WorldWideScience

Sample records for methods anonymous survey

  1. A survey of anonymous peer-to-peer file-sharing

    NARCIS (Netherlands)

    Chothia, T.; Chatzikokolakis, K.; Enokido, T.; Yan, L.; Xiao, B.; Kim, D.; Dai, Y.S.; Yang, L.T.

    2005-01-01

    This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting,

  2. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  3. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  4. Anonymity In Survey Courses as Tool for More Diverse Engagement

    Science.gov (United States)

    Samson, P. J.

    2017-12-01

    It is not uncommon that students in introductory survey courses are reluctant to participate in verbal inquiry. In a survey submitted to students of CLIMATE 102, Extreme Weather, over the past four semesters about 45% of male students professed comfort in asking verbal questions in a large lecture hall but less than 25% of females and only 15% of students for whom English is not their first language. Hence, large lecture hall courses may be inadvertently dissuading the inclusion of many of the students we wish to encourage to participate in our discipline. To combat this a system was used in CLIMATE 102 wherein students could pose questions digitally and anonymously. These questions could be seen by all and answered by all. The instructor and/or teaching assistant can also participate and answer or offer corrections to others' answers. The use of this system had three important outcomes: The number of questions posed during class time rose dramatically from previous semesters when only verbal questions were entertained. The number of questions in CLIMATE 102 with this system generally exceeded 500 per semester where the number of students 200. The number of per-capita questions from female students exceeded the male students, thus differences in gender inquiry was eliminated. The number of per-capita questions from students whose first language was not English equaled the native English-speaking students. While it is the goal of higher education to encourage students to participate verbally in class discussions it is important to provide a "safe" environment in the first year(s) as many students are initially uncomfortable participating verbally in class. We hypothesize, but have not researched, that through this process students have the opportunity to see that their questions are as valid as others' in the class and will subsequently gain the confidence to participate verbally.

  5. Parents' perception of self-advocacy of children with myositis: an anonymous online survey

    Directory of Open Access Journals (Sweden)

    Huber Adam M

    2011-06-01

    Full Text Available Abstract Background Children with complex medical issues experience barriers to the transition of care from pediatric to adult providers. We sought to identify these barriers by elucidating the experiences of patients with idiopathic inflammatory muscle disorders. Methods We collected anonymous survey data using an online website. Patients and their families were solicited from the US and Canada through established clinics for children with idiopathic inflammatory muscle diseases as well as with the aid of a nonprofit organization for the benefit of such individuals. The parents of 45 older children/young adults suffering from idiopathic inflammatory muscle diseases were surveyed. As a basis of comparison, we similarly collected data from the parents of 207 younger children with inflammatory muscle diseases. The survey assessed transition of care issues confronting families of children and young adults with chronic juvenile myositis. Results Regardless of age of the patient, respondents were unlikely to have a designated health care provider assigned to aid in transition of care and were unlikely to be aware of a posted policy concerning transition of care at their pediatrician's office. Additionally, regardless of age, patients and their families were unlikely to have a written plan for moving to adult care. Conclusions We identified deficiencies in the health care experiences of families as pertain to knowledge, self-advocacy, policy, and vocational readiness. Moreover, as children with complex medical issues grow up, parents attribute less self-advocacy to their children's level of independence.

  6. What affects your MS? Responses to an anonymous, Internet-based epidemiological survey.

    Science.gov (United States)

    Simmons, Rex D; Ponsonby, Anne-Louise; van der Mei, Ingrid A F; Sheridan, Peter

    2004-04-01

    Evolving information technology has raised the possibility of new methods of data collection in multiple sclerosis (MS) research. An anonymous, self-report, Internet-based survey was developed, which asked people with MS their opinion on how various extrinsic factors affected their condition. From September 2001 to July 2002, a total of 2529 people completed the questionnaire. The demographic and clinical profiles of the anonymous respondents indicated that most were likely to have MS. Common factors reported as beneficial were cannabis, cold baths, meditation and dietary factors. Common adverse factors reported were high stress, exposure to high temperatures and viral infections. There was an increasing report of high temperatures as being adverse with increasing respondent age (test for trend, P < 0.001). The adverse report of high temperatures correlated significantly with the report of strong sunlight apparently making MS worse (r = 0.35, P < 0.0001). In Australia, high temperatures were more likely to be reported as adverse in warmer, lower latitude regions. The association between strong sunlight as adverse and age or region did not persist after adjustment for high temperatures. Thus, this apparent adverse factor appeared to relate to solar heat, not solar light. People with MS may risk vitamin D deficiency because of sun avoidance due to heat-related fatigue or intolerance. This is of clinical significance not only for bone health but because vitamin D may have beneficial immunomodulatory properties. The present study provides new information from people with MS on factors that may influence symptoms or clinical course. This information will now be used in the design of formal epidemiological cohort studies.

  7. Effectiveness of Anonymization Methods in Preserving Patients' Privacy: A Systematic Literature Review.

    Science.gov (United States)

    Langarizadeh, Mostafa; Orooji, Azam; Sheikhtaheri, Abbas

    2018-01-01

    An ever growing for application of electronic health records (EHRs) has improved healthcare providers' communications, access to data for secondary use and promoted the quality of services. Patient's privacy has been changed to a great issue today since there are large loads of critical information in EHRs. Therefore, many privacy preservation techniques have been proposed and anonymization is a common one. This study aimed to investigate the effectiveness of anonymization in preserving patients' privacy. The articles published in the 2005-2016 were included. Pubmed, Cochrane, IEEE and ScienceDirect were searched with a variety of related keywords. Finally, 18 articles were included. In the present study, the relevant anonymization issues were investigated in four categories: secondary use of anonymized data, re-identification risk, anonymization effect on information extraction and inadequacy of current methods for different document types. The results revealed that though anonymization cannot reduce the risk of re-identification to zero, if implemented correctly, can manage to help preserve patient's privacy.

  8. Domestic violence in a UK abortion clinic: anonymous cross-sectional prevalence survey.

    Science.gov (United States)

    Motta, Silvia; Penn-Kekana, Loveday; Bewley, Susan

    2015-04-01

    To measure the prevalence of domestic violence (DV) experienced by women seeking termination of pregnancy (TOP) in a UK abortion clinic. A cross-sectional anonymous questionnaire survey of all women aged over 16 years accessing a TOP clinic in inner London between 20 May 2012 and 2 July 2012. The main outcome measures were: distribution of questionnaires, response rate, lifetime prevalence of abuse, past-year prevalence of physical and sexual abuse, prevalence of physical abuse during current pregnancy, relationship of lifetime abuse to number of terminations, and receptivity to DV services. Questionnaires were distributed to 46% (383/828) of women accessing the clinic. Response rate was 50% (190/383). Lifetime prevalence of abuse was 16%. Past-year prevalence of physical abuse was 11% and sexual abuse was 4%. Prevalence of physical abuse during the current pregnancy was 4%. Prevalence of lifetime abuse was lower in women having a first termination (12%) versus one (20%) or two or more previous terminations (24%), although this was not statistically significant (p=0.192). The majority (75%) of participants expressing an opinion on the possibility of having a support service for DV in the abortion clinic setting were positive, unrelated to their personal experience, but some concerns were raised about implementation. In order to provide effective support for women, services require a needs assessment of their local population. Asking women presenting for abortion about DV, even anonymously, is challenging but feasible. Future work should be directed to women's unmet safety needs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  9. Conducting Anonymous, Incentivized, Online Surveys With Sexual and Gender Minority Adolescents: Lessons Learned From a National Polyvictimization Study.

    Science.gov (United States)

    Sterzing, Paul R; Gartner, Rachel E; McGeough, Briana L

    2018-03-01

    Sexual and gender minority adolescents represent an understudied and hard-to-reach population who experience higher rates of mental and behavioral health problems in comparison to their cisgender, heterosexual peers. Online surveys and the proliferation of Internet-connected devices among adolescents offer an exciting opportunity for researchers to begin addressing research gaps and past methodological limitations with these hard-to-reach populations. The purpose of this article is to provide guidance to researchers who are designing and implementing anonymous, incentivized, online surveys by examining the following critical domains-(a) recruitment and engagement: means of leveraging social media and videos to recruit and engage a more nationally representative sample; (b) safety and protection: strategies for administering informed consent and protecting participant anonymity and well-being; and (c) data integrity: mechanisms to detect dishonest and repeat responders. To facilitate discussion of these aims, concrete examples are used from SpeakOut-a 3-year, national study funded by the National Institute of Justice that utilized an anonymous, incentivized, online survey with a large sample of sexual and gender minority adolescents ( N = 1,177) to identify the prevalence, incidence, and correlates of polyvictimization. The article concludes with lessons learned from this national study and recommendations for technological innovations and future research that will strengthen the utility of anonymous, incentivized, online surveys to study sexual and gender minority adolescents and other hard-to-reach populations.

  10. Frequency and risk factors for donor reactions in an anonymous blood donor survey.

    Science.gov (United States)

    Goldman, Mindy; Osmond, Lori; Yi, Qi-Long; Cameron-Choi, Keltie; O'Brien, Sheila F

    2013-09-01

    Adverse donor reactions can result in injury and decrease the likelihood of donor return. Reaction reports captured in the blood center's database provide an incomplete picture of reaction rates and risk factors. We performed an anonymous survey, mailed to 40,000 donors in 2008, including questions about symptoms, height, weight, sex, and donation status. Reaction rates were compared to those recorded in our database. Possible risk factors were assessed for various reactions. The response rate was 45.5%. A total of 32% of first-time and 14% of repeat donors reported having any adverse symptom, most frequently bruising (84.9 per 1000 donors) or feeling faint or weak (66.2 per 1000). Faint reactions were two to eight times higher than reported in our database, although direct comparison was difficult. Younger age, female sex, and first-time donation status were risk factors for systemic and arm symptoms. In females, low estimated blood volume (EBV) was a risk factor for systemic symptoms. Only 51% of donors who consulted an outside physician also called Canadian Blood Services. A total of 10% of first-time donors with reactions found adverse effects information inadequate. This study allowed us to collect more information about adverse reactions, including minor symptoms and delayed reactions. Based on our findings of the risk factors and frequency of adverse reactions, we are implementing more stringent EBV criteria for younger donors and providing more detailed information to donors about possible adverse effects and their management. © 2012 American Association of Blood Banks.

  11. A Clustering K-Anonymity Privacy-Preserving Method for Wearable IoT Devices

    Directory of Open Access Journals (Sweden)

    Fang Liu

    2018-01-01

    Full Text Available Wearable technology is one of the greatest applications of the Internet of Things. The popularity of wearable devices has led to a massive scale of personal (user-specific data. Generally, data holders (manufacturers of wearable devices are willing to share these data with others to get benefits. However, significant privacy concerns would arise when sharing the data with the third party in an improper manner. In this paper, we first propose a specific threat model about the data sharing process of wearable devices’ data. Then we propose a K-anonymity method based on clustering to preserve privacy of wearable IoT devices’ data and guarantee the usability of the collected data. Experiment results demonstrate the effectiveness of the proposed method.

  12. An anonymous survey of psychosomatic medicine fellowship directors regarding breaches of contracts and a proposal for prevention.

    Science.gov (United States)

    Levenson, James L; Bialer, Philip

    2010-01-01

    The authors studied how often applicants accept positions at more than one program, or programs offer positions to applicants who have already signed contracts with other programs. An anonymous survey was distributed to all psychosomatic medicine fellowship program directors. It is fairly common for applicants to sign contracts for fellowship positions and then back out of the contracts. Only one program reported ever knowingly offering a contract to an applicant who had accepted a position elsewhere. Programs are divided over whether there are extenuating circumstances under which it would be acceptable to offer a position to an applicant who has already signed a contract with another program. Guidelines for fellowship programs that do not use the National Resident Match Program can improve the recruitment process.

  13. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  14. Reliability and validity of self-reported smoking in an anonymous online survey with young adults.

    Science.gov (United States)

    Ramo, Danielle E; Hall, Sharon M; Prochaska, Judith J

    2011-11-01

    The Internet offers many potential benefits to conducting smoking and other health behavior research with young adults. Questions, however, remain regarding the psychometric properties of online self-reported smoking behaviors. The purpose of this study was to examine the reliability and validity of self-reported smoking and smoking-related cognitions obtained from an online survey. Young adults (N = 248) age 18 to 25 who had smoked at least 1 cigarette in the past 30 days were recruited online and completed a survey of tobacco and other substance use. Measures of smoking behavior (quantity and frequency) and smoking-related expectancies demonstrated high internal consistency reliability. Measures of smoking behavior and smoking stage of change demonstrated strong concurrent criterion and divergent validity. Results for convergent validity varied by specific constructs measured. Estimates of smoking quantity, but not frequency, were comparable to those obtained from a nationally representative household interview among young adults. These findings generally support the reliability and validity of online surveys of young adult smokers. Identified limitations may reflect issues specific to the measures rather than the online data collection methodology. Strategies to maximize the psychometric properties of online surveys with young adult smokers are discussed. PsycINFO Database Record (c) 2011 APA, all rights reserved.

  15. The management of reduced fetal movements in an uncomplicated pregnancy at term: results from an anonymous national online survey in the Republic of Ireland.

    LENUS (Irish Health Repository)

    Unterscheider, J

    2012-01-31

    There is currently inconsistent evidence and clinical guidance on how to best manage a pregnancy complicated by reduced fetal movements. This novel, web-based, anonymous questionnaire evaluated 96 assessment and management approaches from doctors working in obstetrics in the Republic of Ireland who were presented with a clinical scenario of a primigravida concerned about reduced fetal movements at 39+3 weeks\\' gestation. This study identified a lack of clinical practice guidelines available in maternity hospitals in the Republic of Ireland. We demonstrated that almost all clinicians applied more than one assessment method and that most incorporated a cardiotocograph into their assessment. There was a low uptake of simple symphysio-fundal height measurement and high usage of kickcharts. The minority of clinicians admitted or induced their patients. This survey identified the need for national and international guidelines to ensure safe antepartum care and delivery.

  16. The management of reduced fetal movements in an uncomplicated pregnancy at term: results from an anonymous national online survey in the Republic of Ireland.

    LENUS (Irish Health Repository)

    Unterscheider, J

    2010-01-01

    There is currently inconsistent evidence and clinical guidance on how to best manage a pregnancy complicated by reduced fetal movements. This novel, web-based, anonymous questionnaire evaluated 96 assessment and management approaches from doctors working in obstetrics in the Republic of Ireland who were presented with a clinical scenario of a primigravida concerned about reduced fetal movements at 39+3 weeks\\' gestation. This study identified a lack of clinical practice guidelines available in maternity hospitals in the Republic of Ireland. We demonstrated that almost all clinicians applied more than one assessment method and that most incorporated a cardiotocograph into their assessment. There was a low uptake of simple symphysio-fundal height measurement and high usage of kickcharts. The minority of clinicians admitted or induced their patients. This survey identified the need for national and international guidelines to ensure safe antepartum care and delivery.

  17. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis

    2010-06-10

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adversaries who have partial knowledge about the set. Unlike most previous works, we do not distinguish data as sensitive and non-sensitive, but we consider them both as potential quasi-identifiers and potential sensitive data, depending on the knowledge of the adversary. We define a new version of the k-anonymity guarantee, the k m-anonymity, to limit the effects of the data dimensionality, and we propose efficient algorithms to transform the database. Our anonymization model relies on generalization instead of suppression, which is the most common practice in related works on such data. We develop an algorithm that finds the optimal solution, however, at a high cost that makes it inapplicable for large, realistic problems. Then, we propose a greedy heuristic, which performs generalizations in an Apriori, level-wise fashion. The heuristic scales much better and in most of the cases finds a solution close to the optimal. Finally, we investigate the application of techniques that partition the database and perform anonymization locally, aiming at the reduction of the memory consumption and further scalability. A thorough experimental evaluation with real datasets shows that a vertical partitioning approach achieves excellent results in practice. © 2010 Springer-Verlag.

  18. Volunteer feedback and perceptions after participation in a phase I, first-in-human Ebola vaccine trial: An anonymous survey.

    Directory of Open Access Journals (Sweden)

    Julie-Anne Dayer

    Full Text Available The continued participation of volunteers in clinical trials is crucial to advances in healthcare. Few data are available regarding the satisfaction and impressions of healthy volunteers after participation in phase I trials, many of which lead to unexpected adverse events. We report feedback from over 100 adult volunteers who took part in a first-in-human trial conducted in a high-income country testing an experimental Ebola vaccine causing significant reactogenicity, as well as unexpected arthritis in one fifth of participants. The anonymous, internet-based satisfaction survey was sent by email to all participants upon their completion of this one-year trial; it asked 24 questions concerning volunteers' motivations, impressions of the trial experience, and overall satisfaction. Answers were summarized using descriptive statistics. Of the 115 trial participants, 103 (90% filled out the survey. Fifty-five respondents (53% were male. Thirty-five respondents (34% were healthcare workers, many of whom would deploy to Ebola-affected countries. All respondents cited scientific advancement as their chief motivation for participation, while 100/103 (97% and 61/103 (59% reported additional "humanitarian reasons" and potential protection from Ebolavirus, respectively. Although investigators had documented adverse events in 97% of trial participants, only 74 of 103 respondents (72% recalled experiencing an adverse event. All reported an overall positive experience, and 93/103 (90% a willingness to participate in future trials. Given the high level of satisfaction, no significant associations could be detected between trial experiences and satisfaction, even among respondents reporting adverse events lasting weeks or months. Despite considerable reactogenicity and unexpected vaccine-related arthritis, all survey respondents reported overall satisfaction. While this trial's context was unique, the positive feedback is likely due at least in part to the

  19. Airplane pilot mental health and suicidal thoughts: a cross-sectional descriptive study via anonymous web-based survey.

