WorldWideScience

Sample records for identity management systems

  1. Identity management and witness protection system

    OpenAIRE

    Paunović, Saša; Starčević, Dušan; Nešić, Lazar

    2013-01-01

    The protection of participants in criminal proceedings is one of the most important tools for prosecution of war crimes and organized crime cases. The paper presents the basic characteristics and the importance of implementing the Program of protection in criminal proceedings, with emphasis on the protection system and management of identity. Special attention was paid to challenges facing the protection system in criminal proceedings and the management of identities, which are caused by the ...

  2. Integrated Identity and Access Management System for Tertiary ...

    African Journals Online (AJOL)

    Nigerian Journal of Technology ... identity management and access control and the unavailability of actionable information on pattern of ... This Tertiary Identity and Access Management System (T-IAMS) is a fingerprint biometric database that ...

  3. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  4. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  5. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  6. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  7. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  8. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  9. An identity management monitoring system | Imouokhome | Scientia ...

    African Journals Online (AJOL)

    Username, Password, Remember me, or Register ... An identification system, which employs the use of fingerprint biometric that conducts a ... Key Words: Biometrics, Pattern-matching Identification, Verification, Authentication, Fingerprints ...

  10. Analysis of Privacy-Enhancing Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regulatory...... and technological aspects of privacy and technology adoption are also discussed....

  11. Identity Management Mismatch Challenges in the Danish Municipality Administration System

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup; Christensen, Henrik Bærbak

    2010-01-01

    Integrating a COTS product in a company’s product portfolio is appealing from a business perspective but highly challenging from the perspective of the software architecture. In this paper we outline research challenges regarding authorization in the identity management part of the Danish...

  12. A Case for Implementation of Citizen Centric National Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.

    of trust in transacting parties. Policy makers are therefore trying to implement identity policies to prevent identity abuses, promote the seamless flow of business transactions, and provide citizens the ability to exercise informational self-determination. Previously, the design of identity management...... and exposure, and a high level of literacy. But in developing countries infrastructural challenges, low literacy level, and physical verification of credentials hamper the effective use of identity management systems. This PhD study adapts the DeLone and McLean model of information systems success to the case...

  13. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  14. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...

  15. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  16. A framework for implementation of user-centric identity management systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2010-01-01

    Users increasingly become part of electronic transactions, which take place instantaneously without direct user involvement. This leads to the risk of data manipulation, identity theft and privacy violation, and it has become a major concern for individuals and businesses around the world. Gov......-ernments in many countries are implementing identity man-agement systems (IdMS) to curtail these incidences and to offer citizens the power to exercise informational self-determination. Using concepts from technology adoption and fit-viability theo-ries as well as the laws of identity, this paper analyzes...... the crite-ria for successful implementation and defines a framework for a citizen-centric national IdMS. Results from a survey con-ducted in Ghana are also included....

  17. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.

  18. Holistic Privacy-Preserving Identity Management System for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jorge Bernal Bernabe

    2017-01-01

    Full Text Available Security and privacy concerns are becoming an important barrier for large scale adoption and deployment of the Internet of Things. To address this issue, the identity management system defined herein provides a novel holistic and privacy-preserving solution aiming to cope with heterogeneous scenarios that requires both traditional online access control and authentication, along with claim-based approach for M2M (machine to machine interactions required in IoT. It combines a cryptographic approach for claim-based authentication using the Idemix anonymous credential system, together with classic IdM mechanisms by relying on the FIWARE IdM (Keyrock. This symbiosis endows the IdM system with advanced features such as privacy-preserving, minimal disclosure, zero-knowledge proofs, unlikability, confidentiality, pseudonymity, strong authentication, user consent, and offline M2M transactions. The IdM system has been specially tailored for the Internet of Things bearing in mind the management of both users’ and smart objects’ identity. Moreover, the IdM system has been successfully implemented, deployed, and tested in the scope of SocIoTal European research project.

  19. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  20. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  1. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  2. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  3. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  4. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    – The work can encourage policy makers, diversity and HR managers to question their own practices and assumptions leading to more theoretical informed diversity management practices. Originality/value – The theoretical connections between identity and diversity literature have so far not been reviewed......The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...... and limitations – is crucial for successful diversity management research and practice. Research limitations/implications – The authors argue for a better understanding of differences, overlaps and limits of different identity perspectives, and for a stronger engagement with practice. Practical implications...

  5. 6 Keys to Identity Management

    Science.gov (United States)

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  6. Exhausting management work: conflicting identities.

    Science.gov (United States)

    Mischenko, Jane

    2005-01-01

    The primary purpose of this paper is to critically explore managers' experience of work identity in the National Health Service (NHS). This paper is unconventional in that it uses an auto-ethnographic approach and poetry as the empirical data from which the conceptual framework evolves. The concepts of identity, power and self are analysed in relation to the narrative utilising a post-structuralist, critical management lens, particularly drawing from Foucault. The paper reflects and critiques the challenges of undertaking auto-ethnography, not least the publication and exposure of a "vulnerable aspect" of the author but also identifies this as a powerful method to explore how one uses narrative to create meaning and constitute oneself, the challenges of such textual representation and the various ways one adapts, resists and survives the challenge of the "multiphrenic" world. The contribution this paper makes is an "outing" of the dynamics of being a manager in the NHS and an opening of a debate on current management discourse and practice. The further value of this paper is the experimentation of critically evaluating an auto-ethnographic approach to researching management identity work.

  7. Architectural mismatch issues in identity management deployment

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup

    2010-01-01

    Integrating Commercial Off-The-Shelf products in a company's software product portfolio offers business value, but introduces challenges from a software architecture perspective. In this paper, the research challenges in relation to identity management in the Danish municipality administration...... system called Opus, are outlined. Opus BRS is the identity management part of Opus. Opus integrates SAP, legacy mainframe systems, and other third party systems of the individual municipality. Each of these systems define their own software architecture and access control model, leading to architectural...... mismatch with an impact on security, usability, and maintainability. The research project is discussed and access control and identity provisioning are recognized as the major areas of interest in relation to the mismatch challenges. The project is carried out in close cooperation with KMD, one...

  8. The Interaction of Control Systems and Stakeholder Networks in Shaping the Identities of Self-managed Teams

    DEFF Research Database (Denmark)

    Annosi, Maria Carmela; Foss, Nicolai Juul; Brunetta, Federica

    2017-01-01

    -based firms. We argue that managerial and stakeholder interventions shape the self-construction of team identity as well as the team’s commitment to specific work objectives. We also suggest that team identity becomes isomorphic to organizational identity because of pressures related to: (1) the presence...... of a dense network of managers and stakeholders, which orients teams towards a focus on certain aspects of the higher-order identity; (2) the use of team routines and regular feedback loops, which force alignment with the organizational identity; and (3) the use of coordinating roles aimed at promoting......, ratifying and reinforcing the convergence of identity within the team. We analyse multiple cases from a major multinational corporation in the telecommunications industry, which we examine through the lens of a multi-level model of controls involving the micro, meso and macro organizational levels. We...

  9. Identity and Access Management and Security in Higher Education.

    Science.gov (United States)

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  10. Improving Measurement of Workplace Sexual Identity Management

    Science.gov (United States)

    Lance, Teresa S.; Anderson, Mary Z.; Croteau, James M.

    2010-01-01

    The purpose of this study was to advance measurement of sexual identity management for lesbian, gay, and bisexual workers. Psychometric properties of a revised version of the Workplace Sexual Identity Management Measure (WSIMM; Anderson, Croteau, Chung, & DiStefano, 2001) were examined on a sample of 64 predominantly White K-12 teachers.…

  11. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    NARCIS (Netherlands)

    Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,

  12. Building an Identity Management Governance Process

    Science.gov (United States)

    Berg, Joanne E.; Kraemer, Ron; Raatz, Carla; Devoti, Steve

    2009-01-01

    A particular challenge in any campus environment is determining how requests for access to services and resources are managed. Who decides the technology, infrastructure, policy, business process and procedure? The involvement of key institutional leaders and stakeholders in identity management governance is the driving force behind the way the…

  13. Design and Development of an Identity Management System: The Minnesota State College-Southeast Technical Case Study

    Science.gov (United States)

    Elhindi, Mohamed A.

    2010-01-01

    Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…

  14. Design and Construction of an Entity Resolution System that Supports Entity Identity Information Management and Asserted Resolution

    Science.gov (United States)

    Nelson, Eric Derrand

    2011-01-01

    This work describes the design and construction of an open source, entity resolution system that enables users to assign and maintain persistent identifiers for master data items. Two key features of this system that are not available in current ER systems and that make persistent identification possible are (1) The capture and management of…

  15. A Contextual Model for Identity Management (IdM) Interfaces

    Science.gov (United States)

    Fuller, Nathaniel J.

    2014-01-01

    The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…

  16. Research Management in Portugal: A Quest for Professional Identity

    Science.gov (United States)

    Trindade, Margarida; Agostinho, Marta

    2014-01-01

    Research managers at science-intensive institutions appear as a continuously evolving group of professionals whose identity is somewhat fragmented, even to themselves. In Portugal, specialized research manager roles have rapidly emerged over the last years alongside the development of a small but consolidated scientific system. In order to get an…

  17. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  18. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  19. CILogon: An Integrated Identity and Access Management Platform for Science

    Science.gov (United States)

    Basney, J.

    2016-12-01

    When scientists work together, they use web sites and other software to share their ideas and data. To ensure the integrity of their work, these systems require the scientists to log in and verify that they are part of the team working on a particular science problem. Too often, the identity and access verification process is a stumbling block for the scientists. Scientific research projects are forced to invest time and effort into developing and supporting Identity and Access Management (IAM) services, distracting them from the core goals of their research collaboration. CILogon provides an IAM platform that enables scientists to work together to meet their IAM needs more effectively so they can allocate more time and effort to their core mission of scientific research. The CILogon platform enables federated identity management and collaborative organization management. Federated identity management enables researchers to use their home organization identities to access cyberinfrastructure, rather than requiring yet another username and password to log on. Collaborative organization management enables research projects to define user groups for authorization to collaboration platforms (e.g., wikis, mailing lists, and domain applications). CILogon's IAM platform serves the unique needs of research collaborations, namely the need to dynamically form collaboration groups across organizations and countries, sharing access to data, instruments, compute clusters, and other resources to enable scientific discovery. CILogon provides a software-as-a-service platform to ease integration with cyberinfrastructure, while making all software components publicly available under open source licenses to enable re-use. Figure 1 illustrates the components and interfaces of this platform. CILogon has been operational since 2010 and has been used by over 7,000 researchers from more than 170 identity providers to access cyberinfrastructure including Globus, LIGO, Open Science Grid

  20. Playing It Safe: Identity Management and Single Sign-On

    Science.gov (United States)

    Alawneh, John

    2012-01-01

    Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…

  1. Federated Identity Management for Research Collaborations

    CERN Document Server

    Broeder, Daan; Kelsey, David; Kershaw, Philip; Lüders, Stefan; Lyall, Andrew; Nyrönen, Tommi; Wartel, Romain; Weyer, Heinz J

    2012-01-01

    Federated identity management (FIM) is an arrangement that can be made among multiple organisations that lets subscribers use the same identification data to obtain access to the secured resources of all organisations in the group. Identity federation offers economic advantages, as well as convenience, to organisations and their users. For example, multiple institutions can share a single application, with resultant cost savings and consolidation of resources. In order for FIM to be effective, the partners must have a sense of mutual trust. A number of laboratories including national and regional research organizations are facing the challenge of a deluge of scientific data that needs to be accessed by expanding user bases in dynamic collaborations that cross organisational and national boundaries. Driven by these needs, representatives from a variety of research communities, including photon/neutron facilities, social science & humanities, high-energy physics, atmospheric science, bioinformatics and fusi...

  2. Corporate identity: The concept, its measurement and management

    NARCIS (Netherlands)

    C.B.M. van Riel (Cees); J.M.T. Balmer (John)

    1997-01-01

    textabstractArticulates the main trends in the literature on corporate identity; defines corporate identity; explains the rationale for corporate identity management and describes the main methods used to reveal the desired and the actual corporate identity. Particular reference will be made to two

  3. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    Science.gov (United States)

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  4. Patient privacy, consent, and identity management in health information exchange

    CERN Document Server

    Hosek, Susan D

    2013-01-01

    As a step toward improving its health information technology (IT) interoperability, the Military Health System is seeking to develop a research roadmap to better coordinate health IT research efforts, address IT capability gaps, and reduce programmatic risk for its enterprise projects. This report identifies gaps in research, policy, and practice involving patient privacy, consent, and identity management that need to be addressed to improve the quality and efficiency of care through health information exchange.

  5. Identity And Access Management e Federazione

    Directory of Open Access Journals (Sweden)

    Virginia Calabritto

    2012-07-01

    Full Text Available ItLa rete telematica è in costante crescita e così i servizi online che, in modo sempre più penetrante, rappresentano un aspetto della nostra quotidianità. I servizi in rete si distinguono in servizi ad accesso libero e servizi ad accesso controllato. Ogni giorno studenti, ricercatori e docenti accedono a contenuti e servizi (risorse ad accesso controllato con modalità diverse, la più diffusa è l'utilizzo dell‘informazione utenza/password, informazione diversa per ciascuna risorsa. Da questo punto di vista l’ampia disponibilità di risorse in rete crea all’utente, ma non solo a lui, diversi problemi, non ultimo quello della memorizzazione di un numero sempre più ampio di coppie utenza/password.L’articolo è teso ad illustrare, nel dettaglio, scenario e problematiche per passare quindi ad accennare alle tecnologie che possono costituire una soluzione, ovvero, l'Identity Management, il Single Sign On e le federazioni di infrastrutture di autenticazione e autorizzazione e, quindi, a degli esempi tra cui IDEM, la prima federazione italiana di Infrastrutture di Autenticazione e Autorizzazione, che coinvolge gli enti della comunità scientifica ed accademica e i fornitori di servizi.EnThe Internet is constantly growing, therefore on-line services, are becoming part of our daily life in a more and more pervasive manner. The network services are divided into two types of access: free access and controlled access. Every day students, researchers and teachers access content and services (resources through controlled access using different modes, e.g using user / password information which is different for each resource. From this perspective, the large availability of networked resources generates many problems for the users, last but not least the inconvenience of storing an increasing number of user / password.The article aims to illustrate, in detail, the context and the problems related to the management of a digital identiy in the

  6. Biometric identity management for standard mobile medical networks.

    Science.gov (United States)

    Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica

    2012-01-01

    The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.

  7. Role-meanings as a critical factor in understanding doctor managers' identity work and different role identities.

    Science.gov (United States)

    Cascón-Pereira, Rosalía; Chillas, Shiona; Hallier, Jerry

    2016-12-01

    This study examines "identity work" among hybrid doctor-managers (DMs) in the Spanish National Health System to make sense of their managerial roles. In particular, the meanings underlying DMs experience of their hybrid role are investigated using a Grounded Theory methodology, exposing distinctions in role-meanings. Our findings provide evidence that using different social sources of comparison (senior managers or clinicians) to construct the meaning of managerial roles leads to different role-meanings and role identities, which are the source of the two established types of DM in the literature, the reluctant and the enthusiast. The contribution is twofold: our findings lead us to theorize DMs' identity work processes by adding an overlooked role-meaning dimension to identity work; and raise practical reflections for those who wish to develop enthusiast doctor managers. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Corporate visual identity management: current practices, impact, and assessment

    NARCIS (Netherlands)

    van den Bosch, A.L.M.

    2005-01-01

    This dissertation is about Corporate Visual Identity (CVI) management. Its purpose is to gain more insight into activities associated with managing CVI and the impact of these activities on the outcome: the degree of consistency in CVI.

  9. Enterprise identity management towards an investment decision support approach

    CERN Document Server

    Royer, Denis

    2013-01-01

    ?The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is

  10. Organizational Identity and Culture in the Context of Managed Change

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken; Skov, Anne-Marie

    2015-01-01

    their organization’s identity led middle managers and employees both to support and resist new organizational identity claims made by top management. Within these identity activation processes we found frequent references relating new identity claims to organizational culture. Further analysis of the data revealed......This article presents top and middle managers’ experiences and understandings of how organizational identity and culture were entangled with transformational change as it unfolded over a 5-year period in Carlsberg Group. Combining ethnography and grounded theory methods with engaged scholarship......, our work sits between research and practice, speaking directly to the experience of managers at the same time that it researches both the content and processes of organizational identity and culture. The study shows that engaging in processes of reflecting, questioning, and debating about...

  11. ISLAM AND MINORITIES: Managing Identity in Malaysia

    Directory of Open Access Journals (Sweden)

    Ahmad Suaedy

    2010-02-01

    Full Text Available The Malaysian general election in March 2008 raised an interesting and new phenomenon. For the first time since independence in 1957, the ruling alliance known as the National Front (Barisan Nasional, BN failed to secure two thirds of seats in parliament and lost control of five of Malaysia’s 13 states. This was due to the challenge presented by the new opposition alliance known as the Alternative Front (Barisan Alternatif, BA or the People’s Alliance (Pakatan Rakyat, PK which won more than 36% of seats in parliament and gained control of the five states. In the 2004 election, BN secured the largest ever percentage of seats in parliament with 91%. What is interesting is that it seems that this significant increase in support for the opposition is  due to their offer to change the way minorities and ethnicity is managed. They  propose a move from “Bumiputera Supremacy”, or affirmative action for the approximately 65% of “Bumiputera” Malaysians (the rest being largely of Chinese or Indian ethnicity, to “The People’s Supremacy”, which involves eradicating affirmative action based on ethnicity, basing it instead on need, for  instance need due to poverty. This would potentially increase the likelihood  of justice and equality for all ethnic or racial groups. This paper connects the phenomenon of change, as seen in the about turn in the results between the  2004 and 2008 elections, to the more global trend in which minorities are standing up to demand their rights in this era of globalization, and to the challenge multiculturalism presents to parts of the Muslim world such as Malaysia. Malaysia, a Muslim majority nation that has formally declared Islam the official state religion with Yang di-Pertuan Agong (the King as  Head of the State and symbol of Islam, is one example, though not necessarily  representative, of how Islam and Muslims manage minorities and identity or  multiculturalism within the process of globalization

  12. Ultrasonic identity data storage and archival system

    International Nuclear Information System (INIS)

    Mc Kenzie, J.M.; Self, B.G.; Walker, J.E.

    1987-01-01

    Ultrasonic seals are being used to determine if an underwater stored spent fuel container has been compromised and can be used to determine if a nuclear material container has been compromised. The Seal Pattern Reader (SPAR) is a microprocessor controlled instrument which interrogates an ultrasonic seal to obtain its identity. The SPAR can compare the present identity with a previous identity, which it obtains from a magnetic bubble cassette memory. A system has been developed which allows an IAEA inspector to transfer seal information obtained at a facility by the SPAR to an IAEA-based data storage and retrieval system, using the bubble cassette memory. Likewise, magnetic bubbles can be loaded at the IAEA with seal signature data needed at a facility for comparison purposes. The archived signatures can be retrieved from the data base for relevant statistical manipulation and for plotting

  13. Professional identity and role transitions in clinical managers.

    Science.gov (United States)

    Spehar, Ivan; Frich, Jan C; Kjekshus, Lars Erik

    2015-01-01

    The purpose of this paper is to investigate how clinicians' professional background influences their transition into the managerial role and identity as clinical managers. The authors interviewed and observed 30 clinicians in managerial positions in Norwegian hospitals. A central finding was that doctors experienced difficulties in reconciling the role as health professional with the role as manager. They maintained a health professional identity and reported to find meaning and satisfaction from clinical work. Doctors also emphasized clinical work as a way of gaining legitimacy and respect from medical colleagues. Nurses recounted a faster and more positive transition into the manager role, and were more fully engaged in the managerial aspects of the role. The authors advance that health care organizations need to focus on role, identity and need satisfaction when recruiting and developing clinicians to become clinical managers. The study suggests that the inclusion of aspects from identity and need satisfaction literature expands on and enriches the study of clinical managers.

  14. Managing corporate identity: an integrative framework of dimensions and determinants

    NARCIS (Netherlands)

    Cornelissen, Joep; Elving, Wim

    2003-01-01

    Although there has been an enduring interest in corporate identity and image management, there is relatively little systematic empirical research on the topic. Large due to the diffuse interpretations, and dubious denotation that have characterized the subject of corporate identity so far, the

  15. The Formation of Professional Identity in French "Apprenti" Managers

    Science.gov (United States)

    Angot, Jacques; Malloch, Hedley; Kleymann, Birgit

    2008-01-01

    Purpose: The paper aims to show how professional identity is constructed at a very early stage of initial management education. In so doing, it questions the notion of "le metier" in management. Design/methodology/approach: The paper is based on a study of the experiences of six French management apprentices (or apprentis) who…

  16. Chapter 14. Systems of identical particles

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    For the systems of identical particles it is necessary to introduce the postulate of symmetrization to describe quantum systems. Physical implications of this postulate are presented: bosons, fermions and Pauli exclusion principle; quantum statistics; interferences between direct process and exchange process. Permutation operators are also exposed. In complement are studied: approximation of central field, electron configurations, energy levels of helium atom (configurations, terms, multiplets), physical properties of electron gas (application to solids) [fr

  17. Strategies for managing impressions of racial identity in the workplace.

    Science.gov (United States)

    Roberts, Laura Morgan; Cha, Sandra E; Kim, Sung Soo

    2014-10-01

    This article deepens understanding of the workplace experiences of racial minorities by investigating racial identity-based impression management (RIM) by Asian American journalists. Racial centrality, directly or indirectly, predicted the use of 4 RIM strategies (avoidance, enhancement, affiliation, and racial humor). Professional centrality also predicted strategy use, which was related to life satisfaction and perceived career success. By shedding light on proactive strategies that individuals use to influence colleagues' impressions of their racial identity, we contribute to research on diversity in organizations, impression management, and racial identity. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  18. Dialogue, Language and Identity: Critical Issues for Networked Management Learning

    Science.gov (United States)

    Ferreday, Debra; Hodgson, Vivien; Jones, Chris

    2006-01-01

    This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…

  19. A Federated Digital Identity Management Approach for Business Processes

    Science.gov (United States)

    Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.

    Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.

  20. Leadership as social identity management: Introducing the Identity Leadership Inventory (ILI) to assess and validate a four-dimensional model

    OpenAIRE

    Steffens, Niklas K.; Haslam, S. Alexander; Reicher, Stephen D.; Platow, Michael J.; Fransen, Katrien; Yang, Jie; Ryan, Michelle K.; Jetten, Jolanda; Peters, Kim O.; Boen, Filip

    2014-01-01

    Although nearly two decades of research has provided support for the social identity approach to leadership, most previous work has focused on leaders’ identity prototypicality while neglecting the assessment of other equally important dimensions of social identity management. However, recent theoretical developments have argued that in order to mobilize and direct followers’ energies, leaders need not only to ‘be one of us’ (identity prototypicality), but also to ‘do it for us’ (identity adv...

  1. Identity Management Framework for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.

    -configuring capability and is termed as Internet of Things (IoT). The vision of IoT is to connect every object with computing, communication and sensing ability to the Internet. IoT contains varied range of devices from RFID tags, sensor nodes to the even shoes. Thus, IoT enable nomadic collaboration and communication...... between users and devices, between devices themselves and devices to services. Due to rapid technological advancements in the wireless communications, information coming from uncountable applications and services converged on user devices, communication infrastructure and the Internet are integral part...... that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with IoT, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges. The work carried out in the scope of this thesis addresses...

  2. Integrating Identity Management With Federated Healthcare Data Models

    Science.gov (United States)

    Hu, Jun; Peyton, Liam

    In order to manage performance and provide integrated services, health care data needs to be linked and aggregated across data sources from different organizations. The Internet and secure B2B networks offer the possibility of providing near real-time integration. However, there are three major stumbling blocks. One is to standardize and agree upon a common data model across organizations. The second is to match identities between different locations in order to link and aggregate records. The third is to protect identity and ensure compliance with privacy laws. In this paper, we analyze three main approaches to the problem and use a healthcare scenario to illustrate how each one addresses different aspects of the problem while failing to address others. We then present a systematic framework in which the different approaches can be flexibly combined for a more comprehensive approach to integrate identity management with federated healthcare data models.

  3. Synchronization of identical chaotic systems through external chaotic driving

    International Nuclear Information System (INIS)

    Patidar, V.; Sud, K.K.

    2005-11-01

    In recent years, the study of synchronization of identical chaotic systems subjected to a common fluctuating random driving signal has drawn considerable interest. In this communication, we report that it is possible to achieve synchronization between two identical chaotic systems, which are not coupled directly but subjected to an external chaotic signal. The external chaotic signal may be obtained from any chaotic system identical or non-identical to both identical chaotic systems. Results of numerical simulations on well known Roessler and jerk dynamical systems have been presented. (author)

  4. Identity Management and Trust Services: Foundations for Cloud Computing

    Science.gov (United States)

    Suess, Jack; Morooney, Kevin

    2009-01-01

    Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…

  5. designing a framework for a unified electronic identity system

    African Journals Online (AJOL)

    DJFLEX

    In this paper, a Unified Identity System is proposed where single electronic identity (eID) is issued that can be used ... online commerce and public sector organizations. Because ..... SearchUnifiedCommunications.com Definitions, Access date.

  6. Qualitative Study on the Identity of the Manager in Romania

    Directory of Open Access Journals (Sweden)

    FLORENTINA SCÂRNECI

    2011-01-01

    Full Text Available The article presents the results of a qualitative research project carried out in 2008, which aimed at identifying the identity condition of managers in Romania. The article presents part of the grounded theory on the identity of managers: the day to day circumstances in which they live - issues related to childhood and maturity (material situation, relationships, family, etc.. Also, it describes in brief the methodology applied: qualitative collection of data, theoretical sampling, theoretical saturation and the analysis of qualitative data obtained.The article presents, also in brief, the larger research framework wherefrom the presented part was extracted. The conclusion is that there are life-related issues specific to managers (and, more precisely, specific reactions to the environment and that their identification can form the basis for designing methods of managerial diagnosis and prognosis.

  7. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa

    Science.gov (United States)

    Daire, Judith; Gilson, Lucy

    2014-01-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager’s job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  8. A Reputation-Based Identity Management Model for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Lifa Wu

    2015-01-01

    Full Text Available In the field of cloud computing, most research on identity management has concentrated on protecting user data. However, users typically leave a trail when they access cloud services, and the resulting user traceability can potentially lead to the leakage of sensitive user information. Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms. To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. In the model, pseudonyms are generated based on a reputation signature so as to guarantee the untraceability of pseudonyms, and a mechanism that calculates user reputation is proposed, which helps cloud service providers to identify malicious users. Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.

  9. Identity and access management business performance through connected intelligence

    CERN Document Server

    Osmanoglu, Ertem

    2013-01-01

    Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirements

  10. Management challenges in a case of gender identity disorder

    Directory of Open Access Journals (Sweden)

    Anubhav Rathi

    2014-01-01

    Full Text Available Gender identity disorder (GID is a complex disorder and can be defined as a group of disorders whose common feature is a strong and persistent preference for living as a person of the other sex. It is associated with significant impairment in social, occupational, interpersonal, and other areas of functioning. We describe the case of an adolescent, biologically male who was brought to our outpatient department primarily with symptoms of adjustment disorder with GID and the management provided. The role of a psychiatrist in the management, ethical and legal issues involved is also discussed.

  11. Issues of E-Learning Standards and Identity Management for Mobility and Collaboration in Higher Education

    Science.gov (United States)

    Alves, Paulo; Uhomoibhi, James

    2010-01-01

    Purpose: This paper seeks to investigate and report on the status of identity management systems and e-learning standards across Europe for promoting mobility, collaboration and the sharing of contents and services in higher education institutions. Design/methodology/approach: The present research work examines existing e-learning standards and…

  12. Social identity management strategies used by workers with acquired hearing loss.

    Science.gov (United States)

    Jennings, Mary Beth; Southall, Kenneth; Gagné, Jean-Pierre

    2013-01-01

    There is a paucity of knowledge about social identity-management by persons with hearing loss. The objective of the study was to gain an understanding from the perspective of the participants, the ways in which workers with acquired hearing loss manage their identity in the workplace. Twelve persons with acquired hearing loss, who were gainfully employed in a variety of settings and occupations in three Canadian cities, participated in audio-recorded semi-structured interviews. A secondary qualitative analysis was conducted on transcripts of interviews collected in a previous study on factors that influence disclosure of hearing loss in the workplace. A qualitative descriptive research paradigm was adopted and content analyses were used to extract pertinent information from verbatim transcripts. Participants described a range of identity-management strategies enacted in the workplace. Five recurrent themes emerged as important considerations in the Art of Identity Management in the workplace: 1. Managing the situation, 2. Having a buddy system, 3. Feeling comfortable, 4. Using personal resources, 5. It gets easier with time. Social identity-management is a complex process. Although persons with acquired hearing loss experience different challenges from other persons with invisible stigmas, similarities in the range of social identity-management strategies employed were evident in our findings. In addition, the social cognitive learning model of disclosure appears to be relevant to the experiences of our participants. The implications of the findings emphasize the importance of all stakeholders working collaboratively to address the issues of the growing population of workers with hearing loss.

  13. Developing an Assessment of Sexual Identity Management for Lesbian and Gay Workers.

    Science.gov (United States)

    Anderson, Mary Z.; Croteau, James M.; DiStefano, Teresa M.; Chung, Y. Barry

    2001-01-01

    Psychometric properties of the Workplace Sexual Identity Management Measure were tested with 172 professionals. Results suggest it successfully assesses a continuum of lesbian and gay identity management strategies (passing, covering, implicitly out, explicitly out). (Contains 27 references.) (SK)

  14. Working to reduce the effects of discrimination: Identity management strategies in organizations.

    Science.gov (United States)

    Shih, Margaret; Young, Maia J; Bucher, Amy

    2013-04-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity redefinition (i.e., stereotype reassociation and regeneration). Organizations adopting a color-blind approach may make it more difficult for individuals to use identity switching because the policies deemphasize differences in social identities. In contrast, organizations adopting a multicultural approach may make it more difficult for individuals to use identity redefinition. Multicultural approaches, applied superficially, may celebrate group differences that might actually reinforce culturally dominant stereotypes. We explore the likelihood that individuals will adopt each strategy given these organizational approaches to diversity. We outline steps organizations can take to reduce the need for identity management strategies and to facilitate identity management when necessary.

  15. OAuth 2.0 identity and access management patterns

    CERN Document Server

    Spasovski, Martin

    2013-01-01

    This is a practical and fast-paced guide that gives you all the information you need to start implementing secure OAuth 2.0 implementations in your web applications.OAuth 2.0 Identity and Access Management Patterns is intended for software developers, software architects, and enthusiasts working with the OAuth 2.0 framework.In order to learn and understand the OAuth 2.0 grant flow, it is assumed that you have some basic knowledge of HTTP communication. For the practical examples, basic knowledge of HTML templating, programming languages, and executing commands in the command line terminal is a

  16. Working to Reduce the Effects of Discrimination: Identity Management Strategies in Organizations

    Science.gov (United States)

    Shih, Margaret; Young, Maia J.; Bucher, Amy

    2013-01-01

    Despite efforts to dispel discrimination, workplace discrimination still occurs. We introduce two classes of identity management strategies individuals use to mitigate the negative consequences of discrimination: identity switching (i.e., deemphasizing target identities and recategorizing to a more positively valued identity) and identity…

  17. Designing a framework for a unified electronic identity system ...

    African Journals Online (AJOL)

    In this paper, a Unified Identity System is proposed where single electronic identity (eID) is issued that can be used across the various platforms of business transaction. The activity/state diagram of the model is presented, and the means of authentication is based on the Secure Assertion Markup Language (SAML) ...

  18. A User-Centric System for Verified Identities on the Bitcoin Blockchain

    OpenAIRE

    Augot, Daniel; Chabanne, Hervé; Chenevier, Thomas; George, William; Lamber, Laurent

    2017-01-01

    International audience; We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin's decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even as identity providers can revoke identities and impose controls.

  19. Does identity shape leadership and management practice? Experiences of PHC facility managers in Cape Town, South Africa.

    Science.gov (United States)

    Daire, Judith; Gilson, Lucy

    2014-09-01

    In South Africa, as elsewhere, Primary Health Care (PHC) facilities are managed by professional nurses. Little is known about the dimensions and challenges of their job, or what influences their managerial practice. Drawing on leadership and organizational theory, this study explored what the job of being a PHC manager entails, and what factors influence their managerial practice. We specifically considered whether the appointment of professional nurses as facility managers leads to an identity transition, from nurse to manager. The overall intention was to generate ideas about how to support leadership development among PHC facility managers. Adopting case study methodology, the primary researcher facilitated in-depth discussions (about their personal history and managerial experiences) with eight participating facility managers from one geographical area. Other data were collected through in-depth interviews with key informants, document review and researcher field notes/journaling. Analysis involved data triangulation, respondent and peer review and cross-case analysis. The experiences show that the PHC facility manager's job is dominated by a range of tasks and procedures focused on clinical service management, but is expected to encompass action to address the population and public health needs of the surrounding community. Managing with and through others, and in a complex system, requiring self-management, are critical aspects of the job. A range of personal, professional and contextual factors influence managerial practice, including professional identity. The current largely facility-focused management practice reflects the strong nursing identity of managers and broader organizational influences. However, three of the eight managers appear to self-identify an emerging leadership identity and demonstrate related managerial practices. Nonetheless, there is currently limited support for an identity transition towards leadership in this context. Better

  20. Campus Single Sign-On und hochschulübergreifendes Identity Management

    Science.gov (United States)

    Hommel, Wolfgang

    Das im Rahmen von IntegraTUM für die TUM geschaffene Identity & Access Management System setzt das Paradigma unified login um, d. h. ein Benutzer kann alle für ihn relevanten Dienste innerhalb der Hochschule mit derselben Loginname-/Passwortkombination nutzen. Dieser Artikel zeigt, wie auf Basis der Software Shibboleth und der deutschlandweiten Hochschulföderation DFN-AAI als weitere Mehrwerte das campusweite web single sign-on und die nahtlose Nutzung zahlreicher externer Web-Anwendungen erreicht werden. Als Beispiel für die Abläufe bei der Erschließung neuer Dienste für die hochschulübergreifende Nutzung wird die Anbindung von Learning Management Systemen auf Basis des DFN-AAI E-Learning-Profils diskutiert. Den umfassenden Vorteilen werden schließlich die aktuellen technischen Grenzen bei der Umsetzung des hochschulübergreifenden Identity Management gegenübergestellt.

  1. Environmental Management System

    Science.gov (United States)

    Goals Recycling Green Purchasing Pollution Prevention Reusing Water Resources Environmental Management Stewardship » Environmental Protection » Environmental Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the

  2. Function Projective Synchronization of Two Identical New Hyperchaotic Systems

    International Nuclear Information System (INIS)

    Li Xin; Chen Yong

    2007-01-01

    A function projective synchronization of two identical hyperchaotic systems is defined and the theorem of sufficient condition is given. Based on the active control method and symbolic computation Maple, the scheme of function projective synchronization is developed to synchronize the two identical new hyperchaotic systems constructed by Yan up to a scaling function matrix with different initial values. Numerical simulations are used to verify the effectiveness of the scheme.

  3. Personnel Identity Management and the Expeditionary Strike Group

    National Research Council Canada - National Science Library

    Neises, Glen E

    2007-01-01

    .... Chapter I defines IM and explains why IM is important for the Department of Defense (DoD). Chapter II provides an overview of DoD human resource management and Defense Manpower Data Center information systems...

  4. Quality management system

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Mu Sung

    2009-08-15

    This book deals with ISO9001 quality management system which includes summary of this system such as classification of quality, principle of quality management, and definition, requirement and procedure of quality management system, introduction of ISO9001 system like model of ISO9001 quality management system, ISO certificate system, structure of ISO9001 standard, requirement of ISO9001 quality management system, process approach and documentation of system, propel cases of ISO9001 quality management system.

  5. Quality management system

    International Nuclear Information System (INIS)

    Lee, Mu Sung

    2009-08-01

    This book deals with ISO9001 quality management system which includes summary of this system such as classification of quality, principle of quality management, and definition, requirement and procedure of quality management system, introduction of ISO9001 system like model of ISO9001 quality management system, ISO certificate system, structure of ISO9001 standard, requirement of ISO9001 quality management system, process approach and documentation of system, propel cases of ISO9001 quality management system.

  6. Single Thing Sign On Identity Management for Internet of Things

    DEFF Research Database (Denmark)

    Zdravkova, Vanya; Mihaylov, Mihail Rumenov; Mihovska, Albena Dimitrova

    2016-01-01

    —Within the context of heterogeneous Internet of Things (IoT) network driven by Machine-to-Machine (M2M) communications there is a need for a proper user identification and Identity Management (IdM) mechanisms which to involve all of the objects in the IoT. The paper addresses user identification...... by proposing Single Thing Sign On (STSO) IdM architecture for IoT, where the end-user is in the middle of a user-centered services ecosystem. The proposed scheme enables user recognition and services access only by identification of one of the “things” related to the user such as personal computing devices...

  7. Comparison between different synchronization methods of identical chaotic systems

    International Nuclear Information System (INIS)

    Haeri, Mohammad; Khademian, Behzad

    2006-01-01

    This paper studies and compares three nonadaptive (bidirectional, unidirectional, and sliding mode) and two adaptive (active control and backstepping) synchronization methods on the synchronizing of four pairs of identical chaotic systems (Chua's circuit, Roessler system, Lorenz system, and Lue system). Results from computer simulations are presented in order to illustrate the effectiveness of the methods and to compare them based on different criteria

  8. [Meanings attributed to management as an explanation for clinician managers' attitudes and professional identity].

    Science.gov (United States)

    Cascón-Pereira, Rosalía; Valverde, Mireia

    2014-01-01

    To understand the process by which clinician managers construct their professional identities and develop their attitudes toward managing. A qualitative study was performed, based on grounded theory, through in-depth interviews with 20 clinician managers selected through theoretical sampling in two public hospitals of Catalonia (Spain), participant observation, and documentation. Clinician managers' role meanings are constructed by comparing their roles with those of senior managers and clinicians. In this process, clinician managers seek to differentiate themselves from senior managers through the meanings constructed. In particular, they use proximity with reality and clinical knowledge as the main sources of differentiation. This study sheds light on why clinician managers develop adverse attitudes to managing and why they define themselves as clinicians rather than as managers. The explanation lies in the construction of the meanings they assign to managing as the basis of their attitudes to this role and professional identity. These findings have some practical implications for healthcare management. Copyright © 2014. Published by Elsevier Espana.

  9. Identity management for e-government Libya as a case study

    DEFF Research Database (Denmark)

    Elaswad, Othoman; Jensen, Christian D.

    2016-01-01

    Governments are strengthening their identity (ID) management strategies to deliver new and improved online services to their citizens. Such online services typically include applications for different types of permissions, requests for different types of official documents and management...... of different types of entitlements. The ID management scheme must therefore be able to correctly authenticate citizens and link online presence to real world identities....

  10. Open source identity management patterns and practices using OpenAM 10.x

    CERN Document Server

    Kenning, Waylon

    2013-01-01

    This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x.Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat.

  11. Sensor management for identity fusion on a mobile robot

    DEFF Research Database (Denmark)

    Larsen, Thomas Dall; Andersen, Nils Axel; Ravn, Ole

    1998-01-01

    This paper addresses the problem of identity fusion, i.e. the problem of selecting one of several identity hypotheses concerning an observed object. Two problems are considered. Firstly the problem of preserving the information in the representation and fusion of measurements relating to identity...

