WorldWideScience

Sample records for identity document usage

  1. Identity Confusion and Materialism Mediate the Relationship Between Excessive Social Network Site Usage and Online Compulsive Buying.

    Science.gov (United States)

    Sharif, Saeed Pahlevan; Khanekharab, Jasmine

    2017-08-01

    This study investigates the mediating role of identity confusion and materialism in the relationship between social networking site (SNS) excessive usage and online compulsive buying among young adults. A total of 501 SNS users aged 17 to 23 years (M = 19.68, SD = 1.65) completed an online survey questionnaire. A serial multiple mediator model was developed and hypotheses were tested using structural equation modeling. The results showed that excessive young adult SNS users had a higher tendency toward compulsive buying online. This was partly because they experienced higher identity confusion and developed higher levels of materialism. Targeted psychological interventions seeking to gradually increase identity clarity to buffer the detrimental effects of SNS usage and identity confusion in young adults are suggested.

  2. An Ethnographic Analysis of Adolescent Sexual Minority Website Usage: Exploring Notions of Information Seeking and Sexual Identity Development

    Science.gov (United States)

    Sulfridge, Rocky M.

    2012-01-01

    This dissertation explores the website usage of adolescent sexual minorities, examining notions of information seeking and sexual identity development. Sexual information seeking is an important element within human information behavior and is uniquely problematic for young sexual minorities. Utilizing a contemporary gay teen website, this…

  3. Introduction: Discourses of Identity

    DEFF Research Database (Denmark)

    Madsen, Peter

    2016-01-01

    Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages.......Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages....

  4. Usage Record Format Recommendation

    CERN Document Server

    Nilsen, J.K.; Muller-Pfeerkorn, R

    2013-01-01

    For resources to be shared, sites must be able to exchange basic accounting and usage data in a common format. This document describes a common format which enables the exchange of basic accounting and usage data from different resources. This record format is intended to facilitate the sharing of usage information, particularly in the area of the accounting of jobs, computing, memory, storage and cloud usage but with a structure that allows an easy extension to other resources. This document describes the Usage Record components both in natural language form and annotated XML. This document does not address how these records should be used, nor does it attempt to dictate the format in which the accounting records are stored. Instead, it denes a common exchange format. Furthermore, nothing is said regarding the communication mechanisms employed to exchange the records, i.e. transport layer, framing, authentication, integrity, etc.

  5. Objective documentation of child abuse and dissociation in 12 murderers with dissociative identity disorder.

    Science.gov (United States)

    Lewis, D O; Yeager, C A; Swica, Y; Pincus, J H; Lewis, M

    1997-12-01

    The skepticism regarding the existence of dissociative identity disorder as well as the abuse that engenders it persists for lack of objective documentation. This is doubly so for the disorder in murderers because of issues of suspected malingering. This article presents objective verification of both dissociative symptoms and severe abuse during childhood in a series of adult murderers with dissociative identity disorder. This study consisted of a review of the clinical records of 11 men and one woman with DSM-IV-defined dissociative identity disorder who had committed murder. Data were gathered from medical, psychiatric, social service, school, military, and prison records and from records of interviews with subjects' family members and others. Handwriting samples were also examined. Data were analyzed qualitatively. Signs and symptoms of dissociative identity disorder in childhood and adulthood were corroborated independently and from several sources in all 12 cases; objective evidence of severe abuse was obtained in 11 cases. The subjects had amnesia for most of the abuse and underreported it. Marked changes in writing style and/or signatures were documented in 10 cases. This study establishes, once and for all, the linkage between early severe abuse and dissociative identity disorder. Further, the data demonstrate that the disorder can be distinguished from malingering and from other disorders. The study shows that it is possible, with great effort, to obtain objective evidence of both the symptoms of dissociative identity disorder and the abuse that engenders it.

  6. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  7. Implementation in Russia and the European Union of International Safety Standards of Identity Documents with Biometric Data: Legal Regulation and Perspectives

    Directory of Open Access Journals (Sweden)

    Alexander Grigoryevich Volevodz

    2015-01-01

    Full Text Available The article contains the findings of a research into particular aspects of use of identity documents with personal biometric data. It considers the international safety standards of documents with biometric data worked out by the International Civil Aviation Organization (ICAO, pursuant to which those data should be included into machine-readable documents used by their holders for travel to various states. It contains the information on the implementation of these international standards in Russian and European Union law. The author has substantiated a conclusion to the effect that the procedure established in Russia for production and issuance, as well as for use of international, diplomatic and service passports identifying the Russian Federation citizen outside the Russian Federation territory, containing electronic information carriers with personal and biometric personal data, currently conforms to the international safety standards of documents with biometric data. The article surveys the experience of introducing domestic biometric identity documents - electronic passports in various countries of the world, and the problems arising therefrom. It substantiates the advantages and disadvantages of determining a passport of the Russian Federation citizen issued in the form of an identity card with an electronic information carrier, as the main document of the Russian Federation citizen identifying him domestically within the country's territory.

  8. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  9. The systematic profiling of false identity documents: method validation and performance evaluation using seizures known to originate from common and different sources.

    Science.gov (United States)

    Baechler, Simon; Terrasse, Vincent; Pujol, Jean-Philippe; Fritz, Thibaud; Ribaux, Olivier; Margot, Pierre

    2013-10-10

    False identity documents constitute a potential powerful source of forensic intelligence because they are essential elements of transnational crime and provide cover for organized crime. In previous work, a systematic profiling method using false documents' visual features has been built within a forensic intelligence model. In the current study, the comparison process and metrics lying at the heart of this profiling method are described and evaluated. This evaluation takes advantage of 347 false identity documents of four different types seized in two countries whose sources were known to be common or different (following police investigations and dismantling of counterfeit factories). Intra-source and inter-sources variations were evaluated through the computation of more than 7500 similarity scores. The profiling method could thus be validated and its performance assessed using two complementary approaches to measuring type I and type II error rates: a binary classification and the computation of likelihood ratios. Very low error rates were measured across the four document types, demonstrating the validity and robustness of the method to link documents to a common source or to differentiate them. These results pave the way for an operational implementation of a systematic profiling process integrated in a developed forensic intelligence model. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  10. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  11. Review of Bison Usage in VERA

    Energy Technology Data Exchange (ETDEWEB)

    Gardner, Russell [Idaho National Lab. (INL), Idaho Falls, ID (United States); Pawlowski, Roger P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Clarno, Kevin T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Stimpson, Shane G. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-11-01

    Bison is being used in VERA in a variety of ways; this milestone will document an independent review of the current usage of Bison and provide guidance that will improve the accuracy, performance, and consistency in the ways that Bison is used. This task will entail running a suite of small, single and multi-cycle problems with VERA-CS, followed by Bison, and Tiamat (inline) and evaluating the usage. It will also entail performing several detailed ramp to full power solutions to compare the one-way coupled solver with the fully-coupled Tiamat. This will include at least one iteration with the PHI team to incorporate some of the feedback and improve the usage. This work will also be completed in conjunction with an FMC task to evaluate the ability of Bison to model load-follow in a PWR

  12. Regulatory applications of the relationships between natural gas usage and weather

    International Nuclear Information System (INIS)

    Gray, J.A.; Patterson, D.L.; Proctor, M.S.; Warren, H.E.

    1997-01-01

    This document provides the basics required for analysis and forecasting of natural gas usage for determining the revenues and revision of rates. The focus is on the Local Distribution Company and its customers. Analysis of gas usage is required in a rate case in order to properly estimate the volumes and revenues that would be recovered from current rate under conditions of normal weather. Normal volumes are also required to evaluate proposed rates. In the context of the Local Distribution Company's procurement of gas supply, forecasting of gas usage is required to determine both the daily usage profile and the peak day requirement

  13. ON EXPERIENCE OF THE ELECTRONIC DOCUMENT MANAGEMENT SYSTEM IMPLEMENTATION IN THE MEDICAL UNIVERSITY

    Directory of Open Access Journals (Sweden)

    A. V. Semenets

    2015-05-01

    Full Text Available An importance of the application of the electronic document management to the Ukraine healthcare is shown. The electronic document management systems market overview is presented. Example of the usage of the open-source electronic document management system in the Ternopil State Medical University by I. Ya. Horbachevsky is shown. The implementation capabilities of the electronic document management system within a cloud services are shown. The electronic document management features of the Microsoft Office 365 and Google Apps For Education are compared. Some results of the usage of the Google Apps For Education inTSMUas electronic document management system are presented.

  14. Red Storm usage model :Version 1.12.

    Energy Technology Data Exchange (ETDEWEB)

    Jefferson, Karen L.; Sturtevant, Judith E.

    2005-12-01

    Red Storm is an Advanced Simulation and Computing (ASC) funded massively parallel supercomputer located at Sandia National Laboratories (SNL). The Red Storm Usage Model (RSUM) documents the capabilities and the environment provided for the FY05 Tri-Lab Level II Limited Availability Red Storm User Environment Milestone and the FY05 SNL Level II Limited Availability Red Storm Platform Milestone. This document describes specific capabilities, tools, and procedures to support both local and remote users. The model is focused on the needs of the ASC user working in the secure computing environments at Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and SNL. Additionally, the Red Storm Usage Model maps the provided capabilities to the Tri-Lab ASC Computing Environment (ACE) requirements. The ACE requirements reflect the high performance computing requirements for the ASC community and have been updated in FY05 to reflect the community's needs. For each section of the RSUM, Appendix I maps the ACE requirements to the Limited Availability User Environment capabilities and includes a description of ACE requirements met and those requirements that are not met in that particular section. The Red Storm Usage Model, along with the ACE mappings, has been issued and vetted throughout the Tri-Lab community.

  15. An Intelligent System for Document Retrieval in Distributed Office Environments.

    Science.gov (United States)

    Mukhopadhyay, Uttam; And Others

    1986-01-01

    MINDS (Multiple Intelligent Node Document Servers) is a distributed system of knowledge-based query engines for efficiently retrieving multimedia documents in an office environment of distributed workstations. By learning document distribution patterns and user interests and preferences during system usage, it customizes document retrievals for…

  16. pBEAM Documentation: Release 0.1.0

    Energy Technology Data Exchange (ETDEWEB)

    Ning, S. A. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2013-09-01

    The Polynomial Beam Element Analysis Module (pBEAM) is a finite element code for beam-like structures. It was originally written to analyze tower/monopiles and rotor blades of wind turbines but can be used for any beam-like structure. This document discusses installation, usage, and documentation of the module.

  17. On semasiological princiles of constructing and usage of medical eponyms in Spanish, English and Russian languages

    Directory of Open Access Journals (Sweden)

    Михаил Юрьевич Чернышов

    2013-12-01

    Full Text Available The paper discusses preliminary results of a comparative onomasiological investigation related to constructing medical eponyms, which correspond to identical denotata, in Spanish, English and Russian languages. Pragmatic and social-cultural (ethic motives of generation, extensive usage and variations of both eponyms and their acronym forms as the tools for renewal of the respective terminological systems are explained. The principle of usage (not usage of proper names in medical terms has been revealed. A discovery of interaction between the pragmatic motivation and the social-cultural motivation is described.

  18. LHCb Computing Resource usage in 2017

    CERN Document Server

    Bozzi, Concezio

    2018-01-01

    This document reports the usage of computing resources by the LHCb collaboration during the period January 1st – December 31st 2017. The data in the following sections have been compiled from the EGI Accounting portal: https://accounting.egi.eu. For LHCb specific information, the data is taken from the DIRAC Accounting at the LHCb DIRAC Web portal: http://lhcb-portal-dirac.cern.ch.

  19. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  20. Software documentation for TRU certification program

    International Nuclear Information System (INIS)

    CLINTON, R.

    1999-01-01

    The document provides validation information for software used to support TRU operational activities. Calculations were performed using a spreadsheet application. This document provides information about the usage of the software application, Microsoft(reg s ign) Excel. Microsoft(reg s ign) Excel spreadsheets were used to perform specific calculations to determine the amount of containers to visually examine and to perform analyses on container head-gas data. Contained in this document are definitions of formulas and variables with relation to the Excel codes used. Also, a demonstration is provided using predetermined values to obtain predetermined results

  1. Electronic Document Management Using Inverted Files System

    Science.gov (United States)

    Suhartono, Derwin; Setiawan, Erwin; Irwanto, Djon

    2014-03-01

    The amount of documents increases so fast. Those documents exist not only in a paper based but also in an electronic based. It can be seen from the data sample taken by the SpringerLink publisher in 2010, which showed an increase in the number of digital document collections from 2003 to mid of 2010. Then, how to manage them well becomes an important need. This paper describes a new method in managing documents called as inverted files system. Related with the electronic based document, the inverted files system will closely used in term of its usage to document so that it can be searched over the Internet using the Search Engine. It can improve document search mechanism and document save mechanism.

  2. Electronic Document Management Using Inverted Files System

    Directory of Open Access Journals (Sweden)

    Suhartono Derwin

    2014-03-01

    Full Text Available The amount of documents increases so fast. Those documents exist not only in a paper based but also in an electronic based. It can be seen from the data sample taken by the SpringerLink publisher in 2010, which showed an increase in the number of digital document collections from 2003 to mid of 2010. Then, how to manage them well becomes an important need. This paper describes a new method in managing documents called as inverted files system. Related with the electronic based document, the inverted files system will closely used in term of its usage to document so that it can be searched over the Internet using the Search Engine. It can improve document search mechanism and document save mechanism.

  3. Radiation exposure usage accountability and impact with respect to ALAP (ALARA) analysis

    International Nuclear Information System (INIS)

    Williams, M.C.

    1978-01-01

    A unique method has been developed for radiation exposure usage accounting at the N Reactor. This method accounts for exposure usage by specific job and working crafts. The accounting system provides information for use in job planning, exposure resource management, and ALAP (ALARA) analysis. It provides justification for ALAP expenditures, documentation of the effectiveness of exposure reduction efforts, and can be used to establish priorities for ALAP efforts

  4. Split Personality: Assessing the Potential for Organizational Identity in Reinforcing U.S. Military Jointness

    Science.gov (United States)

    2015-07-17

    of Identity ...........................................................................................................36 Hybrid -Organizational...force through a theoretical lens, developing a working understanding of military identity. Analysis of the environment will illustrate the hybrid ... departmental civilians, and contractors in the DoD’s employ, and is consistent with CJCS usage. Joint Force. The Joint Force describes a notional

  5. Performance assurance of the re-applying project documentation

    Science.gov (United States)

    Kozlova, Olga

    2017-10-01

    Usage of the re-applying project documentation is cost effective measure. Saving of budgetary funds for purchases for development of new project documentation occurs by means of it. It also becomes possible to consider better decisions and prevent the repetition of mistakes. Nowadays, state authorities in construction management are forming separate institute for re-applying project documentation. The article shows the main tasks of such events and the issues to be solved for achievement of a high positive result.

  6. Best Entry Points for Structured Document Retrieval - Part II: Types, Usage and Effectiveness

    DEFF Research Database (Denmark)

    Reid, Jane; Lalmas, Mounia; Finesilver, Karen

    2006-01-01

    Structured document retrieval makes use of document components as the basis of the retrieval process, rather than complete documents. The inherent relationships between these components make it vital to support users' natural browsing behaviour in order to offer effective and efficient access...

  7. "Heinrich events" (& sediments): A history of terminology and recommendations for future usage

    Science.gov (United States)

    Andrews, John T.; Voelker, Antje H. L.

    2018-05-01

    We document the history of terms used to describe Heinrich (H-) layers and events and which mark major glaciological iceberg discharge events in the North Atlantic. We argue that the usage "Heinrich layer," "Heinrich zone", or "Heinrich event" should be restricted to only those sediments that can be ascribed to an origin from the Hudson Strait Ice Stream and the Laurentide Ice Sheet. We also argue that the commonplace understanding of these events--as dominated by massive iceberg discharges --fails to include the earlier well-documented evidence that these events were also massive meltwater events linked to deposition along the North Atlantic Mid-Ocean Channel (NAMOC) in the Labrador Sea. We make five recommendations for future usage of "Heinrich events," which include: restricting the usage to those events that can be mineralogically/geochemically linked to Hudson Strait; abandoning the term "Heinrich stadial"; and promote local terminology for "ice rafted events" that may be correlated, or not, with Hudson Strait Heinrich events based on calibrated radiocarbon dates or other appropriate chronological markers.

  8. NILDE, Network Inter Library Document Exchange: An Italian Document Delivery System

    Science.gov (United States)

    Brunetti, F.; Gasperini, A.; Mangiaracina, S.

    2007-10-01

    This poster presents NILDE, a document delivery system supporting the exchange of documents via the internet. The system has been set up by the Central Library of the National Research Council of Bologna (Italy) in order to make use of new internet technology, to promote cooperation between Italian university libraries and research libraries, and to achieve quick response times in satisfying DD requests. The Arcetri Astrophysical Observatory Library was the first astronomical library to join the NILDE project from its earliest days in 2002. Many were the reasons for this choice: automation of the DD processes, security and reliability of the network, creation of usage statistics and reports, reduction of DD System management costs and so on. This work describes the benefits of NILDE and discusses the role of an organized document delivery system as an important tool to cope with the difficult constraints of the publishing market.

  9. Porflow Capabilities, Usage, History, and Testing

    International Nuclear Information System (INIS)

    Collard, L.B.

    1998-05-01

    To support closure of the Savannah River Site High Level Waste tanks, the PORFLOW computer program is being applied to predict long term movement of residual contaminants from the tanks. The PORFLOW program has greater capabilities than simpler programs that have been used previously, and PORFLOW results have been accepted by state and federal regulators throughout the United States. This document briefly discusses the PORFLOW capabilities and presents lists of reports showing PORFLOW's usage history and testing

  10. North Carolina – Sexual Orientation and Gender Identity Law and Documentation of Discrimination

    OpenAIRE

    Sears, Brad

    2009-01-01

    North Carolina law provides virtually no protection for public employees against job discrimination on the basis of gender identity or sexual orientation. No state-wide statute has been enacted in North Carolina to prohibit discrimination in employment on the basis of sexual orientation or gender identity. Also, little judicial or administrative action surrounding discrimination on the basis of sexual orientation or gender identity in the employment context or otherwise appears to exist.

  11. Web Approach for Ontology-Based Classification, Integration, and Interdisciplinary Usage of Geoscience Metadata

    Directory of Open Access Journals (Sweden)

    B Ritschel

    2012-10-01

    Full Text Available The Semantic Web is a W3C approach that integrates the different sources of semantics within documents and services using ontology-based techniques. The main objective of this approach in the geoscience domain is the improvement of understanding, integration, and usage of Earth and space science related web content in terms of data, information, and knowledge for machines and people. The modeling and representation of semantic attributes and relations within and among documents can be realized by human readable concept maps and machine readable OWL documents. The objectives for the usage of the Semantic Web approach in the GFZ data center ISDC project are the design of an extended classification of metadata documents for product types related to instruments, platforms, and projects as well as the integration of different types of metadata related to data product providers, users, and data centers. Sources of content and semantics for the description of Earth and space science product types and related classes are standardized metadata documents (e.g., DIF documents, publications, grey literature, and Web pages. Other sources are information provided by users, such as tagging data and social navigation information. The integration of controlled vocabularies as well as folksonomies plays an important role in the design of well formed ontologies.

  12. Young, black, and connected: Facebook usage among African American college students.

    Science.gov (United States)

    Lee, E Bun

    2012-01-01

    This article examines the extent and intensity of Facebook usage among African American college students and investigates their reasons for using Facebook. As expected, 98% of students in the survey had a Facebook account, and a large number of Facebook “friends.” Younger users spent significantly more time on Facebook than older ones. Our findings underscore the importance of cultural influence for African American online users. Displaying photographs and personal interests on Facebook signals racial identity among African American college students. Personality traits, such as self-esteem, trust in people, satisfaction with university life, and racial identity, were not significant predictors on the time spent on Facebook.

  13. Brand Identity Development and the Role of Marketing Communications: Brand Experts’ View

    OpenAIRE

    Nusa Petek; Maja Konecnik Ruzzier

    2013-01-01

    Recently academics outlined the importance of brand relationships and brand experiences as building blocks of brand identities. New marketing communication tools, which enable interactions and consumer engagement, are among the most important tools mentioned for strengthening brand relationships and enhancing brand experiences by academics. Therefore the paper analyses the understanding of brand identity building blocks by brand experts and their usage of new marketing communication tools. Tw...

  14. Archival classification: new usage scenarios among semantic web and traditio of digital samples

    Directory of Open Access Journals (Sweden)

    Alessandro Alfier

    2017-05-01

    Full Text Available Starting from the acknowledgement of the basic purpose assigned by tradition to classification within documents management, the article faces the issues related to new needs and usage, related to the digital scenarios, that would allow classification to consolidate its tradition of effectiveness in a new digital environment. The key point of the article is represented by the in-depth analysis of the possible synergies between classification-related activities and the International Standard for Describing Functions (ISDF, developed by ICA in 2007. The article highlights how an approach to classification elaborated from the ISDF perspective allows classification itself to enrich from purposes and semantic web related usage, and with the traditio of digital documents.

  15. Connecticut – Sexual Orientation and Gender Identity Law and Documentation of Discrimination

    OpenAIRE

    Sears, Brad

    2009-01-01

    A Connecticut statute bans employment discrimination on the basis of sexual orientation. No Connecticut statutes prohibit discrimination on the basis of gender identity or expression. In November 2000, the Connecticut Commission on Human Rights and Opportunities – the agency responsible for administering the anti-discrimination statutes and for processing discrimination complaints – ruled that statutes prohibiting sex discrimination also banned discrimination on the basis of gender identity. ...

  16. OER Usage by Instructional Designers and Training Managers in Corporations

    Directory of Open Access Journals (Sweden)

    Anat Cohen

    2015-12-01

    Full Text Available Since the development of Open Educational Resources (OERs, different models regarding the usage of these resources in education have appeared in the literature. Wiley’s 4-Rs model is considered to be one of the leading models. Research based on Wiley’s model shows that using materials without making changes is the most common use. Compared to the extensive literature regarding OER usage in education, the literature barely deals with OER usage by instructional designers or training managers in corporations. The purpose of this research is to examine the OER usage of these two stakeholders, distinguishing between Little and Big OER repositories, in which Little OER repositories such as YouTube and Wikipedia aren’t necessarily designed to fulfill educational purposes. Findings show that these stakeholders almost use only Little repositories and that their usage level is higher than what is documented in the literature: they mostly Revise–modify the form of the resource, and Remix–combine different resources to create new ones. These differences can be explained by the fact that materials from Little OER repositories are raw materials, requiring further editing and adjustment. Significant differences between instructional designers’ and training managers’ usage of OERs were found regarding the Reuse level of resources from internal repositories and the Google Images repository, and the frequency of this Reuse.

  17. Considérations sur la Nécessité d’introduction des Dates Biométriques dans les Documents de Voyage

    Directory of Open Access Journals (Sweden)

    Bogdan Ciucă

    2009-06-01

    Full Text Available Identity theft has become a growth industry and organized crime threatens to trigger tradedisputes between countries of the world. Forgery of administrative documents, in particular paymentinstruments, documents of identity and travel documents are used for national and transnational criminalactivities. In the category of identity papers and travel bulletins are included identity, identity cards andpassports. The common goal of the biometric identification is followed to prevent the entry into theterritory of the States of the terrorists, drug traffickers, counterfeit cards, identity documents and travel.

  18. Some aspects of programmable digital systems usage in nuclear power plants

    International Nuclear Information System (INIS)

    Mandic, D.; Smolej, M.; Sucic, B.

    2004-01-01

    During the operation of the NPP Krsko - NEK and other nuclear power plants, it has been recognized that certain issues related to the usage of digital equipment and associated software in NPP technological process protection, control and monitoring, are usually not adequately addressed in the existing programs and procedures. Moreover, often the problems related to the programmable digital systems usage are not understood correctly, which means that they can not be treated properly. Owing to the specifics of the programmable digital systems usage they have to be treated in a different way than other plant equipment and related documentation. The term as well as the process of Process Computers Configuration Control was introduced to control, among other issues, three 10CFR50 Appendix B quality requirements related to the Process Computers application in NPP: Design Control, Document Control, Identification and Control of Materials, Parts and Components. Based on the experience from NEK and published experience from other NPP and other organizations, this paper sheds light on specifics of the programmable digital systems usage in nuclear power plants. The wording Programmable Digital Systems was used rather than Process Computers, to emphasize wide area of applicability of this term: from simple digital components with burned-in programs to the PLC (Programmable Logic Controllers) and large process computer systems. In order to satisfy requirements of the Process Computer Configuration Control, specific characteristics and specific problems related to the usage of programmable digital systems require specific treatment of these issues. This paper describes those specific characteristics and traditional misunderstandings, false beliefs, false expectations and common errors that are most frequently committed in the life cycle of the programmable digital systems, as well as consequences and problems that could develop. The paper also refers to the regulations, industry

  19. Constructing and enforcing "authentic" identity online: Facebook, real names, and non-normative identities

    OpenAIRE

    Haimson, Oliver L.; Hoffmann, Anna Lauren

    2016-01-01

    Despite the participatory and democratic promises of Web 2.0, many marginalized individuals with fluid or non-normative identities continue to struggle to represent themselves online. Facebook users, in particular, are told to use “authentic identities,” an idea reinforced throughout the site’s documentation, “real name” and other policies, and in public statements by company representatives. Facebook’s conception of authenticity and real names, however, has created problems for certain users...

  20. A blockchain-based data usage auditing architecture with enhanced privacy and availability

    OpenAIRE

    Kaaniche , Nesrine; Laurent , Maryline

    2017-01-01

    International audience; Recent years have witnessed the trend of increasingly relying on distributed infrastructures. This increased the number of reported incidents of security breaches compromising users' privacy, where third parties massively collect, process and manage users' personal data. Towards these security and privacy challenges, we combine hierarchical identity based cryptographic mechanisms with emerging blockchain infrastructures and propose a blockchain-based data usage auditin...

  1. Teaching APA Style Documentation: Discovery Learning, Scaffolding and Procedural Knowledge

    Science.gov (United States)

    Skeen, Thomas; Zafonte, Maria

    2015-01-01

    Students struggle with learning correct documentation style as found in the Publication Manual of the American Psychological Association and teachers are often at a loss for how to best instruct students in correct usage of APA style. As such, the first part of this paper discusses the current research on teaching documentation styles as well as…

  2. Perspectives on Sexual Identity Formation, Identity Practices, and Identity Transitions Among Men Who Have Sex With Men in India.

    Science.gov (United States)

    Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D

    2018-01-01

    Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.

  3. 4onse D1.3 - Project Identity Manual

    OpenAIRE

    Cannata Massimiliano; Strigaro Daniele

    2016-01-01

    This document describes the corporate identity which has been developed for the 4onse project. The corporate identity consists of logo for the overall project and templates for written and presentation materials and printed communication materials.

  4. 49 CFR 237.155 - Documents and records.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION BRIDGE SAFETY STANDARDS Documentation, Records, and Audits of Bridge Management Programs § 237.155 Documents and records. Each track owner required to implement a bridge management... protected by a security system that incorporates a user identity and password, or a comparable method, to...

  5. Interactive publications: creation and usage

    Science.gov (United States)

    Thoma, George R.; Ford, Glenn; Chung, Michael; Vasudevan, Kirankumar; Antani, Sameer

    2006-02-01

    As envisioned here, an "interactive publication" has similarities to multimedia documents that have been in existence for a decade or more, but possesses specific differentiating characteristics. In common usage, the latter refers to online entities that, in addition to text, consist of files of images and video clips residing separately in databases, rarely providing immediate context to the document text. While an interactive publication has many media objects as does the "traditional" multimedia document, it is a self-contained document, either as a single file with media files embedded within it, or as a "folder" containing tightly linked media files. The main characteristic that differentiates an interactive publication from a traditional multimedia document is that the reader would be able to reuse the media content for analysis and presentation, and to check the underlying data and possibly derive alternative conclusions leading, for example, to more in-depth peer reviews. We have created prototype publications containing paginated text and several media types encountered in the biomedical literature: 3D animations of anatomic structures; graphs, charts and tabular data; cell development images (video sequences); and clinical images such as CT, MRI and ultrasound in the DICOM format. This paper presents developments to date including: a tool to convert static tables or graphs into interactive entities, authoring procedures followed to create prototypes, and advantages and drawbacks of each of these platforms. It also outlines future work including meeting the challenge of network distribution for these large files.

  6. MRI usage in a pediatric emergency department: an analysis of usage and usage trends over 5 years

    Energy Technology Data Exchange (ETDEWEB)

    Scheinfeld, Meir H. [Montefiore Medical Center, Albert Einstein College of Medicine, Department of Radiology, Division of Emergency Radiology, Bronx, NY (United States); Moon, Jee-Young; Wang, Dan [Albert Einstein College of Medicine, Department of Epidemiology and Population Health, Bronx, NY (United States); Fagan, Michele J. [Montefiore Medical Center, Albert Einstein College of Medicine, Department of Pediatrics, Division of Emergency Medicine, Bronx, NY (United States); Davoudzadeh, Reubin [Montefiore Medical Center, Department of Radiology, Bronx, NY (United States); Taragin, Benjamin H. [Montefiore Medical Center, Albert Einstein College of Medicine, Department of Radiology, Division of Pediatric Radiology, Bronx, NY (United States)

    2017-03-15

    Magnetic resonance imaging (MRI) usage has anecdotally increased due to the principles of ALARA and the desire to Image Gently. Aside from a single abstract in the emergency medicine literature, pediatric emergency department MRI usage has not been described. Our objective was to determine whether MRI use is indeed increasing at a high-volume urban pediatric emergency department with 24/7 MRI availability. Also, we sought to determine which exams, time periods and demographics influenced the trend. Institutional Review Board exemption was obtained. Emergency department patient visit and exam data were obtained from the hospital database for the 2011-2015 time period. MRI usage data were normalized using emergency department patient visit data to determine usage rates. The z-test was used to compare MRI use by gender. The chi-square test was used to test for trends in MRI usage during the study period and in patient age. MRI usage for each hour and each weekday were tabulated to determine peak and trough usage times. MRI usage rate per emergency department patient visit was 0.36%. Headache, pain and rule-out appendicitis were the most common indications for neuroradiology, musculoskeletal and trunk exams, respectively. Usage in female patients was significantly greater than in males (0.42% vs. 0.29%, respectively, P<0.001). Usage significantly increased during the 5-year period (P<0.001). Use significantly increased from age 3 to 17 (0.011% to 1.1%, respectively, P<0.001). Sixty percent of exams were performed after-hours, the highest volume during the 10 p.m. hour and lowest between 4 a.m. and 9 a.m. MRI use was highest on Thursdays and lowest on Sundays (MRI on 0.45% and 0.22% of patients, respectively). MRI use in children increased during the study period, most notably in females, on weekdays and after-hours. (orig.)

  7. Blogging Identity: How L2 Learners Express Themselves

    Directory of Open Access Journals (Sweden)

    Kiyomi FUJII

    2015-06-01

    Full Text Available This study discusses language learning and identity, particularly pertaining to intermediate-advanced-level Japanese-language learners, focusing on their target language and identity expression through their interactions with peers and Japanese college students. When learners of Japanese express their identities while interacting with others in their target language, they feel a gap between the self-image they want to present, and the image they are capable of presenting in Japanese (Siegal, 1994, 1995, 1996. Along with adjusting their L1 and L2 usage depending on their interlocutor (Kurata 2007, learners also use different sentence-ending styles depending on the role they want to assume (Cook 2008. By conducting a case study, the present inquiry attempts to address how learners of Japanese express their identities through blog conversations, focusing on their language choice and expressions. Results suggest that participants use the formal endings for self-presentation and projection of their student and classmate identity. However, when expressing emotion some students preferred informal endings, or sentence-final particles.

  8. Integrating Condition Indicators and Usage Parameters for Improved Spiral Bevel Gear Health Monitoring

    Science.gov (United States)

    Dempsey, Paula J.; Handschuh, Robert F.; Delgado, Irebert, R.

    2013-01-01

    The objective of this study was to illustrate the importance of combining Health Usage Monitoring Systems (HUMS) data with usage monitoring system data when detecting rotorcraft transmission health. Three gear sets were tested in the NASA Glenn Spiral Bevel Gear Fatigue Rig. Damage was initiated and progressed on the gear and pinion teeth. Damage progression was measured by debris generation and documented with inspection photos at varying torque values. A contact fatigue analysis was applied to the gear design indicating the effect temperature, load and reliability had on gear life. Results of this study illustrated the benefits of combining HUMS data and actual usage data to indicate progression of damage for spiral bevel gears.

  9. ON EXPERIENCE OF THE ELECTRONIC DOCUMENT MANAGEMENT SYSTEM IMPLEMENTATION IN THE MEDICAL UNIVERSITY

    OpenAIRE

    A. V. Semenets; V. Yu. Kovalok

    2015-01-01

    An importance of the application of the electronic document management to the Ukraine healthcare is shown. The electronic document management systems market overview is presented. Example of the usage of the open-source electronic document management system in the Ternopil State Medical University by I. Ya. Horbachevsky is shown. The implementation capabilities of the electronic document management system within a cloud services are shown. The electronic document management features of the Mi...

  10. jmzIdentML API: A Java interface to the mzIdentML standard for peptide and protein identification data.

    Science.gov (United States)

    Reisinger, Florian; Krishna, Ritesh; Ghali, Fawaz; Ríos, Daniel; Hermjakob, Henning; Vizcaíno, Juan Antonio; Jones, Andrew R

    2012-03-01

    We present a Java application programming interface (API), jmzIdentML, for the Human Proteome Organisation (HUPO) Proteomics Standards Initiative (PSI) mzIdentML standard for peptide and protein identification data. The API combines the power of Java Architecture of XML Binding (JAXB) and an XPath-based random-access indexer to allow a fast and efficient mapping of extensible markup language (XML) elements to Java objects. The internal references in the mzIdentML files are resolved in an on-demand manner, where the whole file is accessed as a random-access swap file, and only the relevant piece of XMLis selected for mapping to its corresponding Java object. The APIis highly efficient in its memory usage and can handle files of arbitrary sizes. The APIfollows the official release of the mzIdentML (version 1.1) specifications and is available in the public domain under a permissive licence at http://www.code.google.com/p/jmzidentml/. © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Safety and Usage of C1-Inhibitor in Hereditary Angioedema

    DEFF Research Database (Denmark)

    Riedl, Marc A; Bygum, Anette; Lumry, William

    2016-01-01

    , international patient registry documented widespread implementation of pnfC1-INH self-administration outside of a health care setting consistent with current HAE guidelines. These real-world data revealed pnfC1-INH usage for a variety of reasons in patients with HAE and showed a high level of safety regardless...... of this study was to describe safety and usage patterns of pnfC1-INH. METHODS: A multicenter, observational, registry was conducted between 2010 and 2014 at 30 United States and 7 European sites to obtain both prospective (occurring after enrollment) and retrospective (occurring before enrollment) safety...... and usage data on subjects receiving pnfC1-INH for any reason. RESULTS: Of 343 enrolled patients, 318 received 1 or more doses of pnfC1-INH for HAE attacks (11,848 infusions) or for prophylaxis (3142 infusions), comprising the safety population. Median dosages per infusion were 10.8 IU/kg (attack treatment...

  12. FTC advertising substantiation program. Household products manufacturers. Documentation of Hakuhodo Advertising America, Inc

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    The report contains documentation in support of claims that the Toshiba Microwave Oven can cook any and all types of food satisfactorily with a 75% savings in energy usage and cost, regardless of the size of a household. (Portions of this document are not fully legible)

  13. FTC advertising substantiation program. Household products manufacturers. Documentation of Toshiba America, Inc

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    The report contains documentation in support of claims that the Toshiba Microwave Oven can cook any and all types of food satisfactorily with a 75% savings in energy usage and cost, regardless of the size of a household. (Portions of this document are not fully legible) (Color illustrations reproduced in black and white)

  14. Linguistic Modality and Female Identity in Chaucer’s Clerk’s Tale

    Directory of Open Access Journals (Sweden)

    Stadnik Katarzyna

    2016-12-01

    Full Text Available While exploring the situated nature of conceptual knowledge, the paper investigates the linguistic construction of identity relative to the language user’s sociocultural situatedness, which is regarded as a derivative of the continuity of language and culture. In this functionally-oriented study, we examine how the situatedness of the language user affects their expression of the selves, which in the article we construe in terms of social roles performed by men and women in a specific cultural community. Importantly, we claim that, although the data are historical in nature, they nevertheless help us address the problem of the elusive nature of human identity, a theme recurring in the linguistic study of subjectivity. We seek to explore the general question of experiential motivation behind the frequency patterns of linguistic usage. We illustrate the issue by referring to the historical data taken from Geoffrey Chaucer’s Clerk’s Tale. The poet’s use of selected modal verbs is contextualized in relation to the late medieval community of his present. We account for the poet’s usage of shul, mot- (in the sense ‘must’, o(ught(e, as well as mouen ‘may’, and willen, indicating the need for a more nuanced approach to the way in which the key modal notions of NECESSITY/OBLIGATION are applied in the study of linguistic modality. We thus advocate the adoption of a situated view of the abstract concepts. Furthermore, we argue that the usage patterns concerning the frequency with which the selected modal verbs are used in specific contexts of Chaucer’s narrative might be indicative of the ways in which the identity of a community member was negotiated in the late medieval society of the poet’s present. In conclusion, we indicate the challenges to present-day pragmatic research into the linguistic construction of identity. Specifically, the emphasis is laid on how findings from recent research into situated and social cognition can

  15. Divided Identity: Part-Time Faculty in Public Colleges and Universities

    Science.gov (United States)

    Levin, John S.; Montero Hernandez, Virginia

    2014-01-01

    This article addresses the identity claims of part-time faculty at three types of higher education institutions. Using culture theory and professional identity theory, the article documents that part-time faculty members across institutions have a divided sense of identity. On the one hand, they perceive themselves as professionals based on their…

  16. HIV type 1 chemokine receptor usage in mother-to-child transmission.

    Science.gov (United States)

    Salvatori, F; Scarlatti, G

    2001-07-01

    To investigate the role of the HIV-1 phenotype in mother-to-child HIV-1 transmission, we evaluated coreceptor usage and replication kinetics in chemokine receptor-expressing U87MG.CD4 cells of primary isolates from 32 HIV-1-infected mothers of Italian origin, none under preventive antiretroviral therapy, and from their infected infants. Five of 15 mothers of infected children and 2 of 17 mothers of uninfected children harbored viruses able to use CXCR4 as coreceptor. However, all isolates used CCR5, alone or in association with CXCR4. The replicative capacity in coreceptor-expressing cells of the viral isolates did not differ between the two groups of mothers. All mothers with an R5 virus transmitted a virus with the same coreceptor usage, whereas those four with a multitropic virus transmitted such a virus in one case. Although the presence of a mixed viral population was documented in the mothers, we did not observe transmission solely of X4 viruses. Interestingly, the only child infected with a multitropic virus carried a defective CCR5 allele. Analysis of the env V3 region of the provirus from this child revealed infection with multiple viral variants with a predominance of R5-type over X4-type sequences. These findings show that CCR5 usage of a viral isolate is not a discriminating risk factor for vertical transmission. Furthermore, X4 viruses can be transmitted to the newborn, although less frequently. In particular, we document the transmission of multiple viral variants with different coreceptor usage in a Delta32 CCR5 heterozygous child, and demonstrate that the heterozygous genotype per se does not contribute to the restriction of R5-type virus spread.

  17. Usage Center

    DEFF Research Database (Denmark)

    Kleinaltenkamp, Michael; Plewa, Carolin; Gudergan, Siegfried

    2017-01-01

    Purpose: The purpose of this paper is to advance extant theorizing around resourceintegration by conceptualizing and delineating the notion of a usage center. Ausage center consists of a combination of interdependent actors that draw onresources across their individual usage processes to create v...

  18. Document retrieval on repetitive string collections.

    Science.gov (United States)

    Gagie, Travis; Hartikainen, Aleksi; Karhu, Kalle; Kärkkäinen, Juha; Navarro, Gonzalo; Puglisi, Simon J; Sirén, Jouni

    2017-01-01

    Most of the fastest-growing string collections today are repetitive, that is, most of the constituent documents are similar to many others. As these collections keep growing, a key approach to handling them is to exploit their repetitiveness, which can reduce their space usage by orders of magnitude. We study the problem of indexing repetitive string collections in order to perform efficient document retrieval operations on them. Document retrieval problems are routinely solved by search engines on large natural language collections, but the techniques are less developed on generic string collections. The case of repetitive string collections is even less understood, and there are very few existing solutions. We develop two novel ideas, interleaved LCPs and precomputed document lists , that yield highly compressed indexes solving the problem of document listing (find all the documents where a string appears), top- k document retrieval (find the k documents where a string appears most often), and document counting (count the number of documents where a string appears). We also show that a classical data structure supporting the latter query becomes highly compressible on repetitive data. Finally, we show how the tools we developed can be combined to solve ranked conjunctive and disjunctive multi-term queries under the simple [Formula: see text] model of relevance. We thoroughly evaluate the resulting techniques in various real-life repetitiveness scenarios, and recommend the best choices for each case.

  19. Forensic document analysis using scanning microscopy

    Science.gov (United States)

    Shaffer, Douglas K.

    2009-05-01

    The authentication and identification of the source of a printed document(s) can be important in forensic investigations involving a wide range of fraudulent materials, including counterfeit currency, travel and identity documents, business and personal checks, money orders, prescription labels, travelers checks, medical records, financial documents and threatening correspondence. The physical and chemical characterization of document materials - including paper, writing inks and printed media - is becoming increasingly relevant for law enforcement agencies, with the availability of a wide variety of sophisticated commercial printers and copiers which are capable of producing fraudulent documents of extremely high print quality, rendering these difficult to distinguish from genuine documents. This paper describes various applications and analytical methodologies using scanning electron miscoscopy/energy dispersive (x-ray) spectroscopy (SEM/EDS) and related technologies for the characterization of fraudulent documents, and illustrates how their morphological and chemical profiles can be compared to (1) authenticate and (2) link forensic documents with a common source(s) in their production history.

  20. Implicit and Explicit Attitudes towards America in Socio Digital Influence: Trust and Social Identity in Cyberspace

    Science.gov (United States)

    2018-03-16

    AFRL-AFOSR-JP-TR-2018-0024 Implicit and Explicit Attitudes towards America in Socio-Digital Influence: Trust and Social Identity in Cyberspace James...and Explicit Attitudes towards America in Socio-Digital Influence: Trust and Social Identity in Cyberspace 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER...comprehensive survey of personality, values, institutional trust, mass media usage, and political attitudes and ideology (including a comprehensive

  1. Limited usage of mechanical equipment in small-scale rice farming: a cause for concern

    Directory of Open Access Journals (Sweden)

    Gaudiose Mujawamariya

    2017-06-01

    Full Text Available The role of mechanization in agriculture is well documented in terms of improving productivity of farm labour and land and sustaining income status and welfare of small-scale farmers. In rice production, there is a high cost associated with labour intensive production practices especially in land preparation, weeding and harvesting, the limited adoption of mechanical equipment in these operations remains an issue of concern. The current study investigates the usage of mechanical equipment in a setting where majority of farmers are exposed to technologies but cases of non-usage/adoption are observed. The choice of usage of mechanical equipment is analysed through probit and poisson models. Mechanization generally has a positive effect on production. However, the cost associated with its usage high. The equipment should be made available and affordable to farmers especially because demand for rent is not met. Awareness is essential for adoption and ease of use of mechanization.

  2. Mobile phones: time to rethink and limit usage.

    Science.gov (United States)

    Paul, Bobby; Saha, Indranil; Kumar, Sanjay; Samim Ferdows, S K; Ghose, Gautam

    2015-01-01

    Radiofrequency waves generated from mobile phones cause potential public health problems. Short-term effects like changes in sleep, heart rate, and blood pressure, and long-term effects like carcinoma are well documented. The Government of India's efforts in laying down regulations regarding the safety limits, manufacture, marketing, and mobile use are still in nascent stage. The need for stringent enforcement of laws for prevention of phone usage while driving and guidelines of medical regulatory bodies regarding rules and regulations of phone usage while at class or attending patients is of utmost importance. This should be supplemented by mass media to raise awareness among people regarding the possible health effects of radiofrequency emissions from mobile phones and the guidelines to minimize its exposure. It is the need of the hour to teach young people to be structured, to know when to have the cell phone on, and to avoid becoming the slave of technology instead of its mastery.

  3. Effectiveness of media and enforcement campaigns in increasing seat belt usage rates in a state with a secondary seat belt law.

    Science.gov (United States)

    Vasudevan, Vinod; Nambisan, Shashi S; Singh, Ashok K; Pearl, Traci

    2009-08-01

    In 2005, in terms of seat belt usage rates, Nevada ranked third nationally and first among states with secondary seat belt use enforcement laws in the United States. An effective combination of a media-based education and enforcement campaign helped in this regard. The objective of this article is to document the effectiveness of enforcement and media-based education and outreach campaigns on the seat belt usage rates in Nevada, a state with a secondary seat belt usage law. Observational data on seat belt usage and passenger fatality data are used to evaluate the effectiveness of enforcement campaigns and media-based education and outreach campaigns. Data based on observations of about 40,000 vehicles in each of the years 2003 to 2005 were analyzed. Statistical analyses show that a significant increase in seat belt usage rates among both drivers and passengers for both genders resulted from the accompanying the media and enforcement campaigns. The results from this study indicate that effective and well-planned media/enforcement campaigns can have a significant impact on seat belt usage rates even in a state where the enforcement of seat belt laws can only be as a secondary violation. They validate and expand on findings from other efforts documented in the literature. These results demonstrate that, if coordinated properly, media and enforcement campaigns work very effectively in increasing seat belt usage rates even in states with secondary seat belt laws.