    Science.gov (United States)

    Wu, Alexander C; Donnelly-McLay, Deborah; Weisskopf, Marc G; McNeely, Eileen; Betancourt, Theresa S; Allen, Joseph G

    2016-12-15

    The Germanwings Flight 9525 crash has brought the sensitive subject of airline pilot mental health to the forefront in aviation. Globally, 350 million people suffer from depression-a common mental disorder. This study provides further information on this important topic regarding mental health especially among female airline pilots. This is the first study to describe airline pilot mental health-with a focus on depression and suicidal thoughts-outside of the information derived from aircraft accident investigations, regulated health examinations, or identifiable self-reports, which are records protected by civil aviation authorities and airline companies. This is a descriptive cross-sectional study via an anonymous web-based survey administered between April and December 2015. Pilots were recruited from unions, airline companies, and airports via convenience sampling. Data analysis included calculating absolute number and prevalence of health characteristics and depression scores. One thousand eight hundred thirty seven (52.7%) of the 3485 surveyed pilots completed the survey, with 1866 (53.5%) completing at least half of the survey. 233 (12.6%) of 1848 airline pilots responding to the Patient Health Questionnaire 9 (PHQ-9), and 193 (13.5%) of 1430 pilots who reported working as an airline pilot in the last seven days at time of survey, met depression threshold-PHQ-9 total score ≥ 10. Seventy-five participants (4.1%) reported having suicidal thoughts within the past two weeks. We found a significant trend in proportions of depression at higher levels of use of sleep-aid medication (trend test z = 6.74, p sexual harassment (z = 3.18, p = 0.001) or verbal harassment (z = 6.13, p < 0.001). Hundreds of pilots currently flying are managing depressive symptoms perhaps without the possibility of treatment due to the fear of negative career impacts. This study found 233 (12.6%) airline pilots meeting depression threshold and 75 (4.1%) pilots

  20. A scalable method for online learning of non-linear preferences based on anonymous negotiation data

    NARCIS (Netherlands)

    Somefun, D.J.A.; Poutré, la J.A.

    2006-01-01

    We consider the problem of a shop agent negotiating bilaterally with many customers about a bundle of goods or services together with a price. To facilitate the shop agent's search for mutually beneficial alternative bundles, we develop a method for online learning customers' preferences, while

  1. Analysis of methods of providing anonymity in facial photographs; a randomised controlled study.

    LENUS (Irish Health Repository)

    Clover, A J P

    2010-09-01

    Clinical images are invaluable in medical teaching and research publications. In the past efforts to conceal patient identity, if any, were limited to a black bar concealing the eyes. However, there is no consensus on this among major journals and publishing houses. This research analyses the effectiveness of blacking out the eyes in facial photographs and evaluates alternative techniques. 126 questionnaires were completed. The average numbers of correct responses out of 30 was 24.64 (82.13%) in the control group, 20.59 (68.63%) in the eyes, 20.42 (68.07%) in the eyes and nose group, and 17.53 (58.43%) in the T-shaped group (eyes, nose and mouth). The traditional method of covering the eyes does significantly decrease recognition, however it is only as effective as covering the nose and mouth. The more of the face that is covered the less likely it is that the person is recognised. However, there are people who remain identifiable no matter how much of the face is covered. This work highlights the importance of obtaining consent prior to publication as well as attempting to hide identity.

  2. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  3. Management of Obstetric Perineal Tears: Do Obstetrics and Gynaecology Residents Receive Adequate Training? Results of an Anonymous Survey

    Directory of Open Access Journals (Sweden)

    A. Cornet

    2012-01-01

    Full Text Available Background/Aim. To evaluate the obstetrics and gynaecology residents' perspective of their training and experience in the management of perineal tears that occur during assisted vaginal delivery. We hypothesised that residents would perceive room for improvement in their knowledge of pelvic floor anatomy and the training received in tears repair. Design. Descriptive cross-sectional study. Population/Setting. Seventy-two major residents from all teaching hospitals in Catalonia. Methods. A questionnaire was designed to evaluate experience, perception of the training and supervision provided. Results. The questionnaire was sent to all residents (=72, receiving 46 responses (64%. The participants represented 15 out of the 16 teaching hospitals included in the study (94% of the hospitals represented. Approximately, 52% of residents were in their third year while 48% were in their fourth. The majority of them thought that their knowledge of pelvic floor anatomy was poor (62%, although 98% felt confident that they would know when an episiotomy was correctly indicated. The survey found that they lacked experience in the repair of major degree tears (70% had repaired fewer than ten, and most did not carry out followup procedures. Conclusion. The majority of them indicated that more training in this specific area is necessary (98%.

  4. Anonymous steps: gender and Gamblers Anonymous

    OpenAIRE

    Rogers, Jim

    2015-01-01

    The biggest source of help for problem gamblers remains gamblers anonymous (GA) in terms of accessibility and availability. GA has traditionally been very much a male preserve. This paper reports on a literature review of Gamblers Anonymous together with data from observations of a contemporary open GA meeting over a one year period. Whilst some studies from North America suggest a changing culture and gender balance within GA programmes observations from the North of England, supported b...

  5. Comparison of the Personality Profiles of Inmate Anonymous and Non-Anonymous Male Addicts

    Directory of Open Access Journals (Sweden)

    Nasrolah Erfani

    2013-05-01

    Full Text Available Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size was determined by Cochran formula.The short-form NEO Five Factor personality questionnaire administered among selected sample. Data analyzed by descriptive statistic as frequency and percentage, also, inferential statistic as multivariate analysis of variance was run. Results: The results showed that personality profiles of anonymous and non-anonymous addicts were significantly different. That is, mean score of neuroticism in anonymous addicts was less than non anonymous. Also, mean score of extraversion was higher in anonymous addicts. Conclusion: It can be concluded that the anonymous male addicts are differ with non-anonymous male addicts in personality traits.

  6. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-01-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  7. Data anonymization patent landscape

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2017-01-01

    Full Text Available The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i the trend in data anonymization patenting, (ii the type of technical content protected in data anonymization, (iii the organizations and countries most active in patenting data anonymization know-how; and (iv the topics emerging most often in patent titles. Patents from the PatSeer database relating to data anonymization from 2001 to 2015 were analyzed. We used the longitudinal approach in combination with text mining techniques to develop a data anonymization patent landscape. The results indicated the following. The number of single patent families is growing with a high increase after 2010, thus indicating a positive trend in the area of patenting data anonymization solutions. The majority of patenting activities relate to the G Physics section. Organizations from the USA and Japan assigned the majority of patents related to data anonymization. The results of text mining indicate that the most often used word in titles of data anonymization patents are “anonym*, “method”, “data” and “system”. Several additional words that indicated the most frequent topics related to data anonymization were: “equipment”, “software”, “protection”, “identification”, or “encryption”, and specific topics such as “community”, “medical”, or “service”.

  8. Pattern-Guided k-Anonymity

    Directory of Open Access Journals (Sweden)

    Rolf Niedermeier

    2013-10-01

    Full Text Available We suggest a user-oriented approach to combinatorial data anonymization. A data matrix is called k-anonymous if every row appears at least k times—the goal of the NP-hard k-ANONYMITY problem then is to make a given matrix k-anonymous by suppressing (blanking out as few entries as possible. Building on previous work and coping with corresponding deficiencies, we describe an enhanced k-anonymization problem called PATTERN-GUIDED k-ANONYMITY, where the users specify in which combinations suppressions may occur. In this way, the user of the anonymized data can express the differing importance of various data features. We show that PATTERN-GUIDED k-ANONYMITY is NP-hard. We complement this by a fixed-parameter tractability result based on a “data-driven parameterization” and, based on this, develop an exact integer linear program (ILP-based solution method, as well as a simple, but very effective, greedy heuristic. Experiments on several real-world datasets show that our heuristic easily matches up to the established “Mondrian” algorithm for k-ANONYMITY in terms of the quality of the anonymization and outperforms it in terms of running time.

  9. [The usage of protective gloves for routine disinfection of patient contact areas : An anonymous survey of work doctors and hygienists (infection control nurses, link nurses and physicians)].

    Science.gov (United States)

    Dittmann, Kathleen; Morch-Röder, Alexandra; Kramer, Axel; Kagel, Verena; Hübner, Nils-Olaf

    2017-10-01

    Disinfection, routinely carried out in healthcare facilities and known as "ongoing disinfection" or "untargeted disinfection", covers areas that are suspected of being contaminated with pathogen-containing material without being recognizable or visible in individual cases. The use of chemical resistant protective gloves is indispensable for surface disinfection. However, it is unclear if healthcare facilities set specific requirements regarding the selection and application of gloves. The usage of protective gloves for routine disinfection of patient contact areas was assessed in an anonymous cross-sectional study. Work doctors and hygienists (infection control nurses, link nurses and physicians) were queried by questionnaire. Disposable gloves were predominantly used, in most cases largely in accordance with EN 374. The most common glove material was nitrile. Glove change was mostly reported between rooms. Reprocessing of reusable gloves is inconsistent. Several professions are responsible for selecting protective gloves. Procedures for glove selection and application for disinfection of contact surfaces vary between the surveyed institutions. Therefore, more attention has to be paid to these three aspects in the future and these must be included in the hygiene plans.

  10. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  11. Proxies for Anonymous Routing

    National Research Council Canada - National Science Library

    Reed, Michael G; Syverson, Paul F; Goldschlag, David M

    1996-01-01

    ...), and file transfers (FTP) have been implemented. Onion routing provides application independent, real-time, and bi-directional anonymous connections that are resistant to both eavesdropping and traffic analysis...

  12. Anonymous women? Gamblers Anonymous and gender

    OpenAIRE

    Rogers, Jim

    2016-01-01

    One of the rapidly changing elements in gambling environments is the increasing participation of women in many forms of gambling, and the growing proportions of problem gamblers who are female. It is known that women who develop gambling problems differ from men in a range of ways:for example they are more likely to have co-morbidities such as anxiety and depression, and to gamble as an 'escape' from such co-occuring problems. Gamblers Anonymous (GA) has a number of meetings across New Zeala...

  13. Anonymous Connections and Onion Routing

    National Research Council Canada - National Science Library

    Syverson, Paul F; Goldschlag, David M; Reed, Michael G

    1997-01-01

    .... Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream...

  14. Self-tallying quantum anonymous voting

    Science.gov (United States)

    Wang, Qingle; Yu, Chaohua; Gao, Fei; Qi, Haoyu; Wen, Qiaoyan

    2016-08-01

    Anonymous voting is a voting method of hiding the link between a vote and a voter, the context of which ranges from governmental elections to decision making in small groups like councils and companies. In this paper, we propose a quantum anonymous voting protocol assisted by two kinds of entangled quantum states. Particularly, we provide a mechanism of opening and permuting the ordered votes of all the voters in an anonymous manner; any party who is interested in the voting results can acquire a permutation copy and then obtains the voting result through a simple calculation. Unlike all previous quantum works on anonymous voting, our quantum anonymous protocol possesses the properties of privacy, self-tallying, nonreusability, verifiability, and fairness at the same time. In addition, we demonstrate that the entanglement of the quantum states used in our protocol makes an attack from an outside eavesdropper and inside dishonest voters impossible. We also generalize our protocol to execute the task of anonymous multiparty computation, such as anonymous broadcast and anonymous ranking.

  15. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...... a tool using manually crafted rules. We used Bracmat, a programming language that is specialized in transforming tree data structures, to meet the requirement to pass the XML structure of the input document unscathed through the whole workflow. The tool attains a reassuringly good recall, makes almost...

  16. Anonymity communication VPN and Tor: a comparative study

    Science.gov (United States)

    Ramadhani, E.

    2018-03-01

    VPN and Tor is a technology based on anonymity communication. These two technologies have their advantage and disadvantage. The objective of this paper is to find the difference between VPN and Tor technologies by comparing their security of communication on the public network based on the CIA triad concept. The comparative study in this paper is based on the survey method. At last, the result of this paper is a recommendation on when to use a VPN and Tor to secure communication

  17. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  18. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  19. A framework for automatically checking anonymity with μ CRL

    OpenAIRE

    Chothia, T.; Orzan, S.M.; Pang, J.; Torabi Dashti, M.; Montanari, U.; Sannella, D.; Bruni, R.

    2007-01-01

    We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given protocol participant. We show how these measures of anonymity can be automatically calculated from a prot...

  20. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  1. Anonymity in P2P Systems

    Science.gov (United States)

    Manzanares-Lopez, Pilar; Muñoz-Gea, Juan Pedro; Malgosa-Sanahuja, Josemaria; Sanchez-Aarnoutse, Juan Carlos

    In the last years, the use of peer-to-peer (P2P) applications to share and exchange knowledge among people around the world has experienced an exponential growth. Therefore, it is understandable that, like in any successful communication mechanism used by a lot of humans being, the anonymity can be a desirable characteristic in this scenario. Anonymity in P2P networks can be obtained by means of different methods, although the most significant ones are broadcast protocols, dining-cryptographer (DC) nets and multiple-hop paths. Each of these methods can be tunable in order to build a real anonymity P2P application. In addition, there is a mathematical tool called entropy that can be used in some scenarios to quantify anonymity in communication networks. In some cases, it can be calculated analytically but in others it is necessary to use simulation to obtain the network entropy.

  2. Protecting genomic sequence anonymity with generalization lattices.

    Science.gov (United States)

    Malin, B A

    2005-01-01

    Current genomic privacy technologies assume the identity of genomic sequence data is protected if personal information, such as demographics, are obscured, removed, or encrypted. While demographic features can directly compromise an individual's identity, recent research demonstrates such protections are insufficient because sequence data itself is susceptible to re-identification. To counteract this problem, we introduce an algorithm for anonymizing a collection of person-specific DNA sequences. The technique is termed DNA lattice anonymization (DNALA), and is based upon the formal privacy protection schema of k -anonymity. Under this model, it is impossible to observe or learn features that distinguish one genetic sequence from k-1 other entries in a collection. To maximize information retained in protected sequences, we incorporate a concept generalization lattice to learn the distance between two residues in a single nucleotide region. The lattice provides the most similar generalized concept for two residues (e.g. adenine and guanine are both purines). The method is tested and evaluated with several publicly available human population datasets ranging in size from 30 to 400 sequences. Our findings imply the anonymization schema is feasible for the protection of sequences privacy. The DNALA method is the first computational disclosure control technique for general DNA sequences. Given the computational nature of the method, guarantees of anonymity can be formally proven. There is room for improvement and validation, though this research provides the groundwork from which future researchers can construct genomics anonymization schemas tailored to specific datasharing scenarios.

  3. The influence of anonymous peers on prosocial behavior

    Science.gov (United States)

    Shin, Jongho

    2017-01-01

    Background Peer influence on students’ maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged. Purpose The purpose of this study was to examine anonymous peer influence on college students’ prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns) via an experimental approach. The effects of indirect peer influence (IP) and direct peer influence (DP) on college students’ prosocial behavior were examined. Methods A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP) and confederates’ prosocial behavior (DP) were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior. Results Prosocial behavior of anonymous peers (confederates) exerts a profound influence on college students’ participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior. Conclusion This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations. PMID:29016612

  4. Utility-preserving anonymization for health data publishing.

    Science.gov (United States)

    Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn

    2017-07-11

    Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.

  5. Comments on ``Anonymous Reviews'' An Editor's View of Anonymous Reviews

    Science.gov (United States)

    Goff, John A.

    I have read with great interest the recent Forum commentaries in Eos by Myrl Beck, Charles Robinove, Robert Criss, and Anne Hofmeister regarding anonymous reviews. I heartily support their position that anonymous reviews should be avoided. I have not written an anonymous review in ages (and regret the few that I did), and have always appreciated and respected greatly anyone who signs a critical review of one of my own papers. However, I would like to add some perspective from the editorial standpoint. I have served as JGR associate editor for 3 years (never anonymously!), and as Eos editor for seismology and tectonophysics for 4. Over the years, I have rejected a fair number of papers, most of those based on anonymous reviews (fortunately, none of the above commentators was one of them). The vast majority of anonymous reviews I received were well considered. While I would wish that all reviews were signed, I don't think we can summarily dismiss the fear that many would have of enmity and reprisal over a critical review. Some of these fears are likely justified. On more than one occasion, have I witnessed overly aggressive responses on the part of authors to anonymous reviews that I considered to be entirely fair and constructive in their criticisms. I do think we need to do all we can to discourage anonymous reviews, but it will be difficult to completely remove that choice from the process.

  6. Research on Anonymization and De-anonymization in the Bitcoin System

    OpenAIRE

    ShenTu, QingChun; Yu, JianPing

    2015-01-01

    The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users' identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote release (TRR) to cover the relationship between Bitcoin address and the user. This paper studies an...

  7. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel; Kalnis, Panos; Tao, Yufei

    2011-01-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  8. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  9. Anonymous Transactions in Computer Networks

    Science.gov (United States)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  10. Suicidal behavior among members of Gamblers Anonymous.

    Science.gov (United States)

    Frank, M L; Lester, D; Wexler, A

    1991-09-01

    A national sample of 500 members of Gamblers Anonymous was surveyed by mail in order to gather information on suicidal history. One hundred sixty two usable surveys were returned representing 32.4% of the original sample. Compulsive gamblers who had a history of suicidal preoccupation began gambling at an earlier age than nonsuicidal gamblers and were more likely to have stolen to support their gambling. They also tended to have addicted relatives and children more than nonsuicidal gamblers did. The data suggest that those gamblers who had been suicidal tend to be more serious gamblers than nonsuicidal respondents.