  12. Bridge Management Systems

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle

    In this paper bridge management systems are discussed with special emphasis on management systems for reinforced concrete bridges. Management systems for prestressed concrete bridges, steel bridges, or composite bridges can be developed in a similar way....

  13. Small supermarket management system

    Institute of Scientific and Technical Information of China (English)

    曹正

    2016-01-01

    This system USES the Java language in the MyEclipse platform development tool, SQL2005 as the database platform for data and data, the SQL2005 required for the user operating system. It mainly implements the daily management of goods, including purchase management, inventory management, sales management, personnel management and supplier management. The system can also complete the functions of browsing, querying, adding, deleting and modifying relevant information. This topic is the core of the stock management, inventory management and sales management, at the same time, the system also has the full user management and permissions management function..

  14. A hand held photo identity verification system for mobile applications

    International Nuclear Information System (INIS)

    Kumar, Ranajit; Upreti, Anil; Mahaptra, U.; Bhattacharya, S.; Srivastava, G.P.

    2009-01-01

    A handheld portable system has been developed for mobile personnel identity verification. The system consists of a contact less RF smart card reader integrated to a Simputer through serial link. The simputer verifies the card data, with the data base and aids the security operator in identifying the persons by providing the facial image of the verified person along with other personal details like name, designation, division etc. All transactions are recorded in the Simputer with time and date for future record. This system finds extensive applications in mobile identity verification in nuclear or other industries. (author)

  15. Identical synchronization of coupled Rossler systems

    DEFF Research Database (Denmark)

    Yanchuk, S.; Maistrenko, Y.; Mosekilde, Erik

    1999-01-01

    Analyzing the transverse stability of low periodic orbits embedded in the synchronized chaotic state for a system of two coupled Rössler oscillators, we obtain the conditions for synchronization and determine the coupling parameters for which riddled basins of attraction may arise. It is shown how...

  16. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    Science.gov (United States)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  17. The importance of corporate brand identity in business management: An application to the UK banking sector

    Directory of Open Access Journals (Sweden)

    Isabel Buil

    2016-01-01

    Full Text Available Corporate brand identity management is a key issue for any organisation. Accordingly, its study is a research field of great interest. This paper seeks to broaden the understanding of this strategic activity and its effects. Specifically, it investigates the concept of corporate brand identity from the employees’ perspective in the UK financial banking sector and analyses the link between brand identity management and employees’ attitudes and behaviours. Results indicate that organisations should pay special attention to the corporate brand identity management, given its influence on employees’ commitment with their organisations, as well as their brand performance and satisfaction.

  18. Comparison between different synchronization methods of identical chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Haeri, Mohammad [Advanced Control System Laboratory, Electrical Engineering Department, Sharif University of Technology, Azadi Avenue, P.O. Box 11365-9363 Tehran (Iran, Islamic Republic of)]. E-mail: haeri@sina.sharif.edu; Khademian, Behzad [Advanced Control System Laboratory, Electrical Engineering Department, Sharif University of Technology, Azadi Avenue, P.O. Box 11365-9363 Tehran (Iran, Islamic Republic of)

    2006-08-15

    This paper studies and compares three nonadaptive (bidirectional, unidirectional, and sliding mode) and two adaptive (active control and backstepping) synchronization methods on the synchronizing of four pairs of identical chaotic systems (Chua's circuit, Roessler system, Lorenz system, and Lue system). Results from computer simulations are presented in order to illustrate the effectiveness of the methods and to compare them based on different criteria.

  19. Walking the tightrope: Constructing gender and professional identities in account management

    NARCIS (Netherlands)

    Gremmen, C.C.M.; Benschop, Y.W.M.

    2009-01-01

    This paper contributes to the growing stream of organization research that explores the relationship between professional identities and gender. Our central question pertains to how account managers ‘do gender’ in constructing their professional identities. While account management has been

  20. Conversations outside the Comfort Zone: Identity Formation in SME Manager Action Learning

    Science.gov (United States)

    Anderson, Lisa; Gold, Jeff

    2009-01-01

    In this paper we consider the construction of narrative identity and particularly how managers of small businesses may construct new narrative identities within the activity of the action learning situation. We build on recent work to suggest that the "world" of managers can be explored through a consideration of Vygotsky's socio-cultural theory…

  1. A network identity authentication system based on Fingerprint identification technology

    Science.gov (United States)

    Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan

    2005-10-01

    Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.

  2. Object Classification based Context Management for Identity Management in Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2013-01-01

    As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging, and there is ......As computing technology is becoming more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism is more stringent, flexible and less intrusive. Scalability issue in IoT makes identity management (IdM) of ubiquitous objects more challenging......, and there is a need of context-aware access control solution for IdM. Confronting uncertainty of different types of objects in IoT is not easy. This paper presents the logical framework for object classification in context aware IoT, as richer contextual information creates an impact on the access control. This paper...

  3. A National Identity Management Strategy to Enhance the Brazilian Electronic Government

    Directory of Open Access Journals (Sweden)

    José Alberto Sousa Torres

    2017-12-01

    Full Text Available Amongst the several problems with the Brazilian e-government services (e-Gov, many of them are related to the fact that Brazil does not have a National Strategy for Digital Identity Management (IdM. To design a  national strategy, it is crucial to analyze the solutions adopted in other countries and take into account Brazilian characteristics, such as its area, population, digital inclusion index, socio-political and economic profile, the current national identity registration system and the fraud rate. In this context, this paper aims to propose a national strategy for IdM for the Brazilian e-Gov program. This strategy was built upon by a literature review of the experiences of European countries and, mainly, the peculiarities inherent to Brazil.

  4. Transition to Postgraduate Study: Postgraduate Ecological Systems and Identity

    Science.gov (United States)

    Tobbell, Jane; O'Donnell, Victoria L.

    2013-01-01

    This paper explores and examines the distal and proximal systems which construct social science postgraduate study in the UK and analyses the emergent identities of postgraduate students as they negotiate the multiple and interacting practices in their transition to study. The data represent part of a one-year research project, funded by the…

  5. Personae of interest - managers' identities and the online mirror

    NARCIS (Netherlands)

    Ranzini, G; Fieseler, C.

    2013-01-01

    Purpose - In this chapter we discuss the implications social media have for the selfrepresentation and identity formulation of professionals within organizations. Under the assumption that new, technology-mediated networking possibilities call for a reformulation of the boundaries between the

  6. Identity Management ToolKit (IdM TK)

    Data.gov (United States)

    Department of Veterans Affairs — With the IdM TK, authorized users can search and view identity and exception information from the Administrative Data Repository (ADR). Specifically, users can view...

  7. Managing corporate visual identity : exploring the differences between manufacturing and service, and profit-making and nonprofit organizations

    NARCIS (Netherlands)

    van den Bosch, Annette; de Jong, Menno; Elving, Wim

    2006-01-01

    Corporate Visual Identity (CVI) is a crucial part of the identity of any organization. Most research on managing corporate identity deals with the strategic development of corporate identity and the design and effects of specific elements of the CVI. This study focuses on an aspect of CVI management

  8. Globus Identity, Access, and Data Management: Platform Services for Collaborative Science

    Science.gov (United States)

    Ananthakrishnan, R.; Foster, I.; Wagner, R.

    2016-12-01

    Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.

  9. Social and psychological creativity in gay male midlife identity management.

    Science.gov (United States)

    Hajek, Christopher

    2016-06-01

    This study utilizes a qualitative thematic analysis methodology and a social identity theory framework to explore ways in which early midlife gay men report enhancing their social identities through social and psychological creativity. Face-to-face, semi-structured interviews were conducted with forty early midlife gay men (aged 40-53) in four US cities. Men discussed the collective and individual essences of their age and gay identities, including attitudes, beliefs, and behaviours that they embraced to self-enhance at midlife. These discussions emphasized differences from the younger gay outgroup, often in the context of intergenerational interaction. Identified were three strategies (and seven substrategies) that summarized the ways that interviewees constructed their identities in the interest of self-enhancement, specifically in the context of intergenerational comparisons with younger gay men. These strategies may be considered as extensions to social creativity strategies presented in Tajfel and Turner's (Psychology of intergroup relations. Chicago, IL: Nelson, 1986: 7) social identity theory. © 2015 The British Psychological Society.

  10. System reliability prediction using data from non-identical environments

    International Nuclear Information System (INIS)

    Bergman, B.; Ringi, M.

    1997-01-01

    Since information changes one's mind and probability assessments reflect one's degree of beliefs, a reliability prediction model should enclose all relevant information. Almost always ignored in existing reliability models is the dependence on component life lengths, induced by a common but unknown environment. Furthermore, existing models seldom permit learning from components' performance in similar systems, under the knowledge of non-identical operating environments. In an earlier paper by the present authors the first type of aspects were taken into account and in this paper that model is generalised so that failure data generated from several similar systems in non-identical environments may be used for the prediction of any similar system in its specific environment

  11. The role of the collaboratory in enabling large-scale identity management for HEP

    International Nuclear Information System (INIS)

    Cowles, Robert; Jackson, Craig; Welch, Von

    2014-01-01

    The authors are defining a model that describes and guides existing and future scientific collaboratory identity management implementations. Our ultimate goal is to provide guidance to virtual organizations and resource providers in designing an identity management implementation. Our model is captured in previously published work. Here, we substantially extend our analysis in terms of six motivation factors (user isolation, persistence of user data, complexity of virtual organization roles, cultural and historical inertia, scaling, and incentive for collaboration), observed in interviews with community members involved in identity management, that impact implementation decisions. This analysis is a significant step towards our ultimate goal of providing guidance to virtual organizations.

  12. The Effects of Virtual Communities on Group Identity in Classroom Management

    Science.gov (United States)

    Ho, Tu-Kuang; Lin, Yu-Tzeng

    2016-01-01

    Group identity is a critical component in developing effective classroom management. While there have been numerous studies on group identity, they have primarily focused on its effects on the physical classroom entity. Advances in information technology, however, have enabled the creation of virtual communities, which have become a vital channel…

  13. Managing Digital Identity on Twitter: The Case of School Administrators

    Science.gov (United States)

    Cho, Vincent; Jimerson, Jo Beth

    2017-01-01

    What does it mean to be and to act like a school leader online? Although many school leaders might be comfortable navigating issues of identity in face-to-face environments, online environments may present new and unprecedented challenges. These challenges may range from concerns about privacy and surveillance to questions about how best to…

  14. Forest management in a Pukhtun community : the Constructions of Identities

    NARCIS (Netherlands)

    Southwold-Llewellyn, S.

    2006-01-01

    Description: How do we recognize and understand the interactions between nature, nationness, and nationalism? How is nature appropriated by politics when asserting identity, interests, and rights? Drawing from South Asia¿s varying regions, the essays in this pathbreaking volume answer such

  15. Credit Management System

    Data.gov (United States)

    US Agency for International Development — Credit Management System. Outsourced Internet-based application. CMS stores and processes data related to USAID credit programs. The system provides information...

  16. Synchronization of chaos in non-identical parametrically excited systems

    International Nuclear Information System (INIS)

    Idowu, B.A.; Vincent, U.E.; Njah, A.N.

    2009-01-01

    In this paper, we investigate the synchronization of chaotic systems consisting of non-identical parametrically excited oscillators. The active control technique is employed to design control functions based on Lyapunov stability theory and Routh-Hurwitz criteria so as to achieve global chaos synchronization between a parametrically excited gyroscope and each of the parametrically excited pendulum and Duffing oscillator. Numerical simulations are implemented to verify the results.

  17. Report: Improvements Needed in CSB’s Identity and Access Management and Incident Response Security Functions

    Science.gov (United States)

    Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.

  18. Securing the Global Airspace System Via Identity-Based Security

    Science.gov (United States)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  19. Dynamics of nonholonomic systems from variational principles embedded variation identity

    International Nuclear Information System (INIS)

    Guo Yongxin; Liu Shixing; Liu Chang; Chang Peng

    2009-01-01

    Nondeterminacy of dynamics, i.e., the nonholonomic or the vakonomic, fundamental variational principles, e.g., the Lagrange-d'Alembert or Hamiltonian, and variational operators, etc., of nonholonomic mechanical systems can be attributed to the non-uniqueness of ways how to realize nonholonomic constraints. Making use of a variation identity of nonholonomic constraints embedded into the Hamilton's principle with the method of Lagrange undetermined multipliers, three kinds of dynamics for the nonholonomic systems including the vakonomic and nonholonomic ones and a new one are obtained if the variation is respectively reduced to three conditional variations: vakonomic variation, Hoelder's variation and Suslov's variation, defined by the identity. Therefore, different dynamics of nonholonomic systems can be derived from an integral variational principle, utilizing one way of embedding constraints into the principle, with different variations. It is verified that the similar embedding of the identity into the Lagrange-d'Alembert principle gives rise to the nonholonomic dynamics but fails to give the vakonomic one unless the constraints are integrable.

  20. Dynamics of nonholonomic systems from variational principles embedded variation identity

    Energy Technology Data Exchange (ETDEWEB)

    Guo Yongxin, E-mail: yxguo@lnu.edu.c [College of Physics, Liaoning University, Shenyang 110036 (China); Liu Shixing [College of Physics, Liaoning University, Shenyang 110036 (China); Liu Chang; Chang Peng [Department of Applied Mechanics, Beijing Institute of Technology, Beijing 100081 (China)

    2009-10-19

    Nondeterminacy of dynamics, i.e., the nonholonomic or the vakonomic, fundamental variational principles, e.g., the Lagrange-d'Alembert or Hamiltonian, and variational operators, etc., of nonholonomic mechanical systems can be attributed to the non-uniqueness of ways how to realize nonholonomic constraints. Making use of a variation identity of nonholonomic constraints embedded into the Hamilton's principle with the method of Lagrange undetermined multipliers, three kinds of dynamics for the nonholonomic systems including the vakonomic and nonholonomic ones and a new one are obtained if the variation is respectively reduced to three conditional variations: vakonomic variation, Hoelder's variation and Suslov's variation, defined by the identity. Therefore, different dynamics of nonholonomic systems can be derived from an integral variational principle, utilizing one way of embedding constraints into the principle, with different variations. It is verified that the similar embedding of the identity into the Lagrange-d'Alembert principle gives rise to the nonholonomic dynamics but fails to give the vakonomic one unless the constraints are integrable.

  1. Covering your face on Facebook.Managing identity through untagging and deletion

    OpenAIRE

    Strano, Michele; Wattei, Jill

    2010-01-01

    This paper describes the ways in which Facebook users manage their online identities through untagging and deleting photos to make sure images are interpreted in a desirable way. Using data collected from an online survey and thirty in-depth interviews with American adult Facebook users, the authors argue that identity management can best be understood as the combination of constructive and destructive practices through which users control not only their self-presentation (p...

  2. Systems Engineering Management Plan

    International Nuclear Information System (INIS)

    1994-01-01

    The purpose of this Monitored Retrievable Storage (MRS) Project Systems Engineering Management Plan (SEMP) is to define and establish the MRS Project Systems Engineering process that implements the approved policy and requirements of the Office of Civilian Radioactive Waste Management (OCRWM) for the US Department of Energy (DOE). This plan is Volume 5 of the MRS Project Management Plan (PMP). This plan provides the framework for implementation of systems engineering on the MRS Project consistent with DOE Order 4700.1, the OCRWM Program Management System Manual (PMSM), and the OCRWM Systems Engineering Management Plan (SEMP)

  3. Maintenance and management system

    International Nuclear Information System (INIS)

    Ando, Yasumasa.

    1992-01-01

    Since highly reliable operation is required in a nuclear power plant, monitoring during operation and periodical inspection are conducted carefully. The present invention provides maintenance and management systems for providing an aid so that these systems are combined effectively and operated rationally based on unified information management. That is, the system contains data bases comprising information for the design of the equipments and pipelines of a plant, information for the exchange of equipment parts, information for the history of plant operation, information for the monitoring and inspection, and information for the management of repair operation. In addition, it has an equipment part history management sub-system for managing equipment part exchange information, an operation history management sub-system for managing the operation state of the plant, an operation history management sub-system for managing equipment monitoring inspection data and operation management sub-system for managing periodical inspection/ repairing operation. These sub-systems are collectively combined to manage the maintenance and management jobs of the plant unitarily. (I.S.)

  4. Identity Management and Mental Health Discourse in Social Media.

    Science.gov (United States)

    Pavalanathan, Umashanthi; De Choudhury, Munmun

    2015-05-01

    Social media is increasingly being adopted in health discourse. We examine the role played by identity in supporting discourse on socially stigmatized conditions. Specifically, we focus on mental health communities on reddit. We investigate the characteristics of mental health discourse manifested through reddit's characteristic 'throwaway' accounts, which are used as proxies of anonymity. For the purpose, we propose affective, cognitive, social, and linguistic style measures, drawing from literature in psychology. We observe that mental health discourse from throwaways is considerably disinhibiting and exhibits increased negativity, cognitive bias and self-attentional focus, and lowered self-esteem. Throwaways also seem to be six times more prevalent as an identity choice on mental health forums, compared to other reddit communities. We discuss the implications of our work in guiding mental health interventions, and in the design of online communities that can better cater to the needs of vulnerable populations. We conclude with thoughts on the role of identity manifestation on social media in behavioral therapy.

  5. Examining Technology, Structure and Identity During an Enterprise System Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Rosio

    2008-11-12

    This paper presents a longitudinal study of an Enterprise System (ES) implementation by critically examining the discursive context in which an ES implementation unfolds. The findings show that users strongly supported the ES in the earlier stage of implementation when the technology was an imaginary phenomenon. However, in later stages, when the technology is in use, user support was not consistent. In this phase the ES produces loss of control and an inability to function as an arbiter of fairness (in allocating resources associated with the system) thereby directly challenging existing professional identities and roles. These outcomes, in turn, generate acts of resistance on the part of workers. Users reach inside the technology and reshape it by devising creative workarounds that produce a sense of reskilling to counter the deskilling produced by the loss of control and power. The analysis also shows that an ES is a complex social phenomenon that is intricately linked to and complicit in shaping organizational structure and identity. In particular this study shows how technology, structure, and identity are in a mutually constitutive relationship.

  6. Maintenance management systems

    International Nuclear Information System (INIS)

    Rohan, M. de

    1989-01-01

    This paper is concerned principally with Maintenance Management systems and their effective introduction into organisations. Maintenance improvement is basically a problem of managing the maintenance department in the broadest sense. Improvement does not only lie in the area of special techniques, systems or procedures; although they are valuable tools, but rather in a balanced attack, carefully guided by management. Over recent years, maintenance systems have received the major emphasis and in many instances the selection of the system has become a pre-occupation, whereas the importance of each maintenance function must be recognised and good management practices applied to all maintenance activities. The ingredients for success in the implementation of maintenance management systems are summarised as: having a management committee, clear objectives, project approach using project management techniques and an enthusiastic leader, user managed and data processing supported project, realistic budget and an understanding of the financial audit requirements. (author)

  7. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  8. "Managing by Not Managing": How Gay Engineering Students Manage Sexual Orientation Identity

    Science.gov (United States)

    Hughes, Bryce E.

    2017-01-01

    From a social constructivist paradigm I explored the experiences of 7 openly gay engineering students to understand how, if at all, they made sense of the intersections between their engineering and sexual orientation identities. By eliciting stories through individual and focus group interviews, a narrative approach allowed me to capture the…

  9. Business advertisements management system

    OpenAIRE

    Rekel, Ernest

    2017-01-01

    Business Advertisements Management System The main goal of the project was to create a business advertisements management system, where users could easily create and find business advertisements. To accomplish this goal exist- ing systems were analyzed as well as their limitations. The end result is a working system which is able to store and proccess huge amount of data.

  10. Integrated management systems

    CERN Document Server

    Bugdol, Marek

    2015-01-01

    Examining the challenges of integrated management, this book explores the importance and potential benefits of using an integrated approach as a cross-functional concept of management. It covers not only standardized management systems (e.g. International Organization for Standardization), but also models of self-assessment, as well as different types of integration. Furthermore, it demonstrates how processes and systems can be integrated, and how management efficiency can be increased. The major part of this book focuses on management concepts which use integration as a key tool of management processes (e.g. the systematic approach, supply chain management, virtual and network organizations, processes management and total quality management). Case studies, illustrations, and tables are also provided to exemplify and illuminate the content, as well as examples of successful and failed integrations. Providing a particularly useful resource to managers and specialists involved in the improvement of organization...

  11. Audit Information Management System

    Data.gov (United States)

    US Agency for International Development — USAID/OIG has initiated its new Audit Information Management System (AIMS) to track OIG's audit recommendations and USAID's management decisions. OIG's in-house...

  12. Managing hybrid marketing systems.

    Science.gov (United States)

    Moriarty, R T; Moran, U

    1990-01-01

    As competition increases and costs become critical, companies that once went to market only one way are adding new channels and using new methods - creating hybrid marketing systems. These hybrid marketing systems hold the promise of greater coverage and reduced costs. But they are also hard to manage; they inevitably raise questions of conflict and control: conflict because marketing units compete for customers; control because new indirect channels are less subject to management authority. Hard as they are to manage, however, hybrid marketing systems promise to become the dominant design, replacing the "purebred" channel strategy in all kinds of businesses. The trick to managing the hybrid is to analyze tasks and channels within and across a marketing system. A map - the hybrid grid - can help managers make sense of their hybrid system. What the chart reveals is that channels are not the basic building blocks of a marketing system; marketing tasks are. The hybrid grid forces managers to consider various combinations of channels and tasks that will optimize both cost and coverage. Managing conflict is also an important element of a successful hybrid system. Managers should first acknowledge the inevitability of conflict. Then they should move to bound it by creating guidelines that spell out which customers to serve through which methods. Finally, a marketing and sales productivity (MSP) system, consisting of a central marketing database, can act as the central nervous system of a hybrid marketing system, helping managers create customized channels and service for specific customer segments.

  13. VET Manager Identities: Culture, Philosophy and Professional Practice

    Science.gov (United States)

    Foley, Annette

    2011-01-01

    Using a post-structural approach this article investigates the working lives of frontline managers in VET and how they negotiate change in their day to day practices and decision making. The article is organised around accounts made by managers from different types of Vocational Education and Training (VET) organisations, namely: Technical and…

  14. Positive identity entry control system with geographically distributed portals and enrollment stations

    International Nuclear Information System (INIS)

    McIntire, J.M.

    1985-01-01

    A positive identity entry control system using distributed processing to allow reliable geographically separated portals and enrollment stations has been installed and is fully operational at a large area DOE site. Identity verification requires a credential, a memorized number and measurement of a physical characteristic of the user. Additionally, all portal activity is monitored by guards. The portal system is dual redundant such that no single point failure will shut down operations. Each portal site maintains its own subset of the master data base so off-site failure of the central data base manager or its communication links will not significantly affect local portal activity. The system is suitable for installations with large populations requiring access control at several remote sites scattered over a large area

  15. Management Information Systems Research.

    Science.gov (United States)

    Research on management information systems is illusive in many respects. Part of the basic research problem in MIS stems from the absence of standard...decision making. But the transition from these results to the realization of ’satisfactory’ management information systems remains difficult indeed. The...paper discusses several aspects of research on management information systems and reviews a selection of efforts that appear significant for future progress. (Author)

  16. System identication of a linearized hysteretic system using covariance driven stochastic subspace identication

    DEFF Research Database (Denmark)

    Bajric, Anela

    A single mass Bouc-Wen oscillator with linear static restoring force contribution is approximated by an equivalent linear system. The aim of the linearized model is to emulate the correct force-displacement response of the Bouc-Wenmodel with characteristic hysteretic behaviour. The linearized mod...

  17. British-Pakistani women's perspectives of diabetes self-management: the role of identity.

    Science.gov (United States)

    Majeed-Ariss, Rabiya; Jackson, Cath; Knapp, Peter; Cheater, Francine M

    2015-09-01

    To explore the effects of type 2 diabetes on British-Pakistani women's identity and its relationship with self-management. Type 2 diabetes is more prevalent and has worse outcomes among some ethnic minority groups. This may be due to poorer self-management and an inadequate match of health services to patient needs. The influence that type 2 diabetes has on British-Pakistani women's identity and subsequent self-management has received limited attention. An explorative qualitative study. Face-to-face semi-structured English and Urdu language interviews were conducted with a purposively selected heterogeneous sample of 15 British-Pakistani women with type 2 diabetes. Transcripts were analysed thematically. Four themes emerged: Perceived change in self emphasised how British-Pakistani women underwent a conscious adaptation of identity following diagnosis; Familiarity with ill health reflected women's adjustment to their changed identity over time; Diagnosis improves social support enabled women to accept changes within themselves and Supporting family is a barrier to self-management demonstrated how family roles were an aspect of women's identities that was resilient to change. The over-arching theme Role re-alignment enables successful self-management encapsulated how self-management was a continuous process where achievements needed to be sustained. Inter-generational differences were also noted: first generation women talked about challenges associated with ageing and co-morbidities; second generation women talked about familial and work roles competing with self-management. The complex nature of British-Pakistani women's self-identification requires consideration when planning and delivering healthcare. Culturally competent practice should recognise how generational status influences self-identity and diabetes self-management in ethnically diverse women. Health professionals should remain mindful of effective self-management occurring alongside, and being

  18. Using a generalised identity reference model with archetypes to support interoperability of demographics information in electronic health record systems.

    Science.gov (United States)

    Xu Chen; Berry, Damon; Stephens, Gaye

    2015-01-01

    Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.

  19. Facility Environmental Management System

    Data.gov (United States)

    Federal Laboratory Consortium — This is the Web site of the Federal Highway Administration's (FHWA's) Turner-Fairbank Highway Research Center (TFHRC) facility Environmental Management System (EMS)....

  20. NASA's Risk Management System

    Science.gov (United States)

    Perera, Jeevan S.

    2011-01-01

    Leadership is key to success. Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks -- risk office personnel. Each group is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk reporting and communication is an essential element of risk management and will combine both qualitative and quantitative elements. Risk informed decision making should be introduced to all levels of management. Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  1. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.

    Science.gov (United States)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  2. Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management

    Energy Technology Data Exchange (ETDEWEB)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  3. Learning Content Management Systems

    Directory of Open Access Journals (Sweden)

    Tache JURUBESCU

    2008-01-01

    Full Text Available The paper explains the evolution of e-Learning and related concepts and tools and its connection with other concepts such as Knowledge Management, Human Resources Management, Enterprise Resource Planning, and Information Technology. The paper also distinguished Learning Content Management Systems from Learning Management Systems and Content Management Systems used for general web-based content. The newest Learning Content Management System, very expensive and yet very little implemented is one of the best tools that helps us to cope with the realities of the 21st Century in what learning concerns. The debates over how beneficial one or another system is for an organization, can be driven by costs involved, efficiency envisaged, and availability of the product on the market.

  4. Spoiled Group Identities and Backstage Work: A Theory of Stigma Management Rehearsals

    Science.gov (United States)

    O'Brien, John

    2011-01-01

    How do persons with a stigmatized identity learn potential responses to discrimination and harassment? Drawing on three and a half years of ethnographic data, this paper demonstrates how members of a group of Muslim American youth are socialized in locally dominant stigma management strategies through stigma management rehearsals. Stigma…

  5. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    Science.gov (United States)

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  6. NASA's Risk Management System

    Science.gov (United States)

    Perera, Jeevan S.

    2013-01-01

    Phased-approach for implementation of risk management is necessary. Risk management system will be simple, accessible and promote communication of information to all relevant stakeholders for optimal resource allocation and risk mitigation. Risk management should be used by all team members to manage risks - not just risk office personnel. Each group/department is assigned Risk Integrators who are facilitators for effective risk management. Risks will be managed at the lowest-level feasible, elevate only those risks that require coordination or management from above. Risk informed decision making should be introduced to all levels of management. ? Provide necessary checks and balances to insure that risks are caught/identified and dealt with in a timely manner. Many supporting tools, processes & training must be deployed for effective risk management implementation. Process improvement must be included in the risk processes.

  7. Lithium battery management system

    Science.gov (United States)

    Dougherty, Thomas J [Waukesha, WI

    2012-05-08

    Provided is a system for managing a lithium battery system having a plurality of cells. The battery system comprises a variable-resistance element electrically connected to a cell and located proximate a portion of the cell; and a device for determining, utilizing the variable-resistance element, whether the temperature of the cell has exceeded a predetermined threshold. A method of managing the temperature of a lithium battery system is also included.

  8. Archival Information Management System.

    Science.gov (United States)

    1995-02-01

    management system named Archival Information Management System (AIMS), designed to meet the audit trail requirement for studies completed under the...are to be archived to the extent that future reproducibility and interrogation of results will exist. This report presents a prototype information

  9. Medical Information Management System

    Science.gov (United States)

    Alterescu, S.; Hipkins, K. R.; Friedman, C. A.

    1979-01-01

    On-line interactive information processing system easily and rapidly handles all aspects of data management related to patient care. General purpose system is flexible enough to be applied to other data management situations found in areas such as occupational safety data, judicial information, or personnel records.

  10. What Has Happened to Arabs? Identity and Face Management Online

    Science.gov (United States)

    Al Zidjaly, Najma

    2012-01-01

    In this article, I draw on contemporary theorizing on the concept of face (e.g., Ting-Toomey 1994, 2004; Tracy 2008) and research on Islamic and Arabic cultures and linguistic strategies (e.g., Beeman 1986; Hegland 1998; Wilce 2005; Al Zidjaly 2006) to explore the role that the Internet plays in enabling Muslim Arabs to manage or save their…

  11. PALESTINE AUTOMOTIVE LICENSE IDENTITY RECOGNITION FOR INTELLIGENT PARKING SYSTEM

    Directory of Open Access Journals (Sweden)

    ANEES ABU SNEINEH

    2017-05-01

    Full Text Available Providing employees with protection and security is one of the key concerns of any organization. This goal can be implemented mainly by managing and protecting employees’ cars in the parking area. Therefore, a parking area must be managed and organized with smart technologies and tools that can be applied and integrated in an intelligent parking system. This paper presents the tools based on image recognition technology that can be used to effectively control various parts of a parking system. An intelligent automotive parking system is effectively implemented by integrating image processing technologies and an Arduino controller. Results show that intelligent parking is successfully implemented based on car ID image capture to meet the need for managing and organizing car parking systems.

  12. XCPU2 process management system

    Energy Technology Data Exchange (ETDEWEB)

    Ionkov, Latchesar [Los Alamos National Laboratory; Van Hensbergen, Eric [IBM AUSTIN RESEARCH LAB

    2009-01-01

    Xcpu2 is a new process management system that allows the users to specify custom file system for a running job. Most cluster management systems enforce single software distribution running on all nodes. Xcpu2 allows programs running on the cluster to work in environment identical to the user's desktop, using the same versions of the libraries and tools the user installed locally, and accessing the configuration file in the same places they are located on the desktop. Xcpu2 builds on our earlier work with the Xcpu system. Like Xcpu, Xcpu2's process management interface is represented as a set of files exported by a 9P file server. It supports heterogeneous clusters and multiple head nodes. Unlike Xcpu, it uses pull instead of push model. In this paper we describe the Xcpu2 clustering model, its operation and how the per-job filesystem configuration can be used to solve some of the common problems when running a cluster.

  13. Camouflaged Collectives: Managing Stigma and Identity at Gun Events

    Directory of Open Access Journals (Sweden)

    Sarah Jane Blithe

    2017-02-01

    Full Text Available Gun violence persists in the United States, claiming lives and escalating healthcare costs. This article seeks to contribute to social justice work on the “gun problem” by studying gun collectives. To understand gun culture and to identify gun violence reduction strategies, we study places where gun owners organize – legal (and sometimes illegal settings that facilitate dialogue about gun issues. Based on participant observation and collaborative event ethnography at gun shows and a private shooting party, this analysis presents findings about the practices gun collective members use to manage stigma. We conclude that when participants in gun events attempt to subvert core stigma through everyday stigma management practices, they effectively facilitate the unfettered exchange of potentially dangerous goods, promote the invisibility of oppressive structures, and normalize violence.

  14. Operations management system

    Science.gov (United States)

    Brandli, A. E.; Eckelkamp, R. E.; Kelly, C. M.; Mccandless, W.; Rue, D. L.

    1990-01-01

    The objective of an operations management system is to provide an orderly and efficient method to operate and maintain aerospace vehicles. Concepts are described for an operations management system and the key technologies are highlighted which will be required if this capability is brought to fruition. Without this automation and decision aiding capability, the growing complexity of avionics will result in an unmanageable workload for the operator, ultimately threatening mission success or survivability of the aircraft or space system. The key technologies include expert system application to operational tasks such as replanning, equipment diagnostics and checkout, global system management, and advanced man machine interfaces. The economical development of operations management systems, which are largely software, will require advancements in other technological areas such as software engineering and computer hardware.

  15. PALESTINE AUTOMOTIVE LICENSE IDENTITY RECOGNITION FOR INTELLIGENT PARKING SYSTEM

    OpenAIRE

    ANEES ABU SNEINEH; WAEL A. SALAH

    2017-01-01

    Providing employees with protection and security is one of the key concerns of any organization. This goal can be implemented mainly by managing and protecting employees’ cars in the parking area. Therefore, a parking area must be managed and organized with smart technologies and tools that can be applied and integrated in an intelligent parking system. This paper presents the tools based on image recognition technology that can be used to effectively control various parts of a parking sys...

  16. Parametric Ward-Takahashi identity in disordered systems and the integral identity associated with the Calogero-Sutherland model

    International Nuclear Information System (INIS)

    Taniguchi, N.

    1997-01-01

    By utilizing the symmetric property known as the Ward-Takahashi identity in disordered systems, we explore the novel symmetry relations which hold in one-dimensional systems with inverse square interaction (the Calogero-Sutherland model). The identities emerge totally from the algebraic structure of the model. They show that the dynamical correlators are connected with one another, involving the higher-order integrals of motion. We obtain the result for the coupling strengths λ=1/2, 1, and 2, and conjecture that a similar relation may hold for arbitrary rational λ. copyright 1997 The American Physical Society

  17. Identity management and privacy languages technologies: Improving user control of data privacy

    Science.gov (United States)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  18. Program Management System manual

    International Nuclear Information System (INIS)

    1986-01-01

    The Program Management System (PMS), as detailed in this manual, consists of all the plans, policies, procedure, systems, and processes that, taken together, serve as a mechanism for managing the various subprograms and program elements in a cohesive, cost-effective manner. The PMS is consistent with the requirements of the Nuclear Waste Policy Act of 1982 and the ''Mission Plan for the Civilian Radioactive Waste Management Program'' (DOE/RW-0005). It is based on, but goes beyond, the Department of Energy (DOE) management policies and procedures applicable to all DOE programs by adapting these directives to the specific needs of the Civilian Radioactive Waste Management program. This PMS Manual describes the hierarchy of plans required to develop and maintain the cost, schedule, and technical baselines at the various organizational levels of the Civilian Radioactive Waste Management Program. It also establishes the management policies and procedures used in the implementation of the Program. These include requirements for internal reports, data, and other information; systems engineering management; regulatory compliance; safety; quality assurance; and institutional affairs. Although expanded versions of many of these plans, policies, and procedures are found in separate documents, they are an integral part of this manual. The PMS provides the basis for the effective management that is needed to ensure that the Civilian Radioactive Waste Management Program fulfills the mandate of the Nuclear Waste Policy Act of 1982. 5 figs., 2 tabs

  19. Management information systems

    Energy Technology Data Exchange (ETDEWEB)

    Crump, K.

    1978-01-01

    An Australian university architect studying management information systems programs at academic institutions in the United States visited 26 universities and colleges and nine educational and professional associations, including extended visits at the University of Wisconsin and the National Center of Higher Education Management Systems. During these visits, he investigated university and college space utilization programs, gained operational and developmental experience at institutions with education philosophies similar to those in Australia, and examined trends in low cost student housing. This report of his observations focusses on management information systems projects throughout the academic community, resource accountability, energy conservation, facilities planning for the handicapped, student housing, and interdisciplinary approaches to education.

  20. Adaptation of the Utrecht-Management of Identity Commitments Scale (U-MICS) to the measurement of the parental identity domain.

    Science.gov (United States)

    Piotrowski, Konrad

    2018-04-01

    The present studies examined the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS) adapted to the measurement of identity formation in the parental identity domain. As the parental identity domain has only been studied within the neo-Eriksonian approach to a very limited extent, the aim of these studies was to prepare a short, valid and reliable tool for the measurement of parental identity in order to fill this gap. The associations of commitment, in-depth exploration and reconsideration of commitment in the parental domain with well-being and with other identity constructs were analyzed. The results showed that parental identity formation is associated with mothers' satisfaction with life and trait anxiety and with identity formation in other areas as well. The initial results suggest that the adapted version of the U-MICS is a valid and reliable measure that can be used in future studies on parental identity formation. © 2017 The Author. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  1. Portfolio Management System

    Data.gov (United States)

    US Agency for International Development — PfMS is an implementation of WorkLenz. WorkLenz is USAID's portfolio management system tool. It is a commercially available, off-the-shelf (COTS) package that...

  2. Environmental Management Systems

    Science.gov (United States)

    This site on Environmental Management Systems (EMS) provides information and resources related to EMS for small businesses and private industry, as well as local, state and federal agencies, including all the EPA offices and laboratories.

  3. Holdings Management System

    Data.gov (United States)

    National Archives and Records Administration — This system supports the physical management of permanent, hard-copy archival Records in the custody of National Archives and Records Administration program offices.

  4. Correspondence Management System

    Data.gov (United States)

    U.S. Environmental Protection Agency — CMS is EPA's correspondence tracking and workflow management system. It scans, logs, routes, tracks, and stores incoming and outgoing correspondence in all Program...

  5. Earned Value Management System

    Data.gov (United States)

    US Agency for International Development — EVMS is a system for measuring project performance and progress in an objective manner by supporting earned value management. EVMS has the ability to combine...

  6. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Verho, P.; Jaerventausta, P.; Kaerenlampi, M.; Paulasaari, H. [Tampere Univ. of Technology (Finland); Partanen, J. [Lappeenranta Univ. of Technology (Finland)

    1996-12-31

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion of the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the vendors of the other systems. In the research project this alternative is preferred and used in developing an independent distribution management system

  7. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Verho, P; Jaerventausta, P; Kaerenlampi, M; Paulasaari, H [Tampere Univ. of Technology (Finland); Partanen, J [Lappeenranta Univ. of Technology (Finland)

    1997-12-31

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion of the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the vendors of the other systems. In the research project this alternative is preferred and used in developing an independent distribution management system

  8. Rewriting Dominant Narratives of the Academy: Women Faculty of Color and Identity Management

    Science.gov (United States)

    Motha, Suhanthie; Varghese, Manka M.

