationary objects is detected and pixels of moving objects are located from which moving objects are identified in a robust way. An Exact Euclidean Distance Map (E2DM) is utilized to determine accurately the distances between moving and stationary objects. Together with the determined distances between moving objects and the detected movement of stationary objects, this provides the input for detecting unwanted situations in the scene. Further, each intelligent object (e.g., a robot), is provided with its E2DM, allowing the object to plan its course of action. Timing results are specified for each program block of the processing chain for 20 different setups. So, the current paper presents extensive, experimentally controlled research on real-time, accurate, and robust motion detection for video surveillance, using E2DMs, which makes it a unique approach.
As activists move from alternative media platforms to commercial social media platforms they face increasing challenges in protecting their online security and privacy. While government surveillance of activists is well-documented in both scholarly research and the media, corporate surveillance...... of activists remains under-researched. This presentation explores visibility as a prerequisite and an obstacle to political participation. The dual capacity of visibility in social media enables both surveillance and counter-surveillance by making not only the surveilled actor, but also the surveilling actor...... visible. It thus enables activists to monitor and expose corporate misconduct, but simultaneously renders them vulnerable to surveillance from corporations. In this presentation, I examine these practices and discuss their implications for political participation by drawing on examples of companies...
Bøge, Ask Risom; Albrechtslund, Anders; Lauritsen, Peter
eyes of cameras are but one of many important aspects of the surveillance society. In particular, surveillance has become intrinsic to our digitally mediated communication. Many are constantly engaged in forms of social surveillance as they observe what friends, family, celebrities, love interests......, and acquaintances are up to on social media. In turn, they also leave trails of digital footprints that may be collected and analyzed by governments, businesses, or hackers. The imperceptible nature of this new surveillance raises some pressing concerns about our digital lives as our data doubles increasingly...... are particularly relevant to this topic and audience. The fourth section outlines a variety of themes in which surveillance of communication is being studied. Organized under the headings Tracking; Mass Surveillance; Media; and Art, Fiction, and Popular Culture, this section provides a survey in surveillance...
Lawrence, David R; Palacios-González, César; Harris, John
It seems natural to think that the same prudential and ethical reasons for mutual respect and tolerance that one has vis-à-vis other human persons would hold toward newly encountered paradigmatic but nonhuman biological persons. One also tends to think that they would have similar reasons for treating we humans as creatures that count morally in our own right. This line of thought transcends biological boundaries-namely, with regard to artificially (super)intelligent persons-but is this a safe assumption? The issue concerns ultimate moral significance: the significance possessed by human persons, persons from other planets, and hypothetical nonorganic persons in the form of artificial intelligence (AI). This article investigates why our possible relations to AI persons could be more complicated than they first might appear, given that they might possess a radically different nature to us, to the point that civilized or peaceful coexistence in a determinate geographical space could be impossible to achieve.
Chambers, David W
The standard view of how things work is that an outside force impacts a group of individuals and causes outcomes they are interested in. The outside force may not affect all individuals to the same extent, but we can summarize the effect by taking the average. Effective influence is thought to come from the top, not from the group that is being led. The alternative considered here is that a substantial degree of intelligence resided in the individuals or elements that someone wants to study or change. And these elements of the system interact with each other. This phenomenon goes by many names, but will be called swarm intelligence here. There are many cases where simple rules followed at the local level trump or outperform understanding or control from above. Five examples will be given: (a) ethics; (b) the progression of periodontal diseases; (b) dental continuing education; (c) leadership from within; and (d) the wisdom of group decision making.
Full Text Available The Iranian Revolutionary Guard Corps (IRGC is a military and paramilitary organization that is meant to defend the ideals of the Iranian Islamic Revolution in 1979. Since its formation, the IRGC has grown in influence and its intelligence role has expanded. This paper examines the role of the IRGC in Iran’s intelligence system through a comprehensive analysis of the organization of the IRGC’s intelligence arm, along with its operations and capabilities. In doing so, the scope, objectives, resources, customers, and sponsors of the IRGC’s intelligence activities are also analyzed. Additionally, this paper explores how the IRGC interacts with the government of Iran, the Ministry of Intelligence and Security (MOIS, other key internal stakeholders, and foreign client organizations. A key focus of this analysis is the evolution of the relationship between the IRGC and the MOIS and the growing influence of the IRGC in Iran’s intelligence community over the last decade. The paper concludes that the IRGC has now eclipsed the MOIS within Iran’s intelligence community and is one of the most powerful institutions in Iranian politics today, using its intelligence activities as its key means of maintaining power and influence within the country.
Good Evening, my name is Greg Jerman and for nearly a quarter century I have been performing failure analysis on NASA's aerospace hardware. During that time I had the distinct privilege of keeping the Space Shuttle flying for two thirds of its history. I have analyzed a wide variety of failed hardware from simple electrical cables to cryogenic fuel tanks to high temperature turbine blades. During this time I have found that for all the time we spend intelligently designing things, we need to be equally intelligent about understanding why things fail. The NASA Flight Director for Apollo 13, Gene Kranz, is best known for the expression "Failure is not an option." However, NASA history is filled with failures both large and small, so it might be more accurate to say failure is inevitable. It is how we react and learn from our failures that makes the difference.
Discusses the foundations of artificial intelligence as a science and the types of answers that may be given to the question, "What is intelligence?" The paradigms of artificial intelligence and general systems theory are compared. (Author/VT)
Bøge, Ask Risom; Lauritsen, Peter
We live in societies in which surveillance technologies are constantly introduced, are transformed, and spread to new practices for new purposes. How and why does this happen? In other words, why does surveillance “creep”? This question has received little attention either in theoretical...... development or in empirical analyses. Accordingly, this article contributes to this special issue on the usefulness of Actor-Network Theory (ANT) by suggesting that ANT can advance our understanding of ‘surveillance creep’. Based on ANT’s model of translation and a historical study of the Danish DNA database......, we argue that surveillance creep involves reassembling the relations in surveillance networks between heterogeneous actors such as the watchers, the watched, laws, and technologies. Second, surveillance creeps only when these heterogeneous actors are adequately interested and aligned. However...
This master’s thesis work was performed at Optimum Biometric Labs, OBL, located in Karlskrona, Sweden. Optimum Biometric Labs perform independent scenario evaluations to companies who develop biometric devices. The company has a product Optimum preConTM which is surveillance and diagnosis tool for biometric systems. This thesis work’s objective was to develop a conceptual model and implement it as an additional layer above the biometric layer with intelligence about the biometric users. The l...
Voeller, John G
Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical
From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry. The Handbook of Surveillance Technologies, Third Edition is the only comprehensive work to chronicle the background and current applications of the full-range of surveillance technologies--offering the latest in surveillance and privacy issues.Cutting-Edge--updates its bestselling predecessor with discussions on social media, GPS circuits in cell phones and PDAs, new GIS s
Full Text Available With growing concerns about international spread of disease and expanding use of early disease detection surveillance methods, the field of syndromic surveillance has received increased attention over the last decade. The purpose of this article is to clarify the various meanings that have been assigned to the term syndromic surveillance and to propose a refined categorization of the characteristics of these systems. Existing literature and conference proceedings were examined on syndromic surveillance from 1998 to 2010, focusing on low- and middle-income settings. Based on the 36 unique definitions of syndromic surveillance found in the literature, five commonly accepted principles of syndromic surveillance systems were identified, as well as two fundamental categories: specific and non-specific disease detection. Ultimately, the proposed categorization of syndromic surveillance distinguishes between systems that focus on detecting defined syndromes or outcomes of interest and those that aim to uncover non-specific trends that suggest an outbreak may be occurring. By providing an accurate and comprehensive picture of this field’s capabilities, and differentiating among system types, a unified understanding of the syndromic surveillance field can be developed, encouraging the adoption, investment in, and implementation of these systems in settings that need bolstered surveillance capacity, particularly low- and middle-income countries.
Selaya, Pablo; Sunesen, Eva Rytter
The notion that foreign aid and foreign direct investment (FDI) are complementary sources of capital is conventional among governments and international cooperation agencies. This paper argues that the notion is incomplete. Within the framework of an open economy Solow model we show that the th...... The notion that foreign aid and foreign direct investment (FDI) are complementary sources of capital is conventional among governments and international cooperation agencies. This paper argues that the notion is incomplete. Within the framework of an open economy Solow model we show...... that the theoretical relationship between foreign aid and FDI is indeterminate. Aid may raise the marginal productivity of capital by financing complementary inputs, such as public infrastructure projects and human capital investment. However, aid may also crowd out productive private investments if it comes...
Full Text Available ... foreign bodies pass through the gastrointestinal tract without complication, and endoscopic or surgical intervention is required only ... abdomen to locate objects and to identify possible complications of foreign body ingestion, including swelling and perforation ...
Full Text Available ... Videos About Us News Physician Resources Professions Site Index A-Z Foreign Body Retrieval Foreign body retrieval ... that have been introduced from the outside. They can be inhaled into the airway or swallowed and ...
Full Text Available ... able to view the surgical instrument as it advances to the location of the foreign object in ... helps dilate, or widen, the esophagus. This helps advance the foreign body into the stomach, from where ...
Full Text Available ... infection and damage to surrounding tissues. top of page What are some common uses of the procedure? Foreign ... needed to see the foreign body. top of page What does the equipment look like? A variety of ...
US Agency for International Development — The Foreign Aid Explorer shows the multi-dimensional picture of U.S. foreign assistance through a highly visual and interactive website. The website makes it easy...
Full Text Available ... Removal of a foreign body will reduce your chances of suffering an infection or an allergic reaction. ... Removal of soft-tissue foreign bodies will reduce chances of an infection that could damage tissue, nerves ...
Full Text Available ... tissues. top of page What are some common uses of the procedure? Foreign body retrieval is used ... bones also may be difficult to visualize. Additional evaluation is required when the suspected foreign body is ...
Full Text Available ... safely through the digestive system. top of page How should I prepare? If you ingest a foreign ... and remove the foreign bodies. top of page How does the procedure work? Your physician may use ...
Full Text Available ... risks? Benefits Removal of a foreign body will reduce your chances of suffering an infection or an ... bowel. Removal of soft-tissue foreign bodies will reduce chances of an infection that could damage tissue, ...
Full Text Available ... time imaging, making it a good tool for guiding removal procedures. In some cases, it is potentially ... time imaging, making it a good tool for guiding foreign body removal procedures. Risks While foreign body ...
US Agency for International Development — ForeignAssistance.gov provides a view of U.S. Government foreign assistance funds across agencies and enables users to explore, analyze, and review aid investments...
Full Text Available ... the use of two snares. The catheter is guided into place just beyond the foreign object using ... like toothpicks. Small esophageal foreign bodies like fish bones also may be difficult to visualize. Additional evaluation ...
Full Text Available ... of page What are some common uses of the procedure? Foreign body retrieval is used to remove ... the foreign body. top of page What does the equipment look like? A variety of x-ray ...
Cadas, C.N.; Bowskill, J.; Mayfield, T.; Clarke, J.C.
This Paper describes work being carried out to develop an intelligent knowledge-based system (IKBS) for use in the surveillance of naval nuclear submarine propulsion plant. In recent years, modern process plants have increased automation and installed surveillance equipment while reducing the level of manpower operating and monitoring the plant. As a result, some of the local watchkeeping tasks have been transferred to control room operators, and the data reduction and warning filtering expertise inherent in local plant operators has been lost, while an additional workload has been placed upon operators. The surveillance systems installed to date have therefore been less usable than anticipated. The solution being achieved for submarine power plant is to introduce IKBS into surveillance to replace lost expertise and return to a situation in which operators receive small amounts of high quality information rather than large amounts of low quality information. (author)
A V Krasnov
Foreign psychologists believe that parenting may influence children’s development of emotional intelligence. However, little research has been done in this area. In view of the reviewed literature and given the scarcity of data, we conducted an exploratory study in an as yet unexplored field. The present study aims at examining relationships between the parenting practices and adolescents’ emotional intelligence. 74 students (17-18 years, females) were surveyed to assess their perception of p...
Full Text Available ... object that pierces the stomach or intestines can cause severe abdominal pain, fever, fainting and shock. Foreign bodies in the airway: Most foreign bodies in the airway are usually expelled through coughing. However, ... branches. This can cause the patient to cough, but the foreign body ...
Full Text Available ... object that pierces the stomach or intestines can cause severe abdominal pain, fever, fainting and shock. Foreign bodies in the airway: Most foreign bodies in the airway are usually expelled through coughing. However, some ... branches. This can cause the patient to cough, but the foreign body ...
Cílem této bakalářské práce je seznámení s Business Intelligence a zpracování vývojového trendu, který ovlivňuje podobu řešení Business Intelligence v podniku ? Business Activity Monitoring. Pro zpracování tohoto tématu byla použita metoda studia odborných pramenů, a to jak v českém, tak v anglickém jazyce. Hlavním přínosem práce je ucelený, v českém jazyce zpracovaný materiál pojednávající o Business Activity Monitoring. Práce je rozdělena do šesti hlavních kapitol. Prvních pět je věnováno p...
This paper surveys important aspects of Web Intelligence (WI) in the context of Artificial Intelligence in Education (AIED) research. WI explores the fundamental roles as well as practical impacts of Artificial Intelligence (AI) and advanced Information Technology (IT) on the next generation of Web-related products, systems, services, and…
explosive device ISR intelligence, surveillance and reconnaissance J2 joint staff intelligence section NATO North Atlantic Treaty Organization OSINT open...commonly referring to the technical means of collection to the exclusion of HUMINT, open source intelligence ( OSINT ), and other information coming...is using to gain popular support or to delegitimize the supported government. The 10th Mountain Division determined OSINT was an important component
Hjertholm, Peter; Laursen, Jytte; White, Howard
foreign aid, macroeconomics of aid, gap models, aid fungibility, fiscal response models, foreign debt,......foreign aid, macroeconomics of aid, gap models, aid fungibility, fiscal response models, foreign debt,...
path and, using the evaluation module for feedback , alter the path until acceptable surveil- lance avoidance performance is achieved. The current ISAS...Nmber Diselav Stage Containing - Date: I I Time ( GIlT ): Figure 3-46: Textual Display for GRAPHICAL Module 3-64 Surveillance Avoidance Final Report System
This paper discusses the role of US intelligence during arms control negotiations between 1982 and 1987. It also covers : the orchestration of intelligence projects; an evaluation of the performance of intelligence activities; the effect intelligence work had on actual arms negotiations; and suggestions for improvements in the future
Items 21 - 28 ... Mayer, DiPaolo and. Salovey (1990) introduced emotional intelligence as a set of social skills and abilities, distinct from rational intelligence (1). In the early 1990, the term emotional intelligence in the Mayer and. Salovey's scientific literature is defined as the subgroup of social intelligence. That is including.
Meyer, G.G.; Främling, K.; Holmström, J.
This paper presents an overview of the field of Intelligent Products. As Intelligent Products have many facets, this paper is mainly focused on the concept behind Intelligent Products, the technical foundations, and the achievable practical goals of Intelligent Products. A novel classification of
Donato Di Paola
Full Text Available The development of intelligent surveillance systems is an active research area. In this context, mobile and multi-functional robots are generally adopted as means to reduce the environment structuring and the number of devices needed to cover a given area. Nevertheless, the number of different sensors mounted on the robot, and the number of complex tasks related to exploration, monitoring, and surveillance make the design of the overall system extremely challenging. In this paper, we present our autonomous mobile robot for surveillance of indoor environments. We propose a system able to handle autonomously general-purpose tasks and complex surveillance issues simultaneously. It is shown that the proposed robotic surveillance scheme successfully addresses a number of basic problems related to environment mapping, localization and autonomous navigation, as well as surveillance tasks, like scene processing to detect abandoned or removed objects and people detection and following. The feasibility of the approach is demonstrated through experimental tests using a multisensor platform equipped with a monocular camera, a laser scanner, and an RFID device. Real world applications of the proposed system include surveillance of wide areas (e.g. airports and museums and buildings, and monitoring of safety equipment.
Donato Di Paola
Full Text Available The development of intelligent surveillance systems is an active research area. In this context, mobile and multi-functional robots are generally adopted as means to reduce the environment structuring and the number of devices needed to cover a given area. Nevertheless, the number of different sensors mounted on the robot, and the number of complex tasks related to exploration, monitoring, and surveillance make the design of the overall system extremely challenging. In this paper, we present our autonomous mobile robot for surveillance of indoor environments. We propose a system able to handle autonomously general-purpose tasks and complex surveillance issues simultaneously. It is shown that the proposed robotic surveillance scheme successfully addresses a number of basic problems related to environment mapping, localization and autonomous navigation, as well as surveillance tasks, like scene processing to detect abandoned or removed objects and people detection and following. The feasibility of the approach is demonstrated through experimental tests using a multisensor platform equipped with a monocular camera, a laser scanner, and an RFID device. Real world applications of the proposed system include surveillance of wide areas (e.g. airports and museums and buildings, and monitoring of safety equipment.
Lee, Sang Yoon; Song, Dae Yong; Ko, Won Il; Ha, Jang Ho; Kim, Ho Dong
In this paper, the implementation techniques of intelligent nuclear material surveillance system based on the COM (Component Object Model) and SOM (Self Organized Mapping) was described. The surveillance system that is to be developed is consist of CCD cameras, neutron monitors, and PC for data acquisition. To develop the system, the properties of the COM based software development technology was investigated, and the characteristics of related platform APIs was summarized. This report could be used for the developers who want to develop the intelligent surveillance system for various experimental environments based on the DVR and sensors using Borland C++ Builder
Anastassiou, George A
“Intelligent Routines II: Solving Linear Algebra and Differential Geometry with Sage” contains numerous of examples and problems as well as many unsolved problems. This book extensively applies the successful software Sage, which can be found free online http://www.sagemath.org/. Sage is a recent and popular software for mathematical computation, available freely and simple to use. This book is useful to all applied scientists in mathematics, statistics and engineering, as well for late undergraduate and graduate students of above subjects. It is the first such book in solving symbolically with Sage problems in Linear Algebra and Differential Geometry. Plenty of SAGE applications are given at each step of the exposition.
Willem de Lint
Full Text Available Recently, within liberal democracies, the post-Westphalian consolidation of security and intelligence has ushered in the normalization not only of security in ‘securitization’ but also of intelligence in what is proposed here as ‘intelligencification.’ In outlining the features of intelligencified governance, my aim is to interrogate the view that effects or traces, and productivity rather than negation is as persuasive as commonly thought by the constructivists. After all, counter-intelligence is both about purging and reconstructing the archive for undisclosed values. In practice, what is being normalized is the authorized and legalized use of release and retention protocols of politically actionable information. The intelligencification of governmentality affords a sovereignty shell-game or the instrumentalization of sovereign power by interests that are dependent on, yet often inimical to, the power of state, national, and popular sovereignty. On voit le politique et le social comme dépendant de contingences exclusives. Récemment, au sein des démocraties libérales, la consolidation de la sécurité et des services de renseignements de sécurité qui a suivi les traités de la Westphalie a donné lieu à la normalisation non seulement de la sécurité en «sécurisation» mais aussi des services de renseignements de sécurité en ce qui est proposé ici comme «intelligencification» [terme anglais créé par l’auteur, dérivé du mot anglais «intelligence» dans le sens de renseignements des écurité]. En particulier, ce que l’on normalise dans le but de contourner des contingences exclusives est l’utilisation autorisée et légalisée de protocoles de communication et de rétention d’information qui, politiquement, pourrait mener à des poursuites. En esquissant les traits de la gouvernance «intelligencifiée», mon but est d’interroger le point de vue que les effets ou les traces, et la productivité plutôt que la
Schlinger, Henry D.
Throughout the history of the artificial intelligence movement, researchers have strived to create computers that could simulate general human intelligence. This paper argues that workers in artificial intelligence have failed to achieve this goal because they adopted the wrong model of human behavior and intelligence, namely a cognitive essentialist model with origins in the traditional philosophies of natural intelligence. An analysis of the word “intelligence” suggests that it originally r...
This research proposes a model for intelligent traffic flow control by implementing camera based surveillance and feedback system. A series of cameras are set minimum three signals ahead from the target junction. The complete software system is developed to help integrating the multiple camera on road as feedback to ...