  11. Methods of the National Nutrition Survey 1999

    OpenAIRE

    Resano-Pérez, Elsa; Méndez-Ramírez, Ignacio; Shamah-Levy, Teresa; Rivera, Juan A; Sepúlveda-Amor, Jaime

    2003-01-01

    OBJECTIVE: To describe the methods and analyses of the 1999 National Nutrition Survey (NNS-99). MATERIAL AND METHODS: The 1999 National Nutrition Survey (NNS-99) is a probabilistic survey with nationwide representativity. The NNS-99 included four regions and urban and rural areas of Mexico. The last sampling units were households, selected through stratified cluster sampling. The study population consisted of children under five years of age, school-age children (6-11 years), and women of chi...

  12. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  13. Survey nonresponse among ethnic minorities in a national health survey - a mixed-method study of participation, barriers, and potentials

    DEFF Research Database (Denmark)

    Ahlmark, Nanna; Algren, Maria Holst; Holmberg, Teresa

    2015-01-01

    , to alienation generated by the questions' focus on disease and cultural assumptions, or mistrust regarding anonymity. Ethnic minorities seem particularly affected by such barriers. To increase survey participation, questions could be sensitized to reflect multicultural traditions, and the impact of sender......Objectives. The participation rate in the Danish National Health Survey (DNHS) 2010 was significantly lower among ethnic minorities than ethnic Danes. The purpose was to characterize nonresponse among ethnic minorities in DNHS, analyze variations in item nonresponse, and investigate barriers...... and incentives to participation. Design. This was a mixed-method study. Logistic regression was used to analyze nonresponse using data from DNHS (N = 177,639 and chi-square tests in item nonresponse analyses. We explored barriers and incentives regarding participation through focus groups and cognitive...

  14. Moving beyond Traditional Methods of Survey Validation

    Science.gov (United States)

    Maul, Andrew

    2017-01-01

    In his focus article, "Rethinking Traditional Methods of Survey Validation," published in this issue of "Measurement: Interdisciplinary Research and Perspectives," Andrew Maul wrote that it is commonly believed that self-report, survey-based instruments can be used to measure a wide range of psychological attributes, such as…

  15. Survey Research: Methods, Issues and the Future

    Science.gov (United States)

    Brewer, Ernest W.; Torrisi-Steele, Geraldine; Wang, Victor C. X.

    2015-01-01

    Survey research is prevalent among many professional fields. Both cost effective and time efficient, this method of research is commonly used for the purposes of gaining insight into the attitudes, thoughts, and opinions of populations. Additionally, because there are several types of survey research designs and data collection instruments, the…

  16. An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

    Science.gov (United States)

    Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.

    2017-08-01

    For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.

  17. Survey Methods, Traditional, Public Opinion Polling

    DEFF Research Database (Denmark)

    Elmelund-Præstekær, Christian; Hopmann, David Nicolas; Pedersen, Rasmus Tue

    2017-01-01

    Traditional public opinion polls are surveys in which a random sample of a given population is asked questions about their attitudes, knowledge, or behavior. If conducted properly, the answers from such surveys are approximately representative of the entire population. Traditional public opinion...... polling is typically based on four different methods of data gathering, or combinations hereof: face-to-face, postal surveys, phone surveys, and web surveys. Given that opinion polls are based on a sample, we cannot be sure that the sample reflects public opinion perfectly, however—even if randomness...... is perfect. Moreover, responses may be highly dependent on the contextual information provided with the question. Also, it may be difficult to capture past or complex causes of attitudes or behavior. In short, surveys are a precise way of measuring public opinion, but they do not come without challenges....

  18. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  19. Are anonymous evaluations a better assessment of faculty teaching performance? A comparative analysis of open and anonymous evaluation processes.

    Science.gov (United States)

    Afonso, Nelia M; Cardozo, Lavoisier J; Mascarenhas, Oswald A J; Aranha, Anil N F; Shah, Chirag

    2005-01-01

    We compared teaching performance of medical school faculty using anonymous evaluations and open evaluations (in which the evaluator was not anonymous) and examined barriers to open evaluation. Residents and medical students evaluated faculty using an open evaluation instrument in which their identity was indicated in the evaluation. Following this, they completed anonymous evaluation on the same faculty members. Aggregate outcomes using the two evaluation systems were compared. Outcomes by group of evaluators (residents and students) were analyzed. Trainees were also asked to rate the barriers to the open evaluation process. A statistically significant difference between the open and anonymous evaluations was noted across all items, with faculty receiving lower scores on the anonymous evaluations. The mean score for all the items on the open evaluations was 4.45 +/- 0.65, compared to mean score of 4.07 +/- 0.80 on the anonymous evaluations. There was also a statistically significant difference between open and anonymous evaluations in five clinical teaching domains that were evaluated individually. Residents perceived that the three most common barriers to optimal evaluation were an apprehension of possible encounters with the same attending physician in the future, destruction of working relationships with the attending, and a feeling of frustration with the evaluation system. The evaluation of faculty teaching performance is complex. Most academic medical centers use the open evaluation format. This study supports the case for the use of the anonymous evaluation method as a more accurate reflection of teaching performance.

  20. Yahtzee: an anonymized group level matching procedure.

    Science.gov (United States)

    Jones, Jason J; Bond, Robert M; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam D I; Marlow, Cameron; Fowler, James H

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  1. Y-STR frequency surveying method

    DEFF Research Database (Denmark)

    Willuweit, Sascha; Caliebe, Amke; Andersen, Mikkel Meyer

    2011-01-01

    Reasonable formalized methods to estimate the frequencies of DNA profiles generated from lineage markers have been proposed in the past years and were discussed in the forensic community. Recently, collections of population data on the frequencies of variations in Y chromosomal STR profiles have...... reached a new quality with the establishment of the comprehensive neatly quality-controlled reference database YHRD. Grounded on such unrivalled empirical material from hundreds of populations studies the core assumption of the Haplotype Frequency Surveying Method originally described 10 years ago can...... be tested and improved. Here we provide new approaches to calculate the parameters used in the frequency surveying method: a maximum likelihood estimation of the regression parameters (r1, r2, s1 and s2) and a revised Frequency Surveying framework with variable binning and a database preprocessing to take...

  2. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  3. Anonymous Web Browsing and Hosting

    OpenAIRE

    MANOJ KUMAR; ANUJ RANI

    2013-01-01

    In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that ho...

  4. Survey of electronic payment methods and systems

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerardus Johannes Maria; Helme, A.; Verbraeck, A.

    1996-01-01

    In this paper an overview of electronic payment methods and systems is given. This survey is done as part of the Moby Dick project. Electronic payment systems can be grouped into three broad classes: traditional money transactions, digital currency and creditdebit payments. Such payment systems have

  5. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  6. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  7. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  8. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  9. Underwater photography - A visual survey method

    Digital Repository Service at National Institute of Oceanography (India)

    Sharma, R.

    Content-Type text/plain; charset=UTF-8 173 Underwater photography - A visual survey method Rahul Sharma National Institute of Oceanography, Dona Paula, Goa-403004 rsharma@nio.org Introduction “Photography as a means of observing...-sea photographs were those made by Maurice Ewing and his co-workers during cruises on Atlantis in 1940-48. Their subject was the seafloor and their method of clicking was to trigger the camera mechanically when its mounting struck bottom. This is the only...

  10. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  11. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  12. Anonymizing patient genomic data for public sharing association studies.

    Science.gov (United States)

    Fernandez-Lozano, Carlos; Lopez-Campos, Guillermo; Seoane, Jose A; Lopez-Alonso, Victoria; Dorado, Julian; Martín-Sanchez, Fernando; Pazos, Alejandro

    2013-01-01

    The development of personalized medicine is tightly linked with the correct exploitation of molecular data, especially those associated with the genome sequence along with these use of genomic data there is an increasing demand to share these data for research purposes. Transition of clinical data to research is based in the anonymization of these data so the patient cannot be identified, the use of genomic data poses a great challenge because its nature of identifying data. In this work we have analyzed current methods for genome anonymization and propose a one way encryption method that may enable the process of genomic data sharing accessing only to certain regions of genomes for research purposes.

  13. Anonymous Authorship Control for User-Generated Content

    Directory of Open Access Journals (Sweden)

    Suk-Bong LEE

    2007-12-01

    Full Text Available User-Generated Content (UGC is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship and expect to publish their UGC anonymously in cases. To meet the requirements, we propose a new authorship control model based on watermarking and metadata. Authors can embed their authorship into their UGC with identities or with anonym. Even though an author publishes his UGC anonymously, he can prove his authorship without unveiling his identity via 5 methods utilizing the proposed authorship model. The proposed model and methods need no TTP and are robust even based on fragile underlying watermarking scheme.

  14. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as

  15. Using anonymized reflection to teach ethics: a pilot study.

    Science.gov (United States)

    Kyle, Gaye

    2008-01-01

    Anonymized reflection was employed as an innovative way of teaching ethics in order to enhance students' ability in ethical decision making during a Care of the Dying Patient and Family' module. Both qualitative and quantitative data were collected from the first two student cohorts who experienced anonymized reflection ( n = 24). The themes identified were the richness and relevance of scenarios, small-group work and a team approach to teaching. Students indicated that they preferred this style of teaching. This finding was verified by a postal questionnaire conducted four months later. The conclusions drawn from this study suggest that using anonymized reflection is an effective method for teaching ethics to nurses and indicates that learning about ethical issues in this way reduces uncertainties.

  16. Atheists, agnostics and Alcoholics Anonymous.

    Science.gov (United States)

    Tonigan, J Scott; Miller, W R; Schermer, Carol

    2002-09-01

    In spite of the strong emphasis in AA on spiritual beliefs and practices, findings are mixed about the importance of such beliefs in predicting AA affiliation. This study of the Project MATCH outpatient (N = 952) and aftercare (N = 774) samples tested three hypotheses about the role of client God belief and subsequent AA attendance and benefit, taking into account that some individuals may, in fact, deny the existence of a God. Longitudinal analyses were conducted (N = 1,526) investigating client God beliefs, AA attendance, patterns of AA attendance and alcohol use. Assessments were conducted at intake and in 3-month intervals using the Form 90, Religious Behaviors and Background, and the Alcoholics Anonymous Inventory. 12-Step treatment was significantly more likely to promote pre-post shifts in client God beliefs, and atheist and agnostic clients attended AA significantly less often throughout follow-up relative to clients self-labeled as spiritual and religious. AA attendance, however, was significantly associated with increased abstinence and reductions in drinking intensity regardless of God belief. Finally, no differences in percent days abstinence and drinking intensity were found between atheist and agnostic versus spiritual and religious clients, but clients unsure about their God belief reported significantly higher drinking frequency relative to the other groups. God belief appears to be relatively unimportant in deriving AA-related benefit, but atheist and agnostic clients are less likely to initiate and sustain AA attendance relative to spiritual and religious clients. This apparent reticence to affiliate with AA ought to be clinically recognized when encouraging AA participation.

  17. The selective adaptation of the alcoholics anonymous program by Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1991-09-01

    This paper is largely based on a year long observation study of Gamblers Anonymous and Alcoholics Anonymous meetings in northern California. The paper argues, contrary to popular assumption, that Gamblers Anonymous is significantly different from Alcoholics Anonymous. Differences, in members' consciousness for example, are discussed. The paper contends that although there is some12 step consciousness in G.A., the dominant consciousness ispage 17 consciousness. The significant differences are attributed to the selective adaptation of the Alcoholics Anonymous program. Several consequences of these differences, such as the central role of a language of the self in A.A. and not in G.A., are highlighted.

  18. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  19. The Efficacy of Non-Anonymous Measures of Bullying

    Science.gov (United States)

    Chan, John H. F.; Myron, Rowan; Crawshaw, Martin

    2005-01-01

    The Olweus checklist, along with most of the questionnaires commonly used in bullying research, is anonymous. The respondent is not required to put down his/her name. This has been accepted as the "best suited" method of assessing bullying. However, this assumption has not been adequately tested, and there is contrary evidence that this…

  20. Methodical recommendations for power unit comprehensive engineering and radiation survey

    International Nuclear Information System (INIS)

    Nosovskij, A.V.

    2000-01-01

    The article describes power unit radiation survey methods developed and applied during conduction of Ch NPP unit I Comprehensive Engineering Radiation Survey. Special requirements for units under decommissioning, main survey principals, criteria for definition of volume and the order of survey for various systems of a NPP Unit are included

  1. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel; Zhao, Keliang; Papadias, Dimitris; Kalnis, Panos

    2010-01-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  2. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  3. [Anonymous birth and neonaticide in Tyrol].

    Science.gov (United States)

    Danner, C; Pacher, M; Ambach, E; Brezinka, C

    2005-10-01

    In 2001 the Austrian government provided the legal means that formally enabled "anonymous birth": a woman can now give birth in any hospital in Austria without giving her name or insurance number, the baby is taken into care by social services and placed with adoptive parents. The cost of the hospital stay is covered from public funds. These measures were put into effect after some highly publicized cases of infant abandonment and neonaticide in Austria. In the mostly rural and small-town province of Tyrol province in western Austria (687,000 inhabitants, 7000 births per year) four cases of neonaticide were discovered in the years from 1996 to 2004. One child was abandoned inside a hospital. Since 2001 two women have made use of the "anonymous birth" option. Neither had had any pregnancy controls, both showed up at or near term with contractions. They delivered healthy infants that were then taken into care by local adoption services. Both women were extensively counselled by psychologists, social workers, medical and midwifery staff and both insisted on their original decision to remain anonymous. A few weeks later one of the women found herself at the centre of a criminal investigation for infanticide after anonymous letters were sent to family members insinuating she had done away with the child. Police stopped that investigation when hospital staff confirmed that the woman had had an "anonymous" delivery. Despite the option of legal "anonymous" birth free of charge in modern hospitals there are still cases of infant abandonment and neonaticide in Austria. It is proposed that the women who opt for anonymous birth may not be the women who would otherwise kill their babies. Instead, it appears that the women opted for anonymity to escape the probably well-intentioned but overbearing attention of their families and of social services. It is doubtful that the option of anonymous birth will lead to a complete disappearance of infanticide and infant abandonment in

  4. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  5. Multidisciplinary eHealth Survey Evaluation Methods

    Science.gov (United States)

    Karras, Bryant T.; Tufano, James T.

    2006-01-01

    This paper describes the development process of an evaluation framework for describing and comparing web survey tools. We believe that this approach will help shape the design, development, deployment, and evaluation of population-based health interventions. A conceptual framework for describing and evaluating web survey systems will enable the…

  6. Comparison of Survey Data Collection Methods

    Directory of Open Access Journals (Sweden)

    VIDAL DÍAZ DE RADA

    2017-01-01

    Full Text Available This paper presents the results of a mixed-mode survey of the general population using a combination of postal, telephone, and Internet survey protocols. Potential respondents were invited to participate by ordinary mail and were allowed to choose their preferred response mode. The paper focuses on response quality (taking non-responses into consideration, fieldwork time and data collection cost. The results reveal that the Internet survey produces the lowest rate of non-responses and requires significantly less fieldwork time, although it is slightly more costly than the postal survey. However, when differences in cost structure are taken into account, we find that the same number of completed questionnaires could have been obtained through the Internet alone at a cost that is 18.2% lower than the mixed-mode survey.

  7. The influence of anonymous peers on prosocial behavior.

    Directory of Open Access Journals (Sweden)

    Soowon Park

    Full Text Available Peer influence on students' maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged.The purpose of this study was to examine anonymous peer influence on college students' prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns via an experimental approach. The effects of indirect peer influence (IP and direct peer influence (DP on college students' prosocial behavior were examined.A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP and confederates' prosocial behavior (DP were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior.Prosocial behavior of anonymous peers (confederates exerts a profound influence on college students' participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior.This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations.

  8. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  9. Anon-Pass: Practical Anonymous Subscriptions.

    Science.gov (United States)

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  10. Comparison of Satellite Surveying to Traditional Surveying Methods for the Resources Industry

    Science.gov (United States)

    Osborne, B. P.; Osborne, V. J.; Kruger, M. L.

    Modern ground-based survey methods involve detailed survey, which provides three-space co-ordinates for surveyed points, to a high level of accuracy. The instruments are operated by surveyors, who process the raw results to create survey location maps for the subject of the survey. Such surveys are conducted for a location or region and referenced to the earth global co- ordinate system with global positioning system (GPS) positioning. Due to this referencing the survey is only as accurate as the GPS reference system. Satellite survey remote sensing utilise satellite imagery which have been processed using commercial geographic information system software. Three-space co-ordinate maps are generated, with an accuracy determined by the datum position accuracy and optical resolution of the satellite platform.This paper presents a case study, which compares topographic surveying undertaken by traditional survey methods with satellite surveying, for the same location. The purpose of this study is to assess the viability of satellite remote sensing for surveying in the resources industry. The case study involves a topographic survey of a dune field for a prospective mining project area in Pakistan. This site has been surveyed using modern surveying techniques and the results are compared to a satellite survey performed on the same area.Analysis of the results from traditional survey and from the satellite survey involved a comparison of the derived spatial co- ordinates from each method. In addition, comparisons have been made of costs and turnaround time for both methods.The results of this application of remote sensing is of particular interest for survey in areas with remote and extreme environments, weather extremes, political unrest, poor travel links, which are commonly associated with mining projects. Such areas frequently suffer language barriers, poor onsite technical support and resources.

  11. Optimum survey methods when interviewing employed women.

    Science.gov (United States)

    Dunning, Kari; LeMasters, Grace K

    2009-02-01

    While survey studies have examined bias much is unknown regarding specific subpopulations, especially women workers. A population based phone, Internet, and mail survey of workplace falls during pregnancy was undertaken. Participation by industry and occupation and survey approach and bias, reliability, and incomplete data were examined. Of the 3,997 women surveyed, 71% were employed during their pregnancy. Internet responders were most likely to be employed while pregnant and to report a workplace fall at 8.8% compared to 5.8% and 6.1% for mail and phone respondents. Internet responders had the most missing employment data with company name missing for 17.9% compared to 1.3% for phone responders. Mail surveys were best for recruiting those employed in eight of nine industries, and this was especially true for service occupations. To decrease bias and increase participation, mixed approaches may be useful with particular attention for collecting occupational data. Am. J. Ind. Med. 52:105-112, 2009. (c) 2008 Wiley-Liss, Inc.