    2018-01-01

    Drawing on Delgado and Yosso's "counterstory," Yosso's "community cultural wealth," and Alsup's "borderland discourses," the authors, who are women of color academics, use narratives from their lives to discuss the ways in which they draw on resources in managing and reconfiguring their multiple identities within the…

  9. Leadership, New Public Management and the Re-Modelling and Regulation of Teacher Identities

    Science.gov (United States)

    Hall, David; Gunter, Helen; Bragg, Joanna

    2013-01-01

    This article examines the rapidly shifting relationship between teachers and the state and efforts to re-model teacher identities within the wider context of public sector modernization and the New Public Management. The construction and development of officially authorized and normative discursive practices relating to leadership and the…

  10. Getting the Most of Management Training - the Role of Identical Elements for Training Transfer

    NARCIS (Netherlands)

    prof. dr. Karen van Dam; drs. Martijn van der Locht; dr. Dan Chiaburu

    2013-01-01

    Purpose - Focusing on management training, this study aimed to establish whether identical elements in a training program (i.e. aspects resembling participants' work situation) can improve training transfer and whether they do so beyond the contribution of two well-established predictors --

  11. When Social Identities Collide: Commentary on "Gender in the Management Education Classroom"

    Science.gov (United States)

    Patton, Eric

    2010-01-01

    This commentary to "Gender in the Management Education Classroom" (Bilimoria, O'Neil, Hopkins, & Murphy, 2010) employs social identity and self-categorization theory to analyze the incident described in the article. In any MBA classroom, students are dealing with multiple group memberships. Similar to workplace settings, when the focus is on…

  12. Systems engineering management plan

    International Nuclear Information System (INIS)

    Conner, C.W.

    1985-10-01

    The purpose of this Systems Engineering Management Plan (SEMP) is to prescribe the systems engineering procedures to be implemented at the Program level and the minimum requirements for systems engineering at the Program-element level. The Program level corresponds to the Director, OCRWM, or to the organizations within OCRWM to which the Director delegates responsibility for the development of the System and for coordinating and integrating the activities at the Program-element level. The Office of Policy and Outreach (OPO) and the Office of Resource Management (ORM) support the Director at the Program level. The Program-element level corresponds to the organizations within OCRWM (i.e., the Office of Geologic Repositories (OGR) and the Office of Storage and Transportation Systems (OSTS)) with overall responsibility for developing the System elements - that is, the mined geologic disposal system (MGDS), monitored retrievable storage (MRS) (if approved by Congress), and the transportation system

  13. Towards Scalability for Federated Identity Systems for Cloud-Based Environments

    Directory of Open Access Journals (Sweden)

    André Albino Pereira

    2015-12-01

    Full Text Available As multi-tenant authorization and federated identity management systems for cloud computing matures, the provisioning of services using this paradigm allows maximum efficiency on business that requires access control. However, regarding scalability support, mainly horizontal, some characteristics of those approaches based on central authentication protocols are problematic. The objective of this work is to address these issues by providing an adapted sticky-session mechanism for a Shibboleth architecture using JASIG CAS. This alternative, compared with the recommended distributed memory approach, shown improved efficiency and less overall infrastructure complexity, as well as demanding less 58% of computational resources and improving throughput (requests per second by 11%.

  14. Audit Management System

    CERN Document Server

    Alconada, Federico

    2015-01-01

    In the need of renewing their system, the Internal Audit department has given a proposal for building a new one. Taking into consideration the problems of their system they elaborated a requirement's list with the functionalities and features they were expecting from the new management system. This new system would be primarily for the use of the Internal Audit staff but it would also support the follow-up of internal audit recommendations by potentially all CERN staff members.

  15. Intergroup conflict management strategies as related to perceptions of dual identity and separate groups.

    Science.gov (United States)

    Bizman, Aharon; Yinon, Yoel

    2004-04-01

    The authors examined the relations between (a) the perceptions of dual identity and separate groups and (b) intergroup conflict management strategies, in two contexts: the conflict between the secular and religious sectors in Israel and the allocation of resources among organizational subunits. In both contexts, contention (i.e., forcing one's will on the other party) was associated with the perception of separate groups. Only in the organizational context, avoidance (i.e., doing nothing or discontinuing participation in the conflict) was associated with the perception of dual identity. Problem solving (i.e., finding a solution that is acceptable to both parties) was related to the perception of dual identity in the secular-religious context. In the organizational context, this relation appeared only under a low perception of separate groups. Yielding (i.e., satisfying the other party's needs at the expense of one's own) was related to the perception of dual identity in the organizational context. In the secular-religious context, this relation appeared only under a high perception of separate groups. The authors discussed the varying pattern of the associations between (a) the perceptions of dual identity and separate groups and (b) the conflict management strategies in the two contexts in terms of the Dual Concern Model and the perceived feasibility of the strategies.

  16. Academic Manager or Managed Academic? Academic Identity Schisms in Higher Education

    Science.gov (United States)

    Winter, Richard

    2009-01-01

    The relationship between values and academic identity has received scant attention in the higher education literature with some notable exceptions (Churchman, 2006; Harley, 2002; Henkel, 2005). This paper contends that the perceived need to align all academics around corporate values and goals has given rise to academic identity schisms in higher…

  17. Electrical distribution system management

    International Nuclear Information System (INIS)

    Hajos, L.; Mortarulo, M.; Chang, K.; Sparks, T.

    1990-01-01

    This paper reports that maintenance of electrical system data is essential to the operation, maintenance, and modification of a nuclear station. Load and equipment changes affect equipment sizing, available short-circuit currents and protection coordination. System parameters must be maintained in a controlled manner to enable evaluation of proposed modifications and provide adequate verification and traceability. For this purpose, Public Service Electric and Gas Company has implemented a Verified and Validated Electric Distribution System Management (EDSM) program at the Hope Creek and Salem Nuclear Power Stations. EDSM program integrates computerized configuration management of electrical systems with calculational software the Technical Standard procedures. The software platform is PC-based. The Database Manager and Calculational programs have been linked together through a user friendly menu system. The database management nodule enable s assembly and maintenance of databases for individual loads, buses, and branches within the electrical systems with system access and approval controlled through electronic security incorporated within the database manger. Reports drawn from the database serve as the as-built and/or as-designed record of the system configurations. This module also creates input data files of network parameters in a format readable by the calculational modules. Calculations modules provide load flow, voltage drop, motor starting, and short-circuit analyses, as well as dynamic analyses of bus transfers

  18. Sewer System Management Plan.

    Energy Technology Data Exchange (ETDEWEB)

    Holland, Robert C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    A Sewer System Management Plan (SSMP) is required by the State Water Resources Control Board (SWRCB) Order No. 2006-0003-DWQ Statewide General Waste Discharge Requirements (WDR) for Sanitary Sewer Systems (General Permit). DOE, National Nuclear Security Administration (NNSA), Sandia Field Office has filed a Notice of Intent to be covered under this General Permit. The General Permit requires a proactive approach to reduce the number and frequency of sanitary sewer overflows (SSOs) within the State. SSMPs must include provisions to provide proper and efficient management, operation, and maintenance of sanitary sewer systems and must contain a spill response plan.

  19. Program management system manual

    International Nuclear Information System (INIS)

    1989-08-01

    OCRWM has developed a program management system (PMS) to assist in organizing, planning, directing and controlling the Civilian Radioactive Waste Management Program. A well defined management system is necessary because: (1) the Program is a complex technical undertaking with a large number of participants, (2) the disposal and storage facilities to be developed by the Program must be licensed by the Nuclear Regulatory Commission (NRC) and hence are subject to rigorous quality assurance (QA) requirements, (3) the legislation mandating the Program creates a dichotomy between demanding schedules of performance and a requirement for close and continuous consultation and cooperation with external entities, (4) the various elements of the Program must be managed as parts of an integrated waste management system, (5) the Program has an estimated total system life cycle cost of over $30 billion, and (6) the Program has a unique fiduciary responsibility to the owners and generators of the nuclear waste for controlling costs and minimizing the user fees paid into the Nuclear Waste Fund. This PMS Manual is designed and structured to facilitate strong, effective Program management by providing policies and requirements for organizing, planning, directing and controlling the major Program functions

  20. A distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Jaerventausta, P; Verho, P; Kaerenlampi, M; Pitkaenen, M [Tampere Univ. of Technology (Finland); Partanen, J [Lappeenranta Univ. of Technology (Finland)

    1998-08-01

    The development of new distribution automation applications is considerably wide nowadays. One of the most interesting areas is the development of a distribution management system (DMS) as an expansion to the traditional SCADA system. At the power transmission level such a system is called an energy management system (EMS). The idea of these expansions is to provide supporting tools for control center operators in system analysis and operation planning. Nowadays the SCADA is the main computer system (and often the only) in the control center. However, the information displayed by the SCADA is often inadequate, and several tasks cannot be solved by a conventional SCADA system. A need for new computer applications in control center arises from the insufficiency of the SCADA and some other trends. The latter means that the overall importance of the distribution networks is increasing. The slowing down of load-growth has often made network reinforcements unprofitable. Thus the existing network must be operated more efficiently. At the same time larger distribution areas are for economical reasons being monitored at one control center and the size of the operation staff is decreasing. The quality of supply requirements are also becoming stricter. The needed data for new applications is mainly available in some existing systems. Thus the computer systems of utilities must be integrated. The main data source for the new applications in the control center are the AM/FM/GIS (i.e. the network database system), the SCADA, and the customer information system (CIS). The new functions can be embedded in some existing computer system. This means a strong dependency on the vendor of the existing system. An alternative strategy is to develop an independent system which is integrated with other computer systems using well-defined interfaces. The latter approach makes it possible to use the new applications in various computer environments, having only a weak dependency on the

  1. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  2. Materials management information systems.

    Science.gov (United States)

    1996-01-01

    The hospital materials management function--ensuring that goods and services get from a source to an end user--encompasses many areas of the hospital and can significantly affect hospital costs. Performing this function in a manner that will keep costs down and ensure adequate cash flow requires effective management of a large amount of information from a variety of sources. To effectively coordinate such information, most hospitals have implemented some form of materials management information system (MMIS). These systems can be used to automate or facilitate functions such as purchasing, accounting, inventory management, and patient supply charges. In this study, we evaluated seven MMISs from seven vendors, focusing on the functional capabilities of each system and the quality of the service and support provided by the vendor. This Evaluation is intended to (1) assist hospitals purchasing an MMIS by educating materials managers about the capabilities, benefits, and limitations of MMISs and (2) educate clinical engineers and information system managers about the scope of materials management within a healthcare facility. Because software products cannot be evaluated in the same manner as most devices typically included in Health Devices Evaluations, our standard Evaluation protocol was not applicable for this technology. Instead, we based our ratings on our observations (e.g., during site visits), interviews we conducted with current users of each system, and information provided by the vendor (e.g., in response to a request for information [RFI]). We divided the Evaluation into the following sections: Section 1. Responsibilities and Information Requirements of Materials Management: Provides an overview of typical materials management functions and describes the capabilities, benefits, and limitations of MMISs. Also includes the supplementary article, "Inventory Cost and Reimbursement Issues" and the glossary, "Materials Management Terminology." Section 2. The

  3. The NSF Cybersecurity Center of Excellence: Translating Identity Management and Cybersecurity into Scientific Collaboration

    Science.gov (United States)

    Welch, V.

    2016-12-01

    Scientists care deeply about their collaborations: who is a member, who can access, produce, and correct data, and manager instruments critical to their science missions. The communities of cybersecurity and identity management professionals develop tools to support collaborations and the undertaking of trustworthy science, but there are large cultural and linguistic gaps between these communities and the scientists they service. The National Science Foundation has recently funded a NSF Cybersecurity Center of Excellence to help its community of projects by providing leadership and addressing the challenges of trustworthy science. A key goal of this NSF Center has been translating between the goals of the science community into requirements and risks understood by identity management and cybersecurity communities. This talk will give an update on the Center's efforts and other services it provides to the NSF community to bridge these cultures.

  4. Management Information System

    Science.gov (United States)

    1984-01-01

    New Automated Management Information Center (AMIC) employs innovative microcomputer techniques to create color charts, viewgraphs, or other data displays in a fraction of the time formerly required. Developed under Kennedy Space Center's contract by Boeing Services International Inc., Seattle, WA, AMIC can produce an entirely new informational chart in 30 minutes, or an updated chart in only five minutes. AMIC also has considerable potential as a management system for business firms.

  5. Anesthesia information management systems

    OpenAIRE

    Feri Štivan; Janez Benedik; Tomaž Lužar

    2014-01-01

    Introduction: The use of anesthesia information management systems (AIMS) is on the increase. This is particularly true for academic anesthesia departments. The main reasons for slow adoption of these systems in the past are financial barriers associated with implementation of these systems and their not so traditionally obvious potential to improve patient care. In addition, a major obstacle to acceptance of this technology is the concern of users over the impact of the electronic anesthesia...

  6. Advanced alarm management system

    International Nuclear Information System (INIS)

    Easter, J.R.

    1995-01-01

    The Westinghouse Advanced Alarm Management System (AWARE) is one of the Man-Machine Design Interfaces (MMI) which has great flexibility with regard to hardware type and configuration, alarm system concept, plant scope, engineering scope and installation. The AWARE System provides the capability to better manage the quantity prioritization and presentation of real-time process alarm messages in the control room. The messages are specific, precise and dynamic. The AWARE System can provide a large reduction in the number of messages that the control room staff must address at any one time, thus making the alarm message system a useful tool for the operators during situations that normally produce a high volume of messages as well as improving the clarity of the presentation of process abnormalities during small disturbances. The operating staff is now provided with the basis for a better understanding of the current plant state and for taking the appropriate control actions. (2 refs., 3 figs.)

  7. Pickering tool management system

    International Nuclear Information System (INIS)

    Wong, E.H.; Green, A.H.

    1997-01-01

    Tools were being deployed in the station with no process in effect to ensure that they are maintained in good repair so as to effectively support the performance of Maintenance activities. Today's legal requirements require that all employers have a process in place to ensure that tools are maintained in a safe condition. This is specified in the Ontario Health and Safety Act. The Pickering Tool Management System has been chosen as the process at Pickering N.D to manage tools. Tools are identified by number etching and bar codes. The system is a Windows application installed on several file servers

  8. BWR reactor management system

    International Nuclear Information System (INIS)

    Makino, Kakuji; Kawamura, Atsuo; Yoshioka, Ritsuo; Neda, Toshikatsu.

    1979-01-01

    It is necessary to grasp the delicate state of operation in reactor cores in view of the control of burn-up and power output at the time of the operation management of BWRs. Enormous labor has been required for the collection, processing and evaluation of the data. It is desirable to obtain the safer, more efficient and faster method of operation control by predicting the states in cores including the change of xenon and reflecting them to operation plans as well as by tracing with high accuracy the past burn-up history for a long period. At present, the on-line evaluation of the states in cores is carried out with the process computers attached to respective units, but the amount of data required for core operation management of high degree far exceeds their capacity. From such viewpoints, the research and development on the reactor management system were carried out. The data processing concerning core operation management is performed with newly installed computers utilizing the data from existing process computers, and the operation of reactor cores, the qualitative improvement of management works, labor saving, and fast, efficient operation control are feasible with it. This system was installed in an actual plant in October, 1977. The composition of the system, the prediction of the change in local output distribution accompanying control rod operation, the prediction of the change in the states in cores due to the flow rate of coolant, and the function of collecting plant data are explained. (Kako, I.)

  9. Management control system description

    Energy Technology Data Exchange (ETDEWEB)

    Bence, P. J.

    1990-10-01

    This Management Control System (MCS) description describes the processes used to manage the cost and schedule of work performed by Westinghouse Hanford Company (Westinghouse Hanford) for the US Department of Energy, Richland Operations Office (DOE-RL), Richland, Washington. Westinghouse Hanford will maintain and use formal cost and schedule management control systems, as presented in this document, in performing work for the DOE-RL. This MCS description is a controlled document and will be modified or updated as required. This document must be approved by the DOE-RL; thereafter, any significant change will require DOE-RL concurrence. Westinghouse Hanford is the DOE-RL operations and engineering contractor at the Hanford Site. Activities associated with this contract (DE-AC06-87RL10930) include operating existing plant facilities, managing defined projects and programs, and planning future enhancements. This document is designed to comply with Section I-13 of the contract by providing a description of Westinghouse Hanford's cost and schedule control systems used in managing the above activities. 5 refs., 22 figs., 1 tab.

  10. Identity management strategies among HIV-positive Colombian gay men in London.

    Science.gov (United States)

    Jaspal, Rusi; Williamson, Iain

    2017-12-01

    This study set out to explore the social-psychological aspects of living with HIV among a group of HIV-positive Colombian gay men in London, and the strategies that they deployed to manage ensuing threats to their identities. Focus group and individual interview data were collected from 14 Colombian gay men living with HIV, and were analysed using qualitative thematic analysis and identity process theory. The following themes are discussed: (1) identity struggles and conflicts in Colombia, (2), managing multiple layers of social stigma in England, and (3) changing interpersonal and intergroup dynamics, which highlight the inter-connections between sexual prejudice, sexual risk-taking and HIV stigma. Identity may be chronically threatened due to the multiple layers of stigma, which can limit the coping strategies available to individuals. Findings strongly support the need for action and programmes to highlight and tackle both racism and HIV stigma on the gay scene and to fund more specific resources for sub-communities of gay, bisexual and other men who have sex with men, which employ appropriately trained and culturally competent staff.

  11. Integrated management system

    International Nuclear Information System (INIS)

    Florescu, N.

    2003-01-01

    A management system is developed in order to reflect the needs of the business and to ensure that the objectives of the organization will be achieved. The process model and each individual process within the system then needs to identify the drives or requirements from external customers and stakeholders, regulations, and standards such as ISO and 50-C-Q. The processes are then developed to address these drivers. Developing the process in this way makes it fully integrated and capable of incorporating any new requirements. The International Standard (ISO 9000:2000) promotes the adoption of a process approach when developing, implementing and improving the effectiveness of a quality management system to enhance customer satisfaction by meeting customer requirements. The IAEA Code recognizes that the entire work is a process which can be planned, assessed and improved. For an organization to function effectively, numerous linked activities have to be identified and managed. By definition a process is an activity that using resources and taking into account all the constraints imposed executes the necessary operations which transform the inputs in outcomes. Running a system of processes within an organization, identification of the interaction between the processes and their management can be referred to as a 'process approach'. The advantage of such an approach is the ensuring of the ongoing control over the linkage between the individual processes composing the system as well as over their combination and interaction. Developing a management system implies: identification of the process which delivers Critical Success Factor (CSFs) of the business; identifying the support processes enabling the CSFs to be accomplished; identifying the processes that deliver the business fundamentals. An integrated management system should include all activities not only those related to Quality, Health and Safety. When developing an IMS it is necessary to identify all of the drivers

  12. Maintenance work management system

    International Nuclear Information System (INIS)

    Kanai, T.; Takahashi, Y.; Takahashi, K.; Nishino, M.; Takeshige, R.

    2000-01-01

    The maintenance work management system supports the efficient drawing up of various documents for the maintenance work at nuclear power stations and the speeding up of the permission procedure. In addition, it improves the quality assurance of the safety and reliability of the maintenance work. Key merits of the system are: 1. Efficiently drawing up various documents for the maintenance work by using the stored data for the previous maintenance work and the pipe and instrument diagram (P and ID) data. 2. Supporting the management work for the completion of maintenance work safety by using the isolation information stored on the computer system. 3. Speeding up the permission procedure by electronic mail and electronic permission. 4. Displaying additional information such as the specifications of equipment, maintenance result, and maintenance plan by linking up with the database of another system. 5. Reducing the cost of hardware devices by using client/server network configurations of personal computers and a personal computer server. (author)

  13. DIRAC Data Management System

    CERN Document Server

    Smith, A C

    2007-01-01

    The LHCb experiment being built to utilize CERN’s flagship Large Hadron Collider will generate data to be analysed by a community of over 600 physicists worldwide. DIRAC, LHCb’s Workload and Data Management System, facilitates the use of underlying EGEE Grid resources to generate, process and analyse this data in the distributed environment. The Data Management System, presented here, provides real-time, data-driven distribution in accordance with LHCb’s Computing Model. The data volumes produced by the LHC experiments are unprecedented, rendering individual institutes and even countries, unable to provide the computing and storage resources required to make full use of the produced data. EGEE Grid resources allow the processing of LHCb data possible in a distributed fashion and LHCb’s Computing Model is based on this approach. Data Management in this environment requires reliable and high-throughput transfer of data, homogeneous access to storage resources and the cataloguing of data replicas, all of...

  14. On the synchronization of identical and non-identical 4-D chaotic systems using arrow form matrix

    International Nuclear Information System (INIS)

    Hammami, S.; Ben Saad, K.; Benrejeb, M.

    2009-01-01

    Using the Borne and Gentina practical criterion associated with the Benrejeb canonical arrow form matrix, to derive the stability property of dynamic complex systems, a new strategy of control is formulated for chaos synchronization of two identical Lorenz Stenflo systems and two new four-dimensional chaotic systems, namely the Qi chaotic systems. The designed controller ensures that the state variables of both controlled chaotic slave Lorenz Stenflo and Qi systems globally synchronizes with the state variables of the master systems, respectively. It is also shown that Qi system globally synchronizes with Lorenz Stenflo system under the afforded generalized strategy of control. Numerical simulations are carried out to assess the performance of the proposed contributions in the important field of chaotic synchronization.

  15. DISEASE MANAGEMENT INFORMATION SYSTEM

    OpenAIRE

    Bens Pardamean; Anindito; Anjela Djoeang; Nana Tobing

    2013-01-01

    The study designed an information system model for Disease Management (DisMan) that met the specifications and needs of a consumer electronics manufacturer. The diseases monitored by this study were diabetes, hypertension and tuberculosis. Data were collected through interviews with the companyâs human resources department and occupational health provider. As for the model, literature and online research were conducted to collect health standards and information system standards on existing D...

  16. Integrated management systems

    DEFF Research Database (Denmark)

    Jørgensen, Tine Herreborg; Remmen, Arne; Mellado, M. Dolores

    2006-01-01

    Different approaches to integration of management systems (ISO 9001, ISO 14001, OHSAS 18001 and SA 8000) with various levels of ambition have emerged. The tendency of increased compatibility between these standards has paved the road for discussions of, how to understand the different aspects of ...

  17. Managing Complex Dynamical Systems

    Science.gov (United States)

    Cox, John C.; Webster, Robert L.; Curry, Jeanie A.; Hammond, Kevin L.

    2011-01-01

    Management commonly engages in a variety of research designed to provide insight into the motivation and relationships of individuals, departments, organizations, etc. This paper demonstrates how the application of concepts associated with the analysis of complex systems applied to such data sets can yield enhanced insights for managerial action.

  18. Visual management support system

    Science.gov (United States)

    Lee Anderson; Jerry Mosier; Geoffrey Chandler

    1979-01-01

    The Visual Management Support System (VMSS) is an extension of an existing computer program called VIEWIT, which has been extensively used by the U. S. Forest Service. The capabilities of this program lie in the rapid manipulation of large amounts of data, specifically opera-ting as a tool to overlay or merge one set of data with another. VMSS was conceived to...

  19. Advanced Distribution Management System

    OpenAIRE

    Avazov, Artur; Sobinova, Lubov Anatolievna

    2016-01-01

    This article describes the advisability of using advanced distribution management systems in the electricity distribution networks area and considers premises of implementing ADMS within the Smart Grid era. Also, it gives the big picture of ADMS and discusses the ADMS advantages and functionalities.

  20. Advanced Distribution Management System

    Science.gov (United States)

    Avazov, Artur R.; Sobinova, Liubov A.

    2016-02-01

    This article describes the advisability of using advanced distribution management systems in the electricity distribution networks area and considers premises of implementing ADMS within the Smart Grid era. Also, it gives the big picture of ADMS and discusses the ADMS advantages and functionalities.

  1. Advanced Distribution Management System

    Directory of Open Access Journals (Sweden)

    Avazov Artur R.

    2016-01-01

    Full Text Available This article describes the advisability of using advanced distribution management systems in the electricity distribution networks area and considers premises of implementing ADMS within the Smart Grid era. Also, it gives the big picture of ADMS and discusses the ADMS advantages and functionalities.

  2. Systemic Case Formulation, Individualized Process Monitoring, and State Dynamics in a Case of Dissociative Identity Disorder.

    Science.gov (United States)

    Schiepek, Günter K; Stöger-Schmidinger, Barbara; Aichhorn, Wolfgang; Schöller, Helmut; Aas, Benjamin

    2016-01-01

    Objective: The aim of this case report is to demonstrate the feasibility of a systemic procedure (synergetic process management) including modeling of the idiographic psychological system and continuous high-frequency monitoring of change dynamics in a case of dissociative identity disorder. The psychotherapy was realized in a day treatment center with a female client diagnosed with borderline personality disorder (BPD) and dissociative identity disorder. Methods: A three hour long co-creative session at the beginning of the treatment period allowed for modeling the systemic network of the client's dynamics of cognitions, emotions, and behavior. The components (variables) of this idiographic system model (ISM) were used to create items for an individualized process questionnaire for the client. The questionnaire was administered daily through an internet-based monitoring tool (Synergetic Navigation System, SNS), to capture the client's individual change process continuously throughout the therapy and after-care period. The resulting time series were reflected by therapist and client in therapeutic feedback sessions. Results: For the client it was important to see how the personality states dominating her daily life were represented by her idiographic system model and how the transitions between each state could be explained and understood by the activating and inhibiting relations between the cognitive-emotional components of that system. Continuous monitoring of her cognitions, emotions, and behavior via SNS allowed for identification of important triggers, dynamic patterns, and psychological mechanisms behind seemingly erratic state fluctuations. These insights enabled a change in management of the dynamics and an intensified trauma-focused therapy. Conclusion: By making use of the systemic case formulation technique and subsequent daily online monitoring, client and therapist continuously refer to detailed visualizations of the mental and behavioral network and

  3. Systemic Case Formulation, Individualized Process Monitoring, and State Dynamics in a Case of Dissociative Identity Disorder.

    Directory of Open Access Journals (Sweden)

    Guenter Karl Schiepek

    2016-10-01

    Full Text Available Objective. The aim of this case report is to demonstrate the feasibility of a systemic procedure (synergetic process management including modeling of the idiographic psychological system and continuous high-frequency monitoring of change dynamics in a case of dissociative identity disorder. The psychotherapy was realized in a day treatment center with a female client diagnosed with borderline personality disorder (BPD and dissociative identity disorder. Methods. A three hour long co-creative session at the beginning of the treatment period allowed for modeling the systemic network of the client’s dynamics of cognitions, emotions, and behavior. The components (variables of this idiographic system model (ISM were used to create items for an individualized process questionnaire for the client. The questionnaire was administered daily through an internet-based monitoring tool (Synergetic Navigation System, SNS, to capture the client’s individual change process continuously throughout the therapy and after-care period. The resulting time series were reflected by therapist and client in therapeutic feedback sessions. Results. For the client it was important to see how the personality states dominating her daily life were represented by her idiographic system model and how the transitions between each state could be explained and understood by the activating and inhibiting relations between the cognitive-emotional components of that system. Continuous monitoring of her cognitions, emotions, and behavior via SNS allowed for identification of important triggers, dynamic patterns, and psychological mechanisms behind seemingly erratic state fluctuations. These insights enabled a change in management of the dynamics and an intensified trauma-focused therapy. Conclusion. By making use of the systemic case formulation technique and subsequent daily online monitoring, client and therapist continuously refer to detailed visualizations of the mental and

  4. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  5. Managing corporate identities of non-profit organisations in the social welfare sector

    Directory of Open Access Journals (Sweden)

    Lida Holtzhausen

    2013-03-01

    Full Text Available Present-day South Africa is characterised by many societal and developmental issues, such as HIV awareness and prevention, child-headed households, environmental protection, poverty alleviation, violence and victim aid. However, it is widely acknowledged that government alone cannot address these issues effectively. The role of non-profit organisations (NPOs in addressing social and development issues is increasingly emphasised. NPOs work at grass-roots level and they can therefore, on the whole, identify societal vulnerabilities and risks earlier than the government sector. However, due to the economic recession, NPOs operate in a competitive environment where an increasing number of NPOs rely on a small number of donors and other resources. NPOs should therefore differentiate themselves from the competition in order to obtain public legitimacy and funding. Corporate identity management is important for NPOs to fulfil their role in social welfare and thus contribute to disaster risk reduction. The exploratory nature of this study dictates a qualitative research approach. Semi-structured interviews with management of five NPOs in the social welfare sector were conducted in order to provide an answer to the study’s research question: ‘To what extent do NPOs in the social welfare sector practise corporate identity management, in order to prevent and address social welfare risks?’ The research found that NPOs do not realise the full potential of managing their corporate identities. NPOs therefore do not take advantage of a strong and distinct corporate identity which would allow them to ensure their ability to assess, address, reduce and/or alleviate vulnerabilities and disaster risks.

  6. Smart energy management system

    Science.gov (United States)

    Desai, Aniruddha; Singh, Jugdutt

    2010-04-01

    Peak and average energy usage in domestic and industrial environments is growing rapidly and absence of detailed energy consumption metrics is making systematic reduction of energy usage very difficult. Smart energy management system aims at providing a cost-effective solution for managing soaring energy consumption and its impact on green house gas emissions and climate change. The solution is based on seamless integration of existing wired and wireless communication technologies combined with smart context-aware software which offers a complete solution for automation of energy measurement and device control. The persuasive software presents users with easy-to-assimilate visual cues identifying problem areas and time periods and encourages a behavioural change to conserve energy. The system allows analysis of real-time/statistical consumption data with the ability to drill down into detailed analysis of power consumption, CO2 emissions and cost. The system generates intelligent projections and suggests potential methods (e.g. reducing standby, tuning heating/cooling temperature, etc.) of reducing energy consumption. The user interface is accessible using web enabled devices such as PDAs, PCs, etc. or using SMS, email, and instant messaging. Successful real-world trial of the system has demonstrated the potential to save 20 to 30% energy consumption on an average. Low cost of deployment and the ability to easily manage consumption from various web enabled devices offers gives this system a high penetration and impact capability offering a sustainable solution to act on climate change today.

  7. Air System Information Management

    Science.gov (United States)

    Filman, Robert E.

    2004-01-01

    I flew to Washington last week, a trip rich in distributed information management. Buying tickets, at the gate, in flight, landing and at the baggage claim, myriad messages about my reservation, the weather, our flight plans, gates, bags and so forth flew among a variety of travel agency, airline and Federal Aviation Administration (FAA) computers and personnel. By and large, each kind of information ran on a particular application, often specialized to own data formats and communications network. I went to Washington to attend an FAA meeting on System-Wide Information Management (SWIM) for the National Airspace System (NAS) (http://www.nasarchitecture.faa.gov/Tutorials/NAS101.cfm). NAS (and its information infrastructure, SWIM) is an attempt to bring greater regularity, efficiency and uniformity to the collection of stovepipe applications now used to manage air traffic. Current systems hold information about flight plans, flight trajectories, weather, air turbulence, current and forecast weather, radar summaries, hazardous condition warnings, airport and airspace capacity constraints, temporary flight restrictions, and so forth. Information moving among these stovepipe systems is usually mediated by people (for example, air traffic controllers) or single-purpose applications. People, whose intelligence is critical for difficult tasks and unusual circumstances, are not as efficient as computers for tasks that can be automated. Better information sharing can lead to higher system capacity, more efficient utilization and safer operations. Better information sharing through greater automation is possible though not necessarily easy.

  8. TFTR data management system

    International Nuclear Information System (INIS)

    Randerson, L.; Chu, J.; Ludescher, C.; Malsbury, J.; Stark, W.

    1986-01-01

    Developments in the tokamak fusion test reactor (TFTR) data management system supporting data management system supporting data acquisition and off-line physics data reduction are described. Data from monitor points, timing channels, and transient recorder channels and other devices are acquired and stored for use by on-line tasks. Files are transferred off-line automatically. A configuration utility determines data acquired and files transferred. An event system driven by file arrival activates off-line reduction processes. A post-run process transfers files not shipped during runs. Files are archived to tape and are retrievable by digraph and shot number. Automatic skimming based on most recent access, file type, shot numbers, and user-set protection maintains the files required for post-run data reduction

  9. Management Information Systems

    Directory of Open Access Journals (Sweden)

    Furduescu Bogdan-Alexandru

    2017-12-01

    Full Text Available Technology is the science that studies processes, methods and operations run or applied onto raw materials, matters or data, in order to obtain a certain product. Information is the material signal able to launch a material reaction of a dynamic auto-tuning system for which the system is conditioned and finalized. Information Technology is the technology needed for handling (procuring, processing, storing converting and transmitting information, in particular, with the use of computers [Longley, D. & Shain, M. (1985, p. 164]. The importance of IT in the economic growth and development is widely known, taking into account the impact that technology can have on the success and survival, or the failure of the economic activity of enterprises/organizations, IT offering various management information systems (MIS, executive and feedback segments, which all have important and beneficial implications in management and control.

  10. The quadratic-form identity for constructing the Hamiltonian structure of integrable systems

    International Nuclear Information System (INIS)

    Guo Fukui; Zhang Yufeng

    2005-01-01

    A usual loop algebra, not necessarily the matrix form of the loop algebra A-tilde n-1 , is also made use of for constructing linear isospectral problems, whose compatibility conditions exhibit a zero-curvature equation from which integrable systems are derived. In order to look for the Hamiltonian structure of such integrable systems, a quadratic-form identity is created in the present paper whose special case is just the trace identity; that is, when taking the loop algebra A-tilde 1 , the quadratic-form identity presented in this paper is completely consistent with the trace identity

  11. Managing risk and marginalizing identities: on the society-of-captives thesis and the harm of social dis-ease.

    Science.gov (United States)

    Arrigo, Bruce A

    2013-06-01

    This article develops the constitutive features of the society-of-captives thesis as suggested by Arrigo and Milovanovic, and Arrigo, Bersot, and Sellers. The relevance of this thesis is briefly explored in relation to the institutional and community-based treatment philosophies that currently inform the mental health and criminal justice systems. This exploration specifies how risk (being human and doing humanness differently) is managed symbolically, linguistically, materially, and culturally. The management of this risk extends to the kept as well as to their keepers, regulators, and watchers (i.e., the society of captives). This article calls for a new clinical praxis (being/doing a critical mindfulness) designed to overcome the totalizing madness (the harm of social dis-ease) that follows from managing risk fearfully and marginalizing identities desperately as reified recursively through society's captivity. The ethical underpinnings of this clinical praxis represent an emergent direction for undertaking correctional policy reform.

  12. "Managing identities" and parental disclosure of HIV sero-status in Zimbabwe.

    Science.gov (United States)

    Muparamoto, Nelson; Chiweshe, Manase Kudzai

    2015-01-01

    Drawing from a small sample of HIV infected respondents, this paper examines parents' perceptions on the decision to disclose or not to disclose their HIV sero-status to their children. It explores how parents control the information in the interactional ritual with their children. The paper uses Goffman's concept of dramaturgy to analyse how parents manage and control disclosure within a context where HIV and AIDS is associated with stigma. Disclosure is a strategic encounter in which the interactants (parents) manage to create a desired identity or spoil an identity. Qualitative research incorporating focus group discussions and in-depth interviews was used to examine the perceptions of parents who are HIV positive on disclosure of their status to their children. Such a methodological approach allows for a nuanced understanding of the context in which decision to disclose status happens. The study findings show that in a social context involving parents and children as actors there are complex expectations which affect parental disclosure of HIV sero-status to their children. The desire to manage an expected identity militated or enabled disclosure in a parental relationship.

  13. The identity management practices of beauty-bloggers: a multimodal approach to the deprofessionalization’s analysis

    Directory of Open Access Journals (Sweden)

    Martyanova Natalia Alexandrovna

    2015-04-01

    Full Text Available The article analyses the identity management practices of beauty-bloggers who on YouTube. The authors relies on the theory of deprofessionalization and show how bloggers gain the symbolic power and authority, which professionals previously had. Exploring the forms and methods of Internet communication the authors reveal the latent common identity management practices questioning the authority of professionals, and creating new managed space.

  14. The identity management practices of beauty-bloggers: a multimodal approach to the deprofessionalization’s analysis

    OpenAIRE

    Martyanova Natalia Alexandrovna; Rubtcova Maria Vladimirovna

    2015-01-01

    The article analyses the identity management practices of beauty-bloggers who on YouTube. The authors relies on the theory of deprofessionalization and show how bloggers gain the symbolic power and authority, which professionals previously had. Exploring the forms and methods of Internet communication the authors reveal the latent common identity management practices questioning the authority of professionals, and creating new managed space.

  15. Managing Conflict in Temporary Management Systems

    Science.gov (United States)

    Wilemon, David L.

    1973-01-01

    As organizational tasks have grown more complex, several innovative temporary management systems such as matrix management have been developed. The Apollo space program has been an important contribution to the development of matrix management techniques. Discusses the role of conflict within the matrix, its determinants, and the process of…

  16. Mastering the management system.

    Science.gov (United States)

    Kaplan, Robert S; Norton, David P

    2008-01-01

    Companies have always found it hard to balance pressing operational concerns with long-term strategic priorities. The tension is critical: World-class processes won't lead to success without the right strategic direction, and the best strategy in the world will get nowhere without strong operations to execute it. In this article, Kaplan, of Harvard Business School, and Norton, founder and director of the Palladium Group, explain how to effectively manage both strategy and operations by linking them tightly in a closed-loop management system. The system comprises five stages, beginning with strategy development, which springs from a company's mission, vision, and value statements, and from an analysis of its strengths, weaknesses, and competitive environment. In the next stage, managers translate the strategy into objectives and initiatives with strategy maps, which organize objectives by themes, and balanced scorecards, which link objectives to performance metrics. Stage three involves creating an operational plan to accomplish the objectives and initiatives; it includes targeting process improvements and preparing sales, resource, and capacity plans and dynamic budgets. Managers then put plans into action, monitoring their effectiveness in stage four. They review operational, environmental, and competitive data; assess progress; and identify barriers to execution. In the final stage, they test the strategy, analyzing cost, profitability, and correlations between strategy and performance. If their underlying assumptions appear faulty, they update the strategy, beginning another loop. The authors present not only a comprehensive blueprint for successful strategy execution but also a managerial tool kit, illustrated with examples from HSBC Rail, Cigna Property and Casualty, and Store 24. The kit incorporates leading management experts' frameworks, outlining where they fit into the management cycle.

  17. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey

    OpenAIRE

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospi...

  18. Verification Account Management System (VAMS)

    Data.gov (United States)

    Social Security Administration — The Verification Account Management System (VAMS) is the centralized location for maintaining SSA's verification and data exchange accounts. VAMS account management...

  19. HLT configuration management system

    CERN Document Server

    Daponte, Vincenzo

    2015-01-01

    The CMS High Level Trigger (HLT) is implemented running a streamlined version of the CMS offline reconstruction software running on thousands of CPUs. The CMS software is written mostly in C++, using Python as its configuration language through an embedded CPython interpreter. The configuration of each process is made up of hundreds of modules, organized in sequences and paths. As an example, the HLT configurations used for 2011 data taking comprised over 2200 different modules, organized in more than 400 independent trigger paths. The complexity of the HLT configurations and the large number of configuration produced require the design of a suitable data management system. The present work describes the designed solution to manage the considerable number of configurations developed and to assist the editing of new configurations. The system is required to be remotely accessible and OS-independent as well as easly maintainable easy to use. To meet these requirements a three-layers architecture has been choose...

  20. Data Management System

    Science.gov (United States)

    1997-01-01

    CENTRA 2000 Inc., a wholly owned subsidiary of Auto-trol technology, obtained permission to use software originally developed at Johnson Space Center for the Space Shuttle and early Space Station projects. To support their enormous information-handling needs, a product data management, electronic document management and work-flow system was designed. Initially, just 33 database tables comprised the original software, which was later expanded to about 100 tables. This system, now called CENTRA 2000, is designed for quick implementation and supports the engineering process from preliminary design through release-to-production. CENTRA 2000 can also handle audit histories and provides a means to ensure new information is distributed. The product has 30 production sites worldwide.

