WorldWideScience

Sample records for identity document usage

  1. Identity Confusion and Materialism Mediate the Relationship Between Excessive Social Network Site Usage and Online Compulsive Buying.

    Science.gov (United States)

    Sharif, Saeed Pahlevan; Khanekharab, Jasmine

    2017-08-01

    This study investigates the mediating role of identity confusion and materialism in the relationship between social networking site (SNS) excessive usage and online compulsive buying among young adults. A total of 501 SNS users aged 17 to 23 years (M = 19.68, SD = 1.65) completed an online survey questionnaire. A serial multiple mediator model was developed and hypotheses were tested using structural equation modeling. The results showed that excessive young adult SNS users had a higher tendency toward compulsive buying online. This was partly because they experienced higher identity confusion and developed higher levels of materialism. Targeted psychological interventions seeking to gradually increase identity clarity to buffer the detrimental effects of SNS usage and identity confusion in young adults are suggested.

  2. An Ethnographic Analysis of Adolescent Sexual Minority Website Usage: Exploring Notions of Information Seeking and Sexual Identity Development

    Science.gov (United States)

    Sulfridge, Rocky M.

    2012-01-01

    This dissertation explores the website usage of adolescent sexual minorities, examining notions of information seeking and sexual identity development. Sexual information seeking is an important element within human information behavior and is uniquely problematic for young sexual minorities. Utilizing a contemporary gay teen website, this…

  3. Best Entry Points for Structured Document Retrieval - Part II: Types, Usage and Effectiveness

    DEFF Research Database (Denmark)

    Reid, Jane; Lalmas, Mounia; Finesilver, Karen

    2006-01-01

    Structured document retrieval makes use of document components as the basis of the retrieval process, rather than complete documents. The inherent relationships between these components make it vital to support users' natural browsing behaviour in order to offer effective and efficient access...

  4. Objective documentation of child abuse and dissociation in 12 murderers with dissociative identity disorder.

    Science.gov (United States)

    Lewis, D O; Yeager, C A; Swica, Y; Pincus, J H; Lewis, M

    1997-12-01

    The skepticism regarding the existence of dissociative identity disorder as well as the abuse that engenders it persists for lack of objective documentation. This is doubly so for the disorder in murderers because of issues of suspected malingering. This article presents objective verification of both dissociative symptoms and severe abuse during childhood in a series of adult murderers with dissociative identity disorder. This study consisted of a review of the clinical records of 11 men and one woman with DSM-IV-defined dissociative identity disorder who had committed murder. Data were gathered from medical, psychiatric, social service, school, military, and prison records and from records of interviews with subjects' family members and others. Handwriting samples were also examined. Data were analyzed qualitatively. Signs and symptoms of dissociative identity disorder in childhood and adulthood were corroborated independently and from several sources in all 12 cases; objective evidence of severe abuse was obtained in 11 cases. The subjects had amnesia for most of the abuse and underreported it. Marked changes in writing style and/or signatures were documented in 10 cases. This study establishes, once and for all, the linkage between early severe abuse and dissociative identity disorder. Further, the data demonstrate that the disorder can be distinguished from malingering and from other disorders. The study shows that it is possible, with great effort, to obtain objective evidence of both the symptoms of dissociative identity disorder and the abuse that engenders it.

  5. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  6. North Carolina – Sexual Orientation and Gender Identity Law and Documentation of Discrimination

    OpenAIRE

    Sears, Brad

    2009-01-01

    North Carolina law provides virtually no protection for public employees against job discrimination on the basis of gender identity or sexual orientation. No state-wide statute has been enacted in North Carolina to prohibit discrimination in employment on the basis of sexual orientation or gender identity. Also, little judicial or administrative action surrounding discrimination on the basis of sexual orientation or gender identity in the employment context or otherwise appears to exist.

  7. Connecticut – Sexual Orientation and Gender Identity Law and Documentation of Discrimination

    OpenAIRE

    Sears, Brad

    2009-01-01

    A Connecticut statute bans employment discrimination on the basis of sexual orientation. No Connecticut statutes prohibit discrimination on the basis of gender identity or expression. In November 2000, the Connecticut Commission on Human Rights and Opportunities – the agency responsible for administering the anti-discrimination statutes and for processing discrimination complaints – ruled that statutes prohibiting sex discrimination also banned discrimination on the basis of gender identity. ...

  8. Vermont – Sexual Orientation and Gender Identity Law and Documentation of Discrimination

    OpenAIRE

    Sears, Brad

    2009-01-01

    In 1992, the State of Vermont passed a comprehensive statewide law prohibiting discrimination on the basis of sexual orientation, which is defined as “female or male homosexuality, heterosexuality, or bisexuality.” Protection with respect to gender identity was added in May 2007. Vermont’s Human Rights Law prohibits discrimination on the basis of sexual orientation in areas such as employment, housing, and education.

  9. Implementation in Russia and the European Union of International Safety Standards of Identity Documents with Biometric Data: Legal Regulation and Perspectives

    Directory of Open Access Journals (Sweden)

    Alexander Grigoryevich Volevodz

    2015-01-01

    Full Text Available The article contains the findings of a research into particular aspects of use of identity documents with personal biometric data. It considers the international safety standards of documents with biometric data worked out by the International Civil Aviation Organization (ICAO, pursuant to which those data should be included into machine-readable documents used by their holders for travel to various states. It contains the information on the implementation of these international standards in Russian and European Union law. The author has substantiated a conclusion to the effect that the procedure established in Russia for production and issuance, as well as for use of international, diplomatic and service passports identifying the Russian Federation citizen outside the Russian Federation territory, containing electronic information carriers with personal and biometric personal data, currently conforms to the international safety standards of documents with biometric data. The article surveys the experience of introducing domestic biometric identity documents - electronic passports in various countries of the world, and the problems arising therefrom. It substantiates the advantages and disadvantages of determining a passport of the Russian Federation citizen issued in the form of an identity card with an electronic information carrier, as the main document of the Russian Federation citizen identifying him domestically within the country's territory.

  10. Usage Record Format Recommendation

    CERN Document Server

    Nilsen, J.K.; Muller-Pfeerkorn, R

    2013-01-01

    For resources to be shared, sites must be able to exchange basic accounting and usage data in a common format. This document describes a common format which enables the exchange of basic accounting and usage data from different resources. This record format is intended to facilitate the sharing of usage information, particularly in the area of the accounting of jobs, computing, memory, storage and cloud usage but with a structure that allows an easy extension to other resources. This document describes the Usage Record components both in natural language form and annotated XML. This document does not address how these records should be used, nor does it attempt to dictate the format in which the accounting records are stored. Instead, it denes a common exchange format. Furthermore, nothing is said regarding the communication mechanisms employed to exchange the records, i.e. transport layer, framing, authentication, integrity, etc.

  11. Introduction: Discourses of Identity

    DEFF Research Database (Denmark)

    Madsen, Peter

    2016-01-01

    Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages.......Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages....

  12. The systematic profiling of false identity documents: method validation and performance evaluation using seizures known to originate from common and different sources.

    Science.gov (United States)

    Baechler, Simon; Terrasse, Vincent; Pujol, Jean-Philippe; Fritz, Thibaud; Ribaux, Olivier; Margot, Pierre

    2013-10-10

    False identity documents constitute a potential powerful source of forensic intelligence because they are essential elements of transnational crime and provide cover for organized crime. In previous work, a systematic profiling method using false documents' visual features has been built within a forensic intelligence model. In the current study, the comparison process and metrics lying at the heart of this profiling method are described and evaluated. This evaluation takes advantage of 347 false identity documents of four different types seized in two countries whose sources were known to be common or different (following police investigations and dismantling of counterfeit factories). Intra-source and inter-sources variations were evaluated through the computation of more than 7500 similarity scores. The profiling method could thus be validated and its performance assessed using two complementary approaches to measuring type I and type II error rates: a binary classification and the computation of likelihood ratios. Very low error rates were measured across the four document types, demonstrating the validity and robustness of the method to link documents to a common source or to differentiate them. These results pave the way for an operational implementation of a systematic profiling process integrated in a developed forensic intelligence model. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  13. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  14. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Science.gov (United States)

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  15. Usage Center

    DEFF Research Database (Denmark)

    Kleinaltenkamp, Michael; Plewa, Carolin; Gudergan, Siegfried

    2017-01-01

    Purpose: The purpose of this paper is to advance extant theorizing around resourceintegration by conceptualizing and delineating the notion of a usage center. Ausage center consists of a combination of interdependent actors that draw onresources across their individual usage processes to create v...

  16. Description and Methods of the Automated Document Management System Usage in Scientific Organizational Activities of the Joint Institute for Nuclear Research (ADS SOA JINR)

    CERN Document Server

    Borisovsky, V F; Kekelidze, M G; Nikonov, E G; Senchenko, V A

    2005-01-01

    This paper presents the structure description and user guide for Information program system for automation of a document flow for support of scientific arrangement planning (ADS SOA) which can be used for planning and carrying out seminars, workshops, conferences and other arrangements of research management. This work is intended for automation of scientific research management in the Joint Institute for Nuclear Research. The complex of programs represents the CDS Agenda system used in the European Organization for Nuclear Research (CERN), which is adapted to the conditions of JINR.

  17. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  18. Password Usage

    National Research Council Canada - National Science Library

    Burrows, James

    1995-01-01

    ...) personal identity authentication and (2) data access authorization. It establishes the basic criteria for the design, implementation and use of a password system in those systems where passwords are used...

  19. Differences in smartphone usage

    DEFF Research Database (Denmark)

    Gustarini, Mattia; Scipioni, Marcello Paolo; Fanourakis, Marios

    2016-01-01

    We analyze the users’ intimacy to investigate the differences in smartphone usage, considering the user’s location and number and kind of people physically around the user. With a first user study we (1) validate the intimacy concept, (2) evaluate its correlation to smartphone usage features and ...

  20. Interactive publications: creation and usage

    Science.gov (United States)

    Thoma, George R.; Ford, Glenn; Chung, Michael; Vasudevan, Kirankumar; Antani, Sameer

    2006-02-01

    As envisioned here, an "interactive publication" has similarities to multimedia documents that have been in existence for a decade or more, but possesses specific differentiating characteristics. In common usage, the latter refers to online entities that, in addition to text, consist of files of images and video clips residing separately in databases, rarely providing immediate context to the document text. While an interactive publication has many media objects as does the "traditional" multimedia document, it is a self-contained document, either as a single file with media files embedded within it, or as a "folder" containing tightly linked media files. The main characteristic that differentiates an interactive publication from a traditional multimedia document is that the reader would be able to reuse the media content for analysis and presentation, and to check the underlying data and possibly derive alternative conclusions leading, for example, to more in-depth peer reviews. We have created prototype publications containing paginated text and several media types encountered in the biomedical literature: 3D animations of anatomic structures; graphs, charts and tabular data; cell development images (video sequences); and clinical images such as CT, MRI and ultrasound in the DICOM format. This paper presents developments to date including: a tool to convert static tables or graphs into interactive entities, authoring procedures followed to create prototypes, and advantages and drawbacks of each of these platforms. It also outlines future work including meeting the challenge of network distribution for these large files.

  1. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  2. Review of Bison Usage in VERA

    Energy Technology Data Exchange (ETDEWEB)

    Gardner, Russell [Idaho National Lab. (INL), Idaho Falls, ID (United States); Pawlowski, Roger P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Clarno, Kevin T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Stimpson, Shane G. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-11-01

    Bison is being used in VERA in a variety of ways; this milestone will document an independent review of the current usage of Bison and provide guidance that will improve the accuracy, performance, and consistency in the ways that Bison is used. This task will entail running a suite of small, single and multi-cycle problems with VERA-CS, followed by Bison, and Tiamat (inline) and evaluating the usage. It will also entail performing several detailed ramp to full power solutions to compare the one-way coupled solver with the fully-coupled Tiamat. This will include at least one iteration with the PHI team to incorporate some of the feedback and improve the usage. This work will also be completed in conjunction with an FMC task to evaluate the ability of Bison to model load-follow in a PWR

  3. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  4. French grammar and usage

    CERN Document Server

    Hawkins, Roger

    2015-01-01

    Long trusted as the most comprehensive, up-to-date and user-friendly grammar available, French Grammar and Usage is a complete guide to French as it is written and spoken today. It includes clear descriptions of all the main grammatical phenomena of French, and their use, illustrated by numerous examples taken from contemporary French, and distinguishes the most common forms of usage, both formal and informal.Key features include:Comprehensive content, covering all the major structures of contemporary French User-friendly organisation offering easy-to-find sections with cross-referencing and i

  5. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  6. Vehicle usage verification system

    NARCIS (Netherlands)

    Scanlon, W.G.; McQuiston, Jonathan; Cotton, Simon L.

    2012-01-01

    EN)A computer-implemented system for verifying vehicle usage comprising a server capable of communication with a plurality of clients across a communications network. Each client is provided in a respective vehicle and with a respective global positioning system (GPS) by which the client can

  7. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  8. Analysis of Architecture Pattern Usage in Legacy System Architecture Documentation

    NARCIS (Netherlands)

    Harrison, Neil B.; Avgeriou, Paris

    2008-01-01

    Architecture patterns are an important tool in architectural design. However, while many architecture patterns have been identified, there is little in-depth understanding of their actual use in software architectures. For instance, there is no overview of how many patterns are used per system or

  9. Porflow Capabilities, Usage, History, and Testing

    International Nuclear Information System (INIS)

    Collard, L.B.

    1998-05-01

    To support closure of the Savannah River Site High Level Waste tanks, the PORFLOW computer program is being applied to predict long term movement of residual contaminants from the tanks. The PORFLOW program has greater capabilities than simpler programs that have been used previously, and PORFLOW results have been accepted by state and federal regulators throughout the United States. This document briefly discusses the PORFLOW capabilities and presents lists of reports showing PORFLOW's usage history and testing

  10. LHCb Computing Resource usage in 2017

    CERN Document Server

    Bozzi, Concezio

    2018-01-01

    This document reports the usage of computing resources by the LHCb collaboration during the period January 1st – December 31st 2017. The data in the following sections have been compiled from the EGI Accounting portal: https://accounting.egi.eu. For LHCb specific information, the data is taken from the DIRAC Accounting at the LHCb DIRAC Web portal: http://lhcb-portal-dirac.cern.ch.

  11. Standardization Documents

    Science.gov (United States)

    2011-08-01

    Specifications and Standards; Guide Specifications; CIDs; and NGSs . Learn. Perform. Succeed. STANDARDIZATION DOCUMENTS Federal Specifications Commercial...national or international standardization document developed by a private sector association, organization, or technical society that plans ...Maintain lessons learned • Examples: Guidance for application of a technology; Lists of options Learn. Perform. Succeed. DEFENSE HANDBOOK

  12. [Usage of antibiotics in hospitals].

    Science.gov (United States)

    Ternák, G; Almási, I

    1996-12-29

    The authors publish the results of a survey conducted among hospital records of patients discharged from eight inpatient's institutes between 1-31st of January 1995 to gather information on the indications and usage of antibiotics. The institutes were selected from different part of the country to represent the hospital structure as much as possible. Data from the 13,719 documents were recorded and analysed by computer program. It was found that 27.6% of the patients (3749 cases) received antibiotic treatment. 407 different diagnosis and 365 different surgical procedures (as profilaxis) were considered as indications of antibiotic treatment (total: 4450 indications for 5849 antibiotic treatment). The largest group of patients receiving antibiotics was of antibiotic profilaxis (24.56%, 1093 cases), followed by lower respiratory tract infections (19.89%, 849 cases), uroinfections (10.53%, 469 cases) and upper respiratory tract infections. Relatively large group of patients belonged to those who had fever or subfebrility without known reason (7.35%, 327 cases) and to those who did not have any proof in their document indicating the reasons of antibiotic treatment (6.4%, 285 cases). We can not consider the antibiotic indications well founded in those groups of patients (every sixth or every fifth cases). The most frequently used antibiotics were of [2-nd] generation cefalosporins. The rate of nosocomial infections were found as 6.78% average. The results are demonstrated on diagrams and table.

  13. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  14. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  15. Usage of Recycled Pet

    Directory of Open Access Journals (Sweden)

    A. Ebru Tayyar

    2010-01-01

    Full Text Available The increasing industrialization, urbanization and the technological development have caused to increase depletion of the natural resources and environmental pollution's problem. Especially, for the countries which have not enough space recycling of the waste eliminating waste on regular basis or decreasing the amount and volume of waste have provided the important advantages. There are lots of studies and projects to develop both protect resources and prevent environmental pollution. PET bottles are commonly used in beverage industry and can be reused after physical and chemical recycling processes. Usage areas of recycled PET have been developed rapidly. Although recycled PET is used in plastic industry, composite industry also provides usage alternatives of recycled PET. Textile is a suitable sector for recycling of some plastics made of polymers too. In this study, the recycling technologies and applications of waste PET bottles have been investigated and scientific works in this area have been summarized.

  16. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  17. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  18. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  19. Maury Documentation

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Supporting documentation for the Maury Collection of marine observations. Includes explanations from Maury himself, as well as guides and descriptions by the U.S....

  20. Documentation Service

    International Nuclear Information System (INIS)

    Charnay, J.; Chosson, L.; Croize, M.; Ducloux, A.; Flores, S.; Jarroux, D.; Melka, J.; Morgue, D.; Mottin, C.

    1998-01-01

    This service assures the treatment and diffusion of the scientific information and the management of the scientific production of the institute as well as the secretariat operation for the groups and services of the institute. The report on documentation-library section mentions: the management of the documentation funds, search in international databases (INIS, Current Contents, Inspects), Pret-Inter service which allows accessing documents through DEMOCRITE network of IN2P3. As realizations also mentioned are: the setup of a video, photo database, the Web home page of the institute's library, follow-up of digitizing the document funds by integrating the CD-ROMs and diskettes, electronic archiving of the scientific production, etc

  1. Computerising documentation

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    The nuclear power generation industry is faced with public concern and government pressures over safety, efficiency and risk. Operators throughout the industry are addressing these issues with the aid of a new technology - technical document management systems (TDMS). Used for strategic and tactical advantage, the systems enable users to scan, archive, retrieve, store, edit, distribute worldwide and manage the huge volume of documentation (paper drawings, CAD data and film-based information) generated in building, maintaining and ensuring safety in the UK's power plants. The power generation industry has recognized that the management and modification of operation critical information is vital to the safety and efficiency of its power plants. Regulatory pressure from the Nuclear Installations Inspectorate (NII) to operate within strict safety margins or lose Site Licences has prompted the need for accurate, up-to-data documentation. A document capture and management retrieval system provides a powerful cost-effective solution, giving rapid access to documentation in a tightly controlled environment. The computerisation of documents and plans is discussed in this article. (Author)

  2. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  3. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  4. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  5. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  6. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  7. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  8. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  9. An Intelligent System for Document Retrieval in Distributed Office Environments.

    Science.gov (United States)

    Mukhopadhyay, Uttam; And Others

    1986-01-01

    MINDS (Multiple Intelligent Node Document Servers) is a distributed system of knowledge-based query engines for efficiently retrieving multimedia documents in an office environment of distributed workstations. By learning document distribution patterns and user interests and preferences during system usage, it customizes document retrievals for…

  10. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  11. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  12. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  13. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  14. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  15. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  16. Growing natural gas usage

    International Nuclear Information System (INIS)

    Saarni, T.

    1996-01-01

    Finnish natural gas usage topped the 3.3 billion cubic metre mark last year, up 3.6 % on the 1994 figure. Growth has increased now for 12 years in a row. Thanks to offtake by large individual users, the pipeline network has been expanded from South-East Finland to the Greater Helsinki area and central southern Finland. Natural gas plays a much larger role in this region than the 10 % accounted for by natural gas nationally would indicate. The growth in the share of Finland's energy use accounted for by natural gas has served to broaden the country's energy supply base. Natural gas has replaced coal and oil, which has considerably reduced the level of emissions resulting form energy generation

  17. Rivet usage at CMS

    Energy Technology Data Exchange (ETDEWEB)

    Radziej, Markus; Hebbeker, Thomas; Sonnenschein, Lars [III. Phys. Inst. A, RWTH Aachen (Germany)

    2015-07-01

    In this talk an overview of Rivet and its usage at the CMS experiment is presented. Rivet stands for ''Robust Independent Validation of Experiment and Theory'' and is used for optimizing and validating Monte Carlo event generators. By using the results of published analyses, distributions of the simulation can be compared to experimental measurements (corrected for detector effects). This gives insight into the agreement on the particle-level. Starting off with an introduction to the Rivet environment, the purpose of this tool in modern particle physics is explained. Before taking a closer look at the analysis structure, the software necessary to get comparisons is outlined. Analysis implementations are discussed using code examples, showcasing the powerful framework that Rivet provides. A few selected final distributions displaying both Monte Carlo generated events and recorded data are presented, showing the potential to perform particle-level comparisons.

  18. [Smartphone usage among adolescents].

    Science.gov (United States)

    Körmendi, Attila

    2015-01-01

    Among our technological gadgets smartphones play the most important role, new generation devices offer other functions beyond calling (internet availability, computer games, music player, camera functions etc.) In everydays can be experienced that youth spend more and more time with their smartphones and despite the actuality of this issue there are no studies on the excessive smartphone usage in Hungary and we can find only a few international studies. Our goal is to examine smartphone usage in primary and secondary schools in Hajdu-Bihar county, Hungary and its relationship with personality traits. Our sample consist of 263 youth from primary and secondary schools. We measured the characteristics of smartphone using and attitudes with a Mobilephone Using Questionnare. Personality traits are measured with Impulsiveness, Venturesomeness, Empathy Scale. The Child Behavior Checklist gives information about peer relationships, mental state and emotions. Average phone using time is 4,48 hours per day regarding the whole sample. This mean for boys is 3,40 hour for girls 5,39 hour. Average phone using time is higher at 16 (6,35 hour per day). The most frequent used applications are calling and visiting community sites. There is no connection between phone using and grades. The smartphone using time per day shows a significant positive relationship with Impulsivity, Anxiety and Depression, Attention deficits and Somatic problems within 17-19 ages. One of the explanation of excessive smartphone using may be the frequent visiting of community sites. Mobile phones in this case raise the availability of addictive object (community site) therefore contribute to the development of community site addiction. The connection with impulsivity, somatic problems and attention deficits refer to the anxiety reducing role of smartphones within 17-19 ages.

  19. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ General - CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. LHC Symposiums Management - CB - MB - FB - FMC Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2006 Annual reviews are posted.   CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat a...

  20. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ General - CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. LHC Symposiums Management - CB - MB - FB - FMC Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2006 Annual reviews are posted. CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat about the natu...

  1. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ General - CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. LHC Symposiums Management - CB - MB - FB - FMC Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2006 Annual reviews are posted. CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat about the natur...

  2. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ Management- CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. Management - CB - MB - FB Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2007 Annual reviews are posted. CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat about the nature of employment and ...

  3. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ Management- CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. Management - CB - MB - FB Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2007 Annual reviews are posted. CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat about the nature of em¬pl...

  4. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ General - CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. LHC Symposiums Management - CB - MB - FB - FMC Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2006 Annual reviews are posted. CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat about the na...

  5. Document Models

    Directory of Open Access Journals (Sweden)

    A.A. Malykh

    2017-08-01

    Full Text Available In this paper, the concept of locally simple models is considered. Locally simple models are arbitrarily complex models built from relatively simple components. A lot of practically important domains of discourse can be described as locally simple models, for example, business models of enterprises and companies. Up to now, research in human reasoning automation has been mainly concentrated around the most intellectually intensive activities, such as automated theorem proving. On the other hand, the retailer business model is formed from ”jobs”, and each ”job” can be modelled and automated more or less easily. At the same time, the whole retailer model as an integrated system is extremely complex. In this paper, we offer a variant of the mathematical definition of a locally simple model. This definition is intended for modelling a wide range of domains. Therefore, we also must take into account the perceptual and psychological issues. Logic is elitist, and if we want to attract to our models as many people as possible, we need to hide this elitism behind some metaphor, to which ’ordinary’ people are accustomed. As such a metaphor, we use the concept of a document, so our locally simple models are called document models. Document models are built in the paradigm of semantic programming. This allows us to achieve another important goal - to make the documentary models executable. Executable models are models that can act as practical information systems in the described domain of discourse. Thus, if our model is executable, then programming becomes redundant. The direct use of a model, instead of its programming coding, brings important advantages, for example, a drastic cost reduction for development and maintenance. Moreover, since the model is well and sound, and not dissolved within programming modules, we can directly apply AI tools, in particular, machine learning. This significantly expands the possibilities for automation and

  6. Sparing carbapenem usage.

    Science.gov (United States)

    Wilson, A Peter R

    2017-09-01

    Carbapenem resistance in Gram-negative bacteria is increasing in many countries and use of carbapenems and antibiotics to which resistance is linked should be reduced to slow its emergence. There are no directly equivalent antibiotics and the alternatives are less well supported by clinical trials. The few new agents are expensive. To provide guidance on strategies to reduce carbapenem usage. A literature review was performed as described in the BSAC/HIS/BIA/IPS Joint Working Party on Multiresistant Gram-negative Infection Report. Older agents remain active against some of the pathogens, although expectations of broad-spectrum cover for empirical treatment have risen. Education, expert advice on treatment and antimicrobial stewardship can produce significant reductions in use. More agents may need to be introduced onto the antibiotic formulary of the hospital, despite the poor quality of scientific studies in some cases. © The Author 2017. Published by Oxford University Press on behalf of the British Society for Antimicrobial Chemotherapy. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Identity Activities

    Science.gov (United States)

    2016-08-03

    in reaction to their environment. They reflect an individual’s internal or external, conscious or subconscious , overt or covert, voluntary or...identity activities under a range of legal authorities, policy constraints, transnational threats, regional concerns and biases , and most likely...Biography. A baseline and descriptive analytic product that supports the development of the behavioral influences analysis ( BIA ) individual behavioral

  8. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  9. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  10. Challenging Identities

    DEFF Research Database (Denmark)

    depends on the conceptual or ideological constellation in which it takes part. This volume on one hand demonstrates the role of notions of identity in a variety of European contexts, and on the other hand highlights how there may be reasons to challenge the use of the term and corresponding social...

  11. Orbitmpi Documentation

    International Nuclear Information System (INIS)

    Lowe, Lisa L.

    2000-01-01

    Orbitmpi is a parallelized version of Roscoe White's Orbit code. The code has been parallelized using MPI, which makes it portable to many types of machines. The guidelines used for the parallelization were to increase code performance with minimal changes to the code's original structure. This document gives a general description of how the parallel sections of the code run. It discusses the changes made to the original code and comments on the general procedure for future additions to Orbitmpi, as well as describing the effects of a parallelized random number generator on the code's output. Finally, the scaling results from Hecate and from Puffin are presented. Hecate is a 64-processor Origin 2000 machine, with MIPS R12000 processors and 16GB of memory, and Puffin is a PC cluster with 9 dual-processor 450 MHz Pentium III (18 processors max.), with 100Mbits ethernet communication

  12. Electronic Document Management Using Inverted Files System

    Science.gov (United States)

    Suhartono, Derwin; Setiawan, Erwin; Irwanto, Djon

    2014-03-01

    The amount of documents increases so fast. Those documents exist not only in a paper based but also in an electronic based. It can be seen from the data sample taken by the SpringerLink publisher in 2010, which showed an increase in the number of digital document collections from 2003 to mid of 2010. Then, how to manage them well becomes an important need. This paper describes a new method in managing documents called as inverted files system. Related with the electronic based document, the inverted files system will closely used in term of its usage to document so that it can be searched over the Internet using the Search Engine. It can improve document search mechanism and document save mechanism.

  13. Electronic Document Management Using Inverted Files System

    Directory of Open Access Journals (Sweden)

    Suhartono Derwin

    2014-03-01

    Full Text Available The amount of documents increases so fast. Those documents exist not only in a paper based but also in an electronic based. It can be seen from the data sample taken by the SpringerLink publisher in 2010, which showed an increase in the number of digital document collections from 2003 to mid of 2010. Then, how to manage them well becomes an important need. This paper describes a new method in managing documents called as inverted files system. Related with the electronic based document, the inverted files system will closely used in term of its usage to document so that it can be searched over the Internet using the Search Engine. It can improve document search mechanism and document save mechanism.

  14. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    , as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  15. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the ICMS Web site. The following items can be found on: http://cms.cern.ch/iCMS Management – CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. Management – CB – MB – FB Agendas and minutes are accessible to CMS members through Indico. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2008 Annual Reviews are posted in Indico. CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral student upon completion of their theses.  Therefore it is requested that Ph.D students inform the CMS Secretariat about the nature of employment and name of their first employer. The Notes, Conference Reports and Theses published si...

  16. Omega documentation

    Energy Technology Data Exchange (ETDEWEB)

    Howerton, R.J.; Dye, R.E.; Giles, P.C.; Kimlinger, J.R.; Perkins, S.T.; Plechaty, E.F.

    1983-08-01

    OMEGA is a CRAY I computer program that controls nine codes used by LLNL Physical Data Group for: 1) updating the libraries of evaluated data maintained by the group (UPDATE); 2) calculating average values of energy deposited in secondary particles and residual nuclei (ENDEP); 3) checking the libraries for internal consistency, especially for energy conservation (GAMCHK); 4) producing listings, indexes and plots of the library data (UTILITY); 5) producing calculational constants such as group averaged cross sections and transfer matrices for diffusion and Sn transport codes (CLYDE); 6) producing and updating standard files of the calculational constants used by LLNL Sn and diffusion transport codes (NDFL); 7) producing calculational constants for Monte Carlo transport codes that use group-averaged cross sections and continuous energy for particles (CTART); 8) producing and updating standard files used by the LLNL Monte Carlo transport codes (TRTL); and 9) producing standard files used by the LANL pointwise Monte Carlo transport code MCNP (MCPOINT). The first four of these functions and codes deal with the libraries of evaluated data and the last five with various aspects of producing calculational constants for use by transport codes. In 1970 a series, called PD memos, of internal and informal memoranda was begun. These were intended to be circulated among the group for comment and then to provide documentation for later reference whenever questions arose about the subject matter of the memos. They have served this purpose and now will be drawn upon as source material for this more comprehensive report that deals with most of the matters covered in those memos.

  17. Omega documentation

    International Nuclear Information System (INIS)

    Howerton, R.J.; Dye, R.E.; Giles, P.C.; Kimlinger, J.R.; Perkins, S.T.; Plechaty, E.F.

    1983-08-01

    OMEGA is a CRAY I computer program that controls nine codes used by LLNL Physical Data Group for: 1) updating the libraries of evaluated data maintained by the group (UPDATE); 2) calculating average values of energy deposited in secondary particles and residual nuclei (ENDEP); 3) checking the libraries for internal consistency, especially for energy conservation (GAMCHK); 4) producing listings, indexes and plots of the library data (UTILITY); 5) producing calculational constants such as group averaged cross sections and transfer matrices for diffusion and Sn transport codes (CLYDE); 6) producing and updating standard files of the calculational constants used by LLNL Sn and diffusion transport codes (NDFL); 7) producing calculational constants for Monte Carlo transport codes that use group-averaged cross sections and continuous energy for particles (CTART); 8) producing and updating standard files used by the LLNL Monte Carlo transport codes (TRTL); and 9) producing standard files used by the LANL pointwise Monte Carlo transport code MCNP (MCPOINT). The first four of these functions and codes deal with the libraries of evaluated data and the last five with various aspects of producing calculational constants for use by transport codes. In 1970 a series, called PD memos, of internal and informal memoranda was begun. These were intended to be circulated among the group for comment and then to provide documentation for later reference whenever questions arose about the subject matter of the memos. They have served this purpose and now will be drawn upon as source material for this more comprehensive report that deals with most of the matters covered in those memos

  18. 4onse D1.3 - Project Identity Manual

    OpenAIRE

    Cannata Massimiliano; Strigaro Daniele

    2016-01-01

    This document describes the corporate identity which has been developed for the 4onse project. The corporate identity consists of logo for the overall project and templates for written and presentation materials and printed communication materials.

  19. OER Usage by Instructional Designers and Training Managers in Corporations

    Directory of Open Access Journals (Sweden)

    Anat Cohen

    2015-12-01

    Full Text Available Since the development of Open Educational Resources (OERs, different models regarding the usage of these resources in education have appeared in the literature. Wiley’s 4-Rs model is considered to be one of the leading models. Research based on Wiley’s model shows that using materials without making changes is the most common use. Compared to the extensive literature regarding OER usage in education, the literature barely deals with OER usage by instructional designers or training managers in corporations. The purpose of this research is to examine the OER usage of these two stakeholders, distinguishing between Little and Big OER repositories, in which Little OER repositories such as YouTube and Wikipedia aren’t necessarily designed to fulfill educational purposes. Findings show that these stakeholders almost use only Little repositories and that their usage level is higher than what is documented in the literature: they mostly Revise–modify the form of the resource, and Remix–combine different resources to create new ones. These differences can be explained by the fact that materials from Little OER repositories are raw materials, requiring further editing and adjustment. Significant differences between instructional designers’ and training managers’ usage of OERs were found regarding the Reuse level of resources from internal repositories and the Google Images repository, and the frequency of this Reuse.

  20. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand...... their organization (sensemaking effect) and the gratification they derive from its positive representation (self-enhancement effect). Our findings suggest that positive media representations foster members' alignment around an emergent new understanding of what their organization is. Over time, however, celebrity...

  1. Unravelling identities

    OpenAIRE

    2007-01-01

    Abstract The decision to go to war by the government of the day is assumed to be a decision taken on behalf of all citizens of the nation, conceived as a collective united by a harmony of interests. Yet in the case of the Iraq War, there is clearly no unified voice of support from the British people. There is division between the state and its citizens, and the latter also reflect the multilayered identities of an increasingly multicultural society. How do individuals displaying mu...

  2. Regulatory applications of the relationships between natural gas usage and weather

    International Nuclear Information System (INIS)

    Gray, J.A.; Patterson, D.L.; Proctor, M.S.; Warren, H.E.

    1997-01-01

    This document provides the basics required for analysis and forecasting of natural gas usage for determining the revenues and revision of rates. The focus is on the Local Distribution Company and its customers. Analysis of gas usage is required in a rate case in order to properly estimate the volumes and revenues that would be recovered from current rate under conditions of normal weather. Normal volumes are also required to evaluate proposed rates. In the context of the Local Distribution Company's procurement of gas supply, forecasting of gas usage is required to determine both the daily usage profile and the peak day requirement

  3. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  4. Safety and Usage of C1-Inhibitor in Hereditary Angioedema

    DEFF Research Database (Denmark)

    Riedl, Marc A; Bygum, Anette; Lumry, William

    2016-01-01

    , international patient registry documented widespread implementation of pnfC1-INH self-administration outside of a health care setting consistent with current HAE guidelines. These real-world data revealed pnfC1-INH usage for a variety of reasons in patients with HAE and showed a high level of safety regardless...... of this study was to describe safety and usage patterns of pnfC1-INH. METHODS: A multicenter, observational, registry was conducted between 2010 and 2014 at 30 United States and 7 European sites to obtain both prospective (occurring after enrollment) and retrospective (occurring before enrollment) safety...... and usage data on subjects receiving pnfC1-INH for any reason. RESULTS: Of 343 enrolled patients, 318 received 1 or more doses of pnfC1-INH for HAE attacks (11,848 infusions) or for prophylaxis (3142 infusions), comprising the safety population. Median dosages per infusion were 10.8 IU/kg (attack treatment...