  12. Survey of Nuclear Methods in Chemical Technology

    International Nuclear Information System (INIS)

    Broda, E.

    1966-01-01

    An attempt is made to classify nuclear methods on a logical basis to facilitate assimilation by the technologist. The three main groups are: (I) Tracer methods, (II) Methods based on the influence of absorbers on radiations to be measured, and (III) Radiation chemical methods. The variants of the first two groups are discussed in some detail, and typical examples are given. Group I can be subdivided into (1) Indicator methods, (2) Emanation methods, (3) Radioreagent methods, and (4) Isotope dilution methods, Group II into (5) Activation methods, (6) Absorption methods, (7) Induced Nuclear Reaction methods, (8) Scattering methods, and (9) Fluorescence methods. While the economic benefits due to nuclear methods already run into hundreds of millions of dollars annually, owing to radiation protection problems radiochemical methods in the strict sense are not widely used in actual production. It is suggested that more use should be made of pilot plant tracer studies of chemical processes as used in industry. (author)

  13. Survey Shows Variation in Ph.D. Methods Training.

    Science.gov (United States)

    Steeves, Leslie; And Others

    1983-01-01

    Reports on a 1982 survey of journalism graduate studies indicating considerable variation in research methods requirements and emphases in 23 universities offering doctoral degrees in mass communication. (HOD)

  14. Rethinking Traditional Methods of Survey Validation

    Science.gov (United States)

    Maul, Andrew

    2017-01-01

    It is commonly believed that self-report, survey-based instruments can be used to measure a wide range of psychological attributes, such as self-control, growth mindsets, and grit. Increasingly, such instruments are being used not only for basic research but also for supporting decisions regarding educational policy and accountability. The…

  15. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  16. Survey of numerical methods for compressible fluids

    Energy Technology Data Exchange (ETDEWEB)

    Sod, G A

    1977-06-01

    The finite difference methods of Godunov, Hyman, Lax-Wendroff (two-step), MacCormack, Rusanov, the upwind scheme, the hybrid scheme of Harten and Zwas, the antidiffusion method of Boris and Book, and the artificial compression method of Harten are compared with the random choice known as Glimm's method. The methods are used to integrate the one-dimensional equations of gas dynamics for an inviscid fluid. The results are compared and demonstrate that Glimm's method has several advantages. 16 figs., 4 tables.

  17. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  18. Research Methods in Healthcare Epidemiology: Survey and Qualitative Research.

    Science.gov (United States)

    Safdar, Nasia; Abbo, Lilian M; Knobloch, Mary Jo; Seo, Susan K

    2016-11-01

    Surveys are one of the most frequently employed study designs in healthcare epidemiology research. Generally easier to undertake and less costly than many other study designs, surveys can be invaluable to gain insights into opinions and practices in large samples and may be descriptive and/or be used to test associations. In this context, qualitative research methods may complement this study design either at the survey development phase and/or at the interpretation/extension of results stage. This methods article focuses on key considerations for designing and deploying surveys in healthcare epidemiology and antibiotic stewardship, including identification of whether or not de novo survey development is necessary, ways to optimally lay out and display a survey, denominator measurement, discussion of biases to keep in mind particularly in research using surveys, and the role of qualitative research methods to complement surveys. We review examples of surveys in healthcare epidemiology and antimicrobial stewardship and review the pros and cons of methods used. A checklist is provided to help aid design and deployment of surveys in healthcare epidemiology and antimicrobial stewardship. Infect Control Hosp Epidemiol 2016;1-6.

  19. Underwater sediment-contact radiation survey method

    International Nuclear Information System (INIS)

    Lee, D.R.; St. Aubin, M.; Welch, S.J.

    1991-01-01

    The authors are striving to produce a practical system for mapping lateral distributions in gamma activity on submerged sediments. This is in response to the need for quality control and interpretation of data obtainable by sediment sampling and analyses near nuclear utilities. A prototype gamma probe has been constructed and tested. The prototype is essentially a background survey meter packaged in a 53-cm-long x 5.4-cm-diam waterproof vehicle. This usage-shaped vehicle is connected to a cable for towing in contact with bottom sediments of lakes, rivers, and coastal waters. This vehicle, or sediment probe as it is called, was initially developed for measuring sediment electrical conductances, a parameter that can be used to locate underwater areas of groundwater and contaminant upwelling. During towing, the probe does not roll or twist around its longitudinal axis by more than 10 deg, so that sensors, which have been fixed within the vehicle, can be oriented to look up, down, or sideways. In over 450 lin-km of underwater survey, only a single sediment probe has been irretrievably snagged on sunken rocks or other debris. Work in the Ottawa River near the Chalk River Laboratories has shown good agreement among point measurements of river sediment with continuous measurements using the moving probe

  20. Scalable and Anonymous Group Communication with MTor

    Directory of Open Access Journals (Sweden)

    Lin Dong

    2016-04-01

    Full Text Available This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure. MTor does not depend on an external service to broker the group communication, and avoids central points of failure and trust. MTor’s substantial bandwidth savings and graceful scalability enable new classes of anonymous applications that are currently too bandwidth-intensive to be viable through traditional unicast Tor communication-e.g., group file transfer, collaborative editing, streaming video, and real-time audio conferencing.

  1. Sexual behaviour research using the survey method: a critique of the literature over the last six years.

    Science.gov (United States)

    Malacad, Brea L; Hess, Gretchen C

    2011-10-01

    The survey method is often used to identify trends in sexual behaviour and attitudes. In order for research conclusions to be valid, however, data gathered from surveys must be unambiguous. For the current paper we reviewed survey research of sexual behaviour published in recent years. Our objective was to identify common methodological issues and provide recommendations for how to address them. We examined 62 articles, published in four prominent sexual health journals over the past six years. We evaluated each article based on how adequately its authors addressed four recurring methodological issues: ambiguous terminology, heterosexual bias, procedures that compromise honesty in responses, and survey language/literacy considerations. The review revealed some recurring issues: 47% of the studies failed to address the question of sexual orientation, sexual behaviour terminology was explicitly defined in only 32% of questionnaires, fewer than 5% of surveys clarified whether the sexual encounters in question were consensual, and 21% of the articles contained no mention of anonymity or confidentiality for participants. These results reveal common issues with survey data that compromise the validity of findings. In order to have confidence in research conclusions and recommendations, it is important that these issues be addressed.

  2. METHODS IN THE POST-METHODS ERA. REPORT ON AN INTERNATIONAL SURVEY ON LANGUAGE TEACHING METHODS'

    Directory of Open Access Journals (Sweden)

    Jun Liu

    2004-06-01

    Full Text Available Do methods still have a place in 21" century language teaching? To answer this question, an international survey was conducted in the surnmer of 1999. A sample of 800 language teachers world-wide randomly drawn from 17,800 TESOLers were each given a 2-page survey. The return rate was 58.5% with the actual usable data set of448, which was analyzed by using both descriptive and inferential statistics. Among the ten commonly recognized teaching methods surveyed, both the Communicative Language Teaching Approach and an eclectic method seem to have the highest rate in familiarity, preference, and use. But when multiple factors, such as teaching contexts, instructional settings, learners' proficiency levels, class size, teaching experience and educational backgrounds of the teachers, and the status of being a native or nonnative English speaking professional were taken into consideration, various patterns and themes emerged. One interesting finding is that Grammar Translation is still used in EFL contexts, in larger classes, and with learners at low proficiency levels, though the ratio between the actual use of this method and teachers' preference does not match. Based on the results of the survey, a new theoretical framework is proposed to conceptualize language teaching methods in the post-methods era.

  3. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  4. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  5. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  6. An outcome study of Gamblers Anonymous.

    Science.gov (United States)

    Stewart, R M; Brown, R I

    1988-02-01

    Retrospective and prospective studies of a total sample of 232 attenders at groups of Gamblers Anonymous suggest that total abstinence from gambling was maintained by 8% of all comers at one year from first attendance and by 7% at two years.

  7. Fieldale-Collinsville Middle School: Banishing Anonymity

    Science.gov (United States)

    Principal Leadership, 2010

    2010-01-01

    It is no accident that the staff at Fieldale-Collinsville Middle School adopted a central tenet of "Breaking Ranks in the Middle"--to banish anonymity by creating a personalized learning environment for all of its students. The school was created six years ago when the four middle schools in Henry County, VA, were consolidated into two…

  8. Botnet detection and prevention in anonymous networks

    NARCIS (Netherlands)

    Kuhnert, Katharina; Steinberger, Jessica; Baier, Harald

    Botnets are a major threat to the Internet landscape and have been responsible for large scale distributed attacks on online services. To make take down measures more difficult, Botnet operators started to incorporate anonymous networks into their software to protect their users and their Botnets.

  9. Anonymity and Electronics: Adapting Preparation for Radiology Resident Examination.

    Science.gov (United States)

    Chapman, Teresa; Reid, Janet R; O'Conner, Erin E

    2017-06-01

    Diagnostic radiology resident assessment has evolved from a traditional oral examination to computerized testing. Teaching faculty struggle to reconcile the differences between traditional teaching methods and residents' new preferences for computerized testing models generated by new examination styles. We aim to summarize the collective experiences of senior residents at three different teaching hospitals who participated in case review sessions using a computer-based, interactive, anonymous teaching tool, rather than the Socratic method. Feedback was collected from radiology residents following participation in a senior resident case review session using Nearpod, which allows residents to anonymously respond to the teaching material. Subjective resident feedback was uniformly enthusiastic. Ninety percent of residents favor a case-based board review incorporating multiple-choice questions, and 94% favor an anonymous response system. Nearpod allows for inclusion of multiple-choice questions while also providing direct feedback to the teaching faculty, helping to direct the instruction and clarify residents' gaps in knowledge before the Core Examination. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  10. A New Heuristic Anonymization Technique for Privacy Preserved Datasets Publication on Cloud Computing

    Science.gov (United States)

    Aldeen Yousra, S.; Mazleena, Salleh

    2018-05-01

    Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users’ private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and customer services. Primary concern of cloud service providers in data publishing is to hide the sensitive information of individuals. One of the cloud services that fulfill the confidentiality concerns is Privacy Preserving Data Mining (PPDM). The PPDM service in Cloud Computing (CC) enables data publishing with minimized distortion and absolute privacy. In this method, datasets are anonymized via generalization to accomplish the privacy requirements. However, the well-known privacy preserving data mining technique called K-anonymity suffers from several limitations. To surmount those shortcomings, I propose a new heuristic anonymization framework for preserving the privacy of sensitive datasets when publishing on cloud. The advantages of K-anonymity, L-diversity and (α, k)-anonymity methods for efficient information utilization and privacy protection are emphasized. Experimental results revealed the superiority and outperformance of the developed technique than K-anonymity, L-diversity, and (α, k)-anonymity measure.

  11. A survey of quantum Lyapunov control methods.

    Science.gov (United States)

    Cong, Shuang; Meng, Fangfang

    2013-01-01

    The condition of a quantum Lyapunov-based control which can be well used in a closed quantum system is that the method can make the system convergent but not just stable. In the convergence study of the quantum Lyapunov control, two situations are classified: nondegenerate cases and degenerate cases. For these two situations, respectively, in this paper the target state is divided into four categories: the eigenstate, the mixed state which commutes with the internal Hamiltonian, the superposition state, and the mixed state which does not commute with the internal Hamiltonian. For these four categories, the quantum Lyapunov control methods for the closed quantum systems are summarized and analyzed. Particularly, the convergence of the control system to the different target states is reviewed, and how to make the convergence conditions be satisfied is summarized and analyzed.

  12. Does the underground sidewall station survey method meet MHSA ...

    African Journals Online (AJOL)

    The question is asked whether or not this method of sur-veying will meet the MHSA standards of accuracy that was developed for typical hangingwall traverse type networks. Results obtained from a survey closure using a network of clusters of four sidewall stations demonstrates that under the described circumstances it will ...

  13. Assessing risk of draft survey by AHP method

    Science.gov (United States)

    Xu, Guangcheng; Zhao, Kuimin; Zuo, Zhaoying; Liu, Gang; Jian, Binguo; Lin, Yan; Fan, Yukun; Wang, Fei

    2018-04-01

    The paper assesses the risks of vessel floating in the seawater for draft survey by using the analytic hierarchy process. On this basis, the paper established draft survey risk index from the view of draft reading, ballast water, fresh water, and calculation process and so on. Then the paper proposes the method to deal with risk assessment using one concrete sample.

  14. Does the Underground Sidewall Station Survey Method Meet MHSA ...

    African Journals Online (AJOL)

    Grobler, Hendrik

    The underground survey network in a deep level platinum mine in ... The time duration for peg installation during the initial phase of learning the method was ..... changes to the survey “hardware” including prisms, stems and attachment points ...

  15. A survey of real face modeling methods

    Science.gov (United States)

    Liu, Xiaoyue; Dai, Yugang; He, Xiangzhen; Wan, Fucheng

    2017-09-01

    The face model has always been a research challenge in computer graphics, which involves the coordination of multiple organs in faces. This article explained two kinds of face modeling method which is based on the data driven and based on parameter control, analyzed its content and background, summarized their advantages and disadvantages, and concluded muscle model which is based on the anatomy of the principle has higher veracity and easy to drive.

  16. Survey of Methods to Assess Workload

    Science.gov (United States)

    1979-08-01

    thesis study which had to do with the effect of binaural beats upon performan:.e (2) found out there was a subjectively experienced quality of beats ...were forced to conclude that the neuralmechanism by which binaural beats influenced performance is not open to correct subjective evaluation. In terms of...methods for developing indicies of pilot workload, FAA Report (FAA-AN-77- 15), July 1977. 2. ,’ R. E. The effect of binaural beats on performance, J

  17. Survey of methods for rapid spin reversal

    International Nuclear Information System (INIS)

    McKibben, J.L.

    1980-01-01

    The need for rapid spin reversal technique in polarization experiments is discussed. The ground-state atomic-beam source equipped with two rf transitions for hydrogen can be reversed rapidly, and is now in use on several accelerators. It is the optimum choice provided the accelerator can accept H + ions. At present all rapid reversal experiments using H - ions are done with Lamb-shift sources; however, this is not a unique choice. Three methods for the reversal of the spin of the atomic beam within the Lamb-shift source are discussed in order of development. Coherent intensity and perhaps focus modulation seem to be the biggest problems in both types of sources. Methods for reducing these modulations in the Lamb-shift source are discussed. The same Lamb-shift apparatus is easily modified to provide information on the atomic physics of quenching of the 2S/sub 1/2/ states versus spin orientation, and this is also discussed. 2 figures

  18. Utility-preserving transaction data anonymization with low information loss.

    Science.gov (United States)

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-08-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual's record to their identity. Approaches that anonymize data by eliminating certain values in an individual's record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers' utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency.

  19. k-Degree Anonymity Model for Social Network Data Publishing

    Directory of Open Access Journals (Sweden)

    MACWAN, K. R.

    2017-11-01

    Full Text Available Publicly accessible platform for social networking has gained special attraction because of its easy data sharing. Data generated on such social network is analyzed for various activities like marketing, social psychology, etc. This requires preservation of sensitive attributes before it becomes easily accessible. Simply removing the personal identities of the users before publishing data is not enough to maintain the privacy of the individuals. The structure of the social network data itself reveals much information regarding its users and their connections. To resolve this problem, k-degree anonymous method is adopted. It emphasizes on the modification of the graph to provide at least k number of nodes that contain the same degree. However, this approach is not efficient on a huge amount of social data and the modification of the original data fails to maintain data usefulness. In addition to this, the current anonymization approaches focus on a degree sequence-based graph model which leads to major modification of the graph topological properties. In this paper, we have proposed an improved k-degree anonymity model that retain the social network structural properties and also to provide privacy to the individuals. Utility measurement approach for community based graph model is used to verify the performance of the proposed technique.

  20. Can anonymous posters on medical forums be reidentified?

    Science.gov (United States)

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being

  1. Survey method for radiological surveys of 300 FF-1 Operable Unit soil and materials

    International Nuclear Information System (INIS)

    Greif, A.A.

    1997-06-01

    This technical basis document is to be used to survey soils at the 300-FF-1 Operable Unit during remediation of the site. Its purpose is to provide a basis for the survey methods to be employed by the Radiological Control Technician to determine if excavated areas require continued remediation in accordance with the Record of Decision for the operable unit

  2. Academic freedom, public reactions, and anonymity.

    Science.gov (United States)

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. © 2014 John Wiley & Sons Ltd.