Full text: Video surveillance is a very crucial component in safeguard and physical protection. Digital technology has revolutionized the surveillance scenario and brought in various new capabilities like better image quality, faster search and retrieval of video images, less storage space for recording, efficient transmission and storage of video, better protection of recorded video images, and easy remote accesses to live and recorded video etc. The basic safeguard requirement for verifiably uninterrupted surveillance has remained largely unchanged since its inception. However, changes to the inspection paradigm to admit automated review and remote monitoring have dramatically increased the demands on safeguard surveillance system. Today's safeguard systems can incorporate intelligent motion detection with very low rate of false alarm and less archiving volume, embedded image processing capability for object behavior and event based indexing, object recognition, efficient querying and report generation etc. It also demands cryptographically authenticating, encrypted, and highly compressed video data for efficient, secure, tamper indicating and transmission. In physical protection, intelligent on robust video motion detection, real time moving object detection and tracking from stationary and moving camera platform, multi-camera cooperative tracking, activity detection and recognition, human motion analysis etc. is going to play a key rote in perimeter security. Incorporation of front and video imagery exploitation tools like automatic number plate recognition, vehicle identification and classification, vehicle undercarriage inspection, face recognition, iris recognition and other biometric tools, gesture recognition etc. makes personnel and vehicle access control robust and foolproof. Innovative digital image enhancement techniques coupled with novel sensor design makes low cost, omni-directional vision capable, all weather, day night surveillance a reality
Weber, David Jay
Today’s public health crises, as exemplified by the Ebola outbreak, lead to dramatic calls to action that typically include improved electronic monitoring systems to better prepare for, and respond to, similar occurrences in the future. Even a preliminary public health informatics evaluation of the current Ebola crisis exposes the need for enhanced coordination and sharing of trustworthy public health intelligence. We call for a consumer-centric model of public health intelligence and the formation of a national center to guide public health intelligence gathering and synthesis. Sharing accurate and actionable information with government agencies, health care practitioners, policymakers, and, critically, the general public, will mark a shift from doing public health surveillance on people to doing public health surveillance for people. PMID:26180978
U.S. Department of Health & Human Services — The 522 Postmarket Surveillance Studies Program encompasses design, tracking, oversight, and review responsibilities for studies mandated under section 522 of the...
Edward Wong Sek Khin
Full Text Available Internet fraud is increasing on a daily basis with new methods for extracting funds from government, corporations, businesses in general, and persons appearing almost hourly. The increases in on-line purchasing and the constant vigilance of both seller and buyer have meant that the criminal seems to be one-step ahead at all times. To pre-empt or to stop fraud before it can happen occurs in the non-computer based daily transactions of today because of the natural intelligence of the players, both seller and buyer. Currently, even with advances in computing techniques, intelligence is not the current strength of any computing system of today, yet techniques are available which may reduce the occurrences of fraud, and are usually referred to as artificial intelligence systems.This paper provides an overview of the use of current artificial intelligence (AI techniques as a means of combating fraud.Initially the paper describes how artificial intelligence techniques are employed in systems for detecting credit card fraud (online and offline fraud and insider trading.Following this, an attempt is made to propose the using of MonITARS (Monitoring Insider Trading and Regulatory Surveillance Systems framework which use a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing. Finally, the paper discusses future research agenda to the role of using MonITARS system.
Many teachers and researchers believe learning preferences or learning styles can be used advantageously to enhance language study and motivate learners. Following an overview of Gardner's theory of multiple intelligences (MI) and research on multimedia-based approaches in foreign language instruction, this paper first describes a study comparing…
Welch, Lawrence S.; Benito, Gabriel R. G.; Petersen, Bent
Introduction and theory -- Introduction -- Theoretical approaches -- Modes of operation -- Franchising -- Licensing -- Management contracts -- International subcontracting -- Project operations -- Exports -- Alliances -- Foreign direct investment -- Strategies -- Mode switching and stretching...
Legg, Shane; Hutter, Marcus
A fundamental problem in artificial intelligence is that nobody really knows what intelligence is. The problem is especially acute when we need to consider artificial systems which are significantly different to humans. In this paper we approach this problem in the following way: We take a number of well known informal definitions of human intelligence that have been given by experts, and extract their essential features. These are then mathematically formalised to produce a general measure o...
Through the course of this paper we define Locationbased Intelligence (LBI) which is outgrowing from process of amalgamation of geolocation and Business Intelligence. Amalgamating geolocation with traditional Business Intelligence (BI) results in a new dimension of BI named Location-based Intelligence. LBI is defined as leveraging unified location information for business intelligence. Collectively, enterprises can transform location data into business intelligence applic...
Las Fargeas, Jonathan; Kabamba, Pierre; Girard, Anouck
This paper considers the problem of path planning for a team of unmanned aerial vehicles performing surveillance near a friendly base. The unmanned aerial vehicles do not possess sensors with automated target recognition capability and, thus, rely on communicating with unattended ground sensors placed on roads to detect and image potential intruders. The problem is motivated by persistent intelligence, surveillance, reconnaissance and base defense missions. The problem is formulated and shown...
AlperEker; Mark Giammattia; Paul Houpt; Aditya Kumar; Oscar Montero; Minesh Shah; Norberto Silvi; Timothy Cribbs
''Intelligent Extruder'' described in this report is a software system and associated support services for monitoring and control of compounding extruders to improve material quality, reduce waste and energy use, with minimal addition of new sensors or changes to the factory floor system components. Emphasis is on process improvements to the mixing, melting and de-volatilization of base resins, fillers, pigments, fire retardants and other additives in the :finishing'' stage of high value added engineering polymer materials. While GE Plastics materials were used for experimental studies throughout the program, the concepts and principles are broadly applicable to other manufacturers materials. The project involved a joint collaboration among GE Global Research, GE Industrial Systems and Coperion Werner & Pleiderer, USA, a major manufacturer of compounding equipment. Scope of the program included development of a algorithms for monitoring process material viscosity without rheological sensors or generating waste streams, a novel detection scheme for rapid detection of process upsets and an adaptive feedback control system to compensate for process upsets where at line adjustments are feasible. Software algorithms were implemented and tested on a laboratory scale extruder (50 lb/hr) at GE Global Research and data from a production scale system (2000 lb/hr) at GE Plastics was used to validate the monitoring and detection software. Although not evaluated experimentally, a new concept for extruder process monitoring through estimation of high frequency drive torque without strain gauges is developed and demonstrated in simulation. A plan to commercialize the software system is outlined, but commercialization has not been completed.
In Computer Graphics, the use of intelligent techniques started more recently than in other research areas. However, during these last two decades, the use of intelligent Computer Graphics techniques is growing up year after year and more and more interesting techniques are presented in this area. The purpose of this volume is to present current work of the Intelligent Computer Graphics community, a community growing up year after year. This volume is a kind of continuation of the previously published Springer volumes “Artificial Intelligence Techniques for Computer Graphics” (2008), “Intelligent Computer Graphics 2009” (2009), “Intelligent Computer Graphics 2010” (2010) and “Intelligent Computer Graphics 2011” (2011). Usually, this kind of volume contains, every year, selected extended papers from the corresponding 3IA Conference of the year. However, the current volume is made from directly reviewed and selected papers, submitted for publication in the volume “Intelligent Computer Gr...
Ryoo, Young; Jang, Moon-soo; Bae, Young-Chul
Intelligent systems have been initiated with the attempt to imitate the human brain. People wish to let machines perform intelligent works. Many techniques of intelligent systems are based on artificial intelligence. According to changing and novel requirements, the advanced intelligent systems cover a wide spectrum: big data processing, intelligent control, advanced robotics, artificial intelligence and machine learning. This book focuses on coordinating intelligent systems with highly integrated and foundationally functional components. The book consists of 19 contributions that features social network-based recommender systems, application of fuzzy enforcement, energy visualization, ultrasonic muscular thickness measurement, regional analysis and predictive modeling, analysis of 3D polygon data, blood pressure estimation system, fuzzy human model, fuzzy ultrasonic imaging method, ultrasonic mobile smart technology, pseudo-normal image synthesis, subspace classifier, mobile object tracking, standing-up moti...
Best. Jr, Richard A
... of Central Intelligence (DCI). Priority continues to be placed on intelligence support to military operations and on involvement in efforts to combat narcotics trafficking and, especially since September 11, 2001, international terrorism...
Schlinger, Henry D.
Throughout the history of the artificial intelligence movement, researchers have strived to create computers that could simulate general human intelligence. This paper argues that workers in artificial intelligence have failed to achieve this goal because they adopted the wrong model of human behavior and intelligence, namely a cognitive essentialist model with origins in the traditional philosophies of natural intelligence. An analysis of the word “intelligence” suggests that it originally referred to behavior-environment relations and not to inferred internal structures and processes. It is concluded that if workers in artificial intelligence are to succeed in their general goal, then they must design machines that are adaptive, that is, that can learn. Thus, artificial intelligence researchers must discard their essentialist model of natural intelligence and adopt a selectionist model instead. Such a strategic change should lead them to the science of behavior analysis. PMID:22477051
Full Text Available Toggle navigation Test/Treatment Patient Type Screening/Wellness Disease/Condition Safety En Español More Info Images/Videos About Us News Physician Resources Professions Site Index A-Z Foreign Body Retrieval Foreign ...
Dr. A.O.A. Ogunleye
result of local irritations of the epithelium of the meatal walls 5. There are other clinical features apart from otitis externa attributable to a foreign body in the external meatus such as deafness, tinnitus and otalgia. 1, 5.This study aims to evaluate the clinical profile and management of ear foreign bodies in children as seen.
Full Text Available ... that can be used to help trap smooth objects like a marble, or to orient foreign bodies with the use of two snares. The catheter is guided into place just beyond the foreign object using x-ray fluoroscopy. A balloon at the ...
Honig, Lucille J.; Brod, Richard I.
Gives employment opportunity information in the following fields where foreign language can be used as an auxiliary skill: 1) Business, Industry, Commerce; 2) Civil Service; 3) Education; 4) Law; 5) Library Science; 6) Media; 7) Science; 8) Service; 9) Social Sciences; 10) Travel, Tourism. The fields of foreign language teaching and interpretation…
Full Text Available ... bodies can cause infection and damage to surrounding tissues. top of page What are some common uses of the procedure? Foreign body retrieval is used to remove one or more foreign objects that have been ... into the soft tissues. In some cases, objects can be dislodged rather ...
Full Text Available The paper deals with the spoken language technologies that could enable the so-called smart (intelligent surveillance systems to listen, understand and speak Slovenian in the near future. Advanced computational methods of artificial perception and pattern recognition enable such systems to be at least to some extent aware of the environment, the presence of people and other phenomena that could be subject to surveillance. Speech is one such phenomenon that has the potential to be a key source of information in certain security situations. Technologies that enable automatic speech and speaker recognition as well as their psychophysical state by computer analysis of acoustic speech signals provide an entirely new dimension to the development of smart surveillance systems. Automatic recognition of spoken threats, screaming and crying for help, as well as a suspicious psycho-physical state of a speaker provide such systems to some extent with intelligent behaviour. The paper investigates the current state of development of these technologies and the requirements and possibilities of these systems to be used for the Slovenian spoken language, as well as different possible security application scenarios. It also addresses the broader legal and ethical issues raised by the development and use of such technologies, especially as audio surveillance is one of the most sensitive issues of privacy protection.
reconnaissance and the adjustment of artillery fire . —Brigadier General D.E. Autman, 1919 …Moments later, an Airman first class and a Private...less utility as a shock weapon employed in a mass charge at a decisive moment, but instead would have greater utility performing “reconnoiter...Lee had to send forward someone to provide terms to a homicidal criminal and then signal an attack. He chose someone he trusted. Following the
Kuperman, Gilbert G
ISR PLANNING CAPABILITY: (1) Project Description: Development and demonstration of shared battlespace awareness display capability between the ISR and Combat Operations Divisions of the AOC. (2) What does...
processing and exploitation, analysis and production , dissemination) capabilities to enable cyberspace op- erations.”8 This definition suggests the...a server in China. I can use a server in Malaysia or in Brunei.”36 The worldwide diffusion and geoambiguity of cyberspace complicate effective ISR...more-or-less permanent presence, even remotely—is almost exclusively confined to our own solar system. With the exception of the Apollo moon landings
development of US covert 2 CIA historian Thomas Ahern alludes to this legacy in his analysis of black entry operations into North Viet - nam during the...intelligence community that housed it, BBC publishes basic annual financial figures, offer- ing some insights into the scope of its operations. During...Happy Marriage ,” in Spinning Intelligence, Why Intelligence Needs the Media, Why the Media Needs Intelligence, Robert Dover and Michael Goodman, eds
The aim of this article is to show the importance of business intelligence and its growing influence. It also shows when the concept of business intelligence was used for the first time and how it evolved over time. The paper discusses the utility of a business intelligence system in any organization and its contribution to daily activities. Furthermore, we highlight the role and the objectives of business intelligence systems inside an organization and the needs to grow the incomes and reduc...
the IC adopt this Joint Intelli- gence Virtual Architecture model to take advantage of technological developments, reduce bureau- cratic barriers, and...intelligence. For example, major U.S. auto makers purchase their competitors’ models as soon as they appear in the showrooms . The new cars are taken...devised the Joint Intelligence Virtual Architecture (JIVA) concept to accelerate and streamline the entire intelligence process. Under JIVA, intelligence
Srirangam, Ramesh; Gokhale, Suvarna K; Kulkarni, Adwait Uday; Gadre, Kiran S
A case of a 41-year-old patient presenting late post-trauma with out any major signs or symptoms is presented herewith. On radiological investigation, a peculiar foreign body was identified in the orbital floor. To our surprise the point of entry of the foreign body was not proportionate with the size of it. Moreover, the trajectory and final location of foreign body did not concur with the symptom less presentation of patient. After what was thought to be adequate investigation, the patient was taken under general anaesthesia to reveal an additional foreign body that put most of the preoperative queries to rest. This case in retrospect emphasises the need for ruling out foreign body in the case of any penetrating injury of orbit with the help of not just radiographs and CT scans but also ultrasonography and MRI.
Johnson, Alan P.
Surveillance involves the collection and analysis of data for the detection and monitoring of threats to public health. Surveillance should also inform as to the epidemiology of the threat and its burden in the population. A further key component of surveillance is the timely feedback of data to stakeholders with a view to generating action aimed at reducing or preventing the public health threat being monitored. Surveillance of antibiotic resistance involves the collection of antibiotic susceptibility test results undertaken by microbiology laboratories on bacteria isolated from clinical samples sent for investigation. Correlation of these data with demographic and clinical data for the patient populations from whom the pathogens were isolated gives insight into the underlying epidemiology and facilitates the formulation of rational interventions aimed at reducing the burden of resistance. This article describes a range of surveillance activities that have been undertaken in the UK over a number of years, together with current interventions being implemented. These activities are not only of national importance but form part of the international response to the global threat posed by antibiotic resistance. PMID:25918439
Ferrando, M.; Prieto, M. D.; Ferrandiz, C.; Sanchez, C.
Introduction: Numerous authors have investigated the relationship which exists between creativity and intelligence, and diverse results were found. Thus, Guilford (1950) includes creativity within the intelligence construct, Sternberg (1988) alludes to creativity as encompassing the intelligence construct; Gardner (1995) indicates a close…
Lopes, Heitor; Mourelle, Luiza
This book discusses a number of real-world applications of computational intelligence approaches. Using various examples, it demonstrates that computational intelligence has become a consolidated methodology for automatically creating new competitive solutions to complex real-world problems. It also presents a concise and efficient synthesis of different systems using computationally intelligent techniques.
Selaya, Pablo; Sunesen, Eva Rytter
We examine the idea that aid and FDI are complementary sources of foreign capital. We argue that the relationship between aid and FDI is theoretically ambiguous: aid raises the marginal productivity of capital when used to finance complementary inputs (like public infrastructure and human capital...
'Realism in Foreign Policy Analysis' traces how realist thinking on foreign policy has developed over the years and discusses the challenges and opportunities faced by various strands of realism when applied to foreign policy analysis.......'Realism in Foreign Policy Analysis' traces how realist thinking on foreign policy has developed over the years and discusses the challenges and opportunities faced by various strands of realism when applied to foreign policy analysis....
Bowsher, G; Milner, C; Sullivan, R
Medical intelligence, security and global health are distinct fields that often overlap, especially as the drive towards a global health security agenda gathers pace. Here, we outline some of the ways in which this has happened in the recent past during the recent Ebola epidemic in West Africa and in the killing of Osama Bin laden by US intelligence services. We evaluate medical intelligence and the role it can play in global health security; we also attempt to define a framework that illustrates how medical intelligence can be incorporated into foreign policy action in order delineate the boundaries and scope of this growing field. © The Royal Society of Medicine.
Full Text Available The revelations by NSA whistleblower Edward Snowden have illustrated the scale and extent of digital surveillance carried out by different security and intelligence agencies. The publications have led to a variety of concerns, public debate, and some diplomatic fallout regarding the legality of the surveillance, the extent of state interference in civic life, and the protection of civil rights in the context of security. Debates about the policy environment of surveillance emerged quickly after the leaks began, but actual policy change is only starting. In the UK, a draft law (Investigatory Powers Bill has been proposed and is currently discussed. In this paper, we will trace the forces and dynamics that have shaped this particular policy response. Addressing surveillance policy as a site of struggle between different social forces and drawing on different fields across communication policy research, we suggest eight dynamics that, often in conflicting ways, have shaped the regulatory framework of surveillance policy in the UK since the Snowden leaks. These include the governmental context; national and international norms; court rulings; civil society advocacy; technical standards; private sector interventions; media coverage; and public opinion. We investigate how state surveillance has been met with criticism by parts of the technology industry and civil society, and that policy change was required as a result of legal challenges, review commissions and normative interventions. However a combination of specific government compositions, the strong role of security agendas and discourses, media justification and a muted reaction by the public have hindered a more fundamental review of surveillance practices so far and have moved policy debate towards the expansion, rather than the restriction, of surveillance in the aftermath of Snowden.
Lane, B.; Mann, B.; Millard, C.
Recent events have heightened the interest in providing improved Space Situational Awareness (SSA) to the warfighter using novel techniques that are affordable and effective. The current Space Surveillance Network (SSN) detects, tracks, catalogs and identifies artificial objects orbiting earth and provides information on Resident Space Objects (RSO) as well as new foreign launch (NFL) satellites. The reactive nature of the SSN provides little to no warning on changes to the expected states of these RSOs or NFLs. This paper will detail the use of the historical data collected on RSOs to characterize what their steady state is, proactively help identify when changes or anomalies have occurred using a pattern-of-like activity based intelligence approach, and apply dynamic, adaptive mission planning to the observables that lead up to a NFL. Multiple hypotheses will be carried along with the intent or the changes to the steady state to assist the SSN in tasking the various sensors in the network to collect the relevant data needed to help prune the number of hypotheses by assigning likelihood to each of those activities. Depending on the hypothesis and thresholds set, these likelihoods will then be used in turn to alert the SSN operator with changes to the steady state, prioritize additional data collections, and provide a watch list of likely next activities.
Liu, Feng; Shi, Yong; Liu, Ying
Although artificial intelligence is currently one of the most interesting areas in scientific research, the potential threats posed by emerging AI systems remain a source of persistent controversy. To address the issue of AI threat, this study proposes a standard intelligence model that unifies AI and human characteristics in terms of four aspects of knowledge, i.e., input, output, mastery, and creation. Using this model, we observe three challenges, namely, expanding of the von Neumann archi...
by former NSA employee Edward Snowden , regarding the NSA’s widespread electronic surveillance of citizens’ private communications and intrusions into...of Investigation FEMA Federal Emergency Management Agency FISA Foreign Intelligence Surveillance Act FO Field Offices FS-ISAC Financial Services...enhanced” surveillance procedures which involved sweeping changes to many provisions of the Foreign Intelligence Surveillance Act (FISA) of 1978
Moafian, Fatemeh; Ebrahimi, Mohammad Reza
The current study investigated the association between multiple intelligences and language learning efficacy expectations among TEFL (Teaching English as a Foreign Language) university students. To fulfill the aim of the study, 108 junior and senior TEFL students were asked to complete the "Multiple Intelligence Developmental Assessment…
This paper is about the evolution of hominin intelligence. I agree with defenders of the social intelligence hypothesis in thinking that externalist models of hominin intelligence are not plausible: such models cannot explain the unique cognition and cooperation explosion in our lineage, for changes in the external environment (e.g. increasing environmental unpredictability) affect many lineages. Both the social intelligence hypothesis and the social intelligence-ecological complexity hybrid I outline here are niche construction models. Hominin evolution is hominin response to selective environments that earlier hominins have made. In contrast to social intelligence models, I argue that hominins have both created and responded to a unique foraging mode; a mode that is both social in itself and which has further effects on hominin social environments. In contrast to some social intelligence models, on this view, hominin encounters with their ecological environments continue to have profound selective effects. However, though the ecological environment selects, it does not select on its own. Accidents and their consequences, differential success and failure, result from the combination of the ecological environment an agent faces and the social features that enhance some opportunities and suppress others and that exacerbate some dangers and lessen others. Individuals do not face the ecological filters on their environment alone, but with others, and with the technology, information and misinformation that their social world provides.
Albrechtslund, Anders; Dubbeld, L.
This paper suggests a direction in the development of Surveillance Studies that goes beyond current attention for the caring, productive and enabling aspects of surveillance practices. That is, surveillance could be considered not just as positively protective, but even as a comical, playful,
Johnson, W. Lewis; Valente, Andre
The Tactical Language and Culture Training System (TLCTS) helps people quickly acquire communicative skills in foreign languages and cultures. More than 40,000 learners worldwide have used TLCTS courses. TLCTS utilizes artificial intelligence technologies during the authoring process, and at run time to process learner speech, engage in dialog, and evaluate and assess learner performance. This paper describes the architecture of TLCTS and the artificial intelligence technologies that it emp...