  5. Software documentation for TRU certification program

    International Nuclear Information System (INIS)

    CLINTON, R.

    1999-01-01

    The document provides validation information for software used to support TRU operational activities. Calculations were performed using a spreadsheet application. This document provides information about the usage of the software application, Microsoft(reg s ign) Excel. Microsoft(reg s ign) Excel spreadsheets were used to perform specific calculations to determine the amount of containers to visually examine and to perform analyses on container head-gas data. Contained in this document are definitions of formulas and variables with relation to the Excel codes used. Also, a demonstration is provided using predetermined values to obtain predetermined results

  6. Identical and shifted identical bands

    International Nuclear Information System (INIS)

    Dodder, R.S; Jones, E.F.; Hamilton, J.H.

    1997-01-01

    Spontaneous fission of 252 Cm was studied with 72 large Compton suppressed Ge detectors in Gamma sphere. New isotopes 160 Sm and 162 Gd were identified. Through X-ray-γ and γ-γ-γ) coincidence measurements, level energies were established to spins 14 + to 20 + in 152 , 154 156 60 Nd 92 94 96 , 156 , 158 , 160 62 Sm 94 , 96 , 98 , and 160 , 162 64 Gd 96 , 98 . These nuclei exhibit a remarkable variety of identical bands and bands where the energies and moments of inertia are shifted by the same constant amount for every spin state from 2 + to 12 + for various combinations of nuclei differing by 2n, 4n, 2p, 4p, and α

  7. On semasiological princiles of constructing and usage of medical eponyms in Spanish, English and Russian languages

    Directory of Open Access Journals (Sweden)

    Михаил Юрьевич Чернышов

    2013-12-01

    Full Text Available The paper discusses preliminary results of a comparative onomasiological investigation related to constructing medical eponyms, which correspond to identical denotata, in Spanish, English and Russian languages. Pragmatic and social-cultural (ethic motives of generation, extensive usage and variations of both eponyms and their acronym forms as the tools for renewal of the respective terminological systems are explained. The principle of usage (not usage of proper names in medical terms has been revealed. A discovery of interaction between the pragmatic motivation and the social-cultural motivation is described.

  8. Manufacturer Usage Description Specification Implementation

    OpenAIRE

    Srinivasan, Kaushik

    2017-01-01

    Manufacturer Usage Description Specification (MUDS) is aframework under RFC development that aims to automate Internet access control rules for IoT devices . These access controls prevent malicious IoT devices from attacking other devices and also protect the IoT devices from being attacked by other devices.We are implementing this framework and trying to improve its security.

  9. Video personalization for usage environment

    Science.gov (United States)

    Tseng, Belle L.; Lin, Ching-Yung; Smith, John R.

    2002-07-01

    A video personalization and summarization system is designed and implemented incorporating usage environment to dynamically generate a personalized video summary. The personalization system adopts the three-tier server-middleware-client architecture in order to select, adapt, and deliver rich media content to the user. The server stores the content sources along with their corresponding MPEG-7 metadata descriptions. Our semantic metadata is provided through the use of the VideoAnnEx MPEG-7 Video Annotation Tool. When the user initiates a request for content, the client communicates the MPEG-21 usage environment description along with the user query to the middleware. The middleware is powered by the personalization engine and the content adaptation engine. Our personalization engine includes the VideoSue Summarization on Usage Environment engine that selects the optimal set of desired contents according to user preferences. Afterwards, the adaptation engine performs the required transformations and compositions of the selected contents for the specific usage environment using our VideoEd Editing and Composition Tool. Finally, two personalization and summarization systems are demonstrated for the IBM Websphere Portal Server and for the pervasive PDA devices.

  10. pBEAM Documentation: Release 0.1.0

    Energy Technology Data Exchange (ETDEWEB)

    Ning, S. A. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2013-09-01

    The Polynomial Beam Element Analysis Module (pBEAM) is a finite element code for beam-like structures. It was originally written to analyze tower/monopiles and rotor blades of wind turbines but can be used for any beam-like structure. This document discusses installation, usage, and documentation of the module.

  11. Teaching APA Style Documentation: Discovery Learning, Scaffolding and Procedural Knowledge

    Science.gov (United States)

    Skeen, Thomas; Zafonte, Maria

    2015-01-01

    Students struggle with learning correct documentation style as found in the Publication Manual of the American Psychological Association and teachers are often at a loss for how to best instruct students in correct usage of APA style. As such, the first part of this paper discusses the current research on teaching documentation styles as well as…

  12. Student Empowerment Through Internet Usage

    DEFF Research Database (Denmark)

    Purushothaman, Aparna

    2011-01-01

    in a University in Southern India to empower the female students through Internet usage. The study was done to find out the problems the woman students faced in gaining access and using Internet and how they can be empowered through Internet usage. Future workshop was conducted to find out the problems...... and reflecting. The paper will explore the various cultural issues and explicate how the social context plays a major role in the use of Internet even if there is sufficient access. These issues will be addressed from an empowerment perspective. The paper ends by recommending the methods to be adopted for more......Information and Communication Technology (ICT) has been widely recognized as a tool for human development (UNDP 2001). The rate at which ICT are growing is changing the way knowledge is developed, acquired and delivered. (Tongia, et al. 2005) Internet is one of the Information & Communication...

  13. Understanding Mobile Social Media Usage

    DEFF Research Database (Denmark)

    Gan, Chunmei; Tan, Chee-Wee

    2017-01-01

    Despite the increasing popularity and growing trend of mobile social media in China, factors affecting users’ continued usage behavior remains unclear and deserves further scholarly attention. Synthesizing theories of expectation confirmation as well as uses and gratification, we advance a uses...... and gratification expectancy model that depicts how confirmation, perceived usability and gratification affect users’ continuance intention towards mobile social media. Empirical findings from an online survey of 247 respondents reveal that continuance intention is determined by a range of gratifications, including...... information sharing, media appeal and perceived enjoyment. In addition, confirmation of expectations and perceptions of usefulness gleaned through prior usage of mobile social media have significant effects on gratifications of information sharing, perceived enjoyment, social interaction, passing time...

  14. Document retrieval on repetitive string collections.

    Science.gov (United States)

    Gagie, Travis; Hartikainen, Aleksi; Karhu, Kalle; Kärkkäinen, Juha; Navarro, Gonzalo; Puglisi, Simon J; Sirén, Jouni

    2017-01-01

    Most of the fastest-growing string collections today are repetitive, that is, most of the constituent documents are similar to many others. As these collections keep growing, a key approach to handling them is to exploit their repetitiveness, which can reduce their space usage by orders of magnitude. We study the problem of indexing repetitive string collections in order to perform efficient document retrieval operations on them. Document retrieval problems are routinely solved by search engines on large natural language collections, but the techniques are less developed on generic string collections. The case of repetitive string collections is even less understood, and there are very few existing solutions. We develop two novel ideas, interleaved LCPs and precomputed document lists , that yield highly compressed indexes solving the problem of document listing (find all the documents where a string appears), top- k document retrieval (find the k documents where a string appears most often), and document counting (count the number of documents where a string appears). We also show that a classical data structure supporting the latter query becomes highly compressible on repetitive data. Finally, we show how the tools we developed can be combined to solve ranked conjunctive and disjunctive multi-term queries under the simple [Formula: see text] model of relevance. We thoroughly evaluate the resulting techniques in various real-life repetitiveness scenarios, and recommend the best choices for each case.

  15. Opportunistic resource usage in CMS

    International Nuclear Information System (INIS)

    Kreuzer, Peter; Hufnagel, Dirk; Dykstra, D; Gutsche, O; Tadel, M; Sfiligoi, I; Letts, J; Wuerthwein, F; McCrea, A; Bockelman, B; Fajardo, E; Linares, L; Wagner, R; Konstantinov, P; Blumenfeld, B; Bradley, D

    2014-01-01

    CMS is using a tiered setup of dedicated computing resources provided by sites distributed over the world and organized in WLCG. These sites pledge resources to CMS and are preparing them especially for CMS to run the experiment's applications. But there are more resources available opportunistically both on the GRID and in local university and research clusters which can be used for CMS applications. We will present CMS' strategy to use opportunistic resources and prepare them dynamically to run CMS applications. CMS is able to run its applications on resources that can be reached through the GRID, through EC2 compliant cloud interfaces. Even resources that can be used through ssh login nodes can be harnessed. All of these usage modes are integrated transparently into the GlideIn WMS submission infrastructure, which is the basis of CMS' opportunistic resource usage strategy. Technologies like Parrot to mount the software distribution via CVMFS and xrootd for access to data and simulation samples via the WAN are used and will be described. We will summarize the experience with opportunistic resource usage and give an outlook for the restart of LHC data taking in 2015.

  16. Ectodermal dysplasia in identical twins

    OpenAIRE

    Puttaraju, Gurkar Haraswarupa; Visveswariah, Paranjyothi Magadi

    2013-01-01

    Hereditary hypohidrotic ectodermal dysplasia (HED) is typically inherited as an X-linked recessive trait, characterized by deformity of at least two or more of the ectodermal structures - hair, teeth, nails and sweat glands. Two cases of hereditary HED involving identical male twins, is being documented for the rarity of its occurrence with special attention given to genetics, pathophysiology, clinical, intraoral manifestations and to the methods to improve the masticatory function, the facia...

  17. Perspectives on Sexual Identity Formation, Identity Practices, and Identity Transitions Among Men Who Have Sex With Men in India.

    Science.gov (United States)

    Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D

    2018-01-01

    Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.

  18. Facebook usage by students in higher education

    NARCIS (Netherlands)

    Wesseling, N.F.; de la Poza, Elena; Dormènech, Jozep; Lloret, Jaime; Vincent Vela, M. Cinta; Zuriaga Agustí, Elena

    2015-01-01

    In this paper I measure first year student Facebook usage as part of a broader PhD study into the influence of social media usage on the success of students in higher education. A total of 906 students were asked to complete 3 surveys on Facebook usage with their peers, for two consecutive years

  19. ON EXPERIENCE OF THE ELECTRONIC DOCUMENT MANAGEMENT SYSTEM IMPLEMENTATION IN THE MEDICAL UNIVERSITY

    Directory of Open Access Journals (Sweden)

    A. V. Semenets

    2015-05-01

    Full Text Available An importance of the application of the electronic document management to the Ukraine healthcare is shown. The electronic document management systems market overview is presented. Example of the usage of the open-source electronic document management system in the Ternopil State Medical University by I. Ya. Horbachevsky is shown. The implementation capabilities of the electronic document management system within a cloud services are shown. The electronic document management features of the Microsoft Office 365 and Google Apps For Education are compared. Some results of the usage of the Google Apps For Education inTSMUas electronic document management system are presented.

  20. Performance assurance of the re-applying project documentation

    Science.gov (United States)

    Kozlova, Olga

    2017-10-01

    Usage of the re-applying project documentation is cost effective measure. Saving of budgetary funds for purchases for development of new project documentation occurs by means of it. It also becomes possible to consider better decisions and prevent the repetition of mistakes. Nowadays, state authorities in construction management are forming separate institute for re-applying project documentation. The article shows the main tasks of such events and the issues to be solved for achievement of a high positive result.

  1. 2011 Radioactive Materials Usage Survey for Unmonitored Point Sources

    Energy Technology Data Exchange (ETDEWEB)

    Sturgeon, Richard W. [Los Alamos National Laboratory

    2012-06-27

    organized. The RMUS Interview Form with the attached RMUS Process Form(s) provides the radioactive materials survey data by technical area (TA) and building number. The survey data for each release point includes information such as: exhaust stack identification number, room number, radioactive material source type (i.e., potential source or future potential source of air emissions), radionuclide, usage (in curies) and usage basis, physical state (gas, liquid, particulate, solid, or custom), release fraction (from Appendix D to 40 CFR 61, Subpart H), and process descriptions. In addition, the interview form also calculates emissions (in curies), lists mrem/Ci factors, calculates PEDEs, and states the location of the critical receptor for that release point. [The critical receptor is the maximum exposed off-site member of the public, specific to each individual facility.] Each of these data fields is described in this section. The Tier classification of release points, which was first introduced with the 1999 usage survey, is also described in detail in this section. Section 4 includes a brief discussion of the dose estimate methodology, and includes a discussion of several release points of particular interest in the CY 2011 usage survey report. It also includes a table of the calculated PEDEs for each release point at its critical receptor. Section 5 describes ES's approach to Quality Assurance (QA) for the usage survey. Satisfactory completion of the survey requires that team members responsible for Rad-NESHAP (National Emissions Standard for Hazardous Air Pollutants) compliance accurately collect and process several types of information, including radioactive materials usage data, process information, and supporting information. They must also perform and document the QA reviews outlined in Section 5.2.6 (Process Verification and Peer Review) of ES-RN, 'Quality Assurance Project Plan for the Rad-NESHAP Compliance Project' to verify that all information is

  2. A blockchain-based data usage auditing architecture with enhanced privacy and availability

    OpenAIRE

    Kaaniche , Nesrine; Laurent , Maryline

    2017-01-01

    International audience; Recent years have witnessed the trend of increasingly relying on distributed infrastructures. This increased the number of reported incidents of security breaches compromising users' privacy, where third parties massively collect, process and manage users' personal data. Towards these security and privacy challenges, we combine hierarchical identity based cryptographic mechanisms with emerging blockchain infrastructures and propose a blockchain-based data usage auditin...

  3. Generic safety documentation model

    International Nuclear Information System (INIS)

    Mahn, J.A.

    1994-04-01

    This document is intended to be a resource for preparers of safety documentation for Sandia National Laboratories, New Mexico facilities. It provides standardized discussions of some topics that are generic to most, if not all, Sandia/NM facilities safety documents. The material provides a ''core'' upon which to develop facility-specific safety documentation. The use of the information in this document will reduce the cost of safety document preparation and improve consistency of information

  4. Radiation exposure usage accountability and impact with respect to ALAP (ALARA) analysis

    International Nuclear Information System (INIS)

    Williams, M.C.

    1978-01-01

    A unique method has been developed for radiation exposure usage accounting at the N Reactor. This method accounts for exposure usage by specific job and working crafts. The accounting system provides information for use in job planning, exposure resource management, and ALAP (ALARA) analysis. It provides justification for ALAP expenditures, documentation of the effectiveness of exposure reduction efforts, and can be used to establish priorities for ALAP efforts

  5. USAGE OF BELARUS TRANSIT POSSIBILITIES

    Directory of Open Access Journals (Sweden)

    D. M. Antioushenya

    2009-01-01

    Full Text Available It has been determined that sustainable and safety operation of a transport system and also efficient functioning of transport infrastructure depend on introduction of modern systems and technologies of passenger and load transportation  with usage of logistic approaches. The paper cites results of marketing investigations testifying to availability of the potential for formation of a transport and logistic system in the Republic. A conclusion has been made that realization of the mentioned key ideas shall allow efficiently to integrate in the world economic system.

  6. Red Storm usage model :Version 1.12.

    Energy Technology Data Exchange (ETDEWEB)

    Jefferson, Karen L.; Sturtevant, Judith E.

    2005-12-01

    Red Storm is an Advanced Simulation and Computing (ASC) funded massively parallel supercomputer located at Sandia National Laboratories (SNL). The Red Storm Usage Model (RSUM) documents the capabilities and the environment provided for the FY05 Tri-Lab Level II Limited Availability Red Storm User Environment Milestone and the FY05 SNL Level II Limited Availability Red Storm Platform Milestone. This document describes specific capabilities, tools, and procedures to support both local and remote users. The model is focused on the needs of the ASC user working in the secure computing environments at Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and SNL. Additionally, the Red Storm Usage Model maps the provided capabilities to the Tri-Lab ASC Computing Environment (ACE) requirements. The ACE requirements reflect the high performance computing requirements for the ASC community and have been updated in FY05 to reflect the community's needs. For each section of the RSUM, Appendix I maps the ACE requirements to the Limited Availability User Environment capabilities and includes a description of ACE requirements met and those requirements that are not met in that particular section. The Red Storm Usage Model, along with the ACE mappings, has been issued and vetted throughout the Tri-Lab community.

  7. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  8. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  9. Codon usage and amino acid usage influence genes expression level.

    Science.gov (United States)

    Paul, Prosenjit; Malakar, Arup Kumar; Chakraborty, Supriyo

    2018-02-01

    Highly expressed genes in any species differ in the usage frequency of synonymous codons. The relative recurrence of an event of the favored codon pair (amino acid pairs) varies between gene and genomes due to varying gene expression and different base composition. Here we propose a new measure for predicting the gene expression level, i.e., codon plus amino bias index (CABI). Our approach is based on the relative bias of the favored codon pair inclination among the genes, illustrated by analyzing the CABI score of the Medicago truncatula genes. CABI showed strong correlation with all other widely used measures (CAI, RCBS, SCUO) for gene expression analysis. Surprisingly, CABI outperforms all other measures by showing better correlation with the wet-lab data. This emphasizes the importance of the neighboring codons of the favored codon in a synonymous group while estimating the expression level of a gene.

  10. Mobile phones: time to rethink and limit usage.

    Science.gov (United States)

    Paul, Bobby; Saha, Indranil; Kumar, Sanjay; Samim Ferdows, S K; Ghose, Gautam

    2015-01-01

    Radiofrequency waves generated from mobile phones cause potential public health problems. Short-term effects like changes in sleep, heart rate, and blood pressure, and long-term effects like carcinoma are well documented. The Government of India's efforts in laying down regulations regarding the safety limits, manufacture, marketing, and mobile use are still in nascent stage. The need for stringent enforcement of laws for prevention of phone usage while driving and guidelines of medical regulatory bodies regarding rules and regulations of phone usage while at class or attending patients is of utmost importance. This should be supplemented by mass media to raise awareness among people regarding the possible health effects of radiofrequency emissions from mobile phones and the guidelines to minimize its exposure. It is the need of the hour to teach young people to be structured, to know when to have the cell phone on, and to avoid becoming the slave of technology instead of its mastery.

  11. Competition and Social Identity in the Workplace

    DEFF Research Database (Denmark)

    Kato, Takao; Shu, Pian

    2016-01-01

    We study the impact of social identity on worker competition by exploiting the well-documented social divide between urban resident workers and rural migrant workers in urban Chinese firms. We analyze data on weekly output, individual characteristics, and coworker composition for all weavers...... in an urban Chinese textile firm during a 53-week period. The firm adopts relative performance incentives in addition to piece rates to encourage competition in the workplace. We find that social identity has a significant impact on competition: a weaver only competes against coworkers with a different social...... identity, but not against those sharing her own identity. The results are mainly driven by urban weavers competing aggressively against rural coworkers. Our results highlight the important role of social identity in mitigating or enhancing competition....

  12. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  13. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  14. Usage of marketing in politics

    Directory of Open Access Journals (Sweden)

    Marić Ivana

    2014-01-01

    Full Text Available Multi-party political system led to competition between political parties which caused the need for marketing in politics that improves political reputation. Politics, based on rich experience of political practice, used existing, developed methods and techniques of commercial marketing. Political marketing openly admits that politics and politicians are simply goods that are being sold on a political market. Political marketing is a whole way of operation by political parties which ask these questions: how do the voters choose; what affects their preference and how that preference can be influenced. Usage of political marketing in Bosnia and Herzegovina is still not on a satisfactory level but the knowledge about the importance of political marketing is increasing.

  15. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  16. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  17. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  18. Registration document 2005; Document de reference 2005

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This reference document of Gaz de France provides information and data on the Group activities in 2005: financial informations, business, activities, equipments factories and real estate, trade, capital, organization charts, employment, contracts and research programs. (A.L.B.)

  19. Discovering More Accurate Frequent Web Usage Patterns

    OpenAIRE

    Bayir, Murat Ali; Toroslu, Ismail Hakki; Cosar, Ahmet; Fidan, Guven

    2008-01-01

    Web usage mining is a type of web mining, which exploits data mining techniques to discover valuable information from navigation behavior of World Wide Web users. As in classical data mining, data preparation and pattern discovery are the main issues in web usage mining. The first phase of web usage mining is the data processing phase, which includes the session reconstruction operation from server logs. Session reconstruction success directly affects the quality of the frequent patterns disc...

  20. The Scope of Usage-based Theory

    OpenAIRE

    Paul eIbbotson

    2013-01-01

    Usage-based approaches typically draw on a relatively small set of cognitive processes, such as categorization, analogy, and chunking to explain language structure and function. The goal of this paper is to first review the extent to which the “cognitive commitment” of usage-based theory has had success in explaining empirical findings across domains, including language acquisition, processing, and typology. We then look at the overall strengths and weaknesses of usage-based theory and highli...

  1. 2002 reference document; Document de reference 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    This 2002 reference document of the group Areva, provides information on the society. Organized in seven chapters, it presents the persons responsible for the reference document and for auditing the financial statements, information pertaining to the transaction, general information on the company and share capital, information on company operation, changes and future prospects, assets, financial position, financial performance, information on company management and executive board and supervisory board, recent developments and future prospects. (A.L.B.)

  2. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    Science.gov (United States)

    2017-03-01

    17-254 Identity Theft Services standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to... audited financial statements. Page 34 GAO-17-254 Identity Theft Services Although the websites of many identity theft services ...reasonable assurance that significant decisions on the use of identity theft services are appropriately documented. We provided a draft of this

  3. Identity as a major issue in an information society: the case for a chain approach

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    1998-01-01

    Two new developments in information technology will have a profound effect on the identity issue in our society: multifunctional smartcards and biometrics. The wide-spread use of chipcards will in the future facilitate electronic identities and identity documents. This places identity fraud in a new

  4. ON EXPERIENCE OF THE ELECTRONIC DOCUMENT MANAGEMENT SYSTEM IMPLEMENTATION IN THE MEDICAL UNIVERSITY

    OpenAIRE

    A. V. Semenets; V. Yu. Kovalok

    2015-01-01

    An importance of the application of the electronic document management to the Ukraine healthcare is shown. The electronic document management systems market overview is presented. Example of the usage of the open-source electronic document management system in the Ternopil State Medical University by I. Ya. Horbachevsky is shown. The implementation capabilities of the electronic document management system within a cloud services are shown. The electronic document management features of the Mi...

  5. Split Personality: Assessing the Potential for Organizational Identity in Reinforcing U.S. Military Jointness

    Science.gov (United States)

    2015-07-17

    of Identity ...........................................................................................................36 Hybrid -Organizational...force through a theoretical lens, developing a working understanding of military identity. Analysis of the environment will illustrate the hybrid ... departmental civilians, and contractors in the DoD’s employ, and is consistent with CJCS usage. Joint Force. The Joint Force describes a notional

  6. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  7. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  8. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  9. Web document engineering

    International Nuclear Information System (INIS)

    White, B.

    1996-05-01

    This tutorial provides an overview of several document engineering techniques which are applicable to the authoring of World Wide Web documents. It illustrates how pre-WWW hypertext research is applicable to the development of WWW information resources

  10. Enterprise Document Management

    Data.gov (United States)

    US Agency for International Development — The function of the operation is to provide e-Signature and document management support for Acquisition and Assisitance (A&A) documents including vouchers in...

  11. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  12. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  13. WIPP documentation plan

    International Nuclear Information System (INIS)

    Plung, D.L.; Montgomery, T.T.; Glasstetter, S.R.

    1986-01-01

    In support of the programs at the Waste Isolation Pilot Plant (WIPP), the Publications and Procedures Section developed a documentation plan that provides an integrated document hierarchy; further, this plan affords several unique features: 1) the format for procedures minimizes the writing responsibilities of the technical staff and maximizes use of the writing and editing staff; 2) review cycles have been structured to expedite the processing of documents; and 3) the numbers of documents needed to support the program have been appreciably reduced

  14. MRI usage in a pediatric emergency department: an analysis of usage and usage trends over 5 years

    Energy Technology Data Exchange (ETDEWEB)

    Scheinfeld, Meir H. [Montefiore Medical Center, Albert Einstein College of Medicine, Department of Radiology, Division of Emergency Radiology, Bronx, NY (United States); Moon, Jee-Young; Wang, Dan [Albert Einstein College of Medicine, Department of Epidemiology and Population Health, Bronx, NY (United States); Fagan, Michele J. [Montefiore Medical Center, Albert Einstein College of Medicine, Department of Pediatrics, Division of Emergency Medicine, Bronx, NY (United States); Davoudzadeh, Reubin [Montefiore Medical Center, Department of Radiology, Bronx, NY (United States); Taragin, Benjamin H. [Montefiore Medical Center, Albert Einstein College of Medicine, Department of Radiology, Division of Pediatric Radiology, Bronx, NY (United States)

    2017-03-15

    Magnetic resonance imaging (MRI) usage has anecdotally increased due to the principles of ALARA and the desire to Image Gently. Aside from a single abstract in the emergency medicine literature, pediatric emergency department MRI usage has not been described. Our objective was to determine whether MRI use is indeed increasing at a high-volume urban pediatric emergency department with 24/7 MRI availability. Also, we sought to determine which exams, time periods and demographics influenced the trend. Institutional Review Board exemption was obtained. Emergency department patient visit and exam data were obtained from the hospital database for the 2011-2015 time period. MRI usage data were normalized using emergency department patient visit data to determine usage rates. The z-test was used to compare MRI use by gender. The chi-square test was used to test for trends in MRI usage during the study period and in patient age. MRI usage for each hour and each weekday were tabulated to determine peak and trough usage times. MRI usage rate per emergency department patient visit was 0.36%. Headache, pain and rule-out appendicitis were the most common indications for neuroradiology, musculoskeletal and trunk exams, respectively. Usage in female patients was significantly greater than in males (0.42% vs. 0.29%, respectively, P<0.001). Usage significantly increased during the 5-year period (P<0.001). Use significantly increased from age 3 to 17 (0.011% to 1.1%, respectively, P<0.001). Sixty percent of exams were performed after-hours, the highest volume during the 10 p.m. hour and lowest between 4 a.m. and 9 a.m. MRI use was highest on Thursdays and lowest on Sundays (MRI on 0.45% and 0.22% of patients, respectively). MRI use in children increased during the study period, most notably in females, on weekdays and after-hours. (orig.)

  15. Documenting Employee Conduct

    Science.gov (United States)

    Dalton, Jason

    2009-01-01

    One of the best ways for a child care program to lose an employment-related lawsuit is failure to document the performance of its employees. Documentation of an employee's performance can provide evidence of an employment-related decision such as discipline, promotion, or discharge. When properly implemented, documentation of employee performance…

  16. Documents preparation and review

    International Nuclear Information System (INIS)

    1999-01-01

    Ignalina Safety Analysis Group takes active role in assisting regulatory body VATESI to prepare various regulatory documents and reviewing safety reports and other documentation presented by Ignalina NPP in the process of licensing of unit 1. The list of main documents prepared and reviewed is presented

  17. Forensic document analysis using scanning microscopy

    Science.gov (United States)

    Shaffer, Douglas K.

    2009-05-01

    The authentication and identification of the source of a printed document(s) can be important in forensic investigations involving a wide range of fraudulent materials, including counterfeit currency, travel and identity documents, business and personal checks, money orders, prescription labels, travelers checks, medical records, financial documents and threatening correspondence. The physical and chemical characterization of document materials - including paper, writing inks and printed media - is becoming increasingly relevant for law enforcement agencies, with the availability of a wide variety of sophisticated commercial printers and copiers which are capable of producing fraudulent documents of extremely high print quality, rendering these difficult to distinguish from genuine documents. This paper describes various applications and analytical methodologies using scanning electron miscoscopy/energy dispersive (x-ray) spectroscopy (SEM/EDS) and related technologies for the characterization of fraudulent documents, and illustrates how their morphological and chemical profiles can be compared to (1) authenticate and (2) link forensic documents with a common source(s) in their production history.

  18. Ectodermal dysplasia in identical twins

    Directory of Open Access Journals (Sweden)

    Gurkar Haraswarupa Puttaraju

    2013-01-01

    Full Text Available Hereditary hypohidrotic ectodermal dysplasia (HED is typically inherited as an X-linked recessive trait, characterized by deformity of at least two or more of the ectodermal structures - hair, teeth, nails and sweat glands. Two cases of hereditary HED involving identical male twins, is being documented for the rarity of its occurrence with special attention given to genetics, pathophysiology, clinical, intraoral manifestations and to the methods to improve the masticatory function, the facial esthetics and psychology of patients affected by this disease.

  19. Problematic Internet Usage of ICT Teachers

    Science.gov (United States)

    Gunduz, Semseddin

    2017-01-01

    Information and communication technologies (ICT) have affected all area in a society. Human can learn quickly and accurately from the internet. The aim of this study was to investigate what the problematic internet usage of ICT teachers. Therefore, the present study investigated the problematic internet usage, who worked as an ICT teacher in…

  20. Neurotic Anxiety, Pronoun Usage, and Stress

    Science.gov (United States)

    Alban, Lewis Sigmund; Groman, William D.

    1976-01-01

    Attempts to clarify the function of a particular aspect of verbal communication, pronoun usage, by (a) using a Gestalt Therapy theory conceptual framework and (b) experimentally focusing on the relationship of pronoun usage to neurotic anxiety and emotional stress. (Author/RK)

  1. Library training to promote electronic resource usage

    DEFF Research Database (Denmark)

    Frandsen, Tove Faber; Tibyampansha, Dativa; Ibrahim, Glory

    2017-01-01

    Purpose: Increasing the usage of electronic resources is an issue of concern for many libraries all over the world. Several studies stress the importance of information literacy and instruction in order to increase the usage. Design/methodology/approach: The present article presents the results...

  2. Definite Article Usage across Varieties of English

    Science.gov (United States)

    Wahid, Ridwan

    2013-01-01

    This paper seeks to explore the extent of definite article usage variation in several varieties of English based on a classification of its usage types. An annotation scheme based on Hawkins and Prince was developed for this purpose. Using matching corpus data representing Inner Circle varieties and Outer Circle varieties, analysis was made on…

  3. Starlink Document Styles

    Science.gov (United States)

    Lawden, M. D.

    This document describes the various styles which are recommended for Starlink documents. It also explains how to use the templates which are provided by Starlink to help authors create documents in a standard style. This paper is concerned mainly with conveying the ``look and feel" of the various styles of Starlink document rather than describing the technical details of how to produce them. Other Starlink papers give recommendations for the detailed aspects of document production, design, layout, and typography. The only style that is likely to be used by most Starlink authors is the Standard style.

  4. Subject (of documents)

    DEFF Research Database (Denmark)

    Hjørland, Birger

    2017-01-01

    This article presents and discuss the concept “subject” or subject matter (of documents) as it has been examined in library and information science (LIS) for more than 100 years. Different theoretical positions are outlined and it is found that the most important distinction is between document......-oriented views versus request-oriented views. The document-oriented view conceive subject as something inherent in documents, whereas the request-oriented view (or the policy based view) understand subject as an attribution made to documents in order to facilitate certain uses of them. Related concepts...

  5. Limited usage of mechanical equipment in small-scale rice farming: a cause for concern

    Directory of Open Access Journals (Sweden)

    Gaudiose Mujawamariya

    2017-06-01

    Full Text Available The role of mechanization in agriculture is well documented in terms of improving productivity of farm labour and land and sustaining income status and welfare of small-scale farmers. In rice production, there is a high cost associated with labour intensive production practices especially in land preparation, weeding and harvesting, the limited adoption of mechanical equipment in these operations remains an issue of concern. The current study investigates the usage of mechanical equipment in a setting where majority of farmers are exposed to technologies but cases of non-usage/adoption are observed. The choice of usage of mechanical equipment is analysed through probit and poisson models. Mechanization generally has a positive effect on production. However, the cost associated with its usage high. The equipment should be made available and affordable to farmers especially because demand for rent is not met. Awareness is essential for adoption and ease of use of mechanization.

  6. MESUR metrics from scholarly usage of resources

    CERN Document Server

    CERN. Geneva; Van de Sompel, Herbert

    2007-01-01

    Usage data is increasingly regarded as a valuable resource in the assessment of scholarly communication items. However, the development of quantitative, usage-based indicators of scholarly impact is still in its infancy. The Digital Library Research & Prototyping Team at the Los Alamos National Laboratory's Research library has therefore started a program to expand the set of usage-based tools for the assessment of scholarly communication items. The two-year MESUR project, funded by the Andrew W. Mellon Foundation, aims to define and validate a range of usage-based impact metrics, and issue guidelines with regards to their characteristics and proper application. The MESUR project is constructing a large-scale semantic model of the scholarly community that seamlessly integrates a wide range of bibliographic, citation and usage data. Functioning as a reference data set, this model is analyzed to characterize the intricate networks of typed relationships that exist in the scholarly community. The resulting c...

  7. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  8. National Childcare Consumer Study: 1975. Volume IV: Supplemental Documentation.

    Science.gov (United States)

    Unco, Inc., Washington, DC.

    This document is the fourth and final report of a study sponsored by the Office of Child Development of the U.S. Department of Health, Education and Welfare to determine patterns of child care usage and related consumer preferences, attitudes and opinions about child care. The study was based on 4609 personal interviews conducted in 1975 from a…

  9. Constructing and enforcing "authentic" identity online: Facebook, real names, and non-normative identities

    OpenAIRE

    Haimson, Oliver L.; Hoffmann, Anna Lauren

    2016-01-01

    Despite the participatory and democratic promises of Web 2.0, many marginalized individuals with fluid or non-normative identities continue to struggle to represent themselves online. Facebook users, in particular, are told to use “authentic identities,” an idea reinforced throughout the site’s documentation, “real name” and other policies, and in public statements by company representatives. Facebook’s conception of authenticity and real names, however, has created problems for certain users...

  10. 31 CFR 501.724 - Documents that may be withheld.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Documents that may be withheld. 501.724 Section 501.724 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... privileged; (2) The document would disclose the identity of a confidential source; or (3) The Administrative...

  11. 49 CFR 237.155 - Documents and records.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION BRIDGE SAFETY STANDARDS Documentation, Records, and Audits of Bridge Management Programs § 237.155 Documents and records. Each track owner required to implement a bridge management... protected by a security system that incorporates a user identity and password, or a comparable method, to...