  4. Feature Usage Explorer: Usage Monitoring and Visualization Tool in HTML5 Based Applications

    Directory of Open Access Journals (Sweden)

    Sarunas Marciuska

    2013-10-01

    Full Text Available Feature Usage Explorer is a JavaScript library, which automatically detects features in HTML5 based applications and monitors their usage. The collected information can be visualized in a Feature Usage Diagram, which is automatically generated from an input json file. Currently, the users of Feature Usage Explorer have to design their own tool in order to generate the json file from collected usage information. This option remains viable when using the library in order not to constraint the user’s choice of preferred data storage. Feature Usage Explorer can be reused in any HTML5 based applications where an understanding of how users interact with the system is required (i.e. user experience and usability studies, human computer interaction field, or requirement prioritization area.

  5. Competition and Social Identity in the Workplace

    DEFF Research Database (Denmark)

    Kato, Takao; Shu, Pian

    2016-01-01

    We study the impact of social identity on worker competition by exploiting the well-documented social divide between urban resident workers and rural migrant workers in urban Chinese firms. We analyze data on weekly output, individual characteristics, and coworker composition for all weavers...... in an urban Chinese textile firm during a 53-week period. The firm adopts relative performance incentives in addition to piece rates to encourage competition in the workplace. We find that social identity has a significant impact on competition: a weaver only competes against coworkers with a different social...... identity, but not against those sharing her own identity. The results are mainly driven by urban weavers competing aggressively against rural coworkers. Our results highlight the important role of social identity in mitigating or enhancing competition....

  6. 31 CFR 501.724 - Documents that may be withheld.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Documents that may be withheld. 501.724 Section 501.724 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... privileged; (2) The document would disclose the identity of a confidential source; or (3) The Administrative...

  7. Current usage and future trends in gross digital photography in Canada.

    Science.gov (United States)

    Horn, Christopher L; DeKoning, Lawrence; Klonowski, Paul; Naugler, Christopher

    2014-01-14

    The purpose of this study was to assess the current usage, utilization and future direction of digital photography of gross surgical specimens in pathology laboratories across Canada. An online survey consisting of 23 multiple choice and free-text questions regarding gross digital photography was sent out to via email to laboratory staff across Canada involved in gross dissection of surgical specimens. Sixty surveys were returned with representation from most of the provinces. Results showed that gross digital photography is utilized at most institutions (90.0%) and the primary users of the technology are Pathologists (88.0%), Pathologists' Assistants (54.0%) and Pathology residents (50.0%). Most respondents felt that there is a definite need for routine digital imaging of gross surgical specimens in their practice (80.0%). The top two applications for gross digital photography are for documentation of interesting/ complex cases (98.0%) and for teaching purposes (84.0%). The main limitations identified by the survey group are storage space (42.5%) and security issues (40.0%). Respondents indicated that future applications of gross digital photography mostly include teaching (96.6%), presentation at tumour boards/ clinical rounds (89.8%), medico-legal documentation (72.9%) and usage for consultation purposes (69.5%). The results of this survey indicate that pathology staff across Canada currently utilizes gross digital images for regular documentation and educational reasons. They also show that the technology will be needed for future applications in teaching, consultation and medico-legal purposes.

  8. The Usage of Loanwords by Japanese Learners and Their Background : case of English Native Speakers (Dedicated to the Memory of Dr. SASAKI Yoshinori)

    OpenAIRE

    堀切, 友紀子

    2010-01-01

    In the field of Teaching Japanese as a Second Language, the study of Japanese loanwords has focused on their acquisition, and Japanese loanwords tend to be an obstacle for Japanese learners. However, actual situations about loanword usage by English native speakers need to be identical. The purpose of this research is to understand the process involved in the cognition, emotion and usage of loanwords by Japanese learners. An investigatory interview was conducted with 11 Japanese learners who ...

  9. National Childcare Consumer Study: 1975. Volume IV: Supplemental Documentation.

    Science.gov (United States)

    Unco, Inc., Washington, DC.

    This document is the fourth and final report of a study sponsored by the Office of Child Development of the U.S. Department of Health, Education and Welfare to determine patterns of child care usage and related consumer preferences, attitudes and opinions about child care. The study was based on 4609 personal interviews conducted in 1975 from a…

  10. Identity as a major issue in an information society: the case for a chain approach

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    1998-01-01

    Two new developments in information technology will have a profound effect on the identity issue in our society: multifunctional smartcards and biometrics. The wide-spread use of chipcards will in the future facilitate electronic identities and identity documents. This places identity fraud in a new

  11. Ethnobotanical survey of usage of fresh medicinal plants in Singapore.

    Science.gov (United States)

    Siew, Yin-Yin; Zareisedehizadeh, Sogand; Seetoh, Wei-Guang; Neo, Soek-Ying; Tan, Chay-Hoon; Koh, Hwee-Ling

    2014-09-29

    The use of medicinal plants in human health has been documented since ancient times and they provide a useful source of new therapeutics. In Singapore, despite the accessibility to modern healthcare, there still exist pockets of the population who choose to use locally grown fresh medicinal plants for health promotion and even therapeutic purposes. However to date, there is no published report of first-hand account of their usage in Singapore. As land is scarce and rapidly used for re-development, such important knowledge may be lost if not properly documented in time. This work safeguards the local folk knowledge, and provides information on common and scarcely reported fresh medicinal plants. The objective of this study is to gather information regarding the usage of fresh medicinal plants in Singapore through face-to-face interviews. Information on demographic data and plant-use methods were collated via face-to-face interviews of 200 fresh medicinal plant users who have used fresh medicinal plants in the last five years. The survey protocol was approved by the National University of Singapore Institutional Review Board and informed consent was obtained from every participant. A total of 414 plants represented by 104 plant species from 44 families were reportedly used by the 200 participants. The five most commonly used plants were Clinacanthus nutans (34 users), Strobilanthes crispus (31 users), Pereskia bleo (25 users), Aloe vera (18 users) and Zingiber officinale (16 users). Leaves were the most commonly used plant part while preparing a decoction was the most common method of preparation. The majority of interviewees used plants for general health purposes and to treat diseases related to the respiratory system and cancer. Our survey has successfully documented the rich wealth of traditional usage and knowledge on 414 fresh medicinal plants grown in Singapore through face-to-face interviews with 200 users. This study will serve as a useful resource for

  12. Māori identity signatures: A latent profile analysis of the types of Māori identity.

    Science.gov (United States)

    Greaves, Lara M; Houkamau, Carla; Sibley, Chris G

    2015-10-01

    Māori are the indigenous peoples of New Zealand. However, the term 'Māori' can refer to a wide range of people of varying ethnic compositions and cultural identity. We present a statistical model identifying 6 distinct types, or 'Māori Identity Signatures,' and estimate their proportion in the Māori population. The model is tested using a Latent Profile Analysis of a national probability sample of 686 Māori drawn from the New Zealand Attitudes and Values Study. We identify 6 distinct signatures: Traditional Essentialists (22.6%), Traditional Inclusives (16%), High Moderates (31.7%), Low Moderates (18.7%), Spiritually Orientated (4.1%), and Disassociated (6.9%). These distinct Identity Signatures predicted variation in deprivation, age, mixed-ethnic affiliation, and religion. This research presents the first formal statistical model assessing how people's identity as Māori is psychologically structured, documents the relative proportion of these different patterns of structures, and shows that these patterns reliably predict differences in core demographics. We identify a range of patterns of Māori identity far more diverse than has been previously proposed based on qualitative data, and also show that the majority of Māori fit a moderate or traditional identity pattern. The application of our model for studying Māori health and identity development is discussed. (c) 2015 APA, all rights reserved).

  13. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    Science.gov (United States)

    2017-03-01

    17-254 Identity Theft Services standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to... audited financial statements. Page 34 GAO-17-254 Identity Theft Services Although the websites of many identity theft services ...reasonable assurance that significant decisions on the use of identity theft services are appropriately documented. We provided a draft of this

  14. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    Science.gov (United States)

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.

  15. Avec Orima - Designing the brand identity

    OpenAIRE

    Nguyen Le Quynh, Nga; Carvalho, Maria Clara da Costa

    2016-01-01

    The thesis is a document in building the brand image for the authors’ own start-up Avec Orima. It is motivated by the need to take the company from the planning stage to the next very first step of implementing the business – designing the company’s brand identity. The thesis focused on the process of designing the brand identity. The process began with analysing the company and Finnish target market to have the insights on what the company stands for and wants to achieve. The study then ...

  16. Mobile user identity sensing using the motion sensor

    Science.gov (United States)

    Zhao, Xi; Feng, Tao; Xu, Lei; Shi, Weidong

    2014-05-01

    Employing mobile sensor data to recognize user behavioral activities has been well studied in recent years. However, to adopt the data as a biometric modality has rarely been explored. Existing methods either used the data to recognize gait, which is considered as a distinguished identity feature; or segmented a specific kind of motion for user recognition, such as phone picking-up motion. Since the identity and the motion gesture jointly affect motion data, to fix the gesture (walking or phone picking-up) definitively simplifies the identity sensing problem. However, it meanwhile introduces the complexity from gesture detection or requirement on a higher sample rate from motion sensor readings, which may draw the battery fast and affect the usability of the phone. In general, it is still under investigation that motion based user authentication in a large scale satisfies the accuracy requirement as a stand-alone biometrics modality. In this paper, we propose a novel approach to use the motion sensor readings for user identity sensing. Instead of decoupling the user identity from a gesture, we reasonably assume users have their own distinguishing phone usage habits and extract the identity from fuzzy activity patterns, represented by a combination of body movements whose signals in chains span in relative low frequency spectrum and hand movements whose signals span in relative high frequency spectrum. Then Bayesian Rules are applied to analyze the dependency of different frequency components in the signals. During testing, a posterior probability of user identity given the observed chains can be computed for authentication. Tested on an accelerometer dataset with 347 users, our approach has demonstrated the promising results.

  17. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  18. Developing hospital identity manuals: a reference tool for illustrators.

    Science.gov (United States)

    Schaffer, J A; Zimmerman, S B

    1990-01-01

    Because of an increase in hospital marketing efforts, medical illustrators may be asked to assist in developing and implementing hospital identity manuals, which specify the graphic standards for visual communications media. A checklist survey of existing identity manuals and a literature review were conducted by one of the authors, a medical illustrator, to help her to develop a manual for her hospital employer. This article documents the literature review, the study, and the identity manual development, and presents recommendations to help other medical illustrators who might become involved in similar assignments.

  19. "Being Asian American Is a Lot Different Here": Influences of Geography on Racial Identity

    Science.gov (United States)

    Chan, Jason

    2017-01-01

    Studies on college students' racial identities seldom focus on geographic context, despite existing research documenting its role in how racial groups construct and express racial identities. Drawing on theories of ecological systems and racial formation, I explored experiences of race and racial identity among 10 Asian American students who…

  20. Media Effects on Ethnic Identity among Linguistic Majorities and Minorities: A Longitudinal Study of a Bilingual Setting

    Science.gov (United States)

    Clement, Richard; Baker, Susan C.; Josephson, Gordon; Noels, Kimberly A.

    2005-01-01

    Research on media effects has documented the media's influence on beliefs and behavior while cross-cultural psychology has documented the effects of the language used in communication on identification with the ingroup and the outgroup. Media usage in the outgroup language should, therefore, affect identification patterns. This research…

  1. Vermont – Sexual Orientation and Gender Identity Law and Documentation of Discrimination

    OpenAIRE

    Sears, Brad

    2009-01-01

    In 1992, the State of Vermont passed a comprehensive statewide law prohibiting discrimination on the basis of sexual orientation, which is defined as “female or male homosexuality, heterosexuality, or bisexuality.” Protection with respect to gender identity was added in May 2007. Vermont’s Human Rights Law prohibits discrimination on the basis of sexual orientation in areas such as employment, housing, and education.

  2. Co-Constructed Identities and Literacy Practices: How Identities of One Teacher and Her First Grade Students Are Enacted and Co-Constructed through Literacy Practices and a Third Space

    Science.gov (United States)

    Ramlal, Sasha R.

    2014-01-01

    This dissertation explored how identities of students and a teacher in a first grade classroom were co-constructed through various literacy practices and within a third space. Drawing on research that documented the strong connection between literacy and identity and its socio-cultural connections, this qualitative study incorporates ethnographic…

  3. Fashion blogs: a study on how consumers’ attitude to fashion is influenced through fashion blog usage.

    OpenAIRE

    Hauge, Tone

    2010-01-01

    This thesis study: How consumers’ attitudes to fashion are influenced by fashion blog usage. Identifying some characteristics of the a-list fashion bloggers. The variables that are assumed to influence the domain of fashion blogs are expertise, authenticity, authority, social identity, private- and social self image. Fashion blogs was found to be an important source of influence, for some taking over the role of fashion magazines. All the variables studied were foun...

  4. Positive selection for unpreferred codon usage in eukaryotic genomes

    Directory of Open Access Journals (Sweden)

    Galagan James E

    2007-07-01

    Full Text Available Abstract Background Natural selection has traditionally been understood as a force responsible for pushing genes to states of higher translational efficiency, whereas lower translational efficiency has been explained by neutral mutation and genetic drift. We looked for evidence of directional selection resulting in increased unpreferred codon usage (and presumably reduced translational efficiency in three divergent clusters of eukaryotic genomes using a simple optimal-codon-based metric (Kp/Ku. Results Here we show that for some genes natural selection is indeed responsible for causing accelerated unpreferred codon substitution, and document the scope of this selection. In Cryptococcus and to a lesser extent Drosophila, we find many genes showing a statistically significant signal of selection for unpreferred codon usage in one or more lineages. We did not find evidence for this type of selection in Saccharomyces. The signal of positive selection observed from unpreferred synonymous codon substitutions is coincident in Cryptococcus and Drosophila with the distribution of upstream open reading frames (uORFs, another genic feature known to reduce translational efficiency. Functional enrichment analysis of genes exhibiting low Kp/Ku ratios reveals that genes in regulatory roles are particularly subject to this type of selection. Conclusion Through genome-wide scans, we find recent selection for unpreferred codon usage at approximately 1% of genetic loci in a Cryptococcus and several genes in Drosophila. Unpreferred codons can impede translation efficiency, and we find that genes with translation-impeding uORFs are enriched for this selection signal. We find that regulatory genes are particularly likely to be subject to selection for unpreferred codon usage. Given that expression noise can propagate through regulatory cascades, and that low translational efficiency can reduce expression noise, this finding supports the hypothesis that translational

  5. Use of an advanced document system in post-refuelling updating of nuclear power plant documentation

    International Nuclear Information System (INIS)

    Puech Suanzes, P.; Cortes Soler, M.

    1993-01-01

    This paper discusses the results of the extensive use of an advanced document system to update documentation prepared by traditional methods and affected by changes in the period between two plant refuellings. The implementation of a system for the capture, retrieval and storage of drawings using optical discs is part of a plan to modernize production and management tools and to thus achieve better control of document configuration. These processes are consequently optimized in that: 1. The deterioration of drawings is detained with the help of an identical, updated, legible, reliable support for all users. 2. The time required to update documentation is reduced. Given the large number of drawings, the implementation method should effectively combine costs and time. The document management tools ensure optical disc storage control so that from the moment a drawing resides in the system, any modification to it is made through the system utilities, thus ensuring quality and reducing schedules. The system described was used to update the electrical drawings of Almaraz Nuclear Power Plant. Changes made during the eighth refuelling of Unit I were incorporated and the time needed to issue the updated drawings was reduced by one month. (author)

  6. Identity management for e-government Libya as a case study

    DEFF Research Database (Denmark)

    Elaswad, Othoman; Jensen, Christian D.

    2016-01-01

    Governments are strengthening their identity (ID) management strategies to deliver new and improved online services to their citizens. Such online services typically include applications for different types of permissions, requests for different types of official documents and management...... of different types of entitlements. The ID management scheme must therefore be able to correctly authenticate citizens and link online presence to real world identities....

  7. 2011 Radioactive Materials Usage Survey for Unmonitored Point Sources

    Energy Technology Data Exchange (ETDEWEB)

    Sturgeon, Richard W. [Los Alamos National Laboratory

    2012-06-27

    organized. The RMUS Interview Form with the attached RMUS Process Form(s) provides the radioactive materials survey data by technical area (TA) and building number. The survey data for each release point includes information such as: exhaust stack identification number, room number, radioactive material source type (i.e., potential source or future potential source of air emissions), radionuclide, usage (in curies) and usage basis, physical state (gas, liquid, particulate, solid, or custom), release fraction (from Appendix D to 40 CFR 61, Subpart H), and process descriptions. In addition, the interview form also calculates emissions (in curies), lists mrem/Ci factors, calculates PEDEs, and states the location of the critical receptor for that release point. [The critical receptor is the maximum exposed off-site member of the public, specific to each individual facility.] Each of these data fields is described in this section. The Tier classification of release points, which was first introduced with the 1999 usage survey, is also described in detail in this section. Section 4 includes a brief discussion of the dose estimate methodology, and includes a discussion of several release points of particular interest in the CY 2011 usage survey report. It also includes a table of the calculated PEDEs for each release point at its critical receptor. Section 5 describes ES's approach to Quality Assurance (QA) for the usage survey. Satisfactory completion of the survey requires that team members responsible for Rad-NESHAP (National Emissions Standard for Hazardous Air Pollutants) compliance accurately collect and process several types of information, including radioactive materials usage data, process information, and supporting information. They must also perform and document the QA reviews outlined in Section 5.2.6 (Process Verification and Peer Review) of ES-RN, 'Quality Assurance Project Plan for the Rad-NESHAP Compliance Project' to verify that all information is

  8. Security and Privacy Improvements for the Belgian eID Technology

    Science.gov (United States)

    Verhaeghe, Pieter; Lapon, Jorn; de Decker, Bart; Naessens, Vincent; Verslype, Kristof

    The Belgian Electronic Identity Card enables Belgian citizens to prove their identity digitally and to sign electronic documents. At the end of 2009, every Belgian citizen older than 12 years will have such an eID card. In the future, usage of the eID card may be mandatory. However, irresponsible use of the card may cause harm to individuals.

  9. Improved Optical Document Security Techniques Based on Volume Holography and Lippmann Photography

    Science.gov (United States)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, ID cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is need for a higher degree of security on such documents and this chapter covers new techniques to make improved mass-produced or personalized OVDs.

  10. New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography

    Science.gov (United States)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, identification cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is a need for a higher degree of security on such documents and this chapter covers new techniques to make personalized OVDs.

  11. The role of the document delivery service at an evolving research library in Saudi Arabia

    KAUST Repository

    Vijayakumar, J.K.

    2015-01-01

    Design/methodology/approach – To collect the responses of document delivery service users, an online questionnaire was used with 12 multiple-choice questions and two open-ended questions. The questionnaires were sent only to the users of this service, and the responses were collected anonymously. Two surveys were conducted, in 2010 and 2013, with the same questions. The responses are displayed graphically prepared to compare the results. There were 71 responses in 2010 and 95 in 2013. Findings – In both surveys, the majority of users rated the service, staff behaviour, speed, quality, etc. with a high satisfaction level. Document delivery order statistics are a major decision-making tool, in addition to usage analysis, for developing a better, economical and highly utilized collection in brand new libraries. delivery order statistics are a major decision-making tool, in addition to usage analysis, for developing a better, economical and highly utilized collection in brand new libraries. Originality/value – This is the first published study of user perception of document delivery in Saudi Arabia.

  12. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Science.gov (United States)

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  13. Differences in smartphone usage

    DEFF Research Database (Denmark)

    Gustarini, Mattia; Scipioni, Marcello Paolo; Fanourakis, Marios

    2016-01-01

    We analyze the users’ intimacy to investigate the differences in smartphone usage, considering the user’s location and number and kind of people physically around the user. With a first user study we (1) validate the intimacy concept, (2) evaluate its correlation to smartphone usage features and ...

  14. Integration of clinical research documentation in electronic health records.

    Science.gov (United States)

    Broach, Debra

    2015-04-01

    Clinical trials of investigational drugs and devices are often conducted within healthcare facilities concurrently with clinical care. With implementation of electronic health records, new communication methods are required to notify nonresearch clinicians of research participation. This article reviews clinical research source documentation, the electronic health record and the medical record, areas in which the research record and electronic health record overlap, and implications for the research nurse coordinator in documentation of the care of the patient/subject. Incorporation of clinical research documentation in the electronic health record will lead to a more complete patient/subject medical record in compliance with both research and medical records regulations. A literature search provided little information about the inclusion of clinical research documentation within the electronic health record. Although regulations and guidelines define both source documentation and the medical record, integration of research documentation in the electronic health record is not clearly defined. At minimum, the signed informed consent(s), investigational drug or device usage, and research team contact information should be documented within the electronic health record. Institutional policies should define a standardized process for this integration in the absence federal guidance. Nurses coordinating clinical trials are in an ideal position to define this integration.

  15. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  16. [Exploring nurse, usage effectiveness of mobile nursing station].

    Science.gov (United States)

    Chang, Fang-Mei; Lee, Ting-Ting

    2013-04-01

    A mobile nursing station is an innovative cart that integrates a wireless network, information technology devices, and online charts. In addition to improving clinical work and workflow efficiencies, data is integrated among different information systems and hardware devices to promote patient safety. This study investigated the effectiveness of mobile nursing cart use. We compared different distributions of nursing activity working samples to evaluate the nursing information systems in terms of interface usability and usage outcomes. There were two parts of this study. Part one used work sampling to collect nursing activity data necessary to compare a unit that used a mobile nursing cart (mobile group, n = 18) with another that did not (traditional group, n = 14). Part two applied a nursing information system interface usability questionnaire to survey the mobile unit with nurses who had used a mobile nursing station (including those who had worked in this unit as floating nurses) (n = 30) in order to explore interface usability and effectiveness. We found that using the mobile nursing station information system increased time spent on direct patient care and decreased time spent on indirect patient care and documentation. Results further indicated that participants rated interface usability as high and evaluated usage effectiveness positively. Comments made in the open-ended question section raised several points of concern, including problems / inadequacies related to hardware devices, Internet speed, and printing. This study indicates that using mobile nursing station can improve nursing activity distributions and that nurses hold generally positive attitudes toward mobile nursing station interface usability and usage effectiveness. The authors thus encourage the continued implementation of mobile nursing stations and related studies to further enhance clinical nursing care.

  17. Gender discrimination and social identity: experimental evidence from urban Pakistan

    OpenAIRE

    Delavande, Adeline; Zafar, Basit

    2013-01-01

    Gender discrimination in South Asia is a well-documented fact. However, gender is only one of an individual's many identities. This paper investigates how gender discrimination depends on the social identities of interacting parties. We use an experimental approach to identify gender discrimination by randomly matching 2,836 male and female students pursuing bachelor's-equivalent degrees in three different types of institutions - Madrassas (religious seminaries), Islamic universities, and lib...

  18. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns

    OpenAIRE

    Soo-Hyun Paik; Hyun Cho; Ji-Won Chun; Jo-Eun Jeong; Dai-Jin Kim

    2017-01-01

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smart...

  19. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  20. D Visualization of a Timber Frame Historic Building: Partite Usage and its Impact on the Structural System

    Science.gov (United States)

    Günay, S.

    2017-08-01

    Throughout their lifetime, historic buildings might be altered for different kind of usage for different purposes. If this new function or new usage requires utilization of the building in separate units, this separation might affect the historic building's functionality and structure and as a result its overall condition. Yorguc Pasa Mansion conservation project was prepared as a part of the Middle East Technical University (METU) Master's Program in Documentation and Conservation of Historic Monuments and Sites for the historic Yorguc Pasa Mansion. The mansion is a 19th century Ottoman Period timber frame building in Amasya, a Black Sea Region city in Turkey that has traces from different civilizations such as Hittites, Greeks, Romans and Ottomans. This paper aims to discuss the affects of the partite usage on structural conditions of timber frame buildings with the case study of Amasya Yorguc Pasa Mansion through the 3D visualized structural systems.

  1. [Usage of antibiotics in hospitals].

    Science.gov (United States)

    Ternák, G; Almási, I

    1996-12-29

    The authors publish the results of a survey conducted among hospital records of patients discharged from eight inpatient's institutes between 1-31st of January 1995 to gather information on the indications and usage of antibiotics. The institutes were selected from different part of the country to represent the hospital structure as much as possible. Data from the 13,719 documents were recorded and analysed by computer program. It was found that 27.6% of the patients (3749 cases) received antibiotic treatment. 407 different diagnosis and 365 different surgical procedures (as profilaxis) were considered as indications of antibiotic treatment (total: 4450 indications for 5849 antibiotic treatment). The largest group of patients receiving antibiotics was of antibiotic profilaxis (24.56%, 1093 cases), followed by lower respiratory tract infections (19.89%, 849 cases), uroinfections (10.53%, 469 cases) and upper respiratory tract infections. Relatively large group of patients belonged to those who had fever or subfebrility without known reason (7.35%, 327 cases) and to those who did not have any proof in their document indicating the reasons of antibiotic treatment (6.4%, 285 cases). We can not consider the antibiotic indications well founded in those groups of patients (every sixth or every fifth cases). The most frequently used antibiotics were of [2-nd] generation cefalosporins. The rate of nosocomial infections were found as 6.78% average. The results are demonstrated on diagrams and table.

  2. Use of an advanced document system in post-refuelling updating of nuclear power plant documentation; Utilizacion de un sistema documental avanzado en la actualizacion de documentacion post recarga

    Energy Technology Data Exchange (ETDEWEB)

    Puech Suanzes, P; Cortes Soler, M [Empresarios Agrupados, A.I.E., Madrid (Spain)

    1993-12-15

    This paper discusses the results of the extensive use of an advanced document system to update documentation prepared by traditional methods and affected by changes in the period between two plant refuellings. The implementation of a system for the capture, retrieval and storage of drawings using optical discs is part of a plan to modernize production and management tools and to thus achieve better control of document configuration. These processes are consequently optimized in that: 1. The deterioration of drawings is detained with the help of an identical, updated, legible, reliable support for all users. 2. The time required to update documentation is reduced. Given the large number of drawings, the implementation method should effectively combine costs and time. The document management tools ensure optical disc storage control so that from the moment a drawing resides in the system, any modification to it is made through the system utilities, thus ensuring quality and reducing schedules. The system described was used to update the electrical drawings of Almaraz Nuclear Power Plant. Changes made during the eighth refuelling of Unit I were incorporated and the time needed to issue the updated drawings was reduced by one month. (author)

  3. Smartphone Usage Patterns by Canadian Neurosurgery Residents: A National Cross-Sectional Survey.

    Science.gov (United States)

    Kameda-Smith, Michelle Masayo; Iorio-Morin, Christian; Winkler-Schwartz, Alexander; Ahmed, Uzair S; Bergeron, David; Bigder, Mark; Dakson, Ayoub; Elliott, Cameron A; Guha, Daipayan; Lavergne, Pascal; Makarenko, Serge; Taccone, Michael S; Tso, Michael; Wang, Bill; Fortin, David

    2018-03-01

    Smartphones and their apps are used ubiquitously in medical practice. However, in some cases their use can be at odds with current patient data safety regulations such as Canada's Personal Health Information Protection Act of 2004. To assess current practices and inform mobile application development, we sought to better understand mobile device usage patterns among Canadian neurosurgery residents. Through the Canadian Neurosurgery Research Collaborative, an online survey characterizing smartphone ownership and usage patterns was developed and sent to all Canadian neurosurgery resident in April of 2016. Questionnaires were collected and completed surveys analyzed. Of 146 eligible residents, 76 returned completed surveys (52% response rate). Of these 99% of respondents owned a smartphone, with 79% running on Apple's iOS. Four general mobile uses were identified: 1) communication between members of the medical team, 2) decision support, 3) medical reference, and 4) documentation through medical photography. Communication and photography were areas where the most obvious breaches in the Canadian Personal Health Information Protection Act were noted, with 89% of respondents taking pictures of patients' radiologic studies and 75% exchanging them with Short Message System. Hospital policies had no impact on user behaviors. Smartphones are used daily by most neurosurgery residents. Identified usage patterns are associated with perceived gains in efficacy and challenges in privacy and data reliability. We believe creating and improving workflows that address these usage patterns has a greater potential to improve privacy than changing policies and enforcing regulations. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce

    Directory of Open Access Journals (Sweden)

    Ren-Junn Hwang

    2015-04-01

    Full Text Available Transaction privacy has attracted a lot of attention in the e-commerce. This study proposes an efficient and provable fair document exchange protocol with transaction privacy. Using the proposed protocol, any untrusted parties can fairly exchange documents without the assistance of online, trusted third parties. Moreover, a notary only notarizes each document once. The authorized document owner can exchange a notarized document with different parties repeatedly without disclosing the origin of the document or the identities of transaction participants. Security and performance analyses indicate that the proposed protocol not only provides strong fairness, non-repudiation of origin, non-repudiation of receipt, and message confidentiality, but also enhances forward secrecy, transaction privacy, and authorized exchange. The proposed protocol is more efficient than other works.

  5. Ectodermal dysplasia in identical twins

    OpenAIRE

    Puttaraju, Gurkar Haraswarupa; Visveswariah, Paranjyothi Magadi

    2013-01-01

    Hereditary hypohidrotic ectodermal dysplasia (HED) is typically inherited as an X-linked recessive trait, characterized by deformity of at least two or more of the ectodermal structures - hair, teeth, nails and sweat glands. Two cases of hereditary HED involving identical male twins, is being documented for the rarity of its occurrence with special attention given to genetics, pathophysiology, clinical, intraoral manifestations and to the methods to improve the masticatory function, the facia...

  6. The management of electronic documents generated from compilation and revision processes of nuclear and radiation safety regulations and standards

    International Nuclear Information System (INIS)

    Wang Wenhai; Fan Yun; Shang Zhaorong

    2010-01-01

    As the Secretary Group of Regulations and Standards Review Committee on nuclear and radiation safe needs to deal with a large number of electronic documents in course of the regulation and standard review meetings, the article gives a systematical method including electronic document file naming and management as well as procedures of file transfer, storage and usage. (authors)

  7. Representation of National Identity in Malaysian State Mosque Built Form as a Socio- cultural Product

    Directory of Open Access Journals (Sweden)

    Alice Sabrina Ismail

    2018-01-01

    Full Text Available The formation of national identity is the essence for a multi-racial country like Malaysia because it can strengthen national solidarity, create a common aspiration, and sustain the continuity of a historical heritage with multiple ethnicity and background. Nevertheless, the characteristics of this national identity is still not fully dealt with from an architectural aspect. Hence, the purpose of this paper is to critically examine the problem of national architectural identity in Malaysia. This is vital to uncover the resulting design principles with national architectural identity characteristics by referencing to three typologies of local state mosque as case study. The finding outlines that there are six architectural principles that influence the formation of national identity. These are the understanding of built form detail elements, materials usage, local style composition and expression, application of organic theory, designing a regionalistic articulation of space and form as well as an understanding of democratic values form to reflect the characteristics of national identity. These established referential guideline design on national identity is of benefit for future designers, builders, developer and related authority to produce built form that symbolizes nation political values as well as responsive to the existing social culture context.

  8. Codon usage bias and the evolution of influenza A viruses. Codon Usage Biases of Influenza Virus

    Directory of Open Access Journals (Sweden)

    Wong Emily HM

    2010-08-01

    Full Text Available Abstract Background The influenza A virus is an important infectious cause of morbidity and mortality in humans and was responsible for 3 pandemics in the 20th century. As the replication of the influenza virus is based on its host's machinery, codon usage of its viral genes might be subject to host selection pressures, especially after interspecies transmission. A better understanding of viral evolution and host adaptive responses might help control this disease. Results Relative Synonymous Codon Usage (RSCU values of the genes from segment 1 to segment 6 of avian and human influenza viruses, including pandemic H1N1, were studied via Correspondence Analysis (CA. The codon usage patterns of seasonal human influenza viruses were distinct among their subtypes and different from those of avian viruses. Newly isolated viruses could be added to the CA results, creating a tool to investigate the host origin and evolution of viral genes. It was found that the 1918 pandemic H1N1 virus contained genes with mammalian-like viral codon usage patterns, indicating that the introduction of this virus to humans was not through in toto transfer of an avian influenza virus. Many human viral genes had directional changes in codon usage over time of viral isolation, indicating the effect of host selection pressures. These changes reduced the overall GC content and the usage of G at the third codon position in the viral genome. Limited evidence of translational selection pressure was found in a few viral genes. Conclusions Codon usage patterns from CA allowed identification of host origin and evolutionary trends in influenza viruses, providing an alternative method and a tool to understand the evolution of influenza viruses. Human influenza viruses are subject to selection pressure on codon usage which might assist in understanding the characteristics of newly emerging viruses.

  9. "I'm Tired. You Clean and Cook." Shifting Gender Identities and Second Language Socialization

    Science.gov (United States)

    Gordon, Daryl

    2004-01-01

    Drawing on a multisite ethnographic study that spans educational, domestic, and workplace contexts in the United States and Laos, this article investigates the interplay between gender identity shifts and second language socialization, documenting the process by which working-class Lao women and men redefine gender identities in the United States.…

  10. The Intersectionality of Religious Belief and Sexual Identity

    Science.gov (United States)

    Yadron, Christopher

    2016-01-01

    The potential for conflict or tension between the cultural variables of sexual identity and religious belief for counselors, clients, and counseling students is well-documented by the counseling literature. The tension has existed primarily due to competing religious values for counselors and clients most often with respect to the phenomena of…

  11. How Google Web Search copes with very similar documents

    NARCIS (Netherlands)

    W. Mettrop (Wouter); P. Nieuwenhuysen; H. Smulders

    2006-01-01

    textabstractA significant portion of the computer files that carry documents, multimedia, programs etc. on the Web are identical or very similar to other files on the Web. How do search engines cope with this? Do they perform some kind of “deduplication”? How should users take into account that

  12. ICT in University Education: Usage and Challenges among ...

    African Journals Online (AJOL)

    This study was a survey which explored ICT usage and challenges among academic staff. Thus, the main purpose of this study was to determine the areas of ICT usage among academic staff; identify the obstacles to their ICT usage and identify their areas of training need in ICT usage. Five research questions were posed ...

  13. The Scope of Usage-based Theory

    OpenAIRE

    Paul eIbbotson

    2013-01-01

    Usage-based approaches typically draw on a relatively small set of cognitive processes, such as categorization, analogy, and chunking to explain language structure and function. The goal of this paper is to first review the extent to which the “cognitive commitment” of usage-based theory has had success in explaining empirical findings across domains, including language acquisition, processing, and typology. We then look at the overall strengths and weaknesses of usage-based theory and highli...

  14. Technical Support Document: 50% Energy Savings for Small Office Buildings

    Energy Technology Data Exchange (ETDEWEB)

    Thornton, Brian A.; Wang, Weimin; Huang, Yunzhi; Lane, Michael D.; Liu, Bing

    2010-04-30

    The Technical Support Document (TSD) for 50% energy savings in small office buildings documents the analysis and results for a recommended package of energy efficiency measures (EEMs) referred to as the advanced EEMs. These are changes to a building design that will reduce energy usage. The package of advanced EEMs achieves a minimum of 50% energy savings and a construction area weighted average energy savings of 56.6% over the ANSI/ASHRAE/IESNA Standard 90.1-2004 for 16 cities which represent the full range of climate zones in the United States. The 50% goal is for site energy usage reduction. The weighted average is based on data on the building area of construction in the various climate locations. Cost-effectiveness of the EEMs is determined showing an average simple payback of 6.7 years for all 16 climate locations. An alternative set of results is provided which includes a variable air volume HVAC system that achieves at least 50% energy savings in 7 of the 16 climate zones with a construction area weighted average savings of 48.5%. Other packages of EEMs may also achieve 50% energy savings; this report does not consider all alternatives but rather presents at least one way to reach the goal. Design teams using this TSD should follow an integrated design approach and utilize additional analysis to evaluate the specific conditions of a project.

  15. Printable, scannable biometric templates for secure documents and materials

    Science.gov (United States)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  16. Medical students' professional identity development in an early nursing attachment

    NARCIS (Netherlands)

    Helmich, Esther; Derksen, Els; Prevoo, Mathieu; Laan, Roland; Bolhuis, Sanneke; Koopmans, Raymond

    Objectives The importance of early clinical experience for medical training is well documented. However, to our knowledge there are no studies that assess the influence of very early nursing attachments on the professional development and identity construction of medical students. Working as an

  17. Medical students' professional identity development in an early nursing attachment.

    NARCIS (Netherlands)

    Helmich, E.; Derksen, E.; Prevoo, M.; Laan, R.F.J.M.; Bolhuis, S.; Koopmans, R.T.C.M.

    2010-01-01

    OBJECTIVES: The importance of early clinical experience for medical training is well documented. However, to our knowledge there are no studies that assess the influence of very early nursing attachments on the professional development and identity construction of medical students. Working as an

  18. Identity crisis: user perspectives on multiplicity and control in federated identitymanagement

    DEFF Research Database (Denmark)

    Howard, Steve; Satchell, C; Shanks, G

    2009-01-01

    Federated identity management systems synthesise complex and fragmented user information into a single entity. Literature from the provider’s perspective notes this integration extends many benefits to the end user and the privileges provided by digital identity authentication schemes have been...... well documented from this perspective. Less explored are the perceptions of federation from the user’s perspective. This study reports an empirical user study that examines the relationship between identity and technology using contextual interviews, focus groups and cultural probes. It emerges...... that while current federated systems satisfy user needs by allowing the construction of multiple digital data sets that are moored to a central identifier, they fail to provide the user with control over the capability to act in the ‘hatch’, ‘match’ and ‘dispatch’ phases of the digital identity lifecycle...

  19. Facebook usage by students in higher education

    NARCIS (Netherlands)

    Wesseling, N.F.; de la Poza, Elena; Dormènech, Jozep; Lloret, Jaime; Vincent Vela, M. Cinta; Zuriaga Agustí, Elena

    2015-01-01

    In this paper I measure first year student Facebook usage as part of a broader PhD study into the influence of social media usage on the success of students in higher education. A total of 906 students were asked to complete 3 surveys on Facebook usage with their peers, for two consecutive years

  20. Ectodermal dysplasia in identical twins

    Directory of Open Access Journals (Sweden)

    Gurkar Haraswarupa Puttaraju

    2013-01-01

    Full Text Available Hereditary hypohidrotic ectodermal dysplasia (HED is typically inherited as an X-linked recessive trait, characterized by deformity of at least two or more of the ectodermal structures - hair, teeth, nails and sweat glands. Two cases of hereditary HED involving identical male twins, is being documented for the rarity of its occurrence with special attention given to genetics, pathophysiology, clinical, intraoral manifestations and to the methods to improve the masticatory function, the facial esthetics and psychology of patients affected by this disease.

  1. Immersion Suit Usage Within the RAAF

    Science.gov (United States)

    1992-01-01

    IMMERSION SUIT USED UVIC QDIS HOLDINGS 202. in 12 Sizes, held by ALSS 492SQN REQUIREMENTS No comment USAGE POLICY REFERENCE DIRAF) AAP 7215.004-1 (P3C...held by ALSS 492SQN. REQUIREMENTS No comment ISACE POLICY REFERENCE DIIAF) AAP 7215.004-1 (P3C Flight Manual) RAAF Supplement No 92 USAGE POUICY UVIC...TYPE P3C REFERENCE Telecon FLTLT Toft I I SQNfRESO AVMED Dated 22 Mar 91 IMMERSION SUIT USED UVIC QDIS HOLDINGS No comment REQUIREMENTS No comment USAGE

  2. Long-term memory of individual identity in ant queens

    DEFF Research Database (Denmark)

    Dreier, Stéphanie Agnès Jeanine; Van Zweden, Jelle Stijn; D'Ettorre, Patrizia

    2007-01-01

    of familiar or unfamiliar queens over time. We show that unrelated founding queens of P. villosa and Pachycondyla inversa store information on the individual identity of other queens and can retrieve it from memory after 24h of separation. Thus, we have documented for the first time that long-term memory...

  3. Underlying concerns in land-use conflicts--the role of place-identity in risk perception

    International Nuclear Information System (INIS)

    Wester-Herber, Misse

    2004-01-01

    In the last few years, debates over proposed usage of land for high-risk ventures have caused some debate, both in the affected communities as well as among policy makers. It has been recognized by industry and government agencies that the opinion and concerns of the local population has to be considered in order to mediate or reduce conflicts. Usually these concerns tend to focus on issues of health and safety in relation to the risk presented by different projects. It is suggested in this paper that the discussion needs to be expanded, especially if the proposed project can alter the esthetic appearance of the landscape. It is argued in this paper that the local attachment to a specific geographical place, also referred to as place-identity, needs to be included in discussions concerning industrial risks. Research in environmental psychology has suggested that place-identity is vital to a person's identity and that this can be seen through four principles. In this paper, suggestions are made on how these four aspects of identity can be affected in a negative way if changes are made to a landscape by the introduction of a high-risk and stigmatized industrial venture

  4. A Short note on Accent–bias, Social Identity and Ethnocentrism

    Directory of Open Access Journals (Sweden)

    Rahul Chakraborty

    2017-08-01

    Full Text Available This paper discusses the interrelations among accent-based biases, social identity and ethnocentrism. Construction of social identity creates a set of ethnocentric values within a person, which indirectly or directly plays a pivotal role in generating accent related biases. Starting with Tajfel’s (1959 social identity theory and then the discussion of ethnocentrism, accent related biases have a long documented origin, development and consequences. People construct their social identity based on numerous variables and then their in-group and out-group memberships are established. Ethnocentrism, as a variable, influences listeners’ accent perception and subsequent judgment regarding their perceived accent. The degree of ethnocentrism is related to speakers’ potential accent biases. As legal safeguard against accent related biases is absent, active resistance and awareness-initiation are expected from speech language pathologists and the concerned community in general. Role of training institutions is discussed.

  5. Three-dimensional measurement system for crime scene documentation

    Science.gov (United States)

    Adamczyk, Marcin; Hołowko, Elwira; Lech, Krzysztof; Michoński, Jakub; MÄ czkowski, Grzegorz; Bolewicki, Paweł; Januszkiewicz, Kamil; Sitnik, Robert

    2017-10-01

    Three dimensional measurements (such as photogrammetry, Time of Flight, Structure from Motion or Structured Light techniques) are becoming a standard in the crime scene documentation process. The usage of 3D measurement techniques provide an opportunity to prepare more insightful investigation and helps to show every trace in the context of the entire crime scene. In this paper we would like to present a hierarchical, three-dimensional measurement system that is designed for crime scenes documentation process. Our system reflects the actual standards in crime scene documentation process - it is designed to perform measurement in two stages. First stage of documentation, the most general, is prepared with a scanner with relatively low spatial resolution but also big measuring volume - it is used for the whole scene documentation. Second stage is much more detailed: high resolution but smaller size of measuring volume for areas that required more detailed approach. The documentation process is supervised by a specialised application CrimeView3D, that is a software platform for measurements management (connecting with scanners and carrying out measurements, automatic or semi-automatic data registration in the real time) and data visualisation (3D visualisation of documented scenes). It also provides a series of useful tools for forensic technicians: virtual measuring tape, searching for sources of blood spatter, virtual walk on the crime scene and many others. In this paper we present our measuring system and the developed software. We also provide an outcome from research on metrological validation of scanners that was performed according to VDI/VDE standard. We present a CrimeView3D - a software-platform that was developed to manage the crime scene documentation process. We also present an outcome from measurement sessions that were conducted on real crime scenes with cooperation with Technicians from Central Forensic Laboratory of Police.

  6. 'A good method of quitting smoking' or 'just an alternative to smoking'? Comparative evaluations of e-cigarette and traditional cigarette usage by dual users.

    Science.gov (United States)

    Vandrevala, Tushna; Coyle, Adrian; Walker, Victoria; Cabrera Torres, Joshelyn; Ordoña, Izobel; Rahman, Panna

    2017-01-01

    The development of e-cigarettes was initially hailed as a resource in facilitating a reduction in or cessation of cigarette smoking. Many users of e-cigarettes are 'dual users', smoking traditional cigarettes and e-cigarettes. The present qualitative study examines the factors that a group of 20 dual users considered to have been influential in their decisions to use e-cigarettes and their comparative evaluations of e-cigarettes and traditional cigarettes. Health concerns were not found to be sole motivators. Participants pointed to financial and contextual considerations, particularly peer influence on uptake and continued usage of e-cigarettes. E-cigarettes were evaluated as comparable to cigarettes in some ways but not in other important respects such as sensation and satisfaction. Different social evaluations of cigarette and e-cigarette usage were discerned which influenced how participants identified as smokers, 'vapers' or neither. Findings are discussed in relation to social representations, identity and implications for continued e-cigarette usage among dual users.

  7. Knowledge and Usage of Emergency Contraceptives Among University Students in Ghana.

    Science.gov (United States)

    Darteh, Eugene Kofuor Maafo; Doku, David Teye

    2016-02-01

    Contraceptive use is an important strategy for the prevention of unwanted pregnancy and avoidance of induced abortion. Of all the contraception methods, emergency contraceptive (EC) offers the last chance to achieve this. However, few studies have documented the use of EC among young people in Ghana. This study explored knowledge and usage of EC as well as the factors associated with it among University of Cape Coast students. Data were obtained on the knowledge and usage of ECs among University of Cape Coast students in 2013. Logistic regression analysis was used to investigate the association between students' socio-demographic characteristics and EC knowledge and use. More male students (72%) than females (59%) were sexually active. Fifty-seven percent of the respondents had ever heard of EC and 36% had ever used EC. Although males were more likely to be sexually active, females were more likely to have knowledge of EC use compared to males. The study underscores the need to increase awareness regarding EC among University students in order to offer them the opportunity that EC provides if other forms of contraceptives are missed.