Laser Surveillance System (LASSY) is a beam of laser light which scans a plane above the water or under-water in a spent-fuel pond. The system can detect different objects and estimates its coordinates and distance as well. LASSY can operate in stand-alone configuration or in combination with a video surveillance to trigger signal to a videorecorder. The recorded information on LASSY computer's disk comprises date, time, start and stop angle of detected alarm, the size of the disturbance indicated in number of deviated points and some other information. The information given by the laser system cannot be fully substituted by TV camera pictures since the scanning beam creates a horizontal surveillance plan. The engineered prototype laser system long-term field test has been carried out in Soluggia (Italy) and has shown its feasibility and reliability under the conditions of real spent fuel storage pond. The verification of the alarm table on the LASSY computer with the recorded video pictures of TV surveillance system confirmed that all alarm situations have been detected. 5 refs
Lewin, J.; Olsder, G.J.
A surveillance-evasion differential game of degree with a detection zone in the shape of a two-dimensional cone is posed. The nature of the optimal strategies and the singular phenomena of the value function are described and correlated to subsets of the space of all possible parameter combinations,
Boeck, H.; Hammer, J.
The development progress during the reporting period 1988 of the laser surveillance system of spent fuel pools is summarized. The present engineered system comes close to a final version for field application as all technical questions have been solved in 1988. 14 figs., 1 tab. (Author)
Full Text Available After Gardner’s Multiple Intelligences Theory (MIT, some language teaching practitioners set out to teach students in a way to help their dominant intelligence(s blossom. In an EFL context, usually teachers’ main focus is to develop communication skills. Nowadays, writing is one of the main ways by which people communicate. Thus, this study aimed at investigating possible relationship between Multiple Intelligences and writing performance of Iranian EFL learners across different genders. To conduct this study, 15 male and 15 female advanced EFL learners from a reputable institute in Tabriz participated. They passed through a placement test to enter the course, yet the researchers administered a Test of English as a Foreign Language (TOEFL to ensure homogeneity in the group. After a session of introducing the project’s purpose, Multiple Intelligence Developmental Assessment (MIDAS questionnaire was administered for obtaining participants’ Multiple Intelligence profile. Later, the participants were given a text and asked to read and summarize it. The collected writings were analyzed for grammatical accuracy, complexity and quality of the writing based on Jacob et al.’s (1981 scale. The results of the correlational analysis revealed that overall Multiple Intelligences correlated positively with the quality of the female learners’ writing. The findings suggest that English teachers consider the role of multiple intelligences in learning and teaching process and provide more effective activities to help learners of different intelligences improve their foreign language writing skill.
Full Text Available This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB Mass Storage Device (MSD based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.
Full Text Available ... Articles and Media Computed Tomography (CT) - Body Magnetic Resonance Imaging (MRI) - Body General Ultrasound Contrast Materials Anesthesia Safety X-ray, Interventional Radiology and Nuclear Medicine Radiation Safety Videos related to Foreign Body Retrieval ...
Full Text Available ... examination consists of a radiographic table, one or two x-ray tubes and a television-like monitor ... to orient foreign bodies with the use of two snares. The catheter is guided into place just ...
Full Text Available ... down the esophagus, while the patient is under general anesthesia. Once the foreign body has been identified, ... the vein or artery. If you receive a general anesthetic, you will be unconscious for the entire ...
Full Text Available ... The physician may also use forceps and other instruments to grasp and remove the foreign bodies. top ... the physician is able to view the surgical instrument as it advances to the location of the ...
Full Text Available ... Ultrasound provides real-time imaging, making it a good tool for guiding removal procedures. In some cases, ... Ultrasound provides real-time imaging, making it a good tool for guiding foreign body removal procedures. Risks ...
Full Text Available ... is located near vital structures like nerves and blood vessels, so your physician may choose to leave ... other areas of the body, or enter your blood vessels. Removal of larger foreign bodies will ensure ...
Full Text Available ... by a computer, which in turn creates a real-time picture on the monitor. One or more ... to the location of the foreign object in real-time. Your physician also may locate soft-tissue ...
Full Text Available ... tissues. top of page What are some common uses of the procedure? Foreign body retrieval is used ... the scanner by a cord. Some exams may use different transducers (with different capabilities) during a single ...
Full Text Available ... extended over the patient while an x-ray film holder or image recording plate is placed beneath ... through the body, recording an image on photographic film or a special detector. Many foreign bodies, like ...
Full Text Available ... related to Foreign Body Retrieval Sponsored by Please note RadiologyInfo.org is not a medical facility. Please ... is further reviewed by committees from the American College of Radiology (ACR) and the Radiological Society of ...
Full Text Available ... you ingest a foreign body or witness a child ingest one or suspect the presence of a ... have special pediatric considerations. The teddy bear denotes child-specific content. Related Articles and Media Computed Tomography ( ...
Full Text Available ... Foreign bodies are typically dealt with in the emergency room and the x-ray department. Some patients ... the patient in a hospital bed or the emergency room. The x-ray tube is connected to ...
Full Text Available ... tissues. top of page What are some common uses of the procedure? Foreign body retrieval is used ... the radiologist or sonographer will apply some warm water-based gel on your skin and then place ...
Full Text Available ... the skin. Soft tissue foreign bodies can cause infection and damage to surrounding tissues. top of page ... if the wound has a high risk of infection. You also may need a tetanus shot to ...
Full Text Available ... taken to minimize radiation exposure to the baby. See the Safety page for more information about pregnancy ... cases, a CT scan may be needed to see the foreign body. top of page What does ...
Full Text Available ... pregnant. Many imaging tests are not performed during pregnancy so as not to expose the fetus to ... See the Safety page for more information about pregnancy and x-rays. If the foreign body is ...
Full Text Available ... especially to iodinated contrast materials. Leave jewelry at home and wear loose, comfortable clothing. You may be ... relative or friend accompany you and drive you home afterward. Foreign bodies are typically dealt with in ...
Full Text Available ... rare cases, the large intestine, causing cramps, bloating, loss of appetite, vomiting, and sometimes fever. A sharp ... like toothpicks. Small esophageal foreign bodies like fish bones also may be difficult to visualize. Additional evaluation ...
National Oceanic and Atmospheric Administration, Department of Commerce — The Foreign Data Library consists of meteorological data from nations other than the United States. The data are on original observational forms, in publications,...
Full Text Available ... How is the procedure performed? There are a number of ways to remove foreign bodies or facilitate ... complications. There is always a slight chance of cancer from excessive exposure to radiation. However, the benefit ...
Full Text Available ... swelling with foreign bodies that are retained for long periods. The limitations of endoscopic procedures include the need for anesthesia and an operating suite, post-procedural hospitalization and greater complication rates than those experienced with ...
Full Text Available ... recording an image on photographic film or a special detector. Many foreign bodies, like coins and batteries, ... or white on x-ray. Fluoroscopy is a special x-ray technique that makes it possible to ...
Full Text Available ... only 10 to 20 percent of the time. Evaluation and treatment will depend on the type of ... bones also may be difficult to visualize. Additional evaluation is required when the suspected foreign body is ...
Full Text Available Retained intraorbital organic foreign bodies, particularly wooden, are commonly encountered in ophthalmologic practice. We treated two children who had sustained such injury while playing. They presented to us with non-healing sinus with purulent discharge. In one of the patients, X-rays and CT scan helped to clinch the diagnosis, whereas in the other patient diagnosis was possible by correlating history with clinical findings. Surgical exploration in both patients helped us to remove the foreign bodies. Surprisingly, both the foreign bodies were 7 cm long wooden pieces. We, however, caution that management of such cases should be conservative and that surgical exploration be done only in case of complication. From our experience, we recommend proper localisation by all possible means, blunt dissection, careful haemostasis coupled with excellent lighting and exposure in the atraumatic removal of intraorbital foreign bodies.
Full Text Available ... as infection. top of page What are the benefits vs. risks? Benefits Removal of a foreign body will reduce your ... cancer from excessive exposure to radiation. However, the benefit of an accurate diagnosis far outweighs the risk. ...
Full Text Available ... but the foreign body remains trapped in the lung. This typically occurs in children and requires removal ... the body while other areas, especially air-filled lungs, are poorly suited for ultrasound. Common equipment for ...
Full Text Available ... Ultrasound may be used to guide the foreign body removal procedure. After you are positioned on the examination table, the radiologist or sonographer will apply some warm water-based gel on your skin and then place ...
Full Text Available ... may become lodged in the esophagus and cause pain, even though they are able to swallow. Larger ... the stomach or intestines can cause severe abdominal pain, fever, fainting and shock. Foreign bodies in the ...
Full Text Available ... are a form of radiation like light or radio waves. X-rays pass through most objects, including ... Many foreign bodies, like coins and batteries, are radio-opaque, meaning that x-rays will not pass ...
Full Text Available ... saved. Using an ultrasound transducer to visualize the location of the object, the physician may make an ... the surgical instrument as it advances to the location of the foreign object in real-time. Your ...
Full Text Available ... small toys or pieces of toys and fish bones. Swallowing of magnets can cause significant problems including ... like toothpicks. Small esophageal foreign bodies like fish bones also may be difficult to visualize. Additional evaluation ...
Full Text Available ... cramps, bloating, loss of appetite, vomiting, and sometimes fever. A sharp object that pierces the stomach or intestines can cause severe abdominal pain, fever, fainting and shock. Foreign bodies in the airway: ...
Full Text Available ... into the soft tissues. Commonly swallowed objects include coins, buttons, pins, nails, glass pieces, toothpicks, batteries, small ... or a special detector. Many foreign bodies, like coins and batteries, are radio-opaque, meaning that x- ...
Full Text Available ... batteries, small toys or pieces of toys and fish bones. Swallowing of magnets can cause significant problems ... bodies like toothpicks. Small esophageal foreign bodies like fish bones also may be difficult to visualize. Additional ...
Full Text Available ... taking and allergies, especially to iodinated contrast materials. Leave jewelry at home and wear loose, comfortable clothing. ... blood vessels, so your physician may choose to leave it in place. The majority of foreign bodies ...
Full Text Available ... pieces of toys and fish bones. Swallowing of magnets can cause significant problems including bowel blockages that may require surgical removal of magnets. Children account for about 80 percent of foreign ...
Full Text Available ... table, the radiologist or sonographer will apply some warm water-based gel on your skin and then ... with foreign bodies that are retained for long periods. The limitations of endoscopic procedures include the need ...
Full Text Available ... bodies. top of page How does the procedure work? Your physician may use an x-ray or ... is under general anesthesia. Once the foreign body has been identified, instruments can be passed through the ...
Full Text Available ... fish bones. Swallowing of magnets can cause significant problems including bowel blockages that may require surgical removal ... about 80 percent of foreign body ingestions. Sometimes problems occur when button batteries are swallowed as mercury ...
Full Text Available ... object is solid or filled with fluid). In medicine, ultrasound is used to detect changes in appearance, ... Anesthesia Safety X-ray, Interventional Radiology and Nuclear Medicine Radiation Safety Videos related to Foreign Body Retrieval ...
Full Text Available ... in the esophagus, you may receive an intravenous drug to relax the esophagus and allow the object to pass through the digestive tract. Other drugs taken by mouth can help blunt foreign objects ...
Full Text Available ... include coins, buttons, pins, nails, glass pieces, toothpicks, batteries, small toys or pieces of toys and fish ... foreign body ingestions. Sometimes problems occur when button batteries are swallowed as mercury within the batteries can ...
Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest National Laboratory (PNNL) for the US Department of Energy (DOE). This document contains the planned 1996 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP), Drinking Water Project, and Ground-Water Surveillance Project
With Intelligent Transportation Systems (ITS), engineers and system integrators blend emerging : detection/surveillance, communications, and computer technologies with transportation management and : control concepts to improve the safety and mobilit...
Chu, Narisa N.
The Wireless Intelligent Network (WIN) intends to take advantage of the Advanced Intelligent Network (AIN) concepts and products developed from wireline communications. However, progress of the AIN deployment has been slow due to the many barriers that exist in the traditional wireline carriers' deployment procedures and infrastructure. The success of AIN has not been truly demonstrated. The AIN objectives and directions are applicable to the wireless industry although the plans and implementations could be significantly different. This paper points out WIN characteristics in architecture, flexibility, deployment, and value to customers. In order to succeed, the technology driven AIN concept has to be reinforced by the market driven WIN services. An infrastructure suitable for the WIN will contain elements that are foreign to the wireline network. The deployment process is expected to seed with the revenue generated services. Standardization will be achieved by simplifying and incorporating the IS-41C, AIN, and Intelligent Network CS-1 recommendations. Integration of the existing and future systems impose the biggest challenge of all. Service creation has to be complemented with service deployment process which heavily impact the carriers' infrastructure. WIN deployment will likely start from an Intelligent Peripheral, a Service Control Point and migrate to a Service Node when sufficient triggers are implemented in the mobile switch for distributed call control. The struggle to move forward will not be based on technology, but rather on the impact to existing infrastructure.
In order for Business Intelligence to truly move beyond where it is today, a shift in approach must occur. Currently, much of what is accomplished in the realm of Business Intelligence relies on reports and dashboards to summarize and deliver information to end users. As we move into the future, we need to get beyond these reports and dashboards to a point where we break out the individual metrics that are embedded in these reports and interact with these components independently. Breaking these pieces of information out of the confines of reports and dashboards will allow them to be dynamically assembled for delivery in the way that makes most sense to each consumer. With this change in ideology, Business Intelligence will move from the concept of collections of objects, or reports and dashboards, to individual objects, or information components. The Next Generation Business Intelligence suite will translate concepts popularized in Facebook, Flickr, and Digg into enterprise worthy communication vehicles.
intelligence activities led to foreign travelers being less eager to travel to the United States for business or leisure . argument could be made that...www.fbi.gov/congress/congress03/mefford090403.htm Meserve, Jeanne, and Mike M. Ahlers, “ Travel Industry: U.S. Losing Out on International Tourism ,” CNN...still “served as volunteer agents for military intelligence as well as for the Bureau of Investigation” (Church Committee Report, 1976, p. 387
Full Text Available Owing to the complex nature of vector-borne diseases, whereby monitoring of human case patients does not suffice, public health authorities experience challenges in surveillance and control of vector-borne diseases. Knowledge on the presence and distribution of vectors and the pathogens they transmit is vital to a risk assessment process to permit effective early warning, surveillance and control of vector-borne diseases. Upon accepting this reality, public health authorities face the phenomenon of an exponential rise in the number of possible surveillance targets and how to decide which are essential. Here, . we propose a comprehensive approach that integrates three surveillance strategies: population-based surveillance, disease-based surveillance and context-based surveillance for EU member states to tailor the best surveillance strategy for control of vector-borne diseases in their geographic region. By classifying the surveillance structure into 5 different contexts, we hope to provide guidance in optimizing surveillance efforts. Contextual surveillance strategies for vector-borne diseases entail combining organization and data collection approaches that result in disease intelligence rather than a preset static structure.
Lu, Huimin; Li, Yujie; Chen, Min; Kim, Hyoungseop; Serikawa, Seiichi
Artificial intelligence (AI) is an important technology that supports daily social life and economic activities. It contributes greatly to the sustainable growth of Japan's economy and solves various social problems. In recent years, AI has attracted attention as a key for growth in developed countries such as Europe and the United States and developing countries such as China and India. The attention has been focused mainly on developing new artificial intelligence information communication ...
Mohammad Hossein Hekmatzadeh
Full Text Available Despite the fact that Intelligence Quotient (IQ is an important factor in one’s success in terms of working environment, it is believed that emotional quotient or EQ plays a more important role. With that in mind, this study investigated the relationship between emotional intelligence and job satisfaction of English as Foreign Language (EFL teachers who work at private language institutes in Iran/Shiraz. Furthermore, this study tried to answer whether there is a significant difference between emotional intelligence and job satisfaction of Iranian’s EFL teachers in terms of gender. A 90-item Bar-On questionnaire was used to measure the teachers’ emotional intelligence; also, a modified version of Karavas’s (2010 job satisfaction scale was used to see how satisfied our teachers are with their teaching career. To answer the research question, Pearson Product-Moment Correlation Coefficient statistical test was run. The results showed that there was a positive and significant correlation between emotional intelligence and job satisfaction of EFL teachers in Iran/Shiraz. Furthermore, the results revealed that there was a statistically significant difference in emotional intelligence between EFL male and female teachers, but there was no statistically significant relationship between Iranian EFL teachers’ job satisfaction in terms of gender. Based on our findings, it is suggested that some preparatory courses aiming at enhancing the important psychological traits such as emotional intelligence should be incorporated in educational programs designed for novice teachers so that it will contribute to pedagogical improvement.
Diderichsen, Adam; Rønn, Kira Vrist
for all intelligence activities is inadequate, in particular in relation to the collection and use of intelligence for preventive purposes. In the second part of the paper, we tentatively suggest an alternative moral framework for preventive intelligence, understood as intelligence activities......This article contributes to the current discussions concerning an adequate framework for intelligence ethics. The first part critically scrutinises the use of Just War Theory in intelligence ethics with specific focus on the just cause criterion. We argue that using self-defence as justifying cause...... with no specific suspicion or aggressor. We suggest that the moral permissibility of such activities requires a civilised moral framework, in which openness, transparency and informed consent constitute crucial elements....
Nilsson, Nils J
A classic introduction to artificial intelligence intended to bridge the gap between theory and practice, Principles of Artificial Intelligence describes fundamental AI ideas that underlie applications such as natural language processing, automatic programming, robotics, machine vision, automatic theorem proving, and intelligent data retrieval. Rather than focusing on the subject matter of the applications, the book is organized around general computational concepts involving the kinds of data structures used, the types of operations performed on the data structures, and the properties of th
Berrar, Daniel; Sato, Naoyuki; Schuster, Alfons
Since its conception in the mid 1950s, artificial intelligence with its great ambition to understand and emulate intelligence in natural and artificial environments alike is now a truly multidisciplinary field that reaches out and is inspired by a great diversity of other fields. Rapid advances in research and technology in various fields have created environments into which artificial intelligence could embed itself naturally and comfortably. Neuroscience with its desire to understand nervou...
Nie, Guangli; Li, Xiuting; Zhang, Lingling; Zhang, Yuejin; Shi, Yong
This paper discussed the development of business intelligence considering the development of data mining. Business intelligence plays an important role in producing up-to-data information for operative and strategic decision-making. We proposed a new kind of knowledge named intelligent knowledge gotten from data. We illustrated a way to combine the business intelligence and intelligent knowledge and proposed a way of the management of intelligent knowledge which is more structural than the traditional knowledge.
The aim of this article is to propose work methodology for Competitive Intelligence teams in one of the intelligence cycle’s specific area, in the so-called “Intelligence Analysis”. Intelligence Analysis is one of the stages of the Intelligence Cycle in which data from both the primary and secondary research are analyzed. The main result of the effort is the creation of added value for the information collected. Company Competiitve Intelligence, correctly understood and implemented in busines...
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....
Nara, Satoru; Kamiya, Eisei
Fuji Electric Co., Ltd. has supplied many management systems to nuclear reactor institution. 'The nuclear countermeasures-against-calamities special-measures' was enforced. A nuclear entrepreneur has devised the measure about expansion prevention and restoration of a calamity while it endeavors after prevention of generating of a nuclear calamity. Our company have supplied the 'disaster prevention surveillance system' to the Japan Atomic Energy Research Institute Tokai Research Establishment aiming at strengthening of the monitoring function at the time (after the accident) of the accident used as one of the above-mentioned measures. A 'disaster prevention surveillance system' can share the information on the accident spot in an on-site command place, an activity headquarters, and support organizations, when the serious accident happens. This system is composed of various sensors (temperature, pressure and radiation), cameras, computers and network. (author)
members seeking care for the condition or resulted in increased screening for the condition , which would subsequently increase the number of cases...R E S P A G E 2 2 Deployment-related conditions of special surveillance interest MSMR Vol. 23 No. 10 October 2016 Page 2 Obstructive sleep apnea...OSA) is a growing health concern in both civilian and military populations. Individuals who suffer from OSA have increased rates of cardiovascular
Each year 770.000 nuclear transports are performed in France representing less than 3% of the transport of dangerous materials. This article review various aspects of nuclear transport: modes of transportation, packages, current legislation, safety and surveillance. A map presents the transport route of vitrified wastes from Sellafield plant to the Zwilag storing center in Switzerland at one moment this transport crosses France and another map presents the transport routes involved in the nuclear fuel cycle in France. (A.C.)
Cella, C. E.
This manifesto paper will introduce machine listening intelligence, an integrated research framework for acoustic and musical signals modelling, based on signal processing, deep learning and computational musicology.
Federal Laboratory Consortium — The Intelligent Optics Laboratory supports sophisticated investigations on adaptive and nonlinear optics; advancedimaging and image processing; ground-to-ground and...
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....
Dover, Robert; Hillebrand, Claudia
The Routledge Companion to Intelligence Studies provides a broad overview of the growing field of intelligence studies. The recent growth of interest in intelligence and security studies has led to an increased demand for popular depictions of intelligence and reference works to explain the architecture and underpinnings of intelligence activity. Divided into five comprehensive sections, this Companion provides a strong survey of the cutting-edge research in the field of intelligence studies: Part I: The evolution of intelligence studies; Part II: Abstract approaches to intelligence; Part III: Historical approaches to intelligence; Part IV: Systems of intelligence; Part V: Contemporary challenges. With a broad focus on the origins, practices and nature of intelligence, the book not only addresses classical issues, but also examines topics of recent interest in security studies. The overarching aim is to reveal the rich tapestry of intelligence studies in both a sophisticated and accessible way. This Companion...