  12. Positive selection for unpreferred codon usage in eukaryotic genomes

    Directory of Open Access Journals (Sweden)

    Galagan James E

    2007-07-01

    Full Text Available Abstract Background Natural selection has traditionally been understood as a force responsible for pushing genes to states of higher translational efficiency, whereas lower translational efficiency has been explained by neutral mutation and genetic drift. We looked for evidence of directional selection resulting in increased unpreferred codon usage (and presumably reduced translational efficiency in three divergent clusters of eukaryotic genomes using a simple optimal-codon-based metric (Kp/Ku. Results Here we show that for some genes natural selection is indeed responsible for causing accelerated unpreferred codon substitution, and document the scope of this selection. In Cryptococcus and to a lesser extent Drosophila, we find many genes showing a statistically significant signal of selection for unpreferred codon usage in one or more lineages. We did not find evidence for this type of selection in Saccharomyces. The signal of positive selection observed from unpreferred synonymous codon substitutions is coincident in Cryptococcus and Drosophila with the distribution of upstream open reading frames (uORFs, another genic feature known to reduce translational efficiency. Functional enrichment analysis of genes exhibiting low Kp/Ku ratios reveals that genes in regulatory roles are particularly subject to this type of selection. Conclusion Through genome-wide scans, we find recent selection for unpreferred codon usage at approximately 1% of genetic loci in a Cryptococcus and several genes in Drosophila. Unpreferred codons can impede translation efficiency, and we find that genes with translation-impeding uORFs are enriched for this selection signal. We find that regulatory genes are particularly likely to be subject to selection for unpreferred codon usage. Given that expression noise can propagate through regulatory cascades, and that low translational efficiency can reduce expression noise, this finding supports the hypothesis that translational

  13. Challenges for future energy usage

    International Nuclear Information System (INIS)

    Rebhan, E.

    2009-01-01

    In the last 2000 years the world's population and the worldwide total energy consumption have been continuously increasing, at a rate even greater than exponential. By now a situation has been reached in which energy resources are running short, which for a long time have been treated as though they were almost inexhaustible. The ongoing growth of the world's population and a growing hunger for energy in underdeveloped and emerging countries imply that the yearly overall energy consumption will continue to grow, by about 1.6 percent every year so that it would have doubled by 2050. This massive energy consumption has led to and is progressively leading to severe changes in our environment and is threatening a climatic state that, for the last 10 000 years, has been unusually benign. The coincidence of the shortage of conventional energy resources with the hazards of an impending climate change is a dangerous threat to the well-being of all, but it is also a challenging opportunity for improvements in our energy usage. On a global scale, conventional methods such as the burning of coal, gas and oil or the use of nuclear fission will still dominate for some time. In their case, the challenge consists in making them more efficient and environmentally benign, and using them only where and when it is unavoidable. Alternative energies must be expanded and economically improved. Among these, promising techniques such as solar thermal and geothermal energy production should be promoted from a shadow existence and further advanced. New technologies, for instance nuclear fusion or transmutation of radioactive nuclear waste, are also quite promising. Finally, a careful analysis of the national and global energy flow systems and intelligent energy management, with emphasis on efficiency, overall effectiveness and sustainability, will acquire increasing importance. Thereby, economic viability, political and legal issues as well as moral aspects such as fairness to disadvantaged

  14. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  15. Health physics documentation

    International Nuclear Information System (INIS)

    Stablein, G.

    1980-01-01

    When dealing with radioactive material the health physicist receives innumerable papers and documents within the fields of researching, prosecuting, organizing and justifying radiation protection. Some of these papers are requested by the health physicist and some are required by law. The scope, quantity and deposit periods of the health physics documentation at the Karlsruhe Nuclear Research Center are presented and rationalizing methods discussed. The aim of this documentation should be the application of physics to accident prevention, i.e. documentation should protect those concerned and not the health physicist. (H.K.)

  16. CAED Document Repository

    Data.gov (United States)

    U.S. Environmental Protection Agency — Compliance Assurance and Enforcement Division Document Repository (CAEDDOCRESP) provides internal and external access of Inspection Records, Enforcement Actions, and...

  17. CFO Payment Document Management

    Data.gov (United States)

    US Agency for International Development — Paperless management will enable the CFO to create, store, and access various financial documents electronically. This capability will reduce time looking for...

  18. Immersion Suit Usage Within the RAAF

    Science.gov (United States)

    1992-01-01

    IMMERSION SUIT USED UVIC QDIS HOLDINGS 202. in 12 Sizes, held by ALSS 492SQN REQUIREMENTS No comment USAGE POLICY REFERENCE DIRAF) AAP 7215.004-1 (P3C...held by ALSS 492SQN. REQUIREMENTS No comment ISACE POLICY REFERENCE DIIAF) AAP 7215.004-1 (P3C Flight Manual) RAAF Supplement No 92 USAGE POUICY UVIC...TYPE P3C REFERENCE Telecon FLTLT Toft I I SQNfRESO AVMED Dated 22 Mar 91 IMMERSION SUIT USED UVIC QDIS HOLDINGS No comment REQUIREMENTS No comment USAGE

  19. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  20. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  1. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  2. Young, black, and connected: Facebook usage among African American college students.

    Science.gov (United States)

    Lee, E Bun

    2012-01-01

    This article examines the extent and intensity of Facebook usage among African American college students and investigates their reasons for using Facebook. As expected, 98% of students in the survey had a Facebook account, and a large number of Facebook “friends.” Younger users spent significantly more time on Facebook than older ones. Our findings underscore the importance of cultural influence for African American online users. Displaying photographs and personal interests on Facebook signals racial identity among African American college students. Personality traits, such as self-esteem, trust in people, satisfaction with university life, and racial identity, were not significant predictors on the time spent on Facebook.

  3. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  4. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  5. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  6. IDC System Specification Document.

    Energy Technology Data Exchange (ETDEWEB)

    Clifford, David J.

    2014-12-01

    This document contains the system specifications derived to satisfy the system requirements found in the IDC System Requirements Document for the IDC Reengineering Phase 2 project. Revisions Version Date Author/Team Revision Description Authorized by V1.0 12/2014 IDC Reengineering Project Team Initial delivery M. Harris

  7. INFCE plenary conference documents

    International Nuclear Information System (INIS)

    This document consists of the reports to the First INFCE Plenary Conference (November 1978) by the Working Groups a Plenary Conference of its actions and decisions, the Communique of the Final INFCE Plenary Conference (February 1980), and a list of all documents in the IAEA depository for INFCE

  8. Human Document Project

    NARCIS (Netherlands)

    de Vries, Jeroen; Abelmann, Leon; Manz, A; Elwenspoek, Michael Curt

    2012-01-01

    “The Human Document Project‿ is a project which tries to answer all of the questions related to preserving information about the human race for tens of generations of humans to come or maybe even for a future intelligence which can emerge in the coming thousands of years. This document mainly

  9. Reactive documentation system

    Science.gov (United States)

    Boehnlein, Thomas R.; Kramb, Victoria

    2018-04-01

    Proper formal documentation of computer acquired NDE experimental data generated during research is critical to the longevity and usefulness of the data. Without documentation describing how and why the data was acquired, NDE research teams lose capability such as their ability to generate new information from previously collected data or provide adequate information so that their work can be replicated by others seeking to validate their research. Despite the critical nature of this issue, NDE data is still being generated in research labs without appropriate documentation. By generating documentation in series with data, equal priority is given to both activities during the research process. One way to achieve this is to use a reactive documentation system (RDS). RDS prompts an operator to document the data as it is generated rather than relying on the operator to decide when and what to document. This paper discusses how such a system can be implemented in a dynamic environment made up of in-house and third party NDE data acquisition systems without creating additional burden on the operator. The reactive documentation approach presented here is agnostic enough that the principles can be applied to any operator controlled, computer based, data acquisition system.

  10. Problems of Usage Labelling in English Lexicography*

    African Journals Online (AJOL)

    ancies in the contextual usage labelling in the dictionaries were established and are discussed. ..... Likewise, the noun vagrant meaning 'a person who has no job .... tions: Proceedings of the 36th Conference of the American Translators ...

  11. College Student Credit Card Usage and Debt.

    Science.gov (United States)

    Rybka, Kathryn M.

    2001-01-01

    Provides an overview of the concerns related to credit card usage by college students. Offers information student affairs professionals can use to help college students make responsible choices. (Contains 26 references.) (GCP)

  12. Internet Usage and Academic Performance of Undergraduate ...

    African Journals Online (AJOL)

    Internet Usage and Academic Performance of Undergraduate Students in University of Ilorin, Nigeria. ... PROMOTING ACCESS TO AFRICAN RESEARCH. AFRICAN JOURNALS ... This study adopted descriptive survey method. Six faculties ...

  13. Usage Notes in the Oxford American Dictionary.

    Science.gov (United States)

    Berner, R. Thomas

    1981-01-01

    Compares the "Oxford American Dictionary" with the "American Heritage Dictionary." Examines the dictionaries' differences in philosophies of language, introductory essays, and usage notes. Concludes that the "Oxford American Dictionary" is too conservative, paternalistic, and dogmatic for the 1980s. (DMM)

  14. Fashion blogs: a study on how consumers’ attitude to fashion is influenced through fashion blog usage.

    OpenAIRE

    Hauge, Tone

    2010-01-01

    This thesis study: How consumers’ attitudes to fashion are influenced by fashion blog usage. Identifying some characteristics of the a-list fashion bloggers. The variables that are assumed to influence the domain of fashion blogs are expertise, authenticity, authority, social identity, private- and social self image. Fashion blogs was found to be an important source of influence, for some taking over the role of fashion magazines. All the variables studied were foun...

  15. Documentation: Records and Reports.

    Science.gov (United States)

    Akers, Michael J

    2017-01-01

    This article deals with documentation to include the beginning of documentation, the requirements of Good Manufacturing Practice reports and records, and the steps that can be taken to minimize Good Manufacturing Practice documentation problems. It is important to remember that documentation for 503a compounding involves the Formulation Record, Compounding Record, Standard Operating Procedures, Safety Data Sheets, etc. For 503b outsourcing facilities, compliance with Current Good Manufacturing Practices is required, so this article is applicable to them. For 503a pharmacies, one can see the development and modification of Good Manufacturing Practice and even observe changes as they are occurring in 503a documentation requirements and anticipate that changes will probably continue to occur. Copyright© by International Journal of Pharmaceutical Compounding, Inc.

  16. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  17. Application Examples for Handle System Usage

    Science.gov (United States)

    Toussaint, F.; Weigel, T.; Thiemann, H.; Höck, H.; Stockhause, M.; Lautenschlager, M.

    2012-12-01

    Besides the well-known DOI (Digital Object Identifiers) as a special form of Handles that resolve to scientific publications there are various other applications in use. Others perhaps are just not yet. We present some examples for the existing ones and some ideas for the future. The national German project C3-Grid provides a framework to implement a first solution for provenance tracing and explore unforeseen implications. Though project-specific, the high-level architecture is generic and represents well a common notion of data derivation. Users select one or many input datasets and a workflow software module (an agent in this context) to execute on the data. The output data is deposited in a repository to be delivered to the user. All data is accompanied by an XML metadata document. All input and output data, metadata and the workflow module receive Handles and are linked together to establish a directed acyclic graph of derived data objects and involved agents. Data that has been modified by a workflow module is linked to its predecessor data and the workflow module involved. Version control systems such as svn or git provide Internet access to software repositories using URLs. To refer to a specific state of the source code of for instance a C3 workflow module, it is sufficient to reference the URL to the svn revision or git hash. In consequence, individual revisions and the repository as a whole receive PIDs. Moreover, the revision specific PIDs are linked to their respective predecessors and become part of the provenance graph. Another example for usage of PIDs in a current major project is given in EUDAT (European Data Infrastructure) which will link scientific data of several research communities together. In many fields it is necessary to provide data objects at multiple locations for a variety of applications. To ensure consistency, not only the master of a data object but also its copies shall be provided with a PID. To verify transaction safety and to

  18. CNEA's quality system documentation

    International Nuclear Information System (INIS)

    Mazzini, M.M.; Garonis, O.H.

    1998-01-01

    Full text: To obtain an effective and coherent documentation system suitable for CNEA's Quality Management Program, we decided to organize the CNEA's quality documentation with : a- Level 1. Quality manual. b- Level 2. Procedures. c-Level 3. Qualities plans. d- Level 4: Instructions. e- Level 5. Records and other documents. The objective of this work is to present a standardization of the documentation of the CNEA's quality system of facilities, laboratories, services, and R and D activities. Considering the diversity of criteria and formats for elaboration the documentation by different departments, and since ultimately each of them generally includes the same quality management policy, we proposed the elaboration of a system in order to improve the documentation, avoiding unnecessary time wasting and costs. This will aloud each sector to focus on their specific documentation. The quality manuals of the atomic centers fulfill the rule 3.6.1 of the Nuclear Regulatory Authority, and the Safety Series 50-C/SG-Q of the International Atomic Energy Agency. They are designed by groups of competent and highly trained people of different departments. The normative procedures are elaborated with the same methodology as the quality manuals. The quality plans which describe the organizational structure of working group and the appropriate documentation, will asses the quality manuals of facilities, laboratories, services, and research and development activities of atomic centers. The responsibilities for approval of the normative documentation are assigned to the management in charge of the administration of economic and human resources in order to fulfill the institutional objectives. Another improvement aimed to eliminate unnecessary invaluable processes is the inclusion of all quality system's normative documentation in the CNEA intranet. (author) [es

  19. CloudMonitor: Profiling Power Usage

    OpenAIRE

    Smith, James William; Khajeh-Hosseini, Ali; Ward, Jonathan Stuart; Sommerville, Ian

    2012-01-01

    In Cloud Computing platforms the addition of hardware monitoring devices to gather power usage data can be impractical or uneconomical due to the large number of machines to be metered. CloudMonitor, a monitoring tool that can generate power models for software-based power estimation, can provide insights to the energy costs of deployments without additional hardware. Accurate power usage data leads to the possibility of Cloud providers creating a separate tariff for power and therefore incen...

  20. Tattoo inks in general usage contain nanoparticles

    DEFF Research Database (Denmark)

    Høgsberg, T; Löschner, Katrin; Löf, D

    2011-01-01

    the particle sizes in tattoo inks in general usage. Methods The particle size was measured by laser diffraction, electron microscopy and X-ray diffraction. Results The size of the pigments could be divided into three main classes. The black pigments were the smallest, the white pigments the largest...... in general usage is new and may contribute to the understanding of tattoo ink kinetics. How the body responds to NP tattoo pigments should be examined further....

  1. Considérations sur la Nécessité d’introduction des Dates Biométriques dans les Documents de Voyage

    Directory of Open Access Journals (Sweden)

    Bogdan Ciucă

    2009-06-01

    Full Text Available Identity theft has become a growth industry and organized crime threatens to trigger tradedisputes between countries of the world. Forgery of administrative documents, in particular paymentinstruments, documents of identity and travel documents are used for national and transnational criminalactivities. In the category of identity papers and travel bulletins are included identity, identity cards andpassports. The common goal of the biometric identification is followed to prevent the entry into theterritory of the States of the terrorists, drug traffickers, counterfeit cards, identity documents and travel.

  2. Feature Usage Explorer: Usage Monitoring and Visualization Tool in HTML5 Based Applications

    Directory of Open Access Journals (Sweden)

    Sarunas Marciuska

    2013-10-01

    Full Text Available Feature Usage Explorer is a JavaScript library, which automatically detects features in HTML5 based applications and monitors their usage. The collected information can be visualized in a Feature Usage Diagram, which is automatically generated from an input json file. Currently, the users of Feature Usage Explorer have to design their own tool in order to generate the json file from collected usage information. This option remains viable when using the library in order not to constraint the user’s choice of preferred data storage. Feature Usage Explorer can be reused in any HTML5 based applications where an understanding of how users interact with the system is required (i.e. user experience and usability studies, human computer interaction field, or requirement prioritization area.

  3. NILDE, Network Inter Library Document Exchange: An Italian Document Delivery System

    Science.gov (United States)

    Brunetti, F.; Gasperini, A.; Mangiaracina, S.

    2007-10-01

    This poster presents NILDE, a document delivery system supporting the exchange of documents via the internet. The system has been set up by the Central Library of the National Research Council of Bologna (Italy) in order to make use of new internet technology, to promote cooperation between Italian university libraries and research libraries, and to achieve quick response times in satisfying DD requests. The Arcetri Astrophysical Observatory Library was the first astronomical library to join the NILDE project from its earliest days in 2002. Many were the reasons for this choice: automation of the DD processes, security and reliability of the network, creation of usage statistics and reports, reduction of DD System management costs and so on. This work describes the benefits of NILDE and discusses the role of an organized document delivery system as an important tool to cope with the difficult constraints of the publishing market.

  4. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  5. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  6. Self and social identity

    NARCIS (Netherlands)

    Ellemers, N; Spears, R; Doosje, B

    2002-01-01

    In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand,

  7. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  8. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  9. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  10. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  11. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  12. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns

    OpenAIRE

    Soo-Hyun Paik; Hyun Cho; Ji-Won Chun; Jo-Eun Jeong; Dai-Jin Kim

    2017-01-01

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smart...

  13. Avec Orima - Designing the brand identity

    OpenAIRE

    Nguyen Le Quynh, Nga; Carvalho, Maria Clara da Costa

    2016-01-01

    The thesis is a document in building the brand image for the authors’ own start-up Avec Orima. It is motivated by the need to take the company from the planning stage to the next very first step of implementing the business – designing the company’s brand identity. The thesis focused on the process of designing the brand identity. The process began with analysing the company and Finnish target market to have the insights on what the company stands for and wants to achieve. The study then ...

  14. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  16. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  17. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  18. TRANSPORTATION SYSTEM REQUIREMENTS DOCUMENT

    International Nuclear Information System (INIS)

    2004-01-01

    This document establishes the Transportation system requirements for the U.S. Department of Energy's (DOE's) Civilian Radioactive Waste Management System (CRWMS). These requirements are derived from the Civilian Radioactive Waste Management System Requirements Document (CRD). The Transportation System Requirements Document (TSRD) was developed in accordance with LP-3.1Q-OCRWM, Preparation, Review, and Approval of Office of National Transportation Level-2 Baseline Requirements. As illustrated in Figure 1, the TSRD forms a part of the DOE Office of Civilian Radioactive Waste Management (OCRWM) Technical Baseline

  19. Applications for electronic documents

    International Nuclear Information System (INIS)

    Beitel, G.A.

    1995-01-01

    This paper discusses the application of electronic media to documents, specifically Safety Analysis Reports (SARs), prepared for Environmental Restoration and Waste Management (ER ampersand WM) programs being conducted for the Department of Energy (DOE) at the Idaho National Engineering Laboratory (INEL). Efforts are underway to upgrade our document system using electronic format. To satisfy external requirements (DOE, State, and Federal), ER ampersand WM programs generate a complement of internal requirements documents including a SAR and Technical Safety Requirements along with procedures and training materials. Of interest, is the volume of information and the difficulty in handling it. A recently prepared ER ampersand WM SAR consists of 1,000 pages of text and graphics; supporting references add 10,000 pages. Other programmatic requirements documents consist of an estimated 5,000 pages plus references

  20. Informational system. Documents management

    Directory of Open Access Journals (Sweden)

    Vladut Iacob

    2009-12-01

    Full Text Available Productivity growing, as well as reducing of operational costs in a company can be achieved by adopting a document management solutions. Such application will allow management and structured and efficient transmission of information within the organization.

  1. Transportation System Requirements Document

    International Nuclear Information System (INIS)

    1993-09-01

    This Transportation System Requirements Document (Trans-SRD) describes the functions to be performed by and the technical requirements for the Transportation System to transport spent nuclear fuel (SNF) and high-level radioactive waste (HLW) from Purchaser and Producer sites to a Civilian Radioactive Waste Management System (CRWMS) site, and between CRWMS sites. The purpose of this document is to define the system-level requirements for Transportation consistent with the CRWMS Requirement Document (CRD). These requirements include design and operations requirements to the extent they impact on the development of the physical segments of Transportation. The document also presents an overall description of Transportation, its functions, its segments, and the requirements allocated to the segments and the system-level interfaces with Transportation. The interface identification and description are published in the CRWMS Interface Specification

  2. Integrated Criteria Document Chromium

    NARCIS (Netherlands)

    Slooff W; Cleven RFMJ; Janus JA; van der Poel P; van Beelen P; Boumans LJM; Canton JH; Eerens HC; Krajnc EI; de Leeuw FAAM; Matthijsen AJCM; van de Meent D; van der Meulen A; Mohn GR; Wijland GC; de Bruijn PJ; van Keulen A; Verburgh JJ; van der Woerd KF

    1990-01-01

    Betreft de engelse versie van rapport 758701001
    Bij dit rapport behoort een appendix onder hetzelfde nummer getiteld: "Integrated Criteria Document Chromium: Effects" Auteurs: Janus JA; Krajnc EI
    (appendix: see 710401002A)

  3. NCDC Archive Documentation Manuals

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The National Climatic Data Center Tape Deck Documentation library is a collection of over 400 manuals describing NCDC's digital holdings (both historic and current)....

  4. Registration document 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This reference document of Gaz de France provides information and data on the Group activities in 2005: financial informations, business, activities, equipments factories and real estate, trade, capital, organization charts, employment, contracts and research programs. (A.L.B.)

  5. Are PDF Documents Accessible?

    Directory of Open Access Journals (Sweden)

    Mireia Ribera Turró

    2008-09-01

    Full Text Available Adobe PDF is one of the most widely used formats in scientific communications and in administrative documents. In its latest versions it has incorporated structural tags and improvements that increase its level of accessibility. This article reviews the concept of accessibility in the reading of digital documents and evaluates the accessibility of PDF according to the most widely established standards.

  6. 2002 reference document

    International Nuclear Information System (INIS)

    2002-01-01

    This 2002 reference document of the group Areva, provides information on the society. Organized in seven chapters, it presents the persons responsible for the reference document and for auditing the financial statements, information pertaining to the transaction, general information on the company and share capital, information on company operation, changes and future prospects, assets, financial position, financial performance, information on company management and executive board and supervisory board, recent developments and future prospects. (A.L.B.)

  7. LCS Content Document Application

    Science.gov (United States)

    Hochstadt, Jake

    2011-01-01

    My project at KSC during my spring 2011 internship was to develop a Ruby on Rails application to manage Content Documents..A Content Document is a collection of documents and information that describes what software is installed on a Launch Control System Computer. It's important for us to make sure the tools we use everyday are secure, up-to-date, and properly licensed. Previously, keeping track of the information was done by Excel and Word files between different personnel. The goal of the new application is to be able to manage and access the Content Documents through a single database backed web application. Our LCS team will benefit greatly with this app. Admin's will be able to login securely to keep track and update the software installed on each computer in a timely manner. We also included exportability such as attaching additional documents that can be downloaded from the web application. The finished application will ease the process of managing Content Documents while streamlining the procedure. Ruby on Rails is a very powerful programming language and I am grateful to have the opportunity to build this application.

  8. Documentation of spectrom-32

    International Nuclear Information System (INIS)

    Callahan, G.D.; Fossum, A.F.; Svalstad, D.K.

    1989-01-01

    SPECTROM-32 is a finite element program for analyzing two-dimensional and axisymmetric inelastic thermomechanical problems related to the geological disposal of nuclear waste. The code is part of the SPECTROM series of special-purpose computer programs that are being developed by RE/SPEC Inc. to address many unique rock mechanics problems encountered in analyzing radioactive wastes stored in geologic formations. This document presents the theoretical basis for the mathematical models, the finite element formulation and solution procedure of the program, a description of the input data for the program, verification problems, and details about program support and continuing documentation. The computer code documentation is intended to satisfy the requirements and guidelines outlined in the document entitled Final Technical Position on Documentation of Computer Codes for High-Level Waste Management. The principal component models used in the program involve thermoelastic, thermoviscoelastic, thermoelastic-plastic, and thermoviscoplastic types of material behavior. Special material considerations provide for the incorporation of limited-tension material behavior and consideration of jointed material behavior. Numerous program options provide the capabilities for various boundary conditions, sliding interfaces, excavation, backfill, arbitrary initial stresses, multiple material domains, load incrementation, plotting database storage and access of results, and other features unique to the geologic disposal of radioactive wastes. Numerous verification problems that exercise many of the program options and illustrate the required data input and printed results are included in the documentation

  9. Technical approach document

    International Nuclear Information System (INIS)

    1988-04-01

    This document describes the general technical approaches and design criteria adopted by the US Department of Energy (DOE) in order to implement Remedial Action Plans (RAPs) and final designs that comply with EPS standards. This document is a revision to the original document. Major revisions were made to the sections in riprap selection and sizing, and ground-water; only minor revisions were made to the remainder of the document. The US Nuclear Regulatory Commission (NRC) has prepared a Standard Review Plan (NRC-SRP) which describes factors to be considered by the NRC in approving the RAP. Sections 3.0, 4.0, 5.0, and 7.0 of this document are arranged under the same headings as those used in the NRC-SRP. This approach is adopted in order to facilitate joint use of the documents. Section 2.0 (not included in the NRC-SRP) discusses design considerations; Section 3.0 describes surface-water hydrology and erosion control; Section 4.0 describes geotechnical aspects of pile design; Section 5.0 discusses the Alternate Site Selection Process; Section 6.0 deals with radiological issues (in particular, the design of the radon barrier); Section 7.0 discusses protection of groundwater resources; and Section 8.0 discusses site design criteria for the RAC

  10. Ethnobotanical survey of usage of fresh medicinal plants in Singapore.

    Science.gov (United States)

    Siew, Yin-Yin; Zareisedehizadeh, Sogand; Seetoh, Wei-Guang; Neo, Soek-Ying; Tan, Chay-Hoon; Koh, Hwee-Ling

    2014-09-29

    The use of medicinal plants in human health has been documented since ancient times and they provide a useful source of new therapeutics. In Singapore, despite the accessibility to modern healthcare, there still exist pockets of the population who choose to use locally grown fresh medicinal plants for health promotion and even therapeutic purposes. However to date, there is no published report of first-hand account of their usage in Singapore. As land is scarce and rapidly used for re-development, such important knowledge may be lost if not properly documented in time. This work safeguards the local folk knowledge, and provides information on common and scarcely reported fresh medicinal plants. The objective of this study is to gather information regarding the usage of fresh medicinal plants in Singapore through face-to-face interviews. Information on demographic data and plant-use methods were collated via face-to-face interviews of 200 fresh medicinal plant users who have used fresh medicinal plants in the last five years. The survey protocol was approved by the National University of Singapore Institutional Review Board and informed consent was obtained from every participant. A total of 414 plants represented by 104 plant species from 44 families were reportedly used by the 200 participants. The five most commonly used plants were Clinacanthus nutans (34 users), Strobilanthes crispus (31 users), Pereskia bleo (25 users), Aloe vera (18 users) and Zingiber officinale (16 users). Leaves were the most commonly used plant part while preparing a decoction was the most common method of preparation. The majority of interviewees used plants for general health purposes and to treat diseases related to the respiratory system and cancer. Our survey has successfully documented the rich wealth of traditional usage and knowledge on 414 fresh medicinal plants grown in Singapore through face-to-face interviews with 200 users. This study will serve as a useful resource for

  11. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  12. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  13. FTC advertising substantiation program. Household products manufacturers. Documentation of Toshiba America, Inc

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    The report contains documentation in support of claims that the Toshiba Microwave Oven can cook any and all types of food satisfactorily with a 75% savings in energy usage and cost, regardless of the size of a household. (Portions of this document are not fully legible) (Color illustrations reproduced in black and white)

  14. FTC advertising substantiation program. Household products manufacturers. Documentation of Hakuhodo Advertising America, Inc

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    The report contains documentation in support of claims that the Toshiba Microwave Oven can cook any and all types of food satisfactorily with a 75% savings in energy usage and cost, regardless of the size of a household. (Portions of this document are not fully legible)

  15. [Exploring nurse, usage effectiveness of mobile nursing station].

    Science.gov (United States)

    Chang, Fang-Mei; Lee, Ting-Ting

    2013-04-01

    A mobile nursing station is an innovative cart that integrates a wireless network, information technology devices, and online charts. In addition to improving clinical work and workflow efficiencies, data is integrated among different information systems and hardware devices to promote patient safety. This study investigated the effectiveness of mobile nursing cart use. We compared different distributions of nursing activity working samples to evaluate the nursing information systems in terms of interface usability and usage outcomes. There were two parts of this study. Part one used work sampling to collect nursing activity data necessary to compare a unit that used a mobile nursing cart (mobile group, n = 18) with another that did not (traditional group, n = 14). Part two applied a nursing information system interface usability questionnaire to survey the mobile unit with nurses who had used a mobile nursing station (including those who had worked in this unit as floating nurses) (n = 30) in order to explore interface usability and effectiveness. We found that using the mobile nursing station information system increased time spent on direct patient care and decreased time spent on indirect patient care and documentation. Results further indicated that participants rated interface usability as high and evaluated usage effectiveness positively. Comments made in the open-ended question section raised several points of concern, including problems / inadequacies related to hardware devices, Internet speed, and printing. This study indicates that using mobile nursing station can improve nursing activity distributions and that nurses hold generally positive attitudes toward mobile nursing station interface usability and usage effectiveness. The authors thus encourage the continued implementation of mobile nursing stations and related studies to further enhance clinical nursing care.

  16. ICT in University Education: Usage and Challenges among ...

    African Journals Online (AJOL)

    This study was a survey which explored ICT usage and challenges among academic staff. Thus, the main purpose of this study was to determine the areas of ICT usage among academic staff; identify the obstacles to their ICT usage and identify their areas of training need in ICT usage. Five research questions were posed ...

  17. Divided Identity: Part-Time Faculty in Public Colleges and Universities

    Science.gov (United States)

    Levin, John S.; Montero Hernandez, Virginia

    2014-01-01

    This article addresses the identity claims of part-time faculty at three types of higher education institutions. Using culture theory and professional identity theory, the article documents that part-time faculty members across institutions have a divided sense of identity. On the one hand, they perceive themselves as professionals based on their…

  18. "Being Asian American Is a Lot Different Here": Influences of Geography on Racial Identity

    Science.gov (United States)

    Chan, Jason

    2017-01-01

    Studies on college students' racial identities seldom focus on geographic context, despite existing research documenting its role in how racial groups construct and express racial identities. Drawing on theories of ecological systems and racial formation, I explored experiences of race and racial identity among 10 Asian American students who…

  19. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  20. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals...

  1. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    In our times, literary criticism, as well as larger political and cultural developments, is characterized by identity politics, meaning that our discourses are structured around the notion of different socially identifiable populations in society. In relation to literature, this results in our...... viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss......, in relation to Frye’s works, the idea that the primary identities of characters in literature were and, to a considerable extent, continue to be those of family-member identities. As such, literature should not be appropriated to a political context too readily. Whereas viewing characters in terms of...

  2. Music, culture and identity

    Directory of Open Access Journals (Sweden)

    Ilir Ramadani

    2017-03-01

    Full Text Available At the time of globalization it is difficult to pretend avoiding music culture and identity from political, cultural and social developments. Thus, it is impossible for the music to be unshakable and to represent national identity by not taking and giving nothing to culture. The dynamics of life and the rapid development of technology make it impossible for the culture to remain unaffected in terms of sharing experiences social experiences. Culture represents our current course, both in terms of politics, also in the social and human aspects. Through the technology it is possible for our children to be equal with children of all other countries, to exchange information and to connect directly with all countries of the world. Musical education is one of the main factors of cultural development and preservation of national identity. Identity consists of everything we posses and reflect. We are those who distinguish from each other and have a common denominator compared to other nations.

  3. Securing XML Documents

    Directory of Open Access Journals (Sweden)

    Charles Shoniregun

    2004-11-01

    Full Text Available XML (extensible markup language is becoming the current standard for establishing interoperability on the Web. XML data are self-descriptive and syntax-extensible; this makes it very suitable for representation and exchange of semi-structured data, and allows users to define new elements for their specific applications. As a result, the number of documents incorporating this standard is continuously increasing over the Web. The processing of XML documents may require a traversal of all document structure and therefore, the cost could be very high. A strong demand for a means of efficient and effective XML processing has posed a new challenge for the database world. This paper discusses a fast and efficient indexing technique for XML documents, and introduces the XML graph numbering scheme. It can be used for indexing and securing graph structure of XML documents. This technique provides an efficient method to speed up XML data processing. Furthermore, the paper explores the classification of existing methods impact of query processing, and indexing.

  4. Universality and Shannon entropy of codon usage

    CERN Document Server

    Frappat, L; Sciarrino, A; Sorba, Paul

    2003-01-01

    The distribution functions of the codon usage probabilities, computed over all the available GenBank data, for 40 eukaryotic biological species and 5 chloroplasts, do not follow a Zipf law, but are best fitted by the sum of a constant, an exponential and a linear function in the rank of usage. For mitochondriae the analysis is not conclusive. A quantum-mechanics-inspired model is proposed to describe the observed behaviour. These functions are characterized by parameters that strongly depend on the total GC content of the coding regions of biological species. It is predicted that the codon usage is the same in all exonic genes with the same GC content. The Shannon entropy for codons, also strongly depending on the exonic GC content, is computed.

  5. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...... different groups have distinctive conditions for meeting the obligation of forming a proactive learner identity and engage in lifelong learning prevalent in both national and transnational policies on lifelong learning....

  6. Developing Identity for Lawyers

    OpenAIRE

    Høedt-Rasmussen, Inger

    2014-01-01

    The role of the lawyer is in transition and the formerly predominantly homogeneous profes-sion has become a heterogeneous group of lawyers with diverging perceptions of the lawyer’s identity and of the main characteristics of the profession. The European Union has extended the perception of democracy and the fundamental rights to include more collective rights, social concerns, global responsibility and sustainability. The dissertation’s main question is: How can the identity and competen...

  7. The Usage of Loanwords by Japanese Learners and Their Background : case of English Native Speakers (Dedicated to the Memory of Dr. SASAKI Yoshinori)

    OpenAIRE

    堀切, 友紀子

    2010-01-01

    In the field of Teaching Japanese as a Second Language, the study of Japanese loanwords has focused on their acquisition, and Japanese loanwords tend to be an obstacle for Japanese learners. However, actual situations about loanword usage by English native speakers need to be identical. The purpose of this research is to understand the process involved in the cognition, emotion and usage of loanwords by Japanese learners. An investigatory interview was conducted with 11 Japanese learners who ...

  8. Integrating Condition Indicators and Usage Parameters for Improved Spiral Bevel Gear Health Monitoring

    Science.gov (United States)

    Dempsey, Paula J.; Handschuh, Robert F.; Delgado, Irebert, R.

    2013-01-01

    The objective of this study was to illustrate the importance of combining Health Usage Monitoring Systems (HUMS) data with usage monitoring system data when detecting rotorcraft transmission health. Three gear sets were tested in the NASA Glenn Spiral Bevel Gear Fatigue Rig. Damage was initiated and progressed on the gear and pinion teeth. Damage progression was measured by debris generation and documented with inspection photos at varying torque values. A contact fatigue analysis was applied to the gear design indicating the effect temperature, load and reliability had on gear life. Results of this study illustrated the benefits of combining HUMS data and actual usage data to indicate progression of damage for spiral bevel gears.

  9. Segmentation of complex document

    Directory of Open Access Journals (Sweden)

    Souad Oudjemia

    2014-06-01

    Full Text Available In this paper we present a method for segmentation of documents image with complex structure. This technique based on GLCM (Grey Level Co-occurrence Matrix used to segment this type of document in three regions namely, 'graphics', 'background' and 'text'. Very briefly, this method is to divide the document image, in block size chosen after a series of tests and then applying the co-occurrence matrix to each block in order to extract five textural parameters which are energy, entropy, the sum entropy, difference entropy and standard deviation. These parameters are then used to classify the image into three regions using the k-means algorithm; the last step of segmentation is obtained by grouping connected pixels. Two performance measurements are performed for both graphics and text zones; we have obtained a classification rate of 98.3% and a Misclassification rate of 1.79%.