  1. Environmental management systems

    OpenAIRE

    Misiak, Małgorzata

    2016-01-01

    Considering environmental protection requirements in business operations may, in the long run, determine if a lasting comparative advantage can be achieved. That is why our textbook, rich in case studies, identifies not only the threats a business may pose to the environment but stresses the ways of reducing its negative impact. It discusses, among other things, the concept of corporate social responsibility, environmental management systems, methods and the importance of eco-labelling goods ...

  2. Managing corporate visual identity: use and effects of organizational measures to support a consistent self-presentation

    NARCIS (Netherlands)

    van den Bosch, Annette; de Jong, Menno; Elving, Wim

    2004-01-01

    It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the

  3. Managing corporate visual identity: Use and effects of organizational measures to support a consistent self-presentation.

    NARCIS (Netherlands)

    van den Bosch, A.L.M.; de Jong, Menno D.T.; Elving, W.J.L.

    2004-01-01

    It is generally acknowledged that corporate visual identity (CVI) is an important element of identity, reputation, and relationship management. Academic research has focused strongly on the strategic and design aspects of CVI, and neglected the operational level. This article addresses one of the

  4. Managing two cultural identities: the malleability of bicultural identity integration as a function of induced global or local processing.

    Science.gov (United States)

    Mok, Aurelia; Morris, Michael W

    2012-02-01

    Increasingly, individuals identify with two or more cultures. Prior research has found the degree to which individuals chronically integrate these identities (bicultural identity integration; BII) moderates responses to cultural cues: High BII individuals assimilate (adopting biases that are congruent with norms of the cued culture), whereas low BII individuals contrast (adopting biases that are incongruent with these norms). The authors propose BII can also be a psychological state and modulated by shifts in processing styles. In four experiments, the authors induced a global or local processing style using physical posture (Experiment 1) and cognitive manipulations (Experiments 2-4) and found that BII is enhanced in contexts facilitating a more global processing style (i.e., smiling, high-level construal, and similarity focus). The authors also found that contrastive responses to cultural cues are diminished when BII is situationally enhanced. Implications for research on processing style, identity integration, and performance in culture-based situations are discussed.

  5. Ward identity for non-equilibrium Fermi systems

    Czech Academy of Sciences Publication Activity Database

    Velický, B.; Kalvová, Anděla; Špička, Václav

    2008-01-01

    Roč. 77, č. 4 (2008), 041201/1-041201/4 ISSN 1098-0121 R&D Projects: GA ČR GC202/07/J051 Institutional research plan: CEZ:AV0Z10100520; CEZ:AV0Z10100521 Keywords : non-equilibrium * Green’s functions * quantum transport equations * Ward identity Subject RIV: BE - Theoretical Physics Impact factor: 3.322, year: 2008

  6. Staying in the Hood: Black Lesbian and Transgender Women and Identity Management in North Philadelphia.

    Science.gov (United States)

    Brooks, Siobhan

    2016-12-01

    The concept Don't Ask, Don't Tell regarding Black LGBT sexuality in Black communities has been an acceptable form of identity management for Black LGBT people. In other words, Black LGBT people are accepted as long as they are not vocal about their sexuality. However, this is changing with the issue of gay marriage, which is creating a space where Black LGBT people are more open about their gender identity and sexuality in heterosexual Black spaces. This new form of openness allows Black LGBT people to "stay in" their communities, as opposed to coming out. In this article I examine how Black LGBT women in North Philadelphia stay in their communities: being politically active regarding LGBT issues, disengaging from LGBT issues, passing, and educating straight Black people about issues affecting the Black LGBT community. I conclude with implications of staying in and intersectionality among Black heterosexual and LGBT women fighting for social change.

  7. Conceptualizing Teacher Identity as a Complex Dynamic System: The Inner Dynamics of Transformations during a Practicum

    Science.gov (United States)

    Henry, Alastair

    2016-01-01

    Currently, the inner dynamics of teacher identity transformations remain a "black box." Conceptualizing preservice teacher identity as a complex dynamic system, and the notion of "being someone who teaches" in dialogical terms as involving shifts between different teacher voices, the study investigates the dynamical processes…

  8. Environmental Compliance Management System

    International Nuclear Information System (INIS)

    Brownson, L.W.; Krsul, T.; Peralta, R.A.; Knudson, D.A.; Rosignolo, C.L.

    1992-01-01

    Argonne National Laboratory (ANL) is developing the Environmental Compliance Management System (ECMS) as a comprehensive, cost-effective tool to ensure (1) that the Laboratory complies with all applicable federal and state environmental laws and regulations, (2) that environmental issues and concerns are recognized and considered in the early phases of projects; and (3) that Laboratory personnel conduct Laboratory operations in the most environmentally acceptable manner. The ECMS is an expert computer system which is designed to allow project engineers to perform an environmental evaluation of their projects. The system includes a Master Program which collects basic project information, provide utility functions, and access the environmental expert modules, environmental expert system modules for each federal and state environmental law which allows the user to obtain specific information on how an individual law may affect his project; and site-specific databases which contain information necessary for effective management of the site under environmental regulations. The ECMS will have the capability to complete and print many of the necessary environmental forms required by federal and state agencies, including the Department of Energy

  9. Simulator configuration management system

    International Nuclear Information System (INIS)

    Faulent, J.; Brooks, J.G.

    1990-01-01

    The proposed revisions to ANS 3.5-1985 (Section 5) require Utilities to establish a simulator Configuration Management System (CMS). The proposed CMS must be capable of: Establishing and maintaining a simulator design database. Identifying and documenting differences between the simulator and its reference plant. Tracking the resolution of identified differences. Recording data to support simulator certification, testing and maintenance. This paper discusses a CMS capable of meeting the proposed requirements contained in ANS 3.5. The system will utilize a personal computer and a relational database management software to construct a simulator design database. The database will contain records to all reference nuclear plant data used in designing the simulator, as well as records identifying all the software, hardware and documentation making up the simulator. Using the relational powers of the database management software, reports will be generated identifying the impact of reference plant changes on the operation of the simulator. These reports can then be evaluated in terms of training needs to determine if changes are required for the simulator. If a change is authorized, the CMS will track the change through to its resolution and then incorporate the change into the simulator design database

  10. Bank Customers Management System

    Directory of Open Access Journals (Sweden)

    Ebubeogu Amarachukwu Felix

    2015-08-01

    Full Text Available ABSTRACT The purpose of this project is in partial fulfilment of the requirements of Bachelor of Science Hon in Information Technology. The Design and development of this Bank customers Management system provides a more secured approach in managing bank customers information which strengthens the relationships between banks and their customers by providing the right solutions that uses a multi-level security to improve customer satisfaction. The technology used in developing this project is ASP.NET and the programming language used to develop this project is C and the IDE used is Microsoft Visual Studio 2013 professional in designing the front end while the back end uses Microsoft SQL Server 2012.

  11. Management Information Systems at CERN

    CERN Document Server

    Ferguson, J

    1986-01-01

    The specific areas addressed in the study are 1.Management decision support (data presentation, data base management systems â" DBMS, modeling) 2.Text processing, 3.Electronic communication for management purposes, 4.Office automation, 5.Administrative use of Management Information Systems (MIS) and in particular Administrative Data Processing (ADP).

  12. A FPGA-based identity authority method in quantum key distribution system

    International Nuclear Information System (INIS)

    Cui Ke; Luo Chunli; Zhang Hongfei; Lin Shengzhao; Jin Ge; Wang Jian

    2012-01-01

    In this article, an identity authority method realized in hardware is developed which is used in quantum key distribution (QKD) systems. This method is based on LFSR-Teoplitz hashing matrix. Its benefits relay on its easy implementation in hardware and high secure coefficient. It can gain very high security by means of splitting part of the final key generated from QKD systems as the seed where it is required in the identity authority method. We propose an specific flow of the identity authority method according to the problems and features of the hardware. The proposed method can satisfy many kinds of QKD systems. (authors)

  13. Pollution management system

    DEFF Research Database (Denmark)

    2015-01-01

    A pollution management system comprises an array of one or more inlets and at least one outlet. The one or more inlets are arranged to collect polluted air and supply said polluted air to a polluted air treatment element. The one or more inlets each comprise a respective inlet sensor for measuring...... a level of pollution at the inlet, and the at least one outlet comprises an outlet sensor for measuring a level of pollution at the outlet. The inlet sensors and the outlet sensor are arranged to provide feedback to the polluted air treatment element....

  14. Pembangunan Model Restaurant Management System

    OpenAIRE

    Fredy Jingga; Natalia Limantara

    2014-01-01

    Model design for Restaurant Management System aims to help in restaurant business process, where Restaurant Management System (RMS) help the waitress and chef could interact each other without paper limitation.  This Restaurant Management System Model develop using Agile Methodology and developed based on PHP Programming Langguage. The database management system is using MySQL. This web-based application model will enable the waitress and the chef to interact in realtime, from the time they a...

  15. Environmental management system

    International Nuclear Information System (INIS)

    2004-01-01

    An Environmental Management System was implemented in ANAV in 1999, including the two nuclear sites of the Asco and Vandellos II nuclear power plants. This implementation entailed formulation of the ANAV Environmental Policy, preparation of an Environmental Management Plan (PLAGMA) supported by the Environmental Aspects Manuals (MASMA) of each site and their operating procedures, modification of the organizational structure to create the Environment Unit, in charge of implementing the SIGEMA, and the Environment Committee, the governing body that reviews the results obtained and environmental goals to be achieved, and direct involvement of all the different ANAV organization in continuous improvement of the SIGEMA implementation. Special attention is paid to evolution of the environmental indicators, to communication and specific training in environmental issues, and to waste management and the different programs for increasing waste recycling and assessment, as well as to minimization programs. The article details the different approaches used to improve the environmental results in these last five years, which have allowed ANAV to maintain the ISO-14001 Certification since 1999. (Author)

  16. Management information systems

    Energy Technology Data Exchange (ETDEWEB)

    1991-01-01

    This contract was for the development of a new range of colliery information computer systems (CIS) using a VAX 11/730 computer. The report details the selection of the system and the set-up of the hardware and software. The first application of these systems was to monitor production and delays from longwall faces. A trial installation was implemented at Shirebrook Colliery and this proved so successful that British Coal are now installing many similar systems. The key features of the production monitoring application are that delays are automatically detected in real time and the operator is prompted for the root cause of the delay. This is done through a linked series of questions and answere from a linked set of possible delay causes. Ad hoc and regular reports are produced giving local colliery management visibility of coal face performance, thus enabling informed decisions and corrective action to be taken. Following the successful application to production monitoring, the system was extended to heading/drivages, coal clearance/conveyors, mine air environment and fixed plant. Those applications were operational during the contract but have since been extended.

  17. TFTR data management system

    International Nuclear Information System (INIS)

    Randerson, L.; Chu, J.; Ludescher, C.; Malsbury, J.; Stark, W.

    1986-01-01

    Developments in the tokamak fusion test reactor (TFTR) data-management system supporting data acquisition and off-line physics data reduction are described. Data from monitor points, timing channels, transient recorder channels, and other devices are acquired and stored for use by on-line tasks. Files are transferred off line automatically. A configuration utility determines data acquired and files transferred. An event system driven by file arrival activates off-line reduction processes. A post-run process transfers files not shipped during runs. Files are archived to tape and are retrievable by digraph and shot number. Automatic skimming based on most recent access, file type, shot numbers, and user-set protections maintains the files required for post-run data reduction

  18. 'Even though it's a small checkbox, it's a big deal': stresses and strains of managing sexual identity(s) on Facebook.

    Science.gov (United States)

    Rubin, Jennifer D; McClelland, Sara I

    2015-01-01

    Facebook offers a socialisation context in which young people from ethnic, gender and sexual minorities must continually manage the potential for prejudice and discrimination in the form of homophobia and racism. In-depth interviews were conducted with eight young women, aged 16-19 years, who self-identified as queer and as women of colour. A detailed analysis of these interviews--focusing in particular on how young people described navigating expectations of rejection from family and friends--offered insight into the psychological and health consequences associated with managing sexual identity(s) while online. The 'closet' ultimately takes on new meaning in this virtual space: participants described trying to develop social relationships within Facebook, which demands sharing one's thoughts, behaviours and ideas, while also hiding and silencing their emerging sexuality. In this 'virtual closet', tempering self-presentation to offset social exclusion has become a continuous, yet personally treacherous, activity during the daily practice of using Facebook.

  19. Group affiliation in self-management: support or threat to identity?

    Science.gov (United States)

    Bossy, Dagmara; Knutsen, Ingrid Ruud; Rogers, Anne; Foss, Christina

    2017-02-01

    Self-management is considered important in chronic illness, and contemporary health policy recommends participation in support groups for individuals with chronic conditions. Although withdrawal from or non-participation in support groups is an important problem, there is limited knowledge about individuals' own motivation for participation in or withdrawal from self-management support groups. To investigate how individuals with type 2 diabetes perceive participation in group-based self-management support. This is a qualitative focus group study using a semi-structured interview guide. Sixteen participants diagnosed with type 2 diabetes were included in the study. Individuals with and without group affiliations were mixed in three focus groups to trigger discussions. In the analysis, reoccurring themes of engagement and discussions between participants were focused within a theoretical frame of institutional logic. The focus groups are seen as social spaces where participants construct identity. Both participation and non-participation in group-based self-management support are associated with dealing with the stigma of having type 2 diabetes. Negotiations contribute to constructing an illness dignity as a response to the logic of moral responsibility for the disease. Contemporary policy contributes to societal understandings of individuals with type 2 diabetes as morally inadequate. Our study shows that group-based self-management support may counteract blame and contribute in negotiations of identity for individuals with type 2 diabetes. This mechanism makes participation in groups beneficial for some but stigma inducing for others. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  20. Some exact identities connecting one- and two-particle Green's functions in spin-orbit coupling systems

    International Nuclear Information System (INIS)

    Yang Huatong

    2007-01-01

    Some exact identities connecting one- and two-particle Green's functions in the presence of spin-orbit coupling have been derived. These identities are similar to the Ward identity in usual quantum transport theory of electrons. A satisfying approximate calculation of the spin transport in spin-orbit coupling system should also preserve these identities, just as the Ward identities should be remained in the usual electronic transport theory

  1. System Security Management in SNMP

    OpenAIRE

    P. Deivendran; Dr. R. Dhanapal Ph.D

    2010-01-01

    We present a framework for managing system security, based on a SNMP Management Information Base (MIB), namely the System Security MIB (SSEC MIB), We have defined managed objects and completed the ASN.1 description of the MIB that embeds them. The related security management functions are mainly focused on monitoring external script execution for system security scanning and access control. The main goal of this work is to introduce the semantics and a standard interface that will allow the r...

  2. Web Based Project Management System

    OpenAIRE

    Aadamsoo, Anne-Mai

    2010-01-01

    To increase an efficiency of a product, nowadays many web development companies are using different project management systems. A company may run a number of projects at a time, and requires input from a number of individuals, or teams for a multi level development plan, whereby a good project management system is needed. Project management systems represent a rapidly growing technology in IT industry. As the number of users, who utilize project management applications continues to grow, w...

  3. Job satisfaction and gender identity of women managers and non-managers.

    Science.gov (United States)

    Lipińska-Grobelny, Agnieszka; Wasiak, Katarzyna

    2010-01-01

    This work investigates different cognitive aspects of job satisfaction (co-workers, supervisor, job content, working facilities, organization and management, opportunities for development, income), positive and negative affect at work and their relations to gender role orientation of women occupying managerial and non-managerial positions. The sample of 122 women (60 managers and 62 non-managers) completed a battery of instruments such as: the Bem Sex Role Inventory, the Job Description Inventory by Neuberger and Allerbeck and the Job Affect Scale by Brief et al. Most women managers represented androgynous and masculine types, while women non-managers belonged to androgynous and feminine types. Moreover, women with various degrees of sex-typing showed positive and negative affect at work. The most satisfied with income were masculine women managers, the least--feminine women non-managers. These results may be applied in designing of motivational instruments to enhance job effectiveness and to eliminate unproductive behaviours such as absenteeism, high staff turnover.

  4. XSIM Final Report: Modelling the Past and Future of Identity Management for Scientific Collaborations

    Energy Technology Data Exchange (ETDEWEB)

    Cowles, Robert; Jackson, Craig; Welch, Von

    2016-08-31

    The eXtreme Science Identity Management (XSIM1) research project: collected and analyzed real world data on virtual organization (VO) identity management (IdM) representing the last 15+ years of collaborative DOE science; constructed a descriptive VO IdM model based on that data; used the model and existing trends to project the direction for IdM in the 2020 timeframe; and provided guidance to scientific collaborations and resource providers that are implementing or seeking to improve IdM functionality. XSIM conducted over 20 semi­structured interviews of representatives from scientific collaborations and resource providers, both in the US and Europe; the interviewees supported diverse set of scientific collaborations and disciplines. We developed a definition of “trust,” a key concept in IdM, to understand how varying trust models affect where IdM functions are performed. The model identifies how key IdM data elements are utilized in collaborative scientific workflows, and it has the flexibility to describe past, present and future trust relationships and IdM implementations. During the funding period, we gave more than two dozen presentations to socialize our work, encourage feedback, and improve the model; we also published four refereed papers. Additionally, we developed, presented, and received favorable feedback on three white papers providing practical advice to collaborations and/or resource providers.

  5. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  6. ENVIRONMENTAL MANAGEMENT SYSTEMS CERTIFICATION

    Directory of Open Access Journals (Sweden)

    Aniko Miler-Virc

    2012-12-01

    Full Text Available ISO 14001 prescribes the requirements for a system, not environmental performance itself. Similarly, certification is of the management system itself, not environmental performance. An audit is not conducted to ascertain whether your flue gas emissions are less than X part per million nitrous oxide or that your wastewater effluent contains less that Y milligrams of bacteria per litre. Consequently, the procces of auditing the system for compliance to the standard entails checking to see that all of the necessary components of a functioning system are present and working properly.           A company can have a complete and fully functional EMS as prescribed by ISO 14001 without being certified. As certification can add to the time and expense of EMS development, it is important for you to establish, in advance, whether certification is of net benefit to you. Although most companies that develop an EMS do in fact certify, there are cases where certification does not add immediate value. Certification is not always beneficial to small and medium sized companies. Certification is not always necessary for companies with one or two large clients with environmental demands who are satisfied that you have a functional EMS (second-party declaration. Whatever decision you make, it is important to remember that just as a driver′s licence does not automatically make you a good driver, ISO 14001 certification does not automatically make your company environmentally benign or ensure that you will continually improve environmental performance. The system is only as good as the people who operate it.

  7. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey.

    Science.gov (United States)

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospital grounds. These QR code bracelets link to the QR Code Identity website, where detailed information is stored; a smartphone or standalone QR code scanner can be used to scan the code. The design of this system allows authorized personnel (e.g., paramedics, firefighters, or police) to access more detailed patient information than the average smartphone user: emergency service professionals are authorized to access patient medical histories to improve the accuracy of medical treatment. In Istanbul, we tested the self-designed system with 174 participants. To analyze the QR Code Identity Tag system's usability, the participants completed the System Usability Scale questionnaire after using the system.

  8. Alarm management system

    International Nuclear Information System (INIS)

    Woods, D.D.; Elm, W.C.; Lipner, M.H.; Butterworth, G.E.; Easter, J.R.

    1989-01-01

    An alarm management system is described, comprising: a light water pressurized nuclear power plant; sensors coupled to the plant indicating the state of the plant; a sensor signal processor, operatively connected to the sensors, for producing state signals indicating the state of the sensors monitoring the power plant from the sensor signals and for combining the state signals using rule based algorithms to produce abnormality indication signals; a message processor, operatively connected to the sensor signal processor for receiving the abnormality indication signals; a spatially dedicated parallel display for each function, operatively connected to the message processor, for displaying the portion of the messages simultaneously; and a serial display, operatively connected to the message processor, for displaying the message in the queues in priority order within category within function upon request, the message processor outputting messages from the queue to the parallel display as display space becomes available on the parallel display due to an abnormality being resolved

  9. Managing Distributed Knowledge Systems

    DEFF Research Database (Denmark)

    Sørensen, Brian Vejrum; Gelbuda, Modestas

    2005-01-01

    . This paper contributes to the research on organizations as distributed knowledge systems by addressing two weaknesses of the social practice literature. Firstly, it downplays the importance of formal structure and organizational design and intervention efforts by key organizational members. Secondly, it does......The article argues that the growth of de novo knowledge-based organization depends on managing and coordinating increasingly growing and, therefore, distributed knowledge. Moreover, the growth in knowledge is often accompanied by an increasing organizational complexity, which is a result...... of integrating new people, building new units and adding activities to the existing organization. It is argued that knowledge is not a stable capacity that belongs to any actor alone, but that it is rather an ongoing social accomplishment, which is created and recreated as actors engage in mutual activities...

  10. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  11. Environmental management system in companies

    International Nuclear Information System (INIS)

    Bonanno, C.

    1995-01-01

    The environmental management system, as the whole coordinated initiatives 'environmental oriented' introduced by companies in their organization, is discussed. Strategic weight that companies have to be present at the environmental management system is enlisted. Finally, the new professional figures of environmental technicians and environmental manager is discussed

  12. Systems management of facilities agreements

    International Nuclear Information System (INIS)

    Blundell, A.

    1998-01-01

    The various types of facilities agreements, the historical obstacles to implementation of agreement management systems and the new opportunities emerging as industry is beginning to make an effort to overcome these obstacles, are reviewed. Barriers to computerized agreement management systems (lack of consistency, lack of standards, scarcity of appropriate computer software) are discussed. Characteristic features of a model facilities agreement management system and the forces driving the changing attitudes towards such systems (e.g. mergers) are also described

  13. Manpower management information system /MIS/

    Science.gov (United States)

    Gravette, M. C.; King, W. L.

    1971-01-01

    System of programs capable of building and maintaining data bank provides all levels of management with regular manpower evaluation reports and data source for special management exercises on manpower.

  14. System management and quality assurance

    International Nuclear Information System (INIS)

    Sastry, A.M.

    1989-01-01

    This paper describes the principles of system management and shows the relationship to quality assurance. It discusses the need for balanced attention to all the project management controls required for project success

  15. Project management and Enterprise systems

    DEFF Research Database (Denmark)

    Koch, Christian; Buhl, Henrik

    2006-01-01

    Implementing and Operating integrated Enterprise Systems are a multidimensional effort. It seriously challenges the IT supplier as well as the professional service provider client. The paper discuss these issues in a project management perspective. A framework for supporting project management...

  16. Informational system. Documents management

    Directory of Open Access Journals (Sweden)

    Vladut Iacob

    2009-12-01

    Full Text Available Productivity growing, as well as reducing of operational costs in a company can be achieved by adopting a document management solutions. Such application will allow management and structured and efficient transmission of information within the organization.

  17. New type radiation management system

    International Nuclear Information System (INIS)

    Mogi, Kenichi; Uranaka, Yasuo; Fujita, Kazuhiko

    2001-01-01

    The radiation management system is a system to carry out entrance and leaving room management of peoples into radiation management area, information management on radiation obtained from a radiation testing apparatus, and so on. New type radiation management system developed by the Mitsubishi Electric Corp. is designed by concepts of superior maintenance and system practice by using apparatus and its interface with standard specification, upgrading of processing response by separating exposure management processing from radiation monitoring processing on a computer, and a backup system not so as to lose its function by a single accident of the constructed computer. Therefore, the system is applied by the newest hardware, package software, and general use LAN, and can carry out a total system filled with requirements and functions for various radiation management of customers by preparing a basic system from radiation testing apparatus to entrance and leaving room management system. Here were described on outline of the new type management system, concept of the system, and functions of every testing apparatus. (G.K.)

  18. The Ineffectiveness of "Effective" Management Strategies: First-Year Teachers, Behavior Management, and Identity

    Science.gov (United States)

    Dugas, Daryl

    2016-01-01

    This article presents a research project that challenges the skills-based approach to classroom management in teacher education, particularly in the domain of responding to student misbehaviors. In 90-minute narrative-based interviews, 16 first-year Chicago Public School (CPS) teachers were prompted for narratives of their experiences responding…

  19. Distributed Cooperative Control of Nonlinear and Non-identical Multi-agent Systems

    DEFF Research Database (Denmark)

    Bidram, Ali; Lewis, Frank; Davoudi, Ali

    2013-01-01

    This paper exploits input-output feedback linearization technique to implement distributed cooperative control of multi-agent systems with nonlinear and non-identical dynamics. Feedback linearization transforms the synchronization problem for a nonlinear and heterogeneous multi-agent system...... for electric power microgrids. The effectiveness of the proposed control is verified by simulating a microgrid test system....

  20. CEFR information management system solution

    International Nuclear Information System (INIS)

    Lu Fei; Zhao Jia'ning

    2011-01-01

    Based on finished information resources planning scheme for China sodium cooled experimental fast breeder reactor and the advanced information resources management solution concepts were applied, we got the building solution of CEFR information management systems. At the same time, the technical solutions of systems structures, logic structures, physical structures, development platforms and operation platforms for information resources management system in fast breeder reactors were developed, which provided programmatic introductions for development works in future. (authors)

  1. Gender identity and the management of the transgender patient: a guide for non-specialists.

    Science.gov (United States)

    Joseph, Albert; Cliffe, Charlotte; Hillyard, Miriam; Majeed, Azeem

    2017-04-01

    In this review, we introduce the topic of transgender medicine, aimed at the non-specialist clinician working in the UK. Appropriate terminology is provided alongside practical advice on how to appropriately care for transgender people. We offer a brief theoretical discussion on transgenderism and consider how it relates to broader understandings of both gender and disease. In respect to epidemiology, while it is difficult to assess the exact size of the transgender population in the UK, population surveys suggest a prevalence of between 0.2 and 0.6% in adults, with rates of referrals to gender identity clinics in the UK increasing yearly. We outline the legal framework that protects the rights of transgender people, showing that is not legal for physicians to deny transgender people access to services based on their personal beliefs. Being transgender is often, although not always, associated with gender dysphoria, a potentially disabling condition in which the discordance between a person's natal sex (that assigned to them at birth) and gender identity results in distress, with high associated rates of self-harm, suicidality and functional impairment. We show that gender reassignment can be a safe and effective treatment for gender dysphoria with counselling, exogenous hormones and surgery being the mainstay of treatment. The role of the general practitioner in the management of transgender patients is discussed and we consider whether hormone therapy should be initiated in primary care in the absence of specialist advice, as is suggested by recent General Medical Council guidance.

  2. Environmental asset management: Risk management systems

    CSIR Research Space (South Africa)

    Naudé, Brian

    2017-07-01

    Full Text Available bnaude@csir.co.za Charl Petzer Council for Scientific and Industrial Research PO Box 395 Pretoria 0001 South Africa +2712 841 4292 CPetzer1@csir.co.za Copyright © 2017 by B Naudé, C Petzer. Published and used by INCOSE with permission.... Charl Petzer is registered professional engineer with 30 years of programme/project management as well as systems engineering experience in military and other environments. He has been the lead systems engineer, as well as programme manager on several...

  3. Army Healthcare Enterprise Management System

    National Research Council Canada - National Science Library

    2001-01-01

    .... The complaint alleged that the Army Healthcare Enterprise Management System was not properly competed, potential conflicts of interest existed, and possible contract performance problems existed...

  4. Patient identity management for secondary use of biomedical research data in a distributed computing environment.

    Science.gov (United States)

    Nitzlnader, Michael; Schreier, Günter

    2014-01-01

    Dealing with data from different source domains is of increasing importance in today's large scale biomedical research endeavours. Within the European Network for Cancer research in Children and Adolescents (ENCCA) a solution to share such data for secondary use will be established. In this paper the solution arising from the aims of the ENCCA project and regulatory requirements concerning data protection and privacy is presented. Since the details of secondary biomedical dataset utilisation are often not known in advance, data protection regulations are met with an identity management concept that facilitates context-specific pseudonymisation and a way of data aggregation using a hidden reference table later on. Phonetic hashing is proposed to prevent duplicated patient registration and re-identification of patients is possible via a trusted third party only. Finally, the solution architecture allows for implementation in a distributed computing environment, including cloud-based elements.

  5. Managing Temporal Knowledge in Port Management Systems

    Directory of Open Access Journals (Sweden)

    Anita Gudelj

    2006-05-01

    Full Text Available Large ports need to deal with a number of disparate activities:the movement of ships, containers and other cargo, theloading and unloading of ships and containers, customs activities.As well as human resources, anchorages, channels, lighters,tugs, berths, warehouse and other storage spaces have to beallocated and released. The efficient management of a port involvesmanaging these activities and resources, managing theflows of money involved between the agents providing and usingthese resources, and providing management information.Many information systems will be involved.Many applications have to deal with a large amount of datawhich not only represent the perceived state of the real world atpresent, but also past and/or future states. These applicationsare not served adequately by today's computer managementand database systems. In particular, deletions and updates insuch systems have destructive semantics. This means that previousdatabase contents (representing previous perceived statesof the real world cannot be accessed anymore.A review of how define temporal data models, based ongeneralizing a non-temporal data model in to a temporal one toimprove port management is presented. This paper describes apractical experiment which supports managing temporal dataalong with the corresponding prototype implementations.

  6. Lighting system with thermal management system

    Science.gov (United States)

    Arik, Mehmet; Weaver, Stanton; Stecher, Thomas; Seeley, Charles; Kuenzler, Glenn; Wolfe, Jr., Charles; Utturkar, Yogen; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2013-05-07

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  7. The Role of Individual Differences and Situational Variables in the Use of Workplace Sexual Identity Management Strategies.

    Science.gov (United States)

    Reed, Louren; Leuty, Melanie E

    2016-07-01

    Examination of individual difference variables have been largely ignored within research on the use of workplace sexual identity management strategies. The current study examined personality traits (extraversion, openness, and neuroticism), facets of sexual identity development (identity confusion, internalized heterosexism), and situational variables (e.g., perceptions of workplace climate and heterosexism) in explaining the use of management strategies, as well as possible interactions between individual and situational factors. Perceptions of the workplace climate toward lesbian and gay individuals significantly related to the use each of the management strategies, and Internalized Heterosexism was found to significantly predict the use of the Explicitly Out strategy. Most interactions between individual difference and situational variables were not supported, with the exception of an interaction between workplace heterosexism and internalized homophobia in explaining the use of the Explicitly Out strategy.

  8. Managing organizational culture within a management system

    International Nuclear Information System (INIS)

    Comeau, L.; Watts, G.

    2009-01-01

    The Point Lepreau Generating Station (PLGS) is currently undergoing a major refurbishment of its nuclear reactor. At the same time, a small team is designing the organization that will operate the plant after refurbishment. This paper offers a high level overview of the Post-Refurbishment Organization (PRO) project and will focus primarily on the approach used to address organizational culture and human system dynamics. We will describe how various tools, used to assess organization culture, team performance, and individual self-understanding, are used collectively to place the right person in the right position. We will explain how the career system, Pathfinder, is used to integrate these tools to support a comprehensive model for organization design and development. Finally, we demonstrate how the management of organizational cultural and human system dynamics are integrated into the PLGS Integrated Management System. (author)

  9. Hospital managers need management information systems.

    Science.gov (United States)

    Davis, S; Freeman, J R

    1976-01-01

    A new hospital director seeking to bring his institution to the brink of solvency found himself with ten pounds of data but no "information"--at least, not the kind of information he could use as a basis for management decisions. What he needed was a system that would not only present data, but the meaning of the data. Such a system is the integrated MIS.

  10. An experimental maintenance management system.

    Science.gov (United States)

    1979-01-01

    The purpose of this study was to evaluate Virginia's maintenance management system and to recommend modifications directed at improving it. The study revealed that (1) the current system of allocating maintenance monies is based upon centerline milea...

  11. Cargo Data Management Demonstration System

    Science.gov (United States)

    1974-02-01

    Delays in receipt and creation of cargo documents are a problem in international trade. The work described demonstrates some of the advantages and capabilities of a computer-based cargo data management system. A demonstration system for data manageme...

  12. System analysis for radwaste management

    International Nuclear Information System (INIS)

    Lennemann, W.L.

    1987-01-01

    The most logical approach to evaluating radioactive waste management processes and their options is to consider radioactive waste management, handling, and disposal as a complete and complex system from the waste arisings to their disposition. The principal elements that should be considered or taken into account when making a decision involving one or more components of a radwaste management system essentially concern radiation doses or detriments- both radiological and industrial safety and both capital investments and operating costs. This paper discusses the system analysis of the low- and medium-level radioactive waste management

  13. Car insurance information management system

    OpenAIRE

    Sun, Yu

    2015-01-01

    A customer information system is a typical information management system. It involves three aspects, the backstage database establishment, the application development and the system maintenance. A car insurance information management system is based on browser/server structure. Microsoft SQL Server establishes the backstage database. Active Server Pages, from Microsoft as well is used as the interface layer. The objective of this thesis was to apply ASP to the dynamic storage of a web page...

  14. Integration of Standardized Management Systems: A Dilemma?

    Directory of Open Access Journals (Sweden)

    Manuel Ferreira Rebelo

    2015-06-01

    Full Text Available The growing proliferation of management systems standards (MSSs, and their individualized implementation, is a real problem faced by organizations. On the other hand, MSSs are aimed at improving efficiency and effectiveness of organizational responses in order to satisfy the requirements, needs and expectations of the stakeholders. Each organization has its own identity and this is an issue that cannot be neglected; hence, two possible approaches can be attended. First, continue with the implementation of individualized management systems (MSs; or, integrate the several MSSs versus related MSs into an integrated management system (IMS. Therefore, in this context, organizations are faced with a dilemma, as a result of the increasing proliferation and diversity of MSSs. This paper takes into account the knowledge gained through a case study conducted in the context of a Portuguese company and unveils some of the advantages and disadvantages of integration. A methodology is also proposed and presented to support organizations in developing and structuring the integration process of their individualized MSs, and consequently minimize problems that are generators of inefficiencies, value destruction and loss of competitiveness. The obtained results provide relevant information that can support Top Management decision in solving that dilemma and consequently promote a successful integration, including a better control of business risks associated to MSSs requirements and enhancing sustainable performance, considering the context in which organizations operate.

  15. IT Asset Management System -

    Data.gov (United States)

    Department of Transportation — ITAMS provides a web frontend for the managing of all HW Assets lifecycle data purchased by ATO since 2006. In addition it contains much of our Enterprise SW license...

  16. Password Management Systems

    OpenAIRE

    Fiala, Lukáš

    2010-01-01

    The goal is to describe and compare password management utilities and applications for individuals or small teams. Examples of such applications are KeePass, Password Safe, CodeWallet Pro and eWallet. On-line password managers like LastPass or RoboForm are another group of applications. Support for synchronization, sharing passwords in a team or protection against keyloggers (when filling in automatically) may also be included in the criteria.

  17. Autonomously managed electrical power systems

    Science.gov (United States)

    Callis, Charles P.

    1986-01-01

    The electric power systems for future spacecraft such as the Space Station will necessarily be more sophisticated and will exhibit more nearly autonomous operation than earlier spacecraft. These new power systems will be more reliable and flexible than their predecessors offering greater utility to the users. Automation approaches implemented on various power system breadboards are investigated. These breadboards include the Hubble Space Telescope power system test bed, the Common Module Power Management and Distribution system breadboard, the Autonomusly Managed Power System (AMPS) breadboard, and the 20 kilohertz power system breadboard. Particular attention is given to the AMPS breadboard. Future plans for these breadboards including the employment of artificial intelligence techniques are addressed.

  18. Coupled transverse and torsional vibrations in a mechanical system with two identical beams

    Science.gov (United States)

    Vlase, S.; Marin, M.; Scutaru, M. L.; Munteanu, R.

    2017-06-01

    The paper aims to study a plane system with bars, with certain symmetries. Such problems can be encountered frequently in industry and civil engineering. Considerations related to the economy of the design process, constructive simplicity, cost and logistics make the use of identical parts a frequent procedure. The paper aims to determine the properties of the eigenvalues and eigenmodes for transverse and torsional vibrations of a mechanical system where two of the three component bars are identical. The determination of these properties allows the calculus effort and the computation time and thus increases the accuracy of the results in such matters.

  19. Secure stand alone positive personnel identity verification system (SSA-PPIV)

    International Nuclear Information System (INIS)

    Merillat, P.D.

    1979-03-01

    The properties of a secure stand-alone positive personnel identity verification system are detailed. The system is designed to operate without the aid of a central computing facility and the verification function is performed in the absence of security personnel. Security is primarily achieved by means of data encryption on a magnetic stripe badge. Several operational configurations are discussed. Advantages and disadvantages of this system compared to a central computer driven system are detailed

  20. Intelligent Integrated System Health Management

    Science.gov (United States)

    Figueroa, Fernando

    2012-01-01

    Intelligent Integrated System Health Management (ISHM) is the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system (Management: storage, distribution, sharing, maintenance, processing, reasoning, and presentation). Presentation discusses: (1) ISHM Capability Development. (1a) ISHM Knowledge Model. (1b) Standards for ISHM Implementation. (1c) ISHM Domain Models (ISHM-DM's). (1d) Intelligent Sensors and Components. (2) ISHM in Systems Design, Engineering, and Integration. (3) Intelligent Control for ISHM-Enabled Systems

  1. Medical-Information-Management System

    Science.gov (United States)

    Alterescu, Sidney; Friedman, Carl A.; Frankowski, James W.

    1989-01-01

    Medical Information Management System (MIMS) computer program interactive, general-purpose software system for storage and retrieval of information. Offers immediate assistance where manipulation of large data bases required. User quickly and efficiently extracts, displays, and analyzes data. Used in management of medical data and handling all aspects of data related to care of patients. Other applications include management of data on occupational safety in public and private sectors, handling judicial information, systemizing purchasing and procurement systems, and analyses of cost structures of organizations. Written in Microsoft FORTRAN 77.

  2. Current management of gender identity disorder in childhood and adolescence: guidelines, barriers and areas of controversy.

    Science.gov (United States)

    Shumer, Daniel E; Spack, Norman P

    2013-02-01

    The approach to gender identity disorder (GID) in childhood and adolescence has been rapidly evolving and is in a state of flux. In an effort to form management recommendations on the basis of the available literature, The Endocrine Society published clinical practice guidelines in 2009. The guidelines recommend against sex role change in prepubertal children, but they recommend the use of gonadotropin-releasing hormone (GnRH) agonists to suppress puberty in adolescence, and the use of cross-sex hormones starting around age 16 for eligible patients. In actual practice, the approach to GID is quite variable due to continued lack of consensus and specific barriers to treatment that are unique to GID. Recent literature has focused on the mental health approach to prepubertal children with GID and short-term outcomes using pubertal suppression and cross-sex steroids in adolescents with GID. This review will describe the literature published since the release of The Endocrine Society guidelines regarding the management of GID in both children and adolescents.

  3. Underground risk management information systems

    Energy Technology Data Exchange (ETDEWEB)

    Matsuyama, S.; Inoue, M.; Sakai, T.