  8. Cardiac asystole following cannabis (marijuana) usage--additional mechanism for sudden death?

    Science.gov (United States)

    Menahem, Samuel

    2013-12-10

    A 21 year old university student previously operated during infancy for an unobstructed total anomalous pulmonary venous drainage with an excellent result, was noted on a routine follow up 24 h Holter monitor to have multiple pauses related to cardiac asystole, the longest lasting 5.8 s and temporally related to marijuana inhalation. A repeat Holter was normal following a two week cessation of marijuana usage and again when carried out 3 months later. The documented periods of asystole may be a precursor of sudden death seen in addicts even without evidence of ischaemic heart disease. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  9. E-book usage: counting the challenges and opportunities

    Directory of Open Access Journals (Sweden)

    Angela Conyers

    2017-07-01

    Full Text Available Academic libraries are spending a growing proportion of their increasingly stretched budgets on e-books each year. Within this context, demonstrating a return on investment is imperative, but gathering data about e-resource usage is not always easy.    This article summarizes how libraries and library consortia are acquiring and evaluating e-books, how usage statistics feature within library workflows, the issues faced in doing so and the resulting impact of these issues on understanding usage and informing purchasing of new titles. Discussions with publishers indicate how usage data are being used within the organization, the requirements of customers and the challenges involved in providing usage data for e-books. Assessing and evaluating e-book usage is a complex and challenging task with processes and workflows in development. A transition from print to e-books represents a significant change for libraries, and the availability of reliable usage statistics to support purchase decisions is vital. The article is based on a series of case study interviews with representatives from a small cross-section of academic libraries, library consortia, publishers and aggregators.    This work is of interest to anyone with responsibility for creating, managing, developing, delivering and supporting usage statistics and standards for e-books.

  10. Neurotic Anxiety, Pronoun Usage, and Stress

    Science.gov (United States)

    Alban, Lewis Sigmund; Groman, William D.

    1976-01-01

    Attempts to clarify the function of a particular aspect of verbal communication, pronoun usage, by (a) using a Gestalt Therapy theory conceptual framework and (b) experimentally focusing on the relationship of pronoun usage to neurotic anxiety and emotional stress. (Author/RK)

  11. The Role of English Language and International Media as Agents of Cultural Globalisation and Their Impact on Identity Formation in Kuwait

    Science.gov (United States)

    Hasanen, Mohammed M.; Al-Kandari, Ali A.; Al-Sharoufi, Hussain

    2014-01-01

    This study examines the influence of English language usage and international media on the strength of either national or global identity. The regression analysis of 354 responses reveals that individuals who studied at universities that use English as a medium of instruction show significant differences in the extent to which they embrace a…

  12. Video personalization for usage environment

    Science.gov (United States)

    Tseng, Belle L.; Lin, Ching-Yung; Smith, John R.

    2002-07-01

    A video personalization and summarization system is designed and implemented incorporating usage environment to dynamically generate a personalized video summary. The personalization system adopts the three-tier server-middleware-client architecture in order to select, adapt, and deliver rich media content to the user. The server stores the content sources along with their corresponding MPEG-7 metadata descriptions. Our semantic metadata is provided through the use of the VideoAnnEx MPEG-7 Video Annotation Tool. When the user initiates a request for content, the client communicates the MPEG-21 usage environment description along with the user query to the middleware. The middleware is powered by the personalization engine and the content adaptation engine. Our personalization engine includes the VideoSue Summarization on Usage Environment engine that selects the optimal set of desired contents according to user preferences. Afterwards, the adaptation engine performs the required transformations and compositions of the selected contents for the specific usage environment using our VideoEd Editing and Composition Tool. Finally, two personalization and summarization systems are demonstrated for the IBM Websphere Portal Server and for the pervasive PDA devices.

  13. The Student Teacher Portfolio as Autobiography: Developing a Professional Identity.

    Science.gov (United States)

    Antonek, Janis L.; And Others

    1997-01-01

    Argues that student teacher portfolios are a viable, effective, appropriate tool for documenting teacher growth and development and for promoting reflective practice. Traces the unique paths of two pre-service foreign language teachers who constructed a professional identity from the historical and cultural conditions of their classroom…

  14. French grammar and usage

    CERN Document Server

    Hawkins, Roger

    2015-01-01

    Long trusted as the most comprehensive, up-to-date and user-friendly grammar available, French Grammar and Usage is a complete guide to French as it is written and spoken today. It includes clear descriptions of all the main grammatical phenomena of French, and their use, illustrated by numerous examples taken from contemporary French, and distinguishes the most common forms of usage, both formal and informal.Key features include:Comprehensive content, covering all the major structures of contemporary French User-friendly organisation offering easy-to-find sections with cross-referencing and i

  15. Factors Influencing Facebook Usage and Facebook Addictive Tendency in University Students: The Role of Online Psychological Privacy and Facebook Usage Motivation.

    Science.gov (United States)

    Hong, Fu-Yuan; Chiu, Su-Lin

    2016-04-01

    There are few studies analysing the influence of personal traits and motivation factors on Facebook usage and Facebook addictive tendency as seen in university students. In this study, 225 Taiwanese university students completed a questionnaire to determine their online psychological privacy scale, Facebook usage motivation scale, Facebook usage scale and Facebook addictive tendency scale, in order to evaluate the items that can be conceptualized as the effect of university students' online psychological privacy personal trait and motive factors, and Facebook usage motivation with respect to Facebook usage and Facebook addictive tendency. The study found that a desire for more online psychological privacy correlates with a stronger motivation to use Facebook and more Facebook usage behaviour among university students who may become high-risk groups for Facebook addictive tendency. The study found that a desire for or an acceptance of a lower online psychological privacy correlates with a stronger motivation to use Facebook among university students who may have more Facebook usage behaviour. This study can help understand university students' Facebook usage and Facebook addictive tendency and provide feature indicators for those who may become high-risk groups for Facebook addictive tendency. Finally, this study conducts discussion and proposes relevant suggestions for future study. Copyright © 2014 John Wiley & Sons, Ltd.

  16. MESUR metrics from scholarly usage of resources

    CERN Document Server

    CERN. Geneva; Van de Sompel, Herbert

    2007-01-01

    Usage data is increasingly regarded as a valuable resource in the assessment of scholarly communication items. However, the development of quantitative, usage-based indicators of scholarly impact is still in its infancy. The Digital Library Research & Prototyping Team at the Los Alamos National Laboratory's Research library has therefore started a program to expand the set of usage-based tools for the assessment of scholarly communication items. The two-year MESUR project, funded by the Andrew W. Mellon Foundation, aims to define and validate a range of usage-based impact metrics, and issue guidelines with regards to their characteristics and proper application. The MESUR project is constructing a large-scale semantic model of the scholarly community that seamlessly integrates a wide range of bibliographic, citation and usage data. Functioning as a reference data set, this model is analyzed to characterize the intricate networks of typed relationships that exist in the scholarly community. The resulting c...

  17. USE OF IMAGE BASED MODELLING FOR DOCUMENTATION OF INTRICATELY SHAPED OBJECTS

    Directory of Open Access Journals (Sweden)

    M. Marčiš

    2016-06-01

    Full Text Available In the documentation of cultural heritage, we can encounter three dimensional shapes and structures which are complicated to measure. Such objects are for example spiral staircases, timber roof trusses, historical furniture or folk costume where it is nearly impossible to effectively use the traditional surveying or the terrestrial laser scanning due to the shape of the object, its dimensions and the crowded environment. The actual methods of digital photogrammetry can be very helpful in such cases with the emphasis on the automated processing of the extensive image data. The created high resolution 3D models and 2D orthophotos are very important for the documentation of architectural elements and they can serve as an ideal base for the vectorization and 2D drawing documentation. This contribution wants to describe the various usage of image based modelling in specific interior spaces and specific objects. The advantages and disadvantages of the photogrammetric measurement of such objects in comparison to other surveying methods are reviewed.

  18. Use of Image Based Modelling for Documentation of Intricately Shaped Objects

    Science.gov (United States)

    Marčiš, M.; Barták, P.; Valaška, D.; Fraštia, M.; Trhan, O.

    2016-06-01

    In the documentation of cultural heritage, we can encounter three dimensional shapes and structures which are complicated to measure. Such objects are for example spiral staircases, timber roof trusses, historical furniture or folk costume where it is nearly impossible to effectively use the traditional surveying or the terrestrial laser scanning due to the shape of the object, its dimensions and the crowded environment. The actual methods of digital photogrammetry can be very helpful in such cases with the emphasis on the automated processing of the extensive image data. The created high resolution 3D models and 2D orthophotos are very important for the documentation of architectural elements and they can serve as an ideal base for the vectorization and 2D drawing documentation. This contribution wants to describe the various usage of image based modelling in specific interior spaces and specific objects. The advantages and disadvantages of the photogrammetric measurement of such objects in comparison to other surveying methods are reviewed.

  19. Scientific literacy and academic identity: Creating a community of practice

    Science.gov (United States)

    Reveles, John Michael

    2005-07-01

    This one-year ethnographic study of a third grade classroom examined the construction of elementary school science. The research focused on the co-development of scientific literacy and academic identity. Unlike much research in science education that views literacy as merely supportive of science; this dissertation research considers how students learned both disciplinary knowledge in science as well as about themselves as learners through language use. The study documented and analyzed how students came to engage with scientific knowledge and the impact this engagement had upon their academic identities over time. Ethnographic and discourse analytic methods were employed to investigate three research questions: (a) How were the students in a third grade classroom afforded opportunities to acquire scientific literate practices through the spoken/written discourse and science activities? (b) In what ways did students develop and maintain academic identities taken-up over time as they discursively appropriated scientific literate practices via classroom discourse? and (c) How did students collectively and individually inscribe their academic identities and scientific knowledge into classroom artifacts across the school year? Through multiple forms of analyses, I identified how students' communication and participation in science investigations provided opportunities for them to learn specific scientific literate practices. The findings of this empirical research indicate that students' communication and participation in science influenced the ways they perceived themselves as active participants within the classroom community. More specifically, students were observed to appropriate particular discourse practices introduced by the teacher to frame scientific disciplinary knowledge and investigations. Thus, emerging academic identities and developing literate practices were documented via analysis of discursive (spoken, written, and enacted) classroom interactions. A

  20. Describing Speech Usage in Daily Activities in Typical Adults.

    Science.gov (United States)

    Anderson, Laine; Baylor, Carolyn R; Eadie, Tanya L; Yorkston, Kathryn M

    2016-01-01

    "Speech usage" refers to what people want or need to do with their speech to meet communication demands in life roles. The purpose of this study was to contribute to validation of the Levels of Speech Usage scale by providing descriptive data from a sample of adults without communication disorders, comparing this scale to a published Occupational Voice Demands scale and examining predictors of speech usage levels. This is a survey design. Adults aged ≥25 years without reported communication disorders were recruited nationally to complete an online questionnaire. The questionnaire included the Levels of Speech Usage scale, questions about relevant occupational and nonoccupational activities (eg, socializing, hobbies, childcare, and so forth), and demographic information. Participants were also categorized according to Koufman and Isaacson occupational voice demands scale. A total of 276 participants completed the questionnaires. People who worked for pay tended to report higher levels of speech usage than those who do not work for pay. Regression analyses showed employment to be the major contributor to speech usage; however, considerable variance left unaccounted for suggests that determinants of speech usage and the relationship between speech usage, employment, and other life activities are not yet fully defined. The Levels of Speech Usage may be a viable instrument to systematically rate speech usage because it captures both occupational and nonoccupational speech demands. These data from a sample of typical adults may provide a reference to help in interpreting the impact of communication disorders on speech usage patterns. Copyright © 2016 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  1. PIV Logon Configuration Guidance

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Glen Alan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-03-04

    This document details the configurations and enhancements implemented to support the usage of federal Personal Identity Verification (PIV) Card for logon on unclassified networks. The guidance is a reference implementation of the configurations and enhancements deployed at the Los Alamos National Laboratory (LANL) by Network and Infrastructure Engineering – Core Services (NIE-CS).

  2. World Wide Web Usage Mining Systems and Technologies

    Directory of Open Access Journals (Sweden)

    Wen-Chen Hu

    2003-08-01

    Full Text Available Web usage mining is used to discover interesting user navigation patterns and can be applied to many real-world problems, such as improving Web sites/pages, making additional topic or product recommendations, user/customer behavior studies, etc. This article provides a survey and analysis of current Web usage mining systems and technologies. A Web usage mining system performs five major tasks: i data gathering, ii data preparation, iii navigation pattern discovery, iv pattern analysis and visualization, and v pattern applications. Each task is explained in detail and its related technologies are introduced. A list of major research systems and projects concerning Web usage mining is also presented, and a summary of Web usage mining is given in the last section.

  3. Investigation of the Visuals Associated with the National identity in Turkish Republic Revolution History and Kemalism Textbooks

    Directory of Open Access Journals (Sweden)

    Mehmet Elban

    2018-04-01

    Full Text Available In this research, images related to national identity were examined in history textbooks. In the first stage, nationalism, the historical course of the Turkish national identity and related literature were examined, and some components of national identity were determined. Various categories related to national identity have been formed from the elements obtained. The data about the categories were collected through document analysis. In the second phase, 8 history textbooks taught in the years 1930-2014 were selected as samples. Content analysis was used in the examination of the mentioned textbooks, and quantitative method was chosen in data analysis. In this context, data obtained by document analysis were analyzed with SPSS 13 statistical program. Chi-square tests, Bonferroni corrections for chi-square tests and graphs were used in the analyzes. The significance level for all analyzes was taken as .05. In the research, it was determined that republic values and revolutions, national struggle and the images related to the founder leader Mustafa Kemal Atatürk be a most used in Turkish Republic Revolution History and Kemalism textbooks concerning national identity. In addition, it has been found that the images of national symbols such as homeland maps, flag, parliament, and capital are used too much for the national identity.

  4. A journey to citizenship: constructions of citizenship and identity in the British Citizenship Test.

    Science.gov (United States)

    Gray, Debra; Griffin, Christine

    2014-06-01

    The British Citizenship Test was introduced in 2005 as one of a raft of new procedures aimed at addressing the perceived problems of integration and social cohesion in migrant communities. In this study, we argue that this new citizenship procedure signals a shift in British political discourse about citizenship - particularly, the institutionalization of a common British citizen identity that is intended to draw citizens together in a new form of political/national community. In line with this, we examine the British Citizenship Test from a social psychological perspective to interrogate the ways in which the test constitutes identity, constitutes citizenship, and constitutes citizenship-as-identity. Analysis of the test and its associated documents highlights three ways in which Britishness-as-identity is constituted, that is, as a collective identity, as a superordinate and national identity, and finally as both a destination and a journey. These findings are discussed in terms of their implications for models of citizenship and models of identity. © 2013 The British Psychological Society.

  5. Leadership and Identity in the Catholic School: An Australian Perspective

    Science.gov (United States)

    Sultmann, William F.; Brown, Raymond

    2016-01-01

    This article explores the nature of leadership as expressed in literature and workshop commentary on the identity of the Catholic school within an Australian context. Employing a qualitative methodology, data from workshops designed around school mission were compared and integrated with data from texts of selected Post Conciliar documents on the…

  6. Discovering More Accurate Frequent Web Usage Patterns

    OpenAIRE

    Bayir, Murat Ali; Toroslu, Ismail Hakki; Cosar, Ahmet; Fidan, Guven

    2008-01-01

    Web usage mining is a type of web mining, which exploits data mining techniques to discover valuable information from navigation behavior of World Wide Web users. As in classical data mining, data preparation and pattern discovery are the main issues in web usage mining. The first phase of web usage mining is the data processing phase, which includes the session reconstruction operation from server logs. Session reconstruction success directly affects the quality of the frequent patterns disc...

  7. Do usage and scientific collaboration associate with citation impact

    Energy Technology Data Exchange (ETDEWEB)

    Chi, P.S.; Glänzel, W.

    2016-07-01

    In this study usage counts and times cited from Web of Science Core Collection (WoS) were collected for each article published in 2013 with Belgian, Israeli and Iranian addresses. We investigate the relations among three indicators related to citation impact, usage counts coauthorship, respectively. In addition, we apply the method of Characteristic Scores and Scal (CSS) to analyse the distributions of citations and usage counts. The results show that citations and usage counts in WoS correlate to each other significantly, especially in the social sciences. However, the increase of the number of co-authors does not increase usage counts or citations significantly. Furthermore, the stability of CSS-class distributions proves the availability of CSS in characterising both usage and citation distributions. (Author)

  8. Review of SKB's Code Documentation and Testing

    International Nuclear Information System (INIS)

    Hicks, T.W.

    2005-01-01

    evolution. Poly3D - a displacement discontinuity model developed at Stanford University and used by SKB to study the effects of movement on fractures that intersect canister deposition holes. UDEC, 3DEC, FLAC, and FLAC3D - geotechnical models developed by HCItasca, and used by SKB in thermo-hydro-mechanical analysis of repository host rock. M3 - a multivariate mixing and mass balance model developed by SKB to study the evolution of groundwater composition. The commercially available codes (CONNECTFLOW, ABAQUS, Poly3D, UDEC, 3DEC, FLAC, and FLAC3D) appear to have been subject to extensive testing, and the wide international usage of these codes offers a high level of confidence that they are fit for intended purpose. However, SKB has modified or developed some commercial codes in-house, and it is unclear whether these developments have become an integral part of, and have been subject to similar levels of testing as, the main code. Greater confidence in the applicability of the modified forms of these codes could be achieved if clear information on code usage and verification were available. Varying standards of code documentation have been identified for the SKB codes COMP23, FARF31, PROPER, the analytical radionuclide transport code, DarcyTools, and M3. The recent DarcyTools reports are of a high standard, providing comprehensive information on the model basis, code usage, and code verification and validation. User's guides and verification reports should be developed for all of SKB's codes that are of a similar standard to the DarcyTools documents and are consistent with appropriate software quality assurance (QA) procedures. To develop a greater understanding of suitable software documentation and testing standards, a brief review has been undertaken of software QA requirements in other radioactive waste disposal programmes. The review has provided useful insights into the type of code documentation that might be expected to accompany the submission of a repository

  9. MESUR: USAGE-BASED METRICS OF SCHOLARLY IMPACT

    Energy Technology Data Exchange (ETDEWEB)

    BOLLEN, JOHAN [Los Alamos National Laboratory; RODRIGUEZ, MARKO A. [Los Alamos National Laboratory; VAN DE SOMPEL, HERBERT [Los Alamos National Laboratory

    2007-01-30

    The evaluation of scholarly communication items is now largely a matter of expert opinion or metrics derived from citation data. Both approaches can fail to take into account the myriad of factors that shape scholarly impact. Usage data has emerged as a promising complement to existing methods o fassessment but the formal groundwork to reliably and validly apply usage-based metrics of schlolarly impact is lacking. The Andrew W. Mellon Foundation funded MESUR project constitutes a systematic effort to define, validate and cross-validate a range of usage-based metrics of schlolarly impact by creating a semantic model of the scholarly communication process. The constructed model will serve as the basis of a creating a large-scale semantic network that seamlessly relates citation, bibliographic and usage data from a variety of sources. A subsequent program that uses the established semantic network as a reference data set will determine the characteristics and semantics of a variety of usage-based metrics of schlolarly impact. This paper outlines the architecture and methodology adopted by the MESUR project and its future direction.

  10. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns

    Science.gov (United States)

    Cho, Hyun; Chun, Ji-Won; Jeong, Jo-Eun; Kim, Dai-Jin

    2017-01-01

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smartphone games; (3) individuals who played computer and smartphone games evenly; (4) individuals who played smartphone games more than computer games; (5) individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers) (B = 0.457, odds ratio = 1.579). Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD. PMID:29206183

  11. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns.

    Science.gov (United States)

    Paik, Soo-Hyun; Cho, Hyun; Chun, Ji-Won; Jeong, Jo-Eun; Kim, Dai-Jin

    2017-12-05

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smartphone games; (3) individuals who played computer and smartphone games evenly; (4) individuals who played smartphone games more than computer games; (5) individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers) (B = 0.457, odds ratio = 1.579). Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD.

  12. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns

    Directory of Open Access Journals (Sweden)

    Soo-Hyun Paik

    2017-12-01

    Full Text Available Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD. Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1 individuals who played only computer games; (2 individuals who played computer games more than smartphone games; (3 individuals who played computer and smartphone games evenly; (4 individuals who played smartphone games more than computer games; (5 individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers (B = 0.457, odds ratio = 1.579. Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD.

  13. ‘A good method of quitting smoking’ or ‘just an alternative to smoking’? Comparative evaluations of e-cigarette and traditional cigarette usage by dual users

    Directory of Open Access Journals (Sweden)

    Tushna Vandrevala

    2017-01-01

    Full Text Available The development of e-cigarettes was initially hailed as a resource in facilitating a reduction in or cessation of cigarette smoking. Many users of e-cigarettes are ‘dual users’, smoking traditional cigarettes and e-cigarettes. The present qualitative study examines the factors that a group of 20 dual users considered to have been influential in their decisions to use e-cigarettes and their comparative evaluations of e-cigarettes and traditional cigarettes. Health concerns were not found to be sole motivators. Participants pointed to financial and contextual considerations, particularly peer influence on uptake and continued usage of e-cigarettes. E-cigarettes were evaluated as comparable to cigarettes in some ways but not in other important respects such as sensation and satisfaction. Different social evaluations of cigarette and e-cigarette usage were discerned which influenced how participants identified as smokers, ‘vapers’ or neither. Findings are discussed in relation to social representations, identity and implications for continued e-cigarette usage among dual users.

  14. Problematic Internet Usage of ICT Teachers

    Science.gov (United States)

    Gunduz, Semseddin

    2017-01-01

    Information and communication technologies (ICT) have affected all area in a society. Human can learn quickly and accurately from the internet. The aim of this study was to investigate what the problematic internet usage of ICT teachers. Therefore, the present study investigated the problematic internet usage, who worked as an ICT teacher in…

  15. Case Study on Ancestry Estimation in an Alaskan Native Family: Identity and Safeguards Against Reductionism.

    Science.gov (United States)

    Bader, Alyssa C; Malhi, Ripan S

    2015-10-01

    Understanding the complexities of ancestry-related identity is a necessary component of ethically sound research related to the genetic ancestry of modern-day communities. This is especially true when working with indigenous populations, given the legal and social implications that genetic ancestry interpretations may have in these communities. This study employs a multicomponent approach to explore the intricacies of ancestry-related identity within one extended family with members who identify as Alaskan Native. The seven participants were interviewed about their own self-identity, perceptions regarding genetic ancestry estimation, and their knowledge of oral family history. Additionally, each participant consented to having his or her genetic ancestry estimated. The researchers also surveyed ancestry-related documents, such as census records, birth certificates, and Certificates of Indian Blood. These three different perspectives-oral family history and self-identity, genetic ancestry estimation, historical and legal documentation-illustrate the complex nature of ancestry-related identity within the context of indigenous and colonial interactions in North America. While estimates of genetic ancestry broadly reflected each individual's self-reported biogeographic ancestry and supported all described and historically reported biological relationships, the estimates did not always match federally recorded blood quantum values, nor did they provide any information on relationships at the tribe or clan level. Employing a multicomponent approach and engaging study participants may help to safeguard against genetic essentialism and provide a more nuanced understanding of ancestry-related identity within a larger political, legal, and historical context.

  16. A look at the origin of information science: evidence for identity characterization

    Directory of Open Access Journals (Sweden)

    Jonathas Luiz Carvalho Silva

    2012-04-01

    Full Text Available Discusses social foundations, scientific and everyday that have given rise to the advent of Information Science, in order to conceive their identity characteristics. Problematológica The condition of this work can be synthesized from the following question: What are the direct factors and / or indirect that have given rise to the emergence of information science? What are the influences of these factors for the construction and characterization of the identity of Information Science? It aims to discuss the various social phenomena, academic and scientific directly and / or indirectly promoted the rise of information science. Methodologically, the article presents an exploratory research in the context of historical research through a literature review. It concludes that several factors helped the origin and foundation of Information Science showing its characteristic of postmodern science, it is possible to observe various features of identity from the elements that gave rise to flow of information science, such as historical identity (relationship of Library and Information Science, identity design (Documentation of Otlet and La Fontaine; shared identity (U.S. contribution to the European continent and the creation of the Information Science and institutional identity (creation of associations in Information Science.

  17. Underlying concerns in land-use conflicts--the role of place-identity in risk perception

    Energy Technology Data Exchange (ETDEWEB)

    Wester-Herber, Misse

    2004-04-01

    In the last few years, debates over proposed usage of land for high-risk ventures have caused some debate, both in the affected communities as well as among policy makers. It has been recognized by industry and government agencies that the opinion and concerns of the local population has to be considered in order to mediate or reduce conflicts. Usually these concerns tend to focus on issues of health and safety in relation to the risk presented by different projects. It is suggested in this paper that the discussion needs to be expanded, especially if the proposed project can alter the esthetic appearance of the landscape. It is argued in this paper that the local attachment to a specific geographical place, also referred to as place-identity, needs to be included in discussions concerning industrial risks. Research in environmental psychology has suggested that place-identity is vital to a person's identity and that this can be seen through four principles. In this paper, suggestions are made on how these four aspects of identity can be affected in a negative way if changes are made to a landscape by the introduction of a high-risk and stigmatized industrial venture.

  18. 50 CFR 600.910 - Definitions and word usage.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Definitions and word usage. 600.910..., Consultation, and Recommendations § 600.910 Definitions and word usage. (a) Definitions. In addition to the... undertaken by a state agency. (b) Word usage. The terms “must”, “shall”, “should”, “may”, “may not”, “will...

  19. 50 CFR 600.810 - Definitions and word usage.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Definitions and word usage. 600.810...) § 600.810 Definitions and word usage. (a) Definitions. In addition to the definitions in the Magnuson...-Stevens Act. (b) Word usage. The terms “must”, “shall”, “should”, “may”, “may not”, “will”, “could”, and...

  20. CloudMonitor: Profiling Power Usage

    OpenAIRE

    Smith, James William; Khajeh-Hosseini, Ali; Ward, Jonathan Stuart; Sommerville, Ian

    2012-01-01

    In Cloud Computing platforms the addition of hardware monitoring devices to gather power usage data can be impractical or uneconomical due to the large number of machines to be metered. CloudMonitor, a monitoring tool that can generate power models for software-based power estimation, can provide insights to the energy costs of deployments without additional hardware. Accurate power usage data leads to the possibility of Cloud providers creating a separate tariff for power and therefore incen...

  1. The Scope of Usage-based Theory

    Directory of Open Access Journals (Sweden)

    Paul eIbbotson

    2013-05-01

    Full Text Available Usage-based approaches typically draw on a relatively small set of cognitive processes, such as categorization, analogy and chunking to explain language structure and function. The goal of this paper is to first review the extent to which the ‘cognitive commitment’ of usage-based theory has had success in explaining empirical findings across domains, including language acquisition, processing and typology. We then look at the overall strengths and weaknesses of usage-based theory and highlight where there are significant debates. Finally, we draw special attention to a set of culturally generated structural patterns that seem to lie beyond the explanation of core usage-based cognitive processes. In this context we draw a distinction between cognition permitting language structure versus cognition entailing language structure. As well as addressing the need for greater clarity on the mechanisms of generalizations and the fundamental units of grammar, we suggest that integrating culturally generated structures within existing cognitive models of use will generate tighter predictions about how language works.

  2. Islamic Identity and Competitive Identities (Global, National and Ethnic Identity; A Case Study of Shiraz University Students

    Directory of Open Access Journals (Sweden)

    Mohammadtaghi Iman

    2013-06-01

    Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.

  3. Analysis of synonymous codon usage patterns in the genus Rhizobium.

    Science.gov (United States)

    Wang, Xinxin; Wu, Liang; Zhou, Ping; Zhu, Shengfeng; An, Wei; Chen, Yu; Zhao, Lin

    2013-11-01

    The codon usage patterns of rhizobia have received increasing attention. However, little information is available regarding the conserved features of the codon usage patterns in a typical rhizobial genus. The codon usage patterns of six completely sequenced strains belonging to the genus Rhizobium were analysed as model rhizobia in the present study. The relative neutrality plot showed that selection pressure played a role in codon usage in the genus Rhizobium. Spearman's rank correlation analysis combined with correspondence analysis (COA) showed that the codon adaptation index and the effective number of codons (ENC) had strong correlation with the first axis of the COA, which indicated the important role of gene expression level and the ENC in the codon usage patterns in this genus. The relative synonymous codon usage of Cys codons had the strongest correlation with the second axis of the COA. Accordingly, the usage of Cys codons was another important factor that shaped the codon usage patterns in Rhizobium genomes and was a conserved feature of the genus. Moreover, the comparison of codon usage between highly and lowly expressed genes showed that 20 unique preferred codons were shared among Rhizobium genomes, revealing another conserved feature of the genus. This is the first report of the codon usage patterns in the genus Rhizobium.

  4. Usage of Business Simulation Games in Croatia: Perceived Obstacles

    Directory of Open Access Journals (Sweden)

    Jovana Zoroja

    2013-09-01

    Full Text Available Business simulation games (BSGs enhance learning, since they actively involve students in the educational process through game playing. They began to play important role in business education in many universities in Croatia. However, quantitative information on their usage in higher educational institutions (HEIs in Croatia is still scarce. Goals of the paper are to explore: (1 differences among BSGs users and non-users according to demographic characteristics, (2 differences among BSGs users and non-users according to perceived obstacles of BSGs usage, and (3 impact of both demographic characteristics and perceived obstacles on the decision on usage or not-usage of BSGs. A survey was taken in business and economics departments of HEIs in Croatia. A regression model has been used to test the impact of demographic characteristics of educators and the perceived obstacles to the usage of BSGs in educational practice. Results indicate that BSGs usage is currently at a low level, mainly due to the lack of funds and management support. Academic rank, gender, and attitude toward new technologies also impact BSGs usage.

  5. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge

    Science.gov (United States)

    Grijpink, Jan

    2004-06-01

    Along at least twelve dimensions biometric systems might vary. We need to exploit this variety to manoeuvre biometrics into place to be able to realise its social potential. Subsequently, two perspectives on biometrics are proposed revealing that biometrics will probably be ineffective in combating identity fraud, organised crime and terrorism: (1) the value chain perspective explains the first barrier: our strong preference for large scale biometric systems for general compulsory use. These biometric systems cause successful infringements to spread unnoticed. A biometric system will only function adequately if biometrics is indispensable for solving the dominant chain problem. Multi-chain use of biometrics takes it beyond the boundaries of good manageability. (2) the identity fraud perspective exposes the second barrier: our traditional approach to identity verification. We focus on identity documents, neglecting the person and the situation involved. Moreover, western legal cultures have made identity verification procedures known, transparent, uniform and predictable. Thus, we have developed a blind spot to identity fraud. Biometrics provides good potential to better checking persons, but will probably be used to enhance identity documents. Biometrics will only pay off if it confronts the identity fraudster with less predictable verification processes and more risks of his identity fraud being spotted. Standardised large scale applications of biometrics for general compulsory use without countervailing measures will probably produce the reverse. This contribution tentatively presents a few headlines for an overall biometrics strategy that could better resist identity fraud.

  6. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  7. Cielo Computational Environment Usage Model With Mappings to ACE Requirements for the General Availability User Environment Capabilities Release Version 1.1

    Energy Technology Data Exchange (ETDEWEB)

    Vigil,Benny Manuel [Los Alamos National Laboratory; Ballance, Robert [SNL; Haskell, Karen [SNL

    2012-08-09

    Cielo is a massively parallel supercomputer funded by the DOE/NNSA Advanced Simulation and Computing (ASC) program, and operated by the Alliance for Computing at Extreme Scale (ACES), a partnership between Los Alamos National Laboratory (LANL) and Sandia National Laboratories (SNL). The primary Cielo compute platform is physically located at Los Alamos National Laboratory. This Cielo Computational Environment Usage Model documents the capabilities and the environment to be provided for the Q1 FY12 Level 2 Cielo Capability Computing (CCC) Platform Production Readiness Milestone. This document describes specific capabilities, tools, and procedures to support both local and remote users. The model is focused on the needs of the ASC user working in the secure computing environments at Lawrence Livermore National Laboratory (LLNL), Los Alamos National Laboratory, or Sandia National Laboratories, but also addresses the needs of users working in the unclassified environment. The Cielo Computational Environment Usage Model maps the provided capabilities to the tri-Lab ASC Computing Environment (ACE) Version 8.0 requirements. The ACE requirements reflect the high performance computing requirements for the Production Readiness Milestone user environment capabilities of the ASC community. A description of ACE requirements met, and those requirements that are not met, are included in each section of this document. The Cielo Computing Environment, along with the ACE mappings, has been issued and reviewed throughout the tri-Lab community.

  8. Cloud Usage Patterns : A Formalism for Description of Cloud Usage Scenarios

    NARCIS (Netherlands)

    Milenkoski, Aleksandar; Iosup, Alexandru; Kounev, Samuel; Sachs, Kai; Rygielski, Piotr; Ding, Jason; Cirne, Walfredo; Rosenberg, Florian

    2014-01-01

    Cloud computing is becoming an increasingly lucrative branch of the existing information and communication technologies (ICT). Enabling a debate about cloud usage scenarios can help with attracting new customers, sharing best-practices, and designing new cloud services. In contrast to previous

  9. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    Science.gov (United States)

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Library training to promote electronic resource usage

    DEFF Research Database (Denmark)

    Frandsen, Tove Faber; Tibyampansha, Dativa; Ibrahim, Glory

    2017-01-01

    Purpose: Increasing the usage of electronic resources is an issue of concern for many libraries all over the world. Several studies stress the importance of information literacy and instruction in order to increase the usage. Design/methodology/approach: The present article presents the results...

  11. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  12. NoSQL: collection document and cloud by using a dynamic web query form

    Science.gov (United States)

    Abdalla, Hemn B.; Lin, Jinzhao; Li, Guoquan

    2015-07-01

    Mongo-DB (from "humongous") is an open-source document database and the leading NoSQL database. A NoSQL (Not Only SQL, next generation databases, being non-relational, deal, open-source and horizontally scalable) presenting a mechanism for storage and retrieval of documents. Previously, we stored and retrieved the data using the SQL queries. Here, we use the MonogoDB that means we are not utilizing the MySQL and SQL queries. Directly importing the documents into our Drives, retrieving the documents on that drive by not applying the SQL queries, using the IO BufferReader and Writer, BufferReader for importing our type of document files to my folder (Drive). For retrieving the document files, the usage is BufferWriter from the particular folder (or) Drive. In this sense, providing the security for those storing files for what purpose means if we store the documents in our local folder means all or views that file and modified that file. So preventing that file, we are furnishing the security. The original document files will be changed to another format like in this paper; Binary format is used. Our documents will be converting to the binary format after that direct storing in one of our folder, that time the storage space will provide the private key for accessing that file. Wherever any user tries to discover the Document files means that file data are in the binary format, the document's file owner simply views that original format using that personal key from receive the secret key from the cloud.

  13. Cost and usage patterns of antibiotics in a tertiary care neurosurgical unit

    Directory of Open Access Journals (Sweden)

    Manish Singh Sharma

    2012-01-01

    Full Text Available Objectives: The routine use of prophylactic antibiotics in neurosurgery has been shown to significantly reduce surgical site infection rates. The documentation of non-surgical site, nosocomial infections in neurosurgical patients remains limited, despite this being a stimulus for prolific antibiotic usage. The actual quantum of antibiotic use in neurosurgery and its role in infection control remain both undocumented and controversial. The authors address this issue with a cost-effectiveness study using historical controls. Materials and Methods: Bacteriologically positive body fluid samples were used to quantify infection rates in the year 2006 and compared with those in the year 1997. Itemized drug lists obtained from dedicated neurosurgical intensive care units and wards were used to quantify antibiotic usage and calculate their costs. Results were compared using both historical and internal controls. The monetary conversion factor used was INR 40=US$1. Results: A total of 3114 consecutive elective and emergency neurosurgical procedures were performed during the study period. 329 patients (10.6% were recorded to have bacteriologically positive body fluid samples, and 100,250 units of antibiotics were consumed costing Rs. 14,378,227.5 ($359,455.7. On an average, an operated patient received 32.2 units of antibiotics valued at Rs. 4,617 ($115.4. The crude infection rates were recorded to have reduced significantly in comparison to 1997, but did not differ between mirror intra-departmental units with significantly different antibiotic usage. Conclusions: Antibiotics accounted for 31% of the per capita cost of consumables for performing a craniotomy in the year 2006. This estimate should be factored into projecting future package costs.

  14. 40 CFR 52.254 - Organic solvent usage.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Organic solvent usage. 52.254 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS California § 52.254 Organic solvent usage. (a) This... (d) of this section and the architectural coatings and solvent disposal emission limitations...

  15. The Barriers and Causes of Building Information Modelling Usage for Interior Design Industry

    Science.gov (United States)

    Hamid, A. B. Abd; Taib, M. Z. Mohd; Razak, A. H. N. Abdul; Embi, M. R.

    2017-12-01

    Building Information Modeling (BIM) has since developed alongside the improvement in the construction industry, purposely to simulate the design, management, construction and documentation. It facilitates and monitors the construction through visualization and emphasizes on various inputs to virtually design and construct a building using specific software. This study aims to identify and elaborate barriers of BIM usage in interior design industry in Malaysia. This study is initiated with a pilot survey utilising sixteen respondents that has been randomly chosen. Respondents are attached with interior design firms that are registered by Lembaga Arkitek Malaysia (LAM). The research findings are expected to provide significant information to encourage BIM adoption among interior design firms.

  16. Usage of the cyclotron facility local area network

    International Nuclear Information System (INIS)

    Heinzmann, H.; Peters, J.; Thow, T.J.

    1988-01-01

    Local area network of controllers at the Karlsruhe cyclotyron is shown. Experience after two years of usage is described. The system is applied controlling, data acquisition, management, databases usage

  17. Why can’t users choose their identity providers on the web?

    Directory of Open Access Journals (Sweden)

    Corre Kevin

    2017-07-01

    Full Text Available Authentication delegation is a major function of the modern web. Identity Providers (IdP acquired a central role by providing this function to other web services. By knowing which web services or web applications access its service, an IdP can violate the enduser privacy by discovering information that the user did not want to share with its IdP. For instance, WebRTC introduces a new field of usage as authentication delegation happens during the call session establishment, between two users. As a result, an IdP can easily discover that Bob has a meeting with Alice. A second issue that increases the privacy violation is the lack of choice for the end-user to select its own IdP. Indeed, on many web-applications, the end-user can only select between a subset of IdPs, in most cases Facebook or Google. In this paper, we analyze this phenomena, in particular why the end-user cannot easily select its preferred IdP, though there exists standards in this field such as OpenID Connect and OAuth 2? To lead this analysis, we conduct three investigations. The first one is a field survey on OAuth 2 and OpenID Connect scope usage by web sites to understand if scopes requested by websites could allow for user defined IdPs. The second one tries to understand whether the problem comes from the OAuth 2 protocol or its implementations by IdP. The last one tries to understand if trust relations between websites and IdP could prevent the end user to select its own IdP. Finally, we sketch possible architecture for web browser based identity management, and report on the implementation of a prototype.

  18. BUILDING FACADE DOCUMENTATION USING LASER SCANNING AND PHOTOGRAMMETRY AND DATA IMPLEMENTATION INTO BIM

    Directory of Open Access Journals (Sweden)

    M. Faltýnová

    2016-06-01

    Full Text Available A project started last year called MORE-CONNECT, which focuses on the renovation of buildings (especially building facades using prefabricated elements. The aim of this project is to create a competitive solution consisting of a technology and processes which enable fast, cost-effective renovation with minimal difficulties to inhabitants. Significant cost savings in renovation costs lies in the usage of prefabricated elements and the reduction of construction works on site. The precision of the prefabricated element depends on the precision of the construction, project and building documentation. This article offers an overview of the possible methods for building documentation and spatial data transfer into BIM (Building Information Modelling software. The description of methods focuses on laser scanning and photogrammetry (including RPAS based, its advantages, disadvantages and limitations according to the documented building, level of renovation, situation on site etc. The next part involves spatial data transfer into BIM software. A proposed solution is tested in a case study.

  19. Official pedagogic identities from South African policy – some implications for mathematics teacher education practice

    Directory of Open Access Journals (Sweden)

    Diane Parker

    2006-10-01

    Full Text Available In South Africa the National Curriculum Statement for Grades 10 – 12 (General: Mathematics (DoE, 2003 together with the Norms and Standards for Educators (DoE, 2000a are key policy documents that provide the official basis for mathematics education reform and for the construction of new pedagogic identities. In this paper I use a framework based on the work of Bernstein (1996, 2000 to theorise the construction of pedagogic identities. I use this to build on Graven’s (2002 description of the new official pedagogic identity of the South African mathematics teacher, and on Adler et al. (2002 and others to raise questions related to teacher knowledge and the challenges  of developing specialist mathematics teacher identities through initial teacher education programmes.

  20. Genome-wide analysis of codon usage bias in Ebolavirus.

    Science.gov (United States)

    Cristina, Juan; Moreno, Pilar; Moratorio, Gonzalo; Musto, Héctor

    2015-01-22

    Ebola virus (EBOV) is a member of the family Filoviridae and its genome consists of a 19-kb, single-stranded, negative sense RNA. EBOV is subdivided into five distinct species with different pathogenicities, being Zaire ebolavirus (ZEBOV) the most lethal species. The interplay of codon usage among viruses and their hosts is expected to affect overall viral survival, fitness, evasion from host's immune system and evolution. In the present study, we performed comprehensive analyses of codon usage and composition of ZEBOV. Effective number of codons (ENC) indicates that the overall codon usage among ZEBOV strains is slightly biased. Different codon preferences in ZEBOV genes in relation to codon usage of human genes were found. Highly preferred codons are all A-ending triplets, which strongly suggests that mutational bias is a main force shaping codon usage in ZEBOV. Dinucleotide composition also plays a role in the overall pattern of ZEBOV codon usage. ZEBOV does not seem to use the most abundant tRNAs present in the human cells for most of their preferred codons. Copyright © 2014 Elsevier B.V. All rights reserved.

  1. The Use of Speech Technology to Protect the Document Turnover

    Directory of Open Access Journals (Sweden)

    Alexandr M. Alyushin

    2017-06-01

    Full Text Available The wide current paper documents implementation in practice workflows are shown. The basic aspects of document protection related to the protection of their content and legal components are underlined. For contextual component assigned semantic information aspect of the document is considered. For legal component attributed facts and conditions for the creation, approval, negotiation of the document to specific persons is viewed. The documents protection problem importance is shown in connection with possible terrorist threats. The importance of such factor as the time of fraud detection towards the efficiency of documents protection is shown. The fraud detection time requirements for documents of different nature – financial, legal, management is analyzed. The documents used for the operational management of dangerous objects is point out as the most sensitive to the falsification. It is shown that their deliberate falsification can lead to accidents and technogenic catastrophes and human casualties. A comparative analysis of currently used protecting documents methods are presented. Biometric and non-biometric methods of documents protection are point out.Theanalysis of their short comings are given. The conclusion about the prospects of document protection on the basis of the voice signature technology are done. The basic steps of voice information processing in the implementation of this technology are analyzed. The software that implements a documents counterfeiting new protection technology is proposed. The technology is based on the audiomarkers usage at the end of the document, which contains a general information about it. The technology is applicable to the wide range of documents such as financial and valuable papers, contracts, etc. One of the most important advantages of this technology is that any changes in the document can not be done without the author of the document because audiomarker keeps the biometric data of the person

  2. Boundaries of American Identity: Relations between Ethnic Group Prototypicality and Policy Attitudes

    Science.gov (United States)

    Huynh, Que-Lam; Devos, Thierry; Altman, Hannah R.

    2014-01-01

    We sought to document that the extent to which different ethnic groups are perceived as embodying the American identity is more strongly linked to anti-minority policy attitudes and acculturation ideologies among majority group members (European Americans) than among minority group members (Asian Americans or Latino/as). Participants rated 13 attributes of the American identity as they pertain to different ethnic groups, and reported their endorsement of policy attitudes and acculturation ideologies. We found a relative consensus across ethnic groups regarding defining components of the American identity. However, European Americans were perceived as more prototypical of this American identity than ethnic minorities, especially by European American raters. Moreover, for European Americans but not for ethnic minorities, relative ingroup prototypicality was related to anti-minority policy attitudes and acculturation ideologies. These findings suggest that for European Americans, perceptions of ethnic group prototypicality fulfill an instrumental function linked to preserving their group interests and limiting the rights afforded to ethnic minorities. PMID:26347578

  3. Boundaries of American Identity: Relations between Ethnic Group Prototypicality and Policy Attitudes.

    Science.gov (United States)

    Huynh, Que-Lam; Devos, Thierry; Altman, Hannah R

    2015-08-01

    We sought to document that the extent to which different ethnic groups are perceived as embodying the American identity is more strongly linked to anti-minority policy attitudes and acculturation ideologies among majority group members (European Americans) than among minority group members (Asian Americans or Latino/as). Participants rated 13 attributes of the American identity as they pertain to different ethnic groups, and reported their endorsement of policy attitudes and acculturation ideologies. We found a relative consensus across ethnic groups regarding defining components of the American identity. However, European Americans were perceived as more prototypical of this American identity than ethnic minorities, especially by European American raters. Moreover, for European Americans but not for ethnic minorities, relative ingroup prototypicality was related to anti-minority policy attitudes and acculturation ideologies. These findings suggest that for European Americans, perceptions of ethnic group prototypicality fulfill an instrumental function linked to preserving their group interests and limiting the rights afforded to ethnic minorities.