Full Text Available Foreign-accented speech often presents a challenging listening condition. In addition to deviations from the target speech norms related to the inexperience of the nonnative speaker, listener characteristics may play a role in determining intelligibility levels. We have previously shown that an implicit visual bias for associating East Asian faces and foreignness predicts the listeners’ perceptual ability to process Korean-accented English audiovisual speech (Yi et al., 2013. Here, we examine the neural mechanism underlying the influence of listener bias to foreign faces on speech perception. In a functional magnetic resonance imaging (fMRI study, native English speakers listened to native- and Korean-accented English sentences, with or without faces. The participants’ Asian-foreign association was measured using an implicit association test (IAT, conducted outside the scanner. We found that foreign-accented speech evoked greater activity in the bilateral primary auditory cortices and the inferior frontal gyri, potentially reflecting greater computational demand. Higher IAT scores, indicating greater bias, were associated with increased BOLD response to foreign-accented speech with faces in the primary auditory cortex, the early node for spectrotemporal analysis. We conclude the following: (1 foreign-accented speech perception places greater demand on the neural systems underlying speech perception; (2 face of the talker can exaggerate the perceived foreignness of foreign-accented speech; (3 implicit Asian-foreign association is associated with decreased neural efficiency in early spectrotemporal processing.
Du, Junping; Li, Hongbo; Zhang, Weicun; CISC’15
This book presents selected research papers from the 2015 Chinese Intelligent Systems Conference (CISC’15), held in Yangzhou, China. The topics covered include multi-agent systems, evolutionary computation, artificial intelligence, complex systems, computation intelligence and soft computing, intelligent control, advanced control technology, robotics and applications, intelligent information processing, iterative learning control, and machine learning. Engineers and researchers from academia, industry and the government can gain valuable insights into solutions combining ideas from multiple disciplines in the field of intelligent systems.
Artificial intelligence is a tool designed by people for the gratification of their own creative ego, so we can not confuse conscience with intelligence and not even intelligence in its human representation with conscience. They are all different concepts and they have different uses. Philosophically, there are differences between autonomous people and automatic artificial intelligence. This is the difference between intelligence and artificial intelligence, autonomous versus a...
Reliability and economy are two major concerns for a nuclear power generation system. Next generation nuclear power reactors are being developed to be more reliable and economic. An effective and efficient surveillance system can generously contribute toward this goal. Recent progress in computer systems and computational tools has made it necessary and possible to upgrade current surveillance/monitoring strategy for better performance. For example, intelligent computing techniques can be applied to develop algorithm that help people better understand the information collected from sensors and thus reduce human error to a new low level. Incidents incurred from human error in nuclear industry are not rare and have been proven costly. The goal of this project is to develop and test an intelligent prognostics methodology for predicting aging effects impacting long-term performance of nuclear components and systems. The approach is particularly suitable for predicting the performance of nuclear reactor systems which have low failure probabilities (e.g., less than 10-6 year-). Such components and systems are often perceived as peripheral to the reactor and are left somewhat unattended. That is, even when inspected, if they are not perceived to be causing some immediate problem, they may not be paid due attention. Attention to such systems normally involves long term monitoring and possibly reasoning with multiple features and evidence, requirements that are not best suited for humans.
Reliability and economy are two major concerns for a nuclear power generation system. Next generation nuclear power reactors are being developed to be more reliable and economic. An effective and efficient surveillance system can generously contribute toward this goal. Recent progress in computer systems and computational tools has made it necessary and possible to upgrade current surveillance/monitoring strategy for better performance. For example, intelligent computing techniques can be applied to develop algorithm that help people better understand the information collected from sensors and thus reduce human error to a new low level. Incidents incurred from human error in nuclear industry are not rare and have been proven costly. The goal of this project is to develop and test an intelligent prognostics methodology for predicting aging effects impacting long-term performance of nuclear components and systems. The approach is particularly suitable for predicting the performance of nuclear reactor systems which have low failure probabilities (e.g., less than 10 -6 year -1 ). Such components and systems are often perceived as peripheral to the reactor and are left somewhat unattended. That is, even when inspected, if they are not perceived to be causing some immediate problem, they may not be paid due attention. Attention to such systems normally involves long term monitoring and possibly reasoning with multiple features and evidence, requirements that are not best suited for humans.
Malchow-Møller, Nikolaj; Markusen, James R.; Schjerning, Bertel
Foreign-owned firms are often hypothesized to generate productivity "spillovers" to the host country, but both theoretical micro-foundations and empirical evidence for this are limited. We develop a heterogeneous-firm model in which ex-ante identical workers learn from their employers in proporti...... characteristics, but, as expected, are reduced significantly when controlling for unobservable firm heterogeneity. Furthermore, acquired skills in foreign-owned and large firms appear to be transferable to both subsequent wage work and self-employment......Foreign-owned firms are often hypothesized to generate productivity "spillovers" to the host country, but both theoretical micro-foundations and empirical evidence for this are limited. We develop a heterogeneous-firm model in which ex-ante identical workers learn from their employers in proportion...
Ma, WenJun; Liu, Weiru
Three issues usually are associated with threat prevention intelligent surveillance systems. First, the fusion and interpretation of large scale incomplete heterogeneous information; second, the demand of effectively predicting suspects’ intention and ranking the potential threats posed by each suspect; third, strategies of allocating limited security resources (e.g., the dispatch of security team) to prevent a suspect’s further actions towards critical assets. However, in the literature, the...
Bhandari, Hanul Srinivas
Foreign accent syndrome (FAS) is a poorly understood and studied syndrome as it is indeed a rare entity. Since its first description in 1907 by French neurologist Pierre Marie involving a patient who presented with an Alsatian accent, there are approximately only 60 cases reported in the literature. The majority of such cases of FAS have been secondary to cerebrovascular accidents. Of the cases in the literature, none report such a transitory nature of FAS. In this particular case, a 55-year-old male presented with a foreign accent. This FAS was triggered by ischemia and was reversed after a seizure, the first reported in the literature.
Although a negative relationship between fertility and education has been described consistently in most countries of the world, less is known about the relationship between intelligence and reproductive outcomes. Also the paths through which intelligence influences reproductive outcomes are uncertain. The present study uses the NLSY79 to analyze…
This paper describes the atmosphere leading up to the Senate INF hearings and then surveys the broad issues they raised. After that, the author highlights several aspects of the intelligence community's involvement and discusses the specific intelligence-related issues as the Senate committees saw them, notes their impact on the outcome, and finally draws several conclusions and lessons pertinent to the future
This brief research note aims to estimate the magnitude of the association between general intelligence and physical attractiveness with large nationally representative samples from two nations. In the United Kingdom, attractive children are more intelligent by 12.4 IQ points (r=0.381), whereas in the United States, the correlation between…
A simple extension of the CAMAC standard is described which allows distributed intelligence at the crate level. By distributed intelligence is meant that there is more than one source of control in a system. This standard is just now emerging from the NIM Dataway Working Group and its European counterpart. 1 figure
Törmänen, Juha; Hämäläinen, Raimo P.; Saarinen, Esa
Purpose: Systems intelligence (SI) (Saarinen and Hämäläinen, 2004) is a construct defined as a person's ability to act intelligently within complex systems involving interaction and feedback. SI relates to our ability to act in systems and reason about systems to adaptively carry out productive actions within and with respect to systems such as…
This paper reports that there are two sets of questions applicable to the ratification phase: what is the role of intelligence in the ratification process? What effect did intelligence have on that process. The author attempts to answer these and other questions
The CAMAC digital interface standard has served us well since 1969. During this time there have been enormous advances in digital electronics. In particular, low cost microprocessors now make it feasible to consider use of distributed intelligence even in simple data acquisition systems. This paper describes a simple extension of the CAMAC standard which allows distributed intelligence at the crate level
Klausen, Søren Harnow
Diskuterer hvorvidt intelligent design kan betegnes som videnskab; argumenterer for at dette grundet fraværet af klare demarkationskriterier næppe kan afvises.......Diskuterer hvorvidt intelligent design kan betegnes som videnskab; argumenterer for at dette grundet fraværet af klare demarkationskriterier næppe kan afvises....
Christodoulou, Joanna A.
The ideas of multiple intelligences introduced by Howard Gardner of Harvard University more than 25 years ago have taken form in many ways, both in schools and in other sometimes-surprising settings. The silver anniversary of Gardner's learning theory provides an opportunity to reflect on the ways multiple intelligences theory has taken form and…
Emotional Intelligence has been a hot topic in leadership training since Dan Goleman published his book on the subject in 1995. Emotional intelligence competencies are typically focused on recognition and regulation of emotions in one's self and social situations, yielding four categories: self-awareness, self-management, social awareness and relationship...
Joseph S. Nye, Jr., “Peering into the Future,” Foreign Affairs, 77, 4 (July/August 1994), 88. 2 R. Duncan Luce and Howard Raiffa, Games and Decisions...stimulus for intelligence adaptation. Radio communication led to nascent signals collection and cryptology developed in concert with signals collection...control of Ultra information in WWII that led to the debacle at Kasserine Pass.19 In a nuanced way, intelligence shifted from puzzle solving to
Complex systems and their phenomena are ubiquitous as they can be found in biology, finance, the humanities, management sciences, medicine, physics and similar fields. For many problems in these fields, there are no conventional ways to mathematically or analytically solve them completely at low cost. On the other hand, nature already solved many optimization problems efficiently. Computational intelligence attempts to mimic nature-inspired problem-solving strategies and methods. These strategies can be used to study, model and analyze complex systems such that it becomes feasible to handle them. Key areas of computational intelligence are artificial neural networks, evolutionary computation and fuzzy systems. As only a few researchers in that field, Rudolf Kruse has contributed in many important ways to the understanding, modeling and application of computational intelligence methods. On occasion of his 60th birthday, a collection of original papers of leading researchers in the field of computational intell...
In July 2010, the Washington Post (WP) published the results of a project on “Top Secret America” on which twenty investigative journalists had been working for two years. The project drew attention to the change and growth in National Intelligence following 9/11 (Washington Post 2010a). The init......In July 2010, the Washington Post (WP) published the results of a project on “Top Secret America” on which twenty investigative journalists had been working for two years. The project drew attention to the change and growth in National Intelligence following 9/11 (Washington Post 2010a......). The initial idea had been to work on intelligence generally, but given that this proved overwhelming, the team narrowed down to focus only on intelligence qualified as “top secret.” Even so, the growth in this intelligence activity is remarkable. This public is returning, or in this case expanding...
Full Text Available The aim of this article is to show the importance of business intelligence and its growing influence. It also shows when the concept of business intelligence was used for the first time and how it evolved over time. The paper discusses the utility of a business intelligence system in any organization and its contribution to daily activities. Furthermore, we highlight the role and the objectives of business intelligence systems inside an organization and the needs to grow the incomes and reduce the costs, to manage the complexity of the business environment and to cut IT costs so that the organization survives in the current competitive climate. The article contains information about architectural principles of a business intelligence system and how such a system can be achieved.
The origin of preferences and values is an unresolved theoretical problem in behavioural sciences. The Savanna-IQ Interaction Hypothesis, derived from the Savanna Principle and a theory of the evolution of general intelligence, suggests that more intelligent individuals are more likely to acquire and espouse evolutionarily novel preferences and values than less intelligent individuals, but general intelligence has no effect on the acquisition and espousal of evolutionarily familiar preferences and values. Ethnographies of traditional societies suggest that exclusively homosexual behaviour was probably rare in the ancestral environment, so the Hypothesis would predict that more intelligent individuals are more likely to identify themselves as homosexual and engage in homosexual behaviour. Analyses of three large, nationally representative samples (two of which are prospectively longitudinal) from two different nations confirm the prediction.
Underwood, John H.
Describes the role of technology in teaching foreign languages. Offers a brief history of language lab technologies, including computer use for drill-and-practice, text reconstruction, and simulations and games. Discusses tool programs, intelligent systems, video technology, satellite television, videodisc and interactive video, hypertext and…
Smith, Donna C.
Approved as a Wallops control center backup system, the Wallops Ship Surveillance Software is a day-of-launch risk analysis tool for spaceport activities. The system calculates impact probabilities and displays ship locations relative to boundary lines. It enables rapid analysis of possible flight paths to preclude the need to cancel launches and allow execution of launches in a timely manner. Its design is based on low-cost, large-customer- base elements including personal computers, the Windows operating system, C/C++ object-oriented software, and network interfaces. In conformance with the NASA software safety standard, the system is designed to ensure that it does not falsely report a safe-for-launch condition. To improve the current ship surveillance method, the system is designed to prevent delay of launch under a safe-for-launch condition. A single workstation is designated the controller of the official ship information and the official risk analysis. Copies of this information are shared with other networked workstations. The program design is divided into five subsystems areas: 1. Communication Link -- threads that control the networking of workstations; 2. Contact List -- a thread that controls a list of protected item (ocean vessel) information; 3. Hazard List -- threads that control a list of hazardous item (debris) information and associated risk calculation information; 4. Display -- threads that control operator inputs and screen display outputs; and 5. Archive -- a thread that controls archive file read and write access. Currently, most of the hazard list thread and parts of other threads are being reused as part of a new ship surveillance system, under the SureTrak project.
Dai, Li; Zhu, Jun; Liang, Juan; Wang, Yan-Ping; Wang, He; Mao, Meng
Birth defects are a global public health problem because of their large contribution to infant mortalities and disabilities. It is estimated that 4%-6% of Chinese newborns are affected by birth defects every year. Surveillance is a basic approach to understanding the occurrence and associated factors of birth defects. The Ministry of Health of China initiated a national hospital-based birth defects monitoring system 20 years ago. Nearly every province in this country has established its own surveillance system in the past. The authors reviewed the result of the monitoring system at different administrative levels in China. Available publications on the surveillance of birth defects and data from national and provincial birth defects surveillance systems were reviewed to evaluate the effectiveness of the surveillance systems. According to the 2009 data, the national hospital-based birth defects surveillance system monitored over 1.3 million births, which accounted for more than 8% of births in China. In addition, 30 provincial hospital-based surveillance programs covered a birth population of more than 3.6 million (22% of births in China). Great achievements have been made in terms of case ascertainment, data quality control, and online reporting. But the surveillance systems in China still have some limitations. A short ascertainment period may miss some internal anomalies, inherited metabolic diseases, and malformed fetus aborted before the 28th gestational week. Discrepancies in antenatal or postnatal diagnosis of birth defects between surveillance institutes may affect the detection rate and introduce biases. Absence of baseline data and lack of integrated database systems limit the application of surveillance data to etiological studies and affect the process of decision-making. The surveillance system for birth defects is prerequisite to propose, conduct and assess any interventions for the disease. To meet the need of study and prevention of birth defects
Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest Laboratory (PNL) for the US Department of Energy (DOE). Samples are routinely collected and analyzed to determine the quality of air, surface water, ground water, soil, sediment, wildlife, vegetation, foodstuffs, and farm products at Hanford Site and surrounding communities. This document contains the planned schedule for routine sample collection for the Surface Environmental Surveillance Project (SESP) and Drinking Water Project, and Ground-Water Surveillance Project.
in this context. With such platforms comes the massive provision and storage of personal data that are systematically evaluated, marketed, and used for targeting users with advertising. In a world of global economic competition, economic crisis, and fear of terrorism after 9/11, both corporations and state...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...
Tsuboi, Toshiki; Kitamura, Koji; Nishida, Yoshihumi; Motomura, Yoichi; Takano, Tachio; Yamanaka, Tatsuhiro; Mizoguchi, Hiroshi
This paper proposes a new technology,``a bodygraphic injury surveillance system (BISS)'' that not only accumulates accident situation data but also represents injury data based on a human body coordinate system in a standardized and multilayered way. Standardized and multilayered representation of injury enables accumulation, retrieval, sharing, statistical analysis, and modeling causalities of injury across different fields such as medicine, engineering, and industry. To confirm the effectiveness of the developed system, the authors collected 3,685 children's injury data in cooperation with a hospital. As new analyses based on the developed BISS, this paper shows bodygraphically statistical analysis and childhood injury modeling using the developed BISS and Bayesian network technology.
Kelly, Michael P.
Topics covered include: Develop Program/Project Quality Assurance Surveillance Plans The work activities performed by the developer and/or his suppliers are subject to evaluation and audit by government-designated representatives. CSO supports project by selecting on-site supplier representative s by one of several methods: (1) a Defense Contract Management Agency (DCMA) person via a Letter Of Delegation (LOD), (2) an independent assurance contractor (IAC) via a contract Audits, Assessments, and Assurance (A3) Contract Code 300 Mission Assurance Support Contract (MASC)
Arnaldo Moisés Gómez
Full Text Available Foreign Language Interactive Didactics is intended for foreign language teachers and would-be teachers since it is an interpretation of the foreign language teaching-learning process is conceived from a reflexive social interaction. This interpretation declares learning based on interactive tasks that provide learners with opportunities to interact meaningfully among them, as a way to develop interactional competence as objective in itself and as a means to obtain communicative competence. Foreign language interactive didactics claims for the unity of reflection and action while learning the language system and using it to communicate, by means of solving problems presented in interactive tasks. It proposes a kind of teaching that is interactive, developmental, collaborative, holist, cognitive, problematizing, reflexive, student centered, humanist, and with a strong affective component that empower the influencing psychological factors in learning. This conception appears in the book: DIDÁCTICA INTERACTIVA DE LENGUAS (2007 y 2010. The book is used as a textbook for the subject of Didactics that is part of the curriculum in language teachers’ formation of all the pedagogical sciences universities, in Spanish teachers’ formation who are not Spanish speaking people at Havana University, and also as a reference book for postgraduate courses, master’s and doctorate’ s degrees.
Full Text Available ... and push the object farther down. In some cases, prompt removal of the foreign body is necessary. Common procedures include: Flexible esophagoscopy Flexible esophagoscopy is a common diagnostic examination that enables a safe and detailed visual study of the esophagus while the patient is under ...
Tucker, James F.
Foreign currency units, exchange rates, the international payments process, and spending money abroad are discussed briefly in this booklet to help teachers explain the international economy. Thirty-two countries are listed with their respective currency units, some of which are illustrated. A chart shows the average yearly exchange rates between…
Full Text Available ... so as not to expose the fetus to radiation. If an x-ray is necessary, precautions will be taken to minimize ... Safety page for more information about pregnancy and x-rays. If the foreign body is lodged in a ...
Full Text Available ... the foreign body. top of page What does the equipment look like? A variety of x-ray or ultrasound ... examination that enables a safe and detailed visual study of the esophagus while the patient is under local anesthesia ...
Full Text Available ... not pass through them, and they will appear white on an x-ray. Some soft-tissue foreign ... metal, gravel and glass, are radio-opaque or white on x-ray. Fluoroscopy is a special x- ...
Malchow-Møller, Nikolaj; Schjerning, Bertel; R. Markusen, James
Three types of theories have been used to explain the wage premium in foreign firms: the theories of heterogeneous workers, heterogeneous learning, and heterogeneous firms. We set up a model that explicitly encompasses two of these theories, and that can illustrate the third. This unifying framew...
Full Text Available ... advances to the location of the foreign object in real-time. Your physician also may locate soft-tissue objects ... perform surgery using ultrasound guidance. Ultrasound provides real-time imaging, making it a good tool for guiding removal procedures. In some cases, it is potentially more harmful to ...
Full Text Available ... the equipment look like? How does the procedure work? How is the procedure performed? What will I experience during and after the procedure? Who interprets the results and how do I get them? What are the benefits vs. risks? What are the limitations of foreign body detection ...
Full Text Available ... endoscopic or surgical intervention is required only 10 to 20 percent of the time. Evaluation and treatment will depend on the type ... to view the surgical instrument as it advances to the location of the foreign object in real-time. Your physician also may locate soft-tissue objects ...
Full Text Available ... batteries, small toys or pieces of toys and fish bones. Swallowing of magnets can cause significant problems including bowel blockages that may ... bodies like toothpicks. Small esophageal foreign bodies like fish bones also ... evaluations can underestimate the extent or degree of involvement, such ...
Larsen, Chris Holmsted
The aim of this contribution is, through a comparative historical perspective, to analyse the particular phenomenon of foreign fighters, which in recent years, as a consequence of the proliferation of conflicts in Syria, Iraq and Ukraine, have emerged in Danish society as a major security concern...
Hansen, Agnete Meldgaard; Kamp, Annette; Grosen, Sidsel Lond
facilitate care and surveillance of citizens in different manners and with different consequences for care relationships between citizens and eldercare professionals. We focus on a technology facilitating ‘virtual homecare visits’ in a municipal homecare service, as well as ‘intelligent floors......’ in an eldercare center. Virtual home care entails the performance of specific home care services by means of video conversations rather than physical visits in citizens’ homes (e.g. reminding citizens to take their pills). The eldercare center’s intelligent floors are equipped with sensors, which communicate...... on the care relationships developed, but in quite different ways. In both cases the new configurations of responsibilities and (dis)empowerment of citizens, exist in a delicate balance with professional power and professionals’ legal responsibility to secure the health and wellbeing of citizens in their care...