  10. La Documentation photographique

    Directory of Open Access Journals (Sweden)

    Magali Hamm

    2009-03-01

    Full Text Available La Documentation photographique, revue destinée aux enseignants et étudiants en histoire-géographie, place l’image au cœur de sa ligne éditoriale. Afin de suivre les évolutions actuelles de la géographie, la collection propose une iconographie de plus en plus diversifiée : cartes, photographies, mais aussi caricatures, une de journal ou publicité, toutes étant considérées comme un document géographique à part entière. Car l’image peut se faire synthèse ; elle peut au contraire montrer les différentes facettes d’un objet ; souvent elle permet d’incarner des phénomènes géographiques. Associées à d’autres documents, les images aident les enseignants à initier leurs élèves à des raisonnements géographiques complexes. Mais pour apprendre à les lire, il est fondamental de les contextualiser, de les commenter et d’interroger leur rapport au réel.The Documentation photographique, magazine dedicated to teachers and students in History - Geography, places the image at the heart of its editorial line. In order to follow the evolutions of Geography, the collection presents a more and more diversified iconography: maps, photographs, but also drawings or advertisements, all this documents being considered as geographical ones. Because image can be a synthesis; on the contrary it can present the different facets of a same object; often it enables to portray geographical phenomena. Related to other documents, images assist the teachers in the students’ initiation to complex geographical reasoning. But in order to learn how to read them, it is fundamental to contextualize them, comment them and question their relations with reality.

  11. Motivations and usage patterns of Weibo.

    Science.gov (United States)

    Zhang, Lixuan; Pentina, Iryna

    2012-06-01

    Referred to as "Weibo," microblogging in China has witnessed an exponential growth. In addition to the Twitter-like functionality, Weibo allows rich media uploads into user feeds, provides threaded comments, and offers applications, games, and Weibo medals. This expanded functionality, as well as the observed differences in trending content, suggests potentially different user motivations to join Weibo and their usage patterns compared to Twitter. This pioneering study identifies dominant Weibo user motivations and their effects on usage patterns. We discuss the findings of an online survey of 234 Weibo users and suggest managerial implications and future research directions.

  12. Power factor regulation for household usage

    Science.gov (United States)

    Daud, Nik Ghazali Nik; Hashim, Fakroul Ridzuan; Tarmizi, Muhammad Haziq Ahmad

    2018-02-01

    Power factor regulator technology has recently drawn attention to the consumer and to power generation company in order for consumers to use electricity efficiently. Controlling of power factor for efficient usage can reduce the production of power in fulfilment demands hence reducing the greenhouse effect. This paper presents the design method of power factor controller for household usage. There are several methods to improve the power factor. The power factor controller used by this method is by using capacitors. Total harmonic distortion also has become a major problem for the reliability of the electrical appliances and techniques to control it will be discussed.

  13. TOWARDS A USAGE-BASED COGNITIVE PHONOLOGY

    Directory of Open Access Journals (Sweden)

    Gitten Kristiansen

    2006-12-01

    Full Text Available The usage-based conception of language is a major tenet in Cognitive Linguistics, but cognitive phonology has not yet been developed sufficiently in this direction. Often, phonemic analysis is carried out at the high level of abstraction of `a language´, disregarding rich patterns of languageinternal variation. This paper first argues that cognitive phonology must aim at a higher degree of descriptive refinement, especially in the direction of social variation. Then it goes on to examine the implications of a usage-based and multi-faceted model for a theoretical discussion of the phoneme as a prototype category.

  14. Customer Communication Document

    Science.gov (United States)

    2009-01-01

    This procedure communicates to the Customers of the Automation, Robotics and Simulation Division (AR&SD) Dynamics Systems Test Branch (DSTB) how to obtain services of the Six-Degrees-Of-Freedom Dynamic Test System (SDTS). The scope includes the major communication documents between the SDTS and its Customer. It established the initial communication and contact points as well as provides the initial documentation in electronic media for the customer. Contact the SDTS Manager (SM) for the names of numbers of the current contact points.

  15. Some aspects of programmable digital systems usage in nuclear power plants

    International Nuclear Information System (INIS)

    Mandic, D.; Smolej, M.; Sucic, B.

    2004-01-01

    During the operation of the NPP Krsko - NEK and other nuclear power plants, it has been recognized that certain issues related to the usage of digital equipment and associated software in NPP technological process protection, control and monitoring, are usually not adequately addressed in the existing programs and procedures. Moreover, often the problems related to the programmable digital systems usage are not understood correctly, which means that they can not be treated properly. Owing to the specifics of the programmable digital systems usage they have to be treated in a different way than other plant equipment and related documentation. The term as well as the process of Process Computers Configuration Control was introduced to control, among other issues, three 10CFR50 Appendix B quality requirements related to the Process Computers application in NPP: Design Control, Document Control, Identification and Control of Materials, Parts and Components. Based on the experience from NEK and published experience from other NPP and other organizations, this paper sheds light on specifics of the programmable digital systems usage in nuclear power plants. The wording Programmable Digital Systems was used rather than Process Computers, to emphasize wide area of applicability of this term: from simple digital components with burned-in programs to the PLC (Programmable Logic Controllers) and large process computer systems. In order to satisfy requirements of the Process Computer Configuration Control, specific characteristics and specific problems related to the usage of programmable digital systems require specific treatment of these issues. This paper describes those specific characteristics and traditional misunderstandings, false beliefs, false expectations and common errors that are most frequently committed in the life cycle of the programmable digital systems, as well as consequences and problems that could develop. The paper also refers to the regulations, industry

  16. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  17. Documents on Disarmament.

    Science.gov (United States)

    Arms Control and Disarmament Agency, Washington, DC.

    This publication, latest in a series of volumes issued annually since 1960, contains primary source documents on arms control and disarmament developments during 1969. The main chronological arrangement is supplemented by both chronological and topical lists of contents. Other reference aids include a subject/author index, and lists of…

  18. ROOT Reference Documentation

    CERN Document Server

    Fuakye, Eric Gyabeng

    2017-01-01

    A ROOT Reference Documentation has been implemented to generate all the lists of libraries needed for each ROOT class. Doxygen has no option to generate or add the lists of libraries for each ROOT class. Therefore shell scripting and a basic C++ program was employed to import the lists of libraries needed by each ROOT class.

  19. Client Oriented Management Documents.

    Science.gov (United States)

    Limaye, Mohan R.; Hightower, Rick

    Noting that accounting reports, including management advisory service (MAS) studies, reports on internal control, and tax memoranda, often appear rather dense and heavy in style--partly because of the legal environment's demand for careful expression and partly because such documents convey very complex information--this paper presents four…

  20. Using Primary Source Documents.

    Science.gov (United States)

    Mintz, Steven

    2003-01-01

    Explores the use of primary sources when teaching about U.S. slavery. Includes primary sources from the Gilder Lehrman Documents Collection (New York Historical Society) to teach about the role of slaves in the Revolutionary War, such as a proclamation from Lord Dunmore offering freedom to slaves who joined his army. (CMK)

  1. QA programme documentation

    International Nuclear Information System (INIS)

    Scheibelt, L.

    1980-01-01

    The present paper deals with the following topics: The need for a documented Q.A. program; Establishing a Q.A. program; Q.A. activities; Fundamental policies; Q.A. policies; Quality objectives Q.A. manual. (orig./RW)

  2. Student Problems with Documentation.

    Science.gov (United States)

    Freimer, Gloria R.; Perry, Margaret M.

    1986-01-01

    Interviews with faculty, a survey of 20 students, and examination of style manuals revealed that students are confused by inconsistencies in and multiplicity of styles when confronted with writing and documenting a research paper. Librarians are urged to teach various citation formats and work for adoption of standardization. (17 references) (EJS)

  3. Documentation of spectrom-41

    International Nuclear Information System (INIS)

    Svalstad, D.K.

    1989-01-01

    SPECTROM-41 is a finite element heat transfer computer program developed to analyze thermal problems related to nuclear waste disposal. The code is part of the SPECTROM (Special Purpose Engineering Codes for Thermal/ROck Mechanics) series of special purpose finite element programs that are continually being developed by RE/SPEC Inc. (RSI) to address the many unique formations. This document presents the theoretical basis for the mathematical model, the finite element formulation of the program, and a description of the input data for the program, along with details about program support and continuing documentation. The documentation is intended to satisfy the requirements and guidelines outlined in NUREG-0856. The principal component model used in the programs based on Fourier's law of conductance. Numerous program options provide the capability of considering various boundary conditions, material stratification and anisotropy, and time-dependent heat generation that are characteristic of problems involving the disposal of nuclear waste in geologic formation. Numerous verification problems are included in the documentation in addition to highlights of past and ongoing verification and validation efforts. A typical repository problem is solving using SPECTROM-41 to demonstrate the use of the program in addressing problems related to the disposal of nuclear waste

  4. Text document classification

    Czech Academy of Sciences Publication Activity Database

    Novovičová, Jana

    č. 62 (2005), s. 53-54 ISSN 0926-4981 R&D Projects: GA AV ČR IAA2075302; GA AV ČR KSK1019101; GA MŠk 1M0572 Institutional research plan: CEZ:AV0Z10750506 Keywords : document representation * categorization * classification Subject RIV: BD - Theory of Information

  5. Course documentation report

    DEFF Research Database (Denmark)

    Buus, Lillian; Bygholm, Ann; Walther, Tina Dyngby Lyng

    A documentation report on the three pedagogical courses developed during the MVU project period. The report describes the three processes taking departure in the structure and material avaiable at the virtual learning environment. Also the report describes the way the two of the courses developed...

  6. Extremely secure identification documents

    International Nuclear Information System (INIS)

    Tolk, K.M.; Bell, M.

    1997-09-01

    The technology developed in this project uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals or alter existing documents to allow their use by unauthorized individuals. This process can be used to produce many types of identification documents with much higher security than any currently in use. The system is demonstrated using a security badge as an example. This project focused on the technologies requiring development in order to make the approach viable with existing badge printing and laminating technologies. By far the most difficult was the image processing required to verify that the picture on the badge had not been altered. Another area that required considerable work was the high density printed data storage required to get sufficient data on the badge for verification of the picture. The image processing process was successfully tested, and recommendations are included to refine the badge system to ensure high reliability. A two dimensional data array suitable for printing the required data on the badge was proposed, but testing of the readability of the array had to be abandoned due to reallocation of the budgeted funds by the LDRD office

  7. Documents and legal texts

    International Nuclear Information System (INIS)

    2017-01-01

    This section treats of the following documents and legal texts: 1 - Belgium 29 June 2014 - Act amending the Act of 22 July 1985 on Third-Party Liability in the Field of Nuclear Energy; 2 - Belgium, 7 December 2016. - Act amending the Act of 22 July 1985 on Third-Party Liability in the Field of Nuclear Energy

  8. Document clustering methods, document cluster label disambiguation methods, document clustering apparatuses, and articles of manufacture

    Science.gov (United States)

    Sanfilippo, Antonio [Richland, WA; Calapristi, Augustin J [West Richland, WA; Crow, Vernon L [Richland, WA; Hetzler, Elizabeth G [Kennewick, WA; Turner, Alan E [Kennewick, WA

    2009-12-22

    Document clustering methods, document cluster label disambiguation methods, document clustering apparatuses, and articles of manufacture are described. In one aspect, a document clustering method includes providing a document set comprising a plurality of documents, providing a cluster comprising a subset of the documents of the document set, using a plurality of terms of the documents, providing a cluster label indicative of subject matter content of the documents of the cluster, wherein the cluster label comprises a plurality of word senses, and selecting one of the word senses of the cluster label.

  9. Technical approach document

    International Nuclear Information System (INIS)

    1989-12-01

    The Uranium Mill Tailings Radiation Control Act (UMTRCA) of 1978, Public Law 95-604 (PL95-604), grants the Secretary of Energy the authority and responsibility to perform such actions as are necessary to minimize radiation health hazards and other environmental hazards caused by inactive uranium mill sites. This Technical Approach Document (TAD) describes the general technical approaches and design criteria adopted by the US Department of Energy (DOE) in order to implement remedial action plans (RAPS) and final designs that comply with EPA standards. It does not address the technical approaches necessary for aquifer restoration at processing sites; a guidance document, currently in preparation, will describe aquifer restoration concerns and technical protocols. This document is a second revision to the original document issued in May 1986; the revision has been made in response to changes to the groundwater standards of 40 CFR 192, Subparts A--C, proposed by EPA as draft standards. New sections were added to define the design approaches and designs necessary to comply with the groundwater standards. These new sections are in addition to changes made throughout the document to reflect current procedures, especially in cover design, water resources protection, and alternate site selection; only minor revisions were made to some of the sections. Sections 3.0 is a new section defining the approach taken in the design of disposal cells; Section 4.0 has been revised to include design of vegetated covers; Section 8.0 discusses design approaches necessary for compliance with the groundwater standards; and Section 9.0 is a new section dealing with nonradiological hazardous constituents. 203 refs., 18 figs., 26 tabs

  10. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  11. Web Approach for Ontology-Based Classification, Integration, and Interdisciplinary Usage of Geoscience Metadata

    Directory of Open Access Journals (Sweden)

    B Ritschel

    2012-10-01

    Full Text Available The Semantic Web is a W3C approach that integrates the different sources of semantics within documents and services using ontology-based techniques. The main objective of this approach in the geoscience domain is the improvement of understanding, integration, and usage of Earth and space science related web content in terms of data, information, and knowledge for machines and people. The modeling and representation of semantic attributes and relations within and among documents can be realized by human readable concept maps and machine readable OWL documents. The objectives for the usage of the Semantic Web approach in the GFZ data center ISDC project are the design of an extended classification of metadata documents for product types related to instruments, platforms, and projects as well as the integration of different types of metadata related to data product providers, users, and data centers. Sources of content and semantics for the description of Earth and space science product types and related classes are standardized metadata documents (e.g., DIF documents, publications, grey literature, and Web pages. Other sources are information provided by users, such as tagging data and social navigation information. The integration of controlled vocabularies as well as folksonomies plays an important role in the design of well formed ontologies.

  12. Production, Usage, and Comprehension in Animal Vocalizations

    Science.gov (United States)

    Seyfarth, Robert M.; Cheney, Dorothy L.

    2010-01-01

    In this review, we place equal emphasis on production, usage, and comprehension because these components of communication may exhibit different developmental trajectories and be affected by different neural mechanisms. In the animal kingdom generally, learned, flexible vocal production is rare, appearing in only a few orders of birds and few…

  13. Statistical Measures for Usage-Based Linguistics

    Science.gov (United States)

    Gries, Stefan Th.; Ellis, Nick C.

    2015-01-01

    The advent of usage-/exemplar-based approaches has resulted in a major change in the theoretical landscape of linguistics, but also in the range of methodologies that are brought to bear on the study of language acquisition/learning, structure, and use. In particular, methods from corpus linguistics are now frequently used to study distributional…

  14. Twitter Usage of Universities in Turkey

    Science.gov (United States)

    Yolcu, Ozgu

    2013-01-01

    Universities are among the users of the most popular social media networks. Usage of social media by especially students and many other people and institutions, which constitutes the target audience for universities, encourages the universities to effectively use this environment. Twitter is among these social media networks which facilitate the…

  15. Student Time Usage during Fall Reading Week

    Science.gov (United States)

    Cramer, Ken; Pschibul, Rebecca

    2017-01-01

    The present study investigated the time usage and levels of perceived stress, academic workload, and recreation time for 177 students at the University of Windsor before, during, and after Fall Reading Week (FRW). Over a three-week span (at various times of the day), students received a message to their smartphone to complete a 20-second survey…

  16. College Student Performance and Credit Card Usage.

    Science.gov (United States)

    Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd Starr

    2001-01-01

    Examines the relationship between credit card usage, employment, and academic performance among a group of college students with credit cards. Results reveal that the students differed significantly in the level of anxiety felt from carrying debt, perceived need to work, and perceived impact of employment on academic performance. (Contains 57…

  17. Decay-usage scheduling in multiprocessors

    NARCIS (Netherlands)

    Epema, D.H.J.

    1998-01-01

    Decay-usage scheduling is a priority-aging time-sharing scheduling policy capable of dealing with a workload of both interactive and batch jobs by decreasing the priority of a job when it acquires CPU time, and by increasing its priority when it does not use the (a) CPU. In this article we deal with

  18. MESUR: metrics from scholarly usage of resources

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    The MESUR project is constructing a large-scale semantic model of the scholarly community that seamlessly integrates a wide range of bibliographic, citation and usage data. Functioning as a reference data set, this model is analyzed to characterize the intricate networks of typed relationships that exist in the scholarly community. The resulting ...

  19. Aspiration Curettage and its Outpatient Usage

    African Journals Online (AJOL)

    Aspiration Curettage and its Outpatient Usage. D. A. G. BARFORD, M, NOTELOVITZ. SUMMARY ... its use on a number of outpatients without anaesthesia is discussed. S. Afr. Med. l., 48, 22 (1974). In order to ... plastic aspiration chamber and suction is applied centrally at the base of the chamber, a cylindrical filter within the.

  20. An Empirical Investigation of Campus Portal Usage

    Science.gov (United States)

    Saghapour, Mohsen; Iranmanesh, Mohammad; Zailani, Suhaiza; Goh, Gerald Guan Gan

    2018-01-01

    This study has determined the determinants of the perceived ease of use and perceived usefulness and their influence on campus portal usage. A quantitative approach was employed, using a five-point Likert scale questionnaire, adapted from previous studies. Data were gathered through a survey conducted with 341 staff working in the University of…

  1. Slang Usage of French by Young Americans.

    Science.gov (United States)

    Ensz, Kathleen Y.

    1985-01-01

    Describes reactions of native French speakers to usage of French slang by young American students. French-speaking participants rated 30 tape-recorded slang expressions. Their reactions were evaluated in relation to the sex, profession, age, and residence of the respondents. Results show attitudes critical of the use of slang in general. (SED)

  2. Notational usage modulates attention networks in binumerates

    Directory of Open Access Journals (Sweden)

    Atesh eKoul

    2014-05-01

    Full Text Available Multicultural environments require learning multiple number notations wherein some are encountered more frequently than others. This leads to differences in exposure and consequently differences in usage between notations. We find that differential notational usage imposes a significant neurocognitive load on number processing. Despite simultaneous acquisition, forty-two adult binumerate populations, familiar with two positional writing systems namely Hindu Nagari digits and Hindu Arabic digits, reported significantly lower preference and usage for Nagari as compared to Arabic. Twenty-four participants showed significantly increased reaction times and reduced accuracy while performing magnitude comparison tasks in Nagari with respect to Arabic. Functional magnetic resonance imaging revealed that processing Nagari elicited significantly greater activity in number processing and attention networks. A direct subtraction of networks for Nagari and Arabic notations revealed a neural circuit comprising of bilateral intra-parietal sulcus, inferior and mid frontal gyri, fusiform gyrus and the anterior cingulate cortex (FDR p<0.005. Additionally, whole brain correlation analysis showed that activity in the left inferior parietal region was modulated by task performance in Nagari. We attribute the increased activation in Ng to increased task difficulty due to infrequent exposure and usage. Our results reiterate the role of the left intra-parietal sulcus in modulating performance in numeric tasks and highlight that of the attention network for monitoring symbolic notation mode in binumerates.

  3. Usage of cell nomenclature in biomedical literature

    KAUST Repository

    Kafkas, Senay; Sarntivijai, Sirarat; Hoehndorf, Robert

    2017-01-01

    large scale for understanding the level of uptake of cell nomenclature in literature by scientists. In this study, we analyse the usage of cell nomenclature, both in Vivo, and in Vitro in biomedical literature by using text mining methods and present our

  4. Sporforming probiotics and their usage in children

    Directory of Open Access Journals (Sweden)

    Marushko RV

    2015-05-01

    Full Text Available The data of literature about spore-forming probiotics, as well as their usage in the pathology of the gastrointestinal tract in children were sumerised. Analysis of the data allows us to recommend the preparation «Biosporin-Biopharma» for preventive measures and treatment of gastrointestinal tract diseases at all levels of children health care, including infants.

  5. Mobile Device Usage in Higher Education

    Science.gov (United States)

    Delcker, Jan; Honal, Andrea; Ifenthaler, Dirk

    2016-01-01

    This paper focuses on mobile device usage of students in higher education. While more and more students embrace mobile devices in their daily life, institutions attempt to profit from those devices for educational purposes. It is therefore crucial for institutional development to identify students' needs and how mobile devices may facilitate these…

  6. Google Scholar Usage: An Academic Library's Experience

    Science.gov (United States)

    Wang, Ya; Howard, Pamela

    2012-01-01

    Google Scholar is a free service that provides a simple way to broadly search for scholarly works and to connect patrons with the resources libraries provide. The researchers in this study analyzed Google Scholar usage data from 2006 for three library tools at San Francisco State University: SFX link resolver, Web Access Management proxy server,…

  7. The Scope of Usage-based Theory

    Directory of Open Access Journals (Sweden)

    Paul eIbbotson

    2013-05-01

    Full Text Available Usage-based approaches typically draw on a relatively small set of cognitive processes, such as categorization, analogy and chunking to explain language structure and function. The goal of this paper is to first review the extent to which the ‘cognitive commitment’ of usage-based theory has had success in explaining empirical findings across domains, including language acquisition, processing and typology. We then look at the overall strengths and weaknesses of usage-based theory and highlight where there are significant debates. Finally, we draw special attention to a set of culturally generated structural patterns that seem to lie beyond the explanation of core usage-based cognitive processes. In this context we draw a distinction between cognition permitting language structure versus cognition entailing language structure. As well as addressing the need for greater clarity on the mechanisms of generalizations and the fundamental units of grammar, we suggest that integrating culturally generated structures within existing cognitive models of use will generate tighter predictions about how language works.

  8. Archival classification: new usage scenarios among semantic web and traditio of digital samples

    Directory of Open Access Journals (Sweden)

    Alessandro Alfier

    2017-05-01

    Full Text Available Starting from the acknowledgement of the basic purpose assigned by tradition to classification within documents management, the article faces the issues related to new needs and usage, related to the digital scenarios, that would allow classification to consolidate its tradition of effectiveness in a new digital environment. The key point of the article is represented by the in-depth analysis of the possible synergies between classification-related activities and the International Standard for Describing Functions (ISDF, developed by ICA in 2007. The article highlights how an approach to classification elaborated from the ISDF perspective allows classification itself to enrich from purposes and semantic web related usage, and with the traditio of digital documents.

  9. Implicit and Explicit Attitudes towards America in Socio Digital Influence: Trust and Social Identity in Cyberspace

    Science.gov (United States)

    2018-03-16

    AFRL-AFOSR-JP-TR-2018-0024 Implicit and Explicit Attitudes towards America in Socio-Digital Influence: Trust and Social Identity in Cyberspace James...and Explicit Attitudes towards America in Socio-Digital Influence: Trust and Social Identity in Cyberspace 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER...comprehensive survey of personality, values, institutional trust, mass media usage, and political attitudes and ideology (including a comprehensive

  10. Brand Identity Development and the Role of Marketing Communications: Brand Experts’ View

    OpenAIRE

    Nusa Petek; Maja Konecnik Ruzzier

    2013-01-01

    Recently academics outlined the importance of brand relationships and brand experiences as building blocks of brand identities. New marketing communication tools, which enable interactions and consumer engagement, are among the most important tools mentioned for strengthening brand relationships and enhancing brand experiences by academics. Therefore the paper analyses the understanding of brand identity building blocks by brand experts and their usage of new marketing communication tools. Tw...

  11. Identity Expansion and Transcendence

    Directory of Open Access Journals (Sweden)

    William Sims Bainbridge

    2014-05-01

    Full Text Available Emerging developments in communications and computing technology may transform the nature of human identity, in the process rendering obsolete the traditional philosophical and scientific frameworks for understanding the nature of individuals and groups.  Progress toward an evaluation of this possibility and an appropriate conceptual basis for analyzing it may be derived from two very different but ultimately connected social movements that promote this radical change. One is the governmentally supported exploration of Converging Technologies, based in the unification of nanoscience, biology, information science and cognitive science (NBIC. The other is the Transhumanist movement, which has been criticized as excessively radical yet is primarily conducted as a dignified intellectual discussion within a new school of philosophy about human enhancement.  Together, NBIC and Transhumanism suggest the immense transformative power of today’s technologies, through which individuals may explore multiple identities by means of online avatars, semi-autonomous intelligent agents, and other identity expansions.

  12. Identity negotiations in meetings

    DEFF Research Database (Denmark)

    Asmuß, Birte; Oshima, Sae

    of the company, and all members know (and display) that he holds some information that the rest don’t have access to. Our analysis shows that the participants evoke various identities of the manager, sometimes orienting to the structure of the organization, and other times orienting to wider social categories......Meetings are places, where identity negotiation is a central activity and where members’ local practices recurrently inform and are informed by larger categories (Antaki and Widdicombe 1998). Correspondingly, the approach to understanding organization (macro) by way of identity work (micro) has...... company, and in the data recorded over 10 days, the employees frequently complain about the many changes that have taken place. Our focus lies in a unique occasion where one of the managers makes an unusual appearance at the lunchroom. In this situation, he is the only one that is on the business side...

  13. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...... of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity...

  14. Areva - 2011 Reference document

    International Nuclear Information System (INIS)

    2011-01-01

    After having indicated the person responsible of this document and the legal account auditors, and provided some financial information, this document gives an overview of the different risk factors existing in the company: law risks, industrial and environmental risks, operational risks, risks related to large projects, market and liquidity risks. Then, after having recalled the history and evolution of the company and the evolution of its investments over the last five years, it proposes an overview of Areva's activities on the markets of nuclear energy and renewable energies, of its clients and suppliers, of its strategy, of the activities of its different departments. Other information are provided: company's flow chart, estate properties (plants, equipment), an analysis of its financial situation, its research and development policy, the present context, profit previsions or estimations, management organization and operation

  15. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  16. Documentation of Concurrent programs.

    Science.gov (United States)

    1983-07-01

    preparing the documentation formats, and Tom McDonald for preparing the supplemental materials and statistical analyses. 16 [ 1 -16- I j REFERENCES I Boehm...34*h (eeeeeotop to enter h, to IAmlOCSot land ,uoMXM to R&’T- kfC ’Cod At 1*1 ,lgo: 0) 4 O ~ en ttR .I SA’ tgOhegl that ’t to 40n. .hi &ren a ~ O toll s

  17. SANSMIC design document.

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Paula D. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Rudeen, David Keith [GRAM, Inc., Albuquerque, NM (United States)

    2015-07-01

    The United States Strategic Petroleum Reserve (SPR) maintains an underground storage system consisting of caverns that were leached or solution mined in four salt domes located near the Gulf of Mexico in Texas and Louisiana. The SPR comprises more than 60 active caverns containing approximately 700 million barrels of crude oil. Sandia National Labo- ratories (SNL) is the geotechnical advisor to the SPR. As the most pressing need at the inception of the SPR was to create and fill storage volume with oil, the decision was made to leach the caverns and fill them simultaneously (leach-fill). Therefore, A.J. Russo developed SANSMIC in the early 1980s which allows for a transient oil-brine interface (OBI) making it possible to model leach-fill and withdrawal operations. As the majority of caverns are currently filled to storage capacity, the primary uses of SANSMIC at this time are related to the effects of small and large withdrawals, expansion of existing caverns, and projecting future pillar to diameter ratios. SANSMIC was identified by SNL as a priority candidate for qualification. This report continues the quality assurance (QA) process by documenting the "as built" mathematical and numerical models that comprise this document. The pro- gram flow is outlined and the models are discussed in detail. Code features that were added later or were not documented previously have been expounded. No changes in the code's physics have occurred since the original documentation (Russo, 1981, 1983) although recent experiments may yield improvements to the temperature and plume methods in the future.

  18. Electronic Braille Document Reader

    OpenAIRE

    Arif, Shahab; Holmes, Violeta

    2013-01-01

    This paper presents an investigation into developing a portable Braille device which would allow visually impaired individuals to read electronic documents by actuating Braille text on a finger. Braille books tend to be bulky in size due to the minimum size requirements for each Braille cell. E-books can be read in Braille using refreshable Braille displays connected to a computer. However, the refreshable Braille displays are expensive, bulky and are not portable. These factors restrict blin...

  19. Electronic Braille Document Reader

    OpenAIRE

    Arif, S.

    2012-01-01

    An investigation was conducted into developing a portable Braille device which would allow visually impaired individuals to read electronic documents by actuating Braille text on a finger. Braille books tend to be bulky in size due to the minimum size requirements for each Braille cell. E-books can be read in Braille using refreshable Braille displays connected to a computer. However, the refreshable Braille displays are expensive, bulky and are not portable. These factors restrict blind and ...

  20. SGHWR - quality assurance documentation

    International Nuclear Information System (INIS)

    Garrard, R.S.; Caulfield, J.

    1976-01-01

    The quality assurance program for a modern power station such as an SGHWR type reactor plant must include a record of quality achievement. The case history record which is evidence of the actual quality of the plant and is a data bank of design, manufacture, and results of inspections and tests, is described. Documentation distribution, which keeps all key areas informed of plant item quality status, and the retrieval and storage of information, are briefly discussed. (U.K.)

  1. AUDIT plan documenting method

    International Nuclear Information System (INIS)

    Cornecsu, M.

    1995-01-01

    The work describes a method of documenting the AUDIT plan upon the basis of two quantitative elements resulting from quality assurance program appraisal system function implementation degree as established from the latest AUDIT performed an system function weight in QAP, respectively, appraised by taking into account their significance for the activities that are to be performed in the period for which the AUDITs are planned. (Author) 3 Figs., 2 Refs

  2. Splitting Ward identity

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Mahmoud [Institute for Research in Fundamental Sciences (IPM), School of Particles and Accelerators, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of)

    2016-04-15

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  3. Social identities and risk

    DEFF Research Database (Denmark)

    Blok, Anders; Jensen, Mette; Kaltoft, Pernille

    2008-01-01

    Expert-based environmental and health risk regulation is widely believed to suffer from a lack of public understanding and legitimacy. On controversial issues such as genetically modified organisms and food-related chemicals, a "lay-expert discrepancy" in the assessment of risks is clearly visible...... of social identities. On the basis of qualitative interviews with citizens and experts, respectively, we focus on the multiple ways in which identities come to be employed in actors' risk accounts. Empirically, we identify salient characteristics of "typical" imagined experts and lay-people, while arguing...

  4. Splitting Ward identity

    International Nuclear Information System (INIS)

    Safari, Mahmoud

    2016-01-01

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  5. Law and Identity

    DEFF Research Database (Denmark)

    Schmidt, Garbi

    2011-01-01

    processes of social integration. Within media-based and political debates, transnational marriages are frequently described as practices destructive both to individual freedom and to Danish national identity. Nonetheless, it is a practice in which both minority and majority citizens engage, one that frames...... both their family lives and their lives as citizens. This article analyses the dynamic relationship between public discourse and practices of transnational marriage. The first part describes how political and legislative perceptions of transnational (arranged) marriages are situated within a discussion......' expressions of autonomy and choice and their adaptations of such concepts to understandings of social belonging, inclusion and identity formation vis--vis the Danish nation-state....

  6. Editorial: Negotiating Gamer Identities

    Directory of Open Access Journals (Sweden)

    Matthew Barr

    2016-07-01

    Full Text Available The term ‘gamer identity’ is hotly contested, and certainly not understood as a broadly accepted term. From the outdated stereotype of white, heterosexual, teenage boys playing Nintendo in their parents’ basement to the equally contested proclamation that “‘gamers’ are over”, the current game culture climate is such that movements as divisive and controversial as #gamergate can flourish. For this latest special issue of Press Start, we invited submissions regarding the recent controversies surrounding the notion of player identities, with the aim of receiving papers from different viewpoints on gamer identity and culture.

  7. AREVA - 2013 Reference document

    International Nuclear Information System (INIS)

    2014-01-01

    This Reference Document contains information on the AREVA group's objectives, prospects and development strategies, as well as estimates of the markets, market shares and competitive position of the AREVA group. Content: 1 - Person responsible for the Reference Document; 2 - Statutory auditors; 3 - Selected financial information; 4 - Description of major risks confronting the company; 5 - Information about the issuer; 6 - Business overview; 7 - Organizational structure; 8 - Property, plant and equipment; 9 - Situation and activities of the company and its subsidiaries; 10 - Capital resources; 11 - Research and development programs, patents and licenses; 12 - Trend information; 13 - Profit forecasts or estimates; 14 - Management and supervisory bodies; 15 - Compensation and benefits; 16 - Functioning of the management and supervisory bodies; 17 - Human resources information; 18 - Principal shareholders; 19 - Transactions with related parties; 20 - Financial information concerning assets, financial positions and financial performance; 21 - Additional information; 22 - Major contracts; 23 - Third party information, statements by experts and declarations of interest; 24 - Documents on display; 25 - Information on holdings; Appendix 1: report of the supervisory board chairman on the preparation and organization of the board's activities and internal control procedures; Appendix 2: statutory auditors' reports; Appendix 3: environmental report; Appendix 4: non-financial reporting methodology and independent third-party report on social, environmental and societal data; Appendix 5: ordinary and extraordinary general shareholders' meeting; Appendix 6: values charter; Appendix 7: table of concordance of the management report; glossaries

  8. Content Documents Management

    Science.gov (United States)

    Muniz, R.; Hochstadt, J.; Boelke J.; Dalton, A.

    2011-01-01

    The Content Documents are created and managed under the System Software group with. Launch Control System (LCS) project. The System Software product group is lead by NASA Engineering Control and Data Systems branch (NEC3) at Kennedy Space Center. The team is working on creating Operating System Images (OSI) for different platforms (i.e. AIX, Linux, Solaris and Windows). Before the OSI can be created, the team must create a Content Document which provides the information of a workstation or server, with the list of all the software that is to be installed on it and also the set where the hardware belongs. This can be for example in the LDS, the ADS or the FR-l. The objective of this project is to create a User Interface Web application that can manage the information of the Content Documents, with all the correct validations and filters for administrator purposes. For this project we used one of the most excellent tools in agile development applications called Ruby on Rails. This tool helps pragmatic programmers develop Web applications with Rails framework and Ruby programming language. It is very amazing to see how a student can learn about OOP features with the Ruby language, manage the user interface with HTML and CSS, create associations and queries with gems, manage databases and run a server with MYSQL, run shell commands with command prompt and create Web frameworks with Rails. All of this in a real world project and in just fifteen weeks!

  9. Toward Documentation of Program Evolution

    DEFF Research Database (Denmark)

    Vestdam, Thomas; Nørmark, Kurt

    2005-01-01

    The documentation of a program often falls behind the evolution of the program source files. When this happens it may be attractive to shift the documentation mode from updating the documentation to documenting the evolution of the program. This paper describes tools that support the documentatio....... It is concluded that our approach can help revitalize older documentation, and that discovery of the fine grained program evolution steps help the programmer in documenting the evolution of the program....