  4. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  5. Health-related behaviors and technology usage among college students.

    Science.gov (United States)

    Melton, Bridget F; Bigham, Lauren E; Bland, Helen W; Bird, Matthew; Fairman, Ciaran

    2014-07-01

    To examine associations between technology usage and specific health factors among college students. The research employed was a quantitative, descriptive, cross-sectional design; undergraduate students enrolled in spring 2012 general health education courses were recruited to participate. To explore college students' specific technology usage and health-related behaviors, a 28-item questionnaire was utilized. Statistical significant differences of technology usage were found between 3 of the 4 health-related behaviors under study (BMI, sleep, and nutrition) (p technology usage continues to evolve within the college student population, health professionals need to understand its implications on health behaviors.

  6. Regulatory control for safe usage of radiation sources in India

    International Nuclear Information System (INIS)

    Ghosh, P.K.; Sonawane, A.U.

    1998-01-01

    The widespread applications of radioactive materials and radiation generating equipment in the field of industry, medicine agriculture and research in India necessitated the establishment of an efficient regulatory framework and consequently the Atomic Energy Regulatory Board (AERB) was constituted to exercise regulatory control over the safe usage of the radioactive materials and the radiation generating equipment. The Atomic Energy Act, 1962 and the Radiation Protection Rules, 1971 promulgated under the Act forms the basis of radiation safety in India and Chairman, AERB is the Competent Authority to enforce the regulatory provisions of the Radiation Protection Rules, 1971, for safe use of radiation source in the country. AERB has published a number of documents such as Radiation Surveillance Procedures, Standards, Codes, Guides and Manuals for safe use and handling of radioactive materials and radiation generating equipment. Apart from nuclear fuel cycle documents, these publications pertain to industrial radiography, medical application of radiation, transport of radioactive material, industrial gamma irradiators, X-ray units etc. AERB safety related publications are based on international standards e.g. BSS, IAEA, ICRP, ISO etc. This paper outlines the methodology of regulatory control exercised by AERB for safe use of the radioactive materials and the radiation generating equipment in the country. (author)

  7. Definite Article Usage across Varieties of English

    Science.gov (United States)

    Wahid, Ridwan

    2013-01-01

    This paper seeks to explore the extent of definite article usage variation in several varieties of English based on a classification of its usage types. An annotation scheme based on Hawkins and Prince was developed for this purpose. Using matching corpus data representing Inner Circle varieties and Outer Circle varieties, analysis was made on…

  8. Institutionalisation of Japan Identity Construction Policy

    Directory of Open Access Journals (Sweden)

    Zadvornaya Elena S.

    2016-09-01

    Full Text Available The article is devoted to the development of the modern politics of identity construction in Japan, which actively refers to the practice of designing self-image in international relations. This trend dates back to the 19th century, when there was the end of Sakoku (Japan’s policy of isolation. It is now possible to talk about the institutionalization of the identity construction policy to organized structures and regulations. Enhanced efforts in the field of Japanese traditional and popular culture, education and creative content has led to a number of institutions appearance (like Japan Foundation Fund, Japan Creative Agency, Japan Culture Fund, Agency for Cultural Affairs, Cool Japan Fund, Japan brand Fund and changing idea about the role of culture in foreign policy realization (it is fixed the documents of the Japanese Ministry of Foreign Affairs, the Ministry of Land, Infrastructure, Transport and Tourism, the Ministry of Education, Culture, Sports, Science and Technology, the Ministry of Economy, Trade and Industry, as well as a number of projects (Cool Japan, Visit Japan, Japan Culture Power, Japan Manga Awards, Kawaii Ambassadors, Cosplay International Fest and etc.. These efforts are aimed at forming Japan identity abroad to solve a number of foreign policy challenges of the future and the development of economic cooperation. The Japanese government nearest plans is to increase funding in order to create a positive image of Japan in the region of East Asia. All of these allows us to speak about the policy of the Japanese construction of identity as an institutionalized process in which there was clearance of organizations and regulatory activities.

  9. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  10. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  11. "I'm Scared of the Disappointment": Young Adult Smokers' Relational Identity Gaps and Management Strategies as Sites of Communication Intervention.

    Science.gov (United States)

    Stanley, Samantha J; Pitts, Margaret Jane

    2018-02-22

    While cigarette smoking is decreasing among young adults, rates of nicotine consumption through other devices, most notably electronic cigarettes, are on the rise. Framed by communication theory of identity, this study examines young adult smokers' experiences with relational others in regard to their smoking. Focus group discussions and individual interviews convened with 20 young adult cigarette and electronic cigarette smokers revealed identity gaps implicating the relational layer of identity, including personal-relational, enacted-relational, and personal-enacted-relational identity gaps. Participants used communicative and behavioral strategies to manage relational discrepancies. The documented identity gaps and management strategies present opportunities for targeted smoking cessation interventions that amplify dissonance created through identity gaps as a motivational tactic.

  12. Evidence for cross-script abstract identities in learners of Japanese kana.

    Science.gov (United States)

    Schubert, Teresa; Gawthrop, Roderick; Kinoshita, Sachiko

    2018-05-07

    The presence of abstract letter identity representations in the Roman alphabet has been well documented. These representations are invariant to letter case (upper vs. lower) and visual appearance. For example, "a" and "A" are represented by the same abstract identity. Recent research has begun to consider whether the processing of non-Roman orthographies also involves abstract orthographic representations. In the present study, we sought evidence for abstract identities in Japanese kana, which consist of two scripts, hiragana and katakana. Abstract identities would be invariant to the script used as well as to the degree of visual similarity. We adapted the cross-case masked-priming letter match task used in previous research on Roman letters, by presenting cross-script kana pairs and testing adult beginning -to- intermediate Japanese second-language (L2) learners (first-language English readers). We found robust cross-script priming effects, which were equal in magnitude for visually similar (e.g., り/リ) and dissimilar (e.g., あ/ア) kana pairs. This pattern was found despite participants' imperfect explicit knowledge of the kana names, particularly for katakana. We also replicated prior findings from Roman abstract letter identities in the same participants. Ours is the first study reporting abstract kana identity priming (in adult L2 learners). Furthermore, these representations were acquired relatively early in our adult L2 learners.

  13. Usage Inspection of KN-12 Spent Fuel Transport Cask

    International Nuclear Information System (INIS)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K.

    2007-03-01

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse

  14. Seatbelt usage: is there an association with obesity?

    Science.gov (United States)

    Behzad, B; King, D M; Jacobson, S H

    2014-09-01

    Wearing a seatbelt can prevent motor vehicle crash deaths. While primary seatbelt laws are designed to encourage vehicle passengers to wear seatbelts by allowing law enforcement officers to issue tickets when passengers do not wear seatbelts, discomfort may discourage obese individuals from wearing a seatbelt. The objective of this study is to assess the association between state-level obesity and seatbelt usage rates in the US, and to examine the possible role played by seatbelt laws in these associations. The strength of the association between obesity rates, seatbelt usage, and primary seatbelt laws at the state level is investigated using data from 2006 to 2011. Linear regression analysis is employed. This model estimates that increasing the obesity rate by 1% in a state where a primary seatbelt law (by which law enforcement officers can issue a ticket when seatbelts are not worn) is in effect is associated with a 0.06% decrease in seatbelt usage. However the same percentage of increase in the obesity rate in a state where no primary seatbelt law is in effect is associated with a 0.55% decrease in seatbelt usage. The magnitude of the statistical association between state obesity rates and state-level seatbelt usage is related to the existence of a primary seatbelt law, such that obesity has less impact on seatbelt usage in states where primary seatbelt laws are in effect. Published by Elsevier Ltd.

  15. Document localization algorithms based on feature points and straight lines

    Science.gov (United States)

    Skoryukina, Natalya; Shemiakina, Julia; Arlazarov, Vladimir L.; Faradjev, Igor

    2018-04-01

    The important part of the system of a planar rectangular object analysis is the localization: the estimation of projective transform from template image of an object to its photograph. The system also includes such subsystems as the selection and recognition of text fields, the usage of contexts etc. In this paper three localization algorithms are described. All algorithms use feature points and two of them also analyze near-horizontal and near- vertical lines on the photograph. The algorithms and their combinations are tested on a dataset of real document photographs. Also the method of localization quality estimation is proposed that allows configuring the localization subsystem independently of the other subsystems quality.

  16. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  17. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  18. Opportunistic resource usage in CMS

    International Nuclear Information System (INIS)

    Kreuzer, Peter; Hufnagel, Dirk; Dykstra, D; Gutsche, O; Tadel, M; Sfiligoi, I; Letts, J; Wuerthwein, F; McCrea, A; Bockelman, B; Fajardo, E; Linares, L; Wagner, R; Konstantinov, P; Blumenfeld, B; Bradley, D

    2014-01-01

    CMS is using a tiered setup of dedicated computing resources provided by sites distributed over the world and organized in WLCG. These sites pledge resources to CMS and are preparing them especially for CMS to run the experiment's applications. But there are more resources available opportunistically both on the GRID and in local university and research clusters which can be used for CMS applications. We will present CMS' strategy to use opportunistic resources and prepare them dynamically to run CMS applications. CMS is able to run its applications on resources that can be reached through the GRID, through EC2 compliant cloud interfaces. Even resources that can be used through ssh login nodes can be harnessed. All of these usage modes are integrated transparently into the GlideIn WMS submission infrastructure, which is the basis of CMS' opportunistic resource usage strategy. Technologies like Parrot to mount the software distribution via CVMFS and xrootd for access to data and simulation samples via the WAN are used and will be described. We will summarize the experience with opportunistic resource usage and give an outlook for the restart of LHC data taking in 2015.

  19. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  20. E-book usage on a global scale: patterns, trends and opportunities

    Directory of Open Access Journals (Sweden)

    Michael Levine-Clark

    2015-07-01

    Full Text Available This study examines worldwide usage of over 600,000 e-books from EBL and ebrary. Using multiple modes of analysis, the study shows that there are variations in usage by geographic region as well as by subject. The study examines usage in relation to availability of titles, different types of usage per session, usage of the top ten percent of titles, and intensive and extensive use. These patterns can be used for benchmarking and as a model for local e-book studies.

  1. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  2. Synonymous Codon Usage Analysis of Thirty Two Mycobacteriophage Genomes

    Directory of Open Access Journals (Sweden)

    Sameer Hassan

    2009-01-01

    Full Text Available Synonymous codon usage of protein coding genes of thirty two completely sequenced mycobacteriophage genomes was studied using multivariate statistical analysis. One of the major factors influencing codon usage is identified to be compositional bias. Codons ending with either C or G are preferred in highly expressed genes among which C ending codons are highly preferred over G ending codons. A strong negative correlation between effective number of codons (Nc and GC3s content was also observed, showing that the codon usage was effected by gene nucleotide composition. Translational selection is also identified to play a role in shaping the codon usage operative at the level of translational accuracy. High level of heterogeneity is seen among and between the genomes. Length of genes is also identified to influence the codon usage in 11 out of 32 phage genomes. Mycobacteriophage Cooper is identified to be the highly biased genome with better translation efficiency comparing well with the host specific tRNA genes.

  3. Usage Inspection of KN-12 Spent Fuel Transport Cask

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K

    2007-03-15

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse.

  4. Universality and Shannon entropy of codon usage

    CERN Document Server

    Frappat, L; Sciarrino, A; Sorba, Paul

    2003-01-01

    The distribution functions of the codon usage probabilities, computed over all the available GenBank data, for 40 eukaryotic biological species and 5 chloroplasts, do not follow a Zipf law, but are best fitted by the sum of a constant, an exponential and a linear function in the rank of usage. For mitochondriae the analysis is not conclusive. A quantum-mechanics-inspired model is proposed to describe the observed behaviour. These functions are characterized by parameters that strongly depend on the total GC content of the coding regions of biological species. It is predicted that the codon usage is the same in all exonic genes with the same GC content. The Shannon entropy for codons, also strongly depending on the exonic GC content, is computed.

  5. Relationship between Impulsivity, Social Media Usage and Loneliness

    Directory of Open Access Journals (Sweden)

    Mustafa Savci

    2016-03-01

    Full Text Available The purpose of this study is to examine the relationships between impulsivity, social media usage, and loneliness and to test the structural hypothetical model developed based on the literature. The study was conducted on 307 (164 female, 143 male university students. Data collection instruments of the study were the Barratt Impulsivity Scale Short Form (BIS-11-SF, Social Media Usage Scale (SMUS, and UCLA Loneliness Scale Short Form (ULS-8. The measurement models of the latent variables were tested initially and it was observed that the scales of the latent variables were efficient enough to be included in the structural equation model. In addition, the suggested hypothetical model was tested. According to the analysis, it was observed that impulsivity directly, positively and significantly predicts social media usage, that social media usage directly, positively and significantly predicts loneliness, and that impulsivity indirectly, positively and significantly predicts loneliness.

  6. Documented Evidence of Employment Discrimination & Its Effects on LGBT People

    OpenAIRE

    Sears, Brad; Mallory, Christy

    2011-01-01

    Although sexual orientation and gender identity have no relationship to workplace performance, during the past four decades a large body of research using a variety of methodologies has consistently documented high levels of discrimination against lesbians, gay men, bisexuals and transgendered (LGBT) people at work. Evidence of discrimination has been reviewed and summarized in two recent reports by the Williams Institute at UCLA School of Law: a 2009 report focused on discrimination in the p...

  7. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  8. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  9. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  10. Foreign Language Instruction from a dynamic usage-based (DUB) perspective

    NARCIS (Netherlands)

    Rousse-Malpat, Audrey; Verspoor, Marjolijn; Tyler, Andrea E.; Ortega, Lourdes; Uno, Mariko; Park, Hae In

    2018-01-01

    In this chapter we combine ideas of usage based linguistics and dynamic systems theory to argue that language is a dynamic usage based system and L2 learning is a dynamic process. Two teaching approaches based on Dynamic Usage-based (DUB) principles with mainly implicit attention to form--a movie

  11. METEOR v1.0 - A usage example

    International Nuclear Information System (INIS)

    Palomo, E.

    1994-01-01

    This script describes a detailed example of the use of the software package METEOR for statistical analysis of meteorological data series. A real spanish meteorological data set is chosen to show the capabilities of METEOR. Output files and resultant plots provided of their interpretations are compiled in three appendixes. The original version of METEOR have been developed by Ph. D.Elena Palomo, CIEMAT-IER, GIASE. It is built by linking programs and routines written in FORTRAN 77 and it adds the graphical capabilities of GNUPLOT. The shape of this toolbox was designed following the criteria of modularity, flexibility and agility criteria. All the input, output and analysis options are structured in three main menus: i) the first is aimed to evaluate the quality of the data set; ii) the second is aimed for pre-processing of the data; and iii) the third is aimed towards the statistical analyses and for creating the graphical outputs. Actually the information about METEOR is constituted by three documents written is spanish: 1) METEOR v1.0: User's guide; 2) METEOR v1.0: A usage example; 3) METEOR v1 .0: Design and structure of the software package. (Author)

  12. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    Science.gov (United States)

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2018-04-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  13. Analysis of Usage Patterns in Large Multimedia Websites

    Science.gov (United States)

    Singh, Rahul; Bhattarai, Bibek

    User behavior in a website is a critical indicator of the web site's usability and success. Therefore an understanding of usage patterns is essential to website design optimization. In this context, large multimedia websites pose a significant challenge for comprehension of the complex and diverse user behaviors they sustain. This is due to the complexity of analyzing and understanding user-data interactions in media-rich contexts. In this chapter we present a novel multi-perspective approach for usability analysis of large media rich websites. Our research combines multimedia web content analysis with elements of web-log analysis and visualization/visual mining of web usage metadata. Multimedia content analysis allows direct estimation of the information-cues presented to a user by the web content. Analysis of web logs and usage-metadata, such as location, type, and frequency of interactions provides a complimentary perspective on the site's usage. The entire set of information is leveraged through powerful visualization and interactive querying techniques to provide analysis of usage patterns, measure of design quality, as well as the ability to rapidly identify problems in the web-site design. Experiments on media rich sites including the SkyServer - a large multimedia web-based astronomy information repository demonstrate the efficacy and promise of the proposed approach.

  14. Mobile usage and sleep patterns among medical students.

    Science.gov (United States)

    Yogesh, Saxena; Abha, Shrivastava; Priyanka, Singh

    2014-01-01

    Exposure of humans to radio frequency electromagnetic field (EMF) both during receiving and transmitting the signals has amplified public and scientific debate about possible adverse effects on human health. The study was designed with the objective of assessing the extent of mobile phone use amongst medical students and finding correlation if any between the hours of usage of mobile to sleep pattern and quality. hundred medical students grouped as cases (n = 57) (> 2 hours/day of mobile usage) and control (n = 43) (≤ 2 hours/day of mobile usage) were examined for their sleep quality & pattern by Pittsburg sleep Quality Index (PSQI). Differences between groups were examined with the Mann Whitney "U" test for proportions (Quantitative values) and with Student't' test for continuous variables. The association of variables was analyzed by Spearman Rank's correlation. Probability was set at usage and sleep indices were observed in both genders (males r = 0.25; p = 0.04, females r = 0.31; p = 0.009). Evening usage of mobile phone in cases showed a statistically significant negative association (-0.606; p = 0.042) with Sleep quality (higher PSQI means sleep deprivation). Students using mobile for > 2 hours/day may cause sleep deprivation and day sleepiness affecting cognitive and learning abilities of medical students.

  15. Teacher Identity in a Multicultural Rural School: Lessons Learned at Vista Charter

    Science.gov (United States)

    Wenger, Kerri J.; Dinsmore, Jan; Villagomez, Amanda

    2012-01-01

    In this paper, we describe a 30-month qualitative exploration of diverse teachers' identities in a high-poverty, bilingual, K-8 public charter school in rural eastern Oregon. First, we use the perspectives of saberes docentes and a situated view of teacher development to document the life histories of monolingual and bilingual teachers at Vista…

  16. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  17. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  18. Burnout and Humor Usage among Community College Nursing Faculty Members.

    Science.gov (United States)

    Talbot, Laura A.

    2000-01-01

    Assesses the correlation of burnout among community college nursing faculty members and their use of humor to mediate academic stress related to burnout. Differences in burnout between high versus low humor usage respondents showed a higher sense of personal accomplishment with high humor usage. Of those with low humor usage, workload was related…

  19. Blood politics, ethnic identity, and racial misclassification among American Indians and Alaska Natives.

    Science.gov (United States)

    Haozous, Emily A; Strickland, Carolyn J; Palacios, Janelle F; Solomon, Teshia G Arambula

    2014-01-01

    Misclassification of race in medical and mortality records has long been documented as an issue in American Indian/Alaska Native data. Yet, little has been shared in a cohesive narrative which outlines why misclassification of American Indian/Alaska Native identity occurs. The purpose of this paper is to provide a summary of the current state of the science in racial misclassification among American Indians and Alaska Natives. We also provide a historical context on the importance of this problem and describe the ongoing political processes that both affect racial misclassification and contribute to the context of American Indian and Alaska Native identity.

  20. Game-Theoretic Models for Usage-based Maintenance Contract

    Science.gov (United States)

    Husniah, H.; Wangsaputra, R.; Cakravastia, A.; Iskandar, B. P.

    2018-03-01

    A usage-based maintenance contracts with coordination and non coordination between two parties is studied in this paper. The contract is applied to a dump truck operated in a mining industry. The situation under study is that an agent offers service contract to the owner of the truck after warranty ends. This contract has only a time limit but no usage limit. If the total usage per period exceeds the maximum usage allowed in the contract, then the owner will be charged an additional cost. In general, the agent (Original Equipment Manufacturer/OEM) provides a full coverage of maintenance, which includes PM and CM under the lease contract. The decision problem for the owner is to select the best option offered that fits to its requirement, and the decision problem for the agent is to find the optimal maintenance efforts for a given price of the service option offered. We first find the optimal decisions using coordination scheme and then with non coordination scheme for both parties.

  1. Measuring ICT usage quality for information society building

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Danylchenko, Lesya

    2014-01-01

    In 2003 the World Summit on Information Society made a call for measuring the state of Information Society (IS) building between countries. The purpose of the measuring was to assess and compare IS practices around the globe as well as share best practices. A number of measurement tools have sinc...... levels of ICT usage for the purpose of better policy-making, while establishing an information society, is accentuated....... these indicators on the actual levels of Information and Communication Technology (ICT) usage off the country’s stakeholders. This paper analyses the most currently used indices for measuring the state of Information Society building from the perspective of their constituent indicators. Based on the analysis......, an alternative framework for IS measurement, addressing the important aspects of ICT usage quality, is developed based on data from EU member states. By applying the framework on measuring of ICT usage quality at Romania, Cyprus and Estonia, the usefulness is tested positive, and the need to evaluate the actual...

  2. Ethical and Legal Considerations in Biometric Data Usage-Bulgarian Perspective.

    Science.gov (United States)

    Deliversky, Jordan; Deliverska, Mariela

    2018-01-01

    Ethical and legal considerations with regards to biometric data usage are directly related to the right to protection of personal data, which is part of the rights protected under the European Convention of human rights. Specific protection is required to the process and use of sensitive data which reveals certain personal characteristic and is related to the health status of individuals. Biometric data and information on individual upon which people could be identified based on specifics and distinguishing signs. Bulgaria, as a country progressing in terms of integration of digital technologies and as a European Union member state has adopted international and universal legal instruments related on the procession and use of digital data and data protection. On legislative and ethical grounds, it has been established the particular importance of not violating human rights and individual freedoms when processing and using personal data. It has been noted that the processing of special categories of personal data may be necessary for reasons of public interest in the field of public health and that is why under such circumstances it has been permitted the procession to be carried on without the consent of the data subject. Lack of transparency and lawfulness of the processing of personal data could lead to physical, tangible, or intangible damages where processing could lead to discrimination, identity theft, or identity fraud as a result of which may be significant adverse economic or social consequences. Increasingly, widespread use of biometrics in the implementation of medical activities requires the application of a new approach in terms of awareness regarding existing risks to the rights, ethics, and freedoms of all of us, as a user of medical service.

  3. Estimating Usage Can Reduce the Stress of Social Networking

    OpenAIRE

    Zhou, Y.; Bird, J.; Cox, A. L.; Brumby, D.

    2013-01-01

    Social networks are increasingly popular and provide benefits such as easy peer group communication. However, there is evidence that they can have negative consequences, such as increased stress levels. For two weeks, we provided participants with an objective measure of their social network usage and also asked them for a daily estimate of their usage over the previous 24 hours. Although their social network usage did not significantly change, participants’ perception of this activity was tr...

  4. System and methods of resource usage using an interoperable management framework

    Science.gov (United States)

    Heileman, Gregory L.; Jamkhedkar, Pramod A.; Lamb, Christopher C.

    2017-10-31

    Generic rights expression language allowing interoperability across different computing environments including resource usage of different applications. A formal framework for usage management provides scaffolding upon which interoperable usage management systems can be built. Certain features of the framework are standardized, such as the operational semantics, including areas free of standards that necessitate choice and innovation to achieve a balance of flexibility and usability for interoperability in usage management systems.

  5. Insecticide-treated nets usage and malaria episodes among ...

    African Journals Online (AJOL)

    ... is urgent need on the part of all the three tiers of Government for public health awareness campaigns through information, education and communication (IEC) to create positive ITN culture and usage. It is also suggested that ITN usage among boarding school pupils should be incorporated into school health service.

  6. Premarital Contraceptives Usage among Male and Female Adolescents.

    Science.gov (United States)

    Hornick, Joesph P.; And Others

    1979-01-01

    Variables important in predicting female contraception usage were found to be those which involved dyadic commitment, conditions of love, self-esteem, and father's occupation (social class). The best predictors of male contraception usage involved experience in dating and internalization of role models via mother's and father's permissiveness.…

  7. Designation of facility usage categories for Hanford Site facilities

    International Nuclear Information System (INIS)

    Wodrich, D.; Ellingson, D.; Scott, M.; Schade, A.

    1991-01-01

    This report summarizes the Hanford Site methodology used to ensure facility compliance with the natural phenomena design criteria set forth in the US Department of Energy orders and guidance. In particular, the Hanford Site approach to designating a suitable facility open-quotes Usage Category,close quotes is presented. The current Hanford Site methodology for Usage Category designation is based on an engineered feature's safety function and on the feature's assigned Safety Class. At the Hanford Site, Safety Class assignments are deterministic in nature and are based on the consequences of failure, without regard to the likelihood of occurrence. The report also proposes a risk-based approach to Usage Category designation, which is being considered for future application at the Hanford Site. To establish a proper Usage Category designation, the safety analysis and engineering design processes must be coupled. This union produces a common understanding of the safety function(s) to be accomplished by the design feature(s) and a sound basis for the assignment of Usage Categories to the appropriate systems, structures, and components

  8. Password Usage

    National Research Council Canada - National Science Library

    Burrows, James

    1995-01-01

    ...) personal identity authentication and (2) data access authorization. It establishes the basic criteria for the design, implementation and use of a password system in those systems where passwords are used...

  9. Evaluation of usage and fuel savings of solar ovens in Nicaragua

    International Nuclear Information System (INIS)

    Bauer, Gordon

    2016-01-01

    Solar cooking technology has been promoted as a solution to both global poverty and environmental degradation, but relatively little research exists on the impact of solar oven usage on biomass fuel consumption. This study evaluates solar oven usage and wood consumption in northern Nicaragua during both the rainy and dry seasons, using surveys, temperature dataloggers, and direct measurements of fuelwood use. Solar oven owners reported usage on 79% of days during the dry season, and 41% of days during the rainy season. Comparison with oven temperature records confirmed usage on 50% of days during the dry season, and 16% of days during the rainy season. However, wood consumption measurements showed no statistically significant difference between days with solar oven usage and days without, suggesting that frequency of usage alone is not an appropriate proxy for fuel savings. Survey results suggest that a large part of solar oven usage came in addition to biomass cooking, as opposed to replacing it. These results suggest a need for further study of wood consumption in situ and more focus on the specific kinds of foods prepared in solar cookers, as well as local cultural and climatic conditions. - Highlights: • Solar oven usage reported on most days during dry season. • No statistically significant fuelwood savings can be attributed to solar oven use. • Usage reported on surveys differs substantially from solar oven temperature data. • Possible causes of lack of wood savings range from weather to diet and gender norms.

  10. A Comparative Study of Mobile Internet Usage between the U.S. and Korea

    Directory of Open Access Journals (Sweden)

    Luke Yunkeun Shin

    2014-08-01

    Full Text Available The introduction of smartphones illuminated mobile internet prevalence, highlighting nomophobia. This study explored the mobile internet usage dependency of Korean and U.S. mobile users and investigated the severity of such usage dependency and the factors involved. In the combined data set, it was found that Korean users have higher usage dependency levels than US users and that students, unemployed users, and younger generations are more susceptible to mobile internet usage dependency. When comparing the two countries as separate data sets Korean females present as having higher usage dependency levels. In the U.S., it is students and younger generation groups who present with higher usage dependency levels. Regression analysis found that frequency of access has higher associations with mobile internet usage dependency than usage length. country of origin and age are significantly associated with mobile internet usage dependency.

  11. Vehicle usage verification system

    NARCIS (Netherlands)

    Scanlon, W.G.; McQuiston, Jonathan; Cotton, Simon L.

    2012-01-01

    EN)A computer-implemented system for verifying vehicle usage comprising a server capable of communication with a plurality of clients across a communications network. Each client is provided in a respective vehicle and with a respective global positioning system (GPS) by which the client can

  12. Mutations des métiers de l'information-documentation : vers l'émergence d'une culture de l'information numérique

    OpenAIRE

    Thiault , Florence

    2012-01-01

    National audience; Les sciences de l'information s'intéressent plus particulièrement à la construction des systèmes d'information, leurs usages et à la diffusion des savoirs par les moyens technologiques. L'inscription dans cette discipline des professions documentaires enrichit le cadre explicatif d'activités de nature technique. Les documents se sont diversifiés, la documentation est devenue un ensemble complexe de processus, reposant sur les anciennes méthodes bibliothéconomiques, mais int...

  13. Perceived driving safety and seatbelt usage.

    Science.gov (United States)

    Svenson, O; Fischhoff, B; MacGregor, D

    1985-04-01

    Swedish and U.S. subjects judged their own driving skills and safety in relation to other drivers. As in earlier studies, most subjects showed an optimism bias: a tendency to judge oneself as safer and more skillful than the average driver, with a smaller risk of getting involved and injured in an accident. Different measures of the optimism effect were strongly correlated with one another, with driving experience and with the judged importance of human factors (as opposed to technical and chance factors) in causing accidents. Degree of optimism was positively, but weakly, correlated with reported seatbelt usage and worry about traffic accidents. Seatbelt usage was positively related to the extent to which belts are judged to be convenient and popular, and more modestly related to the belt's perceived contributions to safety. These results suggest that providing more information about the effectiveness of seatbelts may not be as efficient a way of increasing seatbelt usage as emphasizing other factors, such as comfort and social norms, which cannot be outweighed by optimism.

  14. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  15. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  16. Understanding Mobile Social Media Usage

    DEFF Research Database (Denmark)

    Gan, Chunmei; Tan, Chee-Wee

    2017-01-01

    Despite the increasing popularity and growing trend of mobile social media in China, factors affecting users’ continued usage behavior remains unclear and deserves further scholarly attention. Synthesizing theories of expectation confirmation as well as uses and gratification, we advance a uses...... and gratification expectancy model that depicts how confirmation, perceived usability and gratification affect users’ continuance intention towards mobile social media. Empirical findings from an online survey of 247 respondents reveal that continuance intention is determined by a range of gratifications, including...... information sharing, media appeal and perceived enjoyment. In addition, confirmation of expectations and perceptions of usefulness gleaned through prior usage of mobile social media have significant effects on gratifications of information sharing, perceived enjoyment, social interaction, passing time...

  17. Tattoo inks in general usage contain nanoparticles

    DEFF Research Database (Denmark)

    Høgsberg, T; Löschner, Katrin; Löf, D

    2011-01-01

    the particle sizes in tattoo inks in general usage. Methods The particle size was measured by laser diffraction, electron microscopy and X-ray diffraction. Results The size of the pigments could be divided into three main classes. The black pigments were the smallest, the white pigments the largest...... in general usage is new and may contribute to the understanding of tattoo ink kinetics. How the body responds to NP tattoo pigments should be examined further....

  18. Usage of Recycled Pet

    Directory of Open Access Journals (Sweden)

    A. Ebru Tayyar

    2010-01-01

    Full Text Available The increasing industrialization, urbanization and the technological development have caused to increase depletion of the natural resources and environmental pollution's problem. Especially, for the countries which have not enough space recycling of the waste eliminating waste on regular basis or decreasing the amount and volume of waste have provided the important advantages. There are lots of studies and projects to develop both protect resources and prevent environmental pollution. PET bottles are commonly used in beverage industry and can be reused after physical and chemical recycling processes. Usage areas of recycled PET have been developed rapidly. Although recycled PET is used in plastic industry, composite industry also provides usage alternatives of recycled PET. Textile is a suitable sector for recycling of some plastics made of polymers too. In this study, the recycling technologies and applications of waste PET bottles have been investigated and scientific works in this area have been summarized.

  19. Antagonistic Functions of USAG-1 and RUNX2 during Tooth Development.

    Directory of Open Access Journals (Sweden)

    Yumiko Togo

    Full Text Available Supernumerary teeth and tooth agenesis are common morphological anomalies in humans. We previously obtained evidence that supernumerary maxillary incisors form as a result of the successive development of the rudimentary maxillary incisor tooth germ in Usag-1 null mice. The development of tooth germs is arrested in Runx2 null mice, and such mice also exhibit lingual epithelial buds associated with the upper molars and incisors. The aim of this study is to investigate the potential crosstalk between Usag-1 and Runx2 during tooth development. In the present study, three interesting phenomena were observed in double null Usag-1-/-/Runx2-/- mice: the prevalence of supernumerary teeth was lower than in Usag-1 null mice; tooth development progressed further compared than in Runx2 null mice; and the frequency of molar lingual buds was lower than in Runx2 null mice. Therefore, we suggest that RUNX2 and USAG-1 act in an antagonistic manner. The lingual bud was completely filled with odontogenic epithelial Sox2-positive cells in the Usag-1+/+/Runx2-/- mice, whereas almost no odontogenic epithelial Sox2-positive cells contributed to supernumerary tooth formation in the rudimentary maxillary incisors of the Usag-1-/-/Runx2+/+ mice. Our findings suggest that RUNX2 directly or indirectly prevents the differentiation and/or proliferation of odontogenic epithelial Sox2-positive cells. We hypothesize that RUNX2 inhibits the bone morphogenetic protein (BMP and/or Wnt signaling pathways regulated by USAG-1, whereas RUNX2 expression is induced by BMP signaling independently of USAG-1.

  20. Contract Report for Usage Inspection of KN-12 Transport Cask

    International Nuclear Information System (INIS)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K.

    2007-03-01

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse

  1. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  2. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  3. The Media and Technology Usage and Attitudes Scale: An empirical investigation

    Science.gov (United States)

    Rosen, L.D.; Whaling, K.; Carrier, L.M.; Cheever, N.A.; Rokkum, J.

    2015-01-01

    Current approaches to measuring people’s everyday usage of technology-based media and other computer-related activities have proved to be problematic as they use varied outcome measures, fail to measure behavior in a broad range of technology-related domains and do not take into account recently developed types of technology including smartphones. In the present study, a wide variety of items, covering a range of up-to-date technology and media usage behaviors. Sixty-six items concerning technology and media usage, along with 18 additional items assessing attitudes toward technology, were administered to two independent samples of individuals, comprising 942 participants. Factor analyses were used to create 11 usage subscales representing smartphone usage, general social media usage, Internet searching, e-mailing, media sharing, text messaging, video gaming, online friendships, Facebook friendships, phone calling, and watching television in addition to four attitude-based subscales: positive attitudes, negative attitudes, technological anxiety/dependence, and attitudes toward task-switching. All subscales showed strong reliabilities and relationships between the subscales and pre-existing measures of daily media usage and Internet addiction were as predicted. Given the reliability and validity results, the new Media and Technology Usage and Attitudes Scale was suggested as a method of measuring media and technology involvement across a variety of types of research studies either as a single 60-item scale or any subset of the 15 subscales. PMID:25722534

  4. The Media and Technology Usage and Attitudes Scale: An empirical investigation.

    Science.gov (United States)

    Rosen, L D; Whaling, K; Carrier, L M; Cheever, N A; Rokkum, J

    2013-11-01

    Current approaches to measuring people's everyday usage of technology-based media and other computer-related activities have proved to be problematic as they use varied outcome measures, fail to measure behavior in a broad range of technology-related domains and do not take into account recently developed types of technology including smartphones. In the present study, a wide variety of items, covering a range of up-to-date technology and media usage behaviors. Sixty-six items concerning technology and media usage, along with 18 additional items assessing attitudes toward technology, were administered to two independent samples of individuals, comprising 942 participants. Factor analyses were used to create 11 usage subscales representing smartphone usage, general social media usage, Internet searching, e-mailing, media sharing, text messaging, video gaming, online friendships, Facebook friendships, phone calling, and watching television in addition to four attitude-based subscales: positive attitudes, negative attitudes, technological anxiety/dependence, and attitudes toward task-switching. All subscales showed strong reliabilities and relationships between the subscales and pre-existing measures of daily media usage and Internet addiction were as predicted. Given the reliability and validity results, the new Media and Technology Usage and Attitudes Scale was suggested as a method of measuring media and technology involvement across a variety of types of research studies either as a single 60-item scale or any subset of the 15 subscales.

  5. High School Students' Social Media Usage Habits

    Science.gov (United States)

    Tezci, Erdogan; Içen, Mustafa

    2017-01-01

    Social media which is an important product of Computer and Internet Technologies has a growing usage level day by day. Increasing social media usage level gives opportunity for new software developments and making investments in this area. From this aspect, therefore, social media has not only economic function but also make persons participate in…

  6. Power factor regulation for household usage

    Science.gov (United States)

    Daud, Nik Ghazali Nik; Hashim, Fakroul Ridzuan; Tarmizi, Muhammad Haziq Ahmad

    2018-02-01

    Power factor regulator technology has recently drawn attention to the consumer and to power generation company in order for consumers to use electricity efficiently. Controlling of power factor for efficient usage can reduce the production of power in fulfilment demands hence reducing the greenhouse effect. This paper presents the design method of power factor controller for household usage. There are several methods to improve the power factor. The power factor controller used by this method is by using capacitors. Total harmonic distortion also has become a major problem for the reliability of the electrical appliances and techniques to control it will be discussed.

  7. Motivations and usage patterns of Weibo.

    Science.gov (United States)

    Zhang, Lixuan; Pentina, Iryna

    2012-06-01

    Referred to as "Weibo," microblogging in China has witnessed an exponential growth. In addition to the Twitter-like functionality, Weibo allows rich media uploads into user feeds, provides threaded comments, and offers applications, games, and Weibo medals. This expanded functionality, as well as the observed differences in trending content, suggests potentially different user motivations to join Weibo and their usage patterns compared to Twitter. This pioneering study identifies dominant Weibo user motivations and their effects on usage patterns. We discuss the findings of an online survey of 234 Weibo users and suggest managerial implications and future research directions.

  8. TOWARDS A USAGE-BASED COGNITIVE PHONOLOGY

    Directory of Open Access Journals (Sweden)

    Gitten Kristiansen

    2006-12-01

    Full Text Available The usage-based conception of language is a major tenet in Cognitive Linguistics, but cognitive phonology has not yet been developed sufficiently in this direction. Often, phonemic analysis is carried out at the high level of abstraction of `a language´, disregarding rich patterns of languageinternal variation. This paper first argues that cognitive phonology must aim at a higher degree of descriptive refinement, especially in the direction of social variation. Then it goes on to examine the implications of a usage-based and multi-faceted model for a theoretical discussion of the phoneme as a prototype category.

  9. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  10. Social Network Site Usage and Personal Relations of Migrants

    Directory of Open Access Journals (Sweden)

    Elena Damian

    2014-11-01

    Full Text Available In this study, we examine the relation between social network site (SNS usage and the personal networks of immigrants, using a unique dataset composed of a representative sample of immigrants living in the Netherlands. In theory, SNSs can be a helpful tool for immigrants, because they may help establish social ties in the destination country and help maintain ties with people in the country of origin. We examine whether this is also true in practice by analyzing whether the frequency of using two SNSs—Facebook and Hyves (a Dutch SNS—is associated with the number of ingroup and outgroup ties, as well as the quality of social relations. In addition, we test whether general emotional disclosure boosts the effect of SNS usage on the quality of relationships. We find that SNS usage is associated with more outgroup ties, but not with more ingroup ties. Our analyses also show that SNS usage is associated with greater quality social relationships among migrants. Contrary to our expectations, we found no interaction between general emotional disclosure and SNS usage on satisfaction with social relations. The implications of these findings are discussed.

  11. Remarks on Trade Usages And Business Practices In International Sales Law

    OpenAIRE

    Leonardo Graffi

    2011-01-01

    Trade usages and business practices are key elements of international commerce. In their day-to-day activities, traders and business people around the world constantly rely upon trade usages and business practices across a variety of industries. Usages and practices tend to be dignified by the business community with a status equivalent to that of actual law. As a matter of fact, many business persons often tend to regard trade usages and business practices as very powerful tools to ensure th...

  12. The State of Wiki Usage in U.S. K-12 Schools: Leveraging Web 2.0 Data Warehouses to Study Quality and Equality in Online Learning Environments

    Science.gov (United States)

    Reich, Blair Justin Fire

    2012-01-01

    In the first part of this dissertation, I document wiki usage in U.S. K-12 settings by analyzing data on a representative sample drawn from a population of nearly 180,000 wikis. My research group, which I lead and managed, measured the opportunities wikis provide for students to develop 21st century skills such as expert thinking, complex…

  13. The State of Wiki Usage in U.S. K-12 Schools: Leveraging Web 2.0 Data Warehouses to Assess Quality and Equity in Online Learning Environments

    Science.gov (United States)

    Reich, Justin; Murnane, Richard; Willett, John

    2012-01-01

    To document wiki usage in U.S. K-12 settings, this study examined a representative sample drawn from a population of nearly 180,000 wikis. The authors measured the opportunities wikis provide for students to develop 21st-century skills such as expert thinking, complex communication, and new media literacy. The authors found four types of wiki…

  14. La documentation des peintures murales de la Chapelle des fresques de Villeneuve-lès Avignon

    Directory of Open Access Journals (Sweden)

    Marie Feillou

    2012-06-01

    Full Text Available La documentation réalisée en vue de la conservation - restauration des peintures murales de la Chapelle des fresques de Villeneuve-lès-Avignon est liée à la constitution d’une base de données fondée sur la représentation 3D de l’intérieur peint de la chapelle. L’intégration et la spatialisation des données de la documentation dans cette base engendrent alors le questionnement des outils de réalisation de la documentation et la formulation d'une méthode de travail s'appuyant sur l'usage de nouvelles technologies numériques.The documentation led for the conservation restauration of the mural paintings of the Chaterhouse of Villeneuve lès Avignon is linked with the constitution of a data base based on the 3D representation of the painted interior’s chapel. Thus the integration and spatialisation of the documentation’s datas in this database engender the wondering about documentation tools and the establishment of a work’s methodology based on new digital technology’s.

  15. Commercial Building Tenant Energy Usage Aggregation and Privacy

    Energy Technology Data Exchange (ETDEWEB)

    Livingston, Olga V.; Pulsipher, Trenton C.; Anderson, David M.; Wang, Na

    2014-10-31

    A growing number of building owners are benchmarking their building energy use. This requires the building owner to acquire monthly whole-building energy usage information, which can be challenging for buildings in which individual tenants have their own utility meters and accounts with the utility. Some utilities and utility regulators have turned to aggregation of customer energy use data (CEUD) as a way to give building owners whole-building energy usage data while protecting customer privacy. Meter profile aggregation adds a layer of protection that decreases the risk of revealing CEUD as the number of meters aggregated increases. The report statistically characterizes the similarity between individual energy usage patterns and whole-building totals at various levels of meter aggregation.

  16. Usage of nuclear data library and proposal to JENDL

    International Nuclear Information System (INIS)

    Sasaki, M.; Iijima, S.; Kawai, Y.; Matsunobu, H.; Zukeran, A.

    1987-01-01

    A usage status of nuclear data libraries and proposals to the JENDL library are briefly reviewed. 1) Data bases used in plant design and fuel cycle design fields are summarized. JNDC evaluated data and JENDL are not utilized so much than expected in these fields. 2) Performances between JENDL-2 and ENDF/B-IV are compared in the FBR nuclear design field. JENDL-2 shows good characteristics. 3) Usages of JENDL-2 are shown in the LWR nuclear design field. JENDL-2 isn't always superior to the licensing library. 4) Usages of JENDL-2 are shown in the FBR shielding R D field. JENDL-2 underestimates measured spectra in case of the deep penetration experiment. 5) Based on the above usage status of JENDL-2, proposals to future JENDL and Nuclear Data Center are tabulated. (author)

  17. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  18. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  19. Teacher educators: their identities, sub-identities and implications for professional development

    NARCIS (Netherlands)

    Swennen, J.M.H.; Jones, K.; Volman, M.L.L.

    2010-01-01

    In this article we address the question: 'What sub-identities of teacher educators emerge from the research literature about teacher educators and what are the implications of the sub-identities for the professional development of teacher educators?' Like other professional identities, the identity

  20. Dissociative Part-Dependent Resting-State Activity in Dissociative Identity Disorder : A Controlled fMRI Perfusion Study

    NARCIS (Netherlands)

    Schlumpf, Yolanda R.; Reinders, Antje A. T. S.; Nijenhuis, Ellert R. S.; Luechinger, Roger; van Osch, Matthias J. P.; Jaencke, Lutz

    2014-01-01

    Background: In accordance with the Theory of Structural Dissociation of the Personality (TSDP), studies of dissociative identity disorder (DID) have documented that two prototypical dissociative subsystems of the personality, the "Emotional Part'' (EP) and the "Apparently Normal Part'' (ANP), have

  1. Contract Report for Usage Inspection of KN-12 Transport Cask

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K

    2007-03-15

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse.

  2. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  3. A New Look at Data Usage by Using Metadata Attributes as Indicators of Data Quality

    Science.gov (United States)

    Won, Y. I.; Wanchoo, L.; Behnke, J.