  3. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  4. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  5. Anonymous quantum communications using the quantum one-time pad

    International Nuclear Information System (INIS)

    Wang, Qing-Le; Gao, Fei-; Liu, Bin; Song, Ting-Ting; Wen, Qiao-Yan

    2015-01-01

    We present the first quantum secure communication protocol for an anonymous receiver without the assistance of anonymous entanglement. In previous works, if a public sender wants to send quantum messages to a chosen receiver while protecting the identity of the receiver from others, all participants should cooperate first to construct the entanglement between the sender and the anonymous receiver. This is the most important process in anonymous quantum communications. With anonymous entanglement, the sender can communicate quantum messages to the anonymous receiver by applying teleportation protocols. In contrast, our protocol is novel and achieves communication of quantum messages directly from the public sender to the anonymous receiver based on the quantum one-time pad and current achievements. Notably, the anonymity of the receiver, as well as the privacy of the quantum messages, is perfectly protected with the exception of an exponentially small probability in our protocol. (paper)

  6. Assessing Anonymous Communication on the Internet: Policy Deliberations.

    Science.gov (United States)

    Kling, Rob; Lee, Yaching; Frankel, Mark S.; Teich, Al

    1999-01-01

    Examines the social character of anonymous online communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. Explains some of the new technological supports for anonymous communication on the Internet. Discusses some of the nuances behind the controversies and policy…

  7. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  8. A Survey of Formal Methods in Software Development

    DEFF Research Database (Denmark)

    Bjørner, Dines

    2012-01-01

    The use of formal methods and formal techniques in industry is steadily growing. In this survey we shall characterise what we mean by software development and by a formal method; briefly overview a history of formal specification languages - some of which are: VDM (Vienna Development Method, 1974...... need for multi-language formalisation (Petri Nets, MSC, StateChart, Temporal Logics); the sociology of university and industry acceptance of formal methods; the inevitability of the use of formal software development methods; while referring to seminal monographs and textbooks on formal methods....

  9. Association between serious psychological distress and nonparticipation in cancer screening and the modifying effect of socioeconomic status: Analysis of anonymized data from a national cross-sectional survey in Japan.

    Science.gov (United States)

    Fujiwara, Masaki; Inagaki, Masatoshi; Nakaya, Naoki; Fujimori, Maiko; Higuchi, Yuji; Kakeda, Kyoko; Uchitomi, Yosuke; Yamada, Norihito

    2018-02-01

    It is unclear whether individuals who have serious psychological distress (SPD) are less likely to participate in screening tests for gastric cancer, lung cancer, and other types of cancer. Of the few studies that have examined the association between SPD and participation in cancer screening, none have reported modifying effects of educational, marital, or employment status. The authors analyzed a national representative data set from the 2010 Comprehensive Survey of Living Conditions of Japan., including individuals aged association between SPD and participation in cancer screening, and multivariate analyses stratified by socioeconomic status also were conducted. SPD was significantly associated with a lower odds ratio (OR) for participation in screening for colorectal cancer (OR, 0.743; 95% confidence interval [CI], 0.638-0.866), gastric cancer (OR, 0.823; 95% CI, 0.717-0.946), and lung cancer (OR, 0.691; 95% CI, 0.592-0.807). Only educational status significantly modified the effect of SPD on participation in these 3 types of cancer screening (P American Cancer Society. © 2017 American Cancer Society.

  10. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  11. A Survey of Various Object Oriented Requirement Engineering Methods

    OpenAIRE

    Anandi Mahajan; Dr. Anurag Dixit

    2013-01-01

    In current years many industries have been moving to the use of object-oriented methods for the development of large scale information systems The requirement of Object Oriented approach in the development of software systems is increasing day by day. This paper is basically a survey paper on various Object-oriented requirement engineering methods. This paper contains a summary of the available Object-oriented requirement engineering methods with their relative advantages and disadvantages...

  12. Towards Predicting Efficient and Anonymous Tor Circuits

    OpenAIRE

    Barton, Armon; Imani, Mohsen; Ming, Jiang; Wright, Matthew

    2018-01-01

    The Tor anonymity system provides online privacy for millions of users, but it is slower than typical web browsing. To improve Tor performance, we propose PredicTor, a path selection technique that uses a Random Forest classifier trained on recent measurements of Tor to predict the performance of a proposed path. If the path is predicted to be fast, then the client builds a circuit using those relays. We implemented PredicTor in the Tor source code and show through live Tor experiments and Sh...

  13. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  14. For the Lulz: Anonymous, Aesthetics and Affect

    Directory of Open Access Journals (Sweden)

    Rodrigo Ferrada Stoehrel

    2014-03-01

    Full Text Available The focus of this paper is on different but connected areas of power – relating to things such as economic globalisation, surveillance, censorship/freedom, ‘terrorism’ and/or specific military activity – visually represented through online media, and intentionally produced to inform a wide spectrum of individuals and interest groups about global and local social injustices. Or, more importantly, produced and distributed with the purpose of providing users with possibilities to engage, bodily and emotionally, in diverse ways: may it be through physical antiwar/anti-wall street protests or hacktivist tactics (e.g. DDoS attacks. We examine a sample of videos, photographs and propaganda posters produced, and digitally distributed (2008-2013, by the fragmented body of activists united globally under the generic name of Anonymous. Analytically, we will draw upon Mouffe’s thoughts on ‘antagonism’ and ‘passion,’ Foucault’s ideas on international citizenship and the (ethical ‘right to intervene’ (beyond governmentality, together with Sontag’s notion of institutional political inertia and the Deleuzian/Spinozian perspective on affect as a capacity for action. The goal is to analyse the ways in which Anonymous systematically inspire (not only the radical and social imaginary but also other direct forms of action that have potential societal effects.

  15. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    Science.gov (United States)

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  16. Evaluation of methods to calibrate radiation survey meters

    International Nuclear Information System (INIS)

    Robinson, R.C.; Arbeau, N.D.

    1987-04-01

    Calibration requirements for radiation survey meters used in industrial radiography have been reviewed. Information obtained from a literature search, discussions with CSLD inspectors and firms performing calibrations has been considered. Based on this review a set of minimum calibration requirements was generated which, when met, will determine that the survey meter is suited for measurements described in the current AEC Regulations that apply to industrial radiography equipment. These requirements are presented in this report and may be used as guidelines for evaluating calibration methods proposed or in use in industry. 39 refs

  17. Digital anonymity on the internet : new rules for anonymous electronic transactions? an exploration of the private law implications of digital anonymity

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.; Prins, C.

    2001-01-01

    This article sets out the most important conclusions of the first stage of a study into the dimensions of digital anonymity. It is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity. The

  18. Formal methods for industrial critical systems a survey of applications

    CERN Document Server

    Margaria-Steffen, Tiziana

    2012-01-01

    "Today, formal methods are widely recognized as an essential step in the design process of industrial safety-critical systems. In its more general definition, the term formal methods encompasses all notations having a precise mathematical semantics, together with their associated analysis methods, that allow description and reasoning about the behavior of a system in a formal manner.Growing out of more than a decade of award-winning collaborative work within the European Research Consortium for Informatics and Mathematics, Formal Methods for Industrial Critical Systems: A Survey of Applications presents a number of mainstream formal methods currently used for designing industrial critical systems, with a focus on model checking. The purpose of the book is threefold: to reduce the effort required to learn formal methods, which has been a major drawback for their industrial dissemination; to help designers to adopt the formal methods which are most appropriate for their systems; and to offer a panel of state-of...

  19. Comparing Traditional and Crowdsourcing Methods for Pretesting Survey Questions

    Directory of Open Access Journals (Sweden)

    Jennifer Edgar

    2016-10-01

    Full Text Available Cognitive interviewing is a common method used to evaluate survey questions. This study compares traditional cognitive interviewing methods with crowdsourcing, or “tapping into the collective intelligence of the public to complete a task.” Crowdsourcing may provide researchers with access to a diverse pool of potential participants in a very timely and cost-efficient way. Exploratory work found that crowdsourcing participants, with self-administered data collection, may be a viable alternative, or addition, to traditional pretesting methods. Using three crowdsourcing designs (TryMyUI, Amazon Mechanical Turk, and Facebook, we compared the participant characteristics, costs, and quantity and quality of data with traditional laboratory-based cognitive interviews. Results suggest that crowdsourcing and self-administered protocols may be a viable way to collect survey pretesting information, as participants were able to complete the tasks and provide useful information; however, complex tasks may require the skills of an interviewer to administer unscripted probes.

  20. Biological variables for the site survey of surface ecosystems - existing data and survey methods

    International Nuclear Information System (INIS)

    Kylaekorpi, Lasse; Berggren, Jens; Larsson, Mats; Liberg, Maria; Rydgren, Bernt

    2000-06-01

    In the process of selecting a safe and environmentally acceptable location for the deep level repository of nuclear waste, site surveys will be carried out. These site surveys will also include studies of the biota at the site, in order to assure that the chosen site will not conflict with important ecological interests, and to establish a thorough baseline for future impact assessments and monitoring programmes. As a preparation to the site survey programme, a review of the variables that need to be surveyed is conducted. This report contains the review for some of those variables. For each variable, existing data sources and their characteristics are listed. For those variables for which existing data sources are inadequate, suggestions are made for appropriate methods that will enable the establishment of an acceptable baseline. In this report the following variables are reviewed: Fishery, Landscape, Vegetation types, Key biotopes, Species (flora and fauna), Red-listed species (flora and fauna), Biomass (flora and fauna), Water level, water retention time (incl. water body and flow), Nutrients/toxins, Oxygen concentration, Layering, stratification, Light conditions/transparency, Temperature, Sediment transport, (Marine environments are excluded from this review). For a major part of the variables, the existing data coverage is most likely insufficient. Both the temporal and/or the geographical resolution is often limited, which means that complementary surveys must be performed during (or before) the site surveys. It is, however, in general difficult to make exact judgements on the extent of existing data, and also to give suggestions for relevant methods to use in the site surveys. This can be finally decided only when the locations for the sites are decided upon. The relevance of the different variables also depends on the environmental characteristics of the sites. Therefore, we suggest that when the survey sites are selected, an additional review is

  1. Biological variables for the site survey of surface ecosystems - existing data and survey methods

    Energy Technology Data Exchange (ETDEWEB)

    Kylaekorpi, Lasse; Berggren, Jens; Larsson, Mats; Liberg, Maria; Rydgren, Bernt [SwedPower AB, Stockholm (Sweden)

    2000-06-01

    In the process of selecting a safe and environmentally acceptable location for the deep level repository of nuclear waste, site surveys will be carried out. These site surveys will also include studies of the biota at the site, in order to assure that the chosen site will not conflict with important ecological interests, and to establish a thorough baseline for future impact assessments and monitoring programmes. As a preparation to the site survey programme, a review of the variables that need to be surveyed is conducted. This report contains the review for some of those variables. For each variable, existing data sources and their characteristics are listed. For those variables for which existing data sources are inadequate, suggestions are made for appropriate methods that will enable the establishment of an acceptable baseline. In this report the following variables are reviewed: Fishery, Landscape, Vegetation types, Key biotopes, Species (flora and fauna), Red-listed species (flora and fauna), Biomass (flora and fauna), Water level, water retention time (incl. water body and flow), Nutrients/toxins, Oxygen concentration, Layering, stratification, Light conditions/transparency, Temperature, Sediment transport, (Marine environments are excluded from this review). For a major part of the variables, the existing data coverage is most likely insufficient. Both the temporal and/or the geographical resolution is often limited, which means that complementary surveys must be performed during (or before) the site surveys. It is, however, in general difficult to make exact judgements on the extent of existing data, and also to give suggestions for relevant methods to use in the site surveys. This can be finally decided only when the locations for the sites are decided upon. The relevance of the different variables also depends on the environmental characteristics of the sites. Therefore, we suggest that when the survey sites are selected, an additional review is

  2. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  3. Survey Method for Radiological Surveys of 300-FF-1 Operable Unit Soils and Material

    International Nuclear Information System (INIS)

    Brehm, D.M.

    1998-06-01

    This technical basis is to be used to survey soils at the 300-FF-1 Operable Unit during remediation of the site. Its purpose is to provide a basis for the survey methods to be employed by radiological control technician (RCTs) to guide the excavation effort in accordance with the 300-FF-1 waste site Record of Decision (ROD). The ROD for the 300-FF-1 Operable Unit requires selective excavation, removal, and disposal of contaminated soil above 350 pCi/g total uranium activity. Soil above this level will be disposed of as radioactive waste. The remaining soil will remain onsite

  4. Radiological decontamination, survey, and statistical release method for vehicles

    International Nuclear Information System (INIS)

    Goodwill, M.E.; Lively, J.W.; Morris, R.L.

    1996-06-01

    Earth-moving vehicles (e.g., dump trucks, belly dumps) commonly haul radiologically contaminated materials from a site being remediated to a disposal site. Traditionally, each vehicle must be surveyed before being released. The logistical difficulties of implementing the traditional approach on a large scale demand that an alternative be devised. A statistical method for assessing product quality from a continuous process was adapted to the vehicle decontamination process. This method produced a sampling scheme that automatically compensates and accommodates fluctuating batch sizes and changing conditions without the need to modify or rectify the sampling scheme in the field. Vehicles are randomly selected (sampled) upon completion of the decontamination process to be surveyed for residual radioactive surface contamination. The frequency of sampling is based on the expected number of vehicles passing through the decontamination process in a given period and the confidence level desired. This process has been successfully used for 1 year at the former uranium millsite in Monticello, Utah (a cleanup site regulated under the Comprehensive Environmental Response, Compensation, and Liability Act). The method forces improvement in the quality of the decontamination process and results in a lower likelihood that vehicles exceeding the surface contamination standards are offered for survey. Implementation of this statistical sampling method on Monticello projects has resulted in more efficient processing of vehicles through decontamination and radiological release, saved hundreds of hours of processing time, provided a high level of confidence that release limits are met, and improved the radiological cleanliness of vehicles leaving the controlled site

  5. Practical methods for radiation survey in nuclear installations

    International Nuclear Information System (INIS)

    Shweikani, R.

    2001-12-01

    This study is placed to those who are responsible to perform radiation survey in the nuclear installations, especially the beginners. Therefore, it gives a comprehensive view to all-important aspects related to their work starting from the structure of atoms to the practical steps for radiation survey works. So, it clarify how to perform personal monitoring, methods for monitoring surface contamination, methods for measuring radioactivity of gases and radioactive aerosols in air, monitoring radiation doses, measuring radiation influences in workplaces and finally measuring internal exposure of radiation workers in nuclear installations. Finally, The study shows some cases of breaches of radiation protection rules in some American nuclear installations and describes the final results of these breaches. The aim of this is to assure that any breach or ignore to radiation protection principles may produce bad results, and there is no leniency in implementing environmental radiation protection principles. (author)

  6. Prenotification, Incentives, and Survey Modality: An Experimental Test of Methods to Increase Survey Response Rates of School Principals

    Science.gov (United States)

    Jacob, Robin Tepper; Jacob, Brian

    2012-01-01

    Teacher and principal surveys are among the most common data collection techniques employed in education research. Yet there is remarkably little research on survey methods in education, or about the most cost-effective way to raise response rates among teachers and principals. In an effort to explore various methods for increasing survey response…

  7. Really not god: Secularization and pragmatism in Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1994-09-01

    The paper argues that despite maintaining the image of a twelve-step organization, the central theme of the history of Gamblers Anonymous (GA) in the United States is the increasing secularization of the program of the recovery. The paper documents the increasing secularization and pragmatism of Gamblers Anonymous, as reflected in key documents, despite the spiritual vision of its founding member. The author speculates on why Gamblers Anonymous took a secularized development path. Further research is called for.

  8. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...... bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...

  9. Survey and assessment of conventional software verification and validation methods

    International Nuclear Information System (INIS)

    Miller, L.A.; Groundwater, E.; Mirsky, S.M.

    1993-04-01

    By means of a literature survey, a comprehensive set of methods was identified for the verification and validation of conventional software. The 134 methods so identified were classified according to their appropriateness for various phases of a developmental lifecycle -- requirements, design, and implementation; the last category was subdivided into two, static testing and dynamic testing methods. The methods were then characterized in terms of eight rating factors, four concerning ease-of-use of the methods and four concerning the methods' power to detect defects. Based on these factors, two measurements were developed to permit quantitative comparisons among methods, a Cost-Benefit metric and an Effectiveness Metric. The Effectiveness Metric was further refined to provide three different estimates for each method, depending on three classes of needed stringency of V ampersand V (determined by ratings of a system's complexity and required-integrity). Methods were then rank-ordered for each of the three classes in terms of their overall cost-benefits and effectiveness. The applicability was then assessed of each method for the four identified components of knowledge-based and expert systems, as well as the system as a whole

  10. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    Science.gov (United States)

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  11. [A Delphi Method Survey of the Core Competences of Post-Acute-Care Nurses in Caring for Acute Stroke Patients].

    Science.gov (United States)

    Chi, Shu-Ching; Yeh, Lily; Lu, Meei-Shiow; Lin, Pei-Yu

    2015-12-01

    Post-acute care (PAC) service is becoming increasingly important in Taiwan as a core focus of government policies that are designed to ensure continuity of care. In order to improve PAC nursing education and quality of care, the present study applies a modified Delphi method to identify the core competences of nurses who provide PAC services to acute stroke patients. We surveyed 18 experts in post-acute care and long-term care anonymously using a 29-question questionnaire in order to identify the essential professional skills that are required to perform PAC effectively. The results of this survey indicate that the core competences of PAC may be divided into two categories: Case Management and Care Management. Case Management includes Direct Care, Communication, Health Care Education, Nursing Consulting, and Family Assessment & Health Care. Care Management includes Interdisciplinary Teamwork, Patient Care Management, and Resource Integration. The importance and practicality of each item was evaluated using a 7-point Likert scale. The experts required 2 rounds to reach a consensus about the importance and 3 rounds to determine the practicality of PAC core competences. This process highlighted the differing points of view that are held by professionals in the realms of nursing, medicine, and national health policy. The PAC in-job training program in its current form inadequately cul-tivates core competence in Care Management. The results of the present study may be used to inform the development of PAC nurse orientation training programs and continuing education courses.