Full Text Available The foundation of urban management intelligence is internet,geographic information platform and cloud computing platform.Data updating is the soul of geographic information platform.The rapid updating of urban geographic information involves concepts,funds and techniques.These three factors constitute the historic challenge of urban surveying and mapping,and also the reality bottleneck of the implementation of urban management intelligence.This paper presents a city natural data model(CNDMthat is based on the color laser point cloud.Based on vehicle borne mobile mapping,unmanned aerial vehicle (UAV aerial photograph,mobile phone taking,HD video surveillance and cloud computing platform,a fast updating system of CNDM is formed.City geographic information platform for city actuality is constructed based on the real-time update of CNDM,which is to establish the base data of urban management intelligence.
Falzon, Dennis; Thomas, Bruce V.; Temesgen, Zelalem; Sadasivan, Lal; Raviglione, Mario
Countries aiming to reduce their tuberculosis (TB) burden by 2035 to the levels envisaged by the World Health Organization End TB Strategy need to innovate, with approaches such as digital health (electronic and mobile health) in support of patient care, surveillance, programme management, training and communication. Alongside the large-scale roll-out required for such interventions to make a significant impact, products must stay abreast of advancing technology over time. The integration of artificial intelligence into new software promises to make processes more effective and efficient, endowing them with a potential hitherto unimaginable. Users can benefit from artificial intelligence-enabled pattern recognition software for tasks ranging from reading radiographs to adverse event monitoring, sifting through vast datasets to personalise a patient's care plan or to customise training materials. Many experts forecast the imminent transformation of the delivery of healthcare services. We discuss how artificial intelligence and machine learning could revolutionise the management of TB. PMID:28656130
Full Text Available Countries aiming to reduce their tuberculosis (TB burden by 2035 to the levels envisaged by the World Health Organization End TB Strategy need to innovate, with approaches such as digital health (electronic and mobile health in support of patient care, surveillance, programme management, training and communication. Alongside the large-scale roll-out required for such interventions to make a significant impact, products must stay abreast of advancing technology over time. The integration of artificial intelligence into new software promises to make processes more effective and efficient, endowing them with a potential hitherto unimaginable. Users can benefit from artificial intelligence-enabled pattern recognition software for tasks ranging from reading radiographs to adverse event monitoring, sifting through vast datasets to personalise a patient's care plan or to customise training materials. Many experts forecast the imminent transformation of the delivery of healthcare services. We discuss how artificial intelligence and machine learning could revolutionise the management of TB.
Doshi, Riddhi; Falzon, Dennis; Thomas, Bruce V; Temesgen, Zelalem; Sadasivan, Lal; Migliori, Giovanni Battista; Raviglione, Mario
Countries aiming to reduce their tuberculosis (TB) burden by 2035 to the levels envisaged by the World Health Organization End TB Strategy need to innovate, with approaches such as digital health (electronic and mobile health) in support of patient care, surveillance, programme management, training and communication. Alongside the large-scale roll-out required for such interventions to make a significant impact, products must stay abreast of advancing technology over time. The integration of artificial intelligence into new software promises to make processes more effective and efficient, endowing them with a potential hitherto unimaginable. Users can benefit from artificial intelligence-enabled pattern recognition software for tasks ranging from reading radiographs to adverse event monitoring, sifting through vast datasets to personalise a patient's care plan or to customise training materials. Many experts forecast the imminent transformation of the delivery of healthcare services. We discuss how artificial intelligence and machine learning could revolutionise the management of TB.
There has been a significant progress in equipment for testing electro-optical surveillance systems over the last decade. Modern test systems are increasingly computerized, employ advanced image processing and offer software support in measurement process. However, one great challenge, in form of relative low accuracy, still remains not solved. It is quite common that different test stations, when testing the same device, produce different results. It can even happen that two testing teams, while working on the same test station, with the same tested device, produce different results. Rapid growth of electro-optical technology, poor standardization, limited metrology infrastructure, subjective nature of some measurements, fundamental limitations from laws of physics, tendering rules and advances in artificial intelligence are major factors responsible for such situation. Regardless, next decade should bring significant improvements, since improvement in measurement accuracy is needed to sustain fast growth of electro-optical surveillance technology.
The Boston Collaborative Drug Surveillance Program started in 1966 and conducted epidemiologic research to quantify the potential adverse effects of prescription drugs, utilizing in-hospital monitoring.
Hanf, Robert W.; Poston, Ted M.
Shows and explains certain procedures needed for surface environmental surveillance. Hanford Site environmental surveillance is conducted by the Pacific Northwest National Laboratory (PNNL) for the U.S. Department of Energy (DOE) under the Surface Environmental Surveillance Project (SESP). The basic requirements for site surveillance are set fourth in DOE Order 5400.1, General Environmental Protection Program Requirements. Guidance for the SESP is provided in DOE Order 5484.1, Environmental Protection, Safety, and Health Protection Information Reporting Requirements and DOE Order 5400.5, Radiation Protection of the Public and Environment. Guidelines for environmental surveillance activities are provided in DOE/EH-0173T, Environmental Regulatory Guide for Radiological Effluent Monitoring and Environmental Surveillance. An environmental monitoring plan for the Hanford Site is outlined in DOE/RL 91-50 Rev. 2, Environmental Monitoring Plan, United States Department of Energy, Richland Operations Office. Environmental surveillance data are used in assessing the impact of current and past site operations on human health and the environment, demonstrating compliance with applicable local, state, and federal environmental regulations, and verifying the adequacy of containment and effluent controls. SESP sampling schedules are reviewed, revised, and published each calendar year in the Hanford Site Environmental Surveillance Master Sampling Schedule. Environmental samples are collected by SESP staff in accordance with the approved sample collection procedures documented in this manual. Personnel training requirements are documented in SESP-TP-01 Rev.2, Surface Environmental Surveillance Project Training Program.
... School, Whole Community, Whole Child Tools Health Education Curriculum Analysis Tool (HECAT) HECAT FAQs Health Education Teacher ... Button type="submit" value="Submit" /> Youth Risk Behavior Surveillance ...
of the Teradata DBC/1012 -4 database computer to support Command, Control, Communications and Intelligence (C3) functions. The DBC/1012 is an...database machine. The Teradata DBC/1012 has an excellent foreign file capability, good facilities to browse data, and good tools for structured queries...most current C31 systems are tightly coupled. However, when additional functions must be added to current systems, implementing them on a Teradata
A V Krasnov
Full Text Available Foreign psychologists believe that parenting may influence children’s development of emotional intelligence. However, little research has been done in this area. In view of the reviewed literature and given the scarcity of data, we conducted an exploratory study in an as yet unexplored field. The present study aims at examining relationships between the parenting practices and adolescents’ emotional intelligence. 74 students (17-18 years, females were surveyed to assess their perception of parenting styles and their own emotional intelligence. Spearman’s rank correlation coefficients showed that adolescents’ emotional intelligence correlated with one of maternal parenting styles (positive attitude and four of paternal parenting styles (positive attitude, directivity, autonomy, incoherence. Positive interest of parents positively correlated with adolescents’ ability for understanding their own emotions. Paternal positive interest positively correlated with adolescents’ ability for managing their own emotions and emotional intelligence. Paternal directivity positively correlated with adolescents’ ability for understanding emotions (their own and other people’s. Paternal autonomy negatively correlated with adolescents’ emotional intelligence and ability for understanding other people’s emotions. Paternalincoherence negatively correlated with adolescents’ ability for understanding and managing their own emotions.
An apparatus and method are disclosed for surveillance and diagnosis of breached fuel elements in a nuclear reactor. A delayed neutron monitoring system provides output signals indicating the delayed neutron activity and age and the equivalent recoil areas of a breached fuel element. Sensors are used to provide outputs indicating the status of each component of the delayed neutron monitoring system. Detectors also generate output signals indicating the reactor power level and the primary coolant flow rate of the reactor. The outputs from the detectors and sensors are interfaced with an artificial intelligence-based knowledge system which implements predetermined logic and generates output signals indicating the operability of the reactor
The book describes a system for visual surveillance using intelligent cameras. The camera uses robust techniques for detecting and tracking moving objects. The real time capture of the objects is then stored int he database. The tracking data stored in the database is analysed to study the camera view, detect and track objects, and study object behavior. These set of models provide a robust framework for coordinating the tracking of objects between overlapping and non-overlapping cameras, and recording the activity of objects detected by the system.
An apparatus and method are disclosed for surveillance and diagnosis of breached fuel elements in a nuclear reactor. A delayed neutron monitoring system provides output signals indicating the delayed neutron activity and age and the equivalent recoil area of a breached fuel element. Sensors are used to provide outputs indicating the status of each component of the delayed neutron monitoring system. Detectors also generate output signals indicating the reactor power level and the primary coolant flow rate of the reactor. The outputs from the detectors and sensors are interfaced with an artificial intelligence-based knowledge system which implements predetermined logic and generates output signals indicating the operability of the reactor. 2 figs.
Gross, Kenny C.
An apparatus and method are disclosed for surveillance and diagnosis of breached fuel elements in a nuclear reactor. A delayed neutron monitoring system provides output signals indicating the delayed neutron activity and age and the equivalent recoil areas of a breached fuel element. Sensors are used to provide outputs indicating the status of each component of the delayed neutron monitoring system. Detectors also generate output signals indicating the reactor power level and the primary coolant flow rate of the reactor. The outputs from the detectors and sensors are interfaced with an artificial intelligence-based knowledge system which implements predetermined logic and generates output signals indicating the operability of the reactor.
Guevara Betancourt, Edder
A low-cost prototype is developed with a RPI plate for remote video surveillance. Additionally, the theoretical basis to provide energy independence have developed through solar cells and a battery bank. Some existing commercial monitoring systems are studied and analyzed, components such as: cameras, communication devices (WiFi and 3G), free software packages for video surveillance, control mechanisms and theory remote photovoltaic systems. A number of steps are developed to implement the module and install, configure and test each of the elements of hardware and software that make up the module, exploring the feasibility of providing intelligence to the system using the software chosen. Events that have been generated by motion detection have been simple, intuitive way to view, archive and extract. The implementation of the module by a microcomputer video surveillance and motion detection software (Zoneminder) has been an option for a lot of potential; as the platform for monitoring and recording data has provided all the tools to make a robust and secure surveillance. (author) [es
Nijholt, Antinus; Stock, Oliviero; Stock, O.; Nishida, T.; Nishida, Toyoaki
This Special Issue of AI and Society contains a selection of papers presented at the 6th Social Intelligence Design Workshop held at ITC-irst, Povo (Trento, Italy) in July 2007. Being the 6th in a series means that there now is a well-established and also a growing research area. The interest in
Full Text Available The theory of multiple intelligences was presented by Gardner in 1983. The theory was revised later (1999 and among the other intelligences a naturalist intelligence was added. The criteria for distinguishing of the different types of intelligences are considered. While Gardner restricted the analysis of the naturalist intelligence with examples from the living nature only, the present paper considered this problem on wider background including objects and persons of the natural sciences.
... FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.304 Foreign person. The term foreign person means any citizen or national of a foreign state...
Clarken, Rodney H.
Moral intelligence is newer and less studied than the more established cognitive, emotional and social intelligences, but has great potential to improve our understanding of learning and behavior. Moral intelligence refers to the ability to apply ethical principles to personal goals, values and actions. The construct of moral intelligence consists…
Rønn, Kira Vrist; Høffding, Simon
We argue that the majority of intelligence definitions fail to recognize that the normative epistemic status of intelligence is knowledge and not an inferior alternative. We refute the counter-arguments that intelligence ought not to be seen as knowledge because of 1) its action-oriented scope...... and robustness of claims to intelligence-knowledge can be assessed....
Counterinsurgency, Company Intelligence Support Team, COIST, HUMINT, SIGINT, MASINT, OSINT 16. SECURITY CLASSIFICATION OF: (U) 17. LIMITATION OF...intelligence ( OSINT ), signals intelligence (SIGINT), and technical intelligence (TECHINT).14 11...new ways to support the needs of commanders, especially company-level commanders. The slow-moving and complex framework of the Army acquisition system
Ramesh, A N; Kambhampati, C; Monson, J R T; Drew, P J
Artificial intelligence is a branch of computer science capable of analysing complex medical data. Their potential to exploit meaningful relationship with in a data set can be used in the diagnosis, treatment and predicting outcome in many clinical scenarios. Medline and internet searches were carried out using the keywords 'artificial intelligence' and 'neural networks (computer)'. Further references were obtained by cross-referencing from key articles. An overview of different artificial intelligent techniques is presented in this paper along with the review of important clinical applications. The proficiency of artificial intelligent techniques has been explored in almost every field of medicine. Artificial neural network was the most commonly used analytical tool whilst other artificial intelligent techniques such as fuzzy expert systems, evolutionary computation and hybrid intelligent systems have all been used in different clinical settings. Artificial intelligence techniques have the potential to be applied in almost every field of medicine. There is need for further clinical trials which are appropriately designed before these emergent techniques find application in the real clinical setting.
What did the intelligence community and the Intelligence Committee di poorly in regard to the treaty ratification process for arms control? We failed to solve the compartmentalization problem/ This is a second-order problem, and, in general, analysts try to be very open; but there are problems nevertheless. There are very few, if any, people within the intelligence community who are cleared for everything relevant to our monitoring capability emdash short of probably the Director of Central Intelligence and the president emdash and this is a major problem. The formal monitoring estimates are drawn up by individuals who do not have access to all the information to make the monitoring judgements. This paper reports that the intelligence community did not present a formal document on either Soviet incentives of disincentives to cheat or on the possibility of cheating scenarios, and that was a mistake. However, the intelligence community was very responsive in producing those types of estimates, and, ultimately, the evidence behind them in response to questions. Nevertheless, the author thinks the intelligence community would do well to address this issue up front before a treaty is submitted to the Senate for advice and consent
Ramesh, A. N.; Kambhampati, C.; Monson, J. R. T.; Drew, P. J.
INTRODUCTION: Artificial intelligence is a branch of computer science capable of analysing complex medical data. Their potential to exploit meaningful relationship with in a data set can be used in the diagnosis, treatment and predicting outcome in many clinical scenarios. METHODS: Medline and internet searches were carried out using the keywords 'artificial intelligence' and 'neural networks (computer)'. Further references were obtained by cross-referencing from key articles. An overview of different artificial intelligent techniques is presented in this paper along with the review of important clinical applications. RESULTS: The proficiency of artificial intelligent techniques has been explored in almost every field of medicine. Artificial neural network was the most commonly used analytical tool whilst other artificial intelligent techniques such as fuzzy expert systems, evolutionary computation and hybrid intelligent systems have all been used in different clinical settings. DISCUSSION: Artificial intelligence techniques have the potential to be applied in almost every field of medicine. There is need for further clinical trials which are appropriately designed before these emergent techniques find application in the real clinical setting. PMID:15333167
Full Text Available Since its conception in the mid 1950s, artificial intelligence with its great ambition to understand and emulate intelligence in natural and artificial environments alike is now a truly multidisciplinary field that reaches out and is inspired by a great diversity of other fields. Rapid advances in research and technology in various fields have created environments into which artificial intelligence could embed itself naturally and comfortably. Neuroscience with its desire to understand nervous systems of biological organisms and systems biology with its longing to comprehend, holistically, the multitude of complex interactions in biological systems are two such fields. They target ideals artificial intelligence has dreamt about for a long time including the computer simulation of an entire biological brain or the creation of new life forms from manipulations of cellular and genetic information in the laboratory. The scope for artificial intelligence in neuroscience and systems biology is extremely wide. This article investigates the standing of artificial intelligence in relation to neuroscience and systems biology and provides an outlook at new and exciting challenges for artificial intelligence in these fields. These challenges include, but are not necessarily limited to, the ability to learn from other projects and to be inventive, to understand the potential and exploit novel computing paradigms and environments, to specify and adhere to stringent standards and robust statistical frameworks, to be integrative, and to embrace openness principles.
Developing environmental sensing and monitoring technologies become essential especially for industries that may cause severe contamination. Intelligent environmental sensing uses novel sensor techniques, intelligent signal and data processing algorithms, and wireless sensor networks to enhance environmental sensing and monitoring. It finds applications in many environmental problems such as oil and gas, water quality, and agriculture. This book addresses issues related to three main approaches to intelligent environmental sensing and discusses their latest technological developments. Key contents of the book include: Agricultural monitoring Classification, detection, and estimation Data fusion Geological monitoring Motor monitoring Multi-sensor systems Oil reservoirs monitoring Sensor motes Water quality monitoring Wireless sensor network protocol
Stengel, Robert F.
Flight control systems can benefit by being designed to emulate functions of natural intelligence. Intelligent control functions fall in three categories: declarative, procedural, and reflexive. Declarative actions involve decision-making, providing models for system monitoring, goal planning, and system/scenario identification. Procedural actions concern skilled behavior and have parallels in guidance, navigation, and adaptation. Reflexive actions are more-or-less spontaneous and are similar to inner-loop control and estimation. Intelligent flight control systems will contain a hierarchy of expert systems, procedural algorithms, and computational neural networks, each expanding on prior functions to improve mission capability to increase the reliability and safety of flight and to ease pilot workload.
Dr. Robert Clark
Full Text Available At this year's annual conference of the International Association for Intelligence Education (IAFIE in Monterey, CA, the keynote speaker posed the question, "How much do you need intelligence education outside the beltway?" Which led to a second question discussed during the conference: "What should such education look like?" In short, what should we be teaching in universities? What should we leave to the intelligence community as training? And what could be done in either or both settings? The first question of any educational effort is:What are we preparing students for?
Although speed plays a large part in the occurrence of crashes, drivers often exceed the speed limit. The police use various methods when carrying out their speed surveillance. In the Netherlands positive effects have been found of speed surveillance with radar cars (without stopping). It is to be
Full Text Available In the article analysed essence of concepts “gift”, “capabilities”, “foreign capabilities”et al. It is set that the successful study of foreign languages is determined at least by fourspecial когнитивные abilities (capacity for phonetic encryption, ability to perceivegrammatical relations in a foreign language and understand the role of grammar intranslation of expressions and suggestions, mechanical annex storage, inductive ability.Given of description of gifted, including to the study of foreign languages, children.Key words: foreign capabilities, capabilities, gift, gifted children.
Ana-Ramona BOLOGA; Razvan BOLOGA
This paper presents some ideas about business intelligence today and the importance of developing real time business solutions. The authors make an exploration of links between business intelligence and artificial intelligence and focuses specifically on the implementation of software agents-based systems in business intelligence. There are briefly presented some of the few solutions proposed so far that use software agents properties for the benefit of business intelligence. The authors then...
Malatesta, Mike; Quintana, Yamilet
The Multiple Intelligence Theory (MI) is one of the models that study and describe the cognitive abilities of an individual. In  is presented a referential system which allows to identify the Multiple Intelligences of the students of a course and to classify the level of development of such Intelligences. Following this tendency, the purpose of this paper is to describe the model of Multiple Intelligences as a quotient space, and also to study the Multiple Intelligences of an individual in...
... Vaccine Surveillance Network (NVSN) Foodborne Diseases Active Surveillance Network (FoodNet) National Outbreak Reporting System (NORS) Estimates of Foodborne Illness in the United States CDC's Vessel Sanitation Program CDC Feature: Surveillance for Norovirus Outbreaks Top ...
Timan, Tjerk; Galic, Masa; Koops, Bert-Jaap; Brownsword, Roger; Scotford, Eloise; Yeung, Karen
This chapter provides an overview of key surveillance theories and their implications for law and regulation. It presents three stages of theories that characterise changes in thinking about surveillance in society and the disciplining, controlling, and entertaining functions of surveillance.
Saber Khooei Oskooei
Full Text Available The purpose of the present study was to investigate the relationship between multiple intelligences (MI and foreign language (L2 reading skill among Iranian EFL sophomores. Multiple intelligences and L2 reading measurements of participants – 29 males and 69 females who were selected from four intact classes – were obtained through McKenzie’s (1999 Multiple Intelligences Inventory and reading part of a Preliminary English Test PET, respectively, and then Pearson’s correlation analysis was run to determine the degree of the relationship between each component of multiple intelligences and L2 reading skill. Afterwards, through a multiple regression analysis those components of multiple intelligences which acted as the predictors of L2 reading skill were identified and the power of each predictor was calculated. The results of the correlation analyses revealed that linguistic-verbal, logical-mathematical, spatial, and interpersonal intelligences were significantly correlated with reading skill. In addition, the results showed that linguistic-verbal, interpersonal, and logical-mathematical intelligences were the best predictors of L2 reading skill scores of the participants. The results of the study can help coursebook designers, educational planners, foreign language institutes, teachers, learners and their parents to provide and use different methods of teaching and learning.