  10. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  11. Codon usage bias and the evolution of influenza A viruses. Codon Usage Biases of Influenza Virus

    Directory of Open Access Journals (Sweden)

    Wong Emily HM

    2010-08-01

    Full Text Available Abstract Background The influenza A virus is an important infectious cause of morbidity and mortality in humans and was responsible for 3 pandemics in the 20th century. As the replication of the influenza virus is based on its host's machinery, codon usage of its viral genes might be subject to host selection pressures, especially after interspecies transmission. A better understanding of viral evolution and host adaptive responses might help control this disease. Results Relative Synonymous Codon Usage (RSCU values of the genes from segment 1 to segment 6 of avian and human influenza viruses, including pandemic H1N1, were studied via Correspondence Analysis (CA. The codon usage patterns of seasonal human influenza viruses were distinct among their subtypes and different from those of avian viruses. Newly isolated viruses could be added to the CA results, creating a tool to investigate the host origin and evolution of viral genes. It was found that the 1918 pandemic H1N1 virus contained genes with mammalian-like viral codon usage patterns, indicating that the introduction of this virus to humans was not through in toto transfer of an avian influenza virus. Many human viral genes had directional changes in codon usage over time of viral isolation, indicating the effect of host selection pressures. These changes reduced the overall GC content and the usage of G at the third codon position in the viral genome. Limited evidence of translational selection pressure was found in a few viral genes. Conclusions Codon usage patterns from CA allowed identification of host origin and evolutionary trends in influenza viruses, providing an alternative method and a tool to understand the evolution of influenza viruses. Human influenza viruses are subject to selection pressure on codon usage which might assist in understanding the characteristics of newly emerging viruses.

  12. Gender discrimination and social identity: experimental evidence from urban Pakistan

    OpenAIRE

    Delavande, Adeline; Zafar, Basit

    2013-01-01

    Gender discrimination in South Asia is a well-documented fact. However, gender is only one of an individual's many identities. This paper investigates how gender discrimination depends on the social identities of interacting parties. We use an experimental approach to identify gender discrimination by randomly matching 2,836 male and female students pursuing bachelor's-equivalent degrees in three different types of institutions - Madrassas (religious seminaries), Islamic universities, and lib...

  13. Language, Identity, and Exile

    Science.gov (United States)

    Erdinast-Vulcan, Daphna

    2010-01-01

    The exilic mode of being, a living on boundary-lines, produces a constant relativization of one's home, one's culture, one's language, and one's self, through the acknowledgement of otherness. It is a homesickness without nostalgia, without the desire to return to the same, to be identical to oneself. The encounter with the other which produces a…

  14. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons....... (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  15. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  16. Shifting Design Consultancy Identities

    DEFF Research Database (Denmark)

    Larsen, Henry; Huijboom, Nina; Holm Nielsen, Anne

    2014-01-01

    and identities that resonate more with freelancing and portfolio careers than with the intention of creating firms that are intended to expand. We recognized a pattern where freelancers build up their work as a portfolio by moving from one engagement to another, a process that we will call sequential freelancing...

  17. Migration, Narration, Identity

    DEFF Research Database (Denmark)

    Leese, Peter

    three consecutive summers from 2010 to 2012. The articles focus on various aspects of the migrant experience and try to answer questions about migrant identity and its representations in literature and the media. The book closes with an original play by Carlos Morton, the Chicano playwright working...

  18. The Visual Identity Project

    Science.gov (United States)

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  19. Work and Female Identity.

    Science.gov (United States)

    Reohr, Janet R.

    In climbing an organizational ladder dominated by males, the professional woman encounters obstacles to the more traditional feminine behaviors and mannerisms to which she may be accustomed. These obstacles may erode her sense of identity, creating difficulties both inside and outside of her work environment. Traditional distinctions between…

  20. Positioning health professional identity

    DEFF Research Database (Denmark)

    Lund, Ole; Krogh Christensen, Mette; Mørcke, Anne Mette

    2017-01-01

    Drawing on positioning theory, the purpose of this paper is to characterize the activities and positions of students and supervisors at workplaces and on-campus skills training sites across the higher health professional educations of medicine, sports science, and nursing. Furthermore, the study ...... explored the impact of work-based learning (WBL) and skills training on students’ personal professional identity development....

  1. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  2. Spatial Identity in Gagauzia

    Directory of Open Access Journals (Sweden)

    A. V. Salavatova

    2015-01-01

    Full Text Available Historically the gagauz developed a self-perception based on their difference from Moldova as well as the ‘Turkish world’. The article argues that this fact has determined their pro-Russian political orientation as the only possible way of maintaining their identity

  3. Body Integrity Identity Disorder

    NARCIS (Netherlands)

    Blom, Rianne M.; Hennekam, Raoul C.; Denys, Damiaan

    2012-01-01

    Introduction: Body Integrity Identity Disorder (BIID) is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal

  4. Fluidity, Identity, and Organizationality

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    2015-01-01

    that the organizationality of a social collective is accomplished through “identity claims”—i.e., speech acts that concern what the social collective is or does—and negotiations on whether or not these claims have been made on the collective's behalf. We empirically examine the case of the hacker collective Anonymous...

  5. Professions and their Identities

    DEFF Research Database (Denmark)

    Krejsler, John

    2005-01-01

    analytical strategies can frame in sufficiently complex ways what it means to be a professional today. It is assumed that at least four main issues must be dealt with in order to conduct a satisfactory analysis of professions and their identities. Firstly, it is of fundamental strategic importance that one...

  6. Regional identity and family

    Directory of Open Access Journals (Sweden)

    Tripković Gordana D.

    2003-01-01

    Full Text Available This paper is a continuation of a study on regionalisation and family, within the project named Sociological Aspects of Multiculturality and Regionalisation and their influence on the development of AP Vojvodina and the Republic of Serbia. The author focuses her attention to operationalisation of the theoretical and methodological premises that were developed in the previous paper (Tripković, 2002: 111-127, which means that it represents the results of the second phase of the research plan. This phase includes adjusting of theoretical concepts to the fieldwork displaying the results of the research and the analysis of the findings that put a family in the context of confronting different identities, above all national and regional. As possible "identity difference" was emphasized in the research, theoretical and methodological apparatus was adjusted to this goal. That is why in this paper the replies of interviewees that can suggest or reject the assumption that their national identity can influence significantly the evaluation of identity specificities are presented and analyzed, concerning more or less visible aspects of family life, like welfare status, relations between spouses, respect to the elder, family harmony, number of children, connections with relatives, etc.

  7. Regulatory control for safe usage of radiation sources in India

    International Nuclear Information System (INIS)

    Ghosh, P.K.; Sonawane, A.U.

    1998-01-01

    The widespread applications of radioactive materials and radiation generating equipment in the field of industry, medicine agriculture and research in India necessitated the establishment of an efficient regulatory framework and consequently the Atomic Energy Regulatory Board (AERB) was constituted to exercise regulatory control over the safe usage of the radioactive materials and the radiation generating equipment. The Atomic Energy Act, 1962 and the Radiation Protection Rules, 1971 promulgated under the Act forms the basis of radiation safety in India and Chairman, AERB is the Competent Authority to enforce the regulatory provisions of the Radiation Protection Rules, 1971, for safe use of radiation source in the country. AERB has published a number of documents such as Radiation Surveillance Procedures, Standards, Codes, Guides and Manuals for safe use and handling of radioactive materials and radiation generating equipment. Apart from nuclear fuel cycle documents, these publications pertain to industrial radiography, medical application of radiation, transport of radioactive material, industrial gamma irradiators, X-ray units etc. AERB safety related publications are based on international standards e.g. BSS, IAEA, ICRP, ISO etc. This paper outlines the methodology of regulatory control exercised by AERB for safe use of the radioactive materials and the radiation generating equipment in the country. (author)

  8. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  9. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  10. How Google Web Search copes with very similar documents

    NARCIS (Netherlands)

    W. Mettrop (Wouter); P. Nieuwenhuysen; H. Smulders

    2006-01-01

    textabstractA significant portion of the computer files that carry documents, multimedia, programs etc. on the Web are identical or very similar to other files on the Web. How do search engines cope with this? Do they perform some kind of “deduplication”? How should users take into account that

  11. AREVA 2009 reference document

    International Nuclear Information System (INIS)

    2009-01-01

    This Reference Document contains information on the AREVA group's objectives, prospects and development strategies. It contains information on the markets, market shares and competitive position of the AREVA group. This information provides an adequate picture of the size of these markets and of the AREVA group's competitive position. Content: 1 - Person responsible for the Reference Document and Attestation by the person responsible for the Reference Document; 2 - Statutory and Deputy Auditors; 3 - Selected financial information; 4 - Risks: Risk management and coverage, Legal risk, Industrial and environmental risk, Operating risk, Risk related to major projects, Liquidity and market risk, Other risk; 5 - Information about the issuer: History and development, Investments; 6 - Business overview: Markets for nuclear power and renewable energies, AREVA customers and suppliers, Overview and strategy of the group, Business divisions, Discontinued operations: AREVA Transmission and Distribution; 7 - Organizational structure; 8 - Property, plant and equipment: Principal sites of the AREVA group, Environmental issues that may affect the issuer's; 9 - Analysis of and comments on the group's financial position and performance: Overview, Financial position, Cash flow, Statement of financial position, Events subsequent to year-end closing for 2009; 10 - Capital Resources; 11 - Research and development programs, patents and licenses; 12 -trend information: Current situation, Financial objectives; 13 - Profit forecasts or estimates; 14 - Administrative, management and supervisory bodies and senior management; 15 - Compensation and benefits; 16 - Functioning of corporate bodies; 17 - Employees; 18 - Principal shareholders; 19 - Transactions with related parties: French state, CEA, EDF group; 20 - Financial information concerning assets, financial positions and financial performance; 21 - Additional information: Share capital, Certificate of incorporation and by-laws; 22 - Major

  12. Viviendo el documental

    OpenAIRE

    Álvarez Moreno, Víctor

    2017-01-01

    En el siguiente trabajo se recoge el proceso de realización y elaboración de un documental en 360 grados sobre la catedral de Valladolid bajo el título Reconstruyendo la catedral. El trabajo une realidad virtual con narrativa periodística. La realidad virtual es una herramienta que permite transformar al espectador en un testigo de la historia. En este caso, se muestra lo que pudo ser la catedral de Valladolid, cuyo objetivo era convertirse en la catedral más grande del territorio europeo. ...

  13. Documents and legal texts

    International Nuclear Information System (INIS)

    2016-01-01

    This section treats of the following documents and legal texts: 1 - Brazil: Law No. 13,260 of 16 March 2016 (To regulate the provisions of item XLIII of Article 5 of the Federal Constitution on terrorism, dealing with investigative and procedural provisions and redefining the concept of a terrorist organisation; and amends Laws No. 7,960 of 21 December 1989 and No. 12,850 of 2 August 2013); 2 - India: The Atomic Energy (Amendment) Act, 2015; Department Of Atomic Energy Notification (Civil Liability for Nuclear Damage); 3 - Japan: Act on Subsidisation, etc. for Nuclear Damage Compensation Funds following the implementation of the Convention on Supplementary Compensation for Nuclear Damage

  14. Fuel cell usage in motor vehicles

    International Nuclear Information System (INIS)

    Vellone, R.

    1998-01-01

    Much interest has been aroused by fuel cell usage in motor vehicles, since this technology seems to overcome the conventional limits by other kinds of drive, i.e. the high environmental impact of internal-combustion engines and the drawbacks of electric battery vehicles in terms of maximum operating range and battery recharge time. After 2010 its costs are expected to fall in competitive levels with internal-combustion engines [it

  15. Radionuclide usage survey 1979-80

    International Nuclear Information System (INIS)

    Woods, M.J.

    1980-08-01

    Details of a survey by the Life Sciences Working Group of the International Committee for Radionuclide Metrology (ICRM) on radionuclide usage by medical physicists in 11 countries are presented. The results indicate that the radionuclide which will be of most significance in the future will be F-18, Fe-52, Ga-67, Ga-68, Kr-81m, Tc-99m, In-111, I-123, Xe-127 and Tl-201, (U.K.)

  16. Usage of Wifi Technology for PLC Programming

    Directory of Open Access Journals (Sweden)

    Jaromír ŠKUTA

    2009-06-01

    Full Text Available This contribution describes usage of WIFI technology for programming and parameterization of application in PLC. INSYS WLAN unit from the Microelectronics INSYS Corporation is the base of application. Software access point with using USB WIFI component WL167 is running in industrial PC. Particular PC clients are connecting into network infrastructure PLC by the help of this access point and INSYS WLAN unit. This connection allows configuring and uploading program into this PLC.

  17. Correlation matrix for quartet codon usage

    CERN Document Server

    Frappat, L; Sorba, Paul

    2005-01-01

    It has been argued that the sum of usage probabilities for codons, belonging to quartets, that have as third nucleotide C or A, is independent of the biological species for vertebrates. The comparison between the theoretical correlation matrix derived from these sum rules and the experimentally computed matrix for 26 species shows a satisfactory agreement. The Shannon entropy, weakly depending on the biological species, gives further support. Suppression of codons containing the dinucleotides CG or AU is put in evidence.

  18. Problematic Internet Usage and Immune Function

    OpenAIRE

    Reed, P.; Vile, R.; Osborne, L.A.; Romano, M.; Truzoli, R.

    2015-01-01

    Problematic internet use has been associated with a variety of psychological comorbidities, but it relationship with physical illness has not received the same degree of investigation. The current study surveyed 505 participants online, and asked about their levels of problematic internet usage (Internet Addiction Test), depression and anxiety (Hospital Anxiety and Depression Scales), social isolation (UCLA Loneliness Questionnaire), sleep problems (Pittsburgh Sleep Quality Index), and their ...

  19. Cost Focussed Firms and Internet Usage

    OpenAIRE

    Joanne Loundes

    2002-01-01

    This paper looks at Internet usage by Australian firms that have a cost focussed competitive strategy. The data source for this analysis is the Melbourne Institute Business Survey, conducted by the Melbourne Institute of Applied Economic and Social Research. The survey was conducted in late 2001, and targeted large Australian firms. Instrumental variables estimation found that cost-focussed organizations utilised the Internet more intensively for both internal organizational activities and ex...

  20. Perceived driving safety and seatbelt usage.

    Science.gov (United States)

    Svenson, O; Fischhoff, B; MacGregor, D

    1985-04-01

    Swedish and U.S. subjects judged their own driving skills and safety in relation to other drivers. As in earlier studies, most subjects showed an optimism bias: a tendency to judge oneself as safer and more skillful than the average driver, with a smaller risk of getting involved and injured in an accident. Different measures of the optimism effect were strongly correlated with one another, with driving experience and with the judged importance of human factors (as opposed to technical and chance factors) in causing accidents. Degree of optimism was positively, but weakly, correlated with reported seatbelt usage and worry about traffic accidents. Seatbelt usage was positively related to the extent to which belts are judged to be convenient and popular, and more modestly related to the belt's perceived contributions to safety. These results suggest that providing more information about the effectiveness of seatbelts may not be as efficient a way of increasing seatbelt usage as emphasizing other factors, such as comfort and social norms, which cannot be outweighed by optimism.

  1. Usage of the cyclotron facility local area network

    International Nuclear Information System (INIS)

    Heinzmann, H.; Peters, J.; Thow, T.J.

    1988-01-01

    Local area network of controllers at the Karlsruhe cyclotyron is shown. Experience after two years of usage is described. The system is applied controlling, data acquisition, management, databases usage

  2. The Use of Speech Technology to Protect the Document Turnover

    Directory of Open Access Journals (Sweden)

    Alexandr M. Alyushin

    2017-06-01

    Full Text Available The wide current paper documents implementation in practice workflows are shown. The basic aspects of document protection related to the protection of their content and legal components are underlined. For contextual component assigned semantic information aspect of the document is considered. For legal component attributed facts and conditions for the creation, approval, negotiation of the document to specific persons is viewed. The documents protection problem importance is shown in connection with possible terrorist threats. The importance of such factor as the time of fraud detection towards the efficiency of documents protection is shown. The fraud detection time requirements for documents of different nature – financial, legal, management is analyzed. The documents used for the operational management of dangerous objects is point out as the most sensitive to the falsification. It is shown that their deliberate falsification can lead to accidents and technogenic catastrophes and human casualties. A comparative analysis of currently used protecting documents methods are presented. Biometric and non-biometric methods of documents protection are point out.Theanalysis of their short comings are given. The conclusion about the prospects of document protection on the basis of the voice signature technology are done. The basic steps of voice information processing in the implementation of this technology are analyzed. The software that implements a documents counterfeiting new protection technology is proposed. The technology is based on the audiomarkers usage at the end of the document, which contains a general information about it. The technology is applicable to the wide range of documents such as financial and valuable papers, contracts, etc. One of the most important advantages of this technology is that any changes in the document can not be done without the author of the document because audiomarker keeps the biometric data of the person

  3. Developing hospital identity manuals: a reference tool for illustrators.

    Science.gov (United States)

    Schaffer, J A; Zimmerman, S B

    1990-01-01

    Because of an increase in hospital marketing efforts, medical illustrators may be asked to assist in developing and implementing hospital identity manuals, which specify the graphic standards for visual communications media. A checklist survey of existing identity manuals and a literature review were conducted by one of the authors, a medical illustrator, to help her to develop a manual for her hospital employer. This article documents the literature review, the study, and the identity manual development, and presents recommendations to help other medical illustrators who might become involved in similar assignments.

  4. AREVA - 2012 Reference document

    International Nuclear Information System (INIS)

    2013-03-01

    After a presentation of the person responsible for this Reference Document, of statutory auditors, and of a summary of financial information, this report address the different risk factors: risk management and coverage, legal risk, industrial and environmental risk, operational risk, risk related to major projects, liquidity and market risk, and other risks (related to political and economic conditions, to Group's structure, and to human resources). The next parts propose information about the issuer, a business overview (markets for nuclear power and renewable energies, customers and suppliers, group's strategy, operations), a brief presentation of the organizational structure, a presentation of properties, plants and equipment (principal sites, environmental issues which may affect these items), analysis and comments on the group's financial position and performance, a presentation of capital resources, a presentation of research and development activities (programs, patents and licenses), a brief description of financial objectives and profit forecasts or estimates, a presentation of administration, management and supervision bodies, a description of the operation of corporate bodies, an overview of personnel, of principal shareholders, and of transactions with related parties, a more detailed presentation of financial information concerning assets, financial positions and financial performance. Addition information regarding share capital is given, as well as an indication of major contracts, third party information, available documents, and information on holdings

  5. AREVA 2010 Reference document

    International Nuclear Information System (INIS)

    2010-01-01

    After a presentation of the person responsible for this document, and of statutory auditors, this report proposes some selected financial information. Then, it addresses, presents and comments the different risk factors: risk management and coverage, legal risk, industrial and environmental risk, operational risk, risks related to major projects, liquidity and market risk, and other risk. Then, after a presentation of the issuer, it proposes a business overview (markets for nuclear and renewable energies, AREVA customers and suppliers, strategy, activities), a presentation of the organizational structure, a presentation of AREVA properties, plants and equipment (sites, environmental issues), an analysis and comment of the group's financial position and performance, a presentation of its capital resources, an overview of its research and development activities, programs, patents and licenses. It indicates profit forecast and estimates, presents the administrative, management and supervisory bodies, and compensation and benefits amounts, reports of the functioning of corporate bodies. It describes the human resource company policy, indicates the main shareholders and transactions with related parties. It proposes financial information concerning assets, financial positions and financial performance. This document contains its French and its English versions

  6. ExactPack Documentation

    Energy Technology Data Exchange (ETDEWEB)

    Singleton, Robert Jr. [Los Alamos National Laboratory; Israel, Daniel M. [Los Alamos National Laboratory; Doebling, Scott William [Los Alamos National Laboratory; Woods, Charles Nathan [Los Alamos National Laboratory; Kaul, Ann [Los Alamos National Laboratory; Walter, John William Jr [Los Alamos National Laboratory; Rogers, Michael Lloyd [Los Alamos National Laboratory

    2016-05-09

    For code verification, one compares the code output against known exact solutions. There are many standard test problems used in this capacity, such as the Noh and Sedov problems. ExactPack is a utility that integrates many of these exact solution codes into a common API (application program interface), and can be used as a stand-alone code or as a python package. ExactPack consists of python driver scripts that access a library of exact solutions written in Fortran or Python. The spatial profiles of the relevant physical quantities, such as the density, fluid velocity, sound speed, or internal energy, are returned at a time specified by the user. The solution profiles can be viewed and examined by a command line interface or a graphical user interface, and a number of analysis tools and unit tests are also provided. We have documented the physics of each problem in the solution library, and provided complete documentation on how to extend the library to include additional exact solutions. ExactPack’s code architecture makes it easy to extend the solution-code library to include additional exact solutions in a robust, reliable, and maintainable manner.

  7. Regulatory guidance document

    International Nuclear Information System (INIS)

    1994-05-01

    The Office of Civilian Radioactive Waste Management (OCRWM) Program Management System Manual requires preparation of the OCRWM Regulatory Guidance Document (RGD) that addresses licensing, environmental compliance, and safety and health compliance. The document provides: regulatory compliance policy; guidance to OCRWM organizational elements to ensure a consistent approach when complying with regulatory requirements; strategies to achieve policy objectives; organizational responsibilities for regulatory compliance; guidance with regard to Program compliance oversight; and guidance on the contents of a project-level Regulatory Compliance Plan. The scope of the RGD includes site suitability evaluation, licensing, environmental compliance, and safety and health compliance, in accordance with the direction provided by Section 4.6.3 of the PMS Manual. Site suitability evaluation and regulatory compliance during site characterization are significant activities, particularly with regard to the YW MSA. OCRWM's evaluation of whether the Yucca Mountain site is suitable for repository development must precede its submittal of a license application to the Nuclear Regulatory Commission (NRC). Accordingly, site suitability evaluation is discussed in Chapter 4, and the general statements of policy regarding site suitability evaluation are discussed in Section 2.1. Although much of the data and analyses may initially be similar, the licensing process is discussed separately in Chapter 5. Environmental compliance is discussed in Chapter 6. Safety and Health compliance is discussed in Chapter 7

  8. THE USAGE OF FACEBOOK FUNCTIONAL BUILDING BLOCKS IN UNISEL

    Directory of Open Access Journals (Sweden)

    Latifah Abd Latib

    2015-08-01

    Full Text Available The emergence of Internet-based social media has made it possible for a personto communicate with thousands of other people to increase the communicationeffectiveness, collaboration among internal organization and knowledge sharing.By engaging employees through social media such as Facebook as a two-waycommunications tool, employers can reach a larger audience and build credibilitywith techno-savvy workers. Although it is clear that Facebook is a very powerfultool for communication, many employers are unable to identify the functionalityof Facebook in terms of developing strategies and to allocate the resourceseffectively. Taking this into account this study sought to identify the usage ofFacebook Functionality building blocks. This survey involved 55 academic staffsfrom the Faculty of Computer Science and Information Technology, Unisel. Theseven functional building blocks identified were Identity (M=3.39, Relationships(M=3.39, Groups (M=3.6, Presence (M=3.28, Sharing (M=3.06, andConversations (M=2.90, Reputation (M=2.05. This study suggests that theability to identify the functional building blocks itself is very important in anorganization in terms of developing their communication strategies. It is hopedthat the results of the study will be applicable to the instituition, current users,and potential users of Facebook.

  9. Burnout and Humor Usage among Community College Nursing Faculty Members.

    Science.gov (United States)

    Talbot, Laura A.

    2000-01-01

    Assesses the correlation of burnout among community college nursing faculty members and their use of humor to mediate academic stress related to burnout. Differences in burnout between high versus low humor usage respondents showed a higher sense of personal accomplishment with high humor usage. Of those with low humor usage, workload was related…

  10. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  11. Scripting Professional Identities

    DEFF Research Database (Denmark)

    Bévort, Frans; Suddaby, Roy

    2016-01-01

    on a longitudinal ethnography of professionals in a Big Four accounting firm we analyse the process by which individual professionals make sense of their new roles and integrate the conflicting demands of professional and managerial logics. We find that individuals are active authors of their own identity scripts......This article examines how individual accountants subjectively interpret competing logics of professionalism as they transform from practicing accountants to managerial roles and as their organizations transform from traditional professional partnerships to more corporate organizational forms. Based....... We further observe considerable interpretive variation in how identity scripts are reproduced and enacted. We contribute to the emerging understanding of institutions as ‘inhabited’ by individuals and extend this literature by demonstrating that the institutional work of reinterpreting competing...

  12. LITERATURE AND IDENTITY

    Directory of Open Access Journals (Sweden)

    Dragana Litričin Dunić

    2015-04-01

    Full Text Available Literature can represent, on the one hand, the establishment of cultural and national identity, and, on the other hand, a constant indicator of the differences. Self-image and the image of the Other in literature is very important not only for understanding national character and preservation of cultural identity, but also for the release from ideological reading and stereotyping. Analyzing the image of the Other, research into the representation of the Balkans symbolically represents in the popular literature of the West, study of the cultural context and the processes that formed the writer’s perceptions that determine the establishment of stereotypes about Homo Balcanicus and many others, are all important tasks of imagological research, as well as the key research tasks conducted nowadays. In this paper we shall discuss some of these issues in the field of comparative literature.

  13. A general integral identity

    Energy Technology Data Exchange (ETDEWEB)

    Glasser, M L, E-mail: laryg@clarkson.edu [Department of Physics, Clarkson University, Potsdam, NY 13699-5820 (United States); Departamento de Fisica Teorica, Atomica y Optica, Universidad de Valladolid, Valladolid 470071 (Spain)

    2011-06-03

    The identity {integral}{sub 0}{sup {pi}/2}d{Phi}{integral}{sub 0}{sup {pi}/2}d{Theta} sin{Phi} F(x sn{Phi} sin{Phi})={pi}/2 {integral}{sub 0}{sup 1}F(xt)dt, where F is any function, is derived. Several extensions are given and a few examples of physical interest are described.

  14. Areva - 2016 Reference document

    International Nuclear Information System (INIS)

    2017-01-01

    Areva supplies high added-value products and services to support the operation of the global nuclear fleet. The company is present throughout the entire nuclear cycle, from uranium mining to used fuel recycling, including nuclear reactor design and operating services. Areva is recognized by utilities around the world for its expertise, its skills in cutting-edge technologies and its dedication to the highest level of safety. Areva's 36,000 employees are helping build tomorrow's energy model: supplying ever safer, cleaner and more economical energy to the greatest number of people. This Reference Document contains information on Areva's objectives, prospects and development strategies. It contains estimates of the markets, market shares and competitive position of Areva

  15. Working document dispersion models

    International Nuclear Information System (INIS)

    Dop, H. van

    1988-01-01

    This report is a summary of the most important results from June 1985 of the collaboration of the RIVM (Dutch National Institute for Public Health and Environment Hygiene) and KNMI (Royal Dutch Meteorologic Institute) on the domain of dispersion models. It contains a short description of the actual SO x /NO x -model. Furthermore it contains recommendations for modifications of some numerical-mathematical aspects and an impulse to a more complete description of chemical processes in the atmosphere and the (wet) deposition process. A separate chapter is devoted to the preparation of meteorologic data which are relevant for dispersion as well as atmospheric chemistry and deposition. This report serves as working document for the final formulation of a acidifying- and oxidant-model. (H.W.). 69 refs.; 51 figs.; 13 tabs.; 3 schemes

  16. Integrated criteria document mercury

    International Nuclear Information System (INIS)

    Sloof, W.; Beelan, P. van; Annema, J.A.; Janus, J.A.

    1995-01-01

    The document contains a systematic review and a critical evaluation of the most relevant data on the priority substance mercury for the purpose of effect-oriented environmental policy. Chapter headings are: properties and existing standards; production, application, sources and emissions (natural sources, industry, energy, households, agriculture, dental use, waste); distribution and transformation (cinnabar; Hg 2+ , Hg 2 2+ , elemental mercury, methylmercury, behavior in soil, water, air, biota); concentrations and fluxes in the environment and exposure levels (sampling and measuring methods, occurrence in soil, water, air etc.); effects (toxicity to humans and aquatic and terrestrial systems); emissions reduction (from industrial sources, energy, waste processing etc.); and evaluation (risks, standards, emission reduction objectives, measuring strategies). 395 refs

  17. Gaia DR1 documentation

    Science.gov (United States)

    van Leeuwen, F.; de Bruijne, J. H. J.; Arenou, F.; Comoretto, G.; Eyer, L.; Farras Casas, M.; Hambly, N.; Hobbs, D.; Salgado, J.; Utrilla Molina, E.; Vogt, S.; van Leeuwen, M.; Abreu, A.; Altmann, M.; Andrei, A.; Babusiaux, C.; Bastian, U.; Biermann, M.; Blanco-Cuaresma, S.; Bombrun, A.; Borrachero, R.; Brown, A. G. A.; Busonero, D.; Busso, G.; Butkevich, A.; Cantat-Gaudin, T.; Carrasco, J. M.; Castañeda, J.; Charnas, J.; Cheek, N.; Clementini, G.; Crowley, C.; Cuypers, J.; Davidson, M.; De Angeli, F.; De Ridder, J.; Evans, D.; Fabricius, C.; Findeisen, K.; Fleitas, J. M.; Gracia, G.; Guerra, R.; Guy, L.; Helmi, A.; Hernandez, J.; Holl, B.; Hutton, A.; Klioner, S.; Lammers, U.; Lecoeur-Taïbi, I.; Lindegren, L.; Luri, X.; Marinoni, S.; Marrese, P.; Messineo, R.; Michalik, D.; Mignard, F.; Montegriffo, P.; Mora, A.; Mowlavi, N.; Nienartowicz, K.; Pancino, E.; Panem, C.; Portell, J.; Rimoldini, L.; Riva, A.; Robin, A.; Siddiqui, H.; Smart, R.; Sordo, R.; Soria, S.; Turon, C.; Vallenari, A.; Voss, H.

    2017-12-01

    94000 Hipparcos stars in the primary data set, the proper motion standard errors are much smaller, at about 0.06 mas yr^-1. For the secondary astrometric data set, the typical standard error on the positions is 10 mas. The median standard errors on the mean G-band magnitudes range from the milli-magnitude level to 0.03 mag over the magnitude range 5 to 20.7. The DPAC undertook an extensive validation of Gaia DR1 which confirmed that this data release represents a major advance in the mapping of the skies and the availability of basic stellar data that form the foundation of observational astrophysics. However, as a consequence of the very preliminary nature of this first Gaia data release, there are a number of important limitations to the data quality. These limitations are documented in the Astronomy & Astrophysics papers that accompany Gaia DR1, with further information provided in this documentation. The reader is strongly encouraged to read about these limitations and to carefully consider them before drawing conclusions from the data. This Gaia DR1 documentation complements the peer-reviewed papers that accompany the release in a Special Issue of Astronomy & Astrophysics. The papers form the primary documentation for the data release and they are frequently referenced throughout the text.

  18. Documents and legal texts

    International Nuclear Information System (INIS)

    2013-01-01

    This section reprints a selection of recently published legislative texts and documents: - Russian Federation: Federal Law No.170 of 21 November 1995 on the use of atomic energy, Adopted by the State Duma on 20 October 1995; - Uruguay: Law No.19.056 On the Radiological Protection and Safety of Persons, Property and the Environment (4 January 2013); - Japan: Third Supplement to Interim Guidelines on Determination of the Scope of Nuclear Damage resulting from the Accident at the Tokyo Electric Power Company Fukushima Daiichi and Daini Nuclear Power Plants (concerning Damages related to Rumour-Related Damage in the Agriculture, Forestry, Fishery and Food Industries), 30 January 2013; - France and the United States: Joint Statement on Liability for Nuclear Damage (Aug 2013); - Franco-Russian Nuclear Power Declaration (1 November 2013)

  19. Wind system documentation

    Energy Technology Data Exchange (ETDEWEB)

    Froggatt, J.R.; Tatum, C.P.

    1993-01-15

    Atmospheric transport and diffusion models have been developed by the Environmental Technology Section (ETS) of the Savannah River Technology Center to calculate the location and concentration of toxic or radioactive materials during an accidental release at the Savannah River Site (SRS). The output from these models has been used to support initial on-site and off-site emergency response activities such as protective action decision making and field monitoring coordination. These atmospheric transport and diffusion models have been incorporated into an automated computer-based system called the (Weather Information and Display) System and linked to real-time meteorological and radiological monitoring instruments to provide timely information for these emergency response activities (Hunter, 1990). This report documents various aspects of the WIND system.

  20. ICRS Recommendation Document

    DEFF Research Database (Denmark)

    Roos, Ewa M.; Engelhart, Luella; Ranstam, Jonas

    2011-01-01

    and function evaluated for validity and psychometric properties in patients with articular cartilage lesions. Results: The knee-specific instruments, titled the International Knee Documentation Committee Subjective Knee Form and the Knee injury and Osteoarthritis and Outcome Score, both fulfill the basic......Abstract Objective: The purpose of this article is to describe and recommend patient-reported outcome instruments for use in patients with articular cartilage lesions undergoing cartilage repair interventions. Methods: Nonsystematic literature search identifying measures addressing pain...... constructs at all levels according to the International Classification of Functioning. Conclusions: Because there is no obvious superiority of either instrument at this time, both outcome measures are recommended for use in cartilage repair. Rescaling of the Lysholm Scoring Scale has been suggested...