    2006-03-15

    JCOAL has conducted Joint Research on an Underground Communication and Risk Management Information System with CSIRO of Australia under a commissioned study project for the promotion of coal use starting in fiscal 2002. The goal of this research project is the establishment of a new Safety System focusing on the comprehensive risk management information system by the name of Nexsys. The main components of the system are the Ethernet type underground communication system that represents the data communication base, and the risk management information system that permits risk analysis in real-time and provides decision support based on the collected data. The Nexsys is an open system and is a core element of the underground monitoring system. Using a vast amount of underground data, it is capable of accommodating a wide range of functions that were not available in the past. Because of it, it is possible to construct an advanced underground safety system. 14 figs., 4 tabs.

  4. Organizational Identity Expressiveness and Perception Management : Principles for Expressing the Organizational Identity in Order to Manage External Stakeholders’ Perceptions of a Company

    NARCIS (Netherlands)

    M.D. van Halderen (Mignon)

    2008-01-01

    textabstractIt is especially during the past decade that stakeholders have become extremely heedful of organizations and their activities. A dominant organizational response of companies to this development is to express their organizational identity, in terms of who they are, what they stand for,

  5. Management systems in production operations

    International Nuclear Information System (INIS)

    Walters, K.B.; Henderson, G.

    1993-01-01

    The Cullen Enquiry into the Piper Alpha disaster in the U.K. North Sea recommended that an operator should formally present it's company Management System and demonstrate how safety is achieved throughout the life cycle of a platform, from design through operation to abandonment. Brunei Shell Petroleum has prepared a corporate level Safety Management System. As part of Safety Case work, the corporate system is being extended to include the development of specific Management Systems with particular emphasis on offshore production operations involving integrated oil and gas facilities. This paper will describe the development of Management Systems, which includes an intensive Business Process Analysis and will comment upon it's applicability and relationship to ISO 9000. The paper will further describe the applicability and benefits of Management Systems and offer guidance on required effort. The paper will conclude that development of structured Management Systems for safety critical business processes is worthwhile but prioritization of effort will be necessary. As such the full adoption of Management Systems will be directional in nature

  6. Canonical symmetry of a constrained Hamiltonian system and canonical Ward identity

    International Nuclear Information System (INIS)

    Li, Zi-ping

    1995-01-01

    An algorithm for the construction of the generators of the gauge transformation of a constrained Hamiltonian system is given. The relationships among the coefficients connecting the first constraints in the generator are made clear. Starting from the phase space generating function of the Green function, the Ward identity in canonical formalism is deduced. We point out that the quantum equations of motion in canonical form for a system with singular Lagrangian differ from the classical ones whether Dirac's conjecture holds true or not. Applications of the present formulation to the Abelian and non-Abelian gauge theories are given. The expressions for PCAC and generalized PCAC of the AVV vertex are derived exactly from another point of view. A new form of the Ward identity for gauge-ghost proper vertices is obtained which differs from the usual Ward-Takahashi identity arising from the BRS invariance

  7. Integrating the radioactive waste management system into other management systems

    International Nuclear Information System (INIS)

    Silva, Ana Cristina Lourenco da; Nunes Neto, Carlos Antonio

    2007-01-01

    Radioactive waste management is to be included in the Integrated Management System (IMS) which pursues the continuous improvement of the company's quality, occupational safety and health, and environment protection processes. Radioactive waste management is based on the following aspects: optimization of human and material resources for execution of tasks, including the provision of a radiation protection supervisor to watch over the management of radioactive waste; improved documentation (management plan and procedures); optimization of operational levels for waste classification and release; maintenance of generation records and history through a database that facilitates traceability of information; implementation of radioactive waste segregation at source (source identification, monitoring and decontamination) activities intended to reduce the amount of radioactive waste; licensing of initial storage site for radioactive waste control and storage; employee awareness training on radioactive waste generation; identification and evaluation of emergency situations and response planning; implementation of preventive maintenance program for safety related items; development and application of new, advanced treatment methodologies or systems. These aspects are inherent in the concepts underlying quality management (establishment of administrative controls and performance indicators), environment protection (establishment of operational levels and controls for release), occupational health and safety (establishment of operational controls for exposure in emergency and routine situations and compliance with strict legal requirements and standards). It is noted that optimizing the addressed aspects of a radioactive waste management system further enhances the efficiency of the Integrated Management System for Quality, Environment, and Occupational Safety and Health. (author)

  8. Information systems for risk management

    OpenAIRE

    Michael S. Gibson

    1997-01-01

    Risk management information systems are designed to overcome the problem of aggregating data across diverse trading units. The design of an information system depends on the risk measurement methodology that a firm chooses. Inherent in the design of both a risk management information system and a risk measurement methodology is a tradeoff between the accuracy of the resulting measures of risk and the burden of computing them. Technical progress will make this tradeoff more favorable over time...

  9. The effects of driver identity on driving safety in a retrospective feedback system.

    Science.gov (United States)

    Zhao, Guozhen; Wu, Changxu

    2012-03-01

    Retrospective feedback that provides detailed information on a driver's performance in critical driving situations at the end of a trip enhances his/her driving behaviors and safe driving habits. Although this has been demonstrated by a previous study, retrospective feedback can be further improved and applied to non-critical driving situations, which is needed for transportation safety. To propose a new retrospective feedback system that uses driver identity (i.e., a driver's name) and to experimentally study its effects on measures of driving performance and safety in a driving simulator. We conducted a behavioral experimental study with 30 participants. "Feedback type" was a between-subject variable with three conditions: no feedback (control group), feedback without driver identity, and feedback with driver identity. We measured multiple aspects of participants' driving behavior. To control for potential confounds, factors that were significantly correlated with driving behavior (e.g., age and driving experience) were all entered as covariates into a multivariate analysis of variance. To examine the effects of speeding on collision severity in driving simulation studies, we also developed a new index - momentum of potential collision - with a set of equations. Subjects who used a feedback system with driver identity had the fewest speeding violations and central-line crossings, spent the least amount of time speeding and crossing the central line, had the lowest speeding and central-line crossing magnitude, ran the fewest red lights, and had the smallest momentum of potential collision compared to the groups with feedback without driver identity and without feedback (control group). The new retrospective feedback system with driver identity has the potential to enhance a person's driving safety (e.g., speeding, central-line crossing, momentum of potential collision), which is an indication of the valence of one's name in a feedback system design. Copyright

  10. Brief Report: The Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS)--Factor Structure, Reliability, and Convergent Validity in French-Speaking University Students

    Science.gov (United States)

    Zimmermann, Gregoire; Mahaim, Elodie Biermann; Mantzouranis, Gregory; Genoud, Philippe A.; Crocetti, Elisabetta

    2012-01-01

    The purpose of this study was to evaluate the factor structure and the reliability of the French versions of the Identity Style Inventory (ISI-3) and the Utrecht-Management of Identity Commitments Scale (U-MICS) in a sample of college students (N = 457, 18-25 years old). Confirmatory factor analyses confirmed the hypothesized three-factor solution…

  11. Use of standardized multidimensional evaluation tools and the emergence of the case manager's professional identity in France.

    Science.gov (United States)

    Nugue, Mathilde; De Stampa, Matthieu; Couturier, Yves; Somme, Dominique

    2012-01-01

    In France, the national public health plan proposes a group of innovations including the initiation of case management for older adults in complex situations, particularly those with cognitive disorders. In this context, public authorities asked case managers to use a standardized multidimensional evaluation tool. The results of a qualitative study on the pertinence of such a tool relative to the emergence of this new professional field are described. Early use of an evaluation tool seems to be linked to the emergence of a new professional identity for recently recruited case managers. Factors determining the strength of this link are training tool standardization, computerization, and local structure's involvement. Our results contribute to identifying one of the ways by which professional identity can be changed to become a case manager.

  12. Energy management systems in buildings

    Energy Technology Data Exchange (ETDEWEB)

    Lush, D. M.

    1979-07-01

    An investigation is made of the range of possibilities available from three types of systems (automatic control devices, building envelope, and the occupants) in buildings. The following subjects are discussed: general (buildings, design and personnel); new buildings (envelope, designers, energy and load calculations, plant design, general design parameters); existing buildings (conservation measures, general energy management, air conditioned buildings, industrial buildings); man and motivation (general, energy management and documentation, maintenance, motivation); automatic energy management systems (thermostatic controls, optimized plant start up, air conditioned and industrial buildings, building automatic systems). (MCW)

  13. Evaluating a Skills Management System

    International Nuclear Information System (INIS)

    Largier, A.

    2013-01-01

    In order to anticipate the large number of people due to retire in the next few years, and to optimize the workforce contribution, IRSN (Institute for radiation protection and nuclear safety) is setting up skill management. This poster presents the IRSN's skill management system. The skill management system is based on a 4 step approach: -) identifying and listing the necessary skills, -) assessing the skills available, -) defining and setting up solutions: training, recruitment, out-sourcing), and -) feedback about the efficiency of the system. It appears that it is important to take into account the way the organization considers individual ability in order to favour collective proficiency

  14. HTR-10 management information system

    International Nuclear Information System (INIS)

    Liu Ruoxiao; Wu Zhongwang; Xi Shuren

    2000-01-01

    The HTR-10 Management information system (REMIS) strengthens the managerial level and usage of the information of HTR-10, thereby enhances the ability and efficiency of the design and management work. REMIS is designed based on the Client/Server framework. Database management system is SQL Server 6.5 for NT, While the client side is developed by Borland C ++ Builder, and it is based on Windows 95/98. The network protocol is TCP/IP. REMIS collects date of the HTR-10 at four parameters: Reactor properties, Design parameters, Equipment properties Reactor system flow charts. Final discussing extended prospect of REMIS

  15. The CMS workload management system

    Energy Technology Data Exchange (ETDEWEB)

    Cinquilli, M. [CERN; Evans, D. [Fermilab; Foulkes, S. [Fermilab; Hufnagel, D. [Fermilab; Mascheroni, M. [CERN; Norman, M. [UC, San Diego; Maxa, Z. [Caltech; Melo, A. [Vanderbilt U.; Metson, S. [Bristol U.; Riahi, H. [INFN, Perugia; Ryu, S. [Fermilab; Spiga, D. [CERN; Vaandering, E. [Fermilab; Wakefield, Stuart [Imperial Coll., London; Wilkinson, R. [Caltech

    2012-01-01

    CMS has started the process of rolling out a new workload management system. This system is currently used for reprocessing and Monte Carlo production with tests under way using it for user analysis. It was decided to combine, as much as possible, the production/processing, analysis and T0 codebases so as to reduce duplicated functionality and make best use of limited developer and testing resources. This system now includes central request submission and management (Request Manager), a task queue for parcelling up and distributing work (WorkQueue) and agents which process requests by interfacing with disparate batch and storage resources (WMAgent).

  16. The CMS workload management system

    International Nuclear Information System (INIS)

    Cinquilli, M; Mascheroni, M; Spiga, D; Evans, D; Foulkes, S; Hufnagel, D; Ryu, S; Vaandering, E; Norman, M; Maxa, Z; Wilkinson, R; Melo, A; Metson, S; Riahi, H; Wakefield, S

    2012-01-01

    CMS has started the process of rolling out a new workload management system. This system is currently used for reprocessing and Monte Carlo production with tests under way using it for user analysis. It was decided to combine, as much as possible, the production/processing, analysis and T0 codebases so as to reduce duplicated functionality and make best use of limited developer and testing resources. This system now includes central request submission and management (Request Manager); a task queue for parcelling up and distributing work (WorkQueue) and agents which process requests by interfacing with disparate batch and storage resources (WMAgent).

  17. An exploration of mothers' and fathers' views of their identities in chronic-kidney-disease management: parents as students?

    Science.gov (United States)

    Swallow, Veronica

    2008-12-01

    To explore parents' views of their identities as they learn to manage their child's chronic kidney disease. Parents are expected to participate in management and usually learn necessary skills from the multidisciplinary team. Research highlights the importance of professionals defining parents' management roles in chronic disease; but little is known about parents' views on their own identities as the complex and dynamic process of teaching and learning unfolds around their child's condition. According to positioning theory, identity development is a dynamic and fluid process that occurs during interaction, with each person positioning themselves while simultaneously positioning the other person, yet this concept has not been considered in relation to parents' contributions to disease management. A longitudinal, grounded theory study conducted in a UK Children's Kidney Unit. This paper focuses on one aspect of a larger study exploring family learning in disease management. Six mothers and two fathers of six children with a recently diagnosed chronic kidney disease participated in a total of 21 semi-structured interviews during the 18 months after referral to the unit. Interviews included discussion about the parts they played in relation to professionals during the management process. Findings were interpreted within a framework of positioning theory. Parents participated in teaching/learning/assessment that was both planned (involving allocated clinical lessons and tasks) and spontaneous (in response to current situations), to facilitate their participation. They positioned multidisciplinary team members as teachers as well as professionals, simultaneously positioning themselves as students as well as parents. Parents' clinical duties and obligations are not an automatic part of parenting but become part of the broader process of sharing disease management, this can lead to them assuming the additional identity of a 'student'. Involving parents in ongoing

  18. Customer relationship management system

    OpenAIRE

    Selenis, Laimonas

    2004-01-01

    Customer Relationship Management (CRM) is one of the biggest problems for many companies today. By analyzing history records (profiles) of its customers, organization can effectively adapt its business activity to users needs and create better products and services. Proper analysis of customer profiles can help to predict the behaviour of the customers. After grouping customer profiles by similar attributes, company can easier handle its interactions with similar users. Such group profiling c...

  19. Management systems for regulatory authorities

    International Nuclear Information System (INIS)

    Mpandanyama, Rujeko Lynette

    2015-02-01

    For a regulatory body to fulfil its statutory obligations, there is need to develop and implement a regulatory management system that has the necessary arrangements for achieving and maintaining high quality performance in regulating the safety of nuclear and radiation facilities under its authority. Hence, the regulatory management system needs to fully integrate the human resources, processes and physical resources of the organization. This study sought to provide an understanding of the concept, principles, policies and fundamentals of management systems as they relate to regulatory systems in the field of radiation protection and to make appropriate recommendations to ensure that an effective management system exists for the control of ionizing radiation and radiation sources and addresses all relevant stakeholders in Zimbabwe. A comparative analysis was done on the current management status and the ideal management system, which led to the identification of the gaps existing. The main key that was found to be of significance was lack of linkages between processes and management tools within the institution. (au)

  20. INTEGRATION OF ENVIRONMENTAL MANAGEMENT SYSTEM

    OpenAIRE

    Tomescu Ada Mirela

    2012-01-01

    The relevance of management as significant factor of business activity can be established on various management systems. These will help to obtain, organise, administrate, evaluate and control particulars: information, quality, environmental protection, health and safety, various resources (time, human, finance, inventory etc). The complexity of nowadays days development, forced us to think ‘integrated’. Sustainable development principles require that environment management policies and p...

  1. Information Security Management System toolkit

    OpenAIRE

    Καραμανλής, Μάνος; Karamanlis, Manos

    2016-01-01

    Secure management of information is becoming critical for any organization because information is one of the most valuable assets in organization’s business operations. An Information security management system (ISMS) consists of the policies, procedures, guidelines, and associated resources and activities, collectively managed by an organization, in the pursuit of protecting its information assets. An ISMS is a systematic approach for establishing, implementing, operating, mon...

  2. Quality management systems in radiology

    Directory of Open Access Journals (Sweden)

    Geoffrey K. Korir

    2013-08-01

    Objective: To assess the level of quality management systems in X-ray medical facilities in Kenya. Methods: Quality management inspection, quality control performance tests and patient radiation exposure were assessed in 54 representative X-ray medical facilities. Additionally, a survey of X-ray examination frequency was conducted in 140 hospitals across the country. Results: The overall findings placed the country’s X-ray imaging quality management systems at 61±3% out of a possible 100%. The most and the least quality assurance performance indicators were general radiography X-ray equipment quality control tests at 88±4%, and the interventional cardiology adult examinations below diagnostic reference level at 25±1%, respectively. Conclusions: The study used a systematic evidence-based approach for the assessment of national quality management systems in radiological practice in clinical application, technical conduct of the procedure, image quality criteria, and patient characteristics as part of the quality management programme.

  3. Contributions of the Life Story Method for Studies on Identity: the example of study about female professors in management positions

    Directory of Open Access Journals (Sweden)

    Adílio Renê Almeida Miranda

    2014-12-01

    Full Text Available Recently, the Life Story Method has been used in the area of Business Administration as an important methodological strategy in qualitative research. The purpose is to understand groups or collective bodies based on individual paths of life. Thus, the goal of this study was to show the contribution of the life story method in understanding the identity dynamics of female professors managing a public university, by means of an example derived from an empirical study. It was observed from the reports of four female professors involved in management that recovery of past memories, as well as of values, facts, standards and occurrences connected with the primary and organizational socialization of the interviewees, contributes to understanding of their identity dynamics. Some categories of analysis emerged that express relationships between life story and identity, e.g., discontinuity, subjectivity and the importance of allowing an individual/subject to speak; the individual and the social sphere and socio-historical transformations, a dynamic interaction in construction of identities; and temporal analysis in construction of identities.

  4. Description of identical particles via gauged matrix models: a generalization of the Calogero-Sutherland system

    International Nuclear Information System (INIS)

    Park, Jeong-Hyuck

    2003-01-01

    We elaborate the idea that the matrix models equipped with the gauge symmetry provide a natural framework to describe identical particles. After demonstrating the general prescription, we study an exactly solvable harmonic oscillator type gauged matrix model. The model gives a generalization of the Calogero-Sutherland system where the strength of the inverse square potential is not fixed but dynamical bounded by below

  5. Quadratic integrals of motion for identical particle systems in quantum case

    International Nuclear Information System (INIS)

    Brije, I.; Gonera, S.; Kosinski, P.; Maslanka, P.; Giller, S.

    2005-01-01

    One studied quantum dynamic systems of identical particles allowing for additional integral of motion being quadratic in pulses. It was found that there was an appropriate way to ensure order that enabled to convert the classical integrals of motion into their quantum analogues. One analyzed relation of the mentioned integrals with splitting of the variables in the Schroedinger equation [ru

  6. Security extension for the Canetti-Krawczyk model in identity-based systems

    Institute of Scientific and Technical Information of China (English)

    LI Xinghua; MA Jianfeng; SangJae Moon

    2005-01-01

    The Canetti-Krawczyk (CK) model is a formalism for the analysis of keyexchange protocols, which can guarantee many security properties for the protocols proved secure by this model. But we find this model lacks the ability to guarantee key generation center (KGC) forward secrecy, which is an important security property for key-agreement protocols based on Identity. The essential reason leading to this weakness is that it does not fully consider the attacker's capabilities. In this paper, the CK model is accordingly extended with a new additional attacker's capability of the KGC corruption in Identity-based systems, which enables it to support KGC forward secrecy.

  7. Choosing fatherhood: how teens in the justice system embrace or reject a father identity.

    Science.gov (United States)

    Shade, Kate; Kools, Susan; Pinderhughes, Howard; Weiss, Sandra J

    2012-01-01

    The purpose of this qualitative study was to further the understanding of father identity and role development among adolescents involved in the justice system. Youth who were expecting a child or parenting an infant and who were incarcerated, arrested, or had admitted to criminal behavior participated in interviews and observations in a juvenile detention center and in the community. Data analysis revealed 4 patterns of fathering intentions: (a) embracing fatherhood, (b) being barred from fatherhood, (c) being ambivalent about fatherhood, or (d) rejecting fatherhood. Community health nurses can use this information to assess father identity status and address factors that interfere with father engagement. Copyright © Taylor & Francis Group, LLC

  8. Contrasting differences in identity and agency between narrative and autopoietic systems

    Directory of Open Access Journals (Sweden)

    Nico Buitendag

    2013-07-01

    Full Text Available The article aims at contrasting the autopoietic understanding of an individual and her or his actions as described by Niklas Luhmann with Paul Ricoeur’s notion of narrative identity, focusing on people as legal subjects. The article assumes that when legal subjects necessitate ethical engagement and evaluation, the law could cease to deal with problems in a mere legalistic fashion but is allowed the freedom to appeal to norms of justice external to itself as in other natural law theories. Through narrative identity the deeds of role players are to be understood in greater complexity than what a self-referential legal system is comfortable in dealing with.

  9. Management system of instrument database

    International Nuclear Information System (INIS)

    Zhang Xin

    1997-01-01

    The author introduces a management system of instrument database. This system has been developed using with Foxpro on network. The system has some characters such as clear structure, easy operation, flexible and convenient query, as well as the data safety and reliability

  10. Nuclear database management systems

    International Nuclear Information System (INIS)

    Stone, C.; Sutton, R.

    1996-01-01

    The authors are developing software tools for accessing and visualizing nuclear data. MacNuclide was the first software application produced by their group. This application incorporates novel database management and visualization tools into an intuitive interface. The nuclide chart is used to access properties and to display results of searches. Selecting a nuclide in the chart displays a level scheme with tables of basic, radioactive decay, and other properties. All level schemes are interactive, allowing the user to modify the display, move between nuclides, and display entire daughter decay chains

  11. Army Healthcare Enterprise Management System

    National Research Council Canada - National Science Library

    2001-01-01

    ... to buy the Enterprise Management System. The Information Technology Business Center provides information technology services to Fort Sam Houston tenants which include the Army Medical Command and the Army Medical Department Center and School...

  12. Fault management and systems knowledge

    Science.gov (United States)

    2016-12-01

    Pilots are asked to manage faults during flight operations. This leads to the training question of the type and depth of system knowledge required to respond to these faults. Based on discussions with multiple airline operators, there is agreement th...

  13. Congestion Management System Process Report

    Science.gov (United States)

    1996-03-01

    In January 1995, the Indianapolis Metropolitan Planning Organization with the help of an interagency Study Review Committee began the process of developing a Congestion Management System (CMS) Plan resulting in this report. This report documents the ...

  14. Introducing Managers to Expert Systems.

    Science.gov (United States)

    Finlay, Paul N.; And Others

    1991-01-01

    Describes a short course to expose managers to expert systems, consisting of (1) introductory lecture; (2) supervised computer tutorial; (3) lecture and discussion about knowledge structuring and modeling; and (4) small group work on a case study using computers. (SK)

  15. Pembangunan Model Restaurant Management System

    Directory of Open Access Journals (Sweden)

    Fredy Jingga

    2014-12-01

    Full Text Available Model design for Restaurant Management System aims to help in restaurant business process, where Restaurant Management System (RMS help the waitress and chef could interact each other without paper limitation.  This Restaurant Management System Model develop using Agile Methodology and developed based on PHP Programming Langguage. The database management system is using MySQL. This web-based application model will enable the waitress and the chef to interact in realtime, from the time they accept the customer order until the chef could know what to cook and checklist for the waitress wheter the order is fullfill or not, until the cahsier that will calculate the bill and the payment that they accep from the customer.

  16. System Wide Information Management (SWIM)

    Science.gov (United States)

    Hritz, Mike; McGowan, Shirley; Ramos, Cal

    2004-01-01

    This viewgraph presentation lists questions regarding the implementation of System Wide Information Management (SWIM). Some of the questions concern policy issues and strategies, technology issues and strategies, or transition issues and strategies.

  17. Electronic Resource Management Systems

    Directory of Open Access Journals (Sweden)

    Mark Ellingsen

    2004-10-01

    Full Text Available Computer applications which deal with electronic resource management (ERM are quite a recent development. They have grown out of the need to manage the burgeoning number of electronic resources particularly electronic journals. Typically, in the early years of e-journal acquisition, library staff provided an easy means of accessing these journals by providing an alphabetical list on a web page. Some went as far as categorising the e-journals by subject and then grouping the journals either on a single web page or by using multiple pages. It didn't take long before it was recognised that it would be more efficient to dynamically generate the pages from a database rather than to continually edit the pages manually. Of course, once the descriptive metadata for an electronic journal was held within a database the next logical step was to provide administrative forms whereby that metadata could be manipulated. This in turn led to demands for incorporating more information and more functionality into the developing application.

  18. RIMS: Resource Information Management System

    Science.gov (United States)

    Symes, J.

    1983-01-01

    An overview is given of the capabilities and functions of the resource management system (RIMS). It is a simple interactive DMS tool which allows users to build, modify, and maintain data management applications. The RIMS minimizes programmer support required to develop/maintain small data base applications. The RIMS also assists in bringing the United Information Services (UIS) budget system work inhouse. Information is also given on the relationship between the RIMS and the user community.

  19. CLASSIFICATION OF LEARNING MANAGEMENT SYSTEMS

    Directory of Open Access Journals (Sweden)

    Yu. B. Popova

    2016-01-01

    Full Text Available Using of information technologies and, in particular, learning management systems, increases opportunities of teachers and students in reaching their goals in education. Such systems provide learning content, help organize and monitor training, collect progress statistics and take into account the individual characteristics of each user. Currently, there is a huge inventory of both paid and free systems are physically located both on college servers and in the cloud, offering different features sets of different licensing scheme and the cost. This creates the problem of choosing the best system. This problem is partly due to the lack of comprehensive classification of such systems. Analysis of more than 30 of the most common now automated learning management systems has shown that a classification of such systems should be carried out according to certain criteria, under which the same type of system can be considered. As classification features offered by the author are: cost, functionality, modularity, keeping the customer’s requirements, the integration of content, the physical location of a system, adaptability training. Considering the learning management system within these classifications and taking into account the current trends of their development, it is possible to identify the main requirements to them: functionality, reliability, ease of use, low cost, support for SCORM standard or Tin Can API, modularity and adaptability. According to the requirements at the Software Department of FITR BNTU under the guidance of the author since 2009 take place the development, the use and continuous improvement of their own learning management system.

  20. Automated Maintenance Management System -

    Data.gov (United States)

    Department of Transportation — To achieve the to-be state of a modernized supply chain infrastructure and the NextGen Mission Service Requirements, the System Information Modernization initiative...

  1. Impact Management System

    Data.gov (United States)

    US Agency for International Development — IMS (developed w/Iraq mission) is a system for conducting quality portfolio impact analysis, linking projects to strategy through integration of context data. IMS...

  2. Management Information Systems

    OpenAIRE

    Furduescu Bogdan-Alexandru

    2017-01-01

    Technology is the science that studies processes, methods and operations run or applied onto raw materials, matters or data, in order to obtain a certain product. Information is the material signal able to launch a material reaction of a dynamic auto-tuning system for which the system is conditioned and finalized. Information Technology is the technology needed for handling (procuring, processing, storing converting and transmitting) information, in particular, with the use of computers [Long...

  3. Adequate Security Protocols Adopt in a Conceptual Model in Identity Management for the Civil Registry of Ecuador

    Science.gov (United States)

    Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio

    2017-08-01

    We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).

  4. Evaluating safety management system implementation

    International Nuclear Information System (INIS)

    Preuss, M.

    2009-01-01

    Canada is committed to not only maintaining, but also improving upon our record of having one of the safest aviation systems in the world. The development, implementation and maintenance of safety management systems is a significant step towards improving safety performance. Canada is considered a world leader in this area and we are fully engaged in implementation. By integrating risk management systems and business practices, the aviation industry stands to gain better safety performance with less regulatory intervention. These are important steps towards improving safety and enhancing the public's confidence in the safety of Canada's aviation system. (author)

  5. Device configuration-management system

    International Nuclear Information System (INIS)

    Nowell, D.M.

    1981-01-01

    The Fusion Chamber System, a major component of the Magnetic Fusion Test Facility, contains several hundred devices which report status to the Supervisory Control and Diagnostic System for control and monitoring purposes. To manage the large number of diversity of devices represented, a device configuration management system was required and developed. Key components of this software tool include the MFTF Data Base; a configuration editor; and a tree structure defining the relationships between the subsystem devices. This paper will describe how the configuration system easily accomodates recognizing new devices, restructuring existing devices, and modifying device profile information

  6. Site systems engineering: Systems engineering management plan

    Energy Technology Data Exchange (ETDEWEB)

    Grygiel, M.L. [Westinghouse Hanford Co., Richland, WA (United States)

    1996-05-03

    The Site Systems Engineering Management Plan (SEMP) is the Westinghouse Hanford Company (WHC) implementation document for the Hanford Site Systems Engineering Policy, (RLPD 430.1) and Systems Engineering Criteria Document and Implementing Directive, (RLID 430.1). These documents define the US Department of Energy (DOE), Richland Operations Office (RL) processes and products to be used at Hanford to implement the systems engineering process at the site level. This SEMP describes the products being provided by the site systems engineering activity in fiscal year (FY) 1996 and the associated schedule. It also includes the procedural approach being taken by the site level systems engineering activity in the development of these products and the intended uses for the products in the integrated planning process in response to the DOE policy and implementing directives. The scope of the systems engineering process is to define a set of activities and products to be used at the site level during FY 1996 or until the successful Project Hanford Management Contractor (PHMC) is onsite as a result of contract award from Request For Proposal DE-RP06-96RL13200. Following installation of the new contractor, a long-term set of systems engineering procedures and products will be defined for management of the Hanford Project. The extent to which each project applies the systems engineering process and the specific tools used are determined by the project`s management.

  7. Interconnecting heterogeneous database management systems

    Science.gov (United States)

    Gligor, V. D.; Luckenbaugh, G. L.

    1984-01-01

    It is pointed out that there is still a great need for the development of improved communication between remote, heterogeneous database management systems (DBMS). Problems regarding the effective communication between distributed DBMSs are primarily related to significant differences between local data managers, local data models and representations, and local transaction managers. A system of interconnected DBMSs which exhibit such differences is called a network of distributed, heterogeneous DBMSs. In order to achieve effective interconnection of remote, heterogeneous DBMSs, the users must have uniform, integrated access to the different DBMs. The present investigation is mainly concerned with an analysis of the existing approaches to interconnecting heterogeneous DBMSs, taking into account four experimental DBMS projects.

  8. Emergency management information system (EMINS)

    International Nuclear Information System (INIS)

    Desonier, L.M.

    1987-01-01

    In a time of crisis or in an emergency, a manager is required to make many decisions to facilitate the proper solution and conclusion to the emergency or crisis. In order to make these decisions, it is necessary for the manager to have correct up-to-date information on the situation, which calls for an automated information display and entry process. The information handling needs are identified in terms of data, video, and voice. Studies of existing Emergency Operations Centers and evaluations of hardware and software have been completed. The result of these studies and investigations is the design and implementation of an automated Emergency Management Information System. Not only is the system useful for Emergency Management but for any information management requirement

  9. Management information systems. [United Kingdom

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, D.; Spence, A.C.

    1985-02-01

    The successful application in the United Kingdom of the real time monitoring and control systems (MINOS) for underground mining operations, particularly in coal transport and the development of coalface monitoring (FIDO) in 1980 led naturally to the design of an operational data base for management. A User Group of experienced colliery managers produced a Management Information System (MIS) requirements specification and began the evolution of the systems of today. Twenty-four mines operate MIS in different ways from total dependency to a means of checking their manual reporting system. MIS collects useful data from all the major MINOS applications and provides a means of manually inputting other, relevant information. A wide variety of displays and reports are available to management, adjusted to meet individual requirements. The benefits from the use of MIS are difficult to quantify, since they become part of the management process. Further developments are taking place based on operational experience and requirements and taking advantage of the recent advances in computer technology. MIS is the modern management tool in British coal mining, collecting, storing, analysing and presenting accurate information upon which management decision making is based.

  10. Systems Engineering Management Procedures

    Science.gov (United States)

    1966-03-10

    hls -iii-rit. -miiiirme 4 --tandnirdized hle iil*ri oa;iu ’ -enperfrm)a- -yýfefi ~lall uitm l--im eniai~ atar n which will lumPremiiieuiea -. v-imli m...with standard component/part selection. and de- tile total system requirements stated in the Sys- tailed functional and physical interfaces: eval- tern...system survivability requirAent. As physical , interface, time, environment, use of these facility requirements are bei developed, standard perts; and

  11. Disposal Site Information Management System

    International Nuclear Information System (INIS)

    Larson, R.A.; Jouse, C.A.; Esparza, V.

    1986-01-01

    An information management system for low-level waste shipped for disposal has been developed for the Nuclear Regulatory Commission (NRC). The Disposal Site Information Management System (DSIMS) was developed to provide a user friendly computerized system, accessible through NRC on a nationwide network, for persons needing information to facilitate management decisions. This system has been developed on NOMAD VP/CSS, and the data obtained from the operators of commercial disposal sites are transferred to DSIMS semiannually. Capabilities are provided in DSIMS to allow the user to select and sort data for use in analysis and reporting low-level waste. The system also provides means for describing sources and quantities of low-level waste exceeding the limits of NRC 10 CFR Part 61 Class C. Information contained in DSIMS is intended to aid in future waste projections and economic analysis for new disposal sites

  12. Integrated Project Management System description

    International Nuclear Information System (INIS)

    1987-03-01

    The Uranium Mill Tailings Remedial Action (UMTRA) Project is a Department of Energy (DOE) designated Major System Acquisition (MSA). To execute and manage the Project mission successfully and to comply with the MSA requirements, the UMTRA Project Office (''Project Office'') has implemented and operates an Integrated Project Management System (IPMS). The Project Office is assisted by the Technical Assistance Contractor's (TAC) Project Integration and Control (PIC) Group in system operation. Each participant, in turn, provides critical input to system operation and reporting requirements. The IPMS provides a uniform structured approach for integrating the work of Project participants. It serves as a tool for planning and control, workload management, performance measurement, and specialized reporting within a standardized format. This system description presents the guidance for its operation. Appendices 1 and 2 contain definitions of commonly used terms and abbreviations and acronyms, respectively. 17 figs., 5 tabs

  13. Environmental management: A system approach

    Science.gov (United States)

    Petak, William J.

    1981-05-01

    This paper presents a system framework whose purpose is to improve understanding of environmental management. By analyzing the links between elements of the environmental management system, it is possible to construct a model that aids thinking systematically about the decision-making subsystem, and other subsystems, of the entire environmental management system. Through a multidisciplinary environmental approach, each of the individual subsystems is able to adapt to threats and opportunities. The fields of government, market economics, social responsibility and ecology, for example, are so complex that it is extremely difficult to develop a framework that gives full consideration to all aspects. This paper, through the application of a highly idealized system framework, attempts to show the general relationships that exist between complex system elements.

  14. Management systems for service providers

    International Nuclear Information System (INIS)

    Bolokonya, Herbert Chiwalo

    2015-02-01

    In the field of radiation safety and protection there are a number of institutions that are involved in achieving different goals and strategies. These strategies and objectives are achieved based on a number of tools and systems, one of these tools and systems is the use of a management system. This study aimed at reviewing the management system concept for Technical Service Providers in the field of radiation safety and protection. The main focus was on personal monitoring services provided by personal dosimetry laboratories. A number of key issues were found to be prominent to make the management system efficient. These are laboratory accreditation, approval; having a customer driven operating criteria; and controlling of records and good reporting. (au)

  15. Implementation of integrated management system

    International Nuclear Information System (INIS)

    Gaspar Junior, Joao Carlos A.; Fonseca, Victor Zidan da

    2007-01-01

    In present day exist quality assurance system, environment, occupational health and safety such as ISO9001, ISO14001 and OHSAS18001 and others standards will can create. These standards can be implemented and certified they guarantee one record system, quality assurance, documents control, operational control, responsibility definition, training, preparing and serve to emergency, monitoring, internal audit, corrective action, continual improvement, prevent of pollution, write procedure, reduce costs, impact assessment, risk assessment , standard, decree, legal requirements of municipal, state, federal and local scope. These procedure and systems when isolate applied cause many management systems and bureaucracy. Integration Management System reduce to bureaucracy, excess of documents, documents storage and conflict documents and easy to others standards implementation in future. The Integrated Management System (IMS) will be implemented in 2007. INB created a management group for implementation, this group decides planing, works, policy and advertisement. Legal requirements were surveyed, internal audits, pre-audits and audits were realized. INB is partially in accordance with ISO14001, OSHAS18001 standards. But very soon, it will be totally in accordance with this norms. Many studies and works were contracted to deal with legal requirements. This work have intention of show implementation process of ISO14001, OHSAS18001 and Integrated Management System on INB. (author)

  16. The JCMT Telescope Management System

    Science.gov (United States)

    Tilanus, Remo P. J.; Jenness, Tim; Economou, Frossie; Cockayne, Steve

    Established telescopes often face a challenge when trying to incorporate new software standards and utilities into their existing real-time control system. At the JCMT we have successfully added important new features such as a Relational Database (the Telescope Management System---TMS), an online data Archive, and WWW based utilities to an, in part, 10-year old system. The new functionality was added with remarkably few alterations to the existing system. We are still actively expanding and exploring these new capabilities.

  17. The decommissioning information management system

    International Nuclear Information System (INIS)

    Park, Seung-Kook; Moon, Jei-Kwon

    2015-01-01

    At the Korea Atomic Energy Research Institute (KAERI), the Korea Research Reactor (KRR-2) and one uranium conversion plant (UCP) were decommissioned. A project was launched in 1997, for the decommissioning of KRR-2 reactor with the goal of completion by 2008. Another project for the decommissioning of the UCP was launched in 2001. The physical dismantling works were started in August 2003 and the entire project was completed by the end of 2010. KAERI has developed a computer information system, named DECOMMIS, for an information management with an increased effectiveness for decommissioning projects and for record keeping for the future decommissioning projects. This decommissioning information system consists of three sub-systems; code management system, data input system (DDIS) and data processing and output system (DDPS). Through the DDIS, the data can be directly inputted at sites to minimize the time gap between the dismantling activities and the evaluation of the data by the project staff. The DDPS provides useful information to the staff for more effective project management and this information includes several fields, such as project progress management, man power management, waste management, and radiation dose control of workers and so on. The DECOMMIS was applied to the decommissioning projects of the KRR-2 and the UCP, and was utilized to give information to the staff for making decisions regarding the progress of projects. It is also to prepare the reference data for the R and D program which is for the development of the decommissioning engineering system tools and to maintain the decommissioning data for the next projects. In this paper, the overall system will be explained and the several examples of its utilization, focused on waste management and manpower control, will be introduced. (author)

  18. Identical and Nonidentical Synchronization of Hyperchaotic Systems by Active Backstepping Method

    Directory of Open Access Journals (Sweden)

    A. Abooee

    2012-09-01

    Full Text Available This paper focuses on the tracking and synchronization problems of hyperchaotic systems based on active backstepping method. The method consists of a recursive approach that interlaces the choice of a Lyapunov function with the design of feedback control. First, a nonlinear recursive active backstepping control vector is designed to track any desired trajectory in hyperchaotic Wang system. Furthermore, this method is applied to achieve hyperchaos synchronization of two identical hyperchaotic Wang systems. Also, it is used to implement global asymptotic synchronization between hyperchaotic Wang system and hyperchaotic Rössler system. Numerical simulations have been employed to verify the effectiveness of the three designed active backstepping control vectors.

  19. Integrated Systems Health Management for Intelligent Systems

    Science.gov (United States)

    Figueroa, Fernando; Melcher, Kevin

    2011-01-01

    The implementation of an integrated system health management (ISHM) capability is fundamentally linked to the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system. It is akin to having a team of experts who are all individually and collectively observing and analyzing a complex system, and communicating effectively with each other in order to arrive at an accurate and reliable assessment of its health. In this paper, concepts, procedures, and approaches are presented as a foundation for implementing an intelligent systems ]relevant ISHM capability. The capability stresses integration of DIaK from all elements of a system. Both ground-based (remote) and on-board ISHM capabilities are compared and contrasted. The information presented is the result of many years of research, development, and maturation of technologies, and of prototype implementations in operational systems.