  12. What Does Anonymization Mean? DataSHIELD and the Need for Consensus on Anonymization Terminology.

    Science.gov (United States)

    Wallace, Susan E

    2016-06-01

    Anonymization is a recognized process by which identifiers can be removed from identifiable data to protect an individual's confidentiality and is used as a standard practice when sharing data in biomedical research. However, a plethora of terms, such as coding, pseudonymization, unlinked, and deidentified, have been and continue to be used, leading to confusion and uncertainty. This article shows that this is a historic problem and argues that such continuing uncertainty regarding the levels of protection given to data risks damaging initiatives designed to assist researchers conducting cross-national studies and sharing data internationally. DataSHIELD and the creation of a legal template are used as examples of initiatives that rely on anonymization, but where the inconsistency in terminology could hinder progress. More broadly, this article argues that there is a real possibility that there could be possible damage to the public's trust in research and the institutions that carry it out by relying on vague notions of the anonymization process. Research participants whose lack of clear understanding of the research process is compensated for by trusting those carrying out the research may have that trust damaged if the level of protection given to their data does not match their expectations. One step toward ensuring understanding between parties would be consistent use of clearly defined terminology used internationally, so that all those involved are clear on the level of identifiability of any particular set of data and, therefore, how that data can be accessed and shared.

  13. Survey of evaluation methods for thermal striping in FBR structures

    International Nuclear Information System (INIS)

    Miura, Naoki; Nitta, Akito; Take, Kohji

    1988-01-01

    In the upper core structures or the sodium mixing tee of Fast Breeder Reactors, sodium mixing streams which are at different temperatures produce rapid temperature fluctuations, namely 'thermal striping', upon component surfaces, and it is apprehended that the high-cycle thermal fatigue causes the crack initiation and propagation. The thermal striping is one of the factors which is considered in FBR component design, however, the standard evaluation method has not built up yet because of the intricacy of that mechanism, the difficulty of an actual proof, the lack of data, and so on. In this report, it is intended to survey of the datails and the present situation of the evaluation method of crack initiation and propagation due to thermal striping, and study the appropriate method which will be made use of the rationalization of design. So it is ascertained that the method which use a quantitative prediction of crack propagation is optimum to evaluate the thermal striping phenomenon. (author)

  14. Studying Landslide Displacements in Megamendung (Indonesia Using GPS Survey Method

    Directory of Open Access Journals (Sweden)

    Hasanuddin Z. Abidin

    2004-11-01

    Full Text Available Landslide is one of prominent geohazards that frequently affects Indonesia, especially in the rainy season. It destroys not only environment and property, but usually also causes deaths. Landslide monitoring is therefore very crucial and should be continuously done. One of the methods that can have a contribution in studying landslide phenomena is repeated GPS survey method. This paper presents and discusses the operational performances, constraints and results of GPS surveys conducted in a well known landslide prone area in West Java (Indonesia, namely Megamendung, the hilly region close to Bogor. Three GPS surveys involving 8 GPS points have been conducted, namely on April 2002, May 2003 and May 2004, respectively. The estimated landslide displacements in the area are relatively quite large in the level of a few dm to a few m. Displacements up to about 2-3 m were detected in the April 2002 to May 2003 period, and up to about 3-4 dm in the May 2003 to May 2004 period. In both periods, landslides in general show the northwest direction of displacements. Displacements vary both spatially and temporally. This study also suggested that in order to conclude the existence of real and significant displacements of GPS points, the GPS estimated displacements should be subjected to three types of testing namely: the congruency test on spatial displacements, testing on the agreement between the horizontal distance changes with the predicted direction of landslide displacement, and testing on the consistency of displacement directions on two consecutive periods.

  15. A Survey of Methods for Gas-Lift Optimization

    Directory of Open Access Journals (Sweden)

    Kashif Rashid

    2012-01-01

    Full Text Available This paper presents a survey of methods and techniques developed for the solution of the continuous gas-lift optimization problem over the last two decades. These range from isolated single-well analysis all the way to real-time multivariate optimization schemes encompassing all wells in a field. While some methods are clearly limited due to their neglect of treating the effects of inter-dependent wells with common flow lines, other methods are limited due to the efficacy and quality of the solution obtained when dealing with large-scale networks comprising hundreds of difficult to produce wells. The aim of this paper is to provide an insight into the approaches developed and to highlight the challenges that remain.

  16. Survey nonresponse among ethnic minorities in a national health survey--a mixed-method study of participation, barriers, and potentials.

    Science.gov (United States)

    Ahlmark, Nanna; Algren, Maria Holst; Holmberg, Teresa; Norredam, Marie Louise; Nielsen, Signe Smith; Blom, Astrid Benedikte; Bo, Anne; Juel, Knud

    2015-01-01

    The participation rate in the Danish National Health Survey (DNHS) 2010 was significantly lower among ethnic minorities than ethnic Danes. The purpose was to characterize nonresponse among ethnic minorities in DNHS, analyze variations in item nonresponse, and investigate barriers and incentives to participation. This was a mixed-method study. Logistic regression was used to analyze nonresponse using data from DNHS (N = 177,639 and chi-square tests in item nonresponse analyses. We explored barriers and incentives regarding participation through focus groups and cognitive interviews. Informants included immigrants and their descendants of both sexes, with and without higher education. The highest nonresponse rate was for non-Western descendants (80.0%) and immigrants 25 (72.3%) with basic education. Immigrants and descendants had higher odds ratios (OR = 3.07 and OR = 3.35, respectively) for nonresponse than ethnic Danes when adjusted for sex, age, marital status, and education. Non-Western immigrants had higher item nonresponse in several question categories. Barriers to non-participation related to the content, language, format, and layout of both the questionnaire and the cover letter. The sender and setting in which to receive the questionnaire also influenced answering incentives. We observed differences in barriers and incentives between immigrants and descendants. Nonresponse appears related to linguistic and/or educational limitations, to alienation generated by the questions' focus on disease and cultural assumptions, or mistrust regarding anonymity. Ethnic minorities seem particularly affected by such barriers. To increase survey participation, questions could be sensitized to reflect multicultural traditions, and the impact of sender and setting considered.

  17. Vote to link: Recovering from misbehaving anonymous users

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation,

  18. An Applet-based Anonymous Distributed Computing System.

    Science.gov (United States)

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  19. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  20. Fast and accurate methods of independent component analysis: A survey

    Czech Academy of Sciences Publication Activity Database

    Tichavský, Petr; Koldovský, Zbyněk

    2011-01-01

    Roč. 47, č. 3 (2011), s. 426-438 ISSN 0023-5954 R&D Projects: GA MŠk 1M0572; GA ČR GA102/09/1278 Institutional research plan: CEZ:AV0Z10750506 Keywords : Blind source separation * artifact removal * electroencephalogram * audio signal processing Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 0.454, year: 2011 http://library.utia.cas.cz/separaty/2011/SI/tichavsky-fast and accurate methods of independent component analysis a survey.pdf

  1. Use of deterministic methods in survey calculations for criticality problems

    International Nuclear Information System (INIS)

    Hutton, J.L.; Phenix, J.; Course, A.F.

    1991-01-01

    A code package using deterministic methods for solving the Boltzmann Transport equation is the WIMS suite. This has been very successful for a range of situations. In particular it has been used with great success to analyse trends in reactivity with a range of changes in state. The WIMS suite of codes have a range of methods and are very flexible in the way they can be combined. A wide variety of situations can be modelled ranging through all the current Thermal Reactor variants to storage systems and items of chemical plant. These methods have recently been enhanced by the introduction of the CACTUS method. This is based on a characteristics technique for solving the Transport equation and has the advantage that complex geometrical situations can be treated. In this paper the basis of the method is outlined and examples of its use are illustrated. In parallel with these developments the validation for out of pile situations has been extended to include experiments with relevance to criticality situations. The paper will summarise this evidence and show how these results point to a partial re-adoption of deterministic methods for some areas of criticality. The paper also presents results to illustrate the use of WIMS in criticality situations and in particular show how it can complement codes such as MONK when used for surveying the reactivity effect due to changes in geometry or materials. (Author)

  2. Survey: interpolation methods for whole slide image processing.

    Science.gov (United States)

    Roszkowiak, L; Korzynska, A; Zak, J; Pijanowska, D; Swiderska-Chadaj, Z; Markiewicz, T

    2017-02-01

    Evaluating whole slide images of histological and cytological samples is used in pathology for diagnostics, grading and prognosis . It is often necessary to rescale whole slide images of a very large size. Image resizing is one of the most common applications of interpolation. We collect the advantages and drawbacks of nine interpolation methods, and as a result of our analysis, we try to select one interpolation method as the preferred solution. To compare the performance of interpolation methods, test images were scaled and then rescaled to the original size using the same algorithm. The modified image was compared to the original image in various aspects. The time needed for calculations and results of quantification performance on modified images were also compared. For evaluation purposes, we used four general test images and 12 specialized biological immunohistochemically stained tissue sample images. The purpose of this survey is to determine which method of interpolation is the best to resize whole slide images, so they can be further processed using quantification methods. As a result, the interpolation method has to be selected depending on the task involving whole slide images. © 2016 The Authors Journal of Microscopy © 2016 Royal Microscopical Society.

  3. Alcoholics anonymous, other 12-step movements and psychotherapy in the US population, 1990.

    Science.gov (United States)

    Room, R; Greenfield, T

    1993-04-01

    Based on the 1990 US National Alcohol Survey, this note provides the first available comprehensive findings on self-reported utilization of a variety of sources of personal support and counselling for alcohol and other problems. Respondents were queried about lifetime attendance and number of times they went to identified sources of help in the prior year. Twelve-step groups included Alcoholics Anonymous, Al-Anon, Adult Children of Alcoholics, and other non-alcohol-oriented groups like Gamblers Anonymous, Narcotics Anonymous, and Overeaters Anonymous; additional questions inquired about support or therapy groups and individual counselling for non-alcohol problems. Of the US adult population, 9% have been to an AA meeting at some time, 3.6% in the prior year, only about one-third of these for problems of their own. About half these percentages, mostly women, have attended Al-Anon. Of the same population, 13.3% indicate ever attending a 12-step meeting (including non-alcohol-oriented groups), 5.3% in the last year. During the prior year a further 2.1% used other support/therapy groups and 5.5% sought individual counselling/therapy for personal problems other than alcohol. In contrast to this high reported utilization, only 4.9% (ever) and 2.3% (12-months) reported going to anyone including AA for a problem (of their own) related to drinking.

  4. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  5. Quality of life changes in an alcoholics anonymous self-help group

    Directory of Open Access Journals (Sweden)

    INDRĖ DIRGĖLIENĖ

    2017-09-01

    Full Text Available The issue of alcohol addiction is one of the most pressing in contemporary society as it causes an effect in the context of poverty, violence and suicidal behaviour. After the restoration of Lithuania‘s Independence a new helping profession such as social worker appeared: they were expected to provide professional help to people in order to help them find inner motivation for positive socialization or re-socialization. The issue of alcohol addiction/dependence was first viewed systemically, with the understanding of the need for systemic help: social, psychological, spiritual and medical. Long-term rehabilitation centres have been created and self-help groups formed: those of Alcoholics Anonymous (AA, Al-anon (self – help groups for friends and families who have relatives suffering from alcohol and ACA (Adult Children of Alcoholics self-help group. The article analyzes the quality of life changes in an Alcoholics Anonymous self-help group. Qualitative survey data are presented in this article. Six life stories of people attending Alcoholics Anonymous (AA self-help groups are provided. The age of the participants ranges from 31 to 58. The main criterion to participate in the research is: people who have or have had problems because of alcohol usage and who are Alcoholics Anonymous self-help group (AA participants that have reached Step 12. This means they are ready to spread the message about recovering from this abuse to people who suffer from it. Deep analysis interview has been used to collect the data. Interview notional blocks are: 1 childhood experiences; 2 addiction to alcohol period and crisis; 3 changes of life quality when attending AA groups. The study data have been provided using content analysis through the deduction method. The theoretical basis is a systematic approach to a person in the course of his life‘ spiritual concepts and stages of recovery (May, 2004; Linn, Linn, 2003; Kubler-Ross, 2008 and the theory of integrated

  6. The Pattern of Drug Abuse in Anonymous Adidcts

    Directory of Open Access Journals (Sweden)

    Seyede Maryam Vahdat-Shariat-Panahi

    2010-04-01

    Full Text Available Objective: Having the information about pattern of substance abuse in the community and its epidemiological features is one of the most important protocols for evaluation, follow–up and control of the use of these substances. The aim of this study was to evaluate the patterns of substances abuse among narcotic anonymous (N. A. addicted patients. Materials & Methods: In this descriptive and analytical study, three hundred patients from narcotic abusers anonymous (N. A. association who were referred to a treatment center in Tehran were participated consecutively. The information about demographic characteristics, socioeconomic status, type of drug and the patterns of substance abuse of all cases were collected by researcher made questionnaire. Data were analyzed by Chi–Square test. Results: 80% of the patients were male. Almost 65. 2% of cases aged less than 40 years. More than two–third of cases had free jobs and 21. 2% of them were unemployed. Also, 32% of patients had college degrees. The most common types of abused substance were opium (88%, cigarette (76.7%, and alcohol (63% and 34% of them used substances intravenously. The use of alcohol (P=0.033, cannabis (P<0.001, cocaine (P=0.009 and ecstasy (P<0.001 was more prevalent significantly in the cases less than 40 years old than the elderly. Conclusion: It seems that the trend of substance abuse has been changed to younger population. The pattern of drug abuse in young adults is more toward psychosis drugs such as cocaine and ecstasy.

  7. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  8. The IMACS Cluster Building Survey. I. Description of the Survey and Analysis Methods

    Science.gov (United States)

    Oemler Jr., Augustus; Dressler, Alan; Gladders, Michael G.; Rigby, Jane R.; Bai, Lei; Kelson, Daniel; Villanueva, Edward; Fritz, Jacopo; Rieke, George; Poggianti, Bianca M.; hide

    2013-01-01

    The IMACS Cluster Building Survey uses the wide field spectroscopic capabilities of the IMACS spectrograph on the 6.5 m Baade Telescope to survey the large-scale environment surrounding rich intermediate-redshift clusters of galaxies. The goal is to understand the processes which may be transforming star-forming field galaxies into quiescent cluster members as groups and individual galaxies fall into the cluster from the surrounding supercluster. This first paper describes the survey: the data taking and reduction methods. We provide new calibrations of star formation rates (SFRs) derived from optical and infrared spectroscopy and photometry. We demonstrate that there is a tight relation between the observed SFR per unit B luminosity, and the ratio of the extinctions of the stellar continuum and the optical emission lines.With this, we can obtain accurate extinction-corrected colors of galaxies. Using these colors as well as other spectral measures, we determine new criteria for the existence of ongoing and recent starbursts in galaxies.

  9. THE IMACS CLUSTER BUILDING SURVEY. I. DESCRIPTION OF THE SURVEY AND ANALYSIS METHODS

    Energy Technology Data Exchange (ETDEWEB)

    Oemler, Augustus Jr.; Dressler, Alan; Kelson, Daniel; Villanueva, Edward [Observatories of the Carnegie Institution for Science, 813 Santa Barbara St., Pasadena, CA 91101-1292 (United States); Gladders, Michael G. [Department of Astronomy and Astrophysics, University of Chicago, Chicago, IL 60637 (United States); Rigby, Jane R. [Observational Cosmology Lab, NASA Goddard Space Flight Center, Greenbelt, MD 20771 (United States); Bai Lei [Department of Astronomy and Astrophysics, University of Toronto, 50 St. George Street, Toronto, ON M5S 3H4 (Canada); Fritz, Jacopo [Sterrenkundig Observatorium, Universiteit Gent, Krijgslaan 281 S9, B-9000 Gent (Belgium); Rieke, George [Steward Observatory, University of Arizona, Tucson, AZ 8572 (United States); Poggianti, Bianca M.; Vulcani, Benedetta, E-mail: oemler@obs.carnegiescience.edu [INAF-Osservatorio Astronomico di Padova, Vicolo dell' Osservatorio 5, I-35122 Padova (Italy)

    2013-06-10

    The IMACS Cluster Building Survey uses the wide field spectroscopic capabilities of the IMACS spectrograph on the 6.5 m Baade Telescope to survey the large-scale environment surrounding rich intermediate-redshift clusters of galaxies. The goal is to understand the processes which may be transforming star-forming field galaxies into quiescent cluster members as groups and individual galaxies fall into the cluster from the surrounding supercluster. This first paper describes the survey: the data taking and reduction methods. We provide new calibrations of star formation rates (SFRs) derived from optical and infrared spectroscopy and photometry. We demonstrate that there is a tight relation between the observed SFR per unit B luminosity, and the ratio of the extinctions of the stellar continuum and the optical emission lines. With this, we can obtain accurate extinction-corrected colors of galaxies. Using these colors as well as other spectral measures, we determine new criteria for the existence of ongoing and recent starbursts in galaxies.

  10. Sex Differences in Attitudes towards Online Privacy and Anonymity among Israeli Students with Different Technical Backgrounds

    Science.gov (United States)

    Weinberger, Maor; Zhitomirsky-Geffet, Maayan; Bouhnik, Dan

    2017-01-01

    Introduction: In this exploratory study, we proposed an experimental framework to investigate and model male/female differences in attitudes towards online privacy and anonymity among Israeli students. Our aim was to comparatively model men and women's online privacy attitudes, and to assess the online privacy gender gap. Method: Various factors…

  11. Metal speciation: survey of environmental methods of analysis

    Energy Technology Data Exchange (ETDEWEB)

    Mach, M.H.; Nott, B.; Scott, J.W.; Maddalone, R.F.; Whiddon, N.T. [TRW, Redondo Beach, CA (United States). Chemistry Technology Dept.