    2016-12-01

    NASA's Earth Observing System Data and Information System (EOSDIS) stores and distributes data from EOS satellites, as well as ancillary, airborne, in-situ, and socio-economic data. Twelve EOSDIS data centers support different scientific disciplines by providing products and services tailored to specific science communities. Although discipline oriented, these data centers provide common data management functions of ingest, archive and distribution, as well as documentation of their data and services on their web-sites. The Earth Science Data and Information System (ESDIS) Project collects these metrics from the EOSDIS data centers on a daily basis through a tool called the ESDIS Metrics System (EMS). These metrics are used in this study. The implementation of the Earthdata Login - formerly known as the User Registration System (URS) - across the various NASA data centers provides the EMS additional information about users obtaining data products from EOSDIS data centers. These additional user attributes collected by the Earthdata login, such as the user's primary area of study can augment the understanding of data usage, which in turn can help the EOSDIS program better understand the users' needs. This study will review the key metrics (users, distributed volume, and files) in multiple ways to gain an understanding of the significance of the metadata. Characterizing the usability of data by key metadata elements such as discipline and study area, will assist in understanding how the users have evolved over time. The data usage pattern based on version numbers may also provide some insight into the level of data quality. In addition, the data metrics by various services such as the Open-source Project for a Network Data Access Protocol (OPeNDAP), Web Map Service (WMS), Web Coverage Service (WCS), and subsets, will address how these services have extended the usage of data. Over-all, this study will present the usage of data and metadata by metrics analyses and will

  4. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  5. Work-Identity in Ethnographic Research: Developing Field Roles in a Demanding Workplace Setting

    Directory of Open Access Journals (Sweden)

    Gunilla Jansson PhD

    2013-02-01

    Full Text Available In this article we problematize our field roles as two linguistic ethnographers who aim to study the communication and documentation practices drawn upon by care workers in elderly care facilities in Sweden. Our field roles are discussed in relation to the complex nature of care workers' knowledge and competence, which results from three different aspects of their work-identities: institutional, professional, and individual. As researchers, we found ourselves in constant dialogue with the research participants, and our field roles were continuously shaped and reshaped according to the individuals and the situations in which we became involved. Even aspects of our own identities taken into the field, such as our background and personal qualities, proved to be important in establishing good relations with the care staff. Coming closer to the participants' professional identity proved to be of utmost importance for interpreting their choices and decisions in the workplace. Identity negotiation is presented here as a constructive way of discussing ethnographic field roles in the research field.

  6. HIV Co-receptor usage in HIV-related non-hodgkin's lymphoma

    Directory of Open Access Journals (Sweden)

    Reid Erin

    2012-03-01

    Full Text Available Abstract In this study 15 banked samples of HIV-related Non-Hodgkin's Lymphoma (NHL cases were tested for HIV co-receptor usage and SDF1 3'A polymorphism. Reportable tropism from 9 plasma samples had 1 (11.1% HIV case with CXCR4 and 8 (88.9% with CCR5 usage, even though most of the cases occurred at a late stage of HIV (2/3 had CD4 counts below 200, where expected CXCR4 usage would be 60%. Based on the expected proportion of less than 50% CCR5 in chronically infected individuals, this would suggest that in NHL may be associated with CCR5 usage (P = 0.04.

  7. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  8. Notational usage modulates attention networks in binumerates

    Directory of Open Access Journals (Sweden)

    Atesh eKoul

    2014-05-01

    Full Text Available Multicultural environments require learning multiple number notations wherein some are encountered more frequently than others. This leads to differences in exposure and consequently differences in usage between notations. We find that differential notational usage imposes a significant neurocognitive load on number processing. Despite simultaneous acquisition, forty-two adult binumerate populations, familiar with two positional writing systems namely Hindu Nagari digits and Hindu Arabic digits, reported significantly lower preference and usage for Nagari as compared to Arabic. Twenty-four participants showed significantly increased reaction times and reduced accuracy while performing magnitude comparison tasks in Nagari with respect to Arabic. Functional magnetic resonance imaging revealed that processing Nagari elicited significantly greater activity in number processing and attention networks. A direct subtraction of networks for Nagari and Arabic notations revealed a neural circuit comprising of bilateral intra-parietal sulcus, inferior and mid frontal gyri, fusiform gyrus and the anterior cingulate cortex (FDR p<0.005. Additionally, whole brain correlation analysis showed that activity in the left inferior parietal region was modulated by task performance in Nagari. We attribute the increased activation in Ng to increased task difficulty due to infrequent exposure and usage. Our results reiterate the role of the left intra-parietal sulcus in modulating performance in numeric tasks and highlight that of the attention network for monitoring symbolic notation mode in binumerates.

  9. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  10. THE USAGE OF FACEBOOK FUNCTIONAL BUILDING BLOCKS IN UNISEL

    Directory of Open Access Journals (Sweden)

    Latifah Abd Latib

    2015-08-01

    Full Text Available The emergence of Internet-based social media has made it possible for a personto communicate with thousands of other people to increase the communicationeffectiveness, collaboration among internal organization and knowledge sharing.By engaging employees through social media such as Facebook as a two-waycommunications tool, employers can reach a larger audience and build credibilitywith techno-savvy workers. Although it is clear that Facebook is a very powerfultool for communication, many employers are unable to identify the functionalityof Facebook in terms of developing strategies and to allocate the resourceseffectively. Taking this into account this study sought to identify the usage ofFacebook Functionality building blocks. This survey involved 55 academic staffsfrom the Faculty of Computer Science and Information Technology, Unisel. Theseven functional building blocks identified were Identity (M=3.39, Relationships(M=3.39, Groups (M=3.6, Presence (M=3.28, Sharing (M=3.06, andConversations (M=2.90, Reputation (M=2.05. This study suggests that theability to identify the functional building blocks itself is very important in anorganization in terms of developing their communication strategies. It is hopedthat the results of the study will be applicable to the instituition, current users,and potential users of Facebook.

  11. Joint pain epidemiology and analgesic usage in Madagascar.

    Science.gov (United States)

    Samison, Luc Hervé; Randriatsarafara, Fidiniaina Mamy; Ralandison, Stéphane

    2017-01-01

    To describe the epidemiology of joint pains and document analgesics usage in an African context. Patients suffering from joint pain were recruited from nine sites located in Antananarivo, Madagascar, including 6 hospital services and 3 clinics. Doctors collected information on the etiology and characteristics of the patients' pain. Analgesics prescribed by these doctors were also documented. In total, 400 patients were enrolled in the study (52.5% women, mean age of 42.34 years ± 17.7 [4-86]). Pain of mechanical type was found in 260 participants, 65%; 95% CI [60.1% to 69.6%] and inflammatory type pains in 128 cases 32%; 95% CI [27.5% to 36.9%]. Mixed pains were found in 12 patients (3%). The median duration of pain prior to the consultation was 6.5 days. The average pain intensity was 57.9 ± 19.9 mm of a total of 100 mm maximum on a visual analogue scale, VAS. The etiologies of mechanical type pains were dominated by fracture, common low back pain and tendonitis. Arthrosis was the dominant cause of inflammatory type pain, followed by rheumatoid arthritis and gout. NSAIDs (74.5%) were the most frequently prescribed analgesics followed by paracetamol (49.5%), weak opioids (23%) and corticosteroids (12.25%). Two-thirds of medical prescriptions (65.3%) were of combined analgesics. These findings demonstrated that mechanical type pains were the main reason for consultations for joint pain in these situations in Antananarivo, Madagascar. The most frequently prescribed pain-relieving medications were NSAIDs, paracetamol, weak opioids and corticosteroids. This descriptive study may be a useful starting point for further epidemiological studies of pain in the African context.

  12. The Mediation of Teaching and Learning Processes through "Identity Artefacts." A Vygotskian Perspective

    Science.gov (United States)

    Subero, David; Llopart, Mariona; Siqués, Carina; Esteban-Guitart, Moises

    2018-01-01

    The aim of this paper is to address the teaching and learning processes in schools from a Vygotskian perspective based on the notion of "identity artefacts" (IAs) which, for our purposes, consist of documents created by the learners about themselves, in which they try to capture all the things that make sense and are meaningful to them…

  13. Ethnic Identity in Everyday Life: The Influence of Identity Development Status

    Science.gov (United States)

    Yip, Tiffany

    2013-01-01

    The current study explores the intersection of ethnic identity development and significance in a sample of 354 diverse adolescents (mean age 14). Adolescents completed surveys 5 times a day for 1 week. Cluster analyses revealed 4 identity clusters: diffused, foreclosed, moratorium, achieved. Achieved adolescents reported the highest levels of identity salience across situations, followed by moratorium adolescents. Achieved and moratorium adolescents also reported a positive association between identity salience and private regard. For foreclosed and achieved adolescents reporting low levels of centrality, identity salience was associated with lower private regard. For foreclosed and achieved adolescents reporting high levels of centrality, identity salience was associated with higher private regard. PMID:23581701

  14. Study on identically voided pervious concrete made with different sized aggregates

    Science.gov (United States)

    Kastro Kiran, V.; Anand, K. B.

    2018-02-01

    Pervious concrete (PC) is also known as no fines concrete and has been found to be a reliable stormwater management tool. As a substitution for conventional impervious pavement, PC usage has been increasing during recent years. PC made with different sized aggregate shows different void ratios and changed properties. As void ratio plays a notable role on strength and permeability of PC, this study aims to focus on properties of PC at identical void ratio of 20%, made using aggregates of three size ranges, viz., 4.75-6mm, 10-12.5mm, and 10-20mm. Appropriate alternatives were used to maintain the identical void ratio. As the permeation capacity of PC gets reduced due to the clogging tendency, the life of PC will also get reduced. Hence, to make the PC to sustain for a long time it is necessary to study the clogging behavior. This study investigates the tendency of PC for clogging and the potential for regaining the permeability through de-clogging methods. Clogging tendency of PC is studied by using two sizes (coarse and fine) of clog particles and the changes in permeability are observed. Efficiency of declogging methods like pressure washing and vacuum suction on PC with different sized aggregates are also evaluated.

  15. Complex Codon Usage Pattern and Compositional Features of Retroviruses

    Directory of Open Access Journals (Sweden)

    Sourav RoyChoudhury

    2013-01-01

    Full Text Available Retroviruses infect a wide range of organisms including humans. Among them, HIV-1, which causes AIDS, has now become a major threat for world health. Some of these viruses are also potential gene transfer vectors. In this study, the patterns of synonymous codon usage in retroviruses have been studied through multivariate statistical methods on ORFs sequences from the available 56 retroviruses. The principal determinant for evolution of the codon usage pattern in retroviruses seemed to be the compositional constraints, while selection for translation of the viral genes plays a secondary role. This was further supported by multivariate analysis on relative synonymous codon usage. Thus, it seems that mutational bias might have dominated role over translational selection in shaping the codon usage of retroviruses. Codon adaptation index was used to identify translationally optimal codons among genes from retroviruses. The comparative analysis of the preferred and optimal codons among different retroviral groups revealed that four codons GAA, AAA, AGA, and GGA were significantly more frequent in most of the retroviral genes inspite of some differences. Cluster analysis also revealed that phylogenetically related groups of retroviruses have probably evolved their codon usage in a concerted manner under the influence of their nucleotide composition.

  16. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  17. A Behavioural Model of E-Banking Usage in Italy

    Directory of Open Access Journals (Sweden)

    Guendalina Capece

    2013-06-01

    Full Text Available E‐banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels. “Pure online” banks are characterized by the absence of physical windows and front‐office personnel. Traditional banks are still integrating traditional distribution channels with online ones; the scenario is therefore still evolving over time. Despite the intrinsic potentialities, Italy is far from being a leader in the usage of innovative online instruments in the banking system and will struggle with new innovation waves. In this paper, we measure the potential effective ebanking usage. Furthermore, we investigate the behaviour of users and adopters, identifying the major causes influencing satisfaction and usage and the impact of these different causes on the intensity of utilization. The analysis is based on a panel of 495 real users, thus allowing the profiling of the Italian adopter to discover the causes of usage and outline strategies for the growth of e‐banking services in Italy.

  18. Designation of facility usage categories for Hanford Site facilities

    International Nuclear Information System (INIS)

    Woodrich, D.D.; Ellingson, D.R.; Scott, M.A.; Schade, A.R.

    1991-10-01

    This report summarizes the Hanford Site methodology used to ensure facility compliance with the natural phenomena design criteria set forth in the US Department of Energy Orders and guidance. The current Hanford Site methodology for Usage Category designation is based on an engineered feature's safety function and on the feature's assigned Safety Class. At the Hanford Site, Safety Class assignments are deterministic in nature and are based on teh consequences of failure, without regard to the likelihood of occurrence. The report also proposes a risk-based approach to Usage Category designation, which is being considered for future application at the Hanford Site. To establish a proper Usage Category designation, the safety analysis and engineering design processes must be coupled. This union produces a common understanding of the safety function(s) to be accomplished by the design feature(s) and a sound basis for the assignment of Usage Categories to the appropriate systems, structures, and components. 4 refs., 9 figs., 1 tab

  19. Customers Demographics Influence on Usage of Retail Banking Channels

    Directory of Open Access Journals (Sweden)

    Neha GUPTA

    2016-09-01

    Full Text Available The study presents the usage of retail banking influenced by customers’ demographics of selected Public Sector Banks (PSBs of India. The study was based on primary data collected through structured questionnaire. The simple random sampling technique used for data collection for sample size 692. The study finds that public sector banks need to understand the usage pattern of an individual customer using delivery channel to add greater value to customers. Respondent age groups influence ATMs usage. Internet banking is majorly influenced by the customers’ demographics. Respondents’ age group and qualification influence mobile banking. Branch lobby kiosk is not influenced by any demographics. The identification of most influential demographic variable will help to build strong and effective cross-selling and up-selling of financial products and services. Our study was limited to the customers of PSBs of India. This study may be helpful to PSBs for enhancing effective usage of delivery channels.

  20. BEHAVIORAL ASPECT OF ACCOUNTING TEACHERS’ INFORMATION TECHNOLOGY USAGE

    OpenAIRE

    YILMAZ, Emine; ÖZER, Gökhan

    2015-01-01

    This study aims to examine behavioral process of accounting teachers’ information technology (IT) acceptance. To this end, we collected data from accounting teachers working in trade high schools. Research model and hypotheses were developed in the light of Theory of Reasoned Action. Accordingly, relationships among attitudes, subjective norms, intentions towards information technology usage and IT usage behaviors were investigated. Explanatory factor analysis and structural equation modeling...

  1. TECHNOLOGY USAGE AMONG CONSTRUCTION STUDENTS THE MODERATING ROLE OF GENDER

    Directory of Open Access Journals (Sweden)

    T. Ramayah

    2008-06-01

    Full Text Available This study examines the impact of perceived usefulness and perceived ease of use on the extent of personal computer (PC usage among a group of undergraduates at the School of Housing, Building and Planning, Universiti Sains Malaysia. It also looks at the moderating role of gender in the above said relationship. Data was collected using a structured questionnaire. A total of 244 students responded to the survey. Results showed that perceived ease of use (β = 0.309, p < 0.01 was positively related to PC usage. A surprising finding of this study was that perceived usefulness was not a significant predictor of PC usage whereas perceived ease of use was. This can be explained in the context of mandated use where the usefulness is no longer an issue and ease of use becomes the primary concern. Gender was not a moderator in the above said relationship but was a significant independent predictor of usage. Males exhibited higher usage of the PC compared to the female students.

  2. Document clustering methods, document cluster label disambiguation methods, document clustering apparatuses, and articles of manufacture

    Science.gov (United States)

    Sanfilippo, Antonio [Richland, WA; Calapristi, Augustin J [West Richland, WA; Crow, Vernon L [Richland, WA; Hetzler, Elizabeth G [Kennewick, WA; Turner, Alan E [Kennewick, WA

    2009-12-22

    Document clustering methods, document cluster label disambiguation methods, document clustering apparatuses, and articles of manufacture are described. In one aspect, a document clustering method includes providing a document set comprising a plurality of documents, providing a cluster comprising a subset of the documents of the document set, using a plurality of terms of the documents, providing a cluster label indicative of subject matter content of the documents of the cluster, wherein the cluster label comprises a plurality of word senses, and selecting one of the word senses of the cluster label.

  3. In vivo evolution of HIV-1 co-receptor usage and sensitivity to chemokine-mediated suppression.

    Science.gov (United States)

    Scarlatti, G; Tresoldi, E; Björndal, A; Fredriksson, R; Colognesi, C; Deng, H K; Malnati, M S; Plebani, A; Siccardi, A G; Littman, D R; Fenyö, E M; Lusso, P

    1997-11-01

    Following the identification of the C-C chemokines RANTES, MIP-1alpha and MIP-1beta as major human immunodeficiency virus (HIV)-suppressive factors produced by CD8+ T cells, several chemokine receptors were found to serve as membrane co-receptors for primate immunodeficiency lentiretroviruses. The two most widely used co-receptors thus far recognized, CCR5 and CXCR4, are expressed by both activated T lymphocytes and mononuclear phagocytes. CCR5, a specific RANTES, MIP-1alpha and MIP-1 receptor, is used preferentially by non-MT2-tropic HIV-1 and HIV-2 strains and by simian immunodeficiency virus (SIV), whereas CXCR4, a receptor for the C-X-C chemokine SDF-1, is used by MT2-tropic HIV-1 and HIV-2, but not by SIV. Other receptors with a more restricted cellular distribution, such as CCR2b, CCR3 and STRL33, can also function as co-receptors for selected viral isolates. The third variable region (V3) of the gp120 envelope glycoprotein of HIV-1 has been fingered as a critical determinant of the co-receptor choice. Here, we document a consistent pattern of evolution of viral co-receptor usage and sensitivity to chemokine-mediated suppression in a longitudinal follow-up of children with progressive HIV-1 infection. Viral isolates obtained during the asymptomatic stages generally used only CCR5 as a co-receptor and were inhibited by RANTES, MIP-1alpha and MIP-1beta, but not by SDF-1. By contrast, the majority of the isolates derived after the progression of the disease were resistant to C-C chemokines, having acquired the ability to use CXCR4 and, in some cases, CCR3, while gradually losing CCR5 usage. Surprisingly, most of these isolates were also insensitive to SDF-1, even when used in combination with RANTES. An early acquisition of CXCR4 usage predicted a poor prognosis. In children who progressed to AIDS without a shift to CXCR4 usage, all the sequential isolates were CCR5-dependent but showed a reduced sensitivity to C-C chemokines. Discrete changes in the V3 domain

  4. The relationship between codon usage bias and cold resistant genes

    International Nuclear Information System (INIS)

    Barozai, M.Y.; Din, M.

    2014-01-01

    This research is based on synonymous codon usage which has been well-known as a feature that affects typical expression level of protein in an organism. Different organisms prefer different codons for same amino acid and this is called Codon Usage Bias (CUB). The codon usage directly affects the level or even direction of changes in protein expression in responses to environmental stimuli. Cold stress is a major abiotic factor that limits the agricultural productivity of plants. In the recent study CUB has been studied in Arabidopsis thaliana cold resistant and housekeeping genes and their homologs in rice (Oryza sativa) to understand the cold stress and housekeeping genes relation with CUB. Six cold resistant and three housekeeping genes in Arabidopsis thaliana and their homologs in rice, were subjected to CUB analysis. The three cold resistant genes (DREB1B, RCI and MYB15) showed more than 50% (52%, 61% and 66% respectively) similar codon usage bias for Arabidopsis thaliana and rice. On the other hand three cold resistant genes (MPK3, ICE1 and ZAT12) showed less than 50% (38%, 38% and 47% respectively) similar codon usage bias for Arabidopsis thaliana and rice. The three housekeeping genes (Actin, Tubulin and Ubiquitin) showed 76% similar codon usage bias for Arabidopsis thaliana and rice. This study will help to manage the plant gene expression through codon optimization under the cold stress. (author)

  5. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  6. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  7. The National Commitment Towards Conserving the Heritage (documentation of Historical and Cultural Sites in Gcc Countries)

    Science.gov (United States)

    AlSulaiti, F.

    2013-07-01

    The five Arab Gulf countries of Kuwait, Bahrain, Qatar, the United Arab Emirates and Oman possess many shared characteristics and historical ties across their common peninsula. The prime factor uniting them is the historical nature of their entwined involvement with peoples and nations beyond the region. That the Gulf has been an important water passageway since ancient times suggests that the inhabitants of its shores met early on with other civilizations. The knowledge of one's roots, history, and traditional arts supports awareness of inherited culture and can help contextualize and illuminate community reflection and identification. The intricacy of the recording and understanding processes of documentation requires skilled professionals, with knowledge and awareness for the associated tasks. Responsible of cultural heritage should provide the adequate documentations, recording and updating of the records. Collaboration of different individuals such as specialist heritage, archaeologists, surveyors, conservators, researchers, architectural historians, and many other expert personnel is the golden key of successful documentation. The purpose of this document is to show the authorities of Gulf Arab countries and their planning measures, management and sharing effect of recording the cultural heritage. This essay identifies key points in the approach to contextualizing and developing cultural identity in a way that respects organic qualities. Through highlighting a number of archeological ruins and outlining management plans, the essay explores frameworks that can be applied to promote and preserve integral identity of important sites and their greater surrounding communities.

  8. THE NATIONAL COMMITMENT TOWARDS CONSERVING THE HERITAGE (DOCUMENTATION OF HISTORICAL AND CULTURAL SITES IN GCC COUNTRIES

    Directory of Open Access Journals (Sweden)

    F. AlSulaiti

    2013-07-01

    Full Text Available The five Arab Gulf countries of Kuwait, Bahrain, Qatar, the United Arab Emirates and Oman possess many shared characteristics and historical ties across their common peninsula. The prime factor uniting them is the historical nature of their entwined involvement with peoples and nations beyond the region. That the Gulf has been an important water passageway since ancient times suggests that the inhabitants of its shores met early on with other civilizations. The knowledge of one’s roots, history, and traditional arts supports awareness of inherited culture and can help contextualize and illuminate community reflection and identification. The intricacy of the recording and understanding processes of documentation requires skilled professionals, with knowledge and awareness for the associated tasks. Responsible of cultural heritage should provide the adequate documentations, recording and updating of the records. Collaboration of different individuals such as specialist heritage, archaeologists, surveyors, conservators, researchers, architectural historians, and many other expert personnel is the golden key of successful documentation. The purpose of this document is to show the authorities of Gulf Arab countries and their planning measures, management and sharing effect of recording the cultural heritage. This essay identifies key points in the approach to contextualizing and developing cultural identity in a way that respects organic qualities. Through highlighting a number of archeological ruins and outlining management plans, the essay explores frameworks that can be applied to promote and preserve integral identity of important sites and their greater surrounding communities.

  9. Understanding usage patterns of electric kettle and energy saving potential

    International Nuclear Information System (INIS)

    Murray, D.M.; Liao, J.; Stankovic, L.; Stankovic, V.

    2016-01-01

    Highlights: • Time-of-use analysis to motivate kettle usage and consumption prediction. • Identification of households whose kettle usage and consumption is outside the norm. • Mathematical model to estimate water volume from consumed power measurements only. • Quantification of energy savings if a household uses its kettle more efficiently. • Kettle usage and demand prediction using an Adaptive Neuro Fuzzy Inference System. - Abstract: The availability of smart metering and smart appliances enables detecting and characterising appliance use in a household, quantifying energy savings through efficient appliance use and predicting appliance-specific demand from load measurements is possible. With growing electric kettle ownership and usage, lack of any efficiency labelling guidelines for the kettle, slow technological progress in improving kettle efficiency relative to other domestic appliances, and current consumer attitudes, urgent investigation into consumer kettle usage patterns is warranted. From an efficiency point of view, little can be done about the kettle, which is more efficient than other methods of heating water such as the stove top kettle. However, since a majority households use the kettle inefficiently by overfilling, in order to meet energy targets, it is imperative to quantify inefficient usage and predict demand. For the purposes of scalability, we propose tools that depend only on load measurement data for quantifying and visualising kettle usage and energy consumption, assessing energy wastage through overfilling via our proposed electric kettle model, and predicting kettle-specific demand, from which we can estimate potential energy savings in a household and across a housing stock. This is demonstrated using data from a longitudinal study across a sample of 14 UK households for a two-year period.

  10. USAGES – THE LEGAL REGIME IN NEW CIVIL CODE

    Directory of Open Access Journals (Sweden)

    EMILIAN CIONGARU

    2013-05-01

    Full Text Available In the broad sense, the concept of law is represented by totality of acts that are elaborated by competent state authorities and their purpose is legislating. There are juridical situations are outside the scope of regulation of legal norms and they are stipulated by the New Civil Code, namely the usages: which are defined, in the broad sense, as rules of conduct for a long time, born of social practice. If the law sanctioned any usage, by a rule of reference, giving them, as such obligatory legal power, they are sources of law and the legislator has provided, as is source of civil law, only usages which are in conformity to public order and morality. This problem there was no in the case of legal rules because, they themselves are created with the purpose of to generate the public order and morality. In the situations not covered by law, the usages have a greater force than that of the legal dispositions regarding similar situations, so the broad interpretation of the rules of civil law is made, in the cases which are not covered by the law, only if such an interpretation is not contrary to the usages. An analysis and understanding of the juridical status of usages representing: the customs and the local habits which is accepted by the members of that community as well as the professional uses, as rules of development of professional activities, may result in to perceive the legal force of their but also to reduce, on as much as possible, some potentials confusions of interpretation and application of the law.

  11. The Current State Of Secondary Resource Usage In Ukraine

    OpenAIRE

    Julia Makovetska

    2011-01-01

    The state and the perspectives of the development of secondary resource usage in Ukraine have been analyzed in the article. The level of the main types recyclable materials as paper and cardboard, glass, plastics, waste tires are considered. Priority directions of development of the secondary resources usage have been defined.

  12. Benchmarking Usage Statistics in Collection Management Decisions for Serials

    Science.gov (United States)

    Tucker, Cory

    2009-01-01

    Usage statistics are an important metric for making decisions on serials. Although the University of Nevada, Las Vegas (UNLV) Libraries have been collecting usage statistics, the statistics had not frequently been used to make decisions and had not been included in collection development policy. After undergoing a collection assessment, the…

  13. Les figures de l'usager de Twitter

    OpenAIRE

    Domenget , Jean-Claude

    2016-01-01

    International audience; L’analyse des figures de l’usager de Twitter représente un enjeu de recherche pour comprendre la construction de ces représentations diverses. L’objectif de cet article est d’analyser la notion d’usager dans le cadre de ce dispositif et d’interroger ses relations avec les notions de public(s), d’audience(s) et de communautés. Les quatre principales figures distinguées (twitto, consommateur, abonné, expert) sont étudiées à partir de deuxcritères majeurs : les principes ...

  14. USAGE OF UNMANNED AERIAL VEHICLES IN GENERAL AVIATION: CURRENT SITUATION AND PROSPECTS

    Directory of Open Access Journals (Sweden)

    2016-01-01

    Full Text Available The article aims at analyzing the current and future trends in usage of Unmanned Aerial Vehicles (UAV in gen- eral aviation (branches of economy. The main goal of the analysis is to determine the branches of economy, in which the usage of UAVs would be the most beneficial in the near- to mid-term future. The main requirements and restrictions of usage of the aircraft in general aviation were used as a basis for determining the types of operations, in which the usage of UAVs will be the most rational and effective. The effectiveness evaluation was based on the developed method, involving evaluation of the following factors such as: advantages of usage of manned aircraft, advantages of usage of unmanned air- craft, problems associated with the usage of manned aircraft, problems associated with the usage of unmanned aircraft. After evaluation of the mentioned aspects above the safety, operational productivity and ecological indicators were evaluat- ed. These qualitative assessments allowed identifying the branches of economy, where the usage of UAVs could potentially be the most advantageous. The article also discusses the possible strategies of UAVs development for general aviation. The so-called “mixed” strategy of UAV development is identified as the best in the current situation. This strategy combines the conversion of the existing military UAVs with the purpose of fitting them in to civilian use with the parallel development of brand new UAVs, which would be designed for operation in branches of economy right from the beginning (from scratch.

  15. Identity Presentation: The Construction of Identity in Asynchronous Discussion

    Directory of Open Access Journals (Sweden)

    Brian Morgan

    2008-08-01

    Full Text Available This study examines the use of e-mail as a tool for long term discussion between teachers and grade six students. E-mail messages between grade six students and teachers were collected over the course of one academic year. Methods of conversation analysis within a framework of social practice are used to examine the data. While identity is more readily constructed and more fully developed in contexts which allow for physical embodiment such as face-to-face discussion, this analysis found that identity can be constructed in a context that does not provide for the physical embodiment of identity: Identity was constructed using the social, cultural, and technological tools provided and supported by e-mail to develop social practices germane to the e-mail discussion. This study has implications for further understanding the relation between identity, goals, constraints and affordances, and the collaborative creation of social practices in asynchronous computer mediated communication. URN: urn:nbn:de:0114-fqs0803185

  16. Repatriation and the Limits of Genetic Identity- DNA and Indigeneity Symposium

    OpenAIRE

    Dorothy Lippert

    2015-01-01

    In the United States, the Smithsonian National Museum of Natural History repatriates human remains, funerary objects, sacred objects and objects of cultural patrimony to federally-recognized tribes. Documenting the ties between existing tribes and ancient peoples can utilize biological constructions of identity, but there are limits to this type of analysis given that tribes are political entities as well as cultural ones. This presentation will use case studies to show how difficult repatria...

  17. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  18. Political, religious and occupational identities in context: placing identity status paradigm in context.

    Science.gov (United States)

    Solomontos-Kountouri, Olga; Hurry, Jane

    2008-04-01

    This study critically contrasts global identity with domain-specific identities (political, religious and occupational) and considers context and gender as integral parts of identity. In a cross-sectional survey, 1038 Greek Cypriot adolescents (449 boys and 589 girls, mean age 16.8) from the three different types of secondary schools (state, state technical and private) and from different SES completed part of the Extended Objective Measure of Ego Identity Status-2 (EOMEIS-2). The macro-context of Greek Cypriot society is used to understand the role of context in adolescents' identities. Results showed that Greek Cypriot young people were not in the same statuses across their global, political, religious and occupational identities. This heterogeneity in the status of global identity and of each identity domain is partially explained by differences in gender, type of school and SES (socio-economic status). The fact that identity status is found to be reactive to context suggests that developmental stage models of identity status should place greater emphasis on context.

  19. Persona Usage in Software Development: Advantages and Obstacles

    DEFF Research Database (Denmark)

    Billestrup, Jane; Stage, Jan; Nielsen, Lene

    2014-01-01

    The Personas technique has been promoted as a strong tool for providing software developers with a better understanding of the prospective users of their software. This paper reports from a questionnaire survey regarding knowledge about Personas and their usage in software development companies....... The questionnaire survey was conducted in a limited geographical area to establish the extent of Personas usage within all companies in the chosen region and determine whether software development companies used Personas during the development process. Several issues were identified as reasons for either not using...... the technique or for poor application of it. The study showed that 55% of the respondents had never heard about Personas. Among those who had heard about the Personas technique, the following obstacles towards usage of the technique were identified: Lack of knowledge of the technique, lack of resources (time...

  20. Usage of industrial robots in nuclear power industry

    International Nuclear Information System (INIS)

    Matsuo, Yoshio; Hamada, Kenjiro

    1982-01-01

    Japan is now at the top level in the world in robot technology.Its application to nuclear power field is one of the most expected. However, their usage spreads over various types of nuclear power plants, their manufacture and operation, and other areas such as fuel reprocessing plants and reactor plant decommissioning. The robots as used for the operation of BWR nuclear power plants, already developed and under development, are described: features in the nuclear-power usage of robots, the robots used currently for automatic fuel exchange, the replacement of control rod drives and in-service inspection; the robots under development for travelling inspection device and the inspection of main steam-relief safety valves, future development of robots. By robot usage, necessary personnel, work period and radiation exposure can be greatly reduced, and safety and reliability are also raised. (Mori, K.)

  1. Student Empowerment Through Internet Usage

    DEFF Research Database (Denmark)

    Purushothaman, Aparna

    2011-01-01

    in a University in Southern India to empower the female students through Internet usage. The study was done to find out the problems the woman students faced in gaining access and using Internet and how they can be empowered through Internet usage. Future workshop was conducted to find out the problems...... and reflecting. The paper will explore the various cultural issues and explicate how the social context plays a major role in the use of Internet even if there is sufficient access. These issues will be addressed from an empowerment perspective. The paper ends by recommending the methods to be adopted for more......Information and Communication Technology (ICT) has been widely recognized as a tool for human development (UNDP 2001). The rate at which ICT are growing is changing the way knowledge is developed, acquired and delivered. (Tongia, et al. 2005) Internet is one of the Information & Communication...

  2. Computer usage and its relationship with adolescent lifestyle in Hong Kong.

    Science.gov (United States)

    Ho, S M; Lee, T M

    2001-10-01

    To determine the patterns of computer usage among adolescents in Hong Kong and to examine whether computer usage is associated with less physical activity and social support among adolescents. A total of 2110 secondary school students (52% boys and 48% girls) in Hong Kong completed a set of questionnaires to measure their computer usage and lifestyle. Mean age of the respondents was 14.16 years (SD = 1.81 years). Computer usage was taped by asking the students to indicate how much time (in minutes) they spent on the computer each day for doing homework assignments; playing computer games; "surfing" the Internet; and communicating with others. The students also provided information on their social-physical lifestyle. Student's t-tests and analysis of variance were used to examine group differences. Pearson product moment correlations were used to explore relationships between computer usage and lifestyle. Boys who use computers for doing homework, "surfing" the Internet, and communicating with others engage in more social-physical activities than others. Boys who use computers to play games tend to be more social-behaviorally inactive. For girls, patterns of computer usage are not related to lifestyle. Computer users tended to engage in social-physical activities more frequently and had higher social support than nonusers. But among computer users, the amount of time spent daily on the computer was not associated with lifestyle. Instead, patterns of computer usage are more related to lifestyle and the relationship is moderated by gender.

  3. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  4. A Factor Analytic Study of the Internet Usage Scale

    Science.gov (United States)

    Monetti, David M.; Whatley, Mark A.; Hinkle, Kerry T.; Cunningham, Kerry T.; Breneiser, Jennifer E.; Kisling, Rhea

    2011-01-01

    This study developed an Internet Usage Scale (IUS) for use with adolescent populations. The IUS is a 26-item scale that measures participants' beliefs about how their Internet usage impacts their behavior. The sample for this study consisted of 947 middle school students. An exploratory factor analysis with varimax rotation was conducted on the…

  5. A task-based usage strategy for control centre wall displays

    International Nuclear Information System (INIS)

    Davey, E.

    2005-01-01

    This paper summarizes the findings from an exploratory definition of a usage strategy for multiple control centre wall displays in CANDU nuclear power plants. Wall displays are defined as large sized, vertically oriented display surfaces that may be positioned in various locations about a control room to support user information needs. The paper begins by discussing the need for a usage strategy for all control room information resources, and then reviews the history in wall display implementation and usage in nuclear power plant control rooms. The balance of the paper discusses the approach used in characterization and review of control room task information needs and definition of a wall display usage strategy. The paper concludes by outlining some of the possible impacts on future control room design and operations that the introduction of wall displays may imply. (author)

  6. Citizen Science: Opportunities for Girls' Development of Science Identity

    Science.gov (United States)

    Brien, Sinead Carroll

    Many students in the United States, particularly girls, have lost interest in science by the time they reach high school and do not pursue higher degrees or careers in science. Several science education researchers have found that the ways in which youth see themselves and position themselves in relation to science can influence whether they pursue science studies and careers. I suggest that participation in a citizen science program, which I define as a program in which girls interact with professional scientists and collect data that contributes to scientific research, could contribute to changing girls' perceptions of science and scientists, and promote their science identity work. I refer to science identity as self-recognition and recognition by others that one thinks scientifically and does scientific work. I examined a case study to document and analyze the relationship between girls' participation in a summer citizen science project and their development of science identity. I observed six girls between the ages of 16 and 18 during the Milkweed and Monarch Project, taking field notes on focal girls' interactions with other youth, adults, and the scientist, conducted highly-structured interviews both pre-and post- girls' program participation, and interviewed the project scientist and educator. I qualitatively analyzed field notes and interview responses for themes in girls' discussion of what it meant to think scientifically, roles they took on, and how they recognized themselves as thinking scientifically. I found that girls who saw themselves as thinking scientifically during the program seemed to demonstrate shifts in their science identity. The aspects of the citizen science program that seemed to most influence shifts in these girls' science identities were 1) the framing of the project work as "real science, 2) that it involved ecological field work, and 3) that it created a culture that valued data and scientific work. However, some of the girls only

  7. Modelling of word usage frequency dynamics using artificial neural network

    International Nuclear Information System (INIS)

    Maslennikova, Yu S; Bochkarev, V V; Voloskov, D S

    2014-01-01

    In this paper the method for modelling of word usage frequency time series is proposed. An artificial feedforward neural network was used to predict word usage frequencies. The neural network was trained using the maximum likelihood criterion. The Google Books Ngram corpus was used for the analysis. This database provides a large amount of data on frequency of specific word forms for 7 languages. Statistical modelling of word usage frequency time series allows finding optimal fitting and filtering algorithm for subsequent lexicographic analysis and verification of frequency trend models

  8. Student Media Usage Patterns and Non-Traditional Learning in Higher Education

    Directory of Open Access Journals (Sweden)

    Olaf Zawacki-Richter

    2015-04-01

    Full Text Available A total of 2,338 students at German universities participated in a survey, which investigated media usage patterns of so-called traditional and non-traditional students (Schuetze & Wolter, 2003. The students provided information on the digital devices that they own or have access to, and on their usage of media and e-learning tools and services for their learning. A distinction was made between external, formal and internal, informal tools and services. Based on the students’ responses, a typology of media usage patterns was established by means of a latent class analysis (LCA. Four types or profiles of media usage patterns were identified. These types were labeled entertainment users, peripheral users, advanced users and instrumental users. Among non-traditional students, the proportion of instrumental users was rather high. Based on the usage patterns of traditional and non-traditional students, implications for media selection in the instructional design process are outlined in the paper.

  9. Codification of Some Usage Cases of Lithuanian Language Cases and Prepositions

    Directory of Open Access Journals (Sweden)

    Vidas Valskys

    2013-12-01

    Full Text Available The present article is related to analysing several cases of the relationship between usage of cases and prepositions with the norms indicated in the syntax booklet “Language Advice”. The article is a discussion regarding some normative evaluation aspects regarding the usage of the preposition “greta” (next to having the meaning of exception (exclusion, usage of the adjectivised instrumental case in constructions with the verb “(pavirsti” (to turn, to become, to grow, to get and some cases of the postposition “dėka” (with the help of. Utmost attention is paid to discussion of (nonnormative evaluation of some constructions including usage of the said cases and prepositions that are doubtful in some aspects, their presentation in normative sources and further prospects related to further codification of the said cases. The article is based on vast empirical materials: examples from the “Corpus of the Contemporary Lithuanian”, the Internet and other texts related to contemporary usage.

  10. OFFICIAL DOCUMENTS RELATING TO PORTUGUESE LANGUAGE TEACHING, INTERCULTURALITY AND LITERACY POLICY

    Directory of Open Access Journals (Sweden)

    Cloris Porto Torquato

    2016-06-01

    Full Text Available The present article analyzes two documents Parâmetros Curriculares Nacionais – Língua Portuguesa (BRASIL, 1998 and Parâmetros Curriculares Nacionais – Temas Transversais – Pluralidade Cultural (BRASIL, 1998b, conceiving these documents as constituents of language policies (RICENTO, 2006; SHOHAMY, 2006 and literacy policies, and it focuses the intercultural dialogues/conflicts that these documents promote when guiding that the teaching of the language should have as main object the text and indicating which genres should be privileged. Thereby, the text deals with language policies, more specifically focusing in literacy policies (bringing to bear the concept of literacy formulated by the New Literacy Studies (STREET, 1984, 1993, 2003; BARTON; HAMILTON, 1998; SIGNORINI, 2001 and interculturality (JANZEN, 2005. The analysis of the documents is undertaken to the light of the bakhtinian conception of language and it mobilizes the following concepts of the Circle of Bakhtin: dialogism, utterance and genres of speech. Furthermore, this text is based methodologically on the orientations of the authors of this Circle for the study of the language (BAKHTIN/ VOLOSHINOV, 1986; BAKHTIN, 2003. The analysis indicates that the official documents, when promoting literacy policies, also promote intercultural conflicts, because they privilege the dominant literacies, silencing other literacy practices. We understood that this silencing and invalidating local literacy practices has implications for the constitutions of the students’ identities and local language policies.

  11. Multiple Evolutionary Selections Involved in Synonymous Codon Usages in the Streptococcus agalactiae Genome.

    Science.gov (United States)

    Ma, Yan-Ping; Ke, Hao; Liang, Zhi-Ling; Liu, Zhen-Xing; Hao, Le; Ma, Jiang-Yao; Li, Yu-Gu

    2016-02-24

    Streptococcus agalactiae is an important human and animal pathogen. To better understand the genetic features and evolution of S. agalactiae, multiple factors influencing synonymous codon usage patterns in S. agalactiae were analyzed in this study. A- and U-ending rich codons were used in S. agalactiae function genes through the overall codon usage analysis, indicating that Adenine (A)/Thymine (T) compositional constraints might contribute an important role to the synonymous codon usage pattern. The GC3% against the effective number of codon (ENC) value suggested that translational selection was the important factor for codon bias in the microorganism. Principal component analysis (PCA) showed that (i) mutational pressure was the most important factor in shaping codon usage of all open reading frames (ORFs) in the S. agalactiae genome; (ii) strand specific mutational bias was not capable of influencing the codon usage bias in the leading and lagging strands; and (iii) gene length was not the important factor in synonymous codon usage pattern in this organism. Additionally, the high correlation between tRNA adaptation index (tAI) value and codon adaptation index (CAI), frequency of optimal codons (Fop) value, reinforced the role of natural selection for efficient translation in S. agalactiae. Comparison of synonymous codon usage pattern between S. agalactiae and susceptible hosts (human and tilapia) showed that synonymous codon usage of S. agalactiae was independent of the synonymous codon usage of susceptible hosts. The study of codon usage in S. agalactiae may provide evidence about the molecular evolution of the bacterium and a greater understanding of evolutionary relationships between S. agalactiae and its hosts.

  12. textbf{Historical Usage Inventories of DDT in China}

    Science.gov (United States)

    Qiang, Wang; Lijuan, Zhao; Jianxin, Hu

    2010-05-01

    Dichlorodiphenyltrichloroethane (DDT) is one of organochlorine pesticides and listed as one of the persistent organic pollutants to be reduced and finally eliminated in the Stockholm Convention on Persistent Organic Pollutants, because of its great persistence, toxics, bio-accumulation and potential for long-range transport. It is critical to create national DDT usage/emission inventories for China to carry out source-receptor relation analysis, risk assessment, and other research related to DDT in this country. Chinese inventories of DDT to the year1983 have been published; however, DDT is still being used indirectly in the dicifol producing and being applied for malaria control in case. Therefore it is needed to supplement and update the inventories. DDT production in China can be divided into three phases. Prior to 1965 is the first stage with an annual output of no more than 10,000 tons; 1966-1983 is the second phase. At this stage DDT was produced with an average annual production of 15,500 tons. After 1984 is the third production phase, of which the average annual DDT production was 6,465 tons. Before 1983, DDT was mainly used for agriculture, forestry and pesticides.China used a total of 270,000 tons of DDT during 1951 - 1983. According to China's cropland area, Li Yi-fan create China's DDT usage inventory of 1951-1983. In 1983 the State Council decided to ban DDT producing and DDT is no longer used in agriculture any more, but it is still being used in the producing of dicofol, malaria prevention and treatment anda small amount for export. To this end, this paper calculated theusage inventory of China's DDT from 1984 to 2003. Using sown areas of cotton, apple, citrus, tea and vegetable as surrogate data, usage of dicifolwas calculated, then the usage inventory of DDT resulting from dicofol use and DDT applied for malaria control with prefecture resolution was created. From 1984 to 2003, China used 15,312 tons of DDT, including 12,912 tons of DDT resulting

  13. Multimodal Identity Texts as Mediational Spaces in Researching Ph.D. Students' Critical Teacher-Researcher Selves

    Science.gov (United States)

    Valencia, Marlon; Herath, Sreemali

    2015-01-01

    This paper analyses how two Ph.D. students used multimodal identity texts (MMITs) to document their research journeys as they engaged in their doctoral studies. Drawing on qualitative data collected from multiple pre-service teacher preparation programmes in Chile and Sri Lanka, two bi-national researchers (a Colombian-Canadian and a Sri…

  14. Analysis of Documentation Speed Using Web-Based Medical Speech Recognition Technology: Randomized Controlled Trial.

    Science.gov (United States)

    Vogel, Markus; Kaisers, Wolfgang; Wassmuth, Ralf; Mayatepek, Ertan

    2015-11-03

    Clinical documentation has undergone a change due to the usage of electronic health records. The core element is to capture clinical findings and document therapy electronically. Health care personnel spend a significant portion of their time on the computer. Alternatives to self-typing, such as speech recognition, are currently believed to increase documentation efficiency and quality, as well as satisfaction of health professionals while accomplishing clinical documentation, but few studies in this area have been published to date. This study describes the effects of using a Web-based medical speech recognition system for clinical documentation in a university hospital on (1) documentation speed, (2) document length, and (3) physician satisfaction. Reports of 28 physicians were randomized to be created with (intervention) or without (control) the assistance of a Web-based system of medical automatic speech recognition (ASR) in the German language. The documentation was entered into a browser's text area and the time to complete the documentation including all necessary corrections, correction effort, number of characters, and mood of participant were stored in a database. The underlying time comprised text entering, text correction, and finalization of the documentation event. Participants self-assessed their moods on a scale of 1-3 (1=good, 2=moderate, 3=bad). Statistical analysis was done using permutation tests. The number of clinical reports eligible for further analysis stood at 1455. Out of 1455 reports, 718 (49.35%) were assisted by ASR and 737 (50.65%) were not assisted by ASR. Average documentation speed without ASR was 173 (SD 101) characters per minute, while it was 217 (SD 120) characters per minute using ASR. The overall increase in documentation speed through Web-based ASR assistance was 26% (P=.04). Participants documented an average of 356 (SD 388) characters per report when not assisted by ASR and 649 (SD 561) characters per report when assisted

  15. Usage based indicators to assess the impact of scholarly works: architecture and method

    Science.gov (United States)

    Bollen, Johan [Santa Fe, NM; Van De Sompel, Herbert [Santa Fe, NM

    2012-03-13

    Although recording of usage data is common in scholarly information services, its exploitation for the creation of value-added services remains limited due to concerns regarding, among others, user privacy, data validity, and the lack of accepted standards for the representation, sharing and aggregation of usage data. A technical, standards-based architecture for sharing usage information is presented. In this architecture, OpenURL-compliant linking servers aggregate usage information of a specific user community as it navigates the distributed information environment that it has access to. This usage information is made OAI-PMH harvestable so that usage information exposed by many linking servers can be aggregated to facilitate the creation of value-added services with a reach beyond that of a single community or a single information service.