  20. DKIST facility management system integration

    Science.gov (United States)

    White, Charles R.; Phelps, LeEllen

    2016-07-01

    The Daniel K. Inouye Solar Telescope (DKIST) Observatory is under construction at Haleakalā, Maui, Hawai'i. When complete, the DKIST will be the largest solar telescope in the world. The Facility Management System (FMS) is a subsystem of the high-level Facility Control System (FCS) and directly controls the Facility Thermal System (FTS). The FMS receives operational mode information from the FCS while making process data available to the FCS and includes hardware and software to integrate and control all aspects of the FTS including the Carousel Cooling System, the Telescope Chamber Environmental Control Systems, and the Temperature Monitoring System. In addition it will integrate the Power Energy Management System and several service systems such as heating, ventilation, and air conditioning (HVAC), the Domestic Water Distribution System, and the Vacuum System. All of these subsystems must operate in coordination to provide the best possible observing conditions and overall building management. Further, the FMS must actively react to varying weather conditions and observational requirements. The physical impact of the facility must not interfere with neighboring installations while operating in a very environmentally and culturally sensitive area. The FMS system will be comprised of five Programmable Automation Controllers (PACs). We present a pre-build overview of the functional plan to integrate all of the FMS subsystems.

  1. Information Systems and Management Training.

    Science.gov (United States)

    Curry, B.; Smith, D. G.

    1991-01-01

    A case study of a South Wales manufacturer illustrates the need for companies to adopt an integrated strategy for computerization and information systems. Lack of management training blending computing and business skills can have a crippling effect on system development and organizational health. (SK)

  2. Tennessee Offender Management Information System

    OpenAIRE

    Beck, Tim

    1993-01-01

    This article describes the integration of a knowledge-based system with a large COBOL-DB2-based offender management system. The knowledge-based application, developed for the purpose of offender sentence calculation, is shown to provide several benefits, including a shortened development cycle, simplified maintenance, and improved accuracy over a previous COBOL-based application.

  3. Automated plant, production management system

    Science.gov (United States)

    Aksenova, V. I.; Belov, V. I.

    1984-12-01

    The development of a complex of tasks for the operational management of production (OUP) within the framework of an automated system for production management (ASUP) shows that it is impossible to have effective computations without reliable initial information. The influence of many factors involving the production and economic activity of the entire enterprise upon the plan and course of production are considered. It is suggested that an adequate model should be available which covers all levels of the hierarchical system: workplace, section (bridgade), shop, enterprise, and the model should be incorporated into the technological sequence of performance and there should be provisions for an adequate man machine system.

  4. Cybersecurity managing systems, conducting testing, and investigating intrusions

    CERN Document Server

    Mowbray, Thomas J

    2013-01-01

    A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a usef

  5. Electromagnetic spectrum management system

    Science.gov (United States)

    Seastrand, Douglas R.

    2017-01-31

    A system for transmitting a wireless countermeasure signal to disrupt third party communications is disclosed that include an antenna configured to receive wireless signals and transmit wireless counter measure signals such that the wireless countermeasure signals are responsive to the received wireless signals. A receiver processes the received wireless signals to create processed received signal data while a spectrum control module subtracts known source signal data from the processed received signal data to generate unknown source signal data. The unknown source signal data is based on unknown wireless signals, such as enemy signals. A transmitter is configured to process the unknown source signal data to create countermeasure signals and transmit a wireless countermeasure signal over the first antenna or a second antenna to thereby interfere with the unknown wireless signals.

  6. Electromagnetic spectrum management system

    Energy Technology Data Exchange (ETDEWEB)

    Seastrand, Douglas R.

    2017-10-17

    A system for transmitting a wireless countermeasure signal to disrupt third party communications is disclosed that include an antenna configured to receive wireless signals and transmit wireless counter measure signals such that the wireless countermeasure signals are responsive to the received wireless signals. A receiver processes the received wireless signals to create processed received signal data while a spectrum control module subtracts known source signal data from the processed received signal data to generate unknown source signal data. The unknown source signal data is based on unknown wireless signals, such as enemy signals. A transmitter is configured to process the unknown source signal data to create countermeasure signals and transmit a wireless countermeasure signal over the first antenna or a second antenna to thereby interfere with the unknown wireless signals.

  7. Autonomously managed high power systems

    International Nuclear Information System (INIS)

    Weeks, D.J.; Bechtel, R.T.

    1985-01-01

    The need for autonomous power management capabilities will increase as the power levels of spacecraft increase into the multi-100 kW range. The quantity of labor intensive ground and crew support consumed by the 9 kW Skylab cannot be afforded in support of a 75-300 kW Space Station or high power earth orbital and interplanetary spacecraft. Marshall Space Flight Center is managing a program to develop necessary technologies for high power system autonomous management. To date a reference electrical power system and automation approaches have been defined. A test facility for evaluation and verification of management algorithms and hardware has been designed with the first of the three power channel capability nearing completion

  8. Operational Management System for Regulated Water Systems

    Science.gov (United States)

    van Loenen, A.; van Dijk, M.; van Verseveld, W.; Berger, H.

    2012-04-01

    Most of the Dutch large rivers, canals and lakes are controlled by the Dutch water authorities. The main reasons concern safety, navigation and fresh water supply. Historically the separate water bodies have been controlled locally. For optimizating management of these water systems an integrated approach was required. Presented is a platform which integrates data from all control objects for monitoring and control purposes. The Operational Management System for Regulated Water Systems (IWP) is an implementation of Delft-FEWS which supports operational control of water systems and actively gives advice. One of the main characteristics of IWP is that is real-time collects, transforms and presents different types of data, which all add to the operational water management. Next to that, hydrodynamic models and intelligent decision support tools are added to support the water managers during their daily control activities. An important advantage of IWP is that it uses the Delft-FEWS framework, therefore processes like central data collection, transformations, data processing and presentation are simply configured. At all control locations the same information is readily available. The operational water management itself gains from this information, but it can also contribute to cost efficiency (no unnecessary pumping), better use of available storage and advise during (water polution) calamities.

  9. Technical Literature Review Concerning Management Information Systems.

    Science.gov (United States)

    interrelationships of the many aspects of management information systems (MIS); that is, with how analysis, design, operation, evaluation, and user considerations affect management information systems . (Author)

  10. Introduction to Management Information system

    OpenAIRE

    Mishra, Umakant

    2013-01-01

    A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization for taking better decisions for the organization. The MIS data may be derived from various units of the organization or from other sources. However it is very difficult to say the exact structure of MIS as the structure and goals of different types of organizations are different. Hence both the data and structure of MIS is dependent...

  11. Laboratory information management system proposal

    Energy Technology Data Exchange (ETDEWEB)

    Brown, B.; Schweitzer, S.; Adams, C.; White, S. [Tennessee Univ., Knoxville, TN (United States)

    1992-08-01

    The objectives of this paper is design a user friendly information management system using a relational database in order to: allow customers direct access to the system; provide customers with direct sample tracking capabilities; provide customers with more timely, consistent reporting; better allocate costs for analyses to appropriate customers; eliminate cumbersome and costly papertrails; and enhance facility utilization by laboratory personnel. The resultant savings through increased efficiency provided by this system should more than offset its cost in the long-term.

  12. Laboratory information management system proposal

    Energy Technology Data Exchange (ETDEWEB)

    Brown, B.; Schweitzer, S.; Adams, C.; White, S. (Tennessee Univ., Knoxville, TN (United States))

    1992-01-01

    The objectives of this paper is design a user friendly information management system using a relational database in order to: allow customers direct access to the system; provide customers with direct sample tracking capabilities; provide customers with more timely, consistent reporting; better allocate costs for analyses to appropriate customers; eliminate cumbersome and costly papertrails; and enhance facility utilization by laboratory personnel. The resultant savings through increased efficiency provided by this system should more than offset its cost in the long-term.

  13. Light-front Ward-Takahashi identity for two-fermion systems

    International Nuclear Information System (INIS)

    Marinho, J. A. O.; Frederico, T.; Pace, E.; Salme, G.; Sauer, P. U.

    2008-01-01

    We propose a three-dimensional electromagnetic current operator within light-front dynamics that satisfies a light-front Ward-Takahashi identity for two-fermion systems. The light-front current operator is obtained by a quasipotential reduction of the four-dimensional current operator and acts on the light-front valence component of bound or scattering states. A relation between the light-front valence wave function and the four-dimensional Bethe-Salpeter amplitude both for bound or scattering states is also derived, such that the matrix elements of the four-dimensional current operator can be fully recovered from the corresponding light-front ones. The light-front current operator can be perturbatively calculated through a quasipotential expansion, and the divergence of the proposed current satisfies a Ward-Takahashi identity at any given order of the expansion. In the quasipotential expansion the instantaneous terms of the fermion propagator are accounted for by the effective interaction and two-body currents. We exemplify our theoretical construction in the Yukawa model in the ladder approximation, investigating in detail the current operator at the lowest nontrivial order of the quasipotential expansion of the Bethe-Salpeter equation. The explicit realization of the light-front form of the Ward-Takahashi identity is verified. We also show the relevance of instantaneous terms and of the pair contribution to the two-body current and the Ward-Takahashi identity

  14. Intentional systems management: managing forests for biodiversity.

    Science.gov (United States)

    A.B. Carey; B.R. Lippke; J. Sessions

    1999-01-01

    Conservation of biodiversity provides for economic, social, and environmental sustainability. Intentional management is designed to manage conflicts among groups with conflicting interests. Our goal was to ascertain if intentional management and principles of conservation of biodiversity could be combined into upland and riparian forest management strategies that would...

  15. The CMS Data Management System

    Science.gov (United States)

    Giffels, M.; Guo, Y.; Kuznetsov, V.; Magini, N.; Wildish, T.

    2014-06-01

    The data management elements in CMS are scalable, modular, and designed to work together. The main components are PhEDEx, the data transfer and location system; the Data Booking Service (DBS), a metadata catalog; and the Data Aggregation Service (DAS), designed to aggregate views and provide them to users and services. Tens of thousands of samples have been cataloged and petabytes of data have been moved since the run began. The modular system has allowed the optimal use of appropriate underlying technologies. In this contribution we will discuss the use of both Oracle and NoSQL databases to implement the data management elements as well as the individual architectures chosen. We will discuss how the data management system functioned during the first run, and what improvements are planned in preparation for 2015.

  16. The CMS data management system

    International Nuclear Information System (INIS)

    Giffels, M; Magini, N; Guo, Y; Kuznetsov, V; Wildish, T

    2014-01-01

    The data management elements in CMS are scalable, modular, and designed to work together. The main components are PhEDEx, the data transfer and location system; the Data Booking Service (DBS), a metadata catalog; and the Data Aggregation Service (DAS), designed to aggregate views and provide them to users and services. Tens of thousands of samples have been cataloged and petabytes of data have been moved since the run began. The modular system has allowed the optimal use of appropriate underlying technologies. In this contribution we will discuss the use of both Oracle and NoSQL databases to implement the data management elements as well as the individual architectures chosen. We will discuss how the data management system functioned during the first run, and what improvements are planned in preparation for 2015.

  17. Management of complex dynamical systems

    Science.gov (United States)

    MacKay, R. S.

    2018-02-01

    Complex dynamical systems are systems with many interdependent components which evolve in time. One might wish to control their trajectories, but a more practical alternative is to control just their statistical behaviour. In many contexts this would be both sufficient and a more realistic goal, e.g. climate and socio-economic systems. I refer to it as ‘management’ of complex dynamical systems. In this paper, some mathematics for management of complex dynamical systems is developed in the weakly dependent regime, and questions are posed for the strongly dependent regime.

  18. Nuclear maintenance and management system

    International Nuclear Information System (INIS)

    Yamaji, Yoshihiro; Abe, Norihiko

    2000-01-01

    The Mitsubishi Electric Co., Ltd. has developed to introduce various computer systems for desk-top business assistance in a power plant such as system isolation assisting system, operation parameter management system, and so on under aiming at business effectiveness since these ten and some years. Recently, by further elapsed years of the plants when required for further cost reduction and together with change of business environment represented by preparation of individual personal computer, further effectiveness, preparation of the business environment, and upgrading of maintenance in power plant business have been required. Among such background, she has carried out various proposals and developments on construction of a maintenance and management system integrated the business assistant know-hows and the plant know-hows both accumulated previously. They are composed of three main points on rationalization of business management and document management in the further effectiveness, preparation of business environment, TBM maintenance, introduction of CBM maintenance and introduction of maintenance assistance in upgrading of maintenance. Here was introduced on system concepts aiming at the further effectiveness of the nuclear power plant business, preparation of business environment, upgrading of maintenance and maintenance, and so on, at a background of environment around maintenance business in the nuclear power plants (cost-down, highly elapsed year of the plant, change of business environment). (G.K)

  19. Fighting the Whole System: Dissociative Identity Disorder, Labeling Theory, and Iatrogenic Doubting.

    Science.gov (United States)

    Floris, Jessica; McPherson, Susan

    2015-01-01

    This research examines how individuals diagnosed with dissociative identity disorder construe their experiences of being labeled with a contested diagnosis. Semistructured interviews were conducted in the United Kingdom with 5 women and 2 men diagnosed with dissociative identity disorder. A framework analysis was conducted. The analysis identified 2 overarching themes: diagnosis cross-examined and navigating care systems. The diagnosis appeared to be continually assessed by participants for its fit with symptoms, and the doubt among professionals seemed to be unhelpfully reflected in participants' attempts to understand and come to terms with their experiences. The findings are considered in light of labeling theory, the iatrogenic effects of professional doubt, and current debates concerning the reliability and validity of psychiatric diagnostic systems that have been reinvigorated by the publication of the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition.

  20. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  1. System of Enterprise Reputation Management

    Directory of Open Access Journals (Sweden)

    Derevianko Olena. H.

    2014-03-01

    Full Text Available The article offers a system of enterprise reputation management directed at increase of economic benefits from formation and maintenance of high reputation in the result of maximisation of the volume of the incoming cash flows of the enterprise and also their duration and stability. It proves that reputation management, which allows achievement of economic goals of the enterprise, should be directed at key groups of stakeholders: growth of products sales is ensured by consumers, growth of internal stability – by enterprise personnel, growth of external stability – by society, including authority bodies, growth of business value – by investors, owners and partners. The article describes components of the system of enterprise reputation management, the degree of development of which are determined by three vectors: interaction with stakeholders and level of their feedback: messaging, informing, convincing and attracting; activity of the used instruments of reputation management, regularity and intensity, and also quantitative indicators of their application within the framework of directions of the product PR, corporate PR and IR, internal PR, GR and PR-CSR; level of organisational pre-requisites (functional, system and strategic of the system of reputation management.

  2. Auditing of environmental management system

    Directory of Open Access Journals (Sweden)

    Čuchranová Katarína

    2001-12-01

    Full Text Available Environmental auditing has estabilished itself as a valueable instrument to verify and help to improve the environmental performance.Organizations of all kinds may have a need to demonstrate the environmental responsibility. The concept of environmental management systems and the associated practice of environmental auditing have been advanced as one way to satisfy this need.These system are intended to help an organization to establish and continue to meet its environmental policies, objectives, standards and other requirements.Environmental auditing is a systematic and documented verification process of objectively obtaining and evaluating audit evidence to determine whether an organizations environmental management system conforms to the environmental management system audit criteria set by the organization and for the communication of the results of this process to the management.The following article intercepts all parts of preparation environmental auditing.The audit programme and procedures should cover the activities and areas to be considered in audits, the frequency of audits, the responsibilities associated with managing and conducting audits, the communication of audit results, auditor competence, and how audits will be conducted.The International Standard ISO 140011 estabilishes the audit procedures that determine conformance with EMS audit criteria.

  3. 14 CFR 1212.704 - System manager.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false System manager. 1212.704 Section 1212.704... Authority and Responsibilities § 1212.704 System manager. (a) Each system manager is responsible for the following with regard to the system of records over which the system manager has cognizance: (1) Overall...

  4. Canonical symmetry in a system with singular Lagrangian and ward identities

    International Nuclear Information System (INIS)

    Li Ziping

    1994-01-01

    An algorithm to construct the generator of gauge transformation for a constrained Hamiltonian system is given. The relationships among the coefficients connecting with first-class constraints in the generator is cleared. Based on the phase space generating function, the corresponding Ward identities in canonical formalism is deduced. The preliminary applications of above results to a model in field theory which is functionally equivalent to the mixed Chern-Simons Lagrangian is discussed in detail

  5. Distinctive identity claims in federal systems: Judicial policing of subnational variance

    DEFF Research Database (Denmark)

    Abat Ninet, Antoni; Gardner, James A.

    2016-01-01

    nationally imposed limits on their power typically have at their disposal many tools with which to press against formal boundaries. Federal systems, moreover, frequently display a surprising degree of tolerance for subnational obstruction, disobedience, and other behaviors intended to expand subnational...... authority and influence, even over national objection. This tolerance, however, has limits. In this article, we examine a set of rulings by national constitutional courts invalidating formalized claims by subnational units to a distinctive subnational identity. The emphatically negative reactions...

  6. Global business management for sustainability and competitiveness: The role of corporate branding, corporate identity and corporate reputation

    OpenAIRE

    Gupta, Suraksha; Melewar, T.C.; Czinkota, Michael C.

    2013-01-01

    This special issue of the Journal of World Business is devoted to the role of intangibles of a firm in building sustainable business for success in competitive markets. The research articles included in this issue have contributed to the on-going academic knowledge about the ability of marketing and management practices to drive business sustainability. This special issue on business sustainabili- ty focuses on the role of corporate branding, corporate identity and corporate reputation.

  7. The SMAP Dictionary Management System

    Science.gov (United States)

    Smith, Kevin A.; Swan, Christoper A.

    2014-01-01

    The Soil Moisture Active Passive (SMAP) Dictionary Management System is a web-based tool to develop and store a mission dictionary. A mission dictionary defines the interface between a ground system and a spacecraft. In recent years, mission dictionaries have grown in size and scope, making it difficult for engineers across multiple disciplines to coordinate the dictionary development effort. The Dictionary Management Systemaddresses these issues by placing all dictionary information in one place, taking advantage of the efficiencies inherent in co-locating what were once disparate dictionary development efforts.

  8. "Everybody Puts Their Whole Life on Facebook": Identity Management and the Online Social Networks of LGBTQ Youth.

    Science.gov (United States)

    McConnell, Elizabeth; Néray, Bálint; Hogan, Bernie; Korpak, Aaron; Clifford, Antonia; Birkett, Michelle

    2018-05-26

    Lesbian, gay, bisexual, transgender, and queer (LGBTQ) youth and young adults almost inevitably "come out", or self-disclose their identity to others. Some LGBTQ youth are more uniformly "out", while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook ( N = 199, M age = 24.13). Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one's online identity as well as the costs to (semi-) closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people's experiences on Facebook.

  9. “Everybody Puts Their Whole Life on Facebook”: Identity Management and the Online Social Networks of LGBTQ Youth

    Directory of Open Access Journals (Sweden)

    Elizabeth McConnell

    2018-05-01

    Full Text Available Lesbian, gay, bisexual, transgender, and queer (LGBTQ youth and young adults almost inevitably “come out”, or self-disclose their identity to others. Some LGBTQ youth are more uniformly “out”, while others may disclose to some groups but not others. This selective disclosure is complicated on real name social media sites, which tend to encourage a unified presentation of self across social contexts. We explore these complications with a cohort of LBGTQ youth on Facebook (N = 199, Mage = 24.13. Herein we ask: How do LBGTQ youth manage the disclosure of their sexual orientation and/or gender identity to different people in their lives? Further, are there identifiable differences in the online social network structure for LGBTQ youth who manage outness in different ways? Finally, how do LGBTQ young people describe their experiences on Facebook? We answer these questions using a mixed methods approach, combining statistical cluster analysis, network visualization, and qualitative data. Our findings illustrate patterns in network structure by outness cluster type, highlighting both the work involved in managing one’s online identity as well as the costs to (semi- closeted individuals including a considerably lower overall network connectivity. In particular, outness to family characterized LGBTQ young people’s experiences on Facebook.

  10. The Prototype Automated Research Management System (ARMS)

    National Research Council Canada - National Science Library

    Prekop, Paul

    2004-01-01

    Automated Research Management System (ARMS) is a knowledge management application designed to address many of the knowledge management problems identified by SmartWays and FASSP's Knowledge Management Review...

  11. Integrated therapy safety management system.

    Science.gov (United States)

    Podtschaske, Beatrice; Fuchs, Daniela; Friesdorf, Wolfgang

    2013-09-01

    The aim is to demonstrate the benefit of the medico-ergonomic approach for the redesign of clinical work systems. Based on the six layer model, a concept for an 'integrated therapy safety management' is drafted. This concept could serve as a basis to improve resilience. The concept is developed through a concept-based approach. The state of the art of safety and complexity research in human factors and ergonomics forms the basis. The findings are synthesized to a concept for 'integrated therapy safety management'. The concept is applied by way of example for the 'medication process' to demonstrate its practical implementation. The 'integrated therapy safety management' is drafted in accordance with the six layer model. This model supports a detailed description of specific work tasks, the corresponding responsibilities and related workflows at different layers by using the concept of 'bridge managers'. 'Bridge managers' anticipate potential errors and monitor the controlled system continuously. If disruptions or disturbances occur, they respond with corrective actions which ensure that no harm results and they initiate preventive measures for future procedures. The concept demonstrates that in a complex work system, the human factor is the key element and final authority to cope with the residual complexity. The expertise of the 'bridge managers' and the recursive hierarchical structure results in highly adaptive clinical work systems and increases their resilience. The medico-ergonomic approach is a highly promising way of coping with two complexities. It offers a systematic framework for comprehensive analyses of clinical work systems and promotes interdisciplinary collaboration. © 2013 The Authors. British Journal of Clinical Pharmacology © 2013 The British Pharmacological Society.

  12. Networked inventory management systems: materializing supply chain management

    NARCIS (Netherlands)

    Verwijmeren, M.A.A.P.; Vlist, van der P.; Donselaar, van K.H.

    1996-01-01

    Aims to explain the driving forces for networked inventory management. Discusses major developments with respect to customer requirements, networked organizations and networked inventory management. Presents high level specifications of networked inventory management information systems (NIMISs).

  13. I-15 integrated corridor management system : project management plan.

    Science.gov (United States)

    2011-06-01

    The Project Management Plan (PMP) assists the San Diego ICM Team by defining a procedural framework for : management and control of the I-15 Integrated Corridor Management Demonstration Project, and development and : deployment of the ICM System. The...

  14. "I'm Scared of the Disappointment": Young Adult Smokers' Relational Identity Gaps and Management Strategies as Sites of Communication Intervention.

    Science.gov (United States)

    Stanley, Samantha J; Pitts, Margaret Jane

    2018-02-22

    While cigarette smoking is decreasing among young adults, rates of nicotine consumption through other devices, most notably electronic cigarettes, are on the rise. Framed by communication theory of identity, this study examines young adult smokers' experiences with relational others in regard to their smoking. Focus group discussions and individual interviews convened with 20 young adult cigarette and electronic cigarette smokers revealed identity gaps implicating the relational layer of identity, including personal-relational, enacted-relational, and personal-enacted-relational identity gaps. Participants used communicative and behavioral strategies to manage relational discrepancies. The documented identity gaps and management strategies present opportunities for targeted smoking cessation interventions that amplify dissonance created through identity gaps as a motivational tactic.

  15. Data management system performance modeling

    Science.gov (United States)

    Kiser, Larry M.

    1993-01-01

    This paper discusses analytical techniques that have been used to gain a better understanding of the Space Station Freedom's (SSF's) Data Management System (DMS). The DMS is a complex, distributed, real-time computer system that has been redesigned numerous times. The implications of these redesigns have not been fully analyzed. This paper discusses the advantages and disadvantages for static analytical techniques such as Rate Monotonic Analysis (RMA) and also provides a rationale for dynamic modeling. Factors such as system architecture, processor utilization, bus architecture, queuing, etc. are well suited for analysis with a dynamic model. The significance of performance measures for a real-time system are discussed.

  16. Knowledge management: processes and systems | Igbinovia ...

    African Journals Online (AJOL)

    Knowledge management: processes and systems. ... Information Impact: Journal of Information and Knowledge Management ... observation, role reversal technique, and discussion forums as well as the forms of knowledge representation to include report writing, database management system and institutional repositories.

  17. Switched generalized function projective synchronization of two identical/different hyperchaotic systems with uncertain parameters

    International Nuclear Information System (INIS)

    Li Hongmin; Li Chunlai

    2012-01-01

    In this paper, we investigate two switched synchronization schemes, namely partial and complete switched generalized function projective synchronization, by using the adaptive control method. Partial switched synchronization of chaotic systems means that the state variables of the drive system synchronize with partial different state variables of the response system, whereas complete switched synchronization of chaotic systems means that all the state variables of the drive system synchronize with complete different state variables of the response system. Because the switched synchronization scheme exists in many combinations, it is a promising type of synchronization as it provides greater security in secure communications. Based on the Lyapunov stability theory, the adaptive control laws and the parameter update laws are derived to make the states of two identical/different hyperchaotic systems asymptotically synchronized up to a desired scaling function. Finally, numerical simulations are performed to verify and illustrate the analytical results.

  18. Intelligent power system data management systems (DBMS)

    Energy Technology Data Exchange (ETDEWEB)

    Middleton, A.; Macdonald, E. [GE Digital Energy, Markham, ON (Canada); Schreiner, Z. [Intelligent Process Solutions GmbH, Lindau (Germany); Bizjak, J. [Elektro Ljubljana d.d., Ljubljana (Slovenia)

    2010-07-01

    Network owners/operators from around the world have moved from electromechanical products to intelligent electronic devices (IEDs). Most networks have a multi-generation technology mix because protection assets have a normal application lifespan of between 10 and 40 years. Associated data capture and maintenance management regimes have therefore moved from paper based into digitized media, creating a significant increase in the volume of acquired data, such that there is now a mix of paper and digitized storage. Data is rarely consolidated or used for decision making in asset management processes once testing is completed, having a major impact on overall power system reliability. This paper presented the concept of intelligent operative maintenance management, now becoming more recognized in the industry. The concept was described as the management of operational data, resulting actions and responses, wherever and by whoever they are needed, without any additional overhead. The paper discussed new techniques of testing as well as planning and operative maintenance. The practical benefits of the new system were also presented, with particular reference to central management; simplification of routine protocols; secondary testing; and reduced cost of data handling. It was concluded that the main benefit from all of the techniques discussed in this paper is that experienced expert test engineers can focus more time upon making good, critical decisions to ensure that utilities maximize their customer service and safety regimes. 13 refs., 7 figs.

  19. An Integrated Knowledge Management System

    Directory of Open Access Journals (Sweden)

    Vasile Mazilescu

    2014-11-01

    Full Text Available The aim of this paper is to present a Knowledge Management System based on Fuzzy Logic (FLKMS, a real-time expert system to meet the challenges of the dynamic environment. The main feature of our integrated shell FLKMS is that it models and integrates the temporal relationships between the dynamic of the evolution of an economic process with some fuzzy inferential methods, using a knowledge model for control, embedded within the expert system’s operational knowledge base.

  20. Information system revives materials management

    International Nuclear Information System (INIS)

    Hansen, T.

    1995-01-01

    Through a change in philosophy and the development of a new, more efficient information management system, Arizona Public Service Co. (APSW) has, in less than two years, reduced material and service costs by 10 percent. The utility plans to cut these costs form 1993 figures by 25 percent before 2000. The utility is breaking new ground with ongoing implementation of new business processes and the new Materials Logistics Information System (MLIS), which has been co-developed with Texas Instruments Software Division (TISD)

  1. Systems approach in energy management

    International Nuclear Information System (INIS)

    Dutta-Choudhury, K.

    1993-01-01

    Several years ago when the author was working in the chemicals division of a paper company in Instrumentation and Controls, one experience had a lasting impact on his work approach which is systems approach. The maintenance manager told the author that a very important piece of boiler instrument of the power plant had broken down and delivery of the replacement needed to be expedited. The instrument was ordered over the phone in another city. The purchase order was personally delivered at the supplier's office and arrangements were made so the instrument was put on the next flight. A week later the maintenance manager indicated that the particular instrument still had not arrived in the plant and he could not run the power plant. Thus the company incurred substantial losses. Further inquiries showed that the instrument did indeed arrive at the plant stores on time. But, in the absence of any instructions thereon, the instrument was not delivered to the power plant. The sense of urgency was lost in the existing delivery process. In other words, the process or system failed. The whole process from requisitioning to delivery of ordered items was analyzed and corrective procedures were incorporated to prevent future repetitions. This brings up the subject of systems approach in engineering management in general and energy management in particular. This involves defining an objective and designing a system for an effective way of getting there

  2. Grenada Education Management Information System

    OpenAIRE

    Porta, Emilio; Klein, Jennifer; Arcia, Gustavo; Nannyonjo, Harriet

    2012-01-01

    The Education Management Information System (EMIS) country report for Grenada includes the following headings: background which includes education data in Grenada, EMIS staff, facilities and equipment, EMIS data, and publications; prerequisites of quality; assurances of integrity; methodological soundness; accuracy and reliability; serviceability; and accessibility.

  3. DEVELOPMENT OF MANAGEMENT INFORMATION SYSTEMS

    OpenAIRE

    Wiesław Samitowski

    2016-01-01

    On the basis of many years of experience in providing consulting services in the area of management, the author presents the issues regarding the development of information systems to be applied in business. The analysis is conducted within the framework of a field of study introduced by the author and referred to as infornomics.

  4. Managing conflicts in systems development.

    Science.gov (United States)

    Barnett, E

    1997-05-01

    Conflict in systems development is nothing new. It can vary in intensity, but there will always be two possible outcomes--one constructive and the other destructive. The common approach to conflict management is to draw the battle lines and apply brute force. However, there are other ways to deal with conflict that are more effective and more people oriented.

  5. Personal and Interpersonal Value System, Self-Perception and Identity of Spanish Nurses: A Cross-Sectional Study

    Science.gov (United States)

    Losa Iglesias, Marta Elena; de Bengoa Vallejo, Ricardo Becerro

    2011-01-01

    The aim of this research is to identify the predominant values system among a sample of Spanish nurses, to identify how values are tied to professional nursing identity and determine differences in values and identity between socio-demographic variables as a gender, citizenship and/or nursing service. Cross-sectional study was performed with a…

  6. OSPACS: Ultrasound image management system

    Directory of Open Access Journals (Sweden)

    Bessant Conrad

    2008-06-01

    Full Text Available Abstract Background Ultrasound scanning uses the medical imaging format, DICOM, for electronically storing the images and data associated with a particular scan. Large health care facilities typically use a picture archiving and communication system (PACS for storing and retrieving such images. However, these systems are usually not suitable for managing large collections of anonymized ultrasound images gathered during a clinical screening trial. Results We have developed a system enabling the accurate archiving and management of ultrasound images gathered during a clinical screening trial. It is based upon a Windows application utilizing an open-source DICOM image viewer and a relational database. The system automates the bulk import of DICOM files from removable media by cross-validating the patient information against an external database, anonymizing the data as well as the image, and then storing the contents of the file as a field in a database record. These image records may then be retrieved from the database and presented in a tree-view control so that the user can select particular images for display in a DICOM viewer or export them to external media. Conclusion This system provides error-free automation of ultrasound image archiving and management, suitable for use in a clinical trial. An open-source project has been established to promote continued development of the system.

  7. Automated Car Park Management System

    Science.gov (United States)

    Fabros, J. P.; Tabañag, D.; Espra, A.; Gerasta, O. J.

    2015-06-01

    This study aims to develop a prototype for an Automated Car Park Management System that will increase the quality of service of parking lots through the integration of a smart system that assists motorist in finding vacant parking lot. The research was based on implementing an operating system and a monitoring system for parking system without the use of manpower. This will include Parking Guidance and Information System concept which will efficiently assist motorists and ensures the safety of the vehicles and the valuables inside the vehicle. For monitoring, Optical Character Recognition was employed to monitor and put into list all the cars entering the parking area. All parking events in this system are visible via MATLAB GUI which contain time-in, time-out, time consumed information and also the lot number where the car parks. To put into reality, this system has a payment method, and it comes via a coin slot operation to control the exit gate. The Automated Car Park Management System was successfully built by utilizing microcontrollers specifically one PIC18f4550 and two PIC16F84s and one PIC16F628A.

  8. Expanding the disaster risk management framework: Measuring the constructed level of national identity as a factor of political risk

    Directory of Open Access Journals (Sweden)

    Barend Prinsloo

    2016-08-01

    Full Text Available Political risk is identified as a dominant risk category of disaster risk management (DRM which could negatively affect the success of those measures implemented to reduce disaster risk. Key to political risk is the construct of national identity which, if poorly constructed, could greatly contribute to political risk. This article proposed a tool to measure the construct of national identity and to provide recommendations to strengthen the construct in order to mitigate the exacerbating influence it may have on political risk and ultimately on DRM. The design of the measurement tool consisted of a mixed methodological approach employing both quantitative and qualitative data. The data collection instruments included a literature review (which is shortly provided in the previous sections and an empirical study that utilised data obtained through structured questionnaires. Although the results of the proposed measuring instrument did not include a representative sample of all the cultures in SouthAfrica, the results alluded to different levels for the construction of national identity among black and white respondents, possibly because of different ideological expectations among these groups. The results of the study should be considered as a validation of the measuring tool and not necessarily of the construct of national identity in South Africa. The measuring tool is thus promising for future studies to reduce political risk and ultimately disaster risk.

  9. Sexual orientation and gender identity: review of concepts, controversies and their relation to psychopathology classification systems.

    Science.gov (United States)

    Moleiro, Carla; Pinto, Nuno

    2015-01-01

    Numerous controversies and debates have taken place throughout the history of psychopathology (and its main classification systems) with regards to sexual orientation and gender identity. These are still reflected on present reformulations of gender dysphoria in both the Diagnostic and Statistical Manual and the International Classification of Diseases, and in more or less subtle micro-aggressions experienced by lesbian, gay, bisexual and trans patients in mental health care. The present paper critically reviews this history and current controversies. It reveals that this deeply complex field contributes (i) to the reflection on the very concept of mental illness; (ii) to the focus on subjective distress and person-centered experience of psychopathology; and (iii) to the recognition of stigma and discrimination as significant intervening variables. Finally, it argues that sexual orientation and gender identity have been viewed, in the history of the field of psychopathology, between two poles: gender transgression and gender variance/fluidity.

  10. Sexual Orientation and Gender Identity: Review of concepts, controversies and their relation to psychopathology classification systems

    Directory of Open Access Journals (Sweden)

    Carla eMoleiro

    2015-10-01

    Full Text Available Numerous controversies and debates have taken place throughout the history of psychopathology (and its main classification systems with regards to sexual orientation and gender identity. These are still reflected on present reformulations of gender dysphoria in both DSM and ICD, and in more or less subtle micro-aggressions experienced by lesbian, gay, bisexual and trans patients in mental health care. The present paper critically reviews this history and current controversies. It reveals that this deeply complex field contributes (i to the reflection on the very concept of mental illness; (ii to the focus on subjective distress and person-centered experience of psychopathology; and (iii to the recognition of stigma and discrimination as significant intervening variables. Finally, it argues that sexual orientation and gender identity have been viewed, in the history of the field of psychopathology, between two poles: gender transgression and gender variance/fluidity.

  11. A systems engineering management approach to resource management applications

    Science.gov (United States)

    Hornstein, Rhoda Shaller

    1989-01-01

    The author presents a program management response to the following question: How can the traditional practice of systems engineering management, including requirements specification, be adapted, enhanced, or modified to build future planning and scheduling systems for effective operations? The systems engineering management process, as traditionally practiced, is examined. Extensible resource management systems are discussed. It is concluded that extensible systems are a partial solution to problems presented by requirements that are incomplete, partially immeasurable, and often dynamic. There are positive indications that resource management systems have been characterized and modeled sufficiently to allow their implementation as extensible systems.

  12. A system for managing information at ATLAS

    International Nuclear Information System (INIS)

    Tilbrook, I.R.

    1993-01-01

    In response to a need for better management of maintenance and document information at the Argonne Tandem-Linear Accelerating System (ATLAS), the ATLAS Information Management System (AIMS) has been created. The system is based on the relational database model. The system's applications use the Alpha-4 relational database management system, a commercially available software package. The system's function and design are described

  13. Information Security Management - Part Of The Integrated Management System

    Science.gov (United States)

    Manea, Constantin Adrian

    2015-07-01

    The international management standards allow their integrated approach, thereby combining aspects of particular importance to the activity of any organization, from the quality management systems or the environmental management of the information security systems or the business continuity management systems. Although there is no national or international regulation, nor a defined standard for the Integrated Management System, the need to implement an integrated system occurs within the organization, which feels the opportunity to integrate the management components into a cohesive system, in agreement with the purpose and mission publicly stated. The issues relating to information security in the organization, from the perspective of the management system, raise serious questions to any organization in the current context of electronic information, reason for which we consider not only appropriate but necessary to promote and implement an Integrated Management System Quality - Environment - Health and Operational Security - Information Security

  14. Metrics for border management systems.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, Ruth Ann

    2009-07-01

    There are as many unique and disparate manifestations of border systems as there are borders to protect. Border Security is a highly complex system analysis problem with global, regional, national, sector, and border element dimensions for land, water, and air domains. The complexity increases with the multiple, and sometimes conflicting, missions for regulating the flow of people and goods across borders, while securing them for national security. These systems include frontier border surveillance, immigration management and customs functions that must operate in a variety of weather, terrain, operational conditions, cultural constraints, and geopolitical contexts. As part of a Laboratory Directed Research and Development Project 08-684 (Year 1), the team developed a reference framework to decompose this complex system into international/regional, national, and border elements levels covering customs, immigration, and border policing functions. This generalized architecture is relevant to both domestic and international borders. As part of year two of this project (09-1204), the team determined relevant relative measures to better understand border management performance. This paper describes those relative metrics and how they can be used to improve border management systems.

  15. MIMS - MEDICAL INFORMATION MANAGEMENT SYSTEM

    Science.gov (United States)

    Frankowski, J. W.

    1994-01-01

    MIMS, Medical Information Management System is an interactive, general purpose information storage and retrieval system. It was first designed to be used in medical data management, and can be used to handle all aspects of data related to patient care. Other areas of application for MIMS include: managing occupational safety data in the public and private sectors; handling judicial information where speed and accuracy are high priorities; systemizing purchasing and procurement systems; and analyzing organizational cost structures. Because of its free format design, MIMS can offer immediate assistance where manipulation of large data bases is required. File structures, data categories, field lengths and formats, including alphabetic and/or numeric, are all user defined. The user can quickly and efficiently extract, display, and analyze the data. Three means of extracting data are provided: certain short items of information, such as social security numbers, can be used to uniquely identify each record for quick access; records can be selected which match conditions defined by the user; and specific categories of data can be selected. Data may be displayed and analyzed in several ways which include: generating tabular information assembled from comparison of all the records on the system; generating statistical information on numeric data such as means, standard deviations and standard errors; and displaying formatted listings of output data. The MIMS program is written in Microsoft FORTRAN-77. It was designed to operate on IBM Personal Computers and compatibles running under PC or MS DOS 2.00 or higher. MIMS was developed in 1987.