Full Text Available CRISPR-Cas systems defend bacteria and archaea against infection by bacteriophage and other threats. The central component of these systems are surveillance complexes that use guide RNAs to bind specific regions of foreign nucleic acids, marking them for destruction. Surveillance complexes must locate targets rapidly to ensure timely immune response, but the mechanism of this search process remains unclear. Here, we used single-molecule FRET to visualize how the type I-E surveillance complex Cascade searches DNA in real time. Cascade rapidly and randomly samples DNA through nonspecific electrostatic contacts, pausing at short PAM recognition sites that may be adjacent to the target. We identify Cascade motifs that are essential for either nonspecific sampling or positioning and readout of the PAM. Our findings provide a comprehensive structural and kinetic model for the Cascade target-search mechanism, revealing how CRISPR surveillance complexes can rapidly search large amounts of genetic material en route to target recognition.
Yan, S J; Chughtai, A A; Macintyre, C R
Rapid epidemic detection is an important objective of surveillance to enable timely intervention, but traditional validated surveillance data may not be available in the required timeframe for acute epidemic control. Increasing volumes of data on the Internet have prompted interest in methods that could use unstructured sources to enhance traditional disease surveillance and gain rapid epidemic intelligence. We aimed to summarise Internet-based methods that use freely-accessible, unstructured data for epidemic surveillance and explore their timeliness and accuracy outcomes. Steps outlined in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) checklist were used to guide a systematic review of research related to the use of informal or unstructured data by Internet-based intelligence methods for surveillance. We identified 84 articles published between 2006-2016 relating to Internet-based public health surveillance methods. Studies used search queries, social media posts and approaches derived from existing Internet-based systems for early epidemic alerts and real-time monitoring. Most studies noted improved timeliness compared to official reporting, such as in the 2014 Ebola epidemic where epidemic alerts were generated first from ProMED-mail. Internet-based methods showed variable correlation strength with official datasets, with some methods showing reasonable accuracy. The proliferation of publicly available information on the Internet provided a new avenue for epidemic intelligence. Methodologies have been developed to collect Internet data and some systems are already used to enhance the timeliness of traditional surveillance systems. To improve the utility of Internet-based systems, the key attributes of timeliness and data accuracy should be included in future evaluations of surveillance systems. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.
coupled with social interaction and sometimes framed as entertainment or games. Facilitated by online community and social networking sites, the possibility of collecting and sharing data is a significant feature of these self-monitoring technologies. They all include sharing features where weight, blood...... pressure, fitness activities, sleep cycles, etc. can be broadcasted, e.g. as tweets on Twitter or status updates on Facebook. Such quantification practices with monitoring technologies become co-producing when individuals constitute themselves as subjects engaging in self-tracking, self-care, and self......Gadgets and applications are increasingly being developed and used for tracking, quantifying, and documenting everyday life activities and especially health and fitness devices such as GPS-enabled sports watches are well-known and popular. However, self-surveillance practices involving networked...
A Total Process Surveillance system is under development which can provide, in real-time, additional process information from a limited number of raw measurement signals. This is achieved by using a robust model based observer to generate estimates of the process' internal states. The observer utilises the analytical reduncancy among a diverse range of transducers and can thus accommodate off-normal conditions which lead to transducer loss or damage. The modular hierarchical structure of the system enables the maximum amount of information to be assimilated from the available instrument signals no matter how diverse. This structure also constitutes a data reduction path thus reducing operator cognitive overload from a large number of varying, and possibly contradictory, raw plant signals. (orig.)
Schneider, Th.; Gitzinger, C.; Jaunet, P.; Eberbach, F.; Clavel, B.; Hemidy, P.Y.; Perrier, G.; Kiper, Ch.; Peres, J.M.; Josset, M.; Calvez, M.; Leclerc, M.; Leclerc, E.; Aubert, C.; Levelut, M.N.; Debayle, Ch.; Mayer, St.; Renaud, Ph.; Leprieur, F.; Petitfrere, M.; Catelinois, O.; Monfort, M.; Baron, Y.; Target, A.
The objective of these days was to present the organisation of the surveillance of the environmental radioactivity and to allow an experience sharing and a dialog on this subject between the different actors of the radiation protection in france. The different presentations were as follow: evolution and stakes of the surveillance of radioactivity in environment; the part of the European commission, regulatory aspects; the implementation of the surveillance: the case of Germany; Strategy and logic of environmental surveillance around the EDF national centers of energy production; environmental surveillance: F.B.F.C. site of Romans on Isere; steps of the implementation 'analysis for release decree at the F.B.F.C./C.E.R.C.A. laboratory of Romans; I.R.S.N. and the environmental surveillance: situation and perspectives; the part of a non institutional actor, the citizenship surveillance done by A.C.R.O.; harmonization of sampling methods: the results of inter operators G.T. sampling; sustainable observatory of environment: data traceability and samples conservation; inter laboratories tests of radioactivity measurements; national network of environmental radioactivity measurement: laboratories agreements; the networks of environmental radioactivity telemetry: modernization positioning; programme of observation and surveillance of surface environment and installations of the H.A.-M.A.V.L. project (high activity and long life medium activity); Evolution of radionuclides concentration in environment and adaptation of measurements techniques to the surveillance needs; the national network of radioactivity measurement in environment; modes of data restoration of surveillance: the results of the Loire environment pilot action; method of sanitary impacts estimation in the area of ionizing radiations; the radiological impact of atmospheric nuclear tests in French Polynesia; validation of models by the measure; network of measurement and alert management of the atmospheric
Resnik, W.M.; Kadner, S.P.; Olsen, R.; Chitumbo, K.; Pepper, S.
With assistance from the US Program for Technical Assistance to IAEA Safeguards (POTAS), Aquila Technologies Group developed the Tamper-Resistant Analog Media (TRAM-1000) system to provide standard VHS surveillance video tapes with an enhanced tamper-indicating capability. This project represents further implementation of the partnership approach in facilities including light water reactors with MOX facilities. These facilities use Uniplex Digiquad system video tapes. The partnership approach ensures that one organization can exchange the tapes in a machine without the presence of the other, without losing continuity of information. The TRAM-1000 system development project was accomplished in two stages. In the first stage of the project, the original system delivered to the IAEA, consists of three parts: (1) the tamper detection unit, (2) a specially augmented VHS video tape, and (3) an HP-95 reader. The tamper detection unit houses a VACOSS active fiber-optic seal and an electronic identification tag (E-TAG) reader. In the second stage of the project, the original TRAM-1000 was modified to its current design based on agency input. After delivery of the original TRAM-1000 system to the IAEA, it was reviewed by inspectors. The inspectors felt that the initial system's tape storage/transport method could be simplified. Rather than threading the fiber through the tape spindles, the inspectors suggested that the tape be placed in a bag capable of being sealed. Also, a more flexible fiber-optic cable was recommended. As a result of these suggestions, Aquila developed a tamper-proof bag specifically for holding a surveillance video tape and sealable with a VACOSS fiber optical seal
Bouchard, Thomas J
I argue that the g factor meets the fundamental criteria of a scientific construct more fully than any other conception of intelligence. I briefly discuss the evidence regarding the relationship of brain size to intelligence. A review of a large body of evidence demonstrates that there is a g factor in a wide range of species and that, in the species studied, it relates to brain size and is heritable. These findings suggest that many species have evolved a general-purpose mechanism (a general biological intelligence) for dealing with the environments in which they evolved. In spite of numerous studies with considerable statistical power, we know of very few genes that influence g and the effects are very small. Nevertheless, g appears to be highly polygenic. Given the complexity of the human brain, it is not surprising that that one of its primary faculties-intelligence-is best explained by the near infinitesimal model of quantitative genetics.
Full Text Available Artificial Intelligence (AI is a branch of computer science concerned with making computers behave like humans. At least this was the original idea. However, it turned out that this is no task easy to be solved. This article aims to give a comprehensible review on the last 60 years of artificial intelligence taking a philosophical viewpoint. It is outlined what happened so far in AI, what is currently going on in this research area, and what can be expected in future. The goal is to mediate an understanding for the developments and changes in thinking in course of time about how to achieve machine intelligence. The clear message is that AI has to join forces with neuroscience and other brain disciplines in order to make a step towards the development of truly intelligent machines.
The Handbook of Intelligent Vehicles provides a complete coverage of the fundamentals, new technologies, and sub-areas essential to the development of intelligent vehicles; it also includes advances made to date, challenges, and future trends. Significant strides in the field have been made to date; however, so far there has been no single book or volume which captures these advances in a comprehensive format, addressing all essential components and subspecialties of intelligent vehicles, as this book does. Since the intended users are engineering practitioners, as well as researchers and graduate students, the book chapters do not only cover fundamentals, methods, and algorithms but also include how software/hardware are implemented, and demonstrate the advances along with their present challenges. Research at both component and systems levels are required to advance the functionality of intelligent vehicles. This volume covers both of these aspects in addition to the fundamentals listed above.
Advances in computing sciences have not been applied to traffic control. This paper describes the development of an intelligent controller. A controller with advanced control logic can significantly improve traffic flows at intersections. In this vei...
Goertzel, Ben; Geisweiller, Nil
The work outlines a detailed blueprint for the creation of an Artificial General Intelligence system with capability at the human level and ultimately beyond, according to the Cog Prime AGI design and the Open Cog software architecture.
Green, H. S.; Triffet, T.
An introductory discussion of the related concepts of intelligence and consciousness suggests criteria to be met in the modeling of intelligence and the development of intelligent materials. Methods for the modeling of actual structure and activity of the animal cortex have been found, based on present knowledge of the ionic and cellular constitution of the nervous system. These have led to the development of a realistic neural network model, which has been used to study the formation of memory and the process of learning. An account is given of experiments with simple materials which exhibit almost all properties of biological synapses and suggest the possibility of a new type of computer architecture to implement an advanced type of artificial intelligence.
Siurdyban, Artur; Møller, Charles
applied to the context of organizational processes can increase the success rate of business operations. The framework is created using a set of theoretical based constructs grounded in a discussion across several streams of research including psychology, pedagogy, artificial intelligence, learning...... of deploying inapt operations leading to deterioration of profits. To address this problem, we propose a unified business process design framework based on the paradigm of intelligence. Intelligence allows humans and human-designed systems cope with environmental volatility, and we argue that its principles......, business process management and supply chain management. It outlines a number of system tasks combined in four integrated management perspectives: build, execute, grow and innovate, put forward as business process design propositions for Intelligent Supply Chains....
Goertzel, Ben; Geisweiller, Nil
The work outlines a novel conceptual and theoretical framework for understanding Artificial General Intelligence and based on this framework outlines a practical roadmap for the development of AGI with capability at the human level and ultimately beyond.
Best, Jr., Richard A
To address the challenges facing the U.S. Intelligence Community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis...
Best. Jr, Richard A
To address the challenges facing the U.S. Intelligence Community in the 21st century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis...
Best, Jr, Richard A
To address the challenges facing the U.S. Intelligence Community in the 21st Century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis...
Full Text Available The main point of this paper is that foreign aid fails because the structure of its incentives resembles that of central planning. Aid is not only ineffective, it is arguably counterproductive. Contrary to business firms that are paid by those they are supposed to serve (customers, aid agencies are paid by tax payers of developed countries and not by those they serve. This inverse structure of incentives breaks the stream of pressure that exists on the commercial market. It also creates larger loopholes in the principle-agent relationship on each point along the chain of aid delivery. Both factors enhance corruption, moral hazard and negative selection. Instead of promoting development, aid extends the life of bad institutions and those in power. Proposals to reform foreign aid – like aid privatization and aid conditionality – do not change the existing structure of the incentives in aid delivery, and their implementation may just slightly improve aid efficacy. Larger improvement is not possible. For that reason, foreign aid will continue to be a waste of resources, probably serving some objectives different to those that are usually mentioned, like recipient’s development poverty reduction and pain relief.
Devinney, E. J.; Prša, A.; Guinan, E. F.; Degeorge, M.
From the perspective (and bias) as Eclipsing Binary researchers, we give a brief overview of the development of Artificial Intelligence (AI) applications, describe major application areas of AI in astronomy, and illustrate the power of an AI approach in an application developed under the EBAI (Eclipsing Binaries via Artificial Intelligence) project, which employs Artificial Neural Network technology for estimating light curve solution parameters of eclipsing binary systems.
This book contains a selection of refereed and revised papers of the Intelligent Distributed Computing Track originally presented at the third International Symposium on Intelligent Informatics (ISI-2014), September 24-27, 2014, Delhi, India. The papers selected for this Track cover several Distributed Computing and related topics including Peer-to-Peer Networks, Cloud Computing, Mobile Clouds, Wireless Sensor Networks, and their applications.
Business Intelligence (BI) is unanimous considered the art of gaining business advantage from data; therefore BI systems and infrastructures must integrate disparate data sources into a single coherent framework for real-time reporting and detailed analysis within the extended enterprise. Also the solution to a business problem is a process that includes business intelligence, BI, by itself, is rarely the complete solution to the problem. Therefore, BI tools must understand the process and ho...
Cristescu Marian Pompiliu
Full Text Available This paper shows how businesses make decisions better and faster in terms of customers, partners and operations by turning data into valuable business information. The paper describes how to bring together people's and business intelligence information to achieve successful business strategies. There is the possibility of developing business intelligence projects in large and medium-sized organizations only with the Microsoft product described in the paper, and possible alternatives can be discussed according to the required features.
Summary Decision-making is complex in modern medicine and should ideally be based on available data, structured knowledge and proper interpretation in the context of an individual patient. Automated algorithms, also termed artificial intelligence that are able to extract meaningful patterns from data collections and build decisions upon identified patterns may be useful assistants in clinical decision-making processes. In this article, artificial intelligence-based studies in clinical cardiol...
Ramesh, A. N.; Kambhampati, C.; Monson, J. R. T.; Drew, P. J.
INTRODUCTION: Artificial intelligence is a branch of computer science capable of analysing complex medical data. Their potential to exploit meaningful relationship with in a data set can be used in the diagnosis, treatment and predicting outcome in many clinical scenarios. METHODS: Medline and internet searches were carried out using the keywords 'artificial intelligence' and 'neural networks (computer)'. Further references were obtained by cross-referencing from key articles. An overview of ...
Johan, Novie; Jones, Peter
This report is the first Annual Market Intelligence Report (AMIR) produced by TCRC. Since 2005, TCRC has produced Quarterly Market Intelligence Report (QMIR). These reports provided estimated meal numbers on board based on forecasted passenger numbers. Due to changes in the way in which some data is reported, it was no longer possible to produce reports quarterly, hence the development of this annual report. Past reports and other TCRC Publications could be accessed online at http://epubs.s...
García, Elena; Rodríguez González, Sara; de Paz Santana, Juan F.; Bajo Pérez, Javier
This paper presents an adaptive architecture that allows centralized control of public lighting and intelligent management, in order to economise on lighting and maintain maximum comfort status of the illuminated areas. To carry out this management, architecture merges various techniques of artificial intelligence (AI) and statistics such as artificial neural networks (ANN), multi-agent systems (MAS), EM algorithm, methods based on ANOVA and a Service Oriented Aproach (SOA). It performs optim...
İ. EFE EFEOĞLU
Full Text Available Cultural intelligence is described as the ability of a person to behave adequately in culturally diverse environments. It involves comprehending the effects of cultural background on the attitudes of people for auspicious participation in any social setting. Cultural intelligence may be positively and significantly correlated with professional well-being among English as foreign language (EFL teachers. So, the present study sought to investigate the correlation between Turkish EFL state school teachers' cultural intelligence and their professional well-being. A sample including 120 EFL state school teachers completed two questionnaires: (1 Cultural Intelligence Scale developed by Cultural Intelligence Center (2005; and (2 the Scale of Teacher Perception of Professional Well-Being developed by Yildirim, Arastaman and Dasci (2016. The results of the study indicated significant correlations between Turkish EFL state school teachers' cultural intelligence and their professional well-being. This study may help English Language Teaching (ELT departments to implement materials to their curriculum for aiding EFL teachers in terms of developing cultural intelligence. Furthermore, this paper makes a unique contribution to the area of cultural intelligence by identifying whether there is a relationship between cultural intelligence and professional well-being.
Yeo, R A; Arden, R; Jung, R E
A significant body of evidence has accumulated suggesting that individual variation in intellectual ability, whether assessed directly by intelligence tests or indirectly through proxy measures, is related to risk of developing Alzheimer's disease (AD) in later life. Important questions remain unanswered, however, such as the specificity of risk for AD vs. other forms of dementia, and the specific links between premorbid intelligence and development of the neuropathology characteristic of AD. Lower premorbid intelligence has also emerged as a risk factor for greater mortality across myriad health and mental health diagnoses. Genetic covariance contributes importantly to these associations, and pleiotropic genetic effects may impact diverse organ systems through similar processes, including inefficient design and oxidative stress. Through such processes, the genetic underpinnings of intelligence, specifically, mutation load, may also increase the risk of developing AD. We discuss how specific neurobiologic features of relatively lower premorbid intelligence, including reduced metabolic efficiency, may facilitate the development of AD neuropathology. The cognitive reserve hypothesis, the most widely accepted account of the intelligence-AD association, is reviewed in the context of this larger literature.
James B. Bruce
Full Text Available This article examines the current state of professionalism in national security intelligence analysis in the U.S. Government. Since the introduction of major intelligence reforms directed by the Intelligence Reform and Terrorism Prevention Act (IRTPA in December, 2004, we have seen notable strides in many aspects of intelligence professionalization, including in analysis. But progress is halting, uneven, and by no means permanent. To consolidate its gains, and if it is to continue improving, the U.S. intelligence community (IC should commit itself to accomplishing a new program of further professionalization of analysis to ensure that it will develop an analytic cadre that is fully prepared to deal with the complexities of an emerging multipolar and highly dynamic world that the IC itself is forecasting. Some recent reforms in intelligence analysis can be assessed against established standards of more fully developed professions; these may well fall short of moving the IC closer to the more fully professionalized analytical capability required for producing the kind of analysis needed now by the United States.
Cook, Emily; Hammett, Stephen T; Larsson, Jonas
Early psychological researchers proposed a link between intelligence and low-level perceptual performance. It was recently suggested that this link is driven by individual variations in the ability to suppress irrelevant information, evidenced by the observation of strong correlations between perceptual surround suppression and cognitive performance. However, the neural mechanisms underlying such a link remain unclear. A candidate mechanism is neural inhibition by gamma-aminobutyric acid (GABA), but direct experimental support for GABA-mediated inhibition underlying suppression is inconsistent. Here we report evidence consistent with a global suppressive mechanism involving GABA underlying the link between sensory performance and intelligence. We measured visual cortical GABA concentration, visuo-spatial intelligence and visual surround suppression in a group of healthy adults. Levels of GABA were strongly predictive of both intelligence and surround suppression, with higher levels of intelligence associated with higher levels of GABA and stronger surround suppression. These results indicate that GABA-mediated neural inhibition may be a key factor determining cognitive performance and suggests a physiological mechanism linking surround suppression and intelligence. Copyright © 2016 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.
... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: National Intelligence University, Defense Intelligence... hereby given that a closed meeting of the National Intelligence University Board of Visitors has been...
Naeini, Ma'ssoumeh Bemani; Pandian, Ambigapathy
Gardner's (1983) Multiple Intelligences Theory (MIT) has been found to have profound implications in teaching English as a foreign language (TEFL) in that it provides a way for teachers to recognize learners' individual cognitive and affective differences by providing favorable motivational conditions for learning. However, little investigation…
Boonma, Malai; Phaiboonnugulkij, Malinee
This article calls for a strong need to propose the theoretical framework of the Multiple Intelligences theory (MI) and provide a suitable answer of the doubt in part of foreign language teaching. The article addresses the application of MI theory following various sources from Howard Gardner and the authors who revised this theory for use in the…
Alrabah, Sulaiman; Wu, Shu-hua; Alotaibi, Abdullah M.
The study aimed to investigate the learning styles and multiple intelligences of English as foreign language (EFL) college-level students. "Convenience sampling" (Patton, 2015) was used to collect data from a population of 250 students enrolled in seven different academic departments at the College of Basic Education in Kuwait. The data…
Afshar, Hassan Soodmand; Tofighi, Somayyeh; Hamazavi, Raouf
The idea that language learning is facilitated or inhibited by a multitude of factors has prompted scholars in the field to investigate variables considered to be crucial in the process of second or foreign language learning. This study investigated relationships between emotional intelligence, learning style, language learning strategy use, and…
Aghroum, Christian; Alberganti, Michel; Bonelli, Laurent; Ceyhan, Ayse; Denis, Vincent; Dufief, Vincent; Laurent, Sébastien; Piazza, Pierre; Preuss-Laussinotte, Sylvia; Rousselin, Thierry; Thorel, Jérôme; Tsoukala, Anastassia; Vitran, Jean-Claude; Alberganti, Michel; Alberganti, Michel
« Big Brother is watching you ! » Cet avertissement placardé sur les murs de la cité imaginaire d'Océania dans le roman 1984 de Georges Orwell peut-il s'appliquer à nos sociétés contemporaines ? Passeport biométrique, fichage informatisé des individus, multiplication des caméras de surveillance, utilisation de puce dans des objets de la vie quotidienne, ou pour suivre les criminels en liberté surveillée, les mesures d'identification, de fichage et de surveillance des individus par des techniq...