  16. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  17. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  18. An analysis of the inter-relationship between savings product usage ...

    African Journals Online (AJOL)

    The article maintains that improved participation in the financial services industries seems to be dependent on satisfaction levels regarding financial services product usage. Empirical evidence shows that higher usage and higher satisfaction regarding basic savings products such as savings accounts, money market ...

  19. P-value based visualization of codon usage data

    Directory of Open Access Journals (Sweden)

    Fricke Wolfgang

    2006-06-01

    Full Text Available Abstract Two important and not yet solved problems in bacterial genome research are the identification of horizontally transferred genes and the prediction of gene expression levels. Both problems can be addressed by multivariate analysis of codon usage data. In particular dimensionality reduction methods for visualization of multivariate data have shown to be effective tools for codon usage analysis. We here propose a multidimensional scaling approach using a novel similarity measure for codon usage tables. Our probabilistic similarity measure is based on P-values derived from the well-known chi-square test for comparison of two distributions. Experimental results on four microbial genomes indicate that the new method is well-suited for the analysis of horizontal gene transfer and translational selection. As compared with the widely-used correspondence analysis, our method did not suffer from outlier sensitivity and showed a better clustering of putative alien genes in most cases.

  20. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  1. The Influence of Dating Relationships on Friendship Networks, Identity Development, and Delinquency

    Science.gov (United States)

    Seffrin, Patrick M.; Giordano, Peggy C.; Manning, Wendy D.; Longmore, Monica A.

    2011-01-01

    Prior research has documented general associations between dating and delinquency, but little is known about the specific ways in which heterosexual experiences influence levels of delinquency involvement and substance use. In the current study, we hypothesize that an adolescent’s level of effort and involvement in heterosexual relationships play a significant role in forming the types of friendship networks and views of self that influence the likelihood of delinquency involvement and substance use. Analyses based on a longitudinal sample of adolescent youth (n=1,090) show that high levels of dating effort and involvement with multiple partners significantly increases unstructured and delinquent peer contacts, and influences self-views as troublemaker. These broader peer contexts and related self-views, in turn, mediate the path between dating relationships, self-reported delinquency, and substance use. Findings also document moderation effects: among those youths who have developed a troublemaker identity and who associate with delinquent peers, dating heightens the risk for delinquent involvement. In contrast, among those individuals who have largely rejected the troublemaker identity and who do not associate with delinquent friends, dating relationships may confer a neutral or even protective benefit. The analyses further explore the role of gender and the delinquency of the romantic partner. PMID:21311739

  2. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  3. ON CURRICULAR PROPOSALS OF THE PORTUGUESE LANGUAGE: A DOCUMENT ANALYSIS IN JUIZ DE FORA (MG

    Directory of Open Access Journals (Sweden)

    Tânia Guedes MAGALHÃES

    2014-12-01

    Full Text Available This paper, whose objective is to analyze two curricular proposals of Portuguese from the Juiz de Fora City Hall (2001 and 2012, is an extract from a research entitled “On text genres and teaching: a collaborative research with teachers of Portuguese” (2011/2013. Text genres have been suggested by curricular proposals as a central object for teachers who work with Portuguese language teaching; for this, it is relevant to analyze the documents in the realm of the ongoing research. As theoretical references, we used authors who propose a didactic model based on the development of language skills and linguistic reasoning (MENDONÇA, 2006 which in turn are based on an interactional conception of language (BRONCKART, 1999; SCHNEUWLY; DOLZ, 2004. Document analysis was used as methodology, which envisions assessment of pieces of information in documents as well as their outcomes. The data show that the 2012 curricular proposal is more adequate to Portuguese language teaching than the first one, mainly for its theoretical and methodological grounding, which emphasize the development of students’ linguistic and discursive skills. Guided by an interactionist notion – unlike the norm-centered 2001 proposal – the 2012 document fosters the development of linguistic reasoning and usage skills.

  4. The constitution of marginalized identity in Signs of identity by Juan Goytisolo

    Directory of Open Access Journals (Sweden)

    Jelica Veljović

    2014-12-01

    Full Text Available The main objective of the article is to investigate the modes of constitution of a marginalized and exiled identity in the novel Signs of identity by Juan Goytisolo. It is categorised as a “testimony and postwar novel”, and the subjects’ constant search of themselves, of their Self and all the elements that constitute their identity is central to the work. The novel is set in the postwar socio-historical period and the protagonist – Alvaro Mendiola – searches for his identity in his childhood memories and family pictures, but also amongst all the Others whose life stories intertwine with his journey of identification. Tracing his line of identity formation, we found three different routes: the first through the genealogical records, the second through the concept of Otherness and the last one through love. We find Identity as a kaleidoscope containing all the Others who served as moulds for his Identity, yet leaving it undefined and incomplete. Therefore, the identity of an exiled and marginalized individual is always in flux, continually reinitiating the constitution of the Self that had been eradicated from its first and formative imagery: the family and the fatherland.

  5. Fuzzy Clustering: An Approachfor Mining Usage Profilesfrom Web

    OpenAIRE

    Ms.Archana N. Boob; Prof. D. M. Dakhane

    2012-01-01

    Web usage mining is an application of data mining technology to mining the data of the web server log file. It can discover the browsing patterns of user and some kind of correlations between the web pages. Web usage mining provides the support for the web site design, providing personalization server and other business making decision, etc. Web mining applies the data mining, the artificial intelligence and the chart technology and so on to the web data and traces users' visiting characteris...

  6. Human identity versus gender identity: The perception of sexual addiction among Iranian women.

    Science.gov (United States)

    Moshtagh, Mozhgan; Mirlashari, Jila; Rafiey, Hassan; Azin, Ali; Farnam, Robert

    2017-07-01

    This qualitative study was conducted to explore the images of personal identity from the perspective of women with sexual addiction. The data required for the study were collected through 31 in-depth interviews. Sensing a threat to personal identity, dissatisfaction with gender identity, dissociation with the continuum of identity, and identity reconstruction in response to threat were four of the experiences that were common among women with sexual addiction. Painful emotional experiences appear to have created a sense of gender and sexual conflict or weakness in these women and thus threatened their personal identity and led to their sexual addiction.

  7. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  8. Influence of children pedestrian behaviour on pedestrian space usage

    Science.gov (United States)

    Makalew, F. P.; Adisasmita, S. A.; Wunas, S.; Hamid, S.

    2017-11-01

    School children pedestrian behaviour can be seen along their journey to and from school. Pedestrian spaces used by children are places available in urban and rural areas including streets with and without pedestrian pathways. Samples data are collected from 23 elementary schools in urban and rural areas in North Sulawesi, Indonesia in the form of video records and photos taken. The aim of this research is to analyse children pedestrian behaviour and its influence on the space usage on pedestrian areas. Method of analysis is a comparative study on urban and rural areas. Results of this research are types of behaviour, factors that influence the behaviour, physical condition of pedestrian areas and space usage by children. The behaviours are duck-line walking, running, playing, walking backward and walking with bare foot in which running is the main behaviour. These behaviours are influenced by factors including following friends and responding to acts. There are similarities and differences between pedestrian space usage in urban and rural areas. Space use by children pedestrian demonstrates the way pedestrian areas should be planned. Space usage by children pedestrian indicates that there is a need of evaluation of the space available considering pedestrian children behaviour.

  9. Usage of DNA Fingerprinting Technology for Quality Control in Molecular Lab Bench Work.

    Science.gov (United States)

    McIntosh, Linda Y; Lal, Janella E; Qin, Dahui

    2018-01-01

    One of the major quality assurance (QA) goals in many molecular laboratories is to avoid sample pipetting errors on the lab bench; especially when pipetting into multiwell plates. A pipetting error can cause a switch in patient samples, which can lead to recording the wrong results for the patient samples involved. Such pipetting errors are difficult to identify when it happens in lab bench work. DNA fingerprinting is a powerful tool in determining sample identities. Our laboratory has explored the usage of this technology in our QA process and successfully established that DNA fingerprinting can be used to monitor possible sample switch in gene rearrangement lab bench work. We use florescent light to quench the florescence in the gene rearrangement polymerase chain reaction products. After that, DNA fingerprinting technology is used to identify the sample DNA in the gene rearrangement polymerase chain reaction plate. The result is compared with the corresponding patient's blood sample DNA to determine whether there is a sample switch during the lab bench work.

  10. Employment Discrimination Based on Sexual Orientation and Gender Identity in North Dakota

    OpenAIRE

    Mallory, Christy; Sears, Brad

    2015-01-01

    Approximately 6,800 LGBT workers in North Dakota are not explicitly protected from discrimination under state or federal laws. Discrimination against LGBT employees has been documented in surveys, legislative testimony, the media, and in reports to community-based organizations. Many corporate employers and public opinion in North Dakota support protections for LGBT people in the workplace. If sexual orientation and gender identity were added to existing statewide non-discrimination laws, thr...

  11. Employment Discrimination Based on Sexual Orientation and Gender Identity in Wyoming

    OpenAIRE

    Mallory, Christy; Sears, Brad

    2015-01-01

    About 8,900 LGBT workers in Wyoming are not explicitly protected from discrimination under state or federal laws. Discrimination against LGBT employees in Wyoming has recently been documented in surveys, court cases, and other sources. Many corporate employers and public opinion in the state support protections for LGBT people in the workplace. If sexual orientation and gender identity were added to existing statewide non-discrimination laws, four more complaints would be filed in Wyoming eac...

  12. Identities in Harmony: Gender-Work Identity Integration Moderates Frame Switching in Cognitive Processing

    Science.gov (United States)

    Sacharin, Vera; Lee, Fiona; Gonzalez, Richard

    2009-01-01

    Professional women's identity integration--the perceived compatibility between work and gender identities--plays a role in how task or relationship information is processed. Seventy female business school students were primed with either their professional or their gender identity. Business women with higher identity integration showed an…

  13. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  14. A PRACTICAL ONTOLOGY FOR THE LARGE-SCALE MODELING OF SCHOLARLY ARTIFACTS AND THEIR USAGE

    Energy Technology Data Exchange (ETDEWEB)

    RODRIGUEZ, MARKO A. [Los Alamos National Laboratory; BOLLEN, JOHAN [Los Alamos National Laboratory; VAN DE SOMPEL, HERBERT [Los Alamos National Laboratory

    2007-01-30

    The large-scale analysis of scholarly artifact usage is constrained primarily by current practices in usage data archiving, privacy issues concerned with the dissemination of usage data, and the lack of a practical ontology for modeling the usage domain. As a remedy to the third constraint, this article presents a scholarly ontology that was engineered to represent those classes for which large-scale bibliographic and usage data exists, supports usage research, and whose instantiation is scalable to the order of 50 million articles along with their associated artifacts (e.g. authors and journals) and an accompanying 1 billion usage events. The real world instantiation of the presented abstract ontology is a semantic network model of the scholarly community which lends the scholarly process to statistical analysis and computational support. They present the ontology, discuss its instantiation, and provide some example inference rules for calculating various scholarly artifact metrics.

  15. Context-Aware Usage-Based Grid Authorization Framework

    Institute of Scientific and Technical Information of China (English)

    CUI Yongquan; HONG Fan; FU Cai

    2006-01-01

    Due to inherent heterogeneity, multi-domain characteristic and highly dynamic nature, authorization is a critical concern in grid computing. This paper proposes a general authorization and access control architecture, grid usage control (GUCON), for grid computing. It's based on the next generation access control mechanism usage control (UCON) model. The GUCON Framework dynamic grants and adapts permission to the subject based on a set of contextual information collected from the system environments; while retaining the authorization by evaluating access requests based on subject attributes, object attributes and requests. In general, GUCON model provides very flexible approaches to adapt the dynamically security request. GUCON model is being implemented in our experiment prototype.

  16. Marriage Dot EU: The Effect of Internet Usage on Marriage Hazard

    OpenAIRE

    Mario Vozar

    2011-01-01

    The rapid growth of internet usage over the last two decades has been influencing many aspects of our life and most noticeably the ways in which people communicate with each other. Therefore, it is appropriate to ask whether the growth of internet usage influences individuals’ marital decisions in modern society. In my study, I concentrate on the effect of the growing internet usage on the gender and age-specific marriage hazard rate for the first time marriages in Europe. The panel data anal...

  17. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  18. Thinking identity differently: dynamics of identity in self and institutional boundary

    Science.gov (United States)

    Albrecht, Nancy J.; Fortney, Brian S.

    2011-03-01

    In research oriented universities, research and teaching are often viewed as separate. Aydeniz and Hodge present one professor's struggles to synthesize an identity from three different spaces, each with competing values and core beliefs. As Mr. G's story unfolds, and he reflects upon his negotiation between teaching and research responsibilities, we seek to expand the discussion by presenting a caution to identity researchers. The caution pertains to construction of understanding on how identities are created, and the role that individual stories take in how identities are created and enacted. In this forum contribution, we present several questions in the hopes of furthering the discussion on identity research, and our understanding of the conceptualization of institutional boundaries and objectivity, as well as questions on participant involvement in the process of research.

  19. Health insurance, neighborhood income, and emergency department usage by Utah children 1996–1998

    Directory of Open Access Journals (Sweden)

    Knight Stacey

    2005-04-01

    Full Text Available Abstract Background It is estimated that approximately half of emergency department (ED usage in the U.S. and other developed countries is for non-urgent conditions and that this usage is related to availability, social, and economic factors. We examined pediatric ED usage in a U.S. state with respect to income, health insurance status, types of medical conditions, and whether introduction of managed care affected utilization by Medicaid children. Methods Emergency department usage rates were calculated from 1996 through 1998 using Utah ED data for children with commercial health insurance, Medicaid, for uninsured children, and by income group estimating neighborhood household income from Zip code of residence. We analyzed usage following the July 1996 transition of Utah Medicaid to managed care. Results Children with Medicaid had approximately 50% greater ED utilization rates than children with commercial health insurance or uninsured children. The majority of usage for Medicaid and uninsured children was for non-traumatic conditions. Only 35% of total ED usage was for non-emergent or non-urgent conditions and this was related to both Medicaid and low household income. Children lacking health insurance were more likely to be discharged against medical advice (OR = 2.36, 95% C.I. 1.88–2.96. There was no reduction in Medicaid ED usage following the transition to managed care. Conclusion Usage of ED services is related to both health insurance status and income. Children lacking health insurance and Medicaid children have excessive usage for conditions which could be treated in a primary care setting. That managed care does not reduce Medicaid ED usage is consistent with findings of other studies.

  20. Apples and oranges in disguised advertising: differentiation and terminological determination of brand usage in program content

    Directory of Open Access Journals (Sweden)

    Andrea Muškinja

    2013-06-01

    Full Text Available Disguised advertising is a modern marketing instrument that is seeing an increase in Croatian business practice but whose application is prohibited by Croatian law. Therefore, the purpose of this study is to understand whether Croatian businesses really do use disguised advertising, how they do it either in accordance or in contradiction with Croatian law, and whether there is a need to distinguish among several similar but different manifestations and to terminologically determine each one of these. For the purpose of this study, we explored the theoretical, legal and ethnographic conceptualizations of the term disguised advertising in the scientific literature, Croatian legislation and applied communication in business practice. The results of our research show that: a marketing literature uses various terms for describing brand usage in program content, among which disguised advertising (prikriveno oglašavanje dominates, whereas product placement (plasman proizvoda is not mentioned once; b the law distinguishes between disguised advertising that is prohibited and product placement, as a practise allowed under certain conditions and the one that is by definition identical with disguised advertising in the manner defined by marketing literature; c business entities in their communication make a distinction between disguised advertising and product placement, and they are trying to move product placement away from disguised advertising by being mentioned as sponsors/partners of the program. The analysis also indicates three different situations in which brands are used in the program content: contracted and correctly indicated brand usage; contracted but not indicated; and not-contracted brand usage. Only the first situation is considered to be a recommended marketing tool; therefore, it is necessary to differentiate it from the other two by its definition and name. It is suggested that this marketing tool be named: brand placement in both

  1. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. Social Identity in People with Multiple Sclerosis: An Examination of Family Identity and Mood.

    Science.gov (United States)

    Barker, Alex B; Lincoln, Nadina B; Hunt, Nigel; dasNair, Roshan

    2018-01-01

    Mood disorders are highly prevalent in people with multiple sclerosis (MS). MS causes changes to a person's sense of self. The Social Identity Model of Identity Change posits that group membership can have a positive effect on mood during identity change. The family is a social group implicated in adjustment to MS. The objectives of this study were to investigate whether family identity can predict mood in people with MS and to test whether this prediction was mediated by social support and connectedness to others. This cross-sectional survey of 195 participants comprised measures of family identity, family social support, connectedness to others, and mood. Family identity predicted mood both directly and indirectly through parallel mediators of family social support and connectedness to others. Family identity predicted mood as posited by the Social Identity Model of Identity Change. Involving the family in adjustment to MS could reduce low mood.

  3. Media Usage and Consumption Practice in Shopping Malls Among Female Youth in Modern Thai Society

    Directory of Open Access Journals (Sweden)

    Kangwan Fongkaew

    2017-12-01

    Full Text Available This paper presents the data derived from the longitudinal ethnographic study on media useage and consumption practice in shopping malls as everyday life practices among female youth in a modern society of Chiang Mai, Northern Thailand, which contributed to their distinctive sexual identity construction and expression. Applying Bourdieu’s theory of cultural capital and Friske’s idea on tactical practice, this paper revealed that the various tactics female youth employed in shopping malls were to express their distinctions from other youth groups belonged to lower classes, as well as to negotiate mechanisms of dominant school and state controls that aimed to regulate their sexual and cultural practices. Female youth in modern society were not only proper “consumers” but also “users” of shopping malls in modern Thai society. Their media usage and consumption practice sought to send the messages that they were the creators of their own selves.

  4. The Nobody: Exploring Archaeological Identity with George Horsfield (1882–1956

    Directory of Open Access Journals (Sweden)

    Amara Thornton

    2014-10-01

    Full Text Available This article examines George Horsfield’s life and professional career in the Department of Antiquities in British Mandate Transjordan through his correspondence and images in the archives of UCL Institute of Archaeology. Through these documents, Horsfield’s multiple archaeological identities – architect, official and foreigner – are revealed. His experience, situated within the context of life in British Mandate Transjordan, is used to analyse the archaeologist within a wider history of antiquities departments in British imperial possessions.

  5. Identity-specific motivation: How distinct identities direct self-regulation across distinct situations.

    Science.gov (United States)

    Browman, Alexander S; Destin, Mesmin; Molden, Daniel C

    2017-12-01

    Research on self-regulation has traditionally emphasized that people's thoughts and actions are guided by either (a) domain-general motivations that emerge from a cumulative history of life experiences, or (b) situation-specific motivations that emerge in immediate response to the incentives present in a particular context. However, more recent studies have illustrated the importance of understanding the interplay between such domain-general and situation-specific motivations across the types of contexts people regularly encounter. The present research, therefore, expands existing perspectives on self-regulation by investigating how people's identities -the internalized roles, relationships, and social group memberships that define who they are-systemically guide when and how different domain-general motivations are activated within specific types of situations. Using the motivational framework described by regulatory focus theory (Higgins, 1997), Studies 1 and 2 demonstrate that people indeed have distinct, identity-specific motivations that uniquely influence their current self-regulation when such identities are active. Studies 3-5 then begin to explore how identity-specific motivations are situated within people's larger self-concept. Studies 3a and 3b demonstrate that the less compatible people's specific identities, the more distinct are the motivations connected to those identities. Studies 4-5 then provide some initial, suggestive evidence that identity-specific motivations are not a separate, superordinate feature of people's identities that then alter how they pursue any subordinate, identity-relevant traits, but instead that such motivations emerge from the cumulative motivational significance of the subordinate traits to which the identities themselves become attached. Implications for understanding the role of the self-concept in self-regulation are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. Documentation and quantitative analysis of local ethnozoological knowledge among traditional healers of Theni district, Tamil Nadu, India.

    Science.gov (United States)

    Chellappandian, M; Pandikumar, P; Mutheeswaran, S; Gabriel Paulraj, M; Prabakaran, S; Duraipandiyan, V; Ignacimuthu, S; Al-Dhabi, N A

    2014-05-28

    This study investigated the use of animals among the traditional healers in Theni district of Tamil Nadu, India. The data regarding the medicinal animals/animal products were documented and their usages were analyzed quantitatively. Based on free list interviews with the traditional healers, we documented the medicinal usage of animals/animal products and calculated the indices such as informant consensus factor (Fic) to determine the consensus over the species for an illness category, as well as the Index Agreement on Remedies (IAR) to determine the extent of potential utilization of each species. In this study, 69 medicinal animals/animal products were documented with the help of standardized questionnaires among the local healers. The results were tabulated and Fic value for each illness category was calculated. Three illness categories viz., jaundice (milk of Capra aegagrus hircus), orthopedics (egg white and meat of Gallus gallus domesticus) and pediatrics (milk of Equus africanus asinus) had got high Fic values. Fifteen illness categories had moderate Fic values. Highly cited animals in these illness categories were: Rusa unicolor (antiemetic), Reticulitermes spp. (diabetes), flesh of Varanus benghalensis (oral ailments), milk (eye ailments, fever) and urine (antidote) of Homo sepians, meat of Trachypithecus johnii (respiratory ailments), various parts of C. aegagrus hircus (blood ailments, coolants, diarrhea, pulmonary and urinary ailments), flesh of Chamaeleon zeyalnica (neural ailments), meat of Passer domesticus (aphrodisiac), curd and dung of Bos primigenius taurus (dermatological ailments), meat of G. domesticus (musculo-skeletal disorders, analgesic), meat of Lissemys punctata (hemorrhoids), and Pherthima posthuma (psychological ailments). Six illness categories had low Fic values. This study indicated that the animals are still being used by the local healers of Theni district, to treat various illnesses. Cross-disciplinary approaches to explore the

  7. Memory transfer for emotionally valenced words between identities in dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Peters, Madelon L; Woertman, Liesbeth; van der Hart, Onno; Postma, Albert

    2007-04-01

    The present study aimed to determine interidentity retrieval of emotionally valenced words in dissociative identity disorder (DID). Twenty-two DID patients participated together with 25 normal controls and 25 controls instructed to simulate DID. Two wordlists A and B were constructed including neutral, positive and negative material. List A was shown to one identity, while list B was shown to another identity claiming total amnesia for the words learned by the first identity. The identity claiming amnesia was tested for intrusions from list A words into the recall of words from list B and recognition of the words learned by both identities. Test results indicated no evidence of total interidentity amnesia for emotionally valenced material in DID. It is argued that dissociative amnesia in DID may more adequately be described as a disturbance in meta-memory functioning instead of an actual retrieval inability.

  8. A privacy-preserving sharing method of electricity usage using self-organizing map

    Directory of Open Access Journals (Sweden)

    Yuichi Nakamura

    2018-03-01

    Full Text Available Smart meters for measuring electricity usage are expected in electricity usage management. Although the relevant power supplier stores the measured data, the data are worth sharing among power suppliers because the entire data of a city will be required to control the regional grid stability or demand–supply balance. Even though many techniques and methods of privacy-preserving data mining have been studied to share data while preserving data privacy, a study on sharing electricity usage data is still lacking. In this paper, we propose a sharing method of electricity usage while preserving data privacy using a self-organizing map. Keywords: Privacy preserving, Data sharing, Self-Organizing map

  9. Using travel socialization and underlying motivations to better understand motorcycle usage in Taiwan.

    Science.gov (United States)

    Chang, Hsin-Li; Lai, Chi-Yen

    2015-06-01

    This study introduces self-determination theory (SDT) to refine previous models of vehicle usage motivation. We add travel socialization theory regarding parental influence on vehicle usage to enhance previous structural models describing motorcycle usage behavior. Our newly developed model was empirically verified in a sample of 721 motorcycle users in Taiwan. In addition to instrumental, symbolic, and affective motivations, perceived parental attitudes (PPAs) towards motorcycle riding were found to have a significant effect on individuals' motorcycle use habits. Additionally, participants who perceived their parents to have more positive attitudes toward motorcycles were found to have more experience being chauffeured on motorcycles by their parents. Based on these results, we suggest means to confront the challenges brought on by the rapid growth of motorcycle usage, especially serious motorcycle traffic accidents. These results improve our understanding motorcycle usage in Taiwan and can be used by transportation professionals who are seeking solutions to the rapid growth of motorcycle usage. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. The Usage of E-Governance Applications by Higher Education Students

    Science.gov (United States)

    Öktem, M. Kemal; Demirhan, Kamil; Demirhan, Haydar

    2014-01-01

    This study aims to analyze the factors affecting the Internet usage of university students using e-governance applications. It is important to examine these factors to understand why the online citizen participation is not increasing as expected, while Information and Communication Technologies (ICT) usage is improving in governance. Governance is…

  11. ECONOMIC QUESTIONS OF LAND USAGE – SCARCITY, SUSTAINABILITY

    OpenAIRE

    Magda, Robert

    2012-01-01

    The aim of this paper is to show the economic importance of land usage. This topic is important because land is the basis of industrial and agricultural production, as well as energy and environmental security. The focus of the analysis is the relationship between land usage and scarcity and sustainability.

  12. Possibilities of radiation sterilization for re-usage of medical devices in the medical management

    International Nuclear Information System (INIS)

    Tabei, Masae; Kudo, Hisaaki; Katsumura, Yosuke

    2004-01-01

    The rule for re-usage of medical single-use devices was established in US in 2000 based on the concept of Managed Care (total management of medicare on cost, quality and patients' satisfaction) and 20-30% of those devices are re-used at present. The re-usage is conducted in not only US but also Canada, Denmark, UK, India, China etc. Standing on the viewpoint, this paper described and discussed the possibility of re-usage of the single-use devices now prohibited in Japan, possible re-sterilization, possible re-usage of hollow fiber-type hemodialyzer following γ-ray sterilization with consideration for D-values against bacteria and viruses, cost estimation of electron beam sterilization for re-usage, and radiation sterilization of waste water and plastic materials. Radiation sterilization for re-usage of medical devices was concluded possible if their materials and records for their usage processes are proper, and should be conducted in a large scale after sufficient examinations by industries/government/academia. (N.I.)

  13. The dynamic relationship between daily activities, home environment, and identity when living with advanced cancer

    DEFF Research Database (Denmark)

    Mærsk, Jesper Larsen

    The importance of daily activities and home to identity when living with advanced cancer Introduction Research within occupational science and gerontology has documented that being engaged in daily activities and having relational bonds to home are important to identity formation. For people living...... with advanced cancer in Denmark it is of priority to be able to live at home for as long as possible. For approximately 80% their home is the preferred place to die. Studies indicate home is the place where people with advanced cancer spent most of their day and are engaged in most of their daily activities...... with advanced cancer in Denmark may experience challenges to how they can form and express their identity through what they do and where they live. Objectives The purpose of this study is to generate knowledge about how people with advanced cancer through their words and actions express: • The importance...

  14. Contextual Treatment of Dissociative Identity Disorder.

    Science.gov (United States)

    Gold, Steven N; Elhai, Jon D; Rea, Bayard D; Weiss, Donna; Masino, Theodore; Morris, Staci Leon; McIninch, Jessica

    2001-01-01

    Evidence for the effectiveness of contextual therapy, a new approach for treating adult survivors of prolonged child abuse (PCA), is provided via case studies of three women with Dissociative Identity Disorder (DID). Contextual therapy is based on the premise that it is not only traumatic experiences that account for PCA survivors' psychological difficulties. Even more fundamentally, many survivors grow up in an interpersonal context in which adequate resources for secure attachment and acquisition of adaptive living skills are not available. As a result, they are left with lasting deficits that undermine not only their current functioning, but also their ability to cope with reliving their traumatic memories in therapy. The primary focus of this treatment approach, therefore, is on developing capacities for feeling and functioning better in the present, rather than on extensive exploration and processing of the client's trauma history or, in the case of DID, of identity fragments. Treatment of the three cases presented ranged from eight months to two and one-half years' duration, and culminated in very positive outcomes. The women's reports of achievements, such as obtaining and maintaining gainful employment, greater self-sufficiency, and the establishment of more intimate and gratifying relationships, indicated marked improvements in daily functioning. Objective test data obtained at admission and discharge, and in one case, at follow-up, documented substantial reductions in dissociative, posttraumatic stress, depressive, and other symptoms.

  15. Cyrillic alphabet as the designation of national identity among students of University of Priština with temporary head office in Kosovska Mitrovica

    Directory of Open Access Journals (Sweden)

    Miketić Sanja D.

    2016-01-01

    Full Text Available The relationship between culture and nationality and in that sense - national identity of a particular community - is a known thing for a long time. Nationality is usually strongly connected to culture. We will only mention few of their joint characteristics: language, religion, art, customs, tradition etc. In this article special attention will be paid to one of the features of national identity - language - and we will focus on the usage of Cyrillic alphabet of our target group (students of University of Priština, with temporary head office in Kosovska Mitrovica. The study consists of two smaller researches. In the first part we explored reactions of students at University of Priština and we assumed that they will have different reactions towards Cyrillic alphabet and Latin alphabet used as stimuli-words comparing to pupils of Belgrade and Zrenjanin high schools and students of University of Belgrade, Novi Sad and Niš presented in The associative dictionary of Serbian language (Asocjativni rečnik srpskog jezika, 2005. In the second part we tried to find out if our informants prefer the usage of Cyrillic or Latin alphabet, and which one they find better in the esthetic sense. We compared attitudes of students who enroll University of Priština to attitudes of students who enroll University of Belgrade and differences between their attitudes. With both researches we wanted to see if there are formed verbal stereotypes with positive or negative connotation, and what are the attitudes on using Cyrillic alphabet among students in the age of expansion of Latin alphabet. We concluded that Cyrillic alphabet is more used and valued at University of Priština than in the rest of Republic of Serbia and the reason for that might be the stronger sense of national identity among these students.

  16. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  17. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  18. Usage evaluation of the Physiotherapy Evidence Database (PEDro) among Brazilian physical therapists.

    Science.gov (United States)

    Elkins, Mark R; Moseley, Anne M; Pinto, Rafael Z

    2015-01-01

    It is unclear whether the Physiotherapy Evidence Database (PEDro) is widely and equally used by physical therapists in Brazil. As PEDro is considered a key resource to support evidence-based physical therapy, analyses of PEDro usage could reflect the extent of dissemination of evidence-based practice. To describe the usage of PEDro among the five regions of the World Confederation for Physical Therapy (WCPT) and, in more detail, in the South American region and Brazil over a 5-year period. PEDro home-page sessions and the number of searches performed were logged for a 5-year period (2010-2014). Absolute usage and relative usage were calculated for each region of the WCPT, each country in the South American region of WCPT, and each Regional Council (CREFITO) in Brazil. Europe had the highest absolute and relative usage among the five regions of the WCPT (971 searches per million-population per year), with the South American region ranked 4th in absolute terms and 3rd in relative terms (486). Within the South American region, Brazil accounted for nearly 60% of searches (755). Analysis at a national level revealed that usage per physical therapist in Brazil is very low across all CREFITOs. The highest usage occurred in CREFITO 6 with 1.3 searches per physical therapist per year. PEDro is not widely and equally used throughout Brazil. Strategies to promote PEDro and to make PEDro more accessible to physical therapists speaking Portuguese are needed.

  19. Media Usage and Civic Life: The Role of Values

    OpenAIRE

    Firat, Rengin Bahar

    2014-01-01

    Previous research has observed that media usage influences civic outcomes, including trust and political behavior. However, this research has rarely examined the social psychological mechanisms underlying the relationship between media and civic life. The current study focuses on values as potential explanations for how media usage impacts civic engagement. Using data from Round 5 of the European Social Survey (2010) and employing two-level structural equation modeling, this paper examines wh...

  20. Effective Dose Calculation Program (EDCP) for the usage of NORM-added consumer product.

    Science.gov (United States)

    Yoo, Do Hyeon; Lee, Jaekook; Min, Chul Hee

    2018-04-09

    The aim of this study is to develop the Effective Dose Calculation Program (EDCP) for the usage of Naturally Occurring Radioactive Material (NORM) added consumer products. The EDCP was developed based on a database of effective dose conversion coefficient and the Matrix Laboratory (MATLAB) program to incorporate a Graphic User Interface (GUI) for ease of use. To validate EDCP, the effective dose calculated with EDCP by manually determining the source region by using the GUI and that by using the reference mathematical algorithm were compared for pillow, waist supporter, eye-patch and sleeping mattress. The results show that the annual effective dose calculated with EDCP was almost identical to that calculated using the reference mathematical algorithm in most of the assessment cases. With the assumption of the gamma energy of 1 MeV and activity of 1 MBq, the annual effective doses of pillow, waist supporter, sleeping mattress, and eye-patch determined using the reference algorithm were 3.444 mSv year -1 , 2.770 mSv year -1 , 4.629 mSv year -1 , and 3.567 mSv year -1 , respectively, while those calculated using EDCP were 3.561 mSv year -1 , 2.630 mSv year -1 , 4.740 mSv year -1 , and 3.780 mSv year -1 , respectively. The differences in the annual effective doses were less than 5%, despite the different calculation methods employed. The EDCP can therefore be effectively used for radiation protection management in the context of the usage of NORM-added consumer products. Additionally, EDCP can be used by members of the public through the GUI for various studies in the field of radiation protection, thus facilitating easy access to the program. Copyright © 2018. Published by Elsevier Ltd.

  1. Codon usage is associated with the evolutionary age of genes in metazoan genomes

    Directory of Open Access Journals (Sweden)

    Linial Nathan

    2009-12-01

    Full Text Available Abstract Background Codon usage may vary significantly between different organisms and between genes within the same organism. Several evolutionary processes have been postulated to be the predominant determinants of codon usage: selection, mutation, and genetic drift. However, the relative contribution of each of these factors in different species remains debatable. The availability of complete genomes for tens of multicellular organisms provides an opportunity to inspect the relationship between codon usage and the evolutionary age of genes. Results We assign an evolutionary age to a gene based on the relative positions of its identified homologues in a standard phylogenetic tree. This yields a classification of all genes in a genome to several evolutionary age classes. The present study starts from the observation that each age class of genes has a unique codon usage and proceeds to provide a quantitative analysis of the codon usage in these classes. This observation is made for the genomes of Homo sapiens, Mus musculus, and Drosophila melanogaster. It is even more remarkable that the differences between codon usages in different age groups exhibit similar and consistent behavior in various organisms. While we find that GC content and gene length are also associated with the evolutionary age of genes, they can provide only a partial explanation for the observed codon usage. Conclusion While factors such as GC content, mutational bias, and selection shape the codon usage in a genome, the evolutionary history of an organism over hundreds of millions of years is an overlooked property that is strongly linked to GC content, protein length, and, even more significantly, to the codon usage of metazoan genomes.

  2. Stillbirth and stigma: the spoiling and repair of multiple social identities.

    Science.gov (United States)

    Brierley-Jones, Lyn; Crawley, Rosalind; Lomax, Samantha; Ayers, Susan

    This study investigated mothers' experiences surrounding stillbirth in the United Kingdom, their memory making and sharing opportunities, and the effect these opportunities had on them. Qualitative data were generated from free text responses to open-ended questions. Thematic content analysis revealed that "stigma" was experienced by most women and Goffman's (1963) work on stigma was subsequently used as an analytical framework. Results suggest that stillbirth can spoil the identities of "patient," "mother," and "full citizen." Stigma was reported as arising from interactions with professionals, family, friends, work colleagues, and even casual acquaintances. Stillbirth produces common learning experiences often requiring "identity work" (Murphy, 2012). Memory making and sharing may be important in this work and further research is needed. Stigma can reduce the memory sharing opportunities for women after stillbirth and this may explain some of the differential mental health effects of memory making after stillbirth that is documented in the literature.

  3. WATER LAW AND MODEL OF RESPONSIBLE WATER USAGE

    Directory of Open Access Journals (Sweden)

    Dmitri Olegovitch Sivakov

    2017-03-01

    Full Text Available As it is known, the water law regulates dynamic social relationships concerning study, usage and protection of water objects, as well as their transformation. The water law explicitly regulates water economic activities. The regulatory method of the water law has a mixed nature and thus is not distinctive. It predetermines in some cases equality and independence of subjects of relationships (water usage agreement and in other – power and submission (permissive nature of water usage. The aim of the publication is to promote scientific ideas about the fate of the water law in order to make a further polygonal and productive discussion in which the reader is invited to participate. Scientific novelty. In 2016 the monograph of D.O. Sivakov “Water law: dynamics, problems, perspectives: monograph” (second edition, reviewed and updated. Moscow: Stolitsa, 2016. 540 p. was published. In 2017 the author reconsidered some conclusions of his monograph and applied scientific achievements of theory of state and law in water sphere. In accordance with this, it is important to mention research of Petrov D.E. related to issues of differentiation and integration of structural formations of Russian legal system. The scientific novelty of the article includes the synthesis of ideas of the monograph and some achievements of theory of state and law. Methods of research. The author of the article relies on some collective and individual monographic studies in the sphere of theory of state and law, natural resource law, arctic law, financial law. Basic results of research. The author promotes the model of responsible water usage. This model shall be based not on the unstable balance of economic and environmental interests (which shall practically lead to the domination of economic interests, but on the obligatory combination of economic activities with technologies, ensuring maximal preservation of water resources. Responsible water usage shall mean a system of

  4. Usage of the www.2aida.org AIDA diabetes software Website: a pilot study.

    Science.gov (United States)

    Lehmann, Eldon D

    2003-01-01

    AIDA is a diabetes-computing program freely available from www.2aida.org on the Web. The software is intended to serve as an educational support tool, and can be used by anyone who has an interest in diabetes, whether they be patients, relatives, health-care professionals, or students. In previous "Diabetes Information Technology & WebWatch" columns various indicators of usage of the AIDA program have been reviewed, and various comments from users of the software have been documented. One aspect of AIDA, though, that has been of considerable interest has been to investigate its Web-based distribution as a wider paradigm for more general medically related usage of the Internet. In this respect we have been keen to understand in general terms: (1) why people are turning to the Web for health-care/diabetes information; (2) more specifically, what sort of people are making use of the AIDA software; and (3) what benefits they feel might accrue from using the program. To answer these types of questions we have been conducting a series of audits/surveys via the AIDA Website, and via the software program itself, to learn as much as possible about who the AIDA end users really are. The rationale for this work is that, in this way, it should be possible to improve the program as well as tailor future versions of the software to the interests and needs of its users. However, a recurring observation is that data collection is easiest if it is as unobtrusive and innocuous as possible. One aspect of learning as much as possible about diabetes Website visitors and users may be to apply techniques that do not necessitate any visitor or user interaction. There are various programs that can monitor what pages visitors are viewing at a site. As these programs do not require visitors to do anything special, over time some interesting insights into Website usage may be obtained. For the current study we have reviewed anonymous logstats data, which are automatically collected at many

  5. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  6. Online device usage habits and emotional well-being in net generation

    Directory of Open Access Journals (Sweden)

    Nur Demirbas Celik

    2015-02-01

    Full Text Available The aim of this research is to examine the effect of online device usage habit of high school students on their emotional well-being, using a sample 308 Turkish high school students who aged from 15 to 19 in Istanbul in 2014 participated in this research. PIF is applied in order to determine the aims of students in using online devices. There are questions in PIF upon the gender of the students, online devices they own, time they on these online devices, the usage aims of these devices. PANAS is used in order to measure the emotional well-being of the students. PANAS has got two sub-dimensions as positive affect and negative affect. Usage time of the online devices creates a significant difference on negative affect score. The usage of this devices with the aim of homework/project creates a significant difference in positive and negative affect scores; usage of these devices with the aim of game and entertainment creates a significant difference in negative affect score and the usage of these devices with the aim of news/newspaper creates a significant difference in positive affect score. The result of the research discovered that the time and aim of online device use are significant indicators for high school students’ emotional well-being. The result of this research shows that high school students mostly use smart phones among online devices. If the future researches are carried out upon smart phones, this may provide information upon how are the adolescents affected from being grown up with the technology. On the other hand as online devices have become widespread rapidly, their usage aims are versatile, children grow up with technology show that more researches are needed in this field.

  7. Expanding Bicycle-Sharing Systems: Lessons Learnt from an Analysis of Usage.

    Science.gov (United States)

    Zhang, Ying; Thomas, Tom; Brussel, M J G; van Maarseveen, M F A M

    2016-01-01

    Bike-sharing programs, with initiatives to increase bike use and improve accessibility of urban transit, have received increasing attention in growing number of cities across the world. The latest generation of bike-sharing systems has employed smart card technology that produces station-based data or trip-level data. This facilitates the studies of the practical use of these systems. However, few studies have paid attention to the changes in users and system usage over the years, as well as the impact of system expansion on its usage. Monitoring the changes of system usage over years enables the identification of system performance and can serve as an input for improving the location-allocation of stations. The objective of this study is to explore the impact of the expansion of a bicycle-sharing system on the usage of the system. This was conducted for a bicycle-sharing system in Zhongshan (China), using operational usage data of different years following system expansion. To this end, we performed statistical and spatial analyses to examine the changes in both users and system usage between before and after the system expansion. The findings show that there is a big variation in users and aggregate usage following the system expansion. However, the trend in spatial distribution of demand shows no substantial difference over the years, i.e. the same high-demand and low-demand areas appear. There are decreases in demand for some old stations over the years, which can be attributed to either the negative performance of the system or the competition of nearby new stations. Expanding the system not only extends the original users' ability to reach new areas but also attracts new users to use bike-sharing systems. In the conclusions, we present and discuss the findings, and offer recommendations for the further expansion of system.

  8. Expanding Bicycle-Sharing Systems: Lessons Learnt from an Analysis of Usage.

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    Full Text Available Bike-sharing programs, with initiatives to increase bike use and improve accessibility of urban transit, have received increasing attention in growing number of cities across the world. The latest generation of bike-sharing systems has employed smart card technology that produces station-based data or trip-level data. This facilitates the studies of the practical use of these systems. However, few studies have paid attention to the changes in users and system usage over the years, as well as the impact of system expansion on its usage. Monitoring the changes of system usage over years enables the identification of system performance and can serve as an input for improving the location-allocation of stations. The objective of this study is to explore the impact of the expansion of a bicycle-sharing system on the usage of the system. This was conducted for a bicycle-sharing system in Zhongshan (China, using operational usage data of different years following system expansion. To this end, we performed statistical and spatial analyses to examine the changes in both users and system usage between before and after the system expansion. The findings show that there is a big variation in users and aggregate usage following the system expansion. However, the trend in spatial distribution of demand shows no substantial difference over the years, i.e. the same high-demand and low-demand areas appear. There are decreases in demand for some old stations over the years, which can be attributed to either the negative performance of the system or the competition of nearby new stations. Expanding the system not only extends the original users' ability to reach new areas but also attracts new users to use bike-sharing systems. In the conclusions, we present and discuss the findings, and offer recommendations for the further expansion of system.

  9. Transfer of newly acquired stimulus valence between identities in dissociative identity disorder (DID).

    Science.gov (United States)

    Huntjens, Rafaële J C; Peters, Madelon L; Postma, Albert; Woertman, Liesbeth; Effting, Marieke; van der Hart, Onno

    2005-02-01

    Patients with Dissociative Identity Disorder (DID) frequently report episodes of interidentity amnesia, that is amnesia for events experienced by other identities. The goal of the present experiment was to test the implicit transfer of trauma-related information between identities in DID. We hypothesized that whereas declarative information may transfer from one identity to another, the emotional connotation of the memory may be dissociated, especially in the case of negative, trauma-related emotional valence. An evaluative conditioning procedure was combined with an affective priming procedure, both performed by different identities. In the evaluative conditioning procedure, previously neutral stimuli come to refer to a negative or positive connotation. The affective priming procedure was used to test the transfer of this acquired valence to an identity reporting interidentity amnesia. Results indicated activation of stimulus valence in the affective priming task, that is transfer of emotional material between identities.

  10. Codon usage vis-a-vis start and stop codon context analysis of three ...

    Indian Academy of Sciences (India)

    To understand the variation in genomic composition and its effect on codon usage, we performed the comparative analysis of codon usage and nucleotide usage in the genes of three dicots, Glycine max, Arabidopsis thaliana and Medicago truncatula. The dicot genes were found to be A/T rich and have predominantly ...

  11. Antecedents of Continued Usage Intentions of Web-Based Learning Management System in Tanzania

    Science.gov (United States)

    Lwoga, Edda Tandi; Komba, Mercy

    2015-01-01

    Purpose: The purpose of this paper is to examine factors that predict students' continued usage intention of web-based learning management systems (LMS) in Tanzania, with a specific focus on the School of Business of Mzumbe University. Specifically, the study investigated major predictors of actual usage and continued usage intentions of…

  12. Delivery of electroconvulsive therapy in Canada: a first national survey report on usage, treatment practice, and facilities.