  16. The LHCb Data Management System

    International Nuclear Information System (INIS)

    Baud, J P; Charpentier, Ph; Ciba, K; Lanciotti, E; Màthè, Z; Graciani, R; Remenska, D; Santana, R

    2012-01-01

    The LHCb Data Management System is based on the DIRAC Grid Community Solution. LHCbDirac provides extensions to the basic DMS such as a Bookkeeping System. Datasets are defined as sets of files corresponding to a given query in the Bookkeeping system. Datasets can be manipulated by CLI tools as well as by automatic transformations (removal, replication, processing). A dynamic handling of dataset replication is performed, based on disk space usage at the sites and dataset popularity. For custodial storage, an on-demand recall of files from tape is performed, driven by the requests of the jobs, including disk cache handling. We shall describe the tools that are available for Data Management, from handling of large datasets to basic tools for users as well as for monitoring the dynamic behavior of LHCb Storage capacity.

  17. PROMIS (Procurement Management Information System)

    Science.gov (United States)

    1987-01-01

    The PROcurement Management Information System (PROMIS) provides both detailed and summary level information on all procurement actions performed within NASA's procurement offices at Marshall Space Flight Center (MSFC). It provides not only on-line access, but also schedules procurement actions, monitors their progress, and updates Forecast Award Dates. Except for a few computational routines coded in FORTRAN, the majority of the systems is coded in a high level language called NATURAL. A relational Data Base Management System called ADABAS is utilized. Certain fields, called descriptors, are set up on each file to allow the selection of records based on a specified value or range of values. The use of like descriptors on different files serves as the link between the falls, thus producing a relational data base. Twenty related files are currently being maintained on PROMIS.

  18. Archetypes for Managing ERP Systems

    DEFF Research Database (Denmark)

    Kræmmergaard, Pernille; Fill, Michael; Simonsen, Martin

    2007-01-01

    . In our research of 20 case-studies we found certain similarities and differences in the patterns which coalesced around three alternatives in the way organizations approach the managing of ERP in the second wave. We describe these archetypes, which we call the Calculators, the Co-players and the Drivers......, and we present illustrative cases of each of the archetypes. The archetypes are believed to play an important role in conveying the essential differences existing in alternative ways in which organizations manage their ERP system during the second wave....

  19. Archetypes for Managing ERP Systems

    DEFF Research Database (Denmark)

    Kræmmergaard, Pernille; Hansen, Michael Fiil

    2006-01-01

    . In our research of 20 case-studies we found certain similarities and differences in the patterns which coalesced around three alternatives in the way organizations approach the managing of ERP in the second wave. We describe these archetypes, which we call the Calculators, the Co-players and the Drivers......, and we present illustrative cases of each of the archetypes. The archetypes are believed to play an important role in conveying the essential differences existing in alternative ways in which organizations manage their ERP system during the second wave....

  20. ISO 14000 : environmental management systems

    International Nuclear Information System (INIS)

    Boutin, C.; Emard, C.; Lalonde, G.; Levesque, A.; Robitaille, R.; Rollin, A.L.; Thibeault, I.

    1996-01-01

    This book is addressed to the managers, professionals, and government agents which wish to know the philosophy of the step as well as the stages to be followed for the establishment of a system of environmental management in conformity with the standards of the series ISO 14000. This work locates ISO 14000 in the historical context of its development by describing the bonds with other standards in place of which those of the series ISO 9000. This book answers questions that arise regarding a companies step toward accreditation to ISO 14000

  1. The Cheetah data management system

    International Nuclear Information System (INIS)

    Kunz, P.F.; Word, G.B.

    1992-09-01

    Cheetah is a data management system based on the C programming language, with support for other languages. Its main goal is to transfer data between memory and I/O steams in a general way. The streams are either associated with disk files or are network data stems. Cheetah provides optional convenience functions to assist in the management of C structures. Cheetah steams are self-describing so that general purpose applications can fully understand an incoming steam. This information can be used to display the data in an incoming steam to the user of an interactive general application, complete with variable names and optional comments

  2. Radiology information management system, TOSRIM

    International Nuclear Information System (INIS)

    Tani, Yuichiro; Uchiyama, Akira; Kimura, Hirohito

    1991-01-01

    This is a report on a new type of distributed computer system for radiology departments named 'TOSRIM' (Toshiba radiology information management system), which is designed to be installed between medical diagnosis equipment and a host computer system in a hospital. Recently, a new type of host computer system has been developed which enables doctors to order any of the hospital's entire activities using terminals. By connecting 'TOSRIM' to this type of host computer system, many of the activities of a radiology department can be carried out via terminals without the use of examination requirement forms. As well as being connected to medical diagnosis equipment, 'TOSRIM' can also be connected to a medical imaging system which stores and displays medical images. By means of these connections, doctors will be able to diagnose medical images using display terminals without the need for films. (author)

  3. Radiology information management system, TOSRIM

    Energy Technology Data Exchange (ETDEWEB)

    Tani, Yuichiro; Uchiyama, Akira; Kimura, Hirohito (Toshiba Corp., Kawasaki, Kanagawa (Japan))

    1991-02-01

    This is a report on a new type of distributed computer system for radiology departments named 'TOSRIM' (Toshiba radiology information management system), which is designed to be installed between medical diagnosis equipment and a host computer system in a hospital. Recently, a new type of host computer system has been developed which enables doctors to order any of the hospital's entire activities using terminals. By connecting 'TOSRIM' to this type of host computer system, many of the activities of a radiology department can be carried out via terminals without the use of examination requirement forms. As well as being connected to medical diagnosis equipment, 'TOSRIM' can also be connected to a medical imaging system which stores and displays medical images. By means of these connections, doctors will be able to diagnose medical images using display terminals without the need for films. (author).

  4. Radioactive waste integrated management system

    Energy Technology Data Exchange (ETDEWEB)

    Song, D Y; Choi, S S; Han, B S [Atomic Creative Technology, Taejon (Korea, Republic of)

    2003-10-01

    In this paper, we present an integrated management system for radioactive waste, which can keep watch on the whole transporting process of each drum from nuclear power plant temporary storage house to radioactive waste storage house remotely. Our approach use RFID(Radio Frequency Identification) system, which can recognize the data information without touch, GSP system, which can calculate the current position precisely using the accurate time and distance measured from satellites, and the spread spectrum technology CDMA, which is widely used in the area of mobile communication.

  5. Radioactive waste integrated management system

    International Nuclear Information System (INIS)

    Song, D. Y.; Choi, S. S.; Han, B. S.

    2003-01-01

    In this paper, we present an integrated management system for radioactive waste, which can keep watch on the whole transporting process of each drum from nuclear power plant temporary storage house to radioactive waste storage house remotely. Our approach use RFID(Radio Frequency Identification) system, which can recognize the data information without touch, GSP system, which can calculate the current position precisely using the accurate time and distance measured from satellites, and the spread spectrum technology CDMA, which is widely used in the area of mobile communication

  6. Spatial Data Management System (SDMS)

    Science.gov (United States)

    Hutchison, Mark W.

    1994-01-01

    The Spatial Data Management System (SDMS) is a testbed for retrieval and display of spatially related material. SDMS permits the linkage of large graphical display objects with detail displays and explanations of its smaller components. SDMS combines UNIX workstations, MIT's X Window system, TCP/IP and WAIS information retrieval technology to prototype a means of associating aggregate data linked via spatial orientation. SDMS capitalizes upon and extends previous accomplishments of the Software Technology Branch in the area of Virtual Reality and Automated Library Systems.

  7. OSH management systems in enterprises

    Directory of Open Access Journals (Sweden)

    B. Kalandyk

    2010-04-01

    Full Text Available Nowadays, in modern companies and enterprises, safety means much more than only the evaluation of risk and analysis of accidents. Theactivities in the area of the occupational health and safety should form an integral part of the enterprise management system. According toa framework directive no 89/391/EEC the EU member states are obliged to implement standards related with the occupational health andsafety systems. The standard most popular and used most commonly, as applicable to enterprises of any type, is the international OHSAS18001 system and in Poland Polish Standards PN-N-18001.

  8. Integrated Computer System of Management in Logistics

    Science.gov (United States)

    Chwesiuk, Krzysztof

    2011-06-01

    This paper aims at presenting a concept of an integrated computer system of management in logistics, particularly in supply and distribution chains. Consequently, the paper includes the basic idea of the concept of computer-based management in logistics and components of the system, such as CAM and CIM systems in production processes, and management systems for storage, materials flow, and for managing transport, forwarding and logistics companies. The platform which integrates computer-aided management systems is that of electronic data interchange.

  9. Respiratory care management information systems.

    Science.gov (United States)

    Ford, Richard M

    2004-04-01

    Hospital-wide computerized information systems evolved from the need to capture patient information and perform billing and other financial functions. These systems, however, have fallen short of meeting the needs of respiratory care departments regarding work load assessment, productivity management, and the level of outcome reporting required to support programs such as patient-driven protocols. The respiratory care management information systems (RCMIS) of today offer many advantages over paper-based systems and hospital-wide computer systems. RCMIS are designed to facilitate functions specific to respiratory care, including assessing work demand, assigning and tracking resources, charting, billing, and reporting results. RCMIS incorporate mobile, point-of-care charting and are highly configurable to meet the specific needs of individual respiratory care departments. Important and substantial benefits can be realized with an RCMIS and mobile, wireless charting devices. The initial and ongoing costs of an RCMIS are justified by increased charge capture and reduced costs, by way of improved productivity and efficiency. It is not unusual to recover the total cost of an RCMIS within the first year of its operation. In addition, such systems can facilitate and monitor patient-care protocols and help to efficiently manage the vast amounts of information encountered during the practitioner's workday. Respiratory care departments that invest in RCMIS have an advantage in the provision of quality care and in reducing expenses. A centralized respiratory therapy department with an RCMIS is the most efficient and cost-effective way to monitor work demand and manage the hospital-wide allocation of respiratory care services.

  10. National and gender measurement invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS) : A 10-nation study with university students

    NARCIS (Netherlands)

    Crocetti, E.; Cieciuch, J.; Gao, C.-H.; Klimstra, T.A.; Lin, C.-L.; Mena de Matos, P.; Morsünbül, U.; Negru, O.; Sugimura, K.; Zimmermann, G.; Meeus, W.H.J.

    2015-01-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in

  11. National and Gender Measurement Invariance of the Utrecht-Management of Identity Commitments Scale (U-MICS) : A 10-Nation Study With University Students

    NARCIS (Netherlands)

    Crocetti, Elisabetta; Cieciuch, Jan; Gao, Cheng Hai; Klimstra, Theo; Lin, Ching Ling; Matos, Paula Mena; Morsünbül, Ümit; Negru, Oana; Sugimura, Kazumi; Zimmermann, Grégoire; Meeus, Wim

    2015-01-01

    The purpose of this study was to examine the psychometric properties of the Utrecht-Management of Identity Commitments Scale (U-MICS), a self-report measure aimed at assessing identity processes of commitment, in-depth exploration, and reconsideration of commitment. We tested its factor structure in

  12. The medical leadership challenge in healthcare is an identity challenge.

    Science.gov (United States)

    Andersson, Thomas

    2015-01-01

    The purpose of this article is to describe and analyse the identity challenges that physicians with medical leadership positions face. Four qualitative case studies were performed to address the fact that identity is processual, relational and situational. Physicians with managerial roles were interviewed, as well as their peers, supervisors and subordinates. Furthermore, observations were made to understand how different identities are displayed in action. This study illustrates that medical leadership implies identity struggles when physicians have manager positions, because of the different characteristics of the social identities of managers and physicians. Major differences are related between physicians as autonomous individuals in a system and managers as subordinates to the organizational system. There are psychological mechanisms that evoke the physician identity more often than the managerial identity among physicians who are managers, which explains why physicians who are managers tend to remain foremost physicians. The implications of the findings, that there are major identity challenges by being both a physician and manager, suggest that managerial physicians might not be the best prerequisite for medical leadership, but instead, cooperative relationships between physicians and non-physician managers might be a less difficult way to support medical leadership. Acknowledging and addressing identity challenges can be important both in creating structures in organizations and designing the training for managers in healthcare (both physicians and non-physicians) to support medical leadership. Medical leadership is most often related to organizational structure and/or leadership skills, but this paper discusses identity requirements and challenges related to medical leadership.

  13. Knowledge management systems in practice

    DEFF Research Database (Denmark)

    Tørning, Kristian

    which has the strategy of working with knowledge in the form of "best practices" meant to boost performance. The thesis explores the situation that workers are in, since they are meant to share and develop "best practices" knowledge in a portal based Knowledge Management System (KMS). The study...... indentifies a set of problems that prevents knowledge sharing from taking place to the degree to which management was specifically aiming. It was explored whether these problems could, to some degree, be mitigated by employing persuasive design, which is a new stance towards design where the aim...... is to directly seek to change the user's behavior, i.e., persuading more knowledge sharing. The main contribution is an indication of an anomaly with regards to the strategic approach towards knowledge management, where knowledge sharing is seen as an effort by which companies can gain a competitive advantage...

  14. RELIABILITY ASSESSMENT OF ENTROPY METHOD FOR SYSTEM CONSISTED OF IDENTICAL EXPONENTIAL UNITS

    Institute of Scientific and Technical Information of China (English)

    Sun Youchao; Shi Jun

    2004-01-01

    The reliability assessment of unit-system near two levels is the most important content in the reliability multi-level synthesis of complex systems. Introducing the information theory into system reliability assessment, using the addible characteristic of information quantity and the principle of equivalence of information quantity, an entropy method of data information conversion is presented for the system consisted of identical exponential units. The basic conversion formulae of entropy method of unit test data are derived based on the principle of information quantity equivalence. The general models of entropy method synthesis assessment for system reliability approximate lower limits are established according to the fundamental principle of the unit reliability assessment. The applications of the entropy method are discussed by way of practical examples. Compared with the traditional methods, the entropy method is found to be valid and practicable and the assessment results are very satisfactory.

  15. Student and/or Entrepreneur? Managing Multiple Identities among Emerging University Student Entrepreneurs

    DEFF Research Database (Denmark)

    Sørensen, Suna; B. Gartner, William

    2006-01-01

    for combining the identities are proposed and discussed as a way to challenge the meaning attached to the practiced concepts of "student" and "entrepreneur" from a theoretical as well as practical perspective. The practices are organized into a conceptual framework containing the two continuums: "integration/disintegration...

  16. Gender Identity and Career Aspiration to Top Management of Malaysian Graduate Students

    Science.gov (United States)

    Karami, Roya; Ismail, Maimunah; Sail, Rahim Md.

    2011-01-01

    This article examines the relationship between gender identity and career aspirations of a group of Iranian international postgraduate students studying at a Malaysian public university. This study uses the Farmer's Achievement Motivation Theory and Astin's Sociopsychological Model of Career Choice as theoretical framework. The data were collected…

  17. Multi-vehicle detection with identity awareness using cascade Adaboost and Adaptive Kalman filter for driver assistant system.

    Directory of Open Access Journals (Sweden)

    Baofeng Wang

    Full Text Available Vision-based vehicle detection is an important issue for advanced driver assistance systems. In this paper, we presented an improved multi-vehicle detection and tracking method using cascade Adaboost and Adaptive Kalman filter(AKF with target identity awareness. A cascade Adaboost classifier using Haar-like features was built for vehicle detection, followed by a more comprehensive verification process which could refine the vehicle hypothesis in terms of both location and dimension. In vehicle tracking, each vehicle was tracked with independent identity by an Adaptive Kalman filter in collaboration with a data association approach. The AKF adaptively adjusted the measurement and process noise covariance through on-line stochastic modelling to compensate the dynamics changes. The data association correctly assigned different detections with tracks using global nearest neighbour(GNN algorithm while considering the local validation. During tracking, a temporal context based track management was proposed to decide whether to initiate, maintain or terminate the tracks of different objects, thus suppressing the sparse false alarms and compensating the temporary detection failures. Finally, the proposed method was tested on various challenging real roads, and the experimental results showed that the vehicle detection performance was greatly improved with higher accuracy and robustness.

  18. Multi-vehicle detection with identity awareness using cascade Adaboost and Adaptive Kalman filter for driver assistant system.

    Science.gov (United States)

    Wang, Baofeng; Qi, Zhiquan; Chen, Sizhong; Liu, Zhaodu; Ma, Guocheng

    2017-01-01

    Vision-based vehicle detection is an important issue for advanced driver assistance systems. In this paper, we presented an improved multi-vehicle detection and tracking method using cascade Adaboost and Adaptive Kalman filter(AKF) with target identity awareness. A cascade Adaboost classifier using Haar-like features was built for vehicle detection, followed by a more comprehensive verification process which could refine the vehicle hypothesis in terms of both location and dimension. In vehicle tracking, each vehicle was tracked with independent identity by an Adaptive Kalman filter in collaboration with a data association approach. The AKF adaptively adjusted the measurement and process noise covariance through on-line stochastic modelling to compensate the dynamics changes. The data association correctly assigned different detections with tracks using global nearest neighbour(GNN) algorithm while considering the local validation. During tracking, a temporal context based track management was proposed to decide whether to initiate, maintain or terminate the tracks of different objects, thus suppressing the sparse false alarms and compensating the temporary detection failures. Finally, the proposed method was tested on various challenging real roads, and the experimental results showed that the vehicle detection performance was greatly improved with higher accuracy and robustness.

  19. International safeguards data management system

    International Nuclear Information System (INIS)

    Argentesi, F.; Costantini, L.; Franklin, M.; Dondi, M.G.

    1981-01-01

    The data base management system ''ISADAM'' (i.e. International Safeguards Data Management System) described in this report is intended to facilitate the safeguards authority in making efficient and effective use of accounting reports. ISADAM has been developed using the ADABAS data base management system and is implemented on the JRC-Ispra computer. The evaluation of safeguards declarations focuses on three main objectives: - the requirement of syntactical consistency with the legal conventions of data recording for safeguards accountancy; - the requirement of accounting evidence that there is no material unaccounted for (MUF); - the requirement of semantic consistency with the technological characteristics of the plant and the processing plans of the operator. Section 2 describes in more detail the facilities which ISADAM makes available to a safeguards inspector. Section 3 describes how the MUF variance computation is derived from models of measurement error propagation. Many features of the ISADAM system are automatically provided by ADABAS. The exceptions to this are the utility software designed to: - screen plant declarations before loading into the data base, - prepare variance summary files designed to support real-time computation of MUF and variance of MUF, - provide analyses in response to user requests in interactive or batch mode. Section 4 describes the structure and functions of this software which have been developed by JRC-Ispra

  20. INTEGRATION OF ENVIRONMENTAL MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Tomescu Ada Mirela

    2012-07-01

    Full Text Available The relevance of management as significant factor of business activity can be established on various management systems. These will help to obtain, organise, administrate, evaluate and control particulars: information, quality, environmental protection, health and safety, various resources (time, human, finance, inventory etc. The complexity of nowadays days development, forced us to think ‘integrated’. Sustainable development principles require that environment management policies and practices are not good in themselves but also integrate with all other environmental objectives, and with social and economic development objectives. The principles of sustainable development involve that environment management policies and practices. These are not sound in them-self but also integrate with all other environmental objectives, and with social and economic development objectives. Those objectives were realized, and followed by development of strategies to effects the objective of sustainable development. Environmental management should embrace recent change in the area of environmental protection, and suit the recently regulations of the field -entire legal and economic, as well as perform management systems to meet the requirements of the contemporary model for economic development. These changes are trailed by abandon the conventional approach of environmental protection and it is replaced by sustainable development (SD. The keys and the aims of Cleaner Productions (CP are presented being implemented in various companies as a non-formalised environmental management system (EMS. This concept is suggested here as a proper model for practice where possible environmental harmful technologies are used -e.g. Rosia Montana. Showing the features and the power of CP this paper is a signal oriented to involve the awareness of policy-makers and top management of diverse Romanian companies. Many companies in European countries are developing

  1. Waste management - an integral part of environmental management systems

    Energy Technology Data Exchange (ETDEWEB)

    Hamm, Ulrich

    1998-12-01

    To consider waste as a resource instead of an annoyance with which the management has to cope with, has become an unavoidable task for modern managers. The task the management has to take to secure competitiveness in an environment of rising complexity of production processes and further increasing legal requirements, is to manage waste as much as other recourses are managed. Waste has to be considered an aspect of planning and decision process just as business plans or logistics are. Main themes discussed in this publication comprise waste management, implementation of waste management as an integral part of environmental management systems, and management approach to waste - the results. 4 figs.

  2. DEVELOPMENT OF A COMPUTER SYSTEM FOR IDENTITY AUTHENTICATION USING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Timur Kartbayev

    2017-03-01

    Full Text Available The aim of the study is to increase the effectiveness of automated face recognition to authenticate identity, considering features of change of the face parameters over time. The improvement of the recognition accuracy, as well as consideration of the features of temporal changes in a human face can be based on the methodology of artificial neural networks. Hybrid neural networks, combining the advantages of classical neural networks and fuzzy logic systems, allow using the network learnability along with the explanation of the findings. The structural scheme of intelligent system for identification based on artificial neural networks is proposed in this work. It realizes the principles of digital information processing and identity recognition taking into account the forecast of key characteristics’ changes over time (e.g., due to aging. The structural scheme has a three-tier architecture and implements preliminary processing, recognition and identification of images obtained as a result of monitoring. On the basis of expert knowledge, the fuzzy base of products is designed. It allows assessing possible changes in key characteristics, used to authenticate identity based on the image. To take this possibility into consideration, a neuro-fuzzy network of ANFIS type was used, which implements the algorithm of Tagaki-Sugeno. The conducted experiments showed high efficiency of the developed neural network and a low value of learning errors, which allows recommending this approach for practical implementation. Application of the developed system of fuzzy production rules that allow predicting changes in individuals over time, will improve the recognition accuracy, reduce the number of authentication failures and improve the efficiency of information processing and decision-making in applications, such as authentication of bank customers, users of mobile applications, or in video monitoring systems of sensitive sites.

  3. Data management system advanced development

    Science.gov (United States)

    Douglas, Katherine; Humphries, Terry

    1990-01-01

    The Data Management System (DMS) Advanced Development task provides for the development of concepts, new tools, DMS services, and for the testing of the Space Station DMS hardware and software. It also provides for the development of techniques capable of determining the effects of system changes/enhancements, additions of new technology, and/or hardware and software growth on system performance. This paper will address the built-in characteristics which will support network monitoring requirements in the design of the evolving DMS network implementation, functional and performance requirements for a real-time, multiprogramming, multiprocessor operating system, and the possible use of advanced development techniques such as expert systems and artificial intelligence tools in the DMS design.

  4. A computerized legal information management system | Ohiagu ...

    African Journals Online (AJOL)

    A computerized legal information management system. ... process through the filling system using the survey research methodology. ... A framework for the design and implementation of a legal information management system was presented.

  5. A computational model of the development of separate representations of facial identity and expression in the primate visual system.

    Science.gov (United States)

    Tromans, James Matthew; Harris, Mitchell; Stringer, Simon Maitland

    2011-01-01

    Experimental studies have provided evidence that the visual processing areas of the primate brain represent facial identity and facial expression within different subpopulations of neurons. For example, in non-human primates there is evidence that cells within the inferior temporal gyrus (TE) respond primarily to facial identity, while cells within the superior temporal sulcus (STS) respond to facial expression. More recently, it has been found that the orbitofrontal cortex (OFC) of non-human primates contains some cells that respond exclusively to changes in facial identity, while other cells respond exclusively to facial expression. How might the primate visual system develop physically separate representations of facial identity and expression given that the visual system is always exposed to simultaneous combinations of facial identity and expression during learning? In this paper, a biologically plausible neural network model, VisNet, of the ventral visual pathway is trained on a set of carefully-designed cartoon faces with different identities and expressions. The VisNet model architecture is composed of a hierarchical series of four Self-Organising Maps (SOMs), with associative learning in the feedforward synaptic connections between successive layers. During learning, the network develops separate clusters of cells that respond exclusively to either facial identity or facial expression. We interpret the performance of the network in terms of the learning properties of SOMs, which are able to exploit the statistical indendependence between facial identity and expression.

  6. A computational model of the development of separate representations of facial identity and expression in the primate visual system.

    Directory of Open Access Journals (Sweden)

    James Matthew Tromans

    Full Text Available Experimental studies have provided evidence that the visual processing areas of the primate brain represent facial identity and facial expression within different subpopulations of neurons. For example, in non-human primates there is evidence that cells within the inferior temporal gyrus (TE respond primarily to facial identity, while cells within the superior temporal sulcus (STS respond to facial expression. More recently, it has been found that the orbitofrontal cortex (OFC of non-human primates contains some cells that respond exclusively to changes in facial identity, while other cells respond exclusively to facial expression. How might the primate visual system develop physically separate representations of facial identity and expression given that the visual system is always exposed to simultaneous combinations of facial identity and expression during learning? In this paper, a biologically plausible neural network model, VisNet, of the ventral visual pathway is trained on a set of carefully-designed cartoon faces with different identities and expressions. The VisNet model architecture is composed of a hierarchical series of four Self-Organising Maps (SOMs, with associative learning in the feedforward synaptic connections between successive layers. During learning, the network develops separate clusters of cells that respond exclusively to either facial identity or facial expression. We interpret the performance of the network in terms of the learning properties of SOMs, which are able to exploit the statistical indendependence between facial identity and expression.

  7. Overview of Management Systems. No. 157.

    Science.gov (United States)

    Goddu, Roland

    The need for organizational management is discussed, and educational management systems are examined, with attention paid to organizational components and different approaches to organizational control. (MJB)

  8. Identification of Staphylococcus species with the API STAPH-IDENT system.

    Science.gov (United States)

    Kloos, W E; Wolfshohl, J F

    1982-01-01

    The API STAPH-IDENT system was compared with conventional methods for the identification of 14 Staphylococcus species. Conventional methods included the Kloos and Schleifer simplified scheme and DNA-DNA hybridization. The API STAPH-IDENT strip utilizes a battery of 10 miniaturized biochemical tests, including alkaline phosphatase, urease, beta-glucosidase, beta-glucuronidase, and beta-galactosidase activity, aerobic acid formation from D-(+)-mannose, D-mannitol, D-(+)-trehalose, and salicin, and utilization of arginine. Reactions of cultures were determined after 5 h of incubation at 35 degrees C. Results indicated a high degree of congruence (greater than 90%) between the expedient API system and conventional methods for most species. The addition of a test for novobiocin susceptibility to the API system increased the accuracy of identification of S. saprophyticus, S. cohnii, and S. hominis, significantly. Several strains of S. hominis, S. haemolyticus, and S. warneri which were difficult to separate with the Kloos and Schleifer simplified scheme were accurately resolved by the API system. PMID:6752190

  9. [Effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus].

    Science.gov (United States)

    Kim, HeeSook; Kim, Sue

    2013-02-01

    The purpose of the study was to investigate the effects of an integrated self-management program on self-management, glycemic control, and maternal identity in women with gestational diabetes mellitus (GDM). A non-equivalent control group non-synchronized quasi-experimental design was used. A total of 55 women with GDM were recruited from Cheil General Hospital, Seoul, Korea and were assigned to an experimental (n=28) or control group (n=27). The participants were 24-30 weeks pregnant women who had been diagnosed with GDM as of July 30, 2010. The program was conducted as a 1 hour small group meeting 3 out of 5 times and by telephone-counseling 2 out of 5 times. The integrated self-management program was verified by an expert panel. Although there was no significant reduction in HbA1c (U= -1.17, p=.238), there were statistically significant increases in self-management (U= -3.80, pidentity (U= -4.48, pmanagement program for women with GDM improves self-management, maternal identity, and glycemic control. Further studies are needed to identify the effects of an integrated self-management program on pregnancy and neonatal outcomes.

  10. ISO 9001 quality management systems

    CERN Document Server

    Natarajan, Dhanasekharan

    2017-01-01

    This book explains the requirements of ISO 9001 for establishing quality management system (QMS) for an organization. The requirements are illustrated with examples from industries for understanding the requirements and preparing the documents of QMS with high clarity. Methods of integrating ISO 9001 requirements with enterprise resource planning (ERP) software are presented. The software integrated approach enables process owners to focus on their core tasks of achieving the planned outputs of processes and the software generates quality records automatically.

  11. ISO 9000 Quality Management System

    Science.gov (United States)

    Hadjicostas, Evsevios

    The ISO 9000 series describes a quality management system applicable to any organization. In this chapter we present the requirements of the standard in a way that is as close as possible to the needs of analytical laboratories. The sequence of the requirements follows that in the ISO 9001:2008 standard. In addition, the guidelines for performance improvement set out in the ISO 9004 are reviewed. Both standards should be used as a reference as well as the basis for further elaboration.

  12. INTEGRATED HSEQ MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS

    OpenAIRE

    Osmo Kauppila; Janne Härkönen; Seppo Väyrynen

    2015-01-01

    The integration of health and safety, environmental and quality (HSEQ) management systems has become a current topic in the 21st century, as the need for systems thinking has grown along with the number of management system standards. This study aims to map current developments and trends in integrated HSEQ management. Three viewpoints are taken: the current state of the main HSEQ management standards, research literature on integrated management systems (IMS), and a case study of an industry...

  13. The quality management system applied at PRPN

    International Nuclear Information System (INIS)

    Benar Bukit

    2007-01-01

    The ISO 9001-2000 is an International standard for quality management systems. The application of this quality management system is for guaranteeing that the organizations products will fulfill requirements set by its customers. Here the steps taken to apply the quality management system at PRPN are expounded in five main parts, namely quality management system, responsibilities of the management, resources, product realization, measurement, analysis and repair. (author)

  14. Essentials of Project and Systems Engineering Management

    CERN Document Server

    Eisner, Howard S

    2008-01-01

    The Third Edition of Essentials of Project and Systems Engineering Management enables readers to manage the design, development, and engineering of systems effectively and efficiently. The book both defines and describes the essentials of project and systems engineering management and, moreover, shows the critical relationship and interconnection between project management and systems engineering. The author's comprehensive presentation has proven successful in enabling both engineers and project managers to understand their roles, collaborate, and quickly grasp and apply all the basic princip

  15. Management information systems software evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Al-Tunisi, N.; Ghazzawi, A.; Gruyaert, F.; Clarke, D. [Saudi Aramco, Dhahran (Saudi Arabia). Process and Control Systems Dept.

    1995-11-01

    In November 1993, Saudi Aramco management endorsed a proposal to coordinate the development of the Management Information Systems (MISs) of four concurrent projects for its facilities Controls Modernization Program. The affected projects were the Ras Tanura Refinery Upgrade Project, the Abqaiq Plant Controls Modernization and the Shedgum and Uthmaniyah Gas plants Control Upgrade Projects. All of these projects had a significant requirement of MISs in their scope. Under the leadership of the Process and Control Systems Department, and MIS Coordination Team was formed with representatives of several departments. An MIS Applications Evaluation procedure was developed based on the Kepner Tregoe Decisions Analysis Process and general questionnaires were sent to over a hundred potential Vendors. The applications were divided into several categories, such as: Data Capture and Historization, Human User Interface, Trending, Reporting, Graphic Displays, Data Reconciliation, Statistical Analysis, Expert Systems, Maintenance Applications, Document Management and Operations Planning and Scheduling. For each of the MIS Application areas, detailed follow-up questionnaires were used to short list the candidate products. In May and June 1994, selected Vendors were invited to Saudi Arabia for an Exhibition which was open to all Saudi Aramco employees. In conjunction with this, the Vendors were subjected to a rigorous product testing exercise by independent teams of testers. The paper will describe the methods used and the lessons learned in this extensive software evaluation phase, which was a first for Saudi Aramco.

  16. Management information systems software evaluation

    International Nuclear Information System (INIS)

    Al-Tunisi, N.; Ghazzawi, A.; Gruyaert, F.; Clarke, D.

    1995-01-01

    In November 1993, Saudi Aramco management endorsed a proposal to coordinate the development of the Management Information Systems (MISs) of four concurrent projects for its facilities Controls Modernization Program. The affected projects were the Ras Tanura Refinery Upgrade Project, the Abqaiq Plant Controls Modernization and the Shedgum and Uthmaniyah Gas plants Control Upgrade Projects. All of these projects had a significant requirement of MISs in their scope. Under the leadership of the Process and Control Systems Department, and MIS Coordination Team was formed with representatives of several departments. An MIS Applications Evaluation procedure was developed based on the Kepner Tregoe Decisions Analysis Process and general questionnaires were sent to over a hundred potential Vendors. The applications were divided into several categories, such as: Data Capture and Historization, Human User Interface, Trending, Reporting, Graphic Displays, Data Reconciliation, Statistical Analysis, Expert Systems, Maintenance Applications, Document Management and Operations Planning and Scheduling. For each of the MIS Application areas, detailed follow-up questionnaires were used to short list the candidate products. In May and June 1994, selected Vendors were invited to Saudi Arabia for an Exhibition which was open to all Saudi Aramco employees. In conjunction with this, the Vendors were subjected to a rigorous product testing exercise by independent teams of testers. The paper will describe the methods used and the lessons learned in this extensive software evaluation phase, which was a first for Saudi Aramco

  17. A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Wang, Zhiheng; Huo, Zhanqiang; Shi, Wenbo

    2015-01-01

    With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients' privacy and medial data's security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user's anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin's scheme and demonstrate the proposed scheme could withstand various attacks.

  18. The system for waste management

    International Nuclear Information System (INIS)

    Hennelly, E.J.

    1987-01-01

    The author views the system for the management of high level radioactive waste as having five major components science and technology, domestic politics, international programs, regulation and institutions, and the ever changing rules and public perceptions. A system failure will usually occur because of the failure to communicate and not because of inadequate scientific data or engineering skills. For effective communication to occur the participants need to understand each other. The author will focus on this issue as a major theme of this presentation

  19. Environmental management & audit 2: Management systems

    OpenAIRE

    2018-01-01

    The present scientific monograph, entitled “Environmental management & audit“, is the result of three years’ work on an international project entitled “Environmental management in Russian companies – retraining courses for the sensibilization for and integration of Eco-Audit programs in corporate decision-making (RECOAUD)”. Within its more than 600 pages, the monograph features interesting texts written by 31 authors from the European Union and the Russian Federation, edited by dr. Borut Jere...

  20. Configuration Management File Manager Developed for Numerical Propulsion System Simulation

    Science.gov (United States)

    Follen, Gregory J.

    1997-01-01

    One of the objectives of the High Performance Computing and Communication Project's (HPCCP) Numerical Propulsion System Simulation (NPSS) is to provide a common and consistent way to manage applications, data, and engine simulations. The NPSS Configuration Management (CM) File Manager integrated with the Common Desktop Environment (CDE) window management system provides a common look and feel for the configuration management of data, applications, and engine simulations for U.S. engine companies. In addition, CM File Manager provides tools to manage a simulation. Features include managing input files, output files, textual notes, and any other material normally associated with simulation. The CM File Manager includes a generic configuration management Application Program Interface (API) that can be adapted for the configuration management repositories of any U.S. engine company.

  1. Techno-Redemption of transsexual bodies: Appropriation of technology and Self-Management of Unfinished identities

    Directory of Open Access Journals (Sweden)

    Alejandra Roca

    2015-06-01

    Full Text Available In this paper, we want to explore the modifications and procedures that delineate limits between the notions of body, sexuality, and nature. Based on ethnographic fieldwork in public institutions of Buenos Aires and La Plata (Argentina, we examine the medical-legal process concerning "sex reassignment" in transsexual people, which illuminates the unfold senses about the plasticity and precariousness of 'human essences', as well as the tensions between what human is (identity and what he/she wants to be (project. We discuss the proposals of transhumanism, accepting that the soteriological dimension of biosciences enable the hopes of techno-redemption. Finally, we intend to contribute with a reflection about the role of scientific categories and the political perspective of the emergence of identities and collective resistances about the tutelage of cognitive and material control of the biosciences.

  2. Quantum Type Indeterminacy in Dynamic Decision-Making: Self-Control through Identity Management

    Directory of Open Access Journals (Sweden)

    Jerome Busemeyer

    2012-05-01

    Full Text Available The Type Indeterminacy model is a theoretical framework that uses some elements of quantum formalism to model the constructive preference perspective suggested by Kahneman and Tversky. In a dynamic decision context, type indeterminacy induces a game with multiple selves associated with a state transition process. We define a Markov perfect equilibrium among the selves with individual identity (preferences as the state variable. The approach allows to characterize generic personality types and derive some comparative static results.

  3. Electric vehicle energy management system

    Science.gov (United States)

    Alaoui, Chakib

    This thesis investigates and analyzes novel strategies for the optimum energy management of electric vehicles (EVs). These are aimed to maximize the useful life of the EV batteries and make the EV more practical in order to increase its acceptability to market. The first strategy concerns the right choice of the batteries for the EV according to the user's driving habits, which may vary. Tests conducted at the University of Massachusetts Lowell battery lab show that the batteries perform differently from one manufacturer to the other. The second strategy was to investigate the fast chargeability of different batteries, which leads to reduce the time needed to recharge the EV battery pack. Tests were conducted again to prove that only few battery types could be fast charged. Test data were used to design a fast battery charger that could be installed in an EV charging station. The third strategy was the design, fabrication and application of an Electric Vehicle Diagnostic and Rejuvenation System (EVDRS). This system is based on Mosfet Controlled Thyristors (MCTs). It is capable of quickly identifying any failing battery(s) within the EV pack and rejuvenating the whole battery pack without dismantling them and unloading them. A novel algorithm to rejuvenate Electric Vehicle Sealed Lead Acid Batteries is described. This rejuvenation extends the useful life of the batteries and makes the EV more competitive. The fourth strategy was to design a thermal management system for EV, which is crucial to the safe operation, and the achievement of normal/optimal performance of, electric vehicle (EV) batteries. A novel approach for EV thermal management, based on Pettier-Effect heat pumps, was designed, fabricated and tested in EV. It shows the application of this type of technology for thermal management of EVs.

  4. Licensing management system prototype system design

    International Nuclear Information System (INIS)

    Immerman, W.H.; Arcuni, A.A.; Elliott, J.M.; Chapman, L.D.

    1983-11-01

    This report is a design document for a prototype implementation of a licensing management system (LMS) as defined in SAND83-7080. It describes the concept of operations for full implementation of an LMS in accordance with the previously defined functional requirements. It defines a subset of a full LMS suitable for meeting prototype implementation goals, and proposes a system design for this subset. The report describes overall system design considerations consistent with, but more explicit than the general characteristics required by the LMS functional definition. A high level design is presented for just those functions selected for prototype implementation. The report also provides a data element dictionary describing the structured logical data elements required to implement the selected functions

  5. CIMS: The Cartographic Information Management System,

    Science.gov (United States)

    1981-01-01

    use. Large-scale information systems may cover large amounts of information such as the Land Identification and Information Management System (LIMS...small computer in managing the information holdings of a mapping institute. The result is the Cartographic Information Management System (CIMS), a...American countrie.s. 1 .- - _ _ _ _. = _ m m m THE CARTOGRAPHIC INFORMATION MANAGEMENT SYSTEM System Rationale Interactive computer-assisted cartography

  6. TRAMWAY MANAGEMENT SYSTEM IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Melia Damayanti

    2015-01-01

    Full Text Available Tramway systems, which can carry more passengers than buses at one haul, are now being proposed to meet Indonesia’s public transport requirement. The objective of this research is to analyze the management structures for operating tram in different countries and then propose a suitable organizational structure for operating trams, if re-introduced, in Indonesia. The author chose France (Montpellier tramway, Germany (Karlsruhe tram-train and the UK (Nottingham Express Transit as the role model countries for investigation. From the analysis, the most appropriate organizational structure and suitable tramway management structure for operating tramways implementation in Indonesia. The key features of the research are to establish public transport company by local government to manage all public transport systems, propose tramway construction and operation to exist as separate departments under the tramway team division of the public company, recommend the public transport company to have responsibility for overseeing construction of the trams, operating, and maintaining the trams, suggest local government to own them and have responsibility for tramway strategic policy, control regulation as well as supervision and coordination of the performance of the public transport company, propose joint working between public and private sectors.