Full Text Available This paper presents some ideas about business intelligence today and the importance of developing real time business solutions. The authors make an exploration of links between business intelligence and artificial intelligence and focuses specifically on the implementation of software agents-based systems in business intelligence. There are briefly presented some of the few solutions proposed so far that use software agents properties for the benefit of business intelligence. The authors then propose some basic ideas for developing real-time agent-based software system for business intelligence in supply chain management, using Case Base Reasoning Agents.
The concept of fluid and crystallized intelligence was introduced to the psychological community approximately 75 years ago by Raymond B. Cattell, and it continues to be an area of active research and controversy. The purpose of this paper is to provide a brief overview of the origin of the concept, early efforts to define intelligence and uses of intelligence tests to address pressing social issues, and the ongoing controversies associated with fluid intelligence and the structure of intelligence. The putative neuropsychological underpinnings and neurological substrates of fluid intelligence are discussed.
Ibarz, J A Esteban; Samitier, A Sáinz; Alvira, R Delgado; Prades, P Burgués; Martínez-Pardo, N González; Pollina, J Elías
The aim to this study is evaluate the history, symptoms, radiographic and endoscopic findings in 420 children who were admitted for suspected foreign body aspiration in our hospital between 1972 and 2005. In 13 children we didn't find foreign body and in 16 children the foreign bodies were lodged in larynx. The mean age was 33 months. The medical history, phisical exploration, auscultation and radiological findings were positive in 91,4%, 78,3%, 91,6% and 81%. The frecuency or foreign body aspiration is undervaluate and sometimes is excluded as diagnosis. Only 218 (51,9%) patients went to the hospital in the first 24 hours, although 87,8% of patients presented symptoms and 75,4% presented severe symptoms. Moreover the removed foreign bodies and suspected foreign bodies are the same in 82,95%. We think that bronchoscopy should by performed in all children who have had a choking episode.
Khan, Mohammad; Abraham, Ajith
This book demonstrates the success of Ambient Intelligence in providing possible solutions for the daily needs of humans. The book addresses implications of ambient intelligence in areas of domestic living, elderly care, robotics, communication, philosophy and others. The objective of this edited volume is to show that Ambient Intelligence is a boon to humanity with conceptual, philosophical, methodical and applicative understanding. The book also aims to schematically demonstrate developments in the direction of augmented sensors, embedded systems and behavioral intelligence towards Ambient Intelligent Networks or Smart Living Technology. It contains chapters in the field of Ambient Intelligent Networks, which received highly positive feedback during the review process. The book contains research work, with in-depth state of the art from augmented sensors, embedded technology and artificial intelligence along with cutting-edge research and development of technologies and applications of Ambient Intelligent N...
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... in this context. With such platforms comes the massive provision and storage of personal data that are systematically evaluated, marketed, and used for targeting users with advertising. In a world of global economic competition, economic crisis, and fear of terrorism after 9/11, both corporations and state...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...
Friedman, J. D. (Principal Investigator)
The author has identified the following significant results. A systematic aircraft program to monitor changes in the thermal emission from volcanoes of the Cascade Range has been initiated and is being carried out in conjunction with ERTS-1 thermal surveillance experiments. Night overflights by aircraft equipped with thermal infrared scanners sensitive to terrestrial emission in the 4-5.5 and 8-14 micron bands are currently being carried out at intervals of a few months. Preliminary results confirm that Mount Rainier, Mount Baker, Mount Saint Helens, Mount Shasta, and the Lassen area continue to be thermally active, although with the exception of Lassen which erupted between 1914 and 1917, and Mount Saint Helens which had a series of eruptions between 1831 and 1834, there has been no recent eruptive activity. Excellent quality infrared images recorded over Mount Rainier, as recently as April, 1972, show similar thermal patterns to those reported in 1964-1966. Infrared images of Mount Baker recorded in November 1970 and again in April 1972 revealed a distinct array of anomalies 1000 feet below the crater rim and associated with fumaroles or structures permitting convective heat transfer to the surface.
Meyer, Klaus E.; Sinani, Evis
The extensive empirical literature analyzing productivity spillovers from foreign direct investment to local firms provides inconclusive results. Some studies find that foreign presence has a positive impact on the productivity of domestic firms, while others find no evidence or a negative effect...... for industrialized countries in the 1990s. Transition economies may experience spillovers, but these have been declining in recent years. Keywords: developing countries, transition economies, spillovers, foreign direct investment, technology transfer, meta-analysis...
This article is devoted to the problem of franchising in Russia. The article informs about difficulties, which face foreign companies developing their business in our country. Doing business in franchising foreign companies have to overcome some challenges such as: obtain a credit, unpredictability of the economy and so on. But in spite of all these difficulties many foreign companies and Russian ones set up franchising in Russia and promote themselves at the Russian market, but never the les...
The role of security in Qatari foreign policy is one of the central discussions in the literature on the Gulf security. This thesis represents Qatari foreign policy strategies through lenses of the Copenhagen School for security studies, established by seminal publications of Barry Buzan, Ole Waever and Jaap de Wilde. The research highlights the question of how can the dynamics of Qatari foreign policy be evaluated within the context of Copenhagen School's security sectors in seven chapters. ...
Signals Intelligence (SIGINT) Human Intelligence (HUMINT) Measurement and Signature Intelligence (MASINT) Open Source Intelligence ( OSINT ) In...may not be fully achieved within the near-term, it does establish a framework for designing, programming and acquiring the needed capabilities...2007. 34. Department of Homeland Security. National Response Framework , January 2008 35. National Security Presidential Directive (NSPD-47
Bailey, Jr., Charles W.
Artificial Intelligence (AI) encompasses the following general areas of research: (1) automatic programming, (2) computer vision, (3) expert systems, (4) intelligent computer-assisted instruction, (5) natural language processing, (6) planning and decision support, (7) robotics, and (8) speech recognition. Intelligent library systems utilize artificial intelligence technologies to provide knowledge-based services to library patrons and staff. This paper examines certain key aspects of AI th...
Mulford, Roberta Nancy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
This lecture discusses stockpile stewardship efforts and the role surveillance plays in the process. Performance of the RTGs is described, and the question of the absence of anticipated He is addressed.
Ploussard, G; Hennequin, C; Rozet, F
Several prospective studies have demonstrated the safety of active surveillance as a first treatment of prostate cancer. It spares many patients of a useless treatment, with its potential sequelae. Patients with a low-risk cancer are all candidates for this approach, as recommended by the American Society of Clinical Oncology (ASCO). Some patients with an intermediate risk could be also concerned by active surveillance, but this is still being discussed. Currently, the presence of grade 4 lesions on biopsy is a contra-indication. Modalities included a repeated prostate specific antigen test and systematic rebiopsy during the first year after diagnosis. MRI is now proposed to better select patients at inclusion and also during surveillance. No life style changes or drugs are significantly associated with a longer duration of surveillance. Copyright © 2017. Published by Elsevier SAS.
Jan Berkow; Larry Banta
The Intelligent Potroom Operation project focuses on maximizing the performance of an aluminum smelter by innovating components for an intelligent manufacturing system. The Intelligent Potroom Advisor (IPA) monitors process data to identify reduction cells exhibiting behaviors that require immediate attention. It then advises operational personnel on those heuristic-based actions to bring the cell back to an optimal operating state in order to reduce the duration and frequency of substandard reduction cell performance referred to as ''Off-Peak Modes'' (OPMs). Techniques developed to identify cells exhibiting OPMs include the use of a finite element model-based cell state estimator for defining the cell's current operating state via advanced cell noise analyses. In addition, rule induction was also employed to identify statistically significant complex behaviors that occur prior to OPMs. The intelligent manufacturing system design, concepts and formalisms developed in this project w ere used as a basis for an intelligent manufacturing system design. Future research will incorporate an adaptive component to automate continuous process improvement, a technology platform with the potential to improve process performance in many of the other Industries of the Future applications as well.
Solé, Ricard; Amor, Daniel R; Duran-Nebreda, Salva; Conde-Pueyo, Núria; Carbonell-Ballestero, Max; Montañez, Raúl
Intelligent systems have emerged in our biosphere in different contexts and achieving different levels of complexity. The requirement of communication in a social context has been in all cases a determinant. The human brain, probably co-evolving with language, is an exceedingly successful example. Similarly, social insects complex collective decisions emerge from information exchanges between many agents. The difference is that such processing is obtained out of a limited individual cognitive power. Computational models and embodied versions using non-living systems, particularly involving robot swarms, have been used to explore the potentiality of collective intelligence. Here we suggest a novel approach to the problem grounded in the genetic engineering of unicellular systems, which can be modified in order to interact, store memories or adapt to external stimuli in collective ways. What we label as Synthetic Swarm Intelligence defines a parallel approach to the evolution of computation and swarm intelligence and allows to explore potential embodied scenarios for decision making at the microscale. Here, we consider several relevant examples of collective intelligence and their synthetic organism counterparts. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Full Text Available The article stresses the relationship between Explicit and Implicit theories of Intelligence. Following the line of common sense epistemology and the theory of Social Representations, a study was carried out in order to analyze naive’s explanations about Intelligence Definitions. Based on Mugny & Carugati (1989 research, a self-administered questionnaire was designed and filled in by 286 subjects. Results are congruent with the main hyphotesis postulated: A general overlap between explicit and implicit theories showed up. According to the results Intelligence appears as both, a social attribute related to social adaptation and as a concept defined in relation with contextual variables similar to expert’s current discourses. Nevertheless, conceptions based on “gifted ideology” still are present stressing the main axes of Intelligence debate: biological and sociological determinism. In the same sense, unfamiliarity and social identity are reaffirmed as organizing principles of social representation. The distance with the object -measured as the belief in intelligence differences as a solve/non solve problem- and the level of implication with the topic -teachers/no teachers- appear as discriminating elements at the moment of supporting specific dimensions.
Saridis, George N.
The theory of intelligent machines has been recently reformulated to incorporate new architectures that are using neural and Petri nets. The analytic functions of an intelligent machine are implemented by intelligent controls, using entropy as a measure. The resulting hierarchical control structure is based on the principle of increasing precision with decreasing intelligence. Each of the three levels of the intelligent control is using different architectures, in order to satisfy the requirements of the principle: the organization level is moduled after a Boltzmann machine for abstract reasoning, task planning and decision making; the coordination level is composed of a number of Petri net transducers supervised, for command exchange, by a dispatcher, which also serves as an interface to the organization level; the execution level, include the sensory, planning for navigation and control hardware which interacts one-to-one with the appropriate coordinators, while a VME bus provides a channel for database exchange among the several devices. This system is currently implemented on a robotic transporter, designed for space construction at the CIRSSE laboratories at the Rensselaer Polytechnic Institute. The progress of its development is reported.
Allgood, Glenn O.; Ferrell, Regina K.; Kercel, Stephen W.; Abston, Ruth A.
Traffic management can be thought of as a stochastic queuing process where the serving time at one of its control points is dynamically linked to the global traffic pattern, which is, in turn, dynamically linked to the control point. For this closed-loop system to be effective, the traffic management system must sense and interpret a large spatial projection of data originating from multiple sensor suites. This concept is the basis for the development of a traffic flow wide-area surveillance (TFWAS) system. This paper presents the results of a study by Oak Ridge National Laboratory to define the operational specifications and characteristics, to determine the constraints, and to examine the state of technology of a TFWAS system in terms of traffic management and control. In doing so, the functions and attributes of a TFWAS system are mapped into an operational structure consistent with the Intelligent Vehicle Highway System (IVHS) concept and the existing highway infrastructure. This mapping includes identifying candidate sensor suites and establishing criteria, requirements, and performance measures by which these systems can be graded in their ability and practicality to meet the operational requirements of a TFWAS system. In light of this, issues such as system integration, applicable technologies, impact on traffic management and control, and public acceptance are addressed.
Aabo, Tom; Høg, Esben; Kuhn, Jochen
Empirical research has focused on export as a proxy for the exchange rate exposure and the use of foreign exchange derivatives as the instrument to deal with this exposure. This empirical study applies an integrated foreign exchange risk management approach with a particular focus on the role...... of import in medium-sized, manufacturing firms in Denmark (a small, open economy). We find a strong, negative relation between import and foreign exchange derivatives usage on the aggregate level. Our findings are consistent with the notion that firms use import to match the foreign exchange exposure...
Aabo, Tom; Høg, Esben; Kuhn, Jochen
Empirical research has focused on export as a proxy for exchange rate exposure and the use of foreign exchange derivatives as an instrument to deal with this exposure. This empirical study applies an integrated foreign exchange risk management approach with a particular focus on the role of import...... in medium-sized manufacturing firms in Denmark (a small, open economy). We find a strong, negative relation between import and the use of foreign exchange derivatives on the aggregate level. Our findings are consistent with the notion that firms use import to match the foreign exchange exposure created...
Feldbaum, Harley; Lee, Kelley; Michaud, Joshua
Health has long been intertwined with the foreign policies of states. In recent years, however, global health issues have risen to the highest levels of international politics and have become accepted as legitimate issues in foreign policy. This elevated political priority is in many ways a welcome development for proponents of global health, and it has resulted in increased funding for and attention to select global health issues. However, there has been less examination of the tensions that characterize the relationship between global health and foreign policy and of the potential effects of linking global health efforts with the foreign-policy interests of states. In this paper, the authors review the relationship between global health and foreign policy by examining the roles of health across 4 major components of foreign policy: aid, trade, diplomacy, and national security. For each of these aspects of foreign policy, the authors review current and historical issues and discuss how foreign-policy interests have aided or impeded global health efforts. The increasing relevance of global health to foreign policy holds both opportunities and dangers for global efforts to improve health. PMID:20423936
Feldbaum, Harley; Lee, Kelley; Michaud, Joshua
Health has long been intertwined with the foreign policies of states. In recent years, however, global health issues have risen to the highest levels of international politics and have become accepted as legitimate issues in foreign policy. This elevated political priority is in many ways a welcome development for proponents of global health, and it has resulted in increased funding for and attention to select global health issues. However, there has been less examination of the tensions that characterize the relationship between global health and foreign policy and of the potential effects of linking global health efforts with the foreign-policy interests of states. In this paper, the authors review the relationship between global health and foreign policy by examining the roles of health across 4 major components of foreign policy: aid, trade, diplomacy, and national security. For each of these aspects of foreign policy, the authors review current and historical issues and discuss how foreign-policy interests have aided or impeded global health efforts. The increasing relevance of global health to foreign policy holds both opportunities and dangers for global efforts to improve health.
Bandick, Roger; Karpaty, Patrik
This paper investigates the employment effects of foreign acquisitions in acquired firms in Swedish manufacturing during the 1990s; a period characterized by a dramatic increase in foreign ownership. We find some evidence of positive employment effects in acquired firms and it seems that the empl......This paper investigates the employment effects of foreign acquisitions in acquired firms in Swedish manufacturing during the 1990s; a period characterized by a dramatic increase in foreign ownership. We find some evidence of positive employment effects in acquired firms and it seems...
RW Hanf; TM Poston
Environmental surveillance data are used in assessing the impact of current and past site operations on human health and the environment, demonstrating compliance with applicable local, state, and federal environmental regulations, and verifying the adequacy of containment and effluent controls. SESP sampling schedules are reviewed, revised, and published each calendar year in the Hanford Site Environmental Surveillance Master Sampling Schedule. Environmental samples are collected by SESP staff in accordance with the approved sample collection procedures documented in this manual.
This paper discusses the principles, health benefit and cost-effectiveness of health surveillance in the occupational setting, which apply to exposure to ionising radiations in the same manner as to other hazards in the workplace. It highlights the techniques for undertaking health surveillance, discusses their relative advantages and disadvantages and illustrates these in relation to specific hazards. The responsibilities of the medical staff and of the worker are also discussed. (author)
Neal, DJ; Rahman, Shawon
A high-resolution video surveillance management system incurs huge amounts of storage and network bandwidth. The current infrastructure required to support a high resolution video surveillance management system (VMS) is expensive and time consuming to plan, implement and maintain. With the recent advances in cloud technologies, opportunity for the utilization of virtualization and the opportunity for distributed computing techniques of cloud storage have been pursued on the basis to find out ...
Tarver, William J.
This slide presentation reviews the importance of longterm occupational health surveillance of astronauts after exposure to the possible hazards of spaceflight. Because there is not much information about long term effects of spaceflight on human health, it is important to identify some of the possible results of exposure to the many possible factors that can influence longterm health impacts. This surveillance also allows for NASA to meet the obligation to care for the astronauts for their lifetime.
van Arem, Bart; Tampere, Chris M.J.; Malone, Kerry
This paper addresses the modeling of traffic flows with intelligent cars and intelligent roads. It will describe the modeling approach MIXIC and review the results for different ADA systems: Adaptive Cruise Control, a special lane for Intelligent Vehicles, cooperative following and external speed
Full Text Available The aim of this article is to propose work methodology for Competitive Intelligence teams in one of the intelligence cycle’s specific area, in the so-called “Intelligence Analysis”. Intelligence Analysis is one of the stages of the Intelligence Cycle in which data from both the primary and secondary research are analyzed. The main result of the effort is the creation of added value for the information collected. Company Competiitve Intelligence, correctly understood and implemented in business practice, is the “forecasting of the future”. That is forecasting about the future, which forms the basis for strategic decisions made by the company’s top management. To implement that requirement in corporate practice, the author perceives Competitive Intelligence as a systemic application discipline. This approach allows him to propose a “Work Plan” for Competitive Intelligence as a fundamental standardized document to steer Competitive Intelligence team activities. The author divides the Competitive Intelligence team work plan into five basic parts. Those parts are derived from the five-stage model of the intelligence cycle, which, in the author’s opinion, is more appropriate for complicated cases of Competitive Intelligence.
Thommesen, Jacob; Andersen, Henning Boje
This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...
and resources on the y-axis and in an inverted relationship to an undefined timespan. Presented at a strategic criminal intelligence symposium...contingency plans are especially important for SR units to include cover and compromise plan, no-communications plan, escape and evasion plan, and abort ...Reconnaissance and Surveillance Handbook, 2–3. 48 considered success criteria. Lost communications can be an “ abort criterion” once the mission
Ling Hu and Qiang Ni
Big Video data analytics and processing are becoming increasingly important research areas because ofinfinite generation of massive video data volumes all over the world. In this paper, by utilizing Bayesianbased importance analysis, we propose a set of novel, simple but effective video recording methodologies and intelligent algorithms to solve the so-called big video data volume problem in urban surveillance systems. The complexity of our proposed algorithms are only O(n), hence they can be...
Hahn, Oliver; Stalph, Florian; Steller, Tom
Within a series of six qualitative studies over seven years, this research in instructing journalism students investigates whether or not covering foreign news from home via Internet technology can substitute foreign correspondents on-site to reduce costs. Co-orientation and decontextualization can be described as characteristic for virtual…
Sacha, G M; Varona, P
During the last decade there has been increasing use of artificial intelligence tools in nanotechnology research. In this paper we review some of these efforts in the context of interpreting scanning probe microscopy, the study of biological nanosystems, the classification of material properties at the nanoscale, theoretical approaches and simulations in nanoscience, and generally in the design of nanodevices. Current trends and future perspectives in the development of nanocomputing hardware that can boost artificial-intelligence-based applications are also discussed. Convergence between artificial intelligence and nanotechnology can shape the path for many technological developments in the field of information sciences that will rely on new computer architectures and data representations, hybrid technologies that use biological entities and nanotechnological devices, bioengineering, neuroscience and a large variety of related disciplines. (topical review)
Jerison, H J
There is no consensus on the nature of animal intelligence despite a century of research, though recent work on cognitive capacities of dolphins and great apes seems to be on one right track. The most precise quantitative analyses have been of relative brain size, or structural encephalization, undertaken to find biological correlates of mind in animals. Encephalization and its evolution are remarkably orderly, and if the idea of intelligence were unknown it would have to be invented to explain encephalization. The scientific question is: what behaviour or dimensions of behaviour evolved when encephalization evolved? The answer: the relatively unusual behaviours that require increased neural information processing capacity, beyond that attributable to differences among species in body size. In this perspective, the different behaviours that depend on augmented processing capacity in different species are evidence of different intelligences (in the plural) that have evolved.
Büscher, Monika; Liegl, Michael; Thomas, Vanessa
New practices of social media use in emergency response seem to enable broader `situation awareness' and new forms of crisis management. The scale and speed of innovation in this field engenders disruptive innovation or a reordering of social, political, economic practices of emergency response. ....... Of particular interest are ways of bridging between collective intelligence in crises and official emergency response efforts.......New practices of social media use in emergency response seem to enable broader `situation awareness' and new forms of crisis management. The scale and speed of innovation in this field engenders disruptive innovation or a reordering of social, political, economic practices of emergency response....... By examining these dynamics with the concept of social collective intelligence, important opportunities and challenges can be examined. In this chapter we focus on socio-technical aspects of social collective intelligence in crises to discuss positive and negative frictions and avenues for innovation...