    Science.gov (United States)

    Martin, Barry A; Delva, Nicholas John; Graf, Peter; Gosselin, Caroline; Enns, Murray W; Gilron, Ian; Jewell, Mark; Lawson, James Stuart; Milev, Roumen; Patry, Simon; Chan, Peter K Y

    2015-06-01

    The aims of this study were to document electroconvulsive therapy use in Canada with respect to treatment facilities and caseloads based on a survey of practice (Canadian Electroconvulsive Therapy Survey/Enquete Canadienne Sur Les Electrochocs-CANECTS/ECANEC) and to consider these findings in the context of guideline recommendations. All 1273 registered hospitals in Canada were contacted, and 175 sites were identified as providing electroconvulsive therapy; these sites were invited to complete a comprehensive questionnaire. The survey period was calendar year 2006 or fiscal year 2006/2007. National usage rates were estimated from the responses. Sixty-one percent of the sites completed the questionnaire; a further 10% provided caseload data. Seventy were identified as general; 31, as university teaching; and 21, as provincial psychiatric/other single specialty (psychiatric) hospitals. Caseload volumes ranged from a mean of fewer than 2 to greater than 30 treatments per week. Estimated national usage during the 1-year survey period was 7340 to 8083 patients (2.32-2.56 per 10,000 population) and 66,791 to 67,424 treatments (2.11-2.13 per 1000 population). The diagnostic indications, admission status, and protocols for course end points are described. The usage rates are in keeping with earlier Canadian data and with those from other jurisdictions. The difficulty obtaining caseload data from individual hospitals is indicative of the need for standardized data collection to support both clinical research and quality assurance. The wide variation in protocols for number of treatments per course indicates a need for better informed clinical guidelines. The broad range of caseload volumes suggests the need to review the economies of scale in the field.

  13. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  14. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  15. fine-GRAPE : Fine-grained APi usage extractor – an approach and dataset to investigate API usage

    NARCIS (Netherlands)

    Sawant, A.A.; Bacchelli, A.

    An Application Programming Interface (API) provides a set of functionalities to a developer with the aim of enabling reuse. APIs have been investigated from different angles such as popularity usage and evolution to get a better understanding of their various characteristics. For such studies,

  16. Decay-usage scheduling in multiprocessors

    NARCIS (Netherlands)

    Epema, D.H.J.

    1998-01-01

    Decay-usage scheduling is a priority-aging time-sharing scheduling policy capable of dealing with a workload of both interactive and batch jobs by decreasing the priority of a job when it acquires CPU time, and by increasing its priority when it does not use the (a) CPU. In this article we deal with

  17. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...... and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises...

  18. Summary of treatment, storage, and disposal facility usage data collected from U.S. Department of Energy sites

    International Nuclear Information System (INIS)

    Jacobs, A.; Oswald, K.; Trump, C.

    1995-04-01

    This report presents an analysis for the US Department of Energy (DOE) to determine the level and extent of treatment, storage, and disposal facility (TSDF) assessment duplication. Commercial TSDFs are used as an integral part of the hazardous waste management process for those DOE sites that generate hazardous waste. Data regarding the DOE sites' usage have been extracted from three sets of data and analyzed in this report. The data are presented both qualitatively and quantitatively, as appropriate. This information provides the basis for further analysis of assessment duplication to be documented in issue papers as appropriate. Once the issues have been identified and adequately defined, corrective measures will be proposed and subsequently implemented

  19. Understanding social media program usage in public transit agencies

    Directory of Open Access Journals (Sweden)

    Jenny H. Liu

    2016-10-01

    Full Text Available Social media has been gaining prominence in public transit agencies in their communication strategies and daily management. This study aims to better understand recent trends in social media usage in public transit agencies, to examine which agencies use what kind of social media programs for what purposes, and how they measure their programs. A survey was conducted of the top transit agencies in the nation, and results are examined through descriptive statistical analysis, correlation analysis and regression modeling. We found that while most agencies still lack clearly-defined goals and performance metrics to guide their social media development, many are increasing their social media capacity with more structural components. Public transit service usage and the level of transit service provision are the most significant determinants of agencies’ social media programming and resource investments. In contrast, the measurement of social media usage and outcomes is more significantly related to city attributes and demographic characteristics. We anticipate an increase in the usage of social media to convey transit related stories and livability benefits, such as environmental sensitivity or safety improvements, as these programs expand. Public transit agencies’ commitment to measuring social media outcomes underscores the future research need to develop best practices for measuring the impacts and performance of social media communications and investments.

  20. Internet Usage Habits and Internet Usage in Educational Studies of Vocational School Students

    Directory of Open Access Journals (Sweden)

    Zehra Deniz Yakıncı

    2018-04-01

    Full Text Available Internet is the easiest way to access information. It provides positive contributions to individual and surroundings, in learning and information era. At this point the answers of the questions: ‘How do young people use internet and how much do they use internet for their education?’ come into prominence. In order to find the answers; a questionnaire prepared by resarchers and Young Internet Addiction Test- Short Form (YIAT-SF was used on ‘Health Services Vocational High School’ students, in this study. 3.4 % of students were found to have internet addiction and the average internet usage was found to be 5 hours daily. When students were asked to enumerate the internet sites they use, the result was: social media, news sites, movie and series sites, educational and informational content sites, play sites, e-mail, shopping sites, and sexual content sites in order of usage preferance. While social media was preferred by 79.4% in the first place, educational content sites were determined to be preferred by 5.7% in the first place among others. The second most frequently used sites by students were movies and series (22.8%. Educational / informational content (20.2 % sites were the fifth preferred sites in the preference order.

  1. BRANDING AND IDENTITY BUILDING FOR A SMALL COMPANY : Focused on Visual Identity

    OpenAIRE

    Näveri, Mattea

    2015-01-01

    The topic of this thesis is branding and identity of a small business, with a focus on visual identity. The major part of this thesis focuses on the research done on visual identity and the basic ideation of branding. The other half specifically focuses on the visual identity, the creation of a logo for the company, defining typography and colour and ephemera, and particularly, the company’s business card. The main goal was to execute a unique, individualized branding, which showcases...

  2. The Usage of ROOT in the LHCb Online System

    CERN Document Server

    Frank, M

    2013-01-01

    The online system in the LHCb experiment uses ROOT in various areas. ROOT is used in all processes participating in event data processing. The degree of usage varies quite significantly - from the very rudimentary usage of the ROOT plugin mechanism to fully equipped applications filling histograms with data describing online the detector status for monitoring purposes and the display of these data. An increasing number of processes uses the python binding offered by PyROOT to configure these processes. PyROOT also allows to efficiently and quickly manipulate certain corners of the experiment controls system where necessary. Beside these areas, where the LHCb online team advocated the usage of ROOT, in other areas other technologies were chosen. These deliberate choices like e.g. in the area of persistency of event data from particle collisions will be discussed.

  3. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  4. R.W. Burchfield. The New Fowler's Modern English Usage. 3rd ...

    African Journals Online (AJOL)

    R.W. Burchfield's revision (1996) of H.W. Fowler's Modern English Usage is an ... Usage problems arise, of course, in all the three main fields of language study: ... abiding work cannot be done by a man weak in phonetics and neglectful.

  5. Media identities and media-influenced indentifications Visibility and identity recognition in the media

    Directory of Open Access Journals (Sweden)

    Víctor Fco. Sampedro Blanco

    2004-10-01

    Full Text Available The media establish, in large part, the patterns of visibility and public recognition of collective identities. We define media identities as those that are the object of production and diffusion by the media. From this discourse, the communities and individuals elaborate media-influenced identifications; that is, processes of recognition or banishment; (rearticulating the identity markers that the media offer with other cognitive and emotional sources. The generation and appropriation of the identities are subjected to a media hierarchisation that influences their normalisation or marginalisation. The identities presented by the media and assumed by the audience as part of the official, hegemonic discourse are normalised, whereas the identities and identifications formulated in popular and minority terms are marginalised. After presenting this conceptual and analytical framework, this study attempts to outline the logics that condition the presentation, on the one hand, andthe public recognition, on the other hand, of contemporary identities.

  6. Résultats "Développer les usages des logiciels collaboratifs"

    NARCIS (Netherlands)

    Ologeanu-Taddei, R.; Pascal, A.; Tchobanian, R.; Fallery, B.; Bondarouk, Tatiana; Ruel, Hubertus Johannes Maria; Jongejan, J.; Oiry, E.

    2013-01-01

    Dans la présentation de ces résultats, nous allons tout d’abord souligner que, bien que nous ayons fait le choix d’analyser un outil unique — LiveLink — afin de pouvoir comparer les usages identifiés dans nos différents cas, nous nous sommes retrouvés face à une très grande hétérogénéité des usages.

  7. Selective forces and mutational biases drive stop codon usage in the human genome: a comparison with sense codon usage.

    Science.gov (United States)

    Trotta, Edoardo

    2016-05-17

    The three stop codons UAA, UAG, and UGA signal the termination of mRNA translation. As a result of a mechanism that is not adequately understood, they are normally used with unequal frequencies. In this work, we showed that selective forces and mutational biases drive stop codon usage in the human genome. We found that, in respect to sense codons, stop codon usage was affected by stronger selective forces but was less influenced by neutral mutational biases. UGA is the most frequent termination codon in human genome. However, UAA was the preferred stop codon in genes with high breadth of expression, high level of expression, AT-rich coding sequences, housekeeping functions, and in gene ontology categories with the largest deviation from expected stop codon usage. Selective forces associated with the breadth and the level of expression favoured AT-rich sequences in the mRNA region including the stop site and its proximal 3'-UTR, but acted with scarce effects on sense codons, generating two regions, upstream and downstream of the stop codon, with strongly different base composition. By favouring low levels of GC-content, selection promoted labile local secondary structures at the stop site and its proximal 3'-UTR. The compositional and structural context favoured by selection was surprisingly emphasized in the class of ribosomal proteins and was consistent with sequence elements that increase the efficiency of translational termination. Stop codons were also heterogeneously distributed among chromosomes by a mechanism that was strongly correlated with the GC-content of coding sequences. In human genome, the nucleotide composition and the thermodynamic stability of stop codon site and its proximal 3'-UTR are correlated with the GC-content of coding sequences and with the breadth and the level of gene expression. In highly expressed genes stop codon usage is compositionally and structurally consistent with highly efficient translation termination signals.

  8. Analysis of transcriptome data reveals multifactor constraint on codon usage in Taenia multiceps.

    Science.gov (United States)

    Huang, Xing; Xu, Jing; Chen, Lin; Wang, Yu; Gu, Xiaobin; Peng, Xuerong; Yang, Guangyou

    2017-04-20

    Codon usage bias (CUB) is an important evolutionary feature in genomes that has been widely observed in many organisms. However, the synonymous codon usage pattern in the genome of T. multiceps remains to be clarified. In this study, we analyzed the codon usage of T. multiceps based on the transcriptome data to reveal the constraint factors and to gain an improved understanding of the mechanisms that shape synonymous CUB. Analysis of a total of 8,620 annotated mRNA sequences from T. multiceps indicated only a weak codon bias, with mean GC and GC3 content values of 49.29% and 51.43%, respectively. Our analysis indicated that nucleotide composition, mutational pressure, natural selection, gene expression level, amino acids with grand average of hydropathicity (GRAVY) and aromaticity (Aromo) and the effective selection of amino-acids all contributed to the codon usage in T. multiceps. Among these factors, natural selection was implicated as the major factor affecting the codon usage variation in T. multiceps. The codon usage of ribosome genes was affected mainly by mutations, while the essential genes were affected mainly by selection. In addition, 21codons were identified as "optimal codons". Overall, the optimal codons were GC-rich (GC:AU, 41:22), and ended with G or C (except CGU). Furthermore, different degrees of variation in codon usage were found between T. multiceps and Escherichia coli, yeast, Homo sapiens. However, little difference was found between T. multiceps and Taenia pisiformis. In this study, the codon usage pattern of T. multiceps was analyzed systematically and factors affected CUB were also identified. This is the first study of codon biology in T. multiceps. Understanding the codon usage pattern in T. multiceps can be helpful for the discovery of new genes, molecular genetic engineering and evolutionary studies.

  9. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.

    Science.gov (United States)

    Scherrer, Kristin S

    2008-10-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.

  10. Manufacturer Usage Description Specification Implementation

    OpenAIRE

    Srinivasan, Kaushik

    2017-01-01

    Manufacturer Usage Description Specification (MUDS) is aframework under RFC development that aims to automate Internet access control rules for IoT devices . These access controls prevent malicious IoT devices from attacking other devices and also protect the IoT devices from being attacked by other devices.We are implementing this framework and trying to improve its security.

  11. The Usage of Biogas in Fuel Cell Systems; Utilizacion de Biogas en Pilas de Combustible

    Energy Technology Data Exchange (ETDEWEB)

    Perez Martinez, M; Cuesta Santianes, M J; Nunez Crespi, S; Cabrera Jimenez, J A

    2008-08-06

    The usage of biogas in fuel cell systems is nowadays considered as a promising alternative for energy production worldwide as it involves the use of a valuable residual biomass resource that could enable the obtention of combined heat, cold and power generation very efficiently, while additionally avoiding greenhouse gas emissions to the atmosphere. Both development lines (biogas and fuel cells) and their associated technologies are receiving a great support from the different states, pioneer countries being Japan and U.S.A. The objective of this study is to make a detail analysis of the state of the art of biogas-powered fuel cell systems worldwide. Most representative players in the field are identified through the search of the scientific publications, projects and patent documents in which they are involved. (Author) 18 refs.

  12. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  13. Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students

    Science.gov (United States)

    Sanchez, Delida

    2013-01-01

    This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…

  14. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  15. Risk Assessment Generated by Usage of ICT and Information Security Measures

    Directory of Open Access Journals (Sweden)

    Ilie TAMAS

    2006-01-01

    Full Text Available Information societies involve the usage of information technology and communications (ITC on a large scale. The dependence on ITC is an unquestionable problem in the present, because we assist to a generality of computers usage in all economic and social life activities. That is why organization information systems became accessible at the global level and there are permanently open for a quick exchange of information between different categories of users located by different geographical nods. The ITC usage involves the existing of some risks that should be known, evaluation and based on these, we must have information systems security measure. We consider that the risk is an indicator very important that must be permanently assess in the usage process of the information system based on ITC. Risk management suppose a permanently evaluation of these problems and also restrain by some practical actions who goes to the decrease of its effects. From the expose point of view, in this paper work it is presented the results of research based on specialty literature and current cases from practical activities, regarding the risks of ITC usage and their diminishing measure. There are distinguished the main factors (threat, vulnerability and impact who affect the information risk and on the other way, diminishing measure of the action to these factors for optimum working of an economic and social organism who use ITC. We consider that through proposed measures we assume safety in design process, implement and usage of the informational systems based on ITC.

  16. How smartphone usage correlates with social anxiety and loneliness

    Directory of Open Access Journals (Sweden)

    Yusong Gao

    2016-07-01

    Full Text Available Introduction: Early detection of social anxiety and loneliness might be useful to prevent substantial impairment in personal relationships. Understanding the way people use smartphones can be beneficial for implementing an early detection of social anxiety and loneliness. This paper examines different types of smartphone usage and their relationships with people with different individual levels of social anxiety or loneliness. Methods: A total of 127 Android smartphone volunteers participated in this study, all of which have agreed to install an application (MobileSens on their smartphones, which can record user’s smartphone usage behaviors and upload the data into the server. They were instructed to complete an online survey, including the Interaction Anxiousness Scale (IAS and the University of California Los Angeles Loneliness Scale (UCLA-LS. We then separated participants into three groups (high, middle and low based on their scores of IAS and UCLA-LS, respectively. Finally, we acquired digital records of smartphone usage from MobileSens and examined the differences in 105 types of smartphone usage behaviors between high-score and low-score group of IAS/UCLA-LS. Results: Individuals with different scores on social anxiety or loneliness might use smartphones in different ways. For social anxiety, compared with users in low-score group, users in high-score group had less number of phone calls (incoming and outgoing (Mann-Whitney U = 282.50∼409.00, p U = 388.50, p < 0.01. Discussion: The results show that individuals with social anxiety or loneliness receive less incoming calls and use healthy applications more frequently, but they do not show differences in outgoing-call-related features. Individuals with higher levels of social anxiety also receive less SMSs and use camera apps less frequently, while lonely individuals tend to use system, beautify, browser and social media (RenRen apps more frequently. Conclusion: This paper finds that

  17. How smartphone usage correlates with social anxiety and loneliness.

    Science.gov (United States)

    Gao, Yusong; Li, Ang; Zhu, Tingshao; Liu, Xiaoqian; Liu, Xingyun

    2016-01-01

    Early detection of social anxiety and loneliness might be useful to prevent substantial impairment in personal relationships. Understanding the way people use smartphones can be beneficial for implementing an early detection of social anxiety and loneliness. This paper examines different types of smartphone usage and their relationships with people with different individual levels of social anxiety or loneliness. A total of 127 Android smartphone volunteers participated in this study, all of which have agreed to install an application (MobileSens) on their smartphones, which can record user's smartphone usage behaviors and upload the data into the server. They were instructed to complete an online survey, including the Interaction Anxiousness Scale (IAS) and the University of California Los Angeles Loneliness Scale (UCLA-LS). We then separated participants into three groups (high, middle and low) based on their scores of IAS and UCLA-LS, respectively. Finally, we acquired digital records of smartphone usage from MobileSens and examined the differences in 105 types of smartphone usage behaviors between high-score and low-score group of IAS/UCLA-LS. Individuals with different scores on social anxiety or loneliness might use smartphones in different ways. For social anxiety, compared with users in low-score group, users in high-score group had less number of phone calls (incoming and outgoing) (Mann-Whitney U = 282.50∼409.00, p social media (RenRen) (Mann-Whitney >U = 388.50, p social anxiety or loneliness receive less incoming calls and use healthy applications more frequently, but they do not show differences in outgoing-call-related features. Individuals with higher levels of social anxiety also receive less SMSs and use camera apps less frequently, while lonely individuals tend to use system, beautify, browser and social media (RenRen) apps more frequently. This paper finds that there exists certain correlation among smartphone usage and social anxiety and

  18. How smartphone usage correlates with social anxiety and loneliness

    Science.gov (United States)

    Liu, Xiaoqian; Liu, Xingyun

    2016-01-01

    Introduction: Early detection of social anxiety and loneliness might be useful to prevent substantial impairment in personal relationships. Understanding the way people use smartphones can be beneficial for implementing an early detection of social anxiety and loneliness. This paper examines different types of smartphone usage and their relationships with people with different individual levels of social anxiety or loneliness. Methods: A total of 127 Android smartphone volunteers participated in this study, all of which have agreed to install an application (MobileSens) on their smartphones, which can record user’s smartphone usage behaviors and upload the data into the server. They were instructed to complete an online survey, including the Interaction Anxiousness Scale (IAS) and the University of California Los Angeles Loneliness Scale (UCLA-LS). We then separated participants into three groups (high, middle and low) based on their scores of IAS and UCLA-LS, respectively. Finally, we acquired digital records of smartphone usage from MobileSens and examined the differences in 105 types of smartphone usage behaviors between high-score and low-score group of IAS/UCLA-LS. Results: Individuals with different scores on social anxiety or loneliness might use smartphones in different ways. For social anxiety, compared with users in low-score group, users in high-score group had less number of phone calls (incoming and outgoing) (Mann-Whitney U = 282.50∼409.00, p U = 388.50, p < 0.01). Discussion: The results show that individuals with social anxiety or loneliness receive less incoming calls and use healthy applications more frequently, but they do not show differences in outgoing-call-related features. Individuals with higher levels of social anxiety also receive less SMSs and use camera apps less frequently, while lonely individuals tend to use system, beautify, browser and social media (RenRen) apps more frequently. Conclusion: This paper finds that there exists

  19. Internet Usage and Academic Performance of Undergraduate ...

    African Journals Online (AJOL)

    Internet Usage and Academic Performance of Undergraduate Students in University of Ilorin, Nigeria. ... PROMOTING ACCESS TO AFRICAN RESEARCH. AFRICAN JOURNALS ... This study adopted descriptive survey method. Six faculties ...

  20. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  1. Linguistic Identity Positioning in Facebook Posts During Second Language Study Abroad: One Teen’s Language Use, Experience, and Awareness

    Directory of Open Access Journals (Sweden)

    Roswita Dressler

    2016-12-01

    Full Text Available Abstract Teens who post on the popular social networking site Facebook in their home environment often continue to do so on second language study abroad sojourns. These sojourners use Facebook to document and make sense of their experiences in the host culture and position themselves with respect to language(s and culture(s. This study examined one teen’s identity positioning through her Facebook posts from two separate study abroad experiences in Germany. Data sources included her Facebook posts from both sojourns and a written reflection completed upon return from the second sojourn. Findings revealed that this teen used Facebook posts to position herself as a German-English bilingual and a member of an imagined community of German-English bilinguals by making a choice on which language(s to use, reporting her linguistic successes and challenges, and indicating growing language awareness. This study addresses the call by study abroad researchers (Coleman, 2013; Kinginger, 2009, 2013; Mitchell, Tracy-Ventura, & McManus, 2015 to investigate the effects of social media, such as Facebook, as part of the contemporary culture of study abroad, and sheds light on the role it plays, especially regarding second language identity positioning. Résumé Les adolescents qui affichent sur le site social Facebook dans leur environnement familial continuent à le faire pendant leur séjour à l'étranger. Ces adolescents utilisent Facebook pour documenter et réfléchir sur leurs expériences dans le pays hôte et pour se positionner par rapport à leur langue et à leur culture ou aux langues et aux cultures. Cette étude a examiné le positionnement d'une adolescente par rapport à son identité à travers des messages Facebook lors de deux séjours différents en Allemagne. Les données de ces expériences incluent des messages Facebook provenant des deux séjours et une réflexion écrite complétée à son retour du deuxième séjour. Les résultats ont

  2. Korean Adoptee Identity: Adoptive and Ethnic Identity Profiles of Adopted Korean Americans

    Science.gov (United States)

    Beaupre, Adam J.; Reichwald, Reed; Zhou, Xiang; Raleigh, Elizabeth; Lee, Richard M.

    2015-01-01

    Adopted Korean adolescents face the task of grappling with their identity as Koreans and coming to terms with their adoptive status. In order to explore these dual identities, the authors conducted a person-centered study of the identity profiles of 189 adopted Korean American adolescents. Using cluster analytic procedures, the study examined…

  3. Characterizing the Development and Usage of Diagrams in Embedded Software Systems

    NARCIS (Netherlands)

    Akdur, Deniz; Demirörs, Onur; Garousi, V.

    2017-01-01

    To cope with growing complexity of embedded software, modeling has become popular. The usage of models in embedded software industry and the relevant practices usually vary since the purposes of diagram development and usage differ. Since a large variety of software modeling practices used in

  4. Strategic toolkits: seniority, usage and performance in the German SME machinery and equipment sector

    OpenAIRE

    Wagner, R.; Paton, R.A.

    2014-01-01

    This paper examines the strategic tool kit, from a human resource management (HRM) perspective, in terms of usage and impact. Research to date has tended to consider usage, assuming to a certain extent that knowledge and understanding of particular tools suggest that practitioners value them. The research on which this paper is based builds upon the idea that usage indicates satisfaction, but develops the usage theme to investigate which decision-makers are actually engaged in both tool appli...

  5. Fatigue - determination of a more realistic usage factor

    International Nuclear Information System (INIS)

    Lang, H.

    2001-01-01

    The ability to use a suitable counting method for determining the stress range spectrum in elastic and simplified elastic-plastic fatigue analyses is of crucial importance for enabling determination of a realistic usage factor. Determination of elastic-plastic strain range using the K e factor from fictitious elastically calculated loads is also important in the event of elastic behaviour being exceeded. This paper thus examines both points in detail. A fatigue module with additional options, which functions on this basis is presented. The much more realistic determination of usage factor presented here offers various economic benefits depending on the application

  6. Regional Commonalities and Regional Identities: Forging a Normative Understanding of Southeast Asian Identity

    Directory of Open Access Journals (Sweden)

    Gürol Baba

    2016-01-01

    Full Text Available In the last two decades, most of the IR academia’s attention on Southeast Asian regionalism utilised constructivism and/or realism and has focused on ASEAN and its derivatives. This article aims to skew this angle by elaborating a possible relationship between Asian values and a normative understanding of Southeast Asian identity. The major reason for this article’s focus on a normative interpretation is that a practical application of Southeast Asian identity is not very achievable due to various ethnic, cultural, political, territorial, and historical diversities. While the region is diverse, there are also a number of commonalities among its states. Asian values, from a Confucian perspective, account for some of these commonalities. By using constructivists’ claims on both the links between norms and identity and the dynamic interaction between values and norms, this article argues that Asian values could contribute to the development of Amitav Acharya’s widely cited normative/ideational format of Southeast Asian identity. The article takes ASEAN identity as a case study and aims to show why a normative identity is more achievable than a practical identity among Southeast Asians, and how Asian values might contribute to the creation of this shared identity.

  7. The molecular mechanisms of sexual orientation and gender identity.

    Science.gov (United States)

    Fisher, Alessandra D; Ristori, Jiska; Morelli, Girolamo; Maggi, Mario

    2018-05-15

    Differences between males and females are widely represented in nature. There are gender differences in phenotypes, personality traits, behaviors and interests, cognitive performance, and proneness to specific diseases. The most marked difference in humans is represented by sexual orientation and core gender identity, the origins of which are still controversial and far from being understood. Debates continue on whether sexual behavior and gender identity are a result of biological (nature) or cultural (nurture) factors, with biology possibly playing a major role. The main goal of this review is to summarize the studies available to date on the biological factors involved in the development of both sexual orientation and gender identity. A systematic search of published evidence was performed using Medline (from January 1948 to June 2017). Review of the relevant literature was based on authors' expertise. Indeed, different studies have documented the possible role and interaction of neuroanatomic, hormonal and genetic factors. The sexual dimorphic brain is considered the anatomical substrate of psychosexual development, on which genes and gonadal hormones may have a shaping effect. In particular, growing evidence shows that prenatal and pubertal sex hormones permanently affect human behavior. In addition, heritability studies have demonstrated a role of genetic components. However, a convincing candidate gene has not been identified. Future studies (e.i. genome wide studies) are needed to better clarify the complex interaction between genes, anatomy and hormonal influences on psychosexual development. Copyright © 2017. Published by Elsevier B.V.

  8. Analysis of amino acid and codon usage in Paramecium bursaria.

    Science.gov (United States)

    Dohra, Hideo; Fujishima, Masahiro; Suzuki, Haruo

    2015-10-07

    The ciliate Paramecium bursaria harbors the green-alga Chlorella symbionts. We reassembled the P. bursaria transcriptome to minimize falsely fused transcripts, and investigated amino acid and codon usage using the transcriptome data. Surface proteins preferentially use smaller amino acid residues like cysteine. Unusual synonymous codon and amino acid usage in highly expressed genes can reflect a balance between translational selection and other factors. A correlation of gene expression level with synonymous codon or amino acid usage is emphasized in genes down-regulated in symbiont-bearing cells compared to symbiont-free cells. Our results imply that the selection is associated with P. bursaria-Chlorella symbiosis. Copyright © 2015 Federation of European Biochemical Societies. Published by Elsevier B.V. All rights reserved.

  9. Exclusive language: The tool to empower and create identity

    Directory of Open Access Journals (Sweden)

    Ananda Geyser-Fouche

    2016-03-01

    Full Text Available This article used some postmodern literary theories of philosophers such as Jean-Fran�ois Lyotard, Michel Foucault, Jacques Derrida and Julia Kristeva to scrutinise a selection of texts from the post-exilic period with regard to the exclusive language employed in these texts. Lyotard�s insights relate to and complement Foucault�s concept of �counter-memory�. Foucault also focuses on the network of discursive powers that operate behind texts and reproduce them, arguing that it is important to have a look from behind so as to see which voices were silenced by the specific powers behind texts. The author briefly looked at different post-exilic texts within identity-finding contexts, focusing especially on Chronicles and a few Qumran texts, to examine the way in which they used language to create identity and to empower the community in their different contexts. It is generally accepted that both the author(s of 1 & 2 Chronicles and the Qumran community used texts selectively, with their own nuances, omissions and additions. This study scrutinised the way the author(s of Chronicles and the Qumran community used documents selectively, focusing on the way in which they used exclusive language. It is clear that all communities used such language in certain circumstances to strengthen a certain group�s identity, to empower them and to legitimise this group�s conduct, behaviour and claims � and thereby exclude other groups.Intradisciplinary and/or interdisciplinary implications: Based on postmodern literary theories, this article compares the exclusive language used in Chronicles and in the texts of the Qumran community, pointing to the practice of creating identity and empowering through discourse. In conclusion, the article reflects on what is necessary in a South African context, post-1994, to be a truly democratic country.Keywords: Exclusive language; inclusive; Jean-Fran�ois Lyotard, Michel Foucault, Pierre Bourdieu; Derrida

  10. Social Web Identity Established upon Trust and Reputations

    Directory of Open Access Journals (Sweden)

    Rajni Goel

    2014-11-01

    Full Text Available Online social networks have become a seamless and critical online communication platform for personal interactions. They are a powerful tool that businesses are using to expand among domestic markets. The increase in participation in online social networking can and has caused damage to individuals and organizations, and the issuance of trust has become a concern on the social web. The factors determining the reputation of persons (customers in the real world may relate to the factors of reputation on the social web, though relative to how trust is established in the physical world, establishing trust on the social web can be fairly difficult. Determining how to trust another individual’s online social profile becomes critical in initiating any interaction on the social web. Rather than focusing on content on the social network page, this research proposes and examines the application of user reputations to determine whether the trust should be issued on the social web. A top-level framework to establish trust in an identity on the Social Network Sites (SNS as a function of the users’ associations, usage patterns and reputation on the social web is presented.

  11. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  12. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Science.gov (United States)

    Huntjens, Rafaële J C; Verschuere, Bruno; McNally, Richard J

    2012-01-01

    A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  13. Smartphone usage in the 21st century: who is active on WhatsApp?

    Science.gov (United States)

    Montag, Christian; Błaszkiewicz, Konrad; Sariyska, Rayna; Lachmann, Bernd; Andone, Ionut; Trendafilov, Boris; Eibes, Mark; Markowetz, Alexander

    2015-08-04

    Mounting evidence shows that smartphone usage heavily disrupts our work life and social activities. Moreover, it is possible that overuse could resemble addictive tendencies. A key contributing factor to smartphone overuse seems to be usage of the messaging application WhatsApp. Although WhatsApp is one of the most commonly used communication applications on smartphones, research in this area is scarce. Given the huge societal debate on the impact of smartphone usage on our daily lives, the present study undertook a large-scale investigation in order to provide numbers on smartphone usage generally-and use of WhatsApp in particular, with the aim of providing a basis for a scientific debate. In a large sample of N = 2,418 users, we recorded WhatsApp behaviour over a 4 week period. Our data show that use of WhatsApp accounted for 19.83% (= 32.11 min) of all smartphone behaviour (compare: Facebook only 9.38% = 15.19 min). The mean of general daily smartphone usage was 161.95 min. Females used WhatsApp for significantly longer periods of time than males and younger age was associated with longer duration of WhatsApp use. While the personality trait Extraversion was positively associated with daily WhatsApp use, Conscientiousness showed an inverse correlation with the length of daily WhatsApp use. The numbers on smartphone usage in the present study show that the smartphone dominates our daily life. In particular WhatsApp is a driving force, here. Given the length of daily smartphone and WhatsApp usage, more studies need to be conducted to better understand smartphone usage.

  14. Gene expression, nucleotide composition and codon usage bias of genes associated with human Y chromosome.

    Science.gov (United States)

    Choudhury, Monisha Nath; Uddin, Arif; Chakraborty, Supriyo

    2017-06-01

    Analysis of codon usage pattern is important to understand the genetic and evolutionary characteristics of genomes. We have used bioinformatic approaches to analyze the codon usage bias (CUB) of the genes located in human Y chromosome. Codon bias index (CBI) indicated that the overall extent of codon usage bias was low. The relative synonymous codon usage (RSCU) analysis suggested that approximately half of the codons out of 59 synonymous codons were most frequently used, and possessed a T or G at the third codon position. The codon usage pattern was different in different genes as revealed from correspondence analysis (COA). A significant correlation between effective number of codons (ENC) and various GC contents suggests that both mutation pressure and natural selection affect the codon usage pattern of genes located in human Y chromosome. In addition, Y-linked genes have significant difference in GC contents at the second and third codon positions, expression level, and codon usage pattern of some codons like the SPANX genes in X chromosome.

  15. Anabolic steroid usage in athletics: facts, fiction, and public relations.

    Science.gov (United States)

    Berning, Joseph M; Adams, Kent J; Stamford, Bryant A

    2004-11-01

    Anecdotal evidence suggests the widespread usage of anabolic steroids among athletes (20-90%), particularly at the professional and elite amateur levels. In contrast, scientific studies indicate that usage is rare and no higher than 6%. Conclusions from scientific studies suggest that anabolic steroid usage declines progressively from high school to college and beyond; however, anecdotal evidence claims the opposite trend. In this clash between "hard" scientific data vs. "soft" anecdotal information, it is natural that professionals would gravitate toward scientifically based conclusions. However, in the case of anabolic steroids (a stigmatized and illegal substance), should word-of-mouth testimony from individuals closest to the issues--those who have participated in and coached sports, those who have served as drug-testing overseers, and journalists who relentlessly track leads and verify sources--be set aside as irrelevant? Not if a complete picture is to emerge. In this review, hard scientific evidence is placed on the table side-by-side with soft anecdotal evidence, without weighting or bias. The purpose is to allow the opportunity for each to illuminate the other and, in so doing, potentially bring us a step closer to determining the true extent of anabolic steroid usage in athletics.

  16. Collective Endeavors to Address Institutional Contradiction between Gender Identity and Occupational Identity

    DEFF Research Database (Denmark)

    Villeseche, Florence

    or leaders and their social identity as women. Accordingly, I here seek to answer the following question: what dilemmas arise from the collective institutional work performed by actors facing institutional contradiction between their occupational and gender identity, and how are those dilemmas addressed? I......Women’s presence in the labor market is one of the major institutional changes of the past century. However, in particular at higher hierarchical levels, gender equality still remains a distant objective. The ideal-type of the worker, manager or leader is this largely a masculine one, thus...... associating the related occupational identity to a masculine gender social identity. Thus, it can be argued that women in organizations can face an “institutional contradiction” between their occupation and their gender – i.e a perceived discordancy between their social occupational identity as managers...

  17. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  18. Post-colonial identity in Greenland?

    DEFF Research Database (Denmark)

    Gad, Ulrik Pram

    2009-01-01

    could be furthered by bringing politics back in. Based on a discourse analysis of the Greenlandic debate on language, this paper makes three claims: First, the identity projects promoted in Greenland are based on an essentialist conception of identity. Secondly, Greenlandic identity discourse combines......In the gradual unravelling of Greenland’s colonial relationship to Denmark, an essentialist conceptualization of Greenlandic identity has played a significant role. However, both our scholarly understanding of post-colonial Greenlandic identity and the process towards independence for Greenland...... elements of traditional Inuit culture and elements of colonial modernity. Thirdly, monolingual Greenlanders are those with the most to gain from abandoning the dichotomy of essentialist identities. Strategically, the paper suggests a post-post-colonial Greenlandic identity as a means of avoiding...

  19. Dissociative identity disorder and schizophrenia: differential diagnosis and theoretical issues.

    Science.gov (United States)

    Foote, Brad; Park, Jane

    2008-06-01

    Schizophrenia and dissociative identity disorder (DID) are typically thought of as unrelated syndromes--a genetically based psychotic disorder versus a trauma-based dissociative disorder--and are categorized as such by the DSM-IV. However, substantial data exist to document the elevated occurrence of psychotic symptoms in DID; awareness of these features is necessary to prevent diagnostic confusion. Recent research has also pointed out that schizophrenia and DID overlap not only in psychotic symptoms but also in terms of traumatic antecedents, leading to a number of suggestions for revision of our clinical, theoretical, and nosologic understanding of the relationship between these two disorders.

  20. College Student Credit Card Usage and Debt.

    Science.gov (United States)

    Rybka, Kathryn M.

    2001-01-01

    Provides an overview of the concerns related to credit card usage by college students. Offers information student affairs professionals can use to help college students make responsible choices. (Contains 26 references.) (GCP)

  1. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  2. Psychodermatologic Effects of Atopic Dermatitis and Acne: A Review on Self-Esteem and Identity.

    Science.gov (United States)

    Nguyen, Catherine M; Koo, John; Cordoro, Kelly M

    2016-01-01

    Atopic dermatitis (AD) and acne vulgaris are among the most-prevalent skin diseases in children. Both have been well documented in the literature to have significant negative effects on quality of life. Herein, we discuss the results of a comprehensive literature review aimed at assessing the impact of acne and AD on self-esteem and identity. We highlight clinical tools for their assessment and offer coping strategies for patients and families. Multiple factors including relationships with parents and classmates, sports participation, and the sex of the patient contribute to the development of self-esteem and identity in individuals with AD and acne. Atopic dermatitis was found to have significant behavioral effects on children, ultimately resulting in a lack of opportunity to develop proper coping. AD had a more-prominent role in identity formation and gender roles in girls. Acne vulgaris was found to have a more direct effect on self-esteem, self-confidence and identity, especially in girls. The Cutaneous Body Image Scale is reviewed and offered as an easy and reliable tool to evaluate a patient's mental perception of the appearance of their skin. Coping strategies that may be offered to patients and families include empowerment and cognitive adaptation. © 2016 Wiley Periodicals, Inc.

  3. Informing Evidence Based Decisions: Usage Statistics for Online Journal Databases

    Directory of Open Access Journals (Sweden)

    Alexei Botchkarev

    2017-06-01

    Full Text Available Abstract Objective – The primary objective was to examine online journal database usage statistics for a provincial ministry of health in the context of evidence based decision-making. In addition, the study highlights implementation of the Journal Access Centre (JAC that is housed and powered by the Ontario Ministry of Health and Long-Term Care (MOHLTC to inform health systems policy-making. Methods – This was a prospective case study using descriptive analysis of the JAC usage statistics of journal articles from January 2009 to September 2013. Results – JAC enables ministry employees to access approximately 12,000 journals with full-text articles. JAC usage statistics for the 2011-2012 calendar years demonstrate a steady level of activity in terms of searches, with monthly averages of 5,129. In 2009-2013, a total of 4,759 journal titles were accessed including 1,675 journals with full-text. Usage statistics demonstrate that the actual consumption was over 12,790 full-text downloaded articles or approximately 2,700 articles annually. Conclusion – JAC’s steady level of activities, revealed by the study, reflects continuous demand for JAC services and products. It testifies that access to online journal databases has become part of routine government knowledge management processes. MOHLTC’s broad area of responsibilities with dynamically changing priorities translates into the diverse information needs of its employees and a large set of required journals. Usage statistics indicate that MOHLTC information needs cannot be mapped to a reasonably compact set of “core” journals with a subsequent subscription to those.

  4. E-book usage amongst academic librarians in South Africa

    Directory of Open Access Journals (Sweden)

    Sandy Zinn

    2011-01-01

    Full Text Available The purpose of this study completed in 2010 was to investigate the use of e-books amongst academic librarians; in particular which e-books are available to academic librarians, why they choose this format, what impact e-books have on librarians’ professional practice and what the usage patterns of e-books are amongst academic librarians. A web-based questionnaire was distributed on the LIASA mailing list. The results reflect a more gradual trend towards e-book adoption. There is still a preference for print or a “bit of both” – print and electronic. This is because of the high costs of e-books using the subscription model as the predominant e-book acquisition model and the lack of sufficient e-books in all subject fields. E-books are used for “browsing for information” and are selected for functionalities such as having the ability to search the document, anytime access and automatic citation. Major problems identified with e-books are: the cost of the equipment to read e-book formats; the cost of the e-books, especially if the subscription purchasing model is used; the lack of reliability of the Internet; and the lack of training in the use of e-books.

  5. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  6. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  7. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    Science.gov (United States)

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  8. Digital Tools for Documenting and Conserving Bahrain's Built Heritage for Posterity

    Science.gov (United States)

    Mezzino, D.; Barazzetti, L.; Santana Quintero, M.; El-Habashi, A.

    2017-08-01

    the Bahrain cultural identity: the Shaikh Isa bin Ali house, Aljazzaf house and the Siyadi Majlis. These two buildings, outstanding examples of Bahrain architecture as well as tangible memory of the country history, have been documented employing several digital techniques, including: aerial and terrestrial photogrammetry, rectifying photography, total station and 3D laser scanning.

  9. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  10. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-04-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  11. Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder

    Science.gov (United States)

    Huntjens, Rafaële J. C.; Verschuere, Bruno; McNally, Richard J.

    2012-01-01

    Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Findings Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. Conclusion The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature. PMID:22815769

  12. Inter-identity autobiographical amnesia in patients with dissociative identity disorder.

    Directory of Open Access Journals (Sweden)

    Rafaële J C Huntjens

    Full Text Available BACKGROUND: A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. METHODS: Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. FINDINGS: Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. CONCLUSION: The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.

  13. Introduction of Medicinal Plants Species with the Most Traditional Usage in Alamut Region

    Science.gov (United States)

    Ahvazi, Maryam; Khalighi-Sigaroodi, Farahnaz; Charkhchiyan, Mohammad Mahdi; Mojab, Faraz; Mozaffarian, Vali-Allah; Zakeri, Hamideh

    2012-01-01

    The ethnobotany of the medicinal plants of Alamut region is important in understanding the cultures and traditions of Alamut people. This study documents 16 medicinal plant species, most commonly used by the indigenous people of Alamut region (Ghazvin Province), northwest, Iran. The botanical name, family name, vernacular name, part used, and the application of the plants have been provided in this paper. Alamut region was divided into different villages with the aid of maps. We recorded traditional knowledge and use of medicinal plants from herbal practitioners and village seniors in Alamut. The plants were gathered from different sites. The fully dried specimens were then mounted on herbarium sheets. We found 16 medicinal plants belonging to 11 families which were traditionally used in Alamut. Finally, we describe traditional usages by the native people in the Alamut region. The obtained results were compared with data on the herb’s clinical effects. A set of voucher specimens were deposited to the Institute of Medicinal Plants Herbarium (IMPH). PMID:24250441

  14. 78 FR 2394 - Release of Draft Document Related to the Review of the National Ambient Air Quality Standards for...

    Science.gov (United States)

    2013-01-11

    ... Quality Standards, External Review Draft (PA). This document was prepared as part of the current review of... ``anonymous access'' system, which means the EPA will not know your identity or contact information unless you... extent of all identifiable effects on public health or welfare which may be expected from the presence of...

  15. Exploring athletic identity in elite-level English youth football: a cross-sectional approach.

    Science.gov (United States)

    Mitchell, Tom O; Nesti, Mark; Richardson, David; Midgley, Adrian W; Eubank, Martin; Littlewood, Martin

    2014-01-01

    This study is the first empirical investigation that has explored levels of athletic identity in elite-level English professional football. The importance of understanding athletes' psychological well-being within professional sport has been well documented. This is especially important within the professional football industry, given the high attrition rate (Anderson, G., & Miller, R. M. (2011). The academy system in English professional football: Business value or following the herd? University of Liverpool, Management School Research Paper Series. Retrieved from http://www.liv.ac.uk/managementschool/research/working%20papers/wp201143.pdf ) and distinct occupational practices (Roderick, M. (2006). The work of professional football. A labour of love? London: Routledge). A total of 168 elite youth footballers from the English professional football leagues completed the Athletic Identity Measurement Scale (AIMS). Multilevel modelling was used to examine the effect of playing level, living arrangements and year of apprentice on the total AIMS score and its subscales (i.e., social identity, exclusivity and negative affectivity). Football club explained 30% of the variance in exclusivity among players (P = .022). Mean social identity was significantly higher for those players in the first year of their apprenticeship compared to the second year (P = .025). All other effects were not statistically significant (P > .05). The novel and unique findings have practical implications in the design and implementation of career support strategies with respect to social identity. This may facilitate the maintenance of motivation over a 2-year apprenticeship and positively impact on performance levels within the professional football environment.

  16. DISCOURSE, REFERENCIATION AND CONSTRUCTION OF POLITICAL IDENTITY: THE CASE OF OCCUPY WALL STREET

    Directory of Open Access Journals (Sweden)

    Thaysa Maria Braide de Moraes Cavalcante

    2016-12-01

    Full Text Available This article aims to undertake an analysis of identity construction of the Occupy Wall Street (OWS, North American movement that opposed the financial policy of capitalism and, consequently, the strong influence of the capital of the State. Thus, we aim to answer the question of how does the discursive construction of identity of this object of discourse, from the referential strategies mobilized in the text of the Statement of Autonomy, document approved by the General Assembly of movement. Our theoretical and methodological support consists of a link between the theory of discourse, the political scientist Ernesto Laclau (1990, 2011; LACLAU; MOUFFE, 2001 – especially his remarks about the relationship between discourse, antagonism and construction of political identities through an equivalence of logic –, and studies of referentiation from the perspective of authors such as Apothéloz e Reichler-Béguelin (1995, Koch (2005, 2015, Marcuschi (2007 e Ciulla e Silva (2008. Using as textual analysis category anaphoric expressions – without neglecting other elements, like some deictics, that interfere in the construction process of the discourse object in question – we attention to the fact that this construction sets the OWS as what Laclau calls empty significant whose identity is carved through the formation and expansion of a chain of equivalence, which is established from an antagonistic relationship. Finally, we discuss some issues concerning this identity construction mode in order to face the language not only as a way of materialization of social tensions but as the privileged place of social struggles brought about by these tensions.