  7. On creating macroscopically identical granular systems with different numbers of particles

    Science.gov (United States)

    van der Meer, Devaraj; Rivas, Nicolas

    2015-11-01

    One of the fundamental differences between granular and molecular hydrodynamics is the enormous difference in the total number of constituents. The small number of particles implies that the role of fluctuations in granular dynamics is of paramount importance. To obtain more insight in these fluctuations, we investigate to what extent it is possible to create identical granular hydrodynamic states with different number of particles. A definition is given of macroscopically equivalent systems, and the dependency of the conservation equations on the particle size is studied. We show that, in certain cases, and by appropriately scaling the microscopic variables, we are able to compare systems with significantly different number of particles that present the same macroscopic phenomenology. We apply these scalings in simulations of a vertically vibrated system, namely the density inverted granular Leidenfrost state and its transition to a buoyancy-driven convective state.

  8. Seniority in quantum many-body systems. I. Identical particles in a single shell

    Energy Technology Data Exchange (ETDEWEB)

    Van Isacker, P., E-mail: isacker@ganil.fr [Grand Accélérateur National d’Ions Lourds, CEA/DSM–CNRS/IN2P3, BP 55027, F-14076 Caen Cedex 5 (France); Heinze, S. [Institut für Kernphysik der Universität zu Köln, 50937 Köln (Germany)

    2014-10-15

    A discussion of the seniority quantum number in many-body systems is presented. The analysis is carried out for bosons and fermions simultaneously but is restricted to identical particles occupying a single shell. The emphasis of the paper is on the possibility of partial conservation of seniority which turns out to be a peculiar property of spin-9/2 fermions but prevalent in systems of interacting bosons of any spin. Partial conservation of seniority is at the basis of the existence of seniority isomers, frequently observed in semi-magic nuclei, and also gives rise to peculiar selection rules in one-nucleon transfer reactions. - Highlights: • Unified derivation of conditions for the total and partial conservation of seniority. • General analysis of the partial conservation of seniority in boson systems. • Why partial conservation of seniority is crucial for seniority isomers in nuclei. • The effect of partial conservation of seniority on one-nucleon transfer intensities.

  9. Seniority in quantum many-body systems. I. Identical particles in a single shell

    International Nuclear Information System (INIS)

    Van Isacker, P.; Heinze, S.

    2014-01-01

    A discussion of the seniority quantum number in many-body systems is presented. The analysis is carried out for bosons and fermions simultaneously but is restricted to identical particles occupying a single shell. The emphasis of the paper is on the possibility of partial conservation of seniority which turns out to be a peculiar property of spin-9/2 fermions but prevalent in systems of interacting bosons of any spin. Partial conservation of seniority is at the basis of the existence of seniority isomers, frequently observed in semi-magic nuclei, and also gives rise to peculiar selection rules in one-nucleon transfer reactions. - Highlights: • Unified derivation of conditions for the total and partial conservation of seniority. • General analysis of the partial conservation of seniority in boson systems. • Why partial conservation of seniority is crucial for seniority isomers in nuclei. • The effect of partial conservation of seniority on one-nucleon transfer intensities

  10. Toward a general theory of conical intersections in systems of identical nuclei

    Science.gov (United States)

    Keating, Sean P.; Mead, C. Alden

    1987-02-01

    It has been shown previously that the Herzberg-Longuet-Higgins sign change produced in Born-Oppenheimer electronic wave functions when the nuclei traverse a closed path around a conical intersection has implications for the symmetry of wave functions under permutations of identical nuclei. For systems of three or four identical nuclei, there are special features present which have facilitated the detailed analysis. The present paper reports progress toward a general theory for systems of n nuclei. For n=3 or 4, the two key functions which locate conical intersections and define compensating phase factors can conveniently be defined so as to transform under permutations according to a two-dimensional irreducible representation of the permutation group. Since such representations do not exist for n>4, we have chosen to develop a formalism in terms of lab-fixed electronic basis functions, and we show how to define the two key functions in principle. The functions so defined both turn out to be totally symmetric under permutations. We show how they can be used to define compensating phase factors so that all modified electronic wave functions are either totally symmetric or totally antisymmetric under permutations. A detailed analysis is made to cyclic permutations in the neighborhood of Dnh symmetry, which can be extended by continuity arguments to more general configurations, and criteria are obtained for sign changes. There is a qualitative discussion of the treatment of more general permutations.

  11. [Gender identity, a factor of inequality forgotten by Spanish health information systems].

    Science.gov (United States)

    Gil-Borrelli, Christian; Velasco, César; Martí-Pastor, Marc; Latasa, Pello

    The Spanish Health Information System (HIS) collects health information. Trans people have poorer health status. This paper aimed to assess the adequacy of the HIS to collect the health data on trans individuals. The HIS sources available in the Statistical Portal of the National Health System were reviewed. The sources containing population health data were selected. The variables "sex" and "gender identity" were searched. Nineteen sources were identified. In all of them the variable "sex" was found, whereas "gender identify" did not appear in any of the 19. In two sources, the variable "sex" allowed values of "transsexual". The SIS contains little information regarding gender identity. This leads to the invisibility of trans people in Spanish health statistics. Obtaining this information would allow for a better understanding of the barriers to health care access, and the health needs of one of the most discriminated groups in our society. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  12. Using electronic document management systems to manage highway project files.

    Science.gov (United States)

    2011-12-12

    "WisDOTs Bureau of Technical Services is interested in learning about the practices of other state departments of : transportation in developing and implementing an electronic document management system to manage highway : project files"

  13. Improvement of management systems for nuclear facilities

    International Nuclear Information System (INIS)

    2005-01-01

    The area of Quality Management/ Quality Assurance has been changed dramatically over the past years. The nuclear facilities moved from the 'traditional' Quality Assurance approach towards Quality Management Systems, and later a new concept of Integrated Management Systems was introduced. The IAEA is developing a new set of Standards on Integrated Management Systems, which will replace the current 50-C-Q/SG-Q1-Q14 Code. The new set of document will require the integration of all management areas into one coherent management system. The new set of standards on Management Systems promotes the concept of the Integrated Management Systems. Based on new set a big number of documents are under preparation. These documents will address the current issues in the management systems area, e.g. Management of Change, Continuous Improvement, Self-assessment, and Attributes of effective management, etc. Currently NPES is providing a number of TC projects and Extra Budgetary Programmes to assist Member States in this area. The new Standards on Management Systems will be published in 2006. A number of Regulatory bodies already indicated that they would take the new Management System Standards as a basis for the national regulation. This fact will motivate a considerable change in the management of nuclear utilities, requiring a new approach. This activity is suitable for all IAEA Members States with large or limited nuclear capabilities. The service is directed to provide assistance for the management of all organizations carrying on or regulating nuclear activities and facilities

  14. Development of Information Management System for Plant Life Cycle Management

    International Nuclear Information System (INIS)

    Byon, SuJin; Lee, SangHyun; Kim, WooJoong

    2015-01-01

    The study subjects are S. Korean NPP(Nuclear Power Plant) construction projects. Design, construction, operations companies have different nuclear power plant construction project structures, and each company has its own Information Management System. In this study, the end user developed an Information Management System early in the project, and developed a management structure that systematically integrates and interfaces with information in each lifecycle phase. The main perspective of Information Management is moving from the existent document-centric management to the data-centric management. To do so, we intend to integrate information with interfaces among systems. Integrated information management structure and management system are essential for an effective management of the lifecycle information of nuclear power plants that have a lifespan over as much as 80 years. The concept of integration management adopted by the defence, ocean industries or various PLM solution providers is important. Although the NPP project has application systems in each key lifecycle phase, it is more effective to develop and use PLIMS in consideration of the interface and compatibility of information among systems. As an initial study for development of that integrated information management structure, this study is building the system and has interfaced it with a design-stage system

  15. Development of Information Management System for Plant Life Cycle Management

    Energy Technology Data Exchange (ETDEWEB)

    Byon, SuJin; Lee, SangHyun; Kim, WooJoong [KOREA HYDRO and NUCLEAR POWER CO. LTD, Daejeon (Korea, Republic of)

    2015-10-15

    The study subjects are S. Korean NPP(Nuclear Power Plant) construction projects. Design, construction, operations companies have different nuclear power plant construction project structures, and each company has its own Information Management System. In this study, the end user developed an Information Management System early in the project, and developed a management structure that systematically integrates and interfaces with information in each lifecycle phase. The main perspective of Information Management is moving from the existent document-centric management to the data-centric management. To do so, we intend to integrate information with interfaces among systems. Integrated information management structure and management system are essential for an effective management of the lifecycle information of nuclear power plants that have a lifespan over as much as 80 years. The concept of integration management adopted by the defence, ocean industries or various PLM solution providers is important. Although the NPP project has application systems in each key lifecycle phase, it is more effective to develop and use PLIMS in consideration of the interface and compatibility of information among systems. As an initial study for development of that integrated information management structure, this study is building the system and has interfaced it with a design-stage system.

  16. Senior Management Use of Management Control Systems in Large Companies

    DEFF Research Database (Denmark)

    Willert, Jeanette; Israelsen, Poul; Rohde, Carsten

    2017-01-01

    Ferreira and Otley’s (2009) conceptual and holistic framework for performance management systems, supplemented by elements of contextual factors and organisational culture. Further, selected researchers’ perceptions of the purpose of using management control systems are related to practitioners’ ideas......The use of management control systems in large companies remains relatively unexplored. Indeed, only a few studies of senior managers’ use of management control systems consider multiple controls in companies. This paper explores data from a comprehensive survey of the use of management control...... systems in 120 strategic business units at some of the largest companies in Denmark. The paper identifies how senior management guides and controls their subordinates to meet their companies’ objectives. The presentation and discussion of the results, including citations from executive managers, use...

  17. Integrated Procurement Management System, Version II

    Science.gov (United States)

    Collier, L. J.

    1985-01-01

    Integrated Procurement Management System, Version II (IPMS II) is online/ batch system for collecting developing, managing and disseminating procurementrelated data at NASA Johnson Space Center. Portions of IPMS II adaptable to other procurement situations.

  18. A rural transit asset management system

    Science.gov (United States)

    2005-01-01

    This reports the research undertaken to create an interactive, geographic information system based asset management system for the Alabama Department of Transportation to manage vehicles purchased and operated through Section 5310 and 5311 federal gr...

  19. Environmental Management System ISO 14001

    CERN Document Server

    Haider, Syed

    2010-01-01

    This is a must-have tool for any company in the process of adopting and incorporating the ISO 14001:2004 requirements, this book and accompanying CD-ROM provides the latest updates and amendments and translates the ISO language into actionable strategy. Offering administrative solutions to managers of all sorts, it includes practical examples of policies with objectives, targets, and action plans applicable to any process related industry or an ordinary organization. With template formats and hands-on flow charts to describe step-by-step system development, documentation, and implementation ph

  20. Electricity pricing and management systems

    International Nuclear Information System (INIS)

    Sawal, D.M.; Bajapai, Ashok

    1997-01-01

    The installed capacity of power generation in India is at present 80,000 MW. Out of the total 5.79 lakh inhabitated villages in the country, 4.79 villages have been electrified so far. Total number of consumers of electricity are about 95 million in the country. For such a large country with population of over 900 million and area of 32.873 lakh sq. kms., the role of electricity pricing and management system of the power sector is of paramount importance

  1. Learning Management Systems and Comparison of Open Source Learning Management Systems and Proprietary Learning Management Systems

    Directory of Open Access Journals (Sweden)

    Yücel Yılmaz

    2016-04-01

    Full Text Available The concept of learning has been increasingly gaining importance for individuals, businesses and communities in the age of information. On the other hand, developments in information and communication technologies take effect in the field of learning activities. With these technologies, barriers of time and space against the learning activities largely disappear and these technologies make it easier to carry out these activities more effectively. There remain a lot of questions regarding selection of learning management system (LMS to be used for the management of e-learning processes by all organizations conducing educational practices including universities, companies, non-profit organizations, etc. The main questions are as follows: Shall we choose open source LMS or commercial LMS? Can the selected LMS meet existing needs and future potential needs for the organization? What are the possibilities of technical support in the management of LMS? What kind of problems may be experienced in the use of LMS and how can these problems be solved? How much effective can officials in the organization be in the management of LMS? In this study, primarily e-learning and the concept of LMS will be discussed, and in the next section, as for answers to these questions, open source LMSs and centrally developed LMSs will be examined and their advantages and disadvantages relative to each other will be discussed.

  2. Strategic management of health care information systems: nurse managers' perceptions.

    Science.gov (United States)

    Lammintakanen, Johanna; Kivinen, Tuula; Saranto, Kaija; Kinnunen, Juha

    2009-01-01

    The aim of this study is to describe nurse managers' perceptions of the strategic management of information systems in health care. Lack of strategic thinking is a typical feature in health care and this may also concern information systems. The data for this study was collected by eight focus group interviews including altogether 48 nurse managers from primary and specialised health care. Five main categories described the strategic management of information systems in health care; IT as an emphasis of strategy; lack of strategic management of information systems; the importance of management; problems in privacy protection; and costs of IT. Although IT was emphasised in the strategies of many health care organisations, a typical feature was a lack of strategic management of information systems. This was seen both as an underutilisation of IT opportunities in health care organisations and as increased workload from nurse managers' perspective. Furthermore, the nurse managers reported that implementation of IT strengthened their managerial roles but also required stronger management. In conclusion, strategic management of information systems needs to be strengthened in health care and nurse managers should be more involved in this process.

  3. Design and Data Management System

    Science.gov (United States)

    Messer, Elizabeth; Messer, Brad; Carter, Judy; Singletary, Todd; Albasini, Colby; Smith, Tammy

    2007-01-01

    The Design and Data Management System (DDMS) was developed to automate the NASA Engineering Order (EO) and Engineering Change Request (ECR) processes at the Propulsion Test Facilities at Stennis Space Center for efficient and effective Configuration Management (CM). Prior to the development of DDMS, the CM system was a manual, paper-based system that required an EO or ECR submitter to walk the changes through the acceptance process to obtain necessary approval signatures. This approval process could take up to two weeks, and was subject to a variety of human errors. The process also requires that the CM office make copies and distribute them to the Configuration Control Board members for review prior to meetings. At any point, there was a potential for an error or loss of the change records, meaning the configuration of record was not accurate. The new Web-based DDMS eliminates unnecessary copies, reduces the time needed to distribute the paperwork, reduces time to gain the necessary signatures, and prevents the variety of errors inherent in the previous manual system. After implementation of the DDMS, all EOs and ECRs can be automatically checked prior to submittal to ensure that the documentation is complete and accurate. Much of the configuration information can be documented in the DDMS through pull-down forms to ensure consistent entries by the engineers and technicians in the field. The software also can electronically route the documents through the signature process to obtain the necessary approvals needed for work authorization. The workflow of the system allows for backups and timestamps that determine the correct routing and completion of all required authorizations in a more timely manner, as well as assuring the quality and accuracy of the configuration documents.

  4. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  5. Senior Management Use of Management Control Systems in Large Companies

    DEFF Research Database (Denmark)

    Willert, Jeanette; Israelsen, Poul; Rohde, Carsten

    2017-01-01

    The use of management control systems in large companies remains relatively unexplored. Indeed, only a few studies of senior managers’ use of management control systems consider multiple controls in companies. This paper explores data from a comprehensive survey of the use of management control...... systems in 120 strategic business units at some of the largest companies in Denmark. The paper identifies how senior management guides and controls their subordinates to meet their companies’ objectives. The presentation and discussion of the results, including citations from executive managers, use...

  6. Construction Management Risk System (CMRS for Construction Management (CM Firms

    Directory of Open Access Journals (Sweden)

    Kyungmo Park

    2017-02-01

    Full Text Available After the global financial crisis of 2008, the need for risk management arose because it was necessary to minimize the losses in construction management (CM firms. This was caused by a decreased amount of orders in the Korean CM market, which intensified order competition between companies. However, research results revealed that risks were not being systematically managed owing to the absence of risk management systems. Thus, it was concluded that it was necessary to develop standard operating systems and implement risk management systems in order to manage risks effectively. Therefore, the purpose of this study was to develop a construction risk management system (CRMS for systematically managing risks. For this purpose, the field operation managers of CM firms were interviewed and surveyed in order to define risk factors. Upon this, a risk assessment priority analysis was performed. Finally, a risk management system that comprised seven modules and 20 sub-modules and was capable of responding systematically to risks was proposed. Furthermore, the effectiveness of this system was verified through on-site inspection. This system allows early response to risks, accountability verification and immediate response to legal disputes with clients by managing risk records.

  7. Information management system for KNGR

    International Nuclear Information System (INIS)

    Moon, Chankook; Yoo, Keunbae; Lee, Jinkie; Park, Jaemoon

    1996-01-01

    Information management system(IMS) is under development by Korea Electric Power COrporation(KEPCO) joined with KOrea Power Engineering Company(KOPEC) since early 1993 in accordance with Korean Next Generation Reactor(KNGR) project schedule, which is divided into three phases: Phase I(1993-1994), Phase II(1995-Feb.1998), Phase III(1998-2001). Necessity of creating IMS comes from two main purposes: one is from client requirement as described on Electric Power Research Institute(EPRI) Utility Requirement Document(URD) top-tier, the other is from supplier's need to improve productivity whatever it is motivated by management or working group. To satisfy both consumer's and producer's requirements we have set up goals of IMS, to provide configuration management based on network and reliable integrated data base through KNGR's life cycle: i.e.,chronologically, siting, designing, construction, operation and maintenance, and decommissioning. This paper will show what we have done to make the concept during Phase I, and what is a current problem and what will be done through Phase II and III

  8. Integrated Project Management System description

    International Nuclear Information System (INIS)

    1994-09-01

    The Integrated Program Management System (IPMS) Description is a ''working'' document that describes the work processes of the Uranium Mill Tailings Remedial Action Project Office (UMTRA) and IPMS Group. This document has undergone many revisions since the UMTRA Project began; this revision not only updates the work processes but more clearly explains the relationships between the Project Office, contractors, and other participants. The work process flow style has been revised to better describe Project work and the relationships of participants. For each work process, more background and guidance on ''why'' and ''what is expected'' is given. For example, a description of activity data sheets has been added in the work organization and the Project performance and reporting processes, as well as additional detail about the federal budget process and funding management and improved flow charts and explanations of cost and schedule management. A chapter has been added describing the Cost Reduction/Productivity Improvement Program. The Change Control Board (CCB) procedures (Appendix A) have been updated. Project critical issues meeting (PCIM) procedures have been added as Appendix B. Budget risk assessment meeting procedures have been added as Appendix C. These appendices are written to act as stand-alone documentation for each process. As the procedures are improved and updated, the documentation can be updated separately

  9. Information management system for KNGR

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Chankook; Yoo, Keunbae; Lee, Jinkie [Korea Electric Power Corporation, Seoul (Korea, Republic of); Park, Jaemoon [Korea Power Engineering Co., Inc., Daejeon (Korea, Republic of)

    1996-04-15

    Information management system(IMS) is under development by Korea Electric Power COrporation(KEPCO) joined with KOrea Power Engineering Company(KOPEC) since early 1993 in accordance with Korean Next Generation Reactor(KNGR) project schedule, which is divided into three phases: Phase I(1993-1994), Phase II(1995-Feb.1998), Phase III(1998-2001). Necessity of creating IMS comes from two main purposes: one is from client requirement as described on Electric Power Research Institute(EPRI) Utility Requirement Document(URD) top-tier, the other is from supplier's need to improve productivity whatever it is motivated by management or working group. To satisfy both consumer's and producer's requirements we have set up goals of IMS, to provide configuration management based on network and reliable integrated data base through KNGR's life cycle: i.e.,chronologically, siting, designing, construction, operation and maintenance, and decommissioning. This paper will show what we have done to make the concept during Phase I, and what is a current problem and what will be done through Phase II and III.

  10. Management Systems. Accounting and finance: Public Management

    OpenAIRE

    Martins, J. Albuquerque

    2005-01-01

    Traditionally the differences between the organizations of the public property sector and those of the private one are pointed out. In addition to the classic failures on both of these productive sectors, based on the organizational “500 Maiores e Melhores” operating in Portugal that are divergent in resources, in the present work any substantial differences amongst these sectors’ organizations have been found. Regarding the subject to the models of management, the present study corroborate s...

  11. Microcomputer Database Management Systems for Bibliographic Data.

    Science.gov (United States)

    Pollard, Richard

    1986-01-01

    Discusses criteria for evaluating microcomputer database management systems (DBMS) used for storage and retrieval of bibliographic data. Two popular types of microcomputer DBMS--file management systems and relational database management systems--are evaluated with respect to these criteria. (Author/MBR)

  12. Incorporating co-management within your environmental management system

    International Nuclear Information System (INIS)

    Melton, D.A.; Maher, S.

    1998-01-01

    The meaning of co-management in the renewable resource sector in terms of government and First Nations relations was explained. Co-management is a short term for co-operative management and has a formative history in the Northwest Territories, particularly in wildlife management. For example, co-management bridged the gap between the aboriginal way of hunting with those of the government. The aboriginal system was associated by self regulation based on traditional knowledge whereas the government system emphasized science, laws and regulations. At present, there are few examples of co-management in the oil and gas sector. This paper described the lessons that could be learned from previous examples of co-management and how those lessons might apply to an Environmental Management System (EMS) for the private oil and gas sector. 3 refs

  13. Transition Office Management and Accounting System

    Data.gov (United States)

    US Agency for International Development — TOMAS combined over 20 previously separate systems into one fully integrated management system covering budget, finance, procurement, travel, and emergency contact...

  14. The Services Identity and Their Management in the Actual Economic Context

    Directory of Open Access Journals (Sweden)

    Bărăgan Laura Georgeta

    2017-01-01

    Full Text Available This article is an introduction to the unique characteristics of services and to their overall management within a dynamic context. The article highlights the economic and social significance of services, the differences between services and goods and the importance of management services.

  15. Defense Contract Management Command Support to System Acquisition Program Managers

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report discusses the planning of contract administration office support to system acquisition program managers through the program integration process and the customer support outreach program...

  16. 76 FR 35483 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-06-17

    ... Records: 500.050 HSPD-12: Identity Management System is being established to support implementation of...: USPS 500.050 SYSTEM NAME: HSPD-12: Identity Management System (IDMS). Accordingly, the Postal Service... Management System (IDMS). SYSTEM LOCATION: Records relating to the Identity Management System are maintained...

  17. Impact of Cropping Systems, Soil Inoculum, and Plant Species Identity on Soil Bacterial Community Structure.

    Science.gov (United States)

    Ishaq, Suzanne L; Johnson, Stephen P; Miller, Zach J; Lehnhoff, Erik A; Olivo, Sarah; Yeoman, Carl J; Menalled, Fabian D

    2017-02-01

    Farming practices affect the soil microbial community, which in turn impacts crop growth and crop-weed interactions. This study assessed the modification of soil bacterial community structure by organic or conventional cropping systems, weed species identity [Amaranthus retroflexus L. (redroot pigweed) or Avena fatua L. (wild oat)], and living or sterilized inoculum. Soil from eight paired USDA-certified organic and conventional farms in north-central Montana was used as living or autoclave-sterilized inoculant into steam-pasteurized potting soil, planted with Am. retroflexus or Av. fatua and grown for two consecutive 8-week periods to condition soil nutrients and biota. Subsequently, the V3-V4 regions of the microbial 16S rRNA gene were sequenced by Illumina MiSeq. Treatments clustered significantly, with living or sterilized inoculum being the strongest delineating factor, followed by organic or conventional cropping system, then individual farm. Living inoculum-treated soil had greater species richness and was more diverse than sterile inoculum-treated soil (observed OTUs, Chao, inverse Simpson, Shannon, P soil contained more Chloroflexi and Acidobacteria, while the sterile inoculum soil had more Bacteroidetes, Firmicutes, Gemmatimonadetes, and Verrucomicrobia. Organically farmed inoculum-treated soil had greater species richness, more diversity (observed OTUs, Chao, Shannon, P soil. Cyanobacteria were higher in pots growing Am. retroflexus, regardless of inoculum type, for three of the four organic farms. Results highlight the potential of cropping systems and species identity to modify soil bacterial communities, subsequently modifying plant growth and crop-weed competition.

  18. The MNESIS model: Memory systems and processes, identity and future thinking.

    Science.gov (United States)

    Eustache, Francis; Viard, Armelle; Desgranges, Béatrice

    2016-07-01

    The Memory NEo-Structural Inter-Systemic model (MNESIS; Eustache and Desgranges, Neuropsychology Review, 2008) is a macromodel based on neuropsychological data which presents an interactive construction of memory systems and processes. Largely inspired by Tulving's SPI model, MNESIS puts the emphasis on the existence of different memory systems in humans and their reciprocal relations, adding new aspects, such as the episodic buffer proposed by Baddeley. The more integrative comprehension of brain dynamics offered by neuroimaging has contributed to rethinking the existence of memory systems. In the present article, we will argue that understanding the concept of memory by dividing it into systems at the functional level is still valid, but needs to be considered in the light of brain imaging. Here, we reinstate the importance of this division in different memory systems and illustrate, with neuroimaging findings, the links that operate between memory systems in response to task demands that constrain the brain dynamics. During a cognitive task, these memory systems interact transiently to rapidly assemble representations and mobilize functions to propose a flexible and adaptative response. We will concentrate on two memory systems, episodic and semantic memory, and their links with autobiographical memory. More precisely, we will focus on interactions between episodic and semantic memory systems in support of 1) self-identity in healthy aging and in brain pathologies and 2) the concept of the prospective brain during future projection. In conclusion, this MNESIS global framework may help to get a general representation of human memory and its brain implementation with its specific components which are in constant interaction during cognitive processes. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Designing an oil spill information management system

    International Nuclear Information System (INIS)

    Douligeris, C.; Collins, J.; Iakovou, E.; Sun, P.; Riggs, K.R.

    1995-01-01

    This paper presents the architectural design of OSIMS, an Oil Spill Information Management System, which is an integrated information management tool that consists of an object-relational database management system, an adaptive decision support system, an advanced visualization system (AVS) and a geographic information system (GIS). OSIMS will handle large and diverse databases of environmental, ecological, geographical, engineering, and regulatory information and will be used for risk analysis and contingency planning

  20. Designing an oil spill information management system

    Energy Technology Data Exchange (ETDEWEB)

    Douligeris, C.; Collins, J.; Iakovou, E.; Sun, P.; Riggs, K.R. [Univ. of Miami, Coral Gables, FL (United States)

    1995-12-31

    This paper presents the architectural design of OSIMS, an Oil Spill Information Management System, which is an integrated information management tool that consists of an object-relational database management system, an adaptive decision support system, an advanced visualization system (AVS) and a geographic information system (GIS). OSIMS will handle large and diverse databases of environmental, ecological, geographical, engineering, and regulatory information and will be used for risk analysis and contingency planning.

  1. FEATURES OF LOGISTIC SYSTEM ADAPTIVE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Natalya VOZNENKO

    2015-08-01

    Full Text Available The study presents literature survey on enterprise logistic system adaptive management place and structure in the general enterprise management system. The theoretical basics of logistic system functioning, levels of its management and its effectiveness had been investigated. The role of adaptive management and its types had been scrutinized. The necessity of creating company’s adaptive regulator such as its economic mechanism had been proved.

  2. The role of the Pauli principle in three-cluster systems composed of identical clusters

    International Nuclear Information System (INIS)

    Lashko, Yu.A.; Filippov, G.F.

    2009-01-01

    Within the microscopic model based on the algebraic version of the resonating group method the role of the Pauli principle in the formation of continuum wave function of nuclear systems composed of three identical s-clusters has been investigated. Emphasis is placed upon the study of the exchange effects contained in the genuine three-cluster norm kernel. Three-fermion, three-boson, three-dineutron (3d ' ) and 3α systems are considered in detail. Simple analytical method of constructing the norm kernel for 3α system is suggested. The Pauli-allowed basis functions for the 3α and 3d ' systems are given in an explicit form and asymptotic behavior of these functions is established. Complete classification of the eigenfunctions and the eigenvalues of the 12 C norm kernel by the 8 Be=α+α eigenvalues has been given for the first time. Spectrum of the 12 C norm kernel is compared to that of the 5 H system.

  3. The Stress Management in the Enterprise Management System

    Directory of Open Access Journals (Sweden)

    Kuzmin Oleh Ye.

    2017-05-01

    Full Text Available The article systematizes the classification of the type of management by a number of attributes: horizon of ambition, priority style of interaction between management and managed systems, level of centralization, orientation, consideration of environmental impact, contents, type of activity, and response to deviation. Within terms of the attribute of response to deviations, place of the stress management is allocated near to the harmonic and the risk management. It has been substantiated that the stress management is the enterprise management system aimed at overcoming unwanted deviations that are significant, extreme, and have a significant negative impact on the operation of enterprise. In the structure of the stress management, the following integral components have been allocated and characterized: crisis, adaptive, reactive, fears, and anticipative.

  4. Environment and Urban Tourism: AN Emergent System in Rhetorical Place Identity Definitions

    Science.gov (United States)

    Mura, Marina

    Within the systemic framework of Environmental Psychology (Bechtel and Churchman, 2002) and following Urry (2002) and Pearce's approaches (2005), the aim of this research is to investigate within the context of urban tourism which world views emerge from a Discourse Analysis (Edwards, Potter, 1993). of the speech of native and non-native Sardinian residents. It addresses the issue of how social-physical diversity might be preserved (the problem of tourism sustainability, Di Castri, Balaji, 2002). In this regard, forty in-depth narrative interviews of inhabitants with short- and long-term residential experience in Cagliari (Italy) were conducted and examined (Discourse Analysis). It was found that the native and non-native's rhetorical devices expressed similar representations of urban places, but in diverse relationship to social and place identity. Their environmental transitions were based on the tourist gaze, or the functional view and heritage pride. This displays some basic central dimensions of sustainable tourism.

  5. Integrated management system: expedience and organizational aspects

    Directory of Open Access Journals (Sweden)

    Trunova Ekaterina Viktorovna

    2011-06-01

    Full Text Available The correctly lined up management system is an important element of intellectual capital of company and promotes growth of its market value. In the article grounded, that realization of strategy is impossible without intercommunication of strategic management and business-process management. Such organizational aspects of administrative activity, as role conception of management, strategic office and process office, are observed.

  6. Business Management System Support Analysis

    Science.gov (United States)

    Parikh, Jay

    2008-01-01

    The purpose of this research project was to develop a searchable database compiled with internal and external audit findings/observations. The data will correspond to the findings and observations from the date of Center-wide implementation of the ISO 9001-2000 standard to the present (2003-2008). It was derived and extracted from several sources and was in multiple formats. Once extracted, categorization of the findings/observations would be possible. The final data was mapped to the ISO 9001-2000 standard with the understanding that it will be displayed graphically. The data will be used to verify trends, associate risks, and establish timelines to identify strengths and weaknesses to determine areas of improvement in the Kennedy Space Center Business Management System Internal Audit Program.

  7. Automated Transportation Management System (ATMS) Configuration Management Plan. Revision 1

    International Nuclear Information System (INIS)

    Weidert, R.S.

    1994-01-01

    This document describes the Software Configuration Management (SCM) approach and procedures to be utilized in developing and maintaining the Automated Transportation Management System (ATMS). The configuration management procedures are necessary to ensure that any changes made to software and related documentation are consistent with ATMS goals and contained securely in a central library. This plan applies to all software and associated documentation used in producing ATMS V1.0 and ATMS V2.0 system

  8. School Management Information Systems in Primary Schools

    Science.gov (United States)

    Demir, Kamile

    2006-01-01

    Developments in information technologies have been impacting upon educational organizations. Principals have been using management information systems to improve the efficiency of administrative services. The aim of this research is to explore principals' perceptions about management information systems and how school management information…

  9. A method and system for power management

    NARCIS (Netherlands)

    Burchard, Arthur Tadeusz; Goossens, Koos Gerard Willen; Milutinovic, A.; Molnos, Anca Mariana; Steffens, Elisabeth Francisca Maria

    2009-01-01

    A method and system for power management is provided. To control power supplied to a second electronic device (106), an electronic system (100) comprises a power management subsystem (110), a first electronic device (102); The power management subsystem (110) monitors the power consumed by the first

  10. Waste Management System Description Document (WMSD)

    International Nuclear Information System (INIS)

    1992-02-01

    This report is an appendix of the ''Waste Management Description Project, Revision 1''. This appendix is about the interim approach for the technical baseline of the waste management system. It describes the documentation and regulations of the waste management system requirements and description. (MB)

  11. The Air Program Information Management System (APIMS)

    Science.gov (United States)

    2011-11-02

    Technology November 2, 2011 The Air Program Information Management System (APIMS) Frank Castaneda, III, P.E. APIMS Program Manager AFCEE/TDNQ APIMS...NOV 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE The Air Program Information Management System (APIMS... Information   Management   System : Sustainability of  Enterprise air quality management system • Aspects and Impacts to Process • Auditing and Measurement

  12. Electrofluidic systems for contrast management

    Science.gov (United States)

    Rebello, Keith J.; Maranchi, Jeffrey P.; Tiffany, Jason E.; Brown, Christopher Y.; Maisano, Adam J.; Hagedon, Matthew A.; Heikenfeld, Jason C.

    2012-06-01

    Operating in dynamic lighting conditions and in greatly varying backgrounds is challenging. Current paints and state-ofthe- art passive adaptive coatings (e.g. photochromics) are not suitable for multi- environment situations. A semi-active, low power, skin is needed that can adapt its reflective properties based on the background environment to minimize contrast through the development and incorporation of suitable pigment materials. Electrofluidic skins are a reflective display technology for electronic ink and paper applications. The technology is similar to that in E Ink but makes use of MEMS based microfluidic structures, instead of simple black and white ink microcapsules dispersed in clear oil. Electrofluidic skin's low power operation and fast switching speeds (~20 ms) are an improvement over current state-ofthe- art contrast management technologies. We report on a microfluidic display which utilizes diffuse pigment dispersion inks to change the contrast of the underlying substrate from 5.8% to 100%. Voltage is applied and an electromechanical pressure is used to pull a pigment dispersion based ink from a hydrophobic coated reservoir into a hydrophobic coated surface channel. When no voltage is applied, the Young-Laplace pressure pushes the pigment dispersion ink back down into the reservoir. This allows the pixel to switch from the on and off state by balancing the two pressures. Taking a systems engineering approach from the beginning of development has enabled the technology to be integrated into larger systems.

  13. Hanford Environmental Information System Configuration Management Plan

    International Nuclear Information System (INIS)

    1996-06-01

    The Hanford Environmental Information System (HEIS) Configuration Management Plan establishes the software and data configuration control requirements for the HEIS and project-related databases maintained within the Environmental Restoration Contractor's data management department

  14. Traffic Management Systems Performance Measurement: Final Report

    OpenAIRE

    Banks, James H.; Kelly, Gregory

    1997-01-01

    This report documents a study of performance measurement for Transportation Management Centers (TMCs). Performance measurement requirements were analyzed, data collection and management techniques were investigated, and case study traffic data system improvement plans were prepared for two Caltrans districts.

  15. Trust Management in Open Systems (TMOS)

    National Research Council Canada - National Science Library

    Jones, Vicki

    2002-01-01

    .... The problem considered in the Trust Management in Open Systems (TMOS) project is management of the exchange of sensitive credentials between strangers for the purpose of property-based authentication and authorization...

  16. Managers’ Use of Multiple Management Control Systems

    DEFF Research Database (Denmark)

    Willert, Jeanette

    This dissertation addresses the topic Management Control Systems (MCS) as a Package. Many research studies investigate management and control systems individually, whereas fewer research studies take a holistic view and include a larger part of all the MCS managers use to guide and direct...... subordinates behaviour in the best interest of their companies. In the MCS literature, it is stressed that knowledge is particularly lacking about how managers design and use MCS as a package, and the effectiveness of using the MCS. This dissertation responds to this call by carrying out a large survey among...... executive managers in large companies, a survey that investigates the subject: Effective Management and Control Systems. The focus in the survey is to explore how executive management in large companies design and use their management control systems package. Further, this study is supplemented...

  17. Automated attendance management and alert system | Rahim ...

    African Journals Online (AJOL)

    Automated attendance management and alert system. ... Journal of Fundamental and Applied Sciences ... AAMAS provides various functions, from managing and recording students' attendance record, to sending automatic alerts to students ...

  18. Potential of Computerized Maintenance Management System in Facilities Management

    Directory of Open Access Journals (Sweden)

    Noor Farisya Azahar

    2014-07-01

    Full Text Available For some time it has been clear that managing buildings or estates has been carried out in the context of what has become known as facilities management. British Institute of Facilities Management defined facilities management is the integration of multi-disciplinary activities within the built environment and the management of their impact upon people and the workplace. Effective facilities management is vital to the success of an organisation by contributing to the delivery of its strategic and operational objectives. Maintenance of buildings should be given serious attention before (stage design, during and after a building is completed. But total involvement in building maintenance is after the building is completed and during its operations. Residents of and property owners require their building to look attractive, durable and have a peaceful indoor environment and efficient. The objective of the maintenance management system is to stream line the vast maintenance information system to improve the productivity of an industrial plant. a good maintenance management system makes equipment and facilities available. This paper will discuss the fundamental steps of maintenance management program and Computerized Maintenance Management System (CMMS

  19. OCRWM Systems Engineering Management Plan (SEMP)

    International Nuclear Information System (INIS)

    1990-03-01

    The Nuclear Waste Policy Act of 1982 established the Office of Civilian Radioactive Waste Management (OCRWM) in the Department of Energy (DOE) to implement a program for the safe and permanent disposal of spent nuclear fuel and high-level radioactive waste. To achieve this objective, the OCRWM is developing an integrated waste-management system consisting of three elements: the transportation system, the monitored retrievable storage (MRS) facility, and the mined geologic disposal system (MGDS). The development of such a system requires management of many diverse disciplines that are involved in research, siting, design, licensing, and external interactions. The purpose of this Systems Engineering Management Plan (SEMP) is to prescribe how the systems-engineering process will be implemented in the development of the waste-management system. Systems engineering will be used by the OCRWM to manage, integrate, and document all aspects of the technical development of the waste-management system and its system elements to ensure that the requirements of the waste-management program are met. It will be applied to all technical activities of the OCRWM program. It will be used by the OCRWM to specify the sequence of technical activities necessary to define the requirements the waste-management system must satisfy, to develop the waste-management system, to relate system elements to each other, and to determine how the waste-management system can be optimized to most effectively satisfy the requirements. Furthermore, systems engineering will be used in the management of Program activities at the program, program-element, and project levels by specifying procedures, studies, reviews, and documentation requirements. 9 refs., 1 fig

  20. Quality management system in ISTC 'Ukryttia'

    International Nuclear Information System (INIS)

    Ershova, N.N.; Klyuchnikov, A.A.; Lagutin, I.G.

    2003-01-01

    Some structural and certification aspects of ISTC 'Ukryttia' quality system are seen,and main principles of adaptation of existing quality system model to quality management system model in conformity with ISO 9001:2000 standard are shown