  1. Areva, reference document 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This reference document contains information on the AREVA group's objectives, prospects and development strategies, particularly in Chapters 4 and 7. It contains information on the markets, market shares and competitive position of the AREVA group. Content: - 1 Person responsible for the reference document and persons responsible for auditing the financial statements; - 2 Information pertaining to the transaction (Not applicable); - 3 General information on the company and its share capital: Information on AREVA, on share capital and voting rights, Investment certificate trading, Dividends, Organization chart of AREVA group companies, Equity interests, Shareholders' agreements; - 4 Information on company operations, new developments and future prospects: Overview and strategy of the AREVA group, The Nuclear Power and Transmission and Distribution markets, The energy businesses of the AREVA group, Front End division, Reactors and Services division, Back End division, Transmission and Distribution division, Major contracts, The principal sites of the AREVA group, AREVA's customers and suppliers, Sustainable Development and Continuous Improvement, Capital spending programs, Research and development programs, intellectual property and trademarks, Risk and insurance; - 5 Assets - Financial position - Financial performance: Analysis of and comments on the group's financial position and performance, 2006 Human Resources Report, Environmental Report, Consolidated financial statements, Notes to the consolidated financial statements, AREVA SA financial statements, Notes to the corporate financial statements; 6 - Corporate Governance: Composition and functioning of corporate bodies, Executive compensation, Profit-sharing plans, AREVA Values Charter, Annual Combined General Meeting of Shareholders of May 3, 2007; 7 - Recent developments and future prospects: Events subsequent to year-end closing for 2006, Outlook; 8 - Glossary; 9 - Table of concordance

  2. Areva - 2014 Reference document

    International Nuclear Information System (INIS)

    2015-01-01

    Areva supplies high added-value products and services to support the operation of the global nuclear fleet. The company is present throughout the entire nuclear cycle, from uranium mining to used fuel recycling, including nuclear reactor design and operating services. Areva is recognized by utilities around the world for its expertise, its skills in cutting-edge technologies and its dedication to the highest level of safety. Areva's 44,000 employees are helping build tomorrow's energy model: supplying ever safer, cleaner and more economical energy to the greatest number of people. This Reference Document contains information on Areva's objectives, prospects and development strategies. It contains estimates of the markets, market shares and competitive position of Areva. Contents: 1 - Person responsible; 2 - Statutory auditors; 3 - Selected financial information; 4 - Risk factors; 5 - Information about the issuer; 6 - Business overview; 7 - Organizational structure; 8 - Property, plant and equipment; 9 - Analysis of and comments on the group's financial position and performance; 10 - Capital resources; 11 - Research and development programs, patents and licenses; 12 - Trend information; 13 - Profit forecasts; 14 - Administrative, management and supervisory bodies and senior management; 15 - Compensation and benefits; 16 - Functioning of administrative, management and supervisory bodies and senior management; 17 - Employees; 18 - Principal shareholders; 19 - Transactions with related parties; 20 - Financial information concerning assets, financial positions and financial performance; 21 - Additional information; 22 - Major contracts; 23 - Third party information, statements by experts and declarations of interest; 24 - Documents on display; 25 - information on holdings; appendix: Report of the Chairman of the Board of Directors on governance, internal control procedures and risk management, Statutory Auditors' report, Corporate social

  3. Areva reference document 2007

    International Nuclear Information System (INIS)

    2008-01-01

    This reference document contains information on the AREVA group's objectives, prospects and development strategies, particularly in Chapters 4 and 7. It contains also information on the markets, market shares and competitive position of the AREVA group. Content: 1 - Person responsible for the reference document and persons responsible for auditing the financial statements; 2 - Information pertaining to the transaction (not applicable); 3 - General information on the company and its share capital: Information on Areva, Information on share capital and voting rights, Investment certificate trading, Dividends, Organization chart of AREVA group companies, Equity interests, Shareholders' agreements; 4 - Information on company operations, new developments and future prospects: Overview and strategy of the AREVA group, The Nuclear Power and Transmission and Distribution markets, The energy businesses of the AREVA group, Front End division, Reactors and Services division, Back End division, Transmission and Distribution division, Major contracts 140 Principal sites of the AREVA group, AREVA's customers and suppliers, Sustainable Development and Continuous Improvement, Capital spending programs, Research and Development programs, Intellectual Property and Trademarks, Risk and insurance; 5 - Assets financial position financial performance: Analysis of and comments on the group's financial position and performance, Human Resources report, Environmental report, Consolidated financial statements 2007, Notes to the consolidated financial statements, Annual financial statements 2007, Notes to the corporate financial statements; 6 - Corporate governance: Composition and functioning of corporate bodies, Executive compensation, Profit-sharing plans, AREVA Values Charter, Annual Ordinary General Meeting of Shareholders of April 17, 2008; 7 - Recent developments and future prospects: Events subsequent to year-end closing for 2007, Outlook; Glossary; table of concordance

  4. Identity, History, Tolerance

    Directory of Open Access Journals (Sweden)

    Surovtsev V.A.

    2016-01-01

    Full Text Available The article discusses the role of historical narratives in the formation of identity. Rüsen’s thesis on the contradiction of traditional historical identities that suggest an ethnocentric position with the processes of intercultural communication is analyzed. The potential of historical narratives in overcoming (or restricting ethnocentrism is considered. It is shown that ethnocentrism is constituted by kinds of the configuration of historical writing rather than by a subjective position of historical narrative authors. The types of stories suggest a the way of making history using only the criteria of success and failure in the interpretation of the past; b interpretation of history as teleological continuity; c merely the necessity to justify (to substantiate claims or to discredit something. It is alleged that the realization that the form of historical knowledge constructs, not discovers, can facilitate liberation from referential fallacy on the whole and enslavement by certain kinds of stories in particular. It is concluded that the recognition of the constitutive nature of historical narratives allows being independent from the traditional forms of historical knowledge and traditional ideas about their cultural value. In particular, it allows reconsidering the need to apply historical knowledge when constructing identity.

  5. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  6. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...... and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises...

  7. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  8. Social Identity and Group Contests

    OpenAIRE

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social identity increases investments in group contests. We show theoretically that increased social identity with the own group implies higher investments in Tullock contests. Empirically we find that induce...

  9. Social identity process within organizations

    OpenAIRE

    Bazarov, Takhir; Kuzmina, Maria

    2005-01-01

    Expanding and complex social realities cause new types of identity. Variety in organizations and workgroups (where people are involved), implies a special kind of social identity which can be defined as professional, organizational or managerial. The study of the social identity processes in organizations is a new interdisciplinary sphere that is presented especially commonly in European Social Psychology. The result of its theoretical comprehension is Social Identity Theory. In the article l...

  10. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  11. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  12. Smartphone Usage Patterns by Canadian Neurosurgery Residents: A National Cross-Sectional Survey.

    Science.gov (United States)

    Kameda-Smith, Michelle Masayo; Iorio-Morin, Christian; Winkler-Schwartz, Alexander; Ahmed, Uzair S; Bergeron, David; Bigder, Mark; Dakson, Ayoub; Elliott, Cameron A; Guha, Daipayan; Lavergne, Pascal; Makarenko, Serge; Taccone, Michael S; Tso, Michael; Wang, Bill; Fortin, David

    2018-03-01

    Smartphones and their apps are used ubiquitously in medical practice. However, in some cases their use can be at odds with current patient data safety regulations such as Canada's Personal Health Information Protection Act of 2004. To assess current practices and inform mobile application development, we sought to better understand mobile device usage patterns among Canadian neurosurgery residents. Through the Canadian Neurosurgery Research Collaborative, an online survey characterizing smartphone ownership and usage patterns was developed and sent to all Canadian neurosurgery resident in April of 2016. Questionnaires were collected and completed surveys analyzed. Of 146 eligible residents, 76 returned completed surveys (52% response rate). Of these 99% of respondents owned a smartphone, with 79% running on Apple's iOS. Four general mobile uses were identified: 1) communication between members of the medical team, 2) decision support, 3) medical reference, and 4) documentation through medical photography. Communication and photography were areas where the most obvious breaches in the Canadian Personal Health Information Protection Act were noted, with 89% of respondents taking pictures of patients' radiologic studies and 75% exchanging them with Short Message System. Hospital policies had no impact on user behaviors. Smartphones are used daily by most neurosurgery residents. Identified usage patterns are associated with perceived gains in efficacy and challenges in privacy and data reliability. We believe creating and improving workflows that address these usage patterns has a greater potential to improve privacy than changing policies and enforcing regulations. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Possible hepatotoxicity of chronic marijuana usage

    Directory of Open Access Journals (Sweden)

    Paulo Borini

    Full Text Available CONTEXT: Hepatotoxicity is a potential complication from the usage of various illicit drugs, possibly consequent to their liver metabolism, but information on this is scarce in the medical literature. OBJECTIVE: To study the occurrence of clinical and laboratory hepatic alterations in chronic marijuana users, from the use of marijuana on its own or in association with other legal or illicit drugs. TYPE OF STUDY: transversal study SETTING: Hospital Espírita de Marília, Marília, São Paulo, Brazil PARTICIPANTS: The study was made among 123 patients interned in the Hospital Espírita de Marília from October 1996 to December 1998, divided into 3 groups: 26 (21% using only marijuana, 83 (67.5% using marijuana and crack, and 14 (11.4% consuming marijuana and alcohol. PROCEDURES AND MAIN MEASUREMENTS: Patients were examined clinically with special emphasis on types of drugs used, drug intake route, age when consumption began, length and pattern of usage, presence of tattooing, jaundice, hepatomegaly and splenomegaly. Serum determinations of total proteins, albumin, globulin, total and fractions of bilirubin, aspartate (AST and alanine (ALT aminotransferases, alkaline phosphatase (AP, gamma-glutamyltransferase and prothrombin activity were performed. RESULTS: Among users of only marijuana, hepatomegaly was observed in 57.7% and splenomegaly in 73.1%, and slightly elevated AST (42.3%, ALT (34.6% and AP (53.8%. The three groups did not differ significantly in the prevalence of hepatomegaly, splenomegaly and hepatosplenomegaly. The group using both marijuana and alcohol showed the highest prevalence of alterations and highest levels of aminotransferases. Mean AP levels were above normal in all groups. CONCLUSIONS: Chronic marijuana usage, on its own or in association with other drugs, was associated with hepatic morphologic and enzymatic alterations. This indicates that cannabinoids are possible hepatotoxic substances.

  14. The management of electronic documents generated from compilation and revision processes of nuclear and radiation safety regulations and standards

    International Nuclear Information System (INIS)

    Wang Wenhai; Fan Yun; Shang Zhaorong

    2010-01-01

    As the Secretary Group of Regulations and Standards Review Committee on nuclear and radiation safe needs to deal with a large number of electronic documents in course of the regulation and standard review meetings, the article gives a systematical method including electronic document file naming and management as well as procedures of file transfer, storage and usage. (authors)

  15. Integration of clinical research documentation in electronic health records.

    Science.gov (United States)

    Broach, Debra

    2015-04-01

    Clinical trials of investigational drugs and devices are often conducted within healthcare facilities concurrently with clinical care. With implementation of electronic health records, new communication methods are required to notify nonresearch clinicians of research participation. This article reviews clinical research source documentation, the electronic health record and the medical record, areas in which the research record and electronic health record overlap, and implications for the research nurse coordinator in documentation of the care of the patient/subject. Incorporation of clinical research documentation in the electronic health record will lead to a more complete patient/subject medical record in compliance with both research and medical records regulations. A literature search provided little information about the inclusion of clinical research documentation within the electronic health record. Although regulations and guidelines define both source documentation and the medical record, integration of research documentation in the electronic health record is not clearly defined. At minimum, the signed informed consent(s), investigational drug or device usage, and research team contact information should be documented within the electronic health record. Institutional policies should define a standardized process for this integration in the absence federal guidance. Nurses coordinating clinical trials are in an ideal position to define this integration.

  16. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  17. Queering Black Racial Identity Development

    Science.gov (United States)

    Johnson, Alandis A.; Quaye, Stephen John

    2017-01-01

    We used queer theory to encourage readers to think differently about previous theories about Black racial identity development. Queer theory facilitates new and deeper understandings of how Black people develop their racial identities, prompting more fluidity and nuance. Specifically, we present a queered model of Black racial identity development…

  18. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  19. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  20. Use of an advanced document system in post-refuelling updating of nuclear power plant documentation

    International Nuclear Information System (INIS)

    Puech Suanzes, P.; Cortes Soler, M.

    1993-01-01

    This paper discusses the results of the extensive use of an advanced document system to update documentation prepared by traditional methods and affected by changes in the period between two plant refuellings. The implementation of a system for the capture, retrieval and storage of drawings using optical discs is part of a plan to modernize production and management tools and to thus achieve better control of document configuration. These processes are consequently optimized in that: 1. The deterioration of drawings is detained with the help of an identical, updated, legible, reliable support for all users. 2. The time required to update documentation is reduced. Given the large number of drawings, the implementation method should effectively combine costs and time. The document management tools ensure optical disc storage control so that from the moment a drawing resides in the system, any modification to it is made through the system utilities, thus ensuring quality and reducing schedules. The system described was used to update the electrical drawings of Almaraz Nuclear Power Plant. Changes made during the eighth refuelling of Unit I were incorporated and the time needed to issue the updated drawings was reduced by one month. (author)

  1. Roflumilast Usage from 2010 to 2016

    DEFF Research Database (Denmark)

    Salvesen, Øyvind Nicolay Ulland; Davidsen, Jesper Rømhild; Pottegård, Anton

    2018-01-01

    Roflumilast, a phosphodiesterase-4-inhibitor, is marketed as add-on treatment to inhaled bronchodilators and corticosteroids in COPD patients with frequent exacerbations. Although marketed since 2010, usage pattern of roflumilast for an entire nation has not previously been explored. This study...... (OR 0.62; 95% CI 0.49-0.80). The decreasing incidence and high level of early roflumilast discontinuation could be due to lack of benefit, a low awareness of romiflulast's indication among physicians, secondary to a challenging prescribing procedure, or to adverse effects. This article is protected...

  2. An assessment of worldwide supercomputer usage

    Energy Technology Data Exchange (ETDEWEB)

    Wasserman, H.J.; Simmons, M.L.; Hayes, A.H.

    1995-01-01

    This report provides a comparative study of advanced supercomputing usage in Japan and the United States as of Spring 1994. It is based on the findings of a group of US scientists whose careers have centered on programming, evaluating, and designing high-performance supercomputers for over ten years. The report is a follow-on to an assessment of supercomputing technology in Europe and Japan that was published in 1993. Whereas the previous study focused on supercomputer manufacturing capabilities, the primary focus of the current work was to compare where and how supercomputers are used. Research for this report was conducted through both literature studies and field research in Japan.

  3. Possible hepatotoxicity of chronic marijuana usage

    OpenAIRE

    Borini, Paulo; Guimarães, Romeu Cardoso; Borini, Sabrina Bicalho

    2004-01-01

    CONTEXT: Hepatotoxicity is a potential complication from the usage of various illicit drugs, possibly consequent to their liver metabolism, but information on this is scarce in the medical literature. OBJECTIVE: To study the occurrence of clinical and laboratory hepatic alterations in chronic marijuana users, from the use of marijuana on its own or in association with other legal or illicit drugs. TYPE OF STUDY: transversal study SETTING: Hospital Espírita de Marília, Marília, São Paulo, Braz...

  4. LSF usage for batch at CERN

    CERN Multimedia

    Schwickerath, Ulrich

    2007-01-01

    Contributed poster to the CHEP07. Original abstract: LSF 7, the latest version of Platform's batch workload management system, addresses many issues which limited the ability of LSF 6.1 to support large scale batch farms, such as the lxbatch service at CERN. In this paper we will present the status of the evaluation and deployment of LSF 7 at CERN, including issues concerning the integration of LSF 7 with the gLite grid middleware suite and, in particular, the steps taken to endure an efficient reporting of the local batch system status and usage to the Grid Information System

  5. Usage of burnable poison on research reactors

    International Nuclear Information System (INIS)

    Villarino, Eduardo Anibal

    2002-01-01

    The fuel assemblies with burnable poison are widely used on power reactors, but there are not commonly used on research reactors. This paper shows a neutronic analysis of the advantages and disadvantages of the burnable poison usage on research reactors. This paper analyses both burnable poison design used on research reactors: Boron on the lateral wall and Cadmium wires. Both designs include a parametric study on the design parameters like the amount and geometry of the burnable poison. This paper presents the design flexibility using burnable poisons, it does not find an optimal or final design, which it will strongly depend on the core characteristics and fuel management strategy. (author)

  6. Review of SKB's Code Documentation and Testing

    International Nuclear Information System (INIS)

    Hicks, T.W.

    2005-01-01

    evolution. Poly3D - a displacement discontinuity model developed at Stanford University and used by SKB to study the effects of movement on fractures that intersect canister deposition holes. UDEC, 3DEC, FLAC, and FLAC3D - geotechnical models developed by HCItasca, and used by SKB in thermo-hydro-mechanical analysis of repository host rock. M3 - a multivariate mixing and mass balance model developed by SKB to study the evolution of groundwater composition. The commercially available codes (CONNECTFLOW, ABAQUS, Poly3D, UDEC, 3DEC, FLAC, and FLAC3D) appear to have been subject to extensive testing, and the wide international usage of these codes offers a high level of confidence that they are fit for intended purpose. However, SKB has modified or developed some commercial codes in-house, and it is unclear whether these developments have become an integral part of, and have been subject to similar levels of testing as, the main code. Greater confidence in the applicability of the modified forms of these codes could be achieved if clear information on code usage and verification were available. Varying standards of code documentation have been identified for the SKB codes COMP23, FARF31, PROPER, the analytical radionuclide transport code, DarcyTools, and M3. The recent DarcyTools reports are of a high standard, providing comprehensive information on the model basis, code usage, and code verification and validation. User's guides and verification reports should be developed for all of SKB's codes that are of a similar standard to the DarcyTools documents and are consistent with appropriate software quality assurance (QA) procedures. To develop a greater understanding of suitable software documentation and testing standards, a brief review has been undertaken of software QA requirements in other radioactive waste disposal programmes. The review has provided useful insights into the type of code documentation that might be expected to accompany the submission of a repository

  7. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  8. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  9. Effectiveness of media and enforcement campaigns in increasing seat belt usage rates in a state with a secondary seat belt law.

    Science.gov (United States)

    Vasudevan, Vinod; Nambisan, Shashi S; Singh, Ashok K; Pearl, Traci

    2009-08-01

    In 2005, in terms of seat belt usage rates, Nevada ranked third nationally and first among states with secondary seat belt use enforcement laws in the United States. An effective combination of a media-based education and enforcement campaign helped in this regard. The objective of this article is to document the effectiveness of enforcement and media-based education and outreach campaigns on the seat belt usage rates in Nevada, a state with a secondary seat belt usage law. Observational data on seat belt usage and passenger fatality data are used to evaluate the effectiveness of enforcement campaigns and media-based education and outreach campaigns. Data based on observations of about 40,000 vehicles in each of the years 2003 to 2005 were analyzed. Statistical analyses show that a significant increase in seat belt usage rates among both drivers and passengers for both genders resulted from the accompanying the media and enforcement campaigns. The results from this study indicate that effective and well-planned media/enforcement campaigns can have a significant impact on seat belt usage rates even in a state where the enforcement of seat belt laws can only be as a secondary violation. They validate and expand on findings from other efforts documented in the literature. These results demonstrate that, if coordinated properly, media and enforcement campaigns work very effectively in increasing seat belt usage rates even in states with secondary seat belt laws.

  10. Documents and legal texts

    International Nuclear Information System (INIS)

    2015-01-01

    This section treats of the following Documents and legal texts: 1 - Canada: Nuclear Liability and Compensation Act (An Act respecting civil liability and compensation for damage in case of a nuclear incident, repealing the Nuclear Liability Act and making consequential amendments to other acts); 2 - Japan: Act on Compensation for Nuclear Damage (The purpose of this act is to protect persons suffering from nuclear damage and to contribute to the sound development of the nuclear industry by establishing a basic system regarding compensation in case of nuclear damage caused by reactor operation etc.); Act on Indemnity Agreements for Compensation of Nuclear Damage; 3 - Slovak Republic: Act on Civil Liability for Nuclear Damage and on its Financial Coverage and on Changes and Amendments to Certain Laws (This Act regulates: a) The civil liability for nuclear damage incurred in the causation of a nuclear incident, b) The scope of powers of the Nuclear Regulatory Authority (hereinafter only as the 'Authority') in relation to the application of this Act, c) The competence of the National Bank of Slovakia in relation to the supervised financial market entities in the financial coverage of liability for nuclear damage; and d) The penalties for violation of this Act)

  11. Documents and legal texts

    International Nuclear Information System (INIS)

    2014-01-01

    This section of the Bulletin presents the recently published documents and legal texts sorted by country: - Brazil: Resolution No. 169 of 30 April 2014. - Japan: Act Concerning Exceptions to Interruption of Prescription Pertaining to Use of Settlement Mediation Procedures by the Dispute Reconciliation Committee for Nuclear Damage Compensation in relation to Nuclear Damage Compensation Disputes Pertaining to the Great East Japan Earthquake (Act No. 32 of 5 June 2013); Act Concerning Measures to Achieve Prompt and Assured Compensation for Nuclear Damage Arising from the Nuclear Plant Accident following the Great East Japan Earthquake and Exceptions to the Extinctive Prescription, etc. of the Right to Claim Compensation for Nuclear Damage (Act No. 97 of 11 December 2013); Fourth Supplement to Interim Guidelines on Determination of the Scope of Nuclear Damage Resulting from the Accident at the Tokyo Electric Power Company Fukushima Daiichi and Daini Nuclear Power Plants (Concerning Damages Associated with the Prolongation of Evacuation Orders, etc.); Outline of 'Fourth Supplement to Interim Guidelines (Concerning Damages Associated with the Prolongation of Evacuation Orders, etc.)'. - OECD Nuclear Energy Agency: Decision and Recommendation of the Steering Committee Concerning the Application of the Paris Convention to Nuclear Installations in the Process of Being Decommissioned; Joint Declaration on the Security of Supply of Medical Radioisotopes. - United Arab Emirates: Federal Decree No. (51) of 2014 Ratifying the Convention on Supplementary Compensation for Nuclear Damage; Ratification of the Federal Supreme Council of Federal Decree No. (51) of 2014 Ratifying the Convention on Supplementary Compensation for Nuclear Damage

  12. Blogging Identity: How L2 Learners Express Themselves

    Directory of Open Access Journals (Sweden)

    Kiyomi FUJII

    2015-06-01

    Full Text Available This study discusses language learning and identity, particularly pertaining to intermediate-advanced-level Japanese-language learners, focusing on their target language and identity expression through their interactions with peers and Japanese college students. When learners of Japanese express their identities while interacting with others in their target language, they feel a gap between the self-image they want to present, and the image they are capable of presenting in Japanese (Siegal, 1994, 1995, 1996. Along with adjusting their L1 and L2 usage depending on their interlocutor (Kurata 2007, learners also use different sentence-ending styles depending on the role they want to assume (Cook 2008. By conducting a case study, the present inquiry attempts to address how learners of Japanese express their identities through blog conversations, focusing on their language choice and expressions. Results suggest that participants use the formal endings for self-presentation and projection of their student and classmate identity. However, when expressing emotion some students preferred informal endings, or sentence-final particles.

  13. "Heinrich events" (& sediments): A history of terminology and recommendations for future usage

    Science.gov (United States)

    Andrews, John T.; Voelker, Antje H. L.

    2018-05-01

    We document the history of terms used to describe Heinrich (H-) layers and events and which mark major glaciological iceberg discharge events in the North Atlantic. We argue that the usage "Heinrich layer," "Heinrich zone", or "Heinrich event" should be restricted to only those sediments that can be ascribed to an origin from the Hudson Strait Ice Stream and the Laurentide Ice Sheet. We also argue that the commonplace understanding of these events--as dominated by massive iceberg discharges --fails to include the earlier well-documented evidence that these events were also massive meltwater events linked to deposition along the North Atlantic Mid-Ocean Channel (NAMOC) in the Labrador Sea. We make five recommendations for future usage of "Heinrich events," which include: restricting the usage to those events that can be mineralogically/geochemically linked to Hudson Strait; abandoning the term "Heinrich stadial"; and promote local terminology for "ice rafted events" that may be correlated, or not, with Hudson Strait Heinrich events based on calibrated radiocarbon dates or other appropriate chronological markers.

  14. Document image analysis: A primer

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    (1) Typical documents in today's office are computer-generated, but even so, inevitably by different computers and ... different sizes, from a business card to a large engineering drawing. Document analysis ... Whether global or adaptive ...

  15. Document management in engineering construction

    International Nuclear Information System (INIS)

    Liao Bing

    2008-01-01

    Document management is one important part of systematic quality management, which is one of the key factors to ensure the construction quality. In the engineering construction, quality management and document management shall interwork all the time, to ensure the construction quality. Quality management ensures that the document is correctly generated and adopted, and thus the completeness, accuracy and systematicness of the document satisfy the filing requirements. Document management ensures that the document is correctly transferred during the construction, and various testimonies such as files and records are kept for the engineering construction and its quality management. This paper addresses the document management in the engineering construction based on the interwork of the quality management and document management. (author)

  16. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  17. Identities at Odds

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2015-01-01

    This study offers an interaction analytic account of how linguistic identities in internationalized workplaces in Denmark are indexed against members’ institutional positions in particular interactional settings. Where language policy may not be explicitly articulated between members, it is still....... The study uses recordings of naturally occurring interaction in different international workplace settings, and argues for greater attention to be paid to the actual language-policy practices in international workplace settings, as a entry point into developing a more nuanced understanding of the practices...

  18. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  19. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  20. Identities in Migration

    Directory of Open Access Journals (Sweden)

    Montserrat Clua i Fainé

    2017-08-01

    Full Text Available Young Catalans in London build their identity as immigrants in a close dialectic between their own imaginary about immigration in their country of origin and British perceptions of them. Given the negative stigma attached to the category of «immigrant», not all recognise themselves as such. Some simply refuse to acknowledge they belong to this category, while others use the projection of prejudices on immigrants towards Spaniards as a strategy from which they distance themselves by establishing a distinction between Catalans and Spaniards.

  1. Recommended HSE-7 documents hierarchy

    International Nuclear Information System (INIS)

    Klein, R.B.; Jennrich, E.A.; Lund, D.M.; Danna, J.G.; Davis, K.D.; Rutz, A.C.

    1990-01-01

    This report recommends a hierarchy of waste management documents at Los Alamos National Laboratory (LANL or ''Laboratory''). The hierarchy addresses documents that are required to plan, implement, and document waste management programs at Los Alamos. These documents will enable the waste management group and the six sections contained within that group to satisfy requirements that are imposed upon them by the US Department of Energy (DOE), DOE Albuquerque Operations, US Environmental Protection Agency, various State of New Mexico agencies, and Laboratory management

  2. User Behavior Assessment of Household Electric Usage

    Directory of Open Access Journals (Sweden)

    Nur Budi Mulyono

    2014-02-01

    Full Text Available Abstract. Energy resilience is one of the famous issues among researchers and practitioners in energy sector. With enabling new technologies in power engineering for smart grid such as distributed generation, distributed storage, and intelligent information and management, each household community can establish a resilience energy production, distribution, and consumption. A household in smart grid system behaves as a customer and producer at the same time. This condition enabled them to reduce the power shortage in the peak hours, reduce CO2 pollution using renewable electricity, and minimizing electricity usage by changing life style. In developing countries, the amount of electricity supply is less than its demand. Most of the demand comes from the household that has peak load on nighttime. Keywords: User behavior, Game theory, Smart grid, Heating and cooling appliances, Energy resilientdoi:10.12695/ajtm.2013.6.2.1 How to cite this article:Mulyono, N. B. (2013. User Behavior Assessment of Household Electric Usage. The Asian Journal of Technology Management 6 (2: 65-71. Print ISSN: 1978-6956; Online ISSN: 2089-791X. doi:10.12695/ajtm.2013.6.2.1  

  3. Problematic Internet Usage and Immune Function.

    Science.gov (United States)

    Reed, Phil; Vile, Rebecca; Osborne, Lisa A; Romano, Michela; Truzoli, Roberto

    2015-01-01

    Problematic internet use has been associated with a variety of psychological comorbidities, but it relationship with physical illness has not received the same degree of investigation. The current study surveyed 505 participants online, and asked about their levels of problematic internet usage (Internet Addiction Test), depression and anxiety (Hospital Anxiety and Depression Scales), social isolation (UCLA Loneliness Questionnaire), sleep problems (Pittsburgh Sleep Quality Index), and their current health - General Health Questionnaire (GHQ-28), and the Immune Function Questionnaire. The results demonstrated that around 30% of the sample displayed mild or worse levels of internet addiction, as measured by the IAT. Although there were differences in the purposes for which males and females used the internet, there were no differences in terms of levels of problematic usage between genders. The internet problems were strongly related to all of the other psychological variables such as depression, anxiety, social-isolation, and sleep problems. Internet addiction was also associated with reduced self-reported immune function, but not with the measure of general health (GHQ-28). This relationship between problematic internet use and reduced immune function was found to be independent of the impact of the co-morbidities. It is suggested that the negative relationship between level of problematic internet use and immune function may be mediated by levels of stress produced by such internet use, and subsequent sympathetic nervous activity, which related to immune-supressants, such as cortisol.

  4. Usage of cell nomenclature in biomedical literature

    KAUST Repository

    Kafkas, Senay

    2017-12-21

    Background Cell lines and cell types are extensively studied in biomedical research yielding to a significant amount of publications each year. Identifying cell lines and cell types precisely in publications is crucial for science reproducibility and knowledge integration. There are efforts for standardisation of the cell nomenclature based on ontology development to support FAIR principles of the cell knowledge. However, it is important to analyse the usage of cell nomenclature in publications at a large scale for understanding the level of uptake of cell nomenclature in literature by scientists. In this study, we analyse the usage of cell nomenclature, both in Vivo, and in Vitro in biomedical literature by using text mining methods and present our results. Results We identified 59% of the cell type classes in the Cell Ontology and 13% of the cell line classes in the Cell Line Ontology in the literature. Our analysis showed that cell line nomenclature is much more ambiguous compared to the cell type nomenclature. However, trends indicate that standardised nomenclature for cell lines and cell types are being increasingly used in publications by the scientists. Conclusions Our findings provide an insight to understand how experimental cells are described in publications and may allow for an improved standardisation of cell type and cell line nomenclature as well as can be utilised to develop efficient text mining applications on cell types and cell lines. All data generated in this study is available at https://github.com/shenay/CellNomenclatureStudy.

  5. Problematic Internet Usage and Immune Function.

    Directory of Open Access Journals (Sweden)

    Phil Reed

    Full Text Available Problematic internet use has been associated with a variety of psychological comorbidities, but it relationship with physical illness has not received the same degree of investigation. The current study surveyed 505 participants online, and asked about their levels of problematic internet usage (Internet Addiction Test, depression and anxiety (Hospital Anxiety and Depression Scales, social isolation (UCLA Loneliness Questionnaire, sleep problems (Pittsburgh Sleep Quality Index, and their current health - General Health Questionnaire (GHQ-28, and the Immune Function Questionnaire. The results demonstrated that around 30% of the sample displayed mild or worse levels of internet addiction, as measured by the IAT. Although there were differences in the purposes for which males and females used the internet, there were no differences in terms of levels of problematic usage between genders. The internet problems were strongly related to all of the other psychological variables such as depression, anxiety, social-isolation, and sleep problems. Internet addiction was also associated with reduced self-reported immune function, but not with the measure of general health (GHQ-28. This relationship between problematic internet use and reduced immune function was found to be independent of the impact of the co-morbidities. It is suggested that the negative relationship between level of problematic internet use and immune function may be mediated by levels of stress produced by such internet use, and subsequent sympathetic nervous activity, which related to immune-supressants, such as cortisol.

  6. Problematic Internet Usage and Immune Function

    Science.gov (United States)

    Reed, Phil; Vile, Rebecca; Osborne, Lisa A.; Romano, Michela; Truzoli, Roberto

    2015-01-01

    Problematic internet use has been associated with a variety of psychological comorbidities, but it relationship with physical illness has not received the same degree of investigation. The current study surveyed 505 participants online, and asked about their levels of problematic internet usage (Internet Addiction Test), depression and anxiety (Hospital Anxiety and Depression Scales), social isolation (UCLA Loneliness Questionnaire), sleep problems (Pittsburgh Sleep Quality Index), and their current health – General Health Questionnaire (GHQ-28), and the Immune Function Questionnaire. The results demonstrated that around 30% of the sample displayed mild or worse levels of internet addiction, as measured by the IAT. Although there were differences in the purposes for which males and females used the internet, there were no differences in terms of levels of problematic usage between genders. The internet problems were strongly related to all of the other psychological variables such as depression, anxiety, social-isolation, and sleep problems. Internet addiction was also associated with reduced self-reported immune function, but not with the measure of general health (GHQ-28). This relationship between problematic internet use and reduced immune function was found to be independent of the impact of the co-morbidities. It is suggested that the negative relationship between level of problematic internet use and immune function may be mediated by levels of stress produced by such internet use, and subsequent sympathetic nervous activity, which related to immune-supressants, such as cortisol. PMID:26244339

  7. The Student Teacher Portfolio as Autobiography: Developing a Professional Identity.

    Science.gov (United States)

    Antonek, Janis L.; And Others

    1997-01-01

    Argues that student teacher portfolios are a viable, effective, appropriate tool for documenting teacher growth and development and for promoting reflective practice. Traces the unique paths of two pre-service foreign language teachers who constructed a professional identity from the historical and cultural conditions of their classroom…

  8. Medical students' professional identity development in an early nursing attachment

    NARCIS (Netherlands)

    Helmich, Esther; Derksen, Els; Prevoo, Mathieu; Laan, Roland; Bolhuis, Sanneke; Koopmans, Raymond

    Objectives The importance of early clinical experience for medical training is well documented. However, to our knowledge there are no studies that assess the influence of very early nursing attachments on the professional development and identity construction of medical students. Working as an

  9. Medical students' professional identity development in an early nursing attachment.

    NARCIS (Netherlands)

    Helmich, E.; Derksen, E.; Prevoo, M.; Laan, R.F.J.M.; Bolhuis, S.; Koopmans, R.T.C.M.

    2010-01-01

    OBJECTIVES: The importance of early clinical experience for medical training is well documented. However, to our knowledge there are no studies that assess the influence of very early nursing attachments on the professional development and identity construction of medical students. Working as an

  10. Leadership and Identity in the Catholic School: An Australian Perspective

    Science.gov (United States)

    Sultmann, William F.; Brown, Raymond

    2016-01-01

    This article explores the nature of leadership as expressed in literature and workshop commentary on the identity of the Catholic school within an Australian context. Employing a qualitative methodology, data from workshops designed around school mission were compared and integrated with data from texts of selected Post Conciliar documents on the…

  11. The Intersectionality of Religious Belief and Sexual Identity

    Science.gov (United States)

    Yadron, Christopher

    2016-01-01

    The potential for conflict or tension between the cultural variables of sexual identity and religious belief for counselors, clients, and counseling students is well-documented by the counseling literature. The tension has existed primarily due to competing religious values for counselors and clients most often with respect to the phenomena of…

  12. Long-term memory of individual identity in ant queens

    DEFF Research Database (Denmark)

    Dreier, Stéphanie Agnès Jeanine; Van Zweden, Jelle Stijn; D'Ettorre, Patrizia

    2007-01-01

    of familiar or unfamiliar queens over time. We show that unrelated founding queens of P. villosa and Pachycondyla inversa store information on the individual identity of other queens and can retrieve it from memory after 24h of separation. Thus, we have documented for the first time that long-term memory...

  13. Identity style and coping strategies.

    Science.gov (United States)

    Berzonsky, M D

    1992-12-01

    This study examined the relationship between identity style and strategies used to cope with stressors that potentially threaten one's sense of identity. Identity style refers to differences in the way individuals construct and revise or maintain their sense of identity. An informational style involves actively seeking out, evaluating, and utilizing self-relevant information. A normative style highlights the expectations and standards of significant others. A diffuse/avoidant style is characterized by procrastination and situation-specific reactions. Late-adolescent college subjects were administered measures of identity style, ways of coping with academic stressors, and test anxiety. Within this self-as-student context, subjects with diffuse and normative identity styles employed avoidant-oriented coping strategies (wishful thinking, distancing, and tension reduction). An informational style was associated with deliberate, problem-focused coping. Findings are discussed in terms of a process model of identity development.