    1996-07-01

    As part of a recent task under the EPRI Analytical Methods Qualification Program (RP 1851), TRW has surveyed the methods available for monitoring metal species in typical utility aqueous discharge streams. Methods for determining the individual species of these metals can become important in a regulatory sense as the EPA transitions to assessment of environmental risk based on bioavailability. For example, EPA considers methyl mercury and Cr(VI) much more toxic to the aquatic environment than inorganic mercury or Cr(III). The species of a given element can also differ in their transport and bioaccumulation. Methods for speciation generally include a selective separation step followed by standard metals analysis. Speciation, therefore, is mainly derived from the separation step and not from the method of final quantisation. Examples of separation/analysis include: selective extraction followed by graphite furnace atomic absorption or ICP-MS; separation by GC followed by metals detection; chelation and/or direct separation by LC followed by UV measurement or metals detection; and ion chromatography with conductivity, UV, or metals detection. There are a number of sampling issues associated with metal species such as stabilization (maintaining oxidation state), absorption, and filtration that need to be addressed in order to obtain and maintain a representative sample for analysis. 45 refs., 1 tab.

  12. Transport survey calculations using the spectral collocation method

    International Nuclear Information System (INIS)

    Painter, S.L.; Lyon, J.F.

    1989-01-01

    A novel transport survey code has been developed and is being used to study the sensitivity of stellarator reactor performance to various transport assumptions. Instead of following one of the usual approaches, the steady-state transport equation are solved in integral form using the spectral collocation method. This approach effectively combine the computational efficiency of global models with the general nature of 1-D solutions. A compact torsatron reactor test case was used to study the convergence properties and flexibility of the new method. The heat transport model combined Shaing's model for ripple-induced neoclassical transport, the Chang-Hinton model for axisymmetric neoclassical transport, and neoalcator scaling for anomalous electron heat flux. Alpha particle heating, radiation losses, classical electron-ion heat flow, and external heating were included. For the test problem, the method exhibited some remarkable convergence properties. As the number of basis functions was increased, the maximum, pointwise error in the integrated power balance decayed exponentially until the numerical noise level as reached. Better than 10% accuracy in the globally-averaged quantities was achieved with only 5 basis functions; better than 1% accuracy was achieved with 10 basis functions. The numerical method was also found to be very general. Extreme temperature gradients at the plasma edge which sometimes arise from the neoclassical models and are difficult to resolve with finite-difference methods were easily resolved. 8 refs., 6 figs

  13. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  14. Design and Implement of the Anonymous Communications in the Mobile IP Networks%移动IP中通信匿名技术的设计与实现

    Institute of Scientific and Technical Information of China (English)

    康凯; 郭伟; 吴诗其

    2002-01-01

    One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,and prevent from being tracked and located. In this paper, we have discoursed the anonymous communications in themobile IP, and presented a novel strategy of the dynamic address allocation and the routing with anonymity. The sug-gested method enables any identifying information can be carried over the anonymous and secure connections, andprovide end-to-end security. The implements of the mobile host and the mobile subnet are also presented.

  15. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    Directory of Open Access Journals (Sweden)

    Salma Umme

    2011-04-01

    Full Text Available Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004/23/EC. To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225 in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004/23/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  16. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  17. Homophily in an Anonymous Online Community: Sociodemographic Versus Personality Traits.

    Science.gov (United States)

    Kang, Jeong-Han; Chung, Da Young

    2017-06-01

    In what traits do people interact with others who are similar to them in completely anonymous online communication? Can those traits contribute to greater exchange of opinion and information across the sociodemographic boundaries that often limit interaction between social strata? To answer this question concerning online homophily, we combined survey data on 7,287 users (aged 18 and above) of a Korean online dating advice platform with their behavioral data from June 2015 to August 2015 and explored whether advice exchange occurred between users with similar sociodemographic and personality traits. On this platform, two types of interactions occurred as follows: (1) responses to a randomly distributed problem submitted by an advice seeker and (2) the seeker's indication of approval of any of the responses given. The study found that (1) a receiver was more likely to respond to problems submitted by seekers of a comparable age and that (2) seekers were more likely to approve of a response if the seeker and receiver had similar educational backgrounds. By contrast, homophily based on personality traits was not observed even though some personality traits significantly affected the likelihood of both response and approval. Our findings suggest that online communication may breed sociodemographic homophily, whether based on age or education, more than expected or intended while not easily fostering alternative forms of homophily, such as personality homophily, which can potentially cut across borders dividing sociodemographic groups.

  18. Fictional Marriage Proposal of Anonymous Astrakhan Khan

    Directory of Open Access Journals (Sweden)

    Roman Hautala

    2017-03-01

    Full Text Available The following text is reproduced from a handwritten copy of the letter made by the Italian humanist Gian Vincenzo Pinelli (1535–1601 and contained in one codex of Ambrosiana Library in Milan (R 104 sup., fol. 194r [see the description of the codex in: 3, no. 341. p. 125]. This codex (588 folios contains Italian and Latin texts of the 16th century of extremely diverse content, which does not allow to determe neither the name of the author of the reproduced letter, nor the date of its writing. Nevertheless, a reference to the name of “Luther” in the letter suggests that it must have been written in the 16th century and an indication of the main purpose of the letter – matchmaking to anonymous queen – makes it possible to put forward quite a bold (but, for now, unproven hypothesis that this letter might be addressed to approximates of the Polish Queen Bona Sforza and the widow of King Sigismund I the Old starting with the April 1, 1548. Following this hypothesis, the alleged author of the letter could be the ruler of Astrakhan Yamgurchi or the Crimean khan Sahib Giray. However, this assumption remains only a hypothesis, and the author of this article hopes that future researchers will be able to identify both the author of the letter and its recipients. Be that as it may, this letter is of undoubtedly fictitious character since it does not indicate the name of its author and the date of writing and obviously differs from official form of the Tatar rulers’ letters. Undoubtedly, this letter refers to the literary genre of fictional letters of the rulers, which became extremely popular in Europe since the second half of the 15th century. As an illustration of this genre, the author of this article presents a “letter” of the Turkish sultan to the Tatars and their “response” from the fictional collection of “Letters of the Great Turk” [1, fol. 18r] of Laudivius Hierosolymitanus, which was a relatively widespread in Europe in the

  19. Analytical methods manual for the Mineral Resource Surveys Program, U.S. Geological Survey

    Science.gov (United States)

    Arbogast, Belinda F.

    1996-01-01

    The analytical methods validated by the Mineral Resource Surveys Program, Geologic Division, is the subject of this manual. This edition replaces the methods portion of Open-File Report 90-668 published in 1990. Newer methods may be used which have been approved by the quality assurance (QA) project and are on file with the QA coordinator.This manual is intended primarily for use by laboratory scientists; this manual can also assist laboratory users to evaluate the data they receive. The analytical methods are written in a step by step approach so that they may be used as a training tool and provide detailed documentation of the procedures for quality assurance. A "Catalog of Services" is available for customer (submitter) use with brief listings of:the element(s)/species determined,method of determination,reference to cite,contact person,summary of the technique,and analyte concentration range.For a copy please contact the Branch office at (303) 236-1800 or fax (303) 236-3200.

  20. The JCMT Transient Survey: Data Reduction and Calibration Methods

    Energy Technology Data Exchange (ETDEWEB)

    Mairs, Steve; Lane, James [Department of Physics and Astronomy, University of Victoria, Victoria, BC, V8P 1A1 (Canada); Johnstone, Doug; Kirk, Helen [NRC Herzberg Astronomy and Astrophysics, 5071 West Saanich Road, Victoria, BC, V9E 2E7 (Canada); Lacaille, Kevin; Chapman, Scott [Department of Physics and Atmospheric Science, Dalhousie University, Halifax, NS, B3H 4R2 (Canada); Bower, Geoffrey C. [Academia Sinica Institute of Astronomy and Astrophysics, 645 N. A‘ohōkū Place, Hilo, HI 96720 (United States); Bell, Graham S.; Graves, Sarah, E-mail: smairs@uvic.ca [East Asian Observatory, 660 North A‘ohōkū Place, University Park, Hilo, Hawaii 96720 (United States); Collaboration: JCMT Transient Team

    2017-07-01

    Though there has been a significant amount of work investigating the early stages of low-mass star formation in recent years, the evolution of the mass assembly rate onto the central protostar remains largely unconstrained. Examining in depth the variation in this rate is critical to understanding the physics of star formation. Instabilities in the outer and inner circumstellar disk can lead to episodic outbursts. Observing these brightness variations at infrared or submillimeter wavelengths constrains the current accretion models. The JCMT Transient Survey is a three-year project dedicated to studying the continuum variability of deeply embedded protostars in eight nearby star-forming regions at a one-month cadence. We use the SCUBA-2 instrument to simultaneously observe these regions at wavelengths of 450 and 850 μ m. In this paper, we present the data reduction techniques, image alignment procedures, and relative flux calibration methods for 850 μ m data. We compare the properties and locations of bright, compact emission sources fitted with Gaussians over time. Doing so, we achieve a spatial alignment of better than 1″ between the repeated observations and an uncertainty of 2%–3% in the relative peak brightness of significant, localized emission. This combination of imaging performance is unprecedented in ground-based, single-dish submillimeter observations. Finally, we identify a few sources that show possible and confirmed brightness variations. These sources will be closely monitored and presented in further detail in additional studies throughout the duration of the survey.

  1. The JCMT Transient Survey: Data Reduction and Calibration Methods

    International Nuclear Information System (INIS)

    Mairs, Steve; Lane, James; Johnstone, Doug; Kirk, Helen; Lacaille, Kevin; Chapman, Scott; Bower, Geoffrey C.; Bell, Graham S.; Graves, Sarah

    2017-01-01

    Though there has been a significant amount of work investigating the early stages of low-mass star formation in recent years, the evolution of the mass assembly rate onto the central protostar remains largely unconstrained. Examining in depth the variation in this rate is critical to understanding the physics of star formation. Instabilities in the outer and inner circumstellar disk can lead to episodic outbursts. Observing these brightness variations at infrared or submillimeter wavelengths constrains the current accretion models. The JCMT Transient Survey is a three-year project dedicated to studying the continuum variability of deeply embedded protostars in eight nearby star-forming regions at a one-month cadence. We use the SCUBA-2 instrument to simultaneously observe these regions at wavelengths of 450 and 850 μ m. In this paper, we present the data reduction techniques, image alignment procedures, and relative flux calibration methods for 850 μ m data. We compare the properties and locations of bright, compact emission sources fitted with Gaussians over time. Doing so, we achieve a spatial alignment of better than 1″ between the repeated observations and an uncertainty of 2%–3% in the relative peak brightness of significant, localized emission. This combination of imaging performance is unprecedented in ground-based, single-dish submillimeter observations. Finally, we identify a few sources that show possible and confirmed brightness variations. These sources will be closely monitored and presented in further detail in additional studies throughout the duration of the survey.

  2. Survey of Sexual Education among Residents from Different Specialties

    Science.gov (United States)

    Morreale, Mary K.; Arfken, Cynthia L.; Balon, Richard

    2010-01-01

    Objective: This study aims to determine how residents are being educated regarding sexual health, and it assesses attitudes toward sexual education and barriers to evaluating patients' sexuality. Methods: An anonymous Internet survey was sent to 195 residents in family practice, internal medicine, obstetrics and gynecology, and psychiatry at a…

  3. Survey of Threats and Assaults by Patients on Psychiatry Residents

    Science.gov (United States)

    Dvir, Yael; Moniwa, Emiko; Crisp-Han, Holly; Levy, Dana; Coverdale, John H.

    2012-01-01

    Objective: The authors sought to determine the prevalence of threats and assaults by patients on psychiatry residents, their consequences, and the perceived adequacy of supports and institutional responses. Method: Authors conducted an anonymous survey of 519 psychiatry residents in 13 psychiatry programs across the United States. The survey…

  4. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  5. Alcoholics Anonymous and nursing. Lessons in holism and spiritual care.

    Science.gov (United States)

    McGee, E M

    2000-03-01

    Alcoholic Anonymous (AA) is a worldwide, million-member organization that has assisted countless alcoholics to achieve sobriety through a spiritual program of recovery from alcoholism. Based on spiritual principles known as the "Twelve Steps" and "Twelve Traditions," AA has provided a model for other recovery programs such as Narcotics Anonymous (NA), Gamblers Anonymous (GA), and Sex and Love Addicts Anonymous (SLAA). Recovery in AA appears to involve a process of self-transcendence. In recent years, nursing scholars have increasingly explored the concepts of self-transcendence and spirituality as they apply to nursing theory and practice. This article explores the roots and spiritual dimensions of 12-step recovery programs. It further explores the ways in which theoretical and clinical knowledge about the delivery of spiritual care interventions may be gained from an understanding of AA's spiritual approach to recovery.

  6. Property-Based Anonymous Attestation in Trusted Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhen-Hu Ning

    2014-01-01

    Full Text Available In the remote attestation on Trusted Computer (TC computing mode TCCP, the trusted computer TC has an excessive burden, and anonymity and platform configuration information security of computing nodes cannot be guaranteed. To overcome these defects, based on the research on and analysis of current schemes, we propose an anonymous proof protocol based on property certificate. The platform configuration information is converted by the matrix algorithm into the property certificate, and the remote attestation is implemented by trusted ring signature scheme based on Strong RSA Assumption. By the trusted ring signature scheme based on property certificate, we achieve the anonymity of computing nodes and prevent the leakage of platform configuration information. By simulation, we obtain the computational efficiency of the scheme. We also expand the protocol and obtain the anonymous attestation based on ECC. By scenario comparison, we obtain the trusted ring signature scheme based on RSA, which has advantages with the growth of the ring numbers.

  7. Authentic Attributes with Fine-Grained Anonymity Protection

    Science.gov (United States)

    2000-01-01

    registrations and ecommerce trans- Preprint - 2 Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection...driver’s license and birth certi cate. When the registration process is complete, certi cates could be on a smart card that the customer is carrying. The...proof. At least initially, it might not be electronic, e.g., possession of a passport, of a driver’s license and birth certi cate, etc. Anonymous

  8. Survey and evaluation of aging risk assessment methods and applications

    International Nuclear Information System (INIS)

    Sanzo, D.; Kvam, P.; Apostolakis, G.; Wu, J.; Milici, T.; Ghoniem, N.; Guarro, S.

    1994-11-01

    The US Nuclear Regulatory Commission initiated the nuclear power plant aging research program about 6 years ago to gather information about nuclear power plant aging. Since then, this program has collected a significant amount of information, largely qualitative, on plant aging and its potential effects on plant safety. However, this body of knowledge has not yet been integrated into formalisms that can be used effectively and systematically to assess plant risk resulting from aging, although models for assessing the effect of increasing failure rates on core damage frequency have been proposed. This report surveys the work on the aging of systems, structures, and components (SSCs) of nuclear power plants, as well as associated data bases. We take a critical look at the need to revise probabilistic risk assessments (PRAs) so that they will include the contribution to risk from plant aging, the adequacy of existing methods for evaluating this contribution, and the adequacy of the data that have been used in these evaluation methods. We identify a preliminary framework for integrating the aging of SSCs into the PRA and include the identification of necessary data for such an integration

  9. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  10. Measuring fertility through mobile‒phone based household surveys: Methods, data quality, and lessons learned from PMA2020 surveys

    OpenAIRE

    Yoonjoung Choi; Qingfeng Li; Blake Zachary

    2018-01-01

    Background: PMA2020 is a survey platform with resident enumerators using mobile phones. Instead of collecting full birth history, total fertility rates (TFR) have been measured with a limited number of questions on recent births. Employing new approaches provides opportunities to test and advance survey methods. Objective: This study aims to assess the quality of fertility data in PMA2020 surveys, focusing on bias introduced from the questionnaire and completeness and distribution of birth...

  11. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  12. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  13. A Survey on Banknote Recognition Methods by Various Sensors

    Science.gov (United States)

    Lee, Ji Woo; Hong, Hyung Gil; Kim, Ki Wan; Park, Kang Ryoung

    2017-01-01

    Despite a decrease in the use of currency due to the recent growth in the use of electronic financial transactions, real money transactions remain very important in the global market. While performing transactions with real money, touching and counting notes by hand, is still a common practice in daily life, various types of automated machines, such as ATMs and banknote counters, are essential for large-scale and safe transactions. This paper presents studies that have been conducted in four major areas of research (banknote recognition, counterfeit banknote detection, serial number recognition, and fitness classification) in the accurate banknote recognition field by various sensors in such automated machines, and describes the advantages and drawbacks of the methods presented in those studies. While to a limited extent some surveys have been presented in previous studies in the areas of banknote recognition or counterfeit banknote recognition, this paper is the first of its kind to review all four areas. Techniques used in each of the four areas recognize banknote information (denomination, serial number, authenticity, and physical condition) based on image or sensor data, and are actually applied to banknote processing machines across the world. This study also describes the technological challenges faced by such banknote recognition techniques and presents future directions of research to overcome them. PMID:28208733

  14. A Survey of Formal Methods for Intelligent Swarms

    Science.gov (United States)

    Truszkowski, Walt; Rash, James; Hinchey, Mike; Rouff, Chrustopher A.

    2004-01-01

    cutting edge in system correctness, and requires higher levels of assurance than other (traditional) missions that use a single or small number of spacecraft that are deterministic in nature and have near continuous communication access. One of the highest possible levels of assurance comes from the application of formal methods. Formal methods are mathematics-based tools and techniques for specifying and verifying (software and hardware) systems. They are particularly useful for specifying complex parallel systems, such as exemplified by the ANTS mission, where the entire system is difficult for a single person to fully understand, a problem that is multiplied with multiple developers. Once written, a formal specification can be used to prove properties of a system (e.g., the underlying system will go from one state to another or not into a specific state) and check for particular types of errors (e.g., race or livelock conditions). A formal specification can also be used as input to a model checker for further validation. This report gives the results of a survey of formal methods techniques for verification and validation of space missions that use swarm technology. Multiple formal methods were evaluated to determine their effectiveness in modeling and assuring the behavior of swarms of spacecraft using the ANTS mission as an example system. This report is the first result of the project to determine formal approaches that are promising for formally specifying swarm-based systems. From this survey, the most promising approaches were selected and are discussed relative to their possible application to the ANTS mission. Future work will include the application of an integrated approach, based on the selected approaches identified in this report, to the formal specification of the ANTS mission.