  17. A detailed analysis of codon usage patterns and influencing factors in Zika virus.

    Science.gov (United States)

    Singh, Niraj K; Tyagi, Anuj

    2017-07-01

    Recent outbreaks of Zika virus (ZIKV) in Africa, Latin America, Europe, and Southeast Asia have resulted in serious health concerns. To understand more about evolution and transmission of ZIKV, detailed codon usage analysis was performed for all available strains. A high effective number of codons (ENC) value indicated the presence of low codon usage bias in ZIKV. The effect of mutational pressure on codon usage bias was confirmed by significant correlations between nucleotide compositions at third codon positions and ENCs. Correlation analysis between Gravy values, Aroma values and nucleotide compositions at third codon positions also indicated some influence of natural selection. However, the low codon adaptation index (CAI) value of ZIKV with reference to human and mosquito indicated poor adaptation of ZIKV codon usage towards its hosts, signifying that natural selection has a weaker influence than mutational pressure. Additionally, relative dinucleotide frequencies, geographical distribution, and evolutionary processes also influenced the codon usage pattern to some extent.

  18. Accepting or fighting unlicensed usage : Can firms reduce unlicensed usage by optimizing their timing and pricing strategies?

    NARCIS (Netherlands)

    Burmester, Alexa B.; Eggers, Felix; Clement, Michel; Prostka, Tim

    The rise of the Internet and new online services have led to the wide-scale illegal distribution of digital entertainment products, such as music, movies, games, and books. We analyze whether firms in the entertainment industry should fight unlicensed usage by providing specific offers that maximize

  19. A Survey of Bioinformatics Database and Software Usage through Mining the Literature.

    Directory of Open Access Journals (Sweden)

    Geraint Duck

    Full Text Available Computer-based resources are central to much, if not most, biological and medical research. However, while there is an ever expanding choice of bioinformatics resources to use, described within the biomedical literature, little work to date has provided an evaluation of the full range of availability or levels of usage of database and software resources. Here we use text mining to process the PubMed Central full-text corpus, identifying mentions of databases or software within the scientific literature. We provide an audit of the resources contained within the biomedical literature, and a comparison of their relative usage, both over time and between the sub-disciplines of bioinformatics, biology and medicine. We find that trends in resource usage differs between these domains. The bioinformatics literature emphasises novel resource development, while database and software usage within biology and medicine is more stable and conservative. Many resources are only mentioned in the bioinformatics literature, with a relatively small number making it out into general biology, and fewer still into the medical literature. In addition, many resources are seeing a steady decline in their usage (e.g., BLAST, SWISS-PROT, though some are instead seeing rapid growth (e.g., the GO, R. We find a striking imbalance in resource usage with the top 5% of resource names (133 names accounting for 47% of total usage, and over 70% of resources extracted being only mentioned once each. While these results highlight the dynamic and creative nature of bioinformatics research they raise questions about software reuse, choice and the sharing of bioinformatics practice. Is it acceptable that so many resources are apparently never reused? Finally, our work is a step towards automated extraction of scientific method from text. We make the dataset generated by our study available under the CC0 license here: http://dx.doi.org/10.6084/m9.figshare.1281371.

  20. Post-Russian Eurasia and the proto-Eurasian usage of the Runet in Kazakhstan: A plea for a cyberlinguistic turn in area studies

    Directory of Open Access Journals (Sweden)

    Dirk Uffelmann

    2011-07-01

    The paper discusses the role the Russian-based Runet plays for Eurasian webcommunities outside the Russian Federation, mostly relying on Kazakh material, and asks whether post-colonial anxieties about Russian cultural imperialism through the Runet are justified or not and what the Kazakh, possibly post-colonial strategies of coping with this situation are. Essential to this essay is the notion of cyberimperialism, which combines aspects of media studies with post-colonial studies. The interdisciplinary approach to Internet studies is completed by a linguistic focus on the performativity of language usage online for creating situational language identities. The essay rounds off by offering an analysis of Nursultan Nazarbaev’s ambiguous inclusive-exclusive logic of argumentation and confronting it with Russian Eurasianism.

  1. Are Students Really Connected? Predicting College Adjustment from Social Network Usage

    Science.gov (United States)

    Raacke, John; Bonds-Raacke, Jennifer

    2015-01-01

    The rapid growth in popularity of social networking sites has spurred research exploring the impact of usage in a variety of areas. The current study furthered this line of research by examining the relationships between social network usage and adjustment to college in the academic, social, personal-emotional and university affiliation domains.…

  2. 7 CFR 52.771 - Identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Identity. 52.771 Section 52.771 Agriculture... United States Standards for Grades of Canned Red Tart Pitted Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity...

  3. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  4. Identity style and coping strategies.

    Science.gov (United States)

    Berzonsky, M D

    1992-12-01

    This study examined the relationship between identity style and strategies used to cope with stressors that potentially threaten one's sense of identity. Identity style refers to differences in the way individuals construct and revise or maintain their sense of identity. An informational style involves actively seeking out, evaluating, and utilizing self-relevant information. A normative style highlights the expectations and standards of significant others. A diffuse/avoidant style is characterized by procrastination and situation-specific reactions. Late-adolescent college subjects were administered measures of identity style, ways of coping with academic stressors, and test anxiety. Within this self-as-student context, subjects with diffuse and normative identity styles employed avoidant-oriented coping strategies (wishful thinking, distancing, and tension reduction). An informational style was associated with deliberate, problem-focused coping. Findings are discussed in terms of a process model of identity development.

  5. The coming-out process of young lesbian and bisexual women: are there butch/femme differences in sexual identity development?

    Science.gov (United States)

    Rosario, Margaret; Schrimshaw, Eric W; Hunter, Joyce; Levy-Warren, Anna

    2009-02-01

    Research on lesbian and bisexual women has documented various biological and behavioral differences between butch and femme women. However, little research has examined whether differences exist in sexual identity development (i.e., the coming-out process). The present study examined longitudinally potential butch/femme differences in sexual identity formation and integration among an ethnically diverse sample of 76 self-identified lesbian and bisexual young women (ages 14-21 years). A composite measure of butch/femme identity classified 43% as butch and 51% as femme. Initial comparisons found butch/femme differences in sexual identity (i.e., nearly all butches identified as lesbian, but about half of femmes identified as bisexual), suggesting the need to examine this confound. Comparisons of lesbian butches, lesbian femmes, and bisexual femmes found that lesbian butches and femmes generally did not differ on sexual identity formation, but they differed from bisexual femmes. Lesbian butches and femmes had sexual behaviors and a cognitive sexual orientation that were more centered on women than those of bisexual femmes. With respect to sexual identity integration, lesbian butches were involved in more gay social activities, were more comfortable with others knowing about their homosexuality, and were more certain, comfortable, and accepting of their sexual identity than were bisexual femmes. Fewer differences were found between lesbian femmes and bisexual femmes or between lesbian butches and lesbian femmes. The findings suggest that sexual identity formation does not differ between butch or femme women, but differences are linked to sexual identity as lesbian or bisexual. Further, the findings that lesbian femmes sometimes differed from lesbian butches and at other times from bisexual femmes on sexual identity integration suggest that neither sexual identity nor butch/femme alone may explain sexual identity integration. Research examining the intersection between

  6. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  7. Perceived consequences of hypothetical identity-inconsistent sexual experiences: effects of perceiver's sex and sexual identity.

    Science.gov (United States)

    Preciado, Mariana A; Johnson, Kerri L

    2014-04-01

    Most people organize their sexual orientation under a single sexual identity label. However, people may have sexual experiences that are inconsistent with their categorical sexual identity label. A man might identify as heterosexual but still experience some attraction to men; a woman might identify as lesbian yet enter into a romantic relationship with a man. Identity-inconsistent experiences are likely to have consequences. In the present study, we examined lay perceptions of the consequences of identity-inconsistent sexual experiences for self-perceived sexuality and for social relationships among a sexually diverse sample (N = 283). We found that the perceived consequences of identity-inconsistent experiences for self-perception, for social stigmatization, and for social relationships varied as a function of participant sex, participant sexual identity (heterosexual, gay, lesbian), and experience type (fantasy, attraction, behavior, love). We conclude that not all identity-inconsistent sexual experiences are perceived as equally consequential and that the perceived consequences of such experiences vary predictably as a function of perceiver sex and sexual identity. We discuss the role lay perceptions of the consequences of identity-inconsistent sexual experiences may play in guiding attitudes and behavior.

  8. The change of expression configuration affects identity-dependent expression aftereffect but not identity-independent expression aftereffect

    Directory of Open Access Journals (Sweden)

    Miao eSong

    2015-12-01

    Full Text Available The present study examined the influence of expression configuration on cross-identity expression aftereffect. The expression configuration refers to the spatial arrangement of facial features in a face for conveying an emotion, e.g., an open-mouth smile versus a closed-mouth smile. In the first of two experiments, the expression aftereffect is measured using across-identity/cross-expression configuration factorial design. The facial identities of test faces were the same or different from the adaptor, while orthogonally, the expression configurations of those facial identities were also the same or different. The result shows that the change of expression configuration impaired the expression aftereffect when the facial identities of adaptor and tests were the same; however, the impairment effect disappears when facial identities were different, indicating the identity-independent expression representation is more robust to the change of the expression configuration in comparison with the identity-dependent expression representation. In the second experiment, we used schematic line faces as adaptors and real faces as tests to minimize the similarity between the adaptor and tests, which is expected to exclude the contribution from the identity-dependent expression representation to expression aftereffect. The second experiment yields a similar result as the identity-independent expression aftereffect observed in Experiment 1. The findings indicate the different neural sensitivities to expression configuration for identity-dependent and identity-independent expression systems.

  9. Use of freehand sketching: Documenting heritage buildings, Gamal Abdel Nasser Street (1830–1930, Alexandria, Egypt

    Directory of Open Access Journals (Sweden)

    Menna M. Imam

    2016-09-01

    Full Text Available Freehand sketching – as one of the methods to discover cities – plays main role to understand the image of the heritage city. It is considered as an important tool to analyze and document heritage buildings. The image produced by freehand sketching heightens awareness of these buildings. Previous studies conducted on the methods of architectural heritage documentation revealed that very little researches have been undertaken to use freehand sketching in the process of data survey and documentation. These researches break the deadlock in the textual documents and express the human experience clearly unlike other methods of documentation. Therefore, this article intends to document ten heritage buildings in the study area, Gamal Abdel Nasser street, Alexandria city, Egypt. – One of the most ancient streets in Alexandria that still maintain its old character and identity – using analytical freehand sketches, the sketches and analysis was created by the researcher. The results showed that these buildings seem homogeneous and have a common character despite their different architectural styles which means it respects each other within building regulations. Briefly, the results help to find out how freehand sketching successfully analyzes these buildings that assist the architects and planners to understand the design principles used in ancient times.

  10. Student Media Usage Patterns and Non-Traditional Learning in Higher Education

    Science.gov (United States)

    Zawacki-Richter, Olaf; Müskens, Wolfgang; Krause, Ulrike; Alturki, Uthman; Aldraiweesh, Ahmed

    2015-01-01

    A total of 2,338 students at German universities participated in a survey, which investigated media usage patterns of so-called traditional and non-traditional students (Schuetze & Wolter, 2003). The students provided information on the digital devices that they own or have access to, and on their usage of media and e-learning tools and…

  11. The Impact of College Drug Policy on Students' Drug Usage

    Science.gov (United States)

    Sawyer, Holly N.

    2012-01-01

    Illicit drug usage at Historically Black Colleges and Universities (HBCU) is a topic of limited research. The research questions that guided this study were (a) What is the relationship between college policy on illicit drugs and students' frequency of drug usage after controlling for college location (urban or rural) and students' age,…

  12. Negotiation of identities in intercultural communication

    Directory of Open Access Journals (Sweden)

    Janík Zdeněk

    2017-01-01

    Full Text Available Negotiation of identities in communication entails affirming the identities we want others to recognize in us and ascription of identities we mutually assign to each other in communication. The study of intercultural communication focuses on cultural identity as the principal identity component that defines intercultural communication. In this article, the assumption that cultural group membership factors determine the context of intercultural communication is questioned. The article examines how intercultural interlocutors negotiate their identities in various intercultural interactions. The aims of the research presented in this paper are: 1 to examine which identities - cultural, personal, or social - intercultural interlocutors activate in intercultural communication; 2 to determine whether interlocutors’ intercultural communication is largely influenced by their cultural identities; 3 and to identify situations in which they activate their cultural identities (3. The research data were collected from 263 international students studying at Masaryk University in Brno in the years 2010 - 2016. Although the research results are not conclusive, they indicate that cultural identities predominate in the students’ ethnocentric views and that stereotypes constrain the students’ cultural identities and affect the negotiation of identities in intercultural communication.

  13. Twitter Usage of Universities in Turkey

    Science.gov (United States)

    Yolcu, Ozgu

    2013-01-01

    Universities are among the users of the most popular social media networks. Usage of social media by especially students and many other people and institutions, which constitutes the target audience for universities, encourages the universities to effectively use this environment. Twitter is among these social media networks which facilitate the…

  14. A study on the impact of Facebook usage on student’s social capital and academic performance

    OpenAIRE

    Shah, Vishal; Subramanian, Sankara; Rouis, Sana; Limyaem, Moez

    2012-01-01

    Prior research has focused on the benefits of usage of social media such as Facebook in terms of the social capital gains they bring. Other research has studied the adverse impact of such usage on academic performance. In this study we try to understand both the beneficial and adverse aspects of Facebook usage in the case of U.S. undergraduate students. Basing on social capital theory and system usage in hedonic context, we tested the dual effect of the usage of Facebook on social capital and...

  15. The Selective Advantage of Synonymous Codon Usage Bias in Salmonella.

    Directory of Open Access Journals (Sweden)

    Gerrit Brandis

    2016-03-01

    Full Text Available The genetic code in mRNA is redundant, with 61 sense codons translated into 20 different amino acids. Individual amino acids are encoded by up to six different codons but within codon families some are used more frequently than others. This phenomenon is referred to as synonymous codon usage bias. The genomes of free-living unicellular organisms such as bacteria have an extreme codon usage bias and the degree of bias differs between genes within the same genome. The strong positive correlation between codon usage bias and gene expression levels in many microorganisms is attributed to selection for translational efficiency. However, this putative selective advantage has never been measured in bacteria and theoretical estimates vary widely. By systematically exchanging optimal codons for synonymous codons in the tuf genes we quantified the selective advantage of biased codon usage in highly expressed genes to be in the range 0.2-4.2 x 10-4 per codon per generation. These data quantify for the first time the potential for selection on synonymous codon choice to drive genome-wide sequence evolution in bacteria, and in particular to optimize the sequences of highly expressed genes. This quantification may have predictive applications in the design of synthetic genes and for heterologous gene expression in biotechnology.

  16. Association of Proton Pump Inhibitors Usage with Risk of Pneumonia in Dementia Patients.

    Science.gov (United States)

    Ho, Sai-Wai; Teng, Ying-Hock; Yang, Shun-Fa; Yeh, Han-Wei; Wang, Yu-Hsun; Chou, Ming-Chih; Yeh, Chao-Bin

    2017-07-01

    To determine the association between usages of proton pump inhibitors (PPIs) and subsequent risk of pneumonia in dementia patients. Retrospective cohort study. Taiwanese National Health Insurance Research Database. The study cohort consisted of 786 dementia patients with new PPI usage and 786 matched dementia patients without PPI usage. The study endpoint was defined as the occurrence of pneumonia. The Cox proportional hazard model was used to estimate the pneumonia risk. Defined daily dose methodology was applied to evaluate the cumulative and dose-response relationships of PPI. Incidence of pneumonia was higher among patients with PPI usage (adjusted hazard ratio (HR) = 1.89; 95% CI = 1.51-2.37). Cox model analysis also demonstrated that age (adjusted HR = 1.05; 95% CI = 1.03-1.06), male gender (adjusted HR = 1.57; 95% CI = 1.25-1.98), underlying cerebrovascular disease (adjusted HR = 1.30; 95% CI = 1.04-1.62), chronic pulmonary disease (adjusted HR = 1.39; 95% CI = 1.09-1.76), congestive heart failure (adjusted HR = 1.54; 95% CI = 1.11-2.13), diabetes mellitus (adjusted HR = 1.54; 95% CI = 1.22-1.95), and usage of antipsychotics (adjusted HR = 1.29; 95% CI = 1.03-1.61) were independent risk factors for pneumonia. However, usage of cholinesterase inhibitors and histamine receptor-2 antagonists were shown to decrease pneumonia risk. PPI usage in dementia patients is associated with an 89% increased risk of pneumonia. © 2017, Copyright the Authors Journal compilation © 2017, The American Geriatrics Society.

  17. Revelation of Influencing Factors in Overall Codon Usage Bias of Equine Influenza Viruses.

    Directory of Open Access Journals (Sweden)

    Naveen Kumar

    Full Text Available Equine influenza viruses (EIVs of H3N8 subtype are culprits of severe acute respiratory infections in horses, and are still responsible for significant outbreaks worldwide. Adaptability of influenza viruses to a particular host is significantly influenced by their codon usage preference, due to an absolute dependence on the host cellular machinery for their replication. In the present study, we analyzed genome-wide codon usage patterns in 92 EIV strains, including both H3N8 and H7N7 subtypes by computing several codon usage indices and applying multivariate statistical methods. Relative synonymous codon usage (RSCU analysis disclosed bias of preferred synonymous codons towards A/U-ended codons. The overall codon usage bias in EIVs was slightly lower, and mainly affected by the nucleotide compositional constraints as inferred from the RSCU and effective number of codon (ENc analysis. Our data suggested that codon usage pattern in EIVs is governed by the interplay of mutation pressure, natural selection from its hosts and undefined factors. The H7N7 subtype was found less fit to its host (horse in comparison to H3N8, by possessing higher codon bias, lower mutation pressure and much less adaptation to tRNA pool of equine cells. To the best of our knowledge, this is the first report describing the codon usage analysis of the complete genomes of EIVs. The outcome of our study is likely to enhance our understanding of factors involved in viral adaptation, evolution, and fitness towards their hosts.

  18. Revelation of Influencing Factors in Overall Codon Usage Bias of Equine Influenza Viruses

    Science.gov (United States)

    Bhatia, Sandeep; Sood, Richa; Selvaraj, Pavulraj

    2016-01-01

    Equine influenza viruses (EIVs) of H3N8 subtype are culprits of severe acute respiratory infections in horses, and are still responsible for significant outbreaks worldwide. Adaptability of influenza viruses to a particular host is significantly influenced by their codon usage preference, due to an absolute dependence on the host cellular machinery for their replication. In the present study, we analyzed genome-wide codon usage patterns in 92 EIV strains, including both H3N8 and H7N7 subtypes by computing several codon usage indices and applying multivariate statistical methods. Relative synonymous codon usage (RSCU) analysis disclosed bias of preferred synonymous codons towards A/U-ended codons. The overall codon usage bias in EIVs was slightly lower, and mainly affected by the nucleotide compositional constraints as inferred from the RSCU and effective number of codon (ENc) analysis. Our data suggested that codon usage pattern in EIVs is governed by the interplay of mutation pressure, natural selection from its hosts and undefined factors. The H7N7 subtype was found less fit to its host (horse) in comparison to H3N8, by possessing higher codon bias, lower mutation pressure and much less adaptation to tRNA pool of equine cells. To the best of our knowledge, this is the first report describing the codon usage analysis of the complete genomes of EIVs. The outcome of our study is likely to enhance our understanding of factors involved in viral adaptation, evolution, and fitness towards their hosts. PMID:27119730

  19. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  20. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  1. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  2. Veterinary antimicrobial-usage statistics based on standardized measures of dosage

    DEFF Research Database (Denmark)

    Jensen, Vibeke Frøkjær; Jacobsen, Erik; Bager, Flemming

    2004-01-01

    In human medicine, the defined daily dose is used as a technical measure of drug usage, which is independent of the variations in the potency of the active compound and the formulation of the pharmaceutical product-therefore providing a measure of the relative importance of different drugs....... A national system of animal defined daily doses (ADD) for each age-group and species has been defined in VetStat (the Danish national system monitoring veterinary therapeutic drug use). The usage is further standardized according to the number of animals in the target population, acquired from production...... data on the national level or on herd size by species and age in the Danish central husbandry register (CHR). Statistics based on standardized measures of VetStat data can be used for comparison of drug usage between different herds, veterinary practices, or geographic regions (allowing subdivision...

  3. Problems of Usage Labelling in English Lexicography*

    African Journals Online (AJOL)

    ancies in the contextual usage labelling in the dictionaries were established and are discussed. ..... Likewise, the noun vagrant meaning 'a person who has no job .... tions: Proceedings of the 36th Conference of the American Translators ...

  4. Radionuclide usage survey 1979-80

    International Nuclear Information System (INIS)

    Woods, M.J.

    1980-08-01

    Details of a survey by the Life Sciences Working Group of the International Committee for Radionuclide Metrology (ICRM) on radionuclide usage by medical physicists in 11 countries are presented. The results indicate that the radionuclide which will be of most significance in the future will be F-18, Fe-52, Ga-67, Ga-68, Kr-81m, Tc-99m, In-111, I-123, Xe-127 and Tl-201, (U.K.)

  5. Japanese Mobile Phone Usage in Sweden - Technological and Social Prerequisites

    OpenAIRE

    Fredriksson, Susanne; Hillerdal, Ida

    2010-01-01

    Japan is an advanced country when it comes to mobile phone technology. This thesis firstly investigates the mobile phone usage in Japan. Secondly it describes the prerequisites for implementation of some distinguished Japanese mobile phone functions in Sweden. This is done from a social as well as a technological aspect. The Japanese mobile phone usage is investigated on three levels; governmental, industrial and consumer. The governmental level is characterised by an ICT policy which strives...

  6. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  7. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  8. Aspiration Curettage and its Outpatient Usage

    African Journals Online (AJOL)

    Aspiration Curettage and its Outpatient Usage. D. A. G. BARFORD, M, NOTELOVITZ. SUMMARY ... its use on a number of outpatients without anaesthesia is discussed. S. Afr. Med. l., 48, 22 (1974). In order to ... plastic aspiration chamber and suction is applied centrally at the base of the chamber, a cylindrical filter within the.

  9. Mobile Device Usage in Higher Education

    Science.gov (United States)

    Delcker, Jan; Honal, Andrea; Ifenthaler, Dirk

    2016-01-01

    This paper focuses on mobile device usage of students in higher education. While more and more students embrace mobile devices in their daily life, institutions attempt to profit from those devices for educational purposes. It is therefore crucial for institutional development to identify students' needs and how mobile devices may facilitate these…

  10. Usage of Complementary and Alternative Medicine (CAM) among osteoarthritis patients attending an urban multi-specialist hospital in Lagos, Nigeria.

    Science.gov (United States)

    Obalum, D C; Ogo, C N

    2011-03-01

    Osteoarthritis (OA), a chronic degenerative disease of synovial joints is characterised by pain and stiffness. Aim of treatment is pain relief. Complementary and alternative medicine (CAM) refers to practices which are not an integral part of orthodox medicine. To determine the pattern of usage of CAM among OA patients in Nigeria. Consecutive patients with OA attending orthopaedic clinic of Havana Specialist Hospital, Lagos, Nigeria were interviewed over a 6- month period st st of 1 May to 31 October 2007 on usage of CAM. Structured and open-ended questions were used. Demographic data, duration of OA and treatment as well as compliance to orthodox medications were documented. One hundred and sixty four patients were studied.120 (73.25%) were females and 44(26.89%) were males. Respondents age range between 35-74 years. 66(40.2%) patients used CAM. 35(53.0%) had done so before presenting to the hospital. The most commonly used CAM were herbal products used by 50(75.8%) of CAM users. Among herbal product users, 74.0% used non- specific local products, 30.0% used ginger, 36.0% used garlic and 28.0% used Aloe Vera. Among CAM users, 35(53.0%) used local embrocation and massage, 10(15.2%) used spiritual methods. There was no significant difference in demographics, clinical characteristics and pain control among CAM users and non-users. Many OA patients receiving orthodox therapy also use CAM. Medical doctors need to keep a wary eye on CAM usage among patients and enquire about this health-seeking behaviour in order to educate them on possible drug interactions, adverse effects and long term complications.

  11. Will Veterans Answer Sexual Orientation and Gender Identity Questions?

    Science.gov (United States)

    Ruben, Mollie A; Blosnich, John R; Dichter, Melissa E; Luscri, Lorry; Shipherd, Jillian C

    2017-09-01

    The Veterans Health Administration does not routinely collect and document sexual orientation and gender identity (SOGI) data, despite existing health disparities among sexual and gender minority Veterans. Because of the legacy of previous Department of Defense (DoD) policies that prohibited disclosure of sexual or gender minority identities among active duty personnel, Veterans may be reluctant to respond to SOGI questions. This population-based study assesses item nonresponse to SOGI questions by Veteran status. This is a secondary analysis of data from a population-based sample of adults in 20 US states that elected to administer a SOGI module in the 2014 Behavioral Risk Factor Surveillance System survey. Prevalence of SOGI refusals and responses of "don't know" were compared for Veterans and non-Veterans. Veterans (n=22,587) and non-Veterans (n=146,475) were surveyed. Nearly all Veteran respondents (≥98%) completed the SOGI questions, with 95.4% identifying as heterosexual, 1.2% as gay or lesbian, 1.2% as bisexual, and 0.59% as transgender. A significantly lower proportion of Veterans than non-Veterans refuse to answer sexual orientation (1.5% vs. 1.9%). There was no difference between Veterans and non-Veterans in responses for gender identity. Veterans are just as likely as non-Veterans to complete SOGI items in survey research. Asking Veterans about SOGI is unlikely to yield significant nonresponse. These data suggest that future research should investigate Veterans' perspectives on being asked about SOGI in research settings and as part of routine clinical care.

  12. Identity uncertainty and commitment making across adolescence : Five-year within-person associations using daily identity reports

    NARCIS (Netherlands)

    Becht, Andrik I.; Nelemans, Stefanie A.; Branje, Susan J. T.; Vollebergh, Wilma A. M.; Koot, Hans M.; Meeus, W.H.J.

    2017-01-01

    A central assumption of identity theory is that adolescents reconsider current identity commitments and explore identity alternatives before they make new commitments in various identity domains (Erikson, 1968; Marcia, 1966). Yet, little empirical evidence is available on how commitment and

  13. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  14. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  15. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  16. Web-based Media at European Universities: Systems, Usage, and Motivation

    DEFF Research Database (Denmark)

    Godsk, Mikkel

    2009-01-01

    This paper presents the results of two surveys analyzing the usage of and the systems available for web-based media at European universities, and how the teachers can be motivated to increase their usage of such materials in their teaching practice. The surveys were carried out April-May 2009 among...... obvious. The surveys also show that many teachers are already using web-based media in their teaching practice and by addressing some of their teaching circumstances it would be possible to increase the usage even further. Based on these results the paper presents five initiatives to motivate the teachers...

  17. Genome-Wide Analysis of the Synonymous Codon Usage Patterns in Riemerella anatipestifer

    Directory of Open Access Journals (Sweden)

    Jibin Liu

    2016-08-01

    Full Text Available Riemerella anatipestifer (RA belongs to the Flavobacteriaceae family and can cause a septicemia disease in poultry. The synonymous codon usage patterns of bacteria reflect a series of evolutionary changes that enable bacteria to improve tolerance of the various environments. We detailed the codon usage patterns of RA isolates from the available 12 sequenced genomes by multiple codon and statistical analysis. Nucleotide compositions and relative synonymous codon usage (RSCU analysis revealed that A or U ending codons are predominant in RA. Neutrality analysis found no significant correlation between GC12 and GC3 (p > 0.05. Correspondence analysis and ENc-plot results showed that natural selection dominated over mutation in the codon usage bias. The tree of cluster analysis based on RSCU was concordant with dendrogram based on genomic BLAST by neighbor-joining method. By comparative analysis, about 50 highly expressed genes that were orthologs across all 12 strains were found in the top 5% of high CAI value. Based on these CAI values, we infer that RA contains a number of predicted highly expressed coding sequences, involved in transcriptional regulation and metabolism, reflecting their requirement for dealing with diverse environmental conditions. These results provide some useful information on the mechanisms that contribute to codon usage bias and evolution of RA.

  18. Dissociative Part-Dependent Resting-State Activity in Dissociative Identity Disorder: A Controlled fMRI Perfusion Study

    OpenAIRE

    Schlumpf, Yolanda R.; Reinders, Antje A. T. S.; Nijenhuis, Ellert R. S.; Luechinger, Roger; van Osch, Matthias J. P.; Jäncke, Lutz

    2014-01-01

    Background: In accordance with the Theory of Structural Dissociation of the Personality (TSDP), studies of dissociative identity disorder (DID) have documented that two prototypical dissociative subsystems of the personality, the "Emotional Part'' (EP) and the "Apparently Normal Part'' (ANP), have different biopsychosocial reactions to supraliminal and subliminal trauma-related cues and that these reactions cannot be mimicked by fantasy prone healthy controls nor by actors. Methods: Arterial ...

  19. Grip Strength Survey Based on Hand Tool Usage

    Directory of Open Access Journals (Sweden)

    Erman ÇAKIT

    2016-12-01

    Full Text Available Hand grip strength is broadly used for performing tasks involving equipment in production and processing activities. Most professionals in this field rely on grip strength to perform their tasks. There were three main aims of this study: i determining various hand grip strength measurements for the group of hand tool users, ii investigating the effects of height, weight, age, hand dominance, body mass index, previous Cumulative Trauma Disorder (CTD diagnosis, and hand tool usage experience on hand grip strength, and iii comparing the obtained results with existing data for other populations. The study groups comprised 71 healthy male facility workers. The values of subjects’ ages was observed between 26 and 74 years. The data were statistically analyzed to assess the normality of data and the percentile values of grip strength. The results of this study demonstrate that there were no significance differences noted between dominant and non-dominant hands. However, there were highly significant differences between the CTD group and the other group. Hand grip strength for the dominant hand was positively correlated to height, weight, and body mass index, and negatively correlated to age and tool usage experience. Hand dominance, height, weight, body mass index, age and tool usage experience should be considered when establishing normal values for grip strength.

  20. When moral identity symbolization motivates prosocial behavior: the role of recognition and moral identity internalization.

    Science.gov (United States)

    Winterich, Karen Page; Aquino, Karl; Mittal, Vikas; Swartz, Richard

    2013-09-01

    This article examines the role of moral identity symbolization in motivating prosocial behaviors. We propose a 3-way interaction of moral identity symbolization, internalization, and recognition to predict prosocial behavior. When moral identity internalization is low, we hypothesize that high moral identity symbolization motivates recognized prosocial behavior due to the opportunity to present one's moral characteristics to others. In contrast, when moral identity internalization is high, prosocial behavior is motivated irrespective of the level of symbolization and recognition. Two studies provide support for this pattern examining volunteering of time. Our results provide a framework for predicting prosocial behavior by combining the 2 dimensions of moral identity with the situational factor of recognition. PsycINFO Database Record (c) 2013 APA, all rights reserved

  1. How do household characteristics affect appliance usage? Application of conditional demand analysis to Japanese household data

    International Nuclear Information System (INIS)

    Matsumoto, Shigeru

    2016-01-01

    Although both appliance ownership and usage patterns determine residential electricity consumption, it is less known how households actually use their appliances. In this study, we conduct conditional demand analyses to break down total household electricity consumption into a set of demand functions for electricity usage, across 12 appliance categories. We then examine how the socioeconomic characteristics of the households explain their appliance usage. Analysis of micro-level data from the Nation Survey of Family and Expenditure in Japan reveals that the family and income structure of households affect appliance usage. Specifically, we find that the presence of teenagers increases both air conditioner and dishwasher use, labor income and nonlabor income affect microwave usage in different ways, air conditioner usage decreases as the wife's income increases, and microwave usage decreases as the husband's income increases. Furthermore, we find that households use more electricity with new personal computers than old ones; this implies that the replacement of old personal computers increases electricity consumption. - Highlights: •We conduct conditional demand analyses to study household appliance usage. •Micro-level data from the National Survey of Family and Expenditure in Japan are analyzed. •We show how household characteristics determine appliance usage. •High-income households use specific appliances less intensively than low-income households. •The replacement of old TVs and PCs lead to greater electricity consumption.

  2. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    NARCIS (Netherlands)

    Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,

  3. Possible hepatotoxicity of chronic marijuana usage

    Directory of Open Access Journals (Sweden)

    Paulo Borini

    Full Text Available CONTEXT: Hepatotoxicity is a potential complication from the usage of various illicit drugs, possibly consequent to their liver metabolism, but information on this is scarce in the medical literature. OBJECTIVE: To study the occurrence of clinical and laboratory hepatic alterations in chronic marijuana users, from the use of marijuana on its own or in association with other legal or illicit drugs. TYPE OF STUDY: transversal study SETTING: Hospital Espírita de Marília, Marília, São Paulo, Brazil PARTICIPANTS: The study was made among 123 patients interned in the Hospital Espírita de Marília from October 1996 to December 1998, divided into 3 groups: 26 (21% using only marijuana, 83 (67.5% using marijuana and crack, and 14 (11.4% consuming marijuana and alcohol. PROCEDURES AND MAIN MEASUREMENTS: Patients were examined clinically with special emphasis on types of drugs used, drug intake route, age when consumption began, length and pattern of usage, presence of tattooing, jaundice, hepatomegaly and splenomegaly. Serum determinations of total proteins, albumin, globulin, total and fractions of bilirubin, aspartate (AST and alanine (ALT aminotransferases, alkaline phosphatase (AP, gamma-glutamyltransferase and prothrombin activity were performed. RESULTS: Among users of only marijuana, hepatomegaly was observed in 57.7% and splenomegaly in 73.1%, and slightly elevated AST (42.3%, ALT (34.6% and AP (53.8%. The three groups did not differ significantly in the prevalence of hepatomegaly, splenomegaly and hepatosplenomegaly. The group using both marijuana and alcohol showed the highest prevalence of alterations and highest levels of aminotransferases. Mean AP levels were above normal in all groups. CONCLUSIONS: Chronic marijuana usage, on its own or in association with other drugs, was associated with hepatic morphologic and enzymatic alterations. This indicates that cannabinoids are possible hepatotoxic substances.

  4. Vegetation moderates impacts of tourism usage on bird communities along roads and hiking trails.

    Science.gov (United States)

    Wolf, Isabelle D; Hagenloh, Gerald; Croft, David B

    2013-11-15

    Bird communities inhabiting ecosystems adjacent to recreational tracks may be adversely affected by disturbance from passing tourism traffic, vehicle-related mortality, habitat alteration and modified biotic relationships such as the increase of strong competitors. This study investigated the effects of tourist usage of roads vs. hiking trails on bird communities in gorges of the Flinders Ranges, a popular South Australian tourist destination in the arid-lands. High tourist usage along roads decreased the individual abundance and species richness of birds relative to low usage trails. The decrease in species richness, though less pronounced, also occurred at high-usage sites along trails. Changes in the species response to recreational disturbance/impacts varied depending on the ecology of the species. Bigger, more competitive birds with a generalist diet were overrepresented at high-usage sites along roads and trails. Species using microhabitats in lower vegetation layers were more sensitive. However, structural and floristic complexity of vegetation was a more important factor influencing bird abundance than tourist usage. Sites with a better developed shrub and tree layer sustained higher species abundance and richer communities. Importantly, vegetation qualities moderated the negative effect of high usage on the individual abundance of birds along roads, to the extent that such an effect was absent at sites with the best developed shrub and tree layer. To protect avifauna along recreational tracks in arid-lands gorges, we recommend the closure of some gorges or sections for vehicle or any access. Further, open space particularly for camping needs to be minimized as it creates areas of high tourist usage with modified habitat that provides birds with little buffer from disturbance. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Statistical Measures for Usage-Based Linguistics

    Science.gov (United States)

    Gries, Stefan Th.; Ellis, Nick C.

    2015-01-01

    The advent of usage-/exemplar-based approaches has resulted in a major change in the theoretical landscape of linguistics, but also in the range of methodologies that are brought to bear on the study of language acquisition/learning, structure, and use. In particular, methods from corpus linguistics are now frequently used to study distributional…

  6. Analysis of the synonymous codon usage bias in recently emerged enterovirus D68 strains.

    Science.gov (United States)

    Karniychuk, Uladzimir U

    2016-09-02

    Understanding the codon usage pattern of a pathogen and relationship between pathogen and host's codon usage patterns has fundamental and applied interests. Enterovirus D68 (EV-D68) is an emerging pathogen with a potentially high public health significance. In the present study, the synonymous codon usage bias of 27 recently emerged, and historical EV-D68 strains was analyzed. In contrast to previously studied enteroviruses (enterovirus 71 and poliovirus), EV-D68 and human host have a high discrepancy between favored codons. Analysis of viral synonymous codon usage bias metrics, viral nucleotide/dinucleotide compositional parameters, and viral protein properties showed that mutational pressure is more involved in shaping the synonymous codon usage bias of EV-D68 than translation selection. Computation of codon adaptation indices allowed to estimate expression potential of the EV-D68 genome in several commonly used laboratory animals. This approach requires experimental validation and may provide an auxiliary tool for the rational selection of laboratory animals to model emerging viral diseases. Enterovirus D68 genome compositional and codon usage data can be useful for further pathogenesis, animal model, and vaccine design studies. Copyright © 2016 Elsevier B.V. All rights reserved.

  7. Comparing the Self-Report and Measured Smartphone Usage of College Students: A Pilot Study.

    Science.gov (United States)

    Lee, Heyoung; Ahn, Heejune; Nguyen, Trung Giang; Choi, Sam-Wook; Kim, Dae Jin

    2017-03-01

    Nowadays smartphone overuse has become a social and medical concern. For the diagnosis and treatment, clinicians use the self-report information, but the report data often does not match actual usage pattern. The paper examines the similarity and variance in smartphone usage patterns between the measured data and self-reported data. Together with the self-reported data, the real usage log data is collected from 35 college students in a metropolitan region of Northeast Asia, using Android smartphone monitoring application developed by the authors. The unconscious users underestimate their usage time by 40%, in spite of 15% more use in the actual usage. Messengers are most-used application regardless of their self-report, and significant preference to SNS applications was observed in addict group. The actual hourly pattern is consistent with the reported one. College students use more in the afternoon, when they have more free time and cannot use PCs. No significant difference in hourly pattern is observed between the measured and self-report. The result shows there are significant cognitive bias in actual usage patterns exists in self report of smartphone addictions. Clinicians are recommended to utilize measurement tools in diagnosis and treatment of smartphone overusing subjects.

  8. Usage Notes in the Oxford American Dictionary.

    Science.gov (United States)

    Berner, R. Thomas

    1981-01-01

    Compares the "Oxford American Dictionary" with the "American Heritage Dictionary." Examines the dictionaries' differences in philosophies of language, introductory essays, and usage notes. Concludes that the "Oxford American Dictionary" is too conservative, paternalistic, and dogmatic for the 1980s. (DMM)

  9. Internet Usage Habits as a Part of Distance Higher Education

    OpenAIRE

    Tufan, Firat

    2015-01-01

    Within the scope of this study, which deals with distance education method as a communication process, a focus group interview was conducted with voluntary students who were randomly selected from various areas/majors at the Department of Distance Education in Istanbul University in order to determine the relationship between their general Internet usage habits and their Internet usage as a part of distance learning and in line with their expectations. The questions posed for the students dur...

  10. Internet and Cell Phone Usage Patterns among Young Adults with Intellectual Disabilities

    Science.gov (United States)

    Jenaro, Cristina; Flores, Noelia; Cruz, Maribel; Pérez, Ma Carmen; Vega, Vanessa; Torres, Víctor A.

    2018-01-01

    Background: The risks and opportunities associated with the use of technologies are of growing research interest. Patterns of technology usage illuminate these opportunities and risks. However, no studies have assessed the usage patterns (frequency, duration, and intensity) and related factors in young people with intellectual disabilities.…

  11. Investment and Usage of New Technologies : Evidence from a Shared ATM Network

    NARCIS (Netherlands)

    Ferrari, S.; Verboven, F.L.; Degryse, H.A.

    2007-01-01

    When new technologies become available, it is not only essential that firms have the correct investment incentives, but often also that consumers make the proper usage decisions. This paper studies investment and usage in a shared ATM network. Be- cause all banks coordinate their ATM investment

  12. Investment and Usage of New Technologies : Evidence from a Shared ATM Network

    NARCIS (Netherlands)

    Ferrari, S.; Verboven, F.L.; Degryse, H.A.

    2008-01-01

    When new technologies become available, it is not only essential that firms have the correct investment incentives, but often also that consumers make the proper usage decisions. This paper studies investment and usage in a shared ATM network. Be- cause all banks coordinate their ATM investment

  13. Study on online community user motif using web usage mining

    Science.gov (United States)

    Alphy, Meera; Sharma, Ajay

    2016-04-01

    The Web usage mining is the application of data mining, which is used to extract useful information from the online community. The World Wide Web contains at least 4.73 billion pages according to Indexed Web and it contains at least 228.52 million pages according Dutch Indexed web on 6th august 2015, Thursday. It’s difficult to get needed data from these billions of web pages in World Wide Web. Here is the importance of web usage mining. Personalizing the search engine helps the web user to identify the most used data in an easy way. It reduces the time consumption; automatic site search and automatic restore the useful sites. This study represents the old techniques to latest techniques used in pattern discovery and analysis in web usage mining from 1996 to 2015. Analyzing user motif helps in the improvement of business, e-commerce, personalisation and improvement of websites.

  14. Social network usage, shame, guilt and pride among high school students: Model testing

    OpenAIRE

    Doğan, Uğur; Çelik, Eyüp; Karakaş, Yahya

    2016-01-01

    This study was aimed at testing a model which applies structural equation modeling (SEM) to explain social networking sites (SNS) usage. Performing SEM with a sample of 500 high school students (40% male, 60% female), the model examined the relationships among shame, guilt and pride on SNS, such Facebook and Twitter. It was hypothesized that SNS usage was predicted directly by shame and indirectly by pride and guilt. The SEM showed that shame affected SNS usage directly and positively, while ...

  15. Reciprocal Associations between Educational Identity and Vocational Identity in Adolescence: A Three-wave Longitudinal Investigation.

    Science.gov (United States)

    Negru-Subtirica, Oana; Pop, Eleonora Ioana

    2018-04-01

    Education and vocation are core identity domains in adolescence. School is a normative social context in this developmental time frame and the formation of an educational identity is embedded in the goals that youth pursue in school. One of the main goals of education is to prepare young people for their future careers. Hence, educational identity should support the formation of vocational identity during adolescence. Considering the limited evidence on the longitudinal links between these two domain-specific identities, we conducted a three-wave investigation, testing the moderating role of age group, gender, and type of school. Participants (N = 1030; 59.3% female) were adolescents (M age  = 16.72 years, SD age  = 1.23, age range 14-19 years) who completed self-report measures of educational and vocational identity three times during an academic year. We underscored reciprocal associations between educational identity and vocational identity. The results indicate that strong educational commitments supported the formation of strong vocational commitments across time. Adolescents who were involved in the in-depth exploration of their educational choices also reported more vocational exploration during the school year. In turn, vocational identity processes also supported educational identity formation, especially the reconsideration of educational commitments. In terms of moderators, we underscored that vocational commitment making and vocational flexibility bolstered educational commitment only in early-to-middle adolescents. Educational in-depth exploration fostered the identification with vocational commitments only in girls. Educational reconsideration of commitment promoted vocational self-doubt only in adolescents attending work-bound high-schools. Implications for research and practice are discussed.

  16. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  17. TEACHERS’ PREPARATION TO THE INFORMATION AND COMMUNICATION TECHNOLOGIES USAGE WITHIN POSTGRADUATE PEDAGOGICAL EDUCATION SYSTEM

    OpenAIRE

    Stepan P. Labudko

    2011-01-01

    Nowadays the question about teachers’ preparation to the information and communication technologies usage during the postgraduate period is actual. Some aspects of academic teachers’ preparation to the information and communication technologies usage during the postgraduate period in the teaching and educational activity are examined in the article, as well as some peculiarities of teachers’ preparation to the effective usage of modern tutorials and information and communication technologies ...

  18. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  19. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  20. Balancing Fairness and Efficiency: The Impact of Identity-Blind and Identity-Conscious Accountability on Applicant Screening

    Science.gov (United States)

    Self, William T.; Mitchell, Gregory; Mellers, Barbara A.; Tetlock, Philip E.; Hildreth, J. Angus D.

    2015-01-01

    This study compared two forms of accountability that can be used to promote diversity and fairness in personnel selections: identity-conscious accountability (holding decision makers accountable for which groups are selected) versus identity-blind accountability (holding decision makers accountable for making fair selections). In a simulated application screening process, undergraduate participants (majority female) sorted applicants under conditions of identity-conscious accountability, identity-blind accountability, or no accountability for an applicant pool in which white males either did or did not have a human capital advantage. Under identity-conscious accountability, participants exhibited pro-female and pro-minority bias, particularly in the white-male-advantage applicant pool. Under identity-blind accountability, participants exhibited no biases and candidate qualifications dominated interview recommendations. Participants exhibited greater resentment toward management under identity-conscious accountability. PMID:26660723