Making quick and effective decisions in environment management are based on multiple and complex parameters, a data warehouse is a powerful tool for the over all management of massive environmental information. Selecting the right data from a warehouse is an important factor consideration for end-users. This paper proposed an intelligent environmental data warehouse system. It consists of data warehouse to feed an environmental researchers and managers with desire environmental information needs to their research studies and decision in form of geometric and attribute data for study area, and a metadata for the other sources of environmental information. In addition, the proposed intelligent search engine works according to a set of rule, which enables the system to be aware of the environmental data wanted by the end-user. The system development process passes through four stages. These are data preparation, warehouse development, intelligent engine development and internet platform system development. (author)
Sacha, G M; Varona, P
During the last decade there has been increasing use of artificial intelligence tools in nanotechnology research. In this paper we review some of these efforts in the context of interpreting scanning probe microscopy, the study of biological nanosystems, the classification of material properties at the nanoscale, theoretical approaches and simulations in nanoscience, and generally in the design of nanodevices. Current trends and future perspectives in the development of nanocomputing hardware that can boost artificial-intelligence-based applications are also discussed. Convergence between artificial intelligence and nanotechnology can shape the path for many technological developments in the field of information sciences that will rely on new computer architectures and data representations, hybrid technologies that use biological entities and nanotechnological devices, bioengineering, neuroscience and a large variety of related disciplines.
The field of artificial intelligence (Al) has generated many useful ideas and techniques that can be integrated into the design of control systems. It is believed and, for special cases, has been demonstrated, that integration of Al into control systems would provide the necessary tools for solving many of the complex problems that present control techniques and Al algorithms are unable to do, individually. However, this integration requires the development of basic understanding and new fundamentals to provide scientific bases for achievement of its potential. This book presents an overview of some of the latest research studies in the area of intelligent control systems. These papers present techniques for formulation of intelligent control, and development of the rule-based control systems. Papers present applications of control systems in nuclear power plants and HVAC systems
Marwala, Tshilidzi; Hurwitz, Evan
The advent of artificial intelligence has changed many disciplines such as engineering, social science and economics. Artificial intelligence is a computational technique which is inspired by natural intelligence such as the swarming of birds, the working of the brain and the pathfinding of the ants. These techniques have impact on economic theories. This book studies the impact of artificial intelligence on economic theories, a subject that has not been extensively studied. The theories that...
Søilen, Klaus Solberg; Jenster, Per
Market Intelligence provides managers with helpful concepts, tools and ideas on market intelligence and analysis. Additionally, it gives the reader some of the analytical tools used to analyze both micro and macro factors in the organization’s environment to better predict future outcomes and help decision making. The field of competitive intelligence is studied by a diverse research community. Contributions are made to aid states on a national, regional and local level (Public Intelligence),...
Full Text Available The principal objective of this article is to do a literature review of different intelligence terminology with the aim of establishing the common attributes and differences, and to propose a universal and comprehensive definition of intelligence for common understanding amongst users. The findings showed that Competitive Intelligence has the broadest scope of intelligence activities covering the whole external operating environment of the company and targeting all levels of decision-making for instance; strategic intelligence, tactical intelligence and operative intelligence. Another terminology was found called Cyber IntelligenceTM which encompasses competitor intelligence, strategic intelligence, market intelligence and counterintelligence. In conclusion although CI has the broadest scope of intelligence and umbrella to many intelligence concepts, still Business Intelligence, and Corporate Intelligence are often used interchangeably as CI
Grappel, Robert D; Harris, Garrett S; Kozar, Mark J; Wiken, Randall T
...) and Enhanced Surveillance (ERS) data link applications. The intended audience for this report is an engineering staff assigned the task of implementing a monitoring system used to determine ELS and EHS compliance...
Andraitis, Arthur A.; Crane, Alfred C.; Daniels, George; Graham, Johnny; LaGesse, Francis R.
This afternoon's panel discussion will address near real time imagery and intelligence--how will we do it? Our moderator is Arthur Andraitis, a consultant in intelligence reconnaissance systems and international marketing. He was commissioned in the United States Air Force out of the University of Idaho, and entered the Air Force in 1955 where he became an Image Intelligence Officer serving in a variety of intelligence and reconnaisance related assignments, including two tours each in Asia and Europe supporting tactical theater and national level operations. He also suffered through two Pentagon tours--one as Branch Chief of the Imagery Branch for the Assistant Chief of Staff for Intelligence. He was the U. S. National Coordinator for two NATO intelligence and reconnaissance panels, and served several assignments in support of special operations, which included a year with the special forces in Viet Nam where he flew many missions in L-19s, 01 and assault helicopters. He has been an advisor on intelligence and reconnaissance matters to several foreign countries. In 1978 he retired from the United States Air Force, went to work for Itek, and then became an independent consultant in intelligence and reconaissance systems. I would like to introduce Art Andraitis.
Cristescu Marian Pompiliu
Full Text Available A Business Intelligence solution concerns the simple, real-time access to complete information about the business shown in a relevant format of the report, graphic or dashboard type in order help the taking of strategic decisions regarding the direction in which the company goes. Business Intelligence does not produce data, but uses the data produced by the company’s applications. BI solutions extract their data from ERP (Enterprise Resource Planning, CRM (Customer Relationship Management, HCM (Human Capital Management, and Retail, eCommerce or other databases used in the company.
Decision-making is complex in modern medicine and should ideally be based on available data, structured knowledge and proper interpretation in the context of an individual patient. Automated algorithms, also termed artificial intelligence that are able to extract meaningful patterns from data collections and build decisions upon identified patterns may be useful assistants in clinical decision-making processes. In this article, artificial intelligence-based studies in clinical cardiology are reviewed. The text also touches on the ethical issues and speculates on the future roles of automated algorithms versus clinicians in cardiology and medicine in general.
Wamsley, S.J.; Purvis, E.E. III
Artificial intelligence (AI) is a high technology field that can be used to provide problem solving diagnosis, guidance and for support resolution of problems. It is not a stand alone discipline, but can also be applied to develop data bases for retention of the expertise that is required for its own knowledge base. This provides a way to retain knowledge that otherwise may be lost. Artificial Intelligence Methodology can provide an automated construction management decision support system, thereby restoring the manager's emphasis to project management
Korb, Kevin B
As the power of Bayesian techniques has become more fully realized, the field of artificial intelligence has embraced Bayesian methodology and integrated it to the point where an introduction to Bayesian techniques is now a core course in many computer science programs. Unlike other books on the subject, Bayesian Artificial Intelligence keeps mathematical detail to a minimum and covers a broad range of topics. The authors integrate all of Bayesian net technology and learning Bayesian net technology and apply them both to knowledge engineering. They emphasize understanding and intuition but also provide the algorithms and technical background needed for applications. Software, exercises, and solutions are available on the authors' website.
Overø, Helene Martine; Larsen, Allan; Røpke, Stefan
is to enhance the efficiency and lower the environmental impact in freight transport. In this paper, a pilot project involving real-time waste collection at a Danish waste collection company is described, and a solution approach is proposed. The problem corresponds to the dynamic version of the waste collection......The Danish innovation project entitled “Intelligent Freight Transport Systems” aims at developing prototype systems integrating public intelligent transport systems (ITS) with the technology in vehicles and equipment as well as the IT-systems at various transport companies. The objective...
The subject is covered in chapters, entitled: chance and the universe (synthesis of proteins; the 'primordial soup'); the gospel according to Darwin (discussion of Darwin theory of evolution); life did not originate on earth (fossils from space; life in space); the interstellar connection (living dust between the stars; bacteria in space falling to the earth; interplanetary dust); evolution by cosmic control (microorganisms; genetics); why aren't the others here (a cosmic origin of life); after the big bang (big bang and steady state); the information rich universe; what is intelligence up to; the intelligent universe. (U.K.)
Compares artificial intelligence and information retrieval paradigms for natural language understanding, reviews progress to date, and outlines the applicability of artificial intelligence to question answering systems. A list of principal artificial intelligence software for database front end systems is appended. (CLB)
Schutte, Nicola S.; Malouff, John M.; Bobik, Chad; Coston, Tracie D.; Greeson, Cyndy; Jedlicka, Christina; Rhodes, Emily; Wendorf, Greta
Presents the results of seven studies that focused on the link between emotional intelligence and interpersonal relations. Tests emotional intelligence with empathy and self-monitoring, social skills, cooperation, relations with others, and marital satisfaction. Explores preference for emotionally intelligent partners in the final study. Includes…
Examines the past, present, and future status of Artificial Intelligence (AI). Acknowledges the limitations of AI but proposes possible areas of application and further development. Urges a concentration on the unique strengths of machine intelligence rather than a copying of human intelligence. (ML)
Halff, Henry M.
Surveys artificial intelligence and the development of computer-based tutors and speculates on the future of artificial intelligence in education. Includes discussion of the definitions of knowledge, expert systems (computer systems that solve tough technical problems), intelligent tutoring systems (ITS), and specific ITSs such as GUIDON, MYCIN,…
Rosenblum, Alvin B; Wolf, Steve
Dental ethics is often taught, viewed, and conducted as an intell enterprise, uninformed by other noncognitive factors. Emotional intelligence (EQ) is defined distinguished from the cognitive intelligence measured by Intelligence Quotient (IQ). This essay recommends more inclusion of emotional, noncognitive input to the ethical decision process in dental education and dental practice.
(i) Are Kenya's foreign policy interests vis-a-vis the Nile River question influenced by her internal demand for water? g ... This article examines Kenya's foreign policy interests on the Nile water question and the implications of the ...... Okodi, C. Odidi, 1980, 'Legal and Policy Regime of Lake Victoria and Nile Basins', Indian.
This study investigates the relation of the Foreign Language Teaching with the Semiotic Approach that gains more importance recently and tries to explain how this concept has been used as Semiotic Approach in Foreign Language Teaching and Learning and teacher-learner roles, strong-weak sides, types of activities, etc. have been handled.
CRITICISM OF GOVERNMENTAL POLICY RESTRICTING USE OF FOREIGN CONTRACT WORKERS ON AMERICAN FARMS IN 1965 EXPRESSES THREE POSSIBILITIES -- (1) A SEVERE DISRUPTION OF DOMESTIC FRUIT AND VEGETABLE PRODUCTION, (2) AN INCREASE OF AMERICAN INVESTMENT IN FOREIGN, PARTICULARLY MEXICAN, AGRICULTURAL PRODUCTION, AND (3) A LOSS OF UNITED STATES EXPORT MARKET…
Provides an overview of the construction industry in Singapore. Studies the structure of the construction workforce, the terms of employment, policies towards worker, the effects of employment of foreign workers on local industry, the reducing reliance on foreign construction workers, and the future trends in Singapore's requirements for construction workers.
Full Text Available In today’s global age many people cross national borders in search of better work and more wages. According to IOM, more than 100 000 000 workers leave their homeland and migrate to another country for this reason. Europe and North America have already experienced increase in foreign labor for many decades but nowadays, it is very common to see foreign laborers in Asian countries. As the number of foreign laborers rapidly increased, however, so did many social problems in relation to these workers. No country is safe from or immune to such social problems in regards to the foreign workers especially with a much easier and more efficient transportation system. In case of South Korea, the history of foreign labor may not be as long as other nations but as of 2007, it boasts of more than 250 000 foreign laborers and is thus facing just as many social problems as well. In order to investigate such social issues, this article explores the history of foreign laborers and their current situation in South Korea. Furthermore, this artticle examines both internal and external factors which may have caused exponential growth of foreign labor market in South Korea in the past decade.
Ирина Юрьевна Мишота
Full Text Available The article is devoted to the use of information technologies in the process of teaching foreign languages. On the basis of the retrospective application of information technologies considered the main directions of application of computers in the teaching of foreign languages.
McLeod, N.B.; Steyn, J.J.
This report presents an assessment of the extent to which foreign uranium may be available to United States utilities in the short term (through 1980), the intermediate term (1981--1985), and the long term (1986--95). All free world foreign uranium producers and prospects are included, with particular emphasis on Australia, Canada, southern Africa, France, and French-speaking Africa. The assessment includes reserves, resources, exploration and prospects; firm and potential production capacity and prospects; national policies and relevant political and economic conditions; foreign uranium demand; etc. Conclusions are: Foreign supply capability is greater than foreign demand in the near term. The current availability of uncommitted future Australian production presents an unusual opportunity for establishing commercial relations with very substantial producers. Foreign uranium contracts represent an increase in diversity of supply and access to resources but have less assurance of supply than do domestic contracts. However, uncertainties can frequently be accommodated within an overall procurement program, thereby retaining the diversity and price advantages of foreign procurement. The practice of market pricing of contracts reduces the incentives for foreign contracting
Feb 26, 2009 ... Taylor fights to the finish, there will be no peace' (Eze 2003:2). Taylor was removed via an asylum offer by Nigeria. If there is any Nigerian government foreign policy gesture that has in recent times generated considerable public outcry, it is the issue of. Nigerian involvement in Liberia. It is one foreign policy ...
Abercrombie, John R.
Describes Graphics Project for Foreign Language Learning at the University of Pennsylvania, which has developed ways of displaying foreign scripts on microcomputers. Character design on computer screens is explained; software for graphics, printing, and language instruction is discussed; and a text editor is described that corrects optically…
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Charges payable to foreign officials, witnesses, foreign counsel, and interpreters. 92.69 Section 92.69 Foreign Relations DEPARTMENT OF STATE LEGAL AND... foreign officials, witnesses, foreign counsel, and interpreters. (a) Execution of letters rogatory by...
... FUTURES TRADING COMMISSION FOREIGN FUTURES AND FOREIGN OPTIONS TRANSACTIONS § 30.7 Treatment of foreign futures or foreign options secured amount. (a) Except as provided in this section, a futures commission... options customers denominated as the foreign futures or foreign options secured amount. Such money...
Paya, C; Pinsard, L; Buestel, C; Bocquet, J; Delyfer, M-N; Colin, J
Perforative intraorbital injuries can be potentially serious, and management depends on the type of projectile and its intraorbital trajectory. Medical imaging is an imperative part of the initial assessment. We report the case of a wooden intraorbital foreign body (arrow), with no functional or anatomical consequences, with a remarkable intraorbital trajectory analyzed by CT. The two main risks of these injuries are first mechanical, with possible bulb, nerve, muscle or bone complications, and second infectious. The CT scan or better yet MRI imaging provide a detailed analysis of the projectile's intraorbital trajectory in the orbital cavity. Infectious complications are promoted by the fat cells present in the orbit and must be systematically controlled with wide-spectrum antibiotics. Copyright © 2010 Elsevier Masson SAS. All rights reserved.
Full Text Available This state-of-the art paper focuses on the poorly explored issue of foreign language aptitude, attempting to present the latest developments in this field and reconceptualizations of the construct from the perspective of neuroscience. In accordance with this goal, it first discusses general directions in neurolinguistic research on foreign language aptitude, starting with the earliest attempts to define the neurological substrate for talent, sources of difficulties in the neurolinguistic research on foreign language aptitude and modern research methods. This is followed by the discussion of the research on the phonology of foreign language aptitude with emphasis on functional and structural studies as well as their consequences for the knowledge of the concept. The subsequent section presents the studies which focus on lexical and morphosyntactic aspects of foreign language aptitude. The paper ends with a discussion of the limitations of contemporary research, the future directions of such research and selec ed methodological issues.
of Capability-Expectations Gap in the study of European foreign policy. Through examples from relevant literature, Larsen not only demonstrates how this concept sets up standards for the EU as a foreign policy actor (that are not met by most other international actors) but also shows how this curtails analysis......This book argues that theories of European foreign policy are performative: they create the objects they analyse. In this text, Larsen outlines the performativity approach to the role of theories based on the work of Derrida and goes on to examine the performative role of Christopher Hill's concept...... of EU foreign policy. The author goes on to discuss how the widespread use of the concept of ‘gap' affects the way in which EU foreign policy has been studied; and that it always produces the same result: the EU is an unfulfilled actor outside the realm of “normal” actors in IR. This volume offers new...
Meyer, Klaus E.; Sinani, Evis
The extensive empirical literature analyzing productivity spillovers from foreign direct investment to local firms provides inconclusive results. Some studies find that foreign presence has a positive impact on the productivity of domestic firms, while others find no evidence or a negative effect...... for industrialized countries in the 1990s. Transition economies may experience spillovers, but these have been declining in recent years. Keywords: developing countries, transition economies, spillovers, foreign direct investment, technology transfer, meta-analysis......The extensive empirical literature analyzing productivity spillovers from foreign direct investment to local firms provides inconclusive results. Some studies find that foreign presence has a positive impact on the productivity of domestic firms, while others find no evidence or a negative effect...... data analysis. We conduct a meta-analysis to investigate reasons for these conflicting results, and provide a revised interpretation of earlier research and its policy implications, and new priorities for future research. Our analysis suggests that the hypothesized spillovers are not confirmed...
Full Text Available Congenital syphilis (CS is mainly a consequence of the lack of antenatal care and control of sexually transmitted infections.The bedrock of the prevention of CS is syphilis diagnosis by serological screening during pregnancy.Current Italian guidelines suggest that all the pregnant women should be tested in the first trimester. Due to the frequently absence of specific signs of infection at birth, laboratory tests are often the only method for a correct CS diagnosis. The aim of this study was to evaluate the usefulness of Treponema pallidum IgM Western Blot (WB and Polymerase Chain Reaction (PCR on cerebrospinal fluid (CSF as an aid in the diagnosis of CS during a prospective surveillance study carried out at St. Orsola Hospital in Bologna, Italy, from November 2000 through June 2010. All pregnant women during pregnancy and at delivery were screened for syphilis by ARCHITECT® Syphilis TP, Abbott. Positive samples were further analysed by Treponema Pallidum Hemagglutination Test (TPHA and Rapid Plasma Reagin (RPR tests, Radim.An in-house Western Blot (WB was also performed. Infants born to syphilis seropositive mothers were enrolled in a prospective follow up. At birth, tests were performed (including IgM WB. Infants with positive RPR tests at birth born to mothers not adequately treated received also a long bone radiograph as well as a complete CSF analysis, including Veneral Disease Research Laboratori (VDRL (Siemens Healthcare Diagnostics and PCR testing. All seroreactive infants received careful follow up examinations and serological testing at 0, 3, 6, 9, 12 months or until the tests became negative. In this study, positive syphilis serology was noted in 151 pregnant women delivering in our hospital. Fifteen women had never been adequately treated, and 9 out 15 gave birth to infected newborns.All these 9 infants had positive IgM WB results on serum samples. Two babies had characteristic long bone lesions at X-ray examination and 3 were born
Jonathan Las Fargeas
Full Text Available This paper considers the problem of path planning for a team of unmanned aerial vehicles performing surveillance near a friendly base. The unmanned aerial vehicles do not possess sensors with automated target recognition capability and, thus, rely on communicating with unattended ground sensors placed on roads to detect and image potential intruders. The problem is motivated by persistent intelligence, surveillance, reconnaissance and base defense missions. The problem is formulated and shown to be intractable. A heuristic algorithm to coordinate the unmanned aerial vehicles during surveillance and pursuit is presented. Revisit deadlines are used to schedule the vehicles’ paths nominally. The algorithm uses detections from the sensors to predict intruders’ locations and selects the vehicles’ paths by minimizing a linear combination of missed deadlines and the probability of not intercepting intruders. An analysis of the algorithm’s completeness and complexity is then provided. The effectiveness of the heuristic is illustrated through simulations in a variety of scenarios.
Las Fargeas, Jonathan; Kabamba, Pierre; Girard, Anouck
This paper considers the problem of path planning for a team of unmanned aerial vehicles performing surveillance near a friendly base. The unmanned aerial vehicles do not possess sensors with automated target recognition capability and, thus, rely on communicating with unattended ground sensors placed on roads to detect and image potential intruders. The problem is motivated by persistent intelligence, surveillance, reconnaissance and base defense missions. The problem is formulated and shown to be intractable. A heuristic algorithm to coordinate the unmanned aerial vehicles during surveillance and pursuit is presented. Revisit deadlines are used to schedule the vehicles' paths nominally. The algorithm uses detections from the sensors to predict intruders' locations and selects the vehicles' paths by minimizing a linear combination of missed deadlines and the probability of not intercepting intruders. An analysis of the algorithm's completeness and complexity is then provided. The effectiveness of the heuristic is illustrated through simulations in a variety of scenarios.
Koller, Walter; de Bruin, Jeroen S; Rappelsberger, Andrea; Adlassnig, Klaus-Peter
By the use of extended intelligent information technology tools for fully automated healthcare-associated infection (HAI) surveillance, clinicians can be informed and alerted about the emergence of infection-related conditions in their patients. Moni--a system for monitoring nosocomial infections in intensive care units for adult and neonatal patients--employs knowledge bases that were written with extensive use of fuzzy sets and fuzzy logic, allowing the inherent un-sharpness of clinical terms and the inherent uncertainty of clinical conclusions to be a part of Moni's output. Thus, linguistic as well as propositional uncertainty became a part of Moni, which can now report retrospectively on HAIs according to traditional crisp HAI surveillance definitions, as well as support clinical bedside work by more complex crisp and fuzzy alerts and reminders. This improved approach can bridge the gap between classical retrospective surveillance of HAIs and ongoing prospective clinical-decision-oriented HAI support.