  14. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  15. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  16. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns

    Science.gov (United States)

    Cho, Hyun; Chun, Ji-Won; Jeong, Jo-Eun; Kim, Dai-Jin

    2017-01-01

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smartphone games; (3) individuals who played computer and smartphone games evenly; (4) individuals who played smartphone games more than computer games; (5) individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers) (B = 0.457, odds ratio = 1.579). Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD. PMID:29206183

  17. Cloud Usage Patterns : A Formalism for Description of Cloud Usage Scenarios

    NARCIS (Netherlands)

    Milenkoski, Aleksandar; Iosup, Alexandru; Kounev, Samuel; Sachs, Kai; Rygielski, Piotr; Ding, Jason; Cirne, Walfredo; Rosenberg, Florian

    2014-01-01

    Cloud computing is becoming an increasingly lucrative branch of the existing information and communication technologies (ICT). Enabling a debate about cloud usage scenarios can help with attracting new customers, sharing best-practices, and designing new cloud services. In contrast to previous

  18. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns.

    Science.gov (United States)

    Paik, Soo-Hyun; Cho, Hyun; Chun, Ji-Won; Jeong, Jo-Eun; Kim, Dai-Jin

    2017-12-05

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smartphone games; (3) individuals who played computer and smartphone games evenly; (4) individuals who played smartphone games more than computer games; (5) individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers) (B = 0.457, odds ratio = 1.579). Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD.

  19. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns

    Directory of Open Access Journals (Sweden)

    Soo-Hyun Paik

    2017-12-01

    Full Text Available Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD. Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1 individuals who played only computer games; (2 individuals who played computer games more than smartphone games; (3 individuals who played computer and smartphone games evenly; (4 individuals who played smartphone games more than computer games; (5 individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers (B = 0.457, odds ratio = 1.579. Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD.

  20. Analysis of synonymous codon usage patterns in the genus Rhizobium.

    Science.gov (United States)

    Wang, Xinxin; Wu, Liang; Zhou, Ping; Zhu, Shengfeng; An, Wei; Chen, Yu; Zhao, Lin

    2013-11-01

    The codon usage patterns of rhizobia have received increasing attention. However, little information is available regarding the conserved features of the codon usage patterns in a typical rhizobial genus. The codon usage patterns of six completely sequenced strains belonging to the genus Rhizobium were analysed as model rhizobia in the present study. The relative neutrality plot showed that selection pressure played a role in codon usage in the genus Rhizobium. Spearman's rank correlation analysis combined with correspondence analysis (COA) showed that the codon adaptation index and the effective number of codons (ENC) had strong correlation with the first axis of the COA, which indicated the important role of gene expression level and the ENC in the codon usage patterns in this genus. The relative synonymous codon usage of Cys codons had the strongest correlation with the second axis of the COA. Accordingly, the usage of Cys codons was another important factor that shaped the codon usage patterns in Rhizobium genomes and was a conserved feature of the genus. Moreover, the comparison of codon usage between highly and lowly expressed genes showed that 20 unique preferred codons were shared among Rhizobium genomes, revealing another conserved feature of the genus. This is the first report of the codon usage patterns in the genus Rhizobium.

  1. Joint pain epidemiology and analgesic usage in Madagascar.

    Science.gov (United States)

    Samison, Luc Hervé; Randriatsarafara, Fidiniaina Mamy; Ralandison, Stéphane

    2017-01-01

    To describe the epidemiology of joint pains and document analgesics usage in an African context. Patients suffering from joint pain were recruited from nine sites located in Antananarivo, Madagascar, including 6 hospital services and 3 clinics. Doctors collected information on the etiology and characteristics of the patients' pain. Analgesics prescribed by these doctors were also documented. In total, 400 patients were enrolled in the study (52.5% women, mean age of 42.34 years ± 17.7 [4-86]). Pain of mechanical type was found in 260 participants, 65%; 95% CI [60.1% to 69.6%] and inflammatory type pains in 128 cases 32%; 95% CI [27.5% to 36.9%]. Mixed pains were found in 12 patients (3%). The median duration of pain prior to the consultation was 6.5 days. The average pain intensity was 57.9 ± 19.9 mm of a total of 100 mm maximum on a visual analogue scale, VAS. The etiologies of mechanical type pains were dominated by fracture, common low back pain and tendonitis. Arthrosis was the dominant cause of inflammatory type pain, followed by rheumatoid arthritis and gout. NSAIDs (74.5%) were the most frequently prescribed analgesics followed by paracetamol (49.5%), weak opioids (23%) and corticosteroids (12.25%). Two-thirds of medical prescriptions (65.3%) were of combined analgesics. These findings demonstrated that mechanical type pains were the main reason for consultations for joint pain in these situations in Antananarivo, Madagascar. The most frequently prescribed pain-relieving medications were NSAIDs, paracetamol, weak opioids and corticosteroids. This descriptive study may be a useful starting point for further epidemiological studies of pain in the African context.

  2. Improving collaborative documentation in CMS

    International Nuclear Information System (INIS)

    Lassila-Perini, Kati; Salmi, Leena

    2010-01-01

    Complete and up-to-date documentation is essential for efficient data analysis in a large and complex collaboration like CMS. Good documentation reduces the time spent in problem solving for users and software developers. The scientists in our research environment do not necessarily have the interests or skills of professional technical writers. This results in inconsistencies in the documentation. To improve the quality, we have started a multidisciplinary project involving CMS user support and expertise in technical communication from the University of Turku, Finland. In this paper, we present possible approaches to study the usability of the documentation, for instance, usability tests conducted recently for the CMS software and computing user documentation.

  3. Mobile user identity sensing using the motion sensor

    Science.gov (United States)

    Zhao, Xi; Feng, Tao; Xu, Lei; Shi, Weidong

    2014-05-01

    Employing mobile sensor data to recognize user behavioral activities has been well studied in recent years. However, to adopt the data as a biometric modality has rarely been explored. Existing methods either used the data to recognize gait, which is considered as a distinguished identity feature; or segmented a specific kind of motion for user recognition, such as phone picking-up motion. Since the identity and the motion gesture jointly affect motion data, to fix the gesture (walking or phone picking-up) definitively simplifies the identity sensing problem. However, it meanwhile introduces the complexity from gesture detection or requirement on a higher sample rate from motion sensor readings, which may draw the battery fast and affect the usability of the phone. In general, it is still under investigation that motion based user authentication in a large scale satisfies the accuracy requirement as a stand-alone biometrics modality. In this paper, we propose a novel approach to use the motion sensor readings for user identity sensing. Instead of decoupling the user identity from a gesture, we reasonably assume users have their own distinguishing phone usage habits and extract the identity from fuzzy activity patterns, represented by a combination of body movements whose signals in chains span in relative low frequency spectrum and hand movements whose signals span in relative high frequency spectrum. Then Bayesian Rules are applied to analyze the dependency of different frequency components in the signals. During testing, a posterior probability of user identity given the observed chains can be computed for authentication. Tested on an accelerometer dataset with 347 users, our approach has demonstrated the promising results.

  4. E-book usage amongst academic librarians in South Africa

    Directory of Open Access Journals (Sweden)

    Sandy Zinn

    2011-01-01

    Full Text Available The purpose of this study completed in 2010 was to investigate the use of e-books amongst academic librarians; in particular which e-books are available to academic librarians, why they choose this format, what impact e-books have on librarians’ professional practice and what the usage patterns of e-books are amongst academic librarians. A web-based questionnaire was distributed on the LIASA mailing list. The results reflect a more gradual trend towards e-book adoption. There is still a preference for print or a “bit of both” – print and electronic. This is because of the high costs of e-books using the subscription model as the predominant e-book acquisition model and the lack of sufficient e-books in all subject fields. E-books are used for “browsing for information” and are selected for functionalities such as having the ability to search the document, anytime access and automatic citation. Major problems identified with e-books are: the cost of the equipment to read e-book formats; the cost of the e-books, especially if the subscription purchasing model is used; the lack of reliability of the Internet; and the lack of training in the use of e-books.

  5. METEOR v1.0 - A usage example

    International Nuclear Information System (INIS)

    Palomo, E.

    1994-01-01

    This script describes a detailed example of the use of the software package METEOR for statistical analysis of meteorological data series. A real spanish meteorological data set is chosen to show the capabilities of METEOR. Output files and resultant plots provided of their interpretations are compiled in three appendixes. The original version of METEOR have been developed by Ph. D.Elena Palomo, CIEMAT-IER, GIASE. It is built by linking programs and routines written in FORTRAN 77 and it adds the graphical capabilities of GNUPLOT. The shape of this toolbox was designed following the criteria of modularity, flexibility and agility criteria. All the input, output and analysis options are structured in three main menus: i) the first is aimed to evaluate the quality of the data set; ii) the second is aimed for pre-processing of the data; and iii) the third is aimed towards the statistical analyses and for creating the graphical outputs. Actually the information about METEOR is constituted by three documents written is spanish: 1) METEOR v1.0: User's guide; 2) METEOR v1.0: A usage example; 3) METEOR v1 .0: Design and structure of the software package. (Author)

  6. Gaia DR2 documentation

    Science.gov (United States)

    van Leeuwen, F.; de Bruijne, J. H. J.; Arenou, F.; Bakker, J.; Blomme, R.; Busso, G.; Cacciari, C.; Castañeda, J.; Cellino, A.; Clotet, M.; Comoretto, G.; Eyer, L.; González-Núñez, J.; Guy, L.; Hambly, N.; Hobbs, D.; van Leeuwen, M.; Luri, X.; Manteiga, M.; Pourbaix, D.; Roegiers, T.; Salgado, J.; Sartoretti, P.; Tanga, P.; Ulla, A.; Utrilla Molina, E.; Abreu, A.; Altmann, M.; Andrae, R.; Antoja, T.; Audard, M.; Babusiaux, C.; Bailer-Jones, C. A. L.; Barache, C.; Bastian, U.; Beck, M.; Berthier, J.; Bianchi, L.; Biermann, M.; Bombrun, A.; Bossini, D.; Breddels, M.; Brown, A. G. A.; Busonero, D.; Butkevich, A.; Cantat-Gaudin, T.; Carrasco, J. M.; Cheek, N.; Clementini, G.; Creevey, O.; Crowley, C.; David, M.; Davidson, M.; De Angeli, F.; De Ridder, J.; Delbò, M.; Dell'Oro, A.; Diakité, S.; Distefano, E.; Drimmel, R.; Durán, J.; Evans, D. W.; Fabricius, C.; Fabrizio, M.; Fernández-Hernández, J.; Findeisen, K.; Fleitas, J.; Fouesneau, M.; Galluccio, L.; Gracia-Abril, G.; Guerra, R.; Gutiérrez-Sánchez, R.; Helmi, A.; Hernandez, J.; Holl, B.; Hutton, A.; Jean-Antoine-Piccolo, A.; Jevardat de Fombelle, G.; Joliet, E.; Jordi, C.; Juhász, Á.; Klioner, S.; Löffler, W.; Lammers, U.; Lanzafame, A.; Lebzelter, T.; Leclerc, N.; Lecoeur-Taïbi, I.; Lindegren, L.; Marinoni, S.; Marrese, P. M.; Mary, N.; Massari, D.; Messineo, R.; Michalik, D.; Mignard, F.; Molinaro, R.; Molnár, L.; Montegriffo, P.; Mora, A.; Mowlavi, N.; Muinonen, K.; Muraveva, T.; Nienartowicz, K.; Ordenovic, C.; Pancino, E.; Panem, C.; Pauwels, T.; Petit, J.; Plachy, E.; Portell, J.; Racero, E.; Regibo, S.; Reylé, C.; Rimoldini, L.; Ripepi, V.; Riva, A.; Robichon, N.; Robin, A.; Roelens, M.; Romero-Gómez, M.; Sarro, L.; Seabroke, G.; Segovia, J. C.; Siddiqui, H.; Smart, R.; Smith, K.; Sordo, R.; Soria, S.; Spoto, F.; Stephenson, C.; Turon, C.; Vallenari, A.; Veljanoski, J.; Voutsinas, S.

    2018-04-01

    The second Gaia data release, Gaia DR2, encompasses astrometry, photometry, radial velocities, astrophysical parameters (stellar effective temperature, extinction, reddening, radius, and luminosity), and variability information plus astrometry and photometry for a sample of pre-selected bodies in the solar system. The data collected during the first 22 months of the nominal, five-year mission have been processed by the Gaia Data Processing and Analysis Consortium (DPAC), resulting into this second data release. A summary of the release properties is provided in Gaia Collaboration et al. (2018b). The overall scientific validation of the data is described in Arenou et al. (2018). Background information on the mission and the spacecraft can be found in Gaia Collaboration et al. (2016), with a more detailed presentation of the Radial Velocity Spectrometer (RVS) in Cropper et al. (2018). In addition, Gaia DR2 is accompanied by various, dedicated papers that describe the processing and validation of the various data products. Four more Gaia Collaboration papers present a glimpse of the scientific richness of the data. In addition to this set of refereed publications, this documentation provides a detailed, complete overview of the processing and validation of the Gaia DR2 data. Gaia data, from both Gaia DR1 and Gaia DR2, can be retrieved from the Gaia archive, which is accessible from https://archives.esac.esa.int/gaia. The archive also provides various tutorials on data access and data queries plus an integrated data model (i.e., description of the various fields in the data tables). In addition, Luri et al. (2018) provide concrete advice on how to deal with Gaia astrometry, with recommendations on how best to estimate distances from parallaxes. The Gaia archive features an enhanced visualisation service which can be used for quick initial explorations of the entire Gaia DR2 data set. Pre-computed cross matches between Gaia DR2 and a selected set of large surveys are

  7. HIV type 1 chemokine receptor usage in mother-to-child transmission.

    Science.gov (United States)

    Salvatori, F; Scarlatti, G

    2001-07-01

    To investigate the role of the HIV-1 phenotype in mother-to-child HIV-1 transmission, we evaluated coreceptor usage and replication kinetics in chemokine receptor-expressing U87MG.CD4 cells of primary isolates from 32 HIV-1-infected mothers of Italian origin, none under preventive antiretroviral therapy, and from their infected infants. Five of 15 mothers of infected children and 2 of 17 mothers of uninfected children harbored viruses able to use CXCR4 as coreceptor. However, all isolates used CCR5, alone or in association with CXCR4. The replicative capacity in coreceptor-expressing cells of the viral isolates did not differ between the two groups of mothers. All mothers with an R5 virus transmitted a virus with the same coreceptor usage, whereas those four with a multitropic virus transmitted such a virus in one case. Although the presence of a mixed viral population was documented in the mothers, we did not observe transmission solely of X4 viruses. Interestingly, the only child infected with a multitropic virus carried a defective CCR5 allele. Analysis of the env V3 region of the provirus from this child revealed infection with multiple viral variants with a predominance of R5-type over X4-type sequences. These findings show that CCR5 usage of a viral isolate is not a discriminating risk factor for vertical transmission. Furthermore, X4 viruses can be transmitted to the newborn, although less frequently. In particular, we document the transmission of multiple viral variants with different coreceptor usage in a Delta32 CCR5 heterozygous child, and demonstrate that the heterozygous genotype per se does not contribute to the restriction of R5-type virus spread.

  8. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  9. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  10. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  11. Do usage and scientific collaboration associate with citation impact

    Energy Technology Data Exchange (ETDEWEB)

    Chi, P.S.; Glänzel, W.

    2016-07-01

    In this study usage counts and times cited from Web of Science Core Collection (WoS) were collected for each article published in 2013 with Belgian, Israeli and Iranian addresses. We investigate the relations among three indicators related to citation impact, usage counts coauthorship, respectively. In addition, we apply the method of Characteristic Scores and Scal (CSS) to analyse the distributions of citations and usage counts. The results show that citations and usage counts in WoS correlate to each other significantly, especially in the social sciences. However, the increase of the number of co-authors does not increase usage counts or citations significantly. Furthermore, the stability of CSS-class distributions proves the availability of CSS in characterising both usage and citation distributions. (Author)

  12. Media Effects on Ethnic Identity among Linguistic Majorities and Minorities: A Longitudinal Study of a Bilingual Setting

    Science.gov (United States)

    Clement, Richard; Baker, Susan C.; Josephson, Gordon; Noels, Kimberly A.

    2005-01-01

    Research on media effects has documented the media's influence on beliefs and behavior while cross-cultural psychology has documented the effects of the language used in communication on identification with the ingroup and the outgroup. Media usage in the outgroup language should, therefore, affect identification patterns. This research…

  13. Le Feu et ses Usages Militaires

    Directory of Open Access Journals (Sweden)

    Finó, J. F.

    1970-12-01

    Full Text Available LE feu a toujours été une arme puissante. L'homme préhistorique, les Assyriens, les Grecs, les Byzantins, les Arabes, les bombes incendiaires de notre aviation, autant d'exemples de son usage militaire dans des pays et des temps fort divers. De plus, une de ses variantes, le feu grégeois pulvérulent, a été à l'origine de la poudre à canon. Il a donc paru intéressant de rassembler quelques données à ce sujet et de rappeler briévement la production des feux de guerre, leur lancement et la défense contre ses effets. Accessoirement, de dire quelques mots sur une autre branche de la chimie de guerre: les gaz asphyxiants.

  14. Medication usage in Majuro, Marshall Islands.

    Science.gov (United States)

    Harding, Andrew

    2005-03-01

    To conduct a drug utilisation study to determine the top 50 drugs by prescription count, top 50 drugs by cost to government and the top 30 drugs by consumption for Majuro Atoll, Marshall Islands for the year 2003. Data was collected from the Majuro Hospital computer dispensing system. All outpatient prescriptions dispensed in the year 2003 were included. The defined daily dose (DDD) methodology was employed. Drug consumption was presented as DDD/1000 population/day. The top 5 drugs by consumption in Majuro for 2003 were glibenclamide (glyburide), enalapril, ferrous sulphate, amoxycillin and ascorbic acid. Values for the DDD/1000 population/day were on average lower than many other countries. This is the first local study of medication usage in the Marshall Islands. It provided some useful baseline data.

  15. IceProd 2 Usage Experience

    Science.gov (United States)

    Delventhal, D.; Schultz, D.; Diaz Velez, J. C.

    2017-10-01

    IceProd is a data processing and management framework developed by the IceCube Neutrino Observatory for processing of Monte Carlo simulations, detector data, and data driven analysis. It runs as a separate layer on top of grid and batch systems. This is accomplished by a set of daemons which process job workflow, maintaining configuration and status information on the job before, during, and after processing. IceProd can also manage complex workflow DAGs across distributed computing grids in order to optimize usage of resources. IceProd has recently been rewritten to increase its scaling capabilities, handle user analysis workflows together with simulation production, and facilitate the integration with 3rd party scheduling tools. IceProd 2, the second generation of IceProd, has been running in production for several months now. We share our experience setting up the system and things we’ve learned along the way.

  16. Nostalgia and lost identity.

    Science.gov (United States)

    Pourtova, Elena

    2013-02-01

    Nostalgia for the Soviet Union is a major social phenomenon in Russia today due to the irrevocable losses of the recent past in which Soviet citizens involuntarily became immigrants in their own country. With reference to discussions of nostalgia in philosophical and psychoanalytic literature, I suggest that nostalgia may represent either a defensive regression to the past or a progressive striving for wholeness through re-connecting with what has been lost in the service of a greater integration. I compare this with the processes of adaptation seen in immigrants and provide a clinical illustration of a young man coming to terms with loss and change in the post-Soviet era. When nostalgia is recognized as a legitimate emotional experience it may facilitate mourning and enable the integration of the past with the present and the development of a new identity. © 2013, The Society of Analytical Psychology.

  17. Forging a Black identity

    Directory of Open Access Journals (Sweden)

    Barry Chevannes

    1992-07-01

    Full Text Available [First paragraph] The Rastafarians: sounds of cultural dissonance [revised and updated editionj. LEONARD E. BARRETT, SR. Boston: Beacon Press, 1988. xviii + 302 pp. (Paper US$ 11.95 Rasta and resistance: from Marcus Garvey to Walter Rodney. HORACE CAMPBELL. Trenton NJ: Africa World Press, 1987. xiii + 236 pp. (Cloth US$32.95, Paper US$ 10.95 Garvey's children: the legacy of Marcus Garvey. TONY SEWELL. London: Macmillan Caribbean, 1990. 128 pp. (Paper £ 17.95 The central theme linking these three titles is the evolution of a black identity among English-speaking Caribbean peoples, in particular Jamaicans. Consequently all three authors cover the two most important historical phenomena in Caribbean black nationalism, namely Garveyism and Rastafari, one focusing on the former and the other two focusing on the latter.

  18. National and Transnational Identities

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    within the Turkish minority in the three countries with special attention to the influence of transnational social transformation. Social communities and organisations such as trade unions, political parties or religious and cultural association have usually been ascribed the capability to enhance...... relations between individuals and to extend trust, values, identity and social belonging. Whether we focus on the individual and the value of face to face contact or we focus on the role of the organisation as an intervening institution between the state, the political system and the citizen...... in prolongation of the previous development. Conversely do the analyses of the Danish and German case show that models are not static. Denmark followed Sweden shortly after in introducing local voting rights for non-citizens and generally non-citizens enjoy considerable political, social and civic rights...

  19. Eye cosmetic usage and associated ocular comfort.

    Science.gov (United States)

    Ng, Alison; Evans, Katharine; North, Rachel; Purslow, Christine

    2012-11-01

    Eye cosmetics usage is commonplace and whilst some products such as eyeliner are applied with close proximity to the ocular surface, there is little knowledge of the short- and long-term ocular effects of eye cosmetic formulations. This study aimed to investigate the use of eye cosmetics and identify any relationships between ocular comfort and cosmetic usage. Results were collated from an online survey comprising 23 questions that recorded demographics, Ocular Surface Disease Index (OSDI) score, extent and range of eye cosmetic use and perceived comfort differences with and without eye cosmetics. The 1360 female respondents (median age 25, interquartile range 20-34 years) completed the survey; 83% reported using eye cosmetics regularly (≥ 3 times per week) with mascara being most commonly used. Fifty three per cent used at least three different eye cosmetics products regularly. OSDI scores of cosmetics users were similar to non-users (p = 0.083), but perceived comfort was greater when cosmetics were not used (p cosmetics users (use of products cosmetics were used. Median OSDI scores suggested a trend towards reduced comfort amongst eyeliner users (p = 0.07) although frequency and type of cosmetic products used did not appear to influence OSDI scores. This study shows the use of multiple eye cosmetics is extensive and associated with the perception of ocular discomfort. With such widespread use of these products, more research is required to assess the effect on the ocular surface and tear film, which may be underestimated. Ophthalmic & Physiological Optics © 2012 The College of Optometrists.

  20. "I'm Tired. You Clean and Cook." Shifting Gender Identities and Second Language Socialization

    Science.gov (United States)

    Gordon, Daryl

    2004-01-01

    Drawing on a multisite ethnographic study that spans educational, domestic, and workplace contexts in the United States and Laos, this article investigates the interplay between gender identity shifts and second language socialization, documenting the process by which working-class Lao women and men redefine gender identities in the United States.…

  1. Identity management for e-government Libya as a case study

    DEFF Research Database (Denmark)

    Elaswad, Othoman; Jensen, Christian D.

    2016-01-01

    Governments are strengthening their identity (ID) management strategies to deliver new and improved online services to their citizens. Such online services typically include applications for different types of permissions, requests for different types of official documents and management...... of different types of entitlements. The ID management scheme must therefore be able to correctly authenticate citizens and link online presence to real world identities....

  2. Creation, Identity and Reflection

    Directory of Open Access Journals (Sweden)

    Alina Beatrice Cheşcă

    2015-05-01

    Full Text Available The paper “Creation, Identity and Reflection” approaches the identification in the “mirror” of reality with creation, in other words seeking the authors’ identity in the reflected images. Reflection means attempting to find oneself, the mirror being the main principle of creation. Many characters become interesting only when they step into the world beyond the mirror, when their faces are doubled by the other self or when their selves are returned by other characters. The narcissistic concept of the mirror, i.e. the reflection in the mirror and the representation of the mirror itself, is a recurrent one in literature, but the reflection of the self which is not the self (as it is a reflection does not necessarily appear in a mirror or in a photograph or portrait. Sometimes, the not-self is returned to the self by another person or character. As far as Oscar Wilde’s theories are concerned, the main idea is that people are interesting for their masks, not for their inner nature. What Wilde calls “inner nature” is the characters’ un-reflected self and the mask is the reflection, the self in the mirror. Some characters’ relationships develop within a fiction that they dramatically try to preserve and protect with the risk of suffering. They refuse to take off the masks which define them in the others’ minds and hearts; the narcissistic individuals (both artists and characters seek and love their own image which they project upon facts, thus creating a fictive realm.

  3. D Visualization of a Timber Frame Historic Building: Partite Usage and its Impact on the Structural System

    Science.gov (United States)

    Günay, S.

    2017-08-01

    Throughout their lifetime, historic buildings might be altered for different kind of usage for different purposes. If this new function or new usage requires utilization of the building in separate units, this separation might affect the historic building's functionality and structure and as a result its overall condition. Yorguc Pasa Mansion conservation project was prepared as a part of the Middle East Technical University (METU) Master's Program in Documentation and Conservation of Historic Monuments and Sites for the historic Yorguc Pasa Mansion. The mansion is a 19th century Ottoman Period timber frame building in Amasya, a Black Sea Region city in Turkey that has traces from different civilizations such as Hittites, Greeks, Romans and Ottomans. This paper aims to discuss the affects of the partite usage on structural conditions of timber frame buildings with the case study of Amasya Yorguc Pasa Mansion through the 3D visualized structural systems.

  4. Estimating Usage Can Reduce the Stress of Social Networking

    OpenAIRE

    Zhou, Y.; Bird, J.; Cox, A. L.; Brumby, D.

    2013-01-01

    Social networks are increasingly popular and provide benefits such as easy peer group communication. However, there is evidence that they can have negative consequences, such as increased stress levels. For two weeks, we provided participants with an objective measure of their social network usage and also asked them for a daily estimate of their usage over the previous 24 hours. Although their social network usage did not significantly change, participants’ perception of this activity was tr...

  5. 50 CFR 600.910 - Definitions and word usage.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Definitions and word usage. 600.910..., Consultation, and Recommendations § 600.910 Definitions and word usage. (a) Definitions. In addition to the... undertaken by a state agency. (b) Word usage. The terms “must”, “shall”, “should”, “may”, “may not”, “will...

  6. 50 CFR 600.810 - Definitions and word usage.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Definitions and word usage. 600.810...) § 600.810 Definitions and word usage. (a) Definitions. In addition to the definitions in the Magnuson...-Stevens Act. (b) Word usage. The terms “must”, “shall”, “should”, “may”, “may not”, “will”, “could”, and...

  7. IT Department User Survey PDF Usage Report

    CERN Document Server

    Jones, Pete

    2017-01-01

    During 2016 the IT-CDA group carried out a study of IT users and their working environments and habits with the aim of understanding the user community better. This project involved interviews with users from different working backgrounds and an online survey containing questions of user devices and software preferences. A section of the questions was aimed at understanding how people handle PDF documents and this note analyses the responses to these. This analysis will help IT-CDA to better understand the PDF requirements and so help us to improve the services that rely on these documents.

  8. Document localization algorithms based on feature points and straight lines

    Science.gov (United States)

    Skoryukina, Natalya; Shemiakina, Julia; Arlazarov, Vladimir L.; Faradjev, Igor

    2018-04-01

    The important part of the system of a planar rectangular object analysis is the localization: the estimation of projective transform from template image of an object to its photograph. The system also includes such subsystems as the selection and recognition of text fields, the usage of contexts etc. In this paper three localization algorithms are described. All algorithms use feature points and two of them also analyze near-horizontal and near- vertical lines on the photograph. The algorithms and their combinations are tested on a dataset of real document photographs. Also the method of localization quality estimation is proposed that allows configuring the localization subsystem independently of the other subsystems quality.

  9. Documentation of Cultural Heritage Objects

    Directory of Open Access Journals (Sweden)

    Jon Grobovšek

    2013-09-01

    Full Text Available EXTENDED ABSTRACT:The first and important phase of documentation of cultural heritage objects is to understand which objects need to be documented. The entire documentation process is determined by the characteristics and scope of the cultural heritage object. The next question to be considered is the expected outcome of the documentation process and the purpose for which it will be used. These two essential guidelines determine each stage of the documentation workflow: the choice of the most appropriate data capturing technology and data processing method, how detailed should the documentation be, what problems may occur, what the expected outcome is, what it will be used for, and the plan for storing data and results. Cultural heritage objects require diverse data capturing and data processing methods. It is important that even the first stages of raw data capturing are oriented towards the applicability of results. The selection of the appropriate working method can facilitate the data processing and the preparation of final documentation. Documentation of paintings requires different data capturing method than documentation of buildings or building areas. The purpose of documentation can also be the preservation of the contemporary cultural heritage to posterity or the basis for future projects and activities on threatened objects. Documentation procedures should be adapted to our needs and capabilities. Captured and unprocessed data are lost unless accompanied by additional analyses and interpretations. Information on tools, procedures and outcomes must be included into documentation. A thorough analysis of unprocessed but accessible documentation, if adequately stored and accompanied by additional information, enables us to gather useful data. In this way it is possible to upgrade the existing documentation and to avoid data duplication or unintentional misleading of users. The documentation should be archived safely and in a way to meet

  10. Health-related behaviors and technology usage among college students.

    Science.gov (United States)

    Melton, Bridget F; Bigham, Lauren E; Bland, Helen W; Bird, Matthew; Fairman, Ciaran

    2014-07-01

    To examine associations between technology usage and specific health factors among college students. The research employed was a quantitative, descriptive, cross-sectional design; undergraduate students enrolled in spring 2012 general health education courses were recruited to participate. To explore college students' specific technology usage and health-related behaviors, a 28-item questionnaire was utilized. Statistical significant differences of technology usage were found between 3 of the 4 health-related behaviors under study (BMI, sleep, and nutrition) (p technology usage continues to evolve within the college student population, health professionals need to understand its implications on health behaviors.

  11. Perancangan Corporate Identity Brotherwood Decoration

    OpenAIRE

    Ciputra, Ongky Permana; Bangsa, Petrus Gogor; Christianna, Aniendya

    2015-01-01

    Sebagai Perusahaan interior di Surabaya, “BROTHERWOOD” sedang membangun citra positif melalui penguatan corporate identity secara menyeluruh.Oleh karena itu “Brotherwood” memerlukan corporate identity dan mengaplikasikannya pada media promosi dan informasi yang sesuai dengan karakter dari target audience dan target market-nya.Dengan menggunakan corporate identity diharapkan “Brotherwood” menjadi lebih dikenal oleh target audience dan target market-nya sehingga membuat market “Brotherwood” men...

  12. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  13. EDF Group - 2010 Reference Document

    International Nuclear Information System (INIS)

    2011-04-01

    Beside the accounts of EDF for 2008 and 2009, this voluminous document presents persons in charge, legal account auditors, and how risks are managed within the company. It gives an overview of EDF activities, of its organization, of its assets. It presents and discusses its financial situation and results, indicates the main contracts, and proposes other documents concerning the company. Many documents and reports are provided in appendix

  14. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....... identities in a postmodern paradigm are based on the negotiation and co-construction of meanings, relationships, and stories. The following questions are investigated: What happens when a group of leaders from different organizations construct, deconstruct, and reconstruct their identity as leaders through...

  15. Document understanding for a broad class of documents

    NARCIS (Netherlands)

    Aiello, Marco; Monz, Christof; Todoran, Leon; Worring, Marcel

    2002-01-01

    We present a document analysis system able to assign logical labels and extract the reading order in a broad set of documents. All information sources, from geometric features and spatial relations to the textual features and content are employed in the analysis. To deal effectively with these

  16. Māori identity signatures: A latent profile analysis of the types of Māori identity.

    Science.gov (United States)

    Greaves, Lara M; Houkamau, Carla; Sibley, Chris G

    2015-10-01

    Māori are the indigenous peoples of New Zealand. However, the term 'Māori' can refer to a wide range of people of varying ethnic compositions and cultural identity. We present a statistical model identifying 6 distinct types, or 'Māori Identity Signatures,' and estimate their proportion in the Māori population. The model is tested using a Latent Profile Analysis of a national probability sample of 686 Māori drawn from the New Zealand Attitudes and Values Study. We identify 6 distinct signatures: Traditional Essentialists (22.6%), Traditional Inclusives (16%), High Moderates (31.7%), Low Moderates (18.7%), Spiritually Orientated (4.1%), and Disassociated (6.9%). These distinct Identity Signatures predicted variation in deprivation, age, mixed-ethnic affiliation, and religion. This research presents the first formal statistical model assessing how people's identity as Māori is psychologically structured, documents the relative proportion of these different patterns of structures, and shows that these patterns reliably predict differences in core demographics. We identify a range of patterns of Māori identity far more diverse than has been previously proposed based on qualitative data, and also show that the majority of Māori fit a moderate or traditional identity pattern. The application of our model for studying Māori health and identity development is discussed. (c) 2015 APA, all rights reserved).

  17. Nuclear power plants documentation system

    International Nuclear Information System (INIS)

    Schwartz, E.L.

    1991-01-01

    Since the amount of documents (type and quantity) necessary for the entire design of a NPP is very large, this implies that an overall and detailed identification, filling and retrieval system shall be implemented. This is even more applicable to the FINAL QUALITY DOCUMENTATION of the plant, as stipulated by IAEA Safety Codes and related guides. For such a purpose it was developed a DOCUMENTATION MANUAL, which describes in detail the before mentioned documentation system. Here we present the expected goals and results which we have to reach for Angra 2 and 3 Project. (author)

  18. Institutionalisation of Japan Identity Construction Policy

    Directory of Open Access Journals (Sweden)

    Zadvornaya Elena S.

    2016-09-01

    Full Text Available The article is devoted to the development of the modern politics of identity construction in Japan, which actively refers to the practice of designing self-image in international relations. This trend dates back to the 19th century, when there was the end of Sakoku (Japan’s policy of isolation. It is now possible to talk about the institutionalization of the identity construction policy to organized structures and regulations. Enhanced efforts in the field of Japanese traditional and popular culture, education and creative content has led to a number of institutions appearance (like Japan Foundation Fund, Japan Creative Agency, Japan Culture Fund, Agency for Cultural Affairs, Cool Japan Fund, Japan brand Fund and changing idea about the role of culture in foreign policy realization (it is fixed the documents of the Japanese Ministry of Foreign Affairs, the Ministry of Land, Infrastructure, Transport and Tourism, the Ministry of Education, Culture, Sports, Science and Technology, the Ministry of Economy, Trade and Industry, as well as a number of projects (Cool Japan, Visit Japan, Japan Culture Power, Japan Manga Awards, Kawaii Ambassadors, Cosplay International Fest and etc.. These efforts are aimed at forming Japan identity abroad to solve a number of foreign policy challenges of the future and the development of economic cooperation. The Japanese government nearest plans is to increase funding in order to create a positive image of Japan in the region of East Asia. All of these allows us to speak about the policy of the Japanese construction of identity as an institutionalized process in which there was clearance of organizations and regulatory activities.