  15. A survey of formal methods for determining functional joint axes.

    Science.gov (United States)

    Ehrig, Rainald M; Taylor, William R; Duda, Georg N; Heller, Markus O

    2007-01-01

    Axes of rotation e.g. at the knee, are often generated from clinical gait analysis data to be used in the assessment of kinematic abnormalities, the diagnosis of disease, or the ongoing monitoring of a patient's condition. They are additionally used in musculoskeletal models to aid in the description of joint and segment kinematics for patient specific analyses. Currently available methods to describe joint axes from segment marker positions share the problem that when one segment is transformed into the coordinate system of another, artefacts associated with motion of the markers relative to the bone can become magnified. In an attempt to address this problem, a symmetrical axis of rotation approach (SARA) is presented here to determine a unique axis of rotation that can consider the movement of two dynamic body segments simultaneously, and then compared its performance in a survey against a number of previously proposed techniques. Using a generated virtual joint, with superimposed marker error conditions to represent skin movement artefacts, fitting methods (geometric axis fit, cylinder axis fit, algebraic axis fit) and transformation techniques (axis transformation technique, mean helical axis, Schwartz approach) were classified and compared with the SARA. Nearly all approaches were able to estimate the axis of rotation to within an RMS error of 0.1cm at large ranges of motion (90 degrees ). Although the geometric axis fit produced the least RMS error of approximately 1.2 cm at lower ranges of motion (5 degrees ) with a stationary axis, the SARA and Axis Transformation Technique outperformed all other approaches under the most demanding marker artefact conditions for all ranges of motion. The cylinder and algebraic axis fit approaches were unable to compute competitive AoR estimates. Whilst these initial results using the SARA are promising and are fast enough to be determined "on-line", the technique must now be proven in a clinical environment.

  16. Enhancing Field Research Methods with Mobile Survey Technology

    Science.gov (United States)

    Glass, Michael R.

    2015-01-01

    This paper assesses the experience of undergraduate students using mobile devices and a commercial application, iSurvey, to conduct a neighborhood survey. Mobile devices offer benefits for enhancing student learning and engagement. This field exercise created the opportunity for classroom discussions on the practicalities of urban research, the…

  17. Understanding Sample Surveys: Selective Learning about Social Science Research Methods

    Science.gov (United States)

    Currin-Percival, Mary; Johnson, Martin

    2010-01-01

    We investigate differences in what students learn about survey methodology in a class on public opinion presented in two critically different ways: with the inclusion or exclusion of an original research project using a random-digit-dial telephone survey. Using a quasi-experimental design and data obtained from pretests and posttests in two public…

  18. The expert's guide to mealtime interventions - A Delphi method survey.

    Science.gov (United States)

    Conchin, Simone; Carey, Sharon

    2017-09-27

    Prevalence of malnutrition and a myriad of barriers to adequate oral diet in hospitalised patients warrants further investment to improve the patient mealtime experience. The aim of this study was to explore barriers and enablers to implementing effective mealtime interventions and develop a process framework to guide clinicians and researchers in the area. Potential experts in the area of hospital mealtime intervention were identified as having published in this field of work within the Australasian setting. Further information was sought by email and telephone communication on professional background; research experience; interest; and capacity to participate. Recruited participants were surveyed using a modified Delphi method to establish opinion and experience in the area of mealtime interventions. Results were collated and content was coded using a thematic analysis approach by the primary researcher and two additional reviewers. Thirty-two Australian authors in the area of mealtime interventions within the hospital environment were identified from publication. Twenty-one participants were able to be contacted and nineteen of these consented to enrol in the study. Participants included those from a dietetic (n = 14), nursing (n = 4) and medical (n = 1) background. Participants were deemed to have expert knowledge if they had significant involvement in the published research and demonstrated a deep level of understanding of hospital mealtime interventions. All participants provided key insights into barriers to oral intake in the hospital environment and suggestions for interventions to address these barriers. From the survey, an eight step framework to guide mealtime interventions was developed. Hospital mealtime interventions are complex processes. Interventions should be implemented after careful consideration of the local context and baseline data; and tailored to address barriers. Roles and responsibilities for nutrition care should be clear and

  19. Gamblers Anonymous as a Recovery Pathway: A Scoping Review.

    Science.gov (United States)

    Schuler, Andrée; Ferentzy, Peter; Turner, Nigel E; Skinner, Wayne; McIsaac, Kathryn E; Ziegler, Carolyn P; Matheson, Flora I

    2016-12-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligibility and extracted relevant data from eligible articles. Three reviewers independently assessed the methodological quality of the included studies using the Mixed Methods Appraisal Tool. We identified 17 studies in 25 publications that were eligible for inclusion. Most studies were conducted in the United States, were cross-sectional in design, and involved both male and female adult participants. Results indicate that the evidence for the effectiveness of GA either as a control condition or in conjunction with formal treatment or medication is inconsistent. An emphasis on patience, using the Serenity Prayer as a way to gain acceptance of financial matters and reality, and absolute assertion of identity as a "compulsive gambler" were identified as important aspects of GA's recovery culture. There is a need for large-scale randomized controlled trials to determine GA's effectiveness, as well as research exploring the mechanisms through which GA works, barriers to GA as a recovery approach, and the status of women in the fellowship.

  20. Criminal offenses in gamblers anonymous and hospital treated pathological gamblers.

    Science.gov (United States)

    Blaszczynski, A P; McConaghy, N

    1994-06-01

    The purpose of this study was to compare the nature and prevalence of gambling and non-gambling related offenses in samples of pathological gamblers seeking behavioural treatment from a hospital-based program and those attending Gamblers Anonymous. A semi-structured interview schedule obtaining demographic data and details of the nature, frequency, and consequent legal action of criminal offenses committed was administered to 152 consecutive hospital treated pathological gamblers, and 154 Gamblers Anonymous attendees who volunteered to participate in the study. Of the total sample, 59% admitted a gambling-related offense, and 23% to a conviction. There was no difference in the proportion of hospital treated and Gamblers Anonymous subjects who offended. The most common gambling-related offenses were larceny, embezzlement and misappropriation. Gamblers committed a median of ten offenses over an average ten year period of pathological gambling with a median value of $ A 300(1) per offense. The median value for each non-gambling-related offense was $ A 130. Except for the significantly older mean age of Gamblers Anonymous subjects, hospital treated gamblers did not differ from Gamblers Anonymous attenders on relevant demographic features or parameters of gambling behaviour. Findings were interpreted to suggest a possible causal link between pathological gambling and the commission of non-violent property offenses.

  1. The Effects of Perceived Anonymity on Altruistic Punishment

    Directory of Open Access Journals (Sweden)

    Jared Piazza

    2008-07-01

    Full Text Available Previous studies investigating altruistic punishment have confounded the effects of two independent variables: information transmission (or breach of privacy and personal identification (or breach of anonymity. Here we report findings from a brief study in which participants were asked to respond to a social norm violation (i.e., an anonymous actor had behaved selfishly in an economic game by deciding whether to sacrifice their own endowment to punish this person. A third of the participants were told that their economic decisions would be made known to another player but could not be identified (privacy breach condition, whereas another third were informed that their decision as well as their names would be made known (anonymity breach condition. (The decisions of control participants were completely anonymous and private. Participants also justified their economic decisions and reported their emotional experiences. The results were participants punished most in the privacy and anonymity breach conditions and least in the control condition. These findings have implications for existing evolutionary accounts of altruistic punishment.

  2. Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation

    Directory of Open Access Journals (Sweden)

    Jia Yaoqi

    2016-10-01

    Full Text Available The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai, which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users. In this work, we show that the current designs of peer-assisted CDNs expose clients to privacy-invasive attacks, enabling one client to infer the set of browsed resources of another client. To alleviate this, we propose an anonymous peer-assisted CDN (APAC, which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request and responder anonymity (i.e., hiding who responds to the request for peers. APAC can be a web service, compatible with current browsers and requiring no client-side changes. Our anonymity analysis shows that our APAC design can preserve a higher level of anonymity than state-of-the-art peer-assisted CDNs. In addition, our evaluation demonstrates that APAC can achieve desired performance gains.

  3. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  4. Alternative methods for developing external travel survey data.

    Science.gov (United States)

    2010-10-01

    The Texas Department of Transportation (TxDOT) has a comprehensive on-going travel survey : program that supports the travel demand models being developed for transportation planning efforts in urban : areas throughout Texas. One component of the sur...

  5. Use of anonymous Web communities and websites by medical consumers in Japan to research drug information.

    Science.gov (United States)

    Kishimoto, Keiko; Fukushima, Noriko

    2011-01-01

    In this study, we investigated the status of researching drug information online, and the type of Internet user who uses anonymous Web communities and websites. A Web-based cross-sectional survey of 10875 male and female Internet users aged 16 and over was conducted in March 2010. Of 10282 analyzed respondents, excluding medical professionals, about 47% reported that they had previously searched the Internet for drug information and had used online resources ranging from drug information search engines and pharmaceutical industry websites to social networking sites and Twitter. Respondents who had researched drug information online (n=4861) were analyzed by two multivariable logistic regressions. In Model 1, the use of anonymous websites associated with age (OR, 0.778; 95% CI, 0.742-0.816), referring to the reputation and the narrative of other Internet users on shopping (OR, 1.640; 95% CI, 1.450-1.855), taking a prescription drug (OR, 0.806; 95% CI, 0.705-0.922), and frequent consulting with non-professionals about medical care and health (OR, 1.613; 95% CI, 1.396-1.865). In Model 2, use of only anonymous websites was associated with age (OR, 0.753; 95% CI, 0.705-0.805), using the Internet daily (OR, 0.611; 95% CI, 0.462-0.808), taking a prescription drug (OR, 0.614; 95% CI, 0.505-0.747), and experience a side effect (OR, 0.526; 95% CI, 0.421-0.658). The analysis revealed the profiles of Internet users who researched drug information on social media sites where the information providers are anonymous and do not necessarily have adequate knowledge of medicine and online information literacy.

  6. Enabling genomic-phenomic association discovery without sacrificing anonymity.

    Directory of Open Access Journals (Sweden)

    Raymond D Heatherly

    Full Text Available Health information technologies facilitate the collection of massive quantities of patient-level data. A growing body of research demonstrates that such information can support novel, large-scale biomedical investigations at a fraction of the cost of traditional prospective studies. While healthcare organizations are being encouraged to share these data in a de-identified form, there is hesitation over concerns that it will allow corresponding patients to be re-identified. Currently proposed technologies to anonymize clinical data may make unrealistic assumptions with respect to the capabilities of a recipient to ascertain a patients identity. We show that more pragmatic assumptions enable the design of anonymization algorithms that permit the dissemination of detailed clinical profiles with provable guarantees of protection. We demonstrate this strategy with a dataset of over one million medical records and show that 192 genotype-phenotype associations can be discovered with fidelity equivalent to non-anonymized clinical data.

  7. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  8. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  9. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  10. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    LENUS (Irish Health Repository)

    Sills, Eric Scott

    2010-08-11

    Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  11. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000 model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks.

  12. Review of Estimation Methods for Landline and Cell Phone Surveys

    Science.gov (United States)

    Arcos, Antonio; del Mar Rueda, María; Trujillo, Manuel; Molina, David

    2015-01-01

    The rapid proliferation of cell phone use and the accompanying decline in landline service in recent years have resulted in substantial potential for coverage bias in landline random-digit-dial telephone surveys, which has led to the implementation of dual-frame designs that incorporate both landline and cell phone samples. Consequently,…

  13. A Socratic Method for Surveying Students' Readiness to Study Evolution

    Science.gov (United States)

    Stansfield, William D.

    2013-01-01

    Before beginning a series of presentations on evolution, it would be prudent to survey the general level of students' understanding of prerequisite basic concepts of reproduction, heredity, ontology, and phenotypic diversity so that teachers can avoid devoting time to well-known subjects of general knowledge and can spend more time on subjects…

  14. Social distance and anonymity modulate fairness consideration: An ERP study

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  15. Policy-Aware Sender Anonymity in Location-Based Services

    Science.gov (United States)

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  16. Does spousal participation in Gamblers Anonymous benefit compulsive gamblers?

    Science.gov (United States)

    Johnson, E E; Nora, R M

    1992-12-01

    Extent of gambling-free periods was compared for 90 compulsive gamblers, 44 with spouses who participated in Gamblers Anonymous and 46 with spouses who did not. Although the results were in the direction of a beneficial effect of spousal participation, the relationship was statistically nonsignificant.

  17. Gamblers anonymous and cognitive-behavioral therapies for pathological gamblers.

    Science.gov (United States)

    Petry, Nancy M

    2005-01-01

    Numerous types of treatments for pathological gambling have been described, but two of the most common are Gamblers Anonymous (GA) and cognitive-behavioral therapy. This paper describes some outcome data associated with the two approaches. It also reviews evidence suggesting that a combined intervention may enhance therapy engagement and reduce relapse rates.

  18. Anonymous living liver donation: donor profiles and outcomes.

    Science.gov (United States)

    Reichman, T W; Fox, A; Adcock, L; Wright, L; Abbey, S E; Levy, G; Grant, D R

    2010-09-01

    There are no published series of the assessment process, profiles and outcomes of anonymous, directed or nondirected live liver donation. The outcomes of 29 consecutive potential anonymous liver donors at our center were assessed. We used our standard live liver assessment process, augmented with the following additional acceptance criteria: a logical rationale for donation, a history of social altruism, strong social supports and a willingness to maintain confidentiality of patient information. Seventeen potential donors were rejected and 12 donors were ultimately accepted (six male, six female). All donors were strongly motivated by a desire and sense of responsibility to help others. Four donations were directed toward recipients who undertook media appeals. The donor operations included five left lateral segmentectomies and seven right hepatectomies. The overall donor morbidity was 40% with one patient having a transient Clavien level 3 complication (a pneumothorax). All donors are currently well. None expressed regret about their decision to donate, and all volunteered the opinion that donation had improved their lives. The standard live liver donor assessment process plus our additional requirements appears to provide a robust assessment process for the selection of anonymous live liver donors. Acceptance of anonymous donors enlarges the donor liver pool. © 2010 The Authors Journal compilation © 2010 The American Society of Transplantation and the American Society of Transplant Surgeons.

  19. Who Goes There? Staying Anonymous on the Internet

    Science.gov (United States)

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  20. Simplifying Itai-Rodeh leaderelection for anonymous rings

    NARCIS (Netherlands)

    W.J. Fokkink (Wan); J. Pang

    2004-01-01

    textabstractWe present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh. In contrast to the Itai-Rodeh algorithm, our algorithms are finite-state. So they can be analyzed using explicit state space

  1. Simplifying Itai-Rodeh Leader Election for Anonymous Rings

    NARCIS (Netherlands)

    Fokkink, W.J.; Pang, J.

    2005-01-01

    We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [A. Itai and M. Rodeh. Symmetry breaking in distributive networks. In Proc. FOCS'81, pp. 150-158. IEEE Computer Society, 1981]. In contrast to the

  2. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria

  3. Forming Circle Formations of Anonymous Mobile Agents With Order Preservation

    NARCIS (Netherlands)

    Wang, Chen; Xie, Guangming; Cao, Ming

    2013-01-01

    We propose distributed control laws for a group of anonymous mobile agents to form desired circle formations when the agents move in the one-dimensional space of a circle. The agents are modeled by kinematic points. They share the common knowledge of the orientation of the circle, but are oblivious

  4. An Analysis of College Students' Anonymous Questions about Human Sexuality.

    Science.gov (United States)

    Valois, Robert F.; Waring, Kathryn A.

    1991-01-01

    Study analyzed the frequency and type of questions about sexuality submitted anonymously by college students in health education courses over five semesters. The most common categories were sexual arousal/response; general anatomy/physiology; contraception; dating/relationships; pregnancy/fertility; and sexually transmitted diseases. The appendix…

  5. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually

  6. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  7. Survey of Machine Learning Methods for Database Security

    Science.gov (United States)

    Kamra, Ashish; Ber, Elisa

    Application of machine learning techniques to database security is an emerging area of research. In this chapter, we present a survey of various approaches that use machine learning/data mining techniques to enhance the traditional security mechanisms of databases. There are two key database security areas in which these techniques have found applications, namely, detection of SQL Injection attacks and anomaly detection for defending against insider threats. Apart from the research prototypes and tools, various third-party commercial products are also available that provide database activity monitoring solutions by profiling database users and applications. We present a survey of such products. We end the chapter with a primer on mechanisms for responding to database anomalies.

  8. A method to automate the radiological survey process

    International Nuclear Information System (INIS)

    Berven, B.A.; Blair, M.S.

    1987-01-01

    This document describes the USRAD system, a hardware/software ranging and data transmission system, that provides real-time position data and combines it with other portable instrument measurements. Live display of position data and onsite data reduction, presentation, and formatting for reports and automatic transfer into databases are among the unusual attributes of USRADS. Approximately 25% of any survey-to-survey report process is dedicated to data recording and formatting, which is eliminated by USRADS. Cost savings are realized by the elimination of manual transcription of instrument readout in the field and clerical formatting of data in the office. Increased data reliability is realized by ensuring complete survey coverage of an area in the field, by elimination of mathematical errors in conversion of instrument readout to unit concentration, and by elimination of errors associated with transcribing data from the field into report format. The USRAD system can be adapted to measure other types of pollutants or physical/chemical/geological/biological conditions in which portable instrumentation exists. 2 refs., 2 figs

  9. Survey of industry methods for producing highly reliable software

    International Nuclear Information System (INIS)

    Lawrence, J.D.; Persons, W.L.

    1994-11-01

    The Nuclear Reactor Regulation Office of the US Nuclear