  19. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  20. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  1. Documented Evidence of Employment Discrimination & Its Effects on LGBT People

    OpenAIRE

    Sears, Brad; Mallory, Christy

    2011-01-01

    Although sexual orientation and gender identity have no relationship to workplace performance, during the past four decades a large body of research using a variety of methodologies has consistently documented high levels of discrimination against lesbians, gay men, bisexuals and transgendered (LGBT) people at work. Evidence of discrimination has been reviewed and summarized in two recent reports by the Williams Institute at UCLA School of Law: a 2009 report focused on discrimination in the p...

  2. Simplified automatic on-line document searching

    International Nuclear Information System (INIS)

    Ebinuma, Yukio

    1983-01-01

    The author proposed searching method for users who need not-comprehensive retrieval. That is to provide flexible number of related documents for the users automatically. A group of technical terms are used as search terms to express an inquiry. Logical sums of the terms in the ascending order of frequency of the usage are prepared sequentially and automatically, and then the search formulas, qsub(m) and qsub(m-1) which meet certain threshold values are selected automatically also. Users justify precision of the search output up to 20 items retrieved by the formula qsub(m). If a user wishes more than 30% of recall ratio, the serach result should be output by qsub(m), and if he wishes less than 30% of it, it should be output by qsub(m-1). The search by this method using one year volume of INIS Database (76,600 items) and five inquiries resulted in 32% of recall ratio and 36% of precision ratio on the average in the case of qsub(m). The connecting time of a terminal was within 15 minutes per an inquiry. It showed more efficiency than that of an inexperienced searcher. The method can be applied to on-line searching system for database in which natural language only or natural language and controlled vocabulary are used. (author)

  3. Describing Speech Usage in Daily Activities in Typical Adults.

    Science.gov (United States)

    Anderson, Laine; Baylor, Carolyn R; Eadie, Tanya L; Yorkston, Kathryn M

    2016-01-01

    "Speech usage" refers to what people want or need to do with their speech to meet communication demands in life roles. The purpose of this study was to contribute to validation of the Levels of Speech Usage scale by providing descriptive data from a sample of adults without communication disorders, comparing this scale to a published Occupational Voice Demands scale and examining predictors of speech usage levels. This is a survey design. Adults aged ≥25 years without reported communication disorders were recruited nationally to complete an online questionnaire. The questionnaire included the Levels of Speech Usage scale, questions about relevant occupational and nonoccupational activities (eg, socializing, hobbies, childcare, and so forth), and demographic information. Participants were also categorized according to Koufman and Isaacson occupational voice demands scale. A total of 276 participants completed the questionnaires. People who worked for pay tended to report higher levels of speech usage than those who do not work for pay. Regression analyses showed employment to be the major contributor to speech usage; however, considerable variance left unaccounted for suggests that determinants of speech usage and the relationship between speech usage, employment, and other life activities are not yet fully defined. The Levels of Speech Usage may be a viable instrument to systematically rate speech usage because it captures both occupational and nonoccupational speech demands. These data from a sample of typical adults may provide a reference to help in interpreting the impact of communication disorders on speech usage patterns. Copyright © 2016 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  4. The Barriers and Causes of Building Information Modelling Usage for Interior Design Industry

    Science.gov (United States)

    Hamid, A. B. Abd; Taib, M. Z. Mohd; Razak, A. H. N. Abdul; Embi, M. R.

    2017-12-01

    Building Information Modeling (BIM) has since developed alongside the improvement in the construction industry, purposely to simulate the design, management, construction and documentation. It facilitates and monitors the construction through visualization and emphasizes on various inputs to virtually design and construct a building using specific software. This study aims to identify and elaborate barriers of BIM usage in interior design industry in Malaysia. This study is initiated with a pilot survey utilising sixteen respondents that has been randomly chosen. Respondents are attached with interior design firms that are registered by Lembaga Arkitek Malaysia (LAM). The research findings are expected to provide significant information to encourage BIM adoption among interior design firms.

  5. Cardiac asystole following cannabis (marijuana) usage--additional mechanism for sudden death?

    Science.gov (United States)

    Menahem, Samuel

    2013-12-10

    A 21 year old university student previously operated during infancy for an unobstructed total anomalous pulmonary venous drainage with an excellent result, was noted on a routine follow up 24 h Holter monitor to have multiple pauses related to cardiac asystole, the longest lasting 5.8 s and temporally related to marijuana inhalation. A repeat Holter was normal following a two week cessation of marijuana usage and again when carried out 3 months later. The documented periods of asystole may be a precursor of sudden death seen in addicts even without evidence of ischaemic heart disease. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  6. Improved Optical Document Security Techniques Based on Volume Holography and Lippmann Photography

    Science.gov (United States)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, ID cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is need for a higher degree of security on such documents and this chapter covers new techniques to make improved mass-produced or personalized OVDs.

  7. New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography

    Science.gov (United States)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, identification cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is a need for a higher degree of security on such documents and this chapter covers new techniques to make personalized OVDs.

  8. Three-dimensional measurement system for crime scene documentation

    Science.gov (United States)

    Adamczyk, Marcin; Hołowko, Elwira; Lech, Krzysztof; Michoński, Jakub; MÄ czkowski, Grzegorz; Bolewicki, Paweł; Januszkiewicz, Kamil; Sitnik, Robert

    2017-10-01

    Three dimensional measurements (such as photogrammetry, Time of Flight, Structure from Motion or Structured Light techniques) are becoming a standard in the crime scene documentation process. The usage of 3D measurement techniques provide an opportunity to prepare more insightful investigation and helps to show every trace in the context of the entire crime scene. In this paper we would like to present a hierarchical, three-dimensional measurement system that is designed for crime scenes documentation process. Our system reflects the actual standards in crime scene documentation process - it is designed to perform measurement in two stages. First stage of documentation, the most general, is prepared with a scanner with relatively low spatial resolution but also big measuring volume - it is used for the whole scene documentation. Second stage is much more detailed: high resolution but smaller size of measuring volume for areas that required more detailed approach. The documentation process is supervised by a specialised application CrimeView3D, that is a software platform for measurements management (connecting with scanners and carrying out measurements, automatic or semi-automatic data registration in the real time) and data visualisation (3D visualisation of documented scenes). It also provides a series of useful tools for forensic technicians: virtual measuring tape, searching for sources of blood spatter, virtual walk on the crime scene and many others. In this paper we present our measuring system and the developed software. We also provide an outcome from research on metrological validation of scanners that was performed according to VDI/VDE standard. We present a CrimeView3D - a software-platform that was developed to manage the crime scene documentation process. We also present an outcome from measurement sessions that were conducted on real crime scenes with cooperation with Technicians from Central Forensic Laboratory of Police.

  9. Investigation of hydrogen usage in aviation industry

    International Nuclear Information System (INIS)

    Yılmaz, İlker; İlbaş, Mustafa; Taştan, Murat; Tarhan, Cevahir

    2012-01-01

    Highlights: ► We examine usage of liquid hydrogen as a fuel in aircrafts. ► Engine performance is a little better for liquid hydrogen fuel than kerosene. ► Liquid hydrogen can be a potential alternative to kerosene as aviation fuel. ► Usage of liquid hydrogen will provide national independence for fuel supply. ► Increased production of liquid hydrogen will decrease its cost disadvantage. - Abstract: Fossil-based fuels are commonly used in aircraft engines but they have a polluting effect and they cause a greenhouse effect for our world. This study reports a research about aircraft gas turbine engines which are fired by liquid hydrogen (LH 2 ) in terms of performance and environmental aspects. Also, the performance and emissions of LH 2 fueled engines are compared with those of kerosene fired aircraft engines. Same flights from Istanbul to London, and Paris to Kabul are examined to estimate the emission from a conventional aircraft as an application in aviation sector. It is shown that the amount of NO x , HC and CO emissions for traveling by a conventional aircraft for London is 78.36, 1.202 and 22.4 kg, while Paris is 71.55, 1.171 and 21.63 kg, and Kabul is 111.44, 1.36 and 26.11 kg, respectively. For the use of liquid hydrogen as a fuel, amount of gas emissions decreases for any destination like London, Paris and Kabul. Total HC and CO emissions are going to be nearly 0 kg because of lack of carbon in the fuel. Also NO x emission is lower because of wider flammability limit of LH 2 . Results show that the aircraft engines with LH 2 have great potential for emissions reduction and engine performance parameters are a little better for LH 2 fuel. It is strongly emphasized that one of the most important advantages for the use of LH 2 is national independence for fuel supply. Oil cannot be extracted in every countries territory but LH 2 is producible for every country and this is so important for a countries freedom.

  10. Web-based pathology practice examination usage

    Directory of Open Access Journals (Sweden)

    Edward C Klatt

    2014-01-01

    Full Text Available Context: General and subject specific practice examinations for students in health sciences studying pathology were placed onto a free public internet web site entitled web path and were accessed four clicks from the home web site menu. Subjects and Methods: Multiple choice questions were coded into. html files with JavaScript functions for web browser viewing in a timed format. A Perl programming language script with common gateway interface for web page forms scored examinations and placed results into a log file on an internet computer server. The four general review examinations of 30 questions each could be completed in up to 30 min. The 17 subject specific examinations of 10 questions each with accompanying images could be completed in up to 15 min each. The results of scores and user educational field of study from log files were compiled from June 2006 to January 2014. Results: The four general review examinations had 31,639 accesses with completion of all questions, for a completion rate of 54% and average score of 75%. A score of 100% was achieved by 7% of users, ≥90% by 21%, and ≥50% score by 95% of users. In top to bottom web page menu order, review examination usage was 44%, 24%, 17%, and 15% of all accessions. The 17 subject specific examinations had 103,028 completions, with completion rate 73% and average score 74%. Scoring at 100% was 20% overall, ≥90% by 37%, and ≥50% score by 90% of users. The first three menu items on the web page accounted for 12.6%, 10.0%, and 8.2% of all completions, and the bottom three accounted for no more than 2.2% each. Conclusions: Completion rates were higher for shorter 10 questions subject examinations. Users identifying themselves as MD/DO scored higher than other users, averaging 75%. Usage was higher for examinations at the top of the web page menu. Scores achieved suggest that a cohort of serious users fully completing the examinations had sufficient preparation to use them to support

  11. Storing XML Documents in Databases

    NARCIS (Netherlands)

    A.R. Schmidt; S. Manegold (Stefan); M.L. Kersten (Martin); L.C. Rivero; J.H. Doorn; V.E. Ferraggine

    2005-01-01

    textabstractThe authors introduce concepts for loading large amounts of XML documents into databases where the documents are stored and maintained. The goal is to make XML databases as unobtrusive in multi-tier systems as possible and at the same time provide as many services defined by the XML

  12. Document Organization Using Kohonen's Algorithm.

    Science.gov (United States)

    Guerrero Bote, Vicente P.; Moya Anegon, Felix de; Herrero Solana, Victor

    2002-01-01

    Discussion of the classification of documents from bibliographic databases focuses on a method of vectorizing reference documents from LISA (Library and Information Science Abstracts) which permits their topological organization using Kohonen's algorithm. Analyzes possibilities of this type of neural network with respect to the development of…

  13. SRS ecology: Environmental information document

    International Nuclear Information System (INIS)

    Wike, L.D.; Shipley, R.W.; Bowers, J.A.

    1993-09-01

    The purpose of this Document is to provide a source of ecological information based on the exiting knowledge gained from research conducted at the Savannah River Site. This document provides a summary and synthesis of ecological research in the three main ecosystem types found at SRS and information on the threatened and endangered species residing there

  14. Magnetic fusion program summary document

    International Nuclear Information System (INIS)

    1979-04-01

    This document outlines the current and planned research, development, and commercialization (RD and C) activities of the Offic of Fusion Energy under the Assistant Secretary for Energy Technology, US Department of Energy (DOE). The purpose of this document is to explain the Office of Fusion Energy's activities to Congress and its committees and to interested members of the public

  15. Documenting the Engineering Design Process

    Science.gov (United States)

    Hollers, Brent

    2017-01-01

    Documentation of ideas and the engineering design process is a critical, daily component of a professional engineer's job. While patent protection is often cited as the primary rationale for documentation, it can also benefit the engineer, the team, company, and stakeholders through creating a more rigorously designed and purposeful solution.…

  16. SRS ecology: Environmental information document

    Energy Technology Data Exchange (ETDEWEB)

    Wike, L.D.; Shipley, R.W.; Bowers, J.A. [and others

    1993-09-01

    The purpose of this Document is to provide a source of ecological information based on the exiting knowledge gained from research conducted at the Savannah River Site. This document provides a summary and synthesis of ecological research in the three main ecosystem types found at SRS and information on the threatened and endangered species residing there.

  17. ITK optical links backup document

    CERN Document Server

    Huffman, B T; The ATLAS collaboration; Flick, T; Ye, J

    2013-01-01

    This document describes the proposed optical links to be used for the ITK in the phase II upgrade. The current R&D for optical links pursued in the Versatile Link group is reviewed. In particular the results demonstrating the radiation tolerance of all the on-detector components are documented. The bandwidth requirements and the resulting numerology are given.

  18. Contextualizing Data Warehouses with Documents

    DEFF Research Database (Denmark)

    Perez, Juan Manuel; Berlanga, Rafael; Aramburu, Maria Jose

    2008-01-01

    warehouse with a document warehouse, resulting in a contextualized warehouse. Thus, the user first selects an analysis context by supplying some keywords. Then, the analysis is performed on a novel type of OLAP cube, called an R-cube, which is materialized by retrieving and ranking the documents...

  19. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  20. Play Memories and Place Identity.

    Science.gov (United States)

    Sandberg, Anette

    2003-01-01

    This retrospective study examined play memories from childhood to adulthood of 478 university students between ages 20 and 62 as exhibited in drawings of play memories and questionnaire responses. The study focused on the role of the physical environment and place identity in play memories and individual identity development. Findings showed that…

  1. Social Identity and Group Contests

    NARCIS (Netherlands)

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social

  2. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as

  3. Exploring Leader Identity and Development.

    Science.gov (United States)

    Priest, Kerry L; Middleton, Eric

    2016-01-01

    Taking on a leader identity can be a motivating force for pursuing leader development. This chapter explores the reciprocal and recursive nature of identity development and leader development, emphasizing how shifting views of self influence one's motivation to develop as a leader. © 2016 Wiley Periodicals, Inc., A Wiley Company.

  4. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  5. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  6. Ward identities at finite temperature

    International Nuclear Information System (INIS)

    DOlivo, J.C.; Torres, M.; Tututi, E.

    1996-01-01

    The Ward identities for QED at finite temperature are derived using the functional real-time formalism. They are verified by an explicit one-loop calculation. An effective causal vertex is constructed which satisfy the Ward identity with the associated retarded self-energy. copyright 1996 American Institute of Physics

  7. Triangular clustering in document networks

    Energy Technology Data Exchange (ETDEWEB)

    Cheng Xueqi; Ren Fuxin [Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190 (China); Zhou Shi [Department of Computer Science, University College London, Malet Place, London WC1E 6BT (United Kingdom); Hu Maobin [School of Engineering Science, University of Science and Technology of China, Hefei 230026 (China)], E-mail: cxq@ict.ac.cn, E-mail: renfuxin@software.ict.ac.cn, E-mail: s.zhou@adastral.ucl.ac.uk, E-mail: humaobin@ustc.edu.cn

    2009-03-15

    Document networks have the characteristic that a document node, e.g. a webpage or an article, carries meaningful content. Properties of document networks are not only affected by topological connectivity between nodes, but are also strongly influenced by the semantic relation between the content of the nodes. We observed that document networks have a large number of triangles and a high value clustering coefficient. Also there is a strong correlation between the probability of formation of a triangle and the content similarity among the three nodes involved. We propose the degree-similarity product (DSP) model, which well reproduces these properties. The model achieves this by using a preferential attachment mechanism that favours the linkage between nodes that are both popular and similar. This work is a step forward towards a better understanding of the structure and evolution of document networks.

  8. Engineering Documentation and Data Control

    Science.gov (United States)

    Matteson, Michael J.; Bramley, Craig; Ciaruffoli, Veronica

    2001-01-01

    Mississippi Space Services (MSS) the facility services contractor for NASA's John C. Stennis Space Center (SSC), is utilizing technology to improve engineering documentation and data control. Two identified improvement areas, labor intensive documentation research and outdated drafting standards, were targeted as top priority. MSS selected AutoManager(R) WorkFlow from Cyco software to manage engineering documentation. The software is currently installed on over 150 desctops. The outdated SSC drafting standard was written for pre-CADD drafting methods, in other words, board drafting. Implementation of COTS software solutions to manage engineering documentation and update the drafting standard resulted in significant increases in productivity by reducing the time spent searching for documents.

  9. High School Students' Social Media Usage Habits

    Science.gov (United States)

    Tezci, Erdogan; Içen, Mustafa

    2017-01-01

    Social media which is an important product of Computer and Internet Technologies has a growing usage level day by day. Increasing social media usage level gives opportunity for new software developments and making investments in this area. From this aspect, therefore, social media has not only economic function but also make persons participate in…

  10. Premarital Contraceptives Usage among Male and Female Adolescents.

    Science.gov (United States)

    Hornick, Joesph P.; And Others

    1979-01-01

    Variables important in predicting female contraception usage were found to be those which involved dyadic commitment, conditions of love, self-esteem, and father's occupation (social class). The best predictors of male contraception usage involved experience in dating and internalization of role models via mother's and father's permissiveness.…

  11. Insecticide-treated nets usage and malaria episodes among ...

    African Journals Online (AJOL)

    ... is urgent need on the part of all the three tiers of Government for public health awareness campaigns through information, education and communication (IEC) to create positive ITN culture and usage. It is also suggested that ITN usage among boarding school pupils should be incorporated into school health service.

  12. The Current State Of Secondary Resource Usage In Ukraine

    OpenAIRE

    Julia Makovetska

    2011-01-01

    The state and the perspectives of the development of secondary resource usage in Ukraine have been analyzed in the article. The level of the main types recyclable materials as paper and cardboard, glass, plastics, waste tires are considered. Priority directions of development of the secondary resources usage have been defined.

  13. A Factor Analytic Study of the Internet Usage Scale

    Science.gov (United States)

    Monetti, David M.; Whatley, Mark A.; Hinkle, Kerry T.; Cunningham, Kerry T.; Breneiser, Jennifer E.; Kisling, Rhea

    2011-01-01

    This study developed an Internet Usage Scale (IUS) for use with adolescent populations. The IUS is a 26-item scale that measures participants' beliefs about how their Internet usage impacts their behavior. The sample for this study consisted of 947 middle school students. An exploratory factor analysis with varimax rotation was conducted on the…

  14. Benchmarking Usage Statistics in Collection Management Decisions for Serials

    Science.gov (United States)

    Tucker, Cory

    2009-01-01

    Usage statistics are an important metric for making decisions on serials. Although the University of Nevada, Las Vegas (UNLV) Libraries have been collecting usage statistics, the statistics had not frequently been used to make decisions and had not been included in collection development policy. After undergoing a collection assessment, the…

  15. E-book usage: counting the challenges and opportunities

    Directory of Open Access Journals (Sweden)

    Angela Conyers

    2017-07-01

    Full Text Available Academic libraries are spending a growing proportion of their increasingly stretched budgets on e-books each year. Within this context, demonstrating a return on investment is imperative, but gathering data about e-resource usage is not always easy.    This article summarizes how libraries and library consortia are acquiring and evaluating e-books, how usage statistics feature within library workflows, the issues faced in doing so and the resulting impact of these issues on understanding usage and informing purchasing of new titles. Discussions with publishers indicate how usage data are being used within the organization, the requirements of customers and the challenges involved in providing usage data for e-books. Assessing and evaluating e-book usage is a complex and challenging task with processes and workflows in development. A transition from print to e-books represents a significant change for libraries, and the availability of reliable usage statistics to support purchase decisions is vital. The article is based on a series of case study interviews with representatives from a small cross-section of academic libraries, library consortia, publishers and aggregators.    This work is of interest to anyone with responsibility for creating, managing, developing, delivering and supporting usage statistics and standards for e-books.

  16. 40 CFR 52.254 - Organic solvent usage.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Organic solvent usage. 52.254 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS California § 52.254 Organic solvent usage. (a) This... (d) of this section and the architectural coatings and solvent disposal emission limitations...

  17. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  18. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  19. ICT USAGE BY DISTANCE LEARNERS IN INDIA

    Directory of Open Access Journals (Sweden)

    Ashish Kumar AWADHIYA

    2014-07-01

    Full Text Available Open Universities across the world are embracing ICT based teaching and learning process to disseminate quality education to their learners spread across the globe. In India availability and access of ICT and learner characteristics are uneven and vary from state to state. Hence it is important to establish the facts about ICT access among learners, their ICT usage patterns and their readiness to use ICT for educational purpose. In view of this, a study was conducted with the objective to find out the access level of ICT among distance learners. The analysis indicates that maximum learners have desktop/laptops and most of them are accessing internet very frequently from their home. The analysis also indicates that maximum respondents are browsing social networking sites followed by educational and e-mail service providing websites. Findings suggest that there is a need to generate ICT based tutorials complemented with social networking tools and mobile applications. Study also shows that learners are equipped with mobile phones and they are browsing internet through it and also availing support services offered by the university. Hence possibility of integrating mobile phone services may be used for providing learner support services and content delivery.

  20. Association and Sequence Mining in Web Usage

    Directory of Open Access Journals (Sweden)

    Claudia Elena DINUCA

    2011-06-01

    Full Text Available Web servers worldwide generate a vast amount of information on web users’ browsing activities. Several researchers have studied these so-called clickstream or web access log data to better understand and characterize web users. Clickstream data can be enriched with information about the content of visited pages and the origin (e.g., geographic, organizational of the requests. The goal of this project is to analyse user behaviour by mining enriched web access log data. With the continued growth and proliferation of e-commerce, Web services, and Web-based information systems, the volumes of click stream and user data collected by Web-based organizations in their daily operations has reached astronomical proportions. This information can be exploited in various ways, such as enhancing the effectiveness of websites or developing directed web marketing campaigns. The discovered patterns are usually represented as collections of pages, objects, or re-sources that are frequently accessed by groups of users with common needs or interests. The focus of this paper is to provide an overview how to use frequent pattern techniques for discovering different types of patterns in a Web log database. In this paper we will focus on finding association as a data mining technique to extract potentially useful knowledge from web usage data. I implemented in Java, using NetBeans IDE, a program for identification of pages’ association from sessions. For exemplification, we used the log files from a commercial web site.

  1. Internet Usage among Children and Young People

    Directory of Open Access Journals (Sweden)

    Gonca Karayagiz Muslu

    2009-10-01

    Full Text Available Computers have occupied increasingly central roles in children’s world with the advance of technology. They have proved to be an ideal companion for children in developing and developed countries who spend most of their time at school or home with computers. As a measure of development and modernization, technology has made people’s lives easier and contributed positively to social well-being so far while it has also brought about some problems and threats stemming from irresponsible use of Internet. Unmonitored use of Internet may cause damages in children’s and young people’s physical, psychological, social and cognitive development. It seems imperative to assure that children and young people can benefit from computers and Internet resources effectively and productively while measures for appropriate and safe use of Internet are to be taken into serious consideration. Therefore, the government offices and institutions should lay stress upon the issue; education professionals and parents should be well-informed and regularly updated; and finally children and young people should be educated and monitored to achieve a better and efficient use of Internet. In this paper, has been mentioned to negative effect of internet usage on physical, psychosocial and cognitive health of children and young people. [TAF Prev Med Bull 2009; 8(5.000: 445-450

  2. Trofile HIV co-receptor usage assay.

    Science.gov (United States)

    Low, Andrew J; McGovern, Rachel A; Harrigan, P Richard

    2009-03-01

    The introduction of CCR5 antagonists increases the options available for constructing therapeutic drug regimens for HIV-positive patients. However, as these drugs do not inhibit HIV variants that use the CXCR4 co-receptor, a pretreatment test is required to determine accurately HIV co-receptor usage (tropism) before initiating CCR5 antagonist-based therapy. To discuss the Monogram Trofile assay as a diagnostic tool for determining HIV tropism by critically reviewing reported literature and available data. Monogram Trofile has become, largely by default, the de facto standard for HIV tropism assay. However, there is significant room for improvement in the speed, cost and availability of the test. Furthermore, the test is not quantitative, requires high-input HIV RNA viral loads, and produces results that are less biologically stable than expected. These technical considerations may limit the use of CCR5 antagonists in therapy. Nevertheless, this test is likely to remain the most widely used tropism diagnostic for the short term. We expect that a more practical and possibly more accurate method for measuring HIV tropism can be developed.

  3. Fossil fuel usage and the environment

    International Nuclear Information System (INIS)

    Klass, D.L.

    1991-01-01

    The Greenhouse Effect and global warming, ozone formation in the troposphere, ozone destruction in the stratosphere, and acid rain are important environmental issues. The relationship of fossil fuel usage to some of these issues is discussed. Data on fossil fuel consumption and the sources and sinks of carbon dioxide, carbon monoxide, methane, nitrogen and sulfur oxides, and ozone indicate that natural gas provides lower emissions of carbon dioxide, carbon monoxide, and nitrogen and sulfur oxides than other fossil fuels. Global emissions of methane from the gas industry are significantly less than those from other anthropogenic activities and natural sources, and methane plays an important role along with carbon monoxide and nitric oxide in tropospheric ozone formation. Reductions in any or all of these air pollutants would reduce ozone in the lower atmosphere. Several remedial measures have been or are being implemented in certain countries to reduce fossil fuel emissions. These include removal of emissions from the atmosphere by new biomass growth, fuel substitution by use of cleaner burning fuels for stationary and mobile sources, and fossil fuel combustion at higher efficiencies. It is unlikely that concerted environmental action by all governments of the world will occur soon, but much progress has been made to achieve clean air

  4. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  5. Contract Report for Usage Inspection of KN-12 Transport Cask

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K

    2007-03-15

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse.

  6. Usage Inspection of KN-12 Spent Fuel Transport Cask

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K

    2007-03-15

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse.

  7. World Wide Web Usage Mining Systems and Technologies

    Directory of Open Access Journals (Sweden)

    Wen-Chen Hu

    2003-08-01

    Full Text Available Web usage mining is used to discover interesting user navigation patterns and can be applied to many real-world problems, such as improving Web sites/pages, making additional topic or product recommendations, user/customer behavior studies, etc. This article provides a survey and analysis of current Web usage mining systems and technologies. A Web usage mining system performs five major tasks: i data gathering, ii data preparation, iii navigation pattern discovery, iv pattern analysis and visualization, and v pattern applications. Each task is explained in detail and its related technologies are introduced. A list of major research systems and projects concerning Web usage mining is also presented, and a summary of Web usage mining is given in the last section.

  8. Contract Report for Usage Inspection of KN-12 Transport Cask

    International Nuclear Information System (INIS)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K.

    2007-03-01

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse

  9. Usage Inspection of KN-12 Spent Fuel Transport Cask

    International Nuclear Information System (INIS)

    Lee, J. C.; Seo, K. S.; Bang, K. S.; Cho, I. J.; Kim, D. H.; Min, D. K.

    2007-03-01

    The usage inspection of the KN-12 spent nuclear fuel transport package was performed to receive the license for reuse. According to the Korea Atomic Energy Act, all type B transport package should receive and pass the usage inspection every five years. The KN-12 transport cask was designed to transport twelve spent PWR fuel assemblies under wet and dry conditions. The cask was developed and licensed in 2002 in accordance with the Korea and the IAEA's safe transport regulations. The areas of usage inspection include: visual inspection, nondestructive weld inspection, load test, maximum operating pressure test, leakage test, shielding test, thermal test, external surface contamination test. In the results of the usage inspection, the damage or defect could not found out and the performance of the cask was maintained according to the requirements of the regulation. Therefore, the usage inspection was successfully performed to acquire the license for the reuse

  10. Multimodal document management in radiotherapy

    International Nuclear Information System (INIS)

    Fahrner, H.; Kirrmann, S.; Roehner, F.; Schmucker, M.; Hall, M.; Heinemann, F.

    2013-01-01

    Background and purpose: After incorporating treatment planning and the organisational model of treatment planning in the operating schedule system (BAS, 'Betriebsablaufsystem'), complete document qualities were embedded in the digital environment. The aim of this project was to integrate all documents independent of their source (paper-bound or digital) and to make content from the BAS available in a structured manner. As many workflow steps as possible should be automated, e.g. assigning a document to a patient in the BAS. Additionally it must be guaranteed that at all times it could be traced who, when, how and from which source documents were imported into the departmental system. Furthermore work procedures should be changed that the documentation conducted either directly in the departmental system or from external systems can be incorporated digitally and paper document can be completely avoided (e.g. documents such as treatment certificate, treatment plans or documentation). It was a further aim, if possible, to automate the removal of paper documents from the departmental work flow, or even to make such paper documents superfluous. In this way patient letters for follow-up appointments should automatically generated from the BAS. Similarly patient record extracts in the form of PDF files should be enabled, e.g. for controlling purposes. Method: The available document qualities were analysed in detail by a multidisciplinary working group (BAS-AG) and after this examination and assessment of the possibility of modelling in our departmental workflow (BAS) they were transcribed into a flow diagram. The gathered specifications were implemented in a test environment by the clinical and administrative IT group of the department of radiation oncology and subsequent to a detailed analysis introduced into clinical routine. Results: The department has succeeded under the conditions of the aforementioned criteria to embed all relevant documents in the departmental

  11. Gender identity disorder.

    LENUS (Irish Health Repository)

    De Gascun, C

    2006-05-01

    Gender Identity Disorder (GID) is a relatively rare condition of atypical gender development in which there is a psychological perception of self as masculine or feminine which is incongruent with ones phenotype. GID replaced the term Transsexualism in DSM-IV in 1994. The demographics of GID in Ireland have not been established. Since 2000 we have received 52 referrals of individuals with confirmed GID to our endocrine service for consideration for hormonal treatment (HT). Of the 52 patients 45 have male to female (MTF) GID (mean age 38.9 years) and 7 have female to male (FTM) GID (mean age 30.7 years). The age at presentation in this group is approximately 9 years older than in international series for both MTF (39 years v 30yrs) and FTM (31 yrs v 22yrs). The karyotype where analysed has been normal for their phenotypic sex. Twenty-three of the patients had received HT prior to attending our clinic that in only one case had been prescribed by a specialist. A number of patients had obtained HT via the internet or from overseas sources without medical review. Eighteen of the patients have been or are married and 14 of the group have children. The scale of referrals confirms that GID exists in the Irish population to a significant degree. Thus an appropriate care pathway for people with the condition needs to be established. This will facilitate optimum medical management of the patient group and a coherent approach to the many difficult social issues faced individuals with this disorder.

  12. Body integrity identity disorder.

    Science.gov (United States)

    Blom, Rianne M; Hennekam, Raoul C; Denys, Damiaan

    2012-01-01

    Body Integrity Identity Disorder (BIID) is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation) were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  13. Body integrity identity disorder.

    Directory of Open Access Journals (Sweden)

    Rianne M Blom

    Full Text Available INTRODUCTION: Body Integrity Identity Disorder (BIID is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. METHODS: Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. RESULTS: Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. CONCLUSIONS: The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  14. Shoulder dystocia documentation: an evaluation of a documentation training intervention.

    Science.gov (United States)

    LeRiche, Tammy; Oppenheimer, Lawrence; Caughey, Sharon; Fell, Deshayne; Walker, Mark

    2015-03-01

    To evaluate the quality and content of nurse and physician shoulder dystocia delivery documentation before and after MORE training in shoulder dystocia management skills and documentation. Approximately 384 charts at the Ottawa Hospital General Campus involving a diagnosis of shoulder dystocia between the years of 2000 and 2006 excluding the training year of 2003 were identified. The charts were evaluated for 14 key components derived from a validated instrument. The delivery notes were then scored based on these components by 2 separate investigators who were blinded to delivery note author, date, and patient identification to further quantify delivery record quality. Approximately 346 charts were reviewed for physician and nurse delivery documentation. The average score for physician notes was 6 (maximum possible score of 14) both before and after the training intervention. The nurses' average score was 5 before and after the training intervention. Negligible improvement was observed in the content and quality of shoulder dystocia documentation before and after nurse and physician training.

  15. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.

    Science.gov (United States)

    Scherrer, Kristin S

    2008-10-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.

  16. Islamic Identity and Competitive Identities (Global, National and Ethnic Identity; A Case Study of Shiraz University Students

    Directory of Open Access Journals (Sweden)

    Mohammadtaghi Iman

    2013-06-01

    Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.

  17. Audit of Orthopaedic Surgical Documentation

    Directory of Open Access Journals (Sweden)

    Fionn Coughlan

    2015-01-01

    Full Text Available Introduction. The Royal College of Surgeons in England published guidelines in 2008 outlining the information that should be documented at each surgery. St. James’s Hospital uses a standard operation sheet for all surgical procedures and these were examined to assess documentation standards. Objectives. To retrospectively audit the hand written orthopaedic operative notes according to established guidelines. Methods. A total of 63 operation notes over seven months were audited in terms of date and time of surgery, surgeon, procedure, elective or emergency indication, operative diagnosis, incision details, signature, closure details, tourniquet time, postop instructions, complications, prosthesis, and serial numbers. Results. A consultant performed 71.4% of procedures; however, 85.7% of the operative notes were written by the registrar. The date and time of surgery, name of surgeon, procedure name, and signature were documented in all cases. The operative diagnosis and postoperative instructions were frequently not documented in the designated location. Incision details were included in 81.7% and prosthesis details in only 30% while the tourniquet time was not documented in any. Conclusion. Completion and documentation of operative procedures were excellent in some areas; improvement is needed in documenting tourniquet time, prosthesis and incision details, and the location of operative diagnosis and postoperative instructions.

  18. Technical Support Document: 50% Energy Savings for Small Office Buildings

    Energy Technology Data Exchange (ETDEWEB)

    Thornton, Brian A.; Wang, Weimin; Huang, Yunzhi; Lane, Michael D.; Liu, Bing

    2010-04-30

    The Technical Support Document (TSD) for 50% energy savings in small office buildings documents the analysis and results for a recommended package of energy efficiency measures (EEMs) referred to as the advanced EEMs. These are changes to a building design that will reduce energy usage. The package of advanced EEMs achieves a minimum of 50% energy savings and a construction area weighted average energy savings of 56.6% over the ANSI/ASHRAE/IESNA Standard 90.1-2004 for 16 cities which represent the full range of climate zones in the United States. The 50% goal is for site energy usage reduction. The weighted average is based on data on the building area of construction in the various climate locations. Cost-effectiveness of the EEMs is determined showing an average simple payback of 6.7 years for all 16 climate locations. An alternative set of results is provided which includes a variable air volume HVAC system that achieves at least 50% energy savings in 7 of the 16 climate zones with a construction area weighted average savings of 48.5%. Other packages of EEMs may also achieve 50% energy savings; this report does not consider all alternatives but rather presents at least one way to reach the goal. Design teams using this TSD should follow an integrated design approach and utilize additional analysis to evaluate the specific conditions of a project.

  19. Documents

    International Development Research Centre (IDRC) Digital Library (Canada)

    livelihoods in spite of chronic water shortages. Farmers' Association: By the People for the People. Supported by WaDImena, a team from the Desert. Development Centre (DDC) at the American University in. Cairo helped farmers to found their first association to improve agricultural water management in Abu Minqar.

  20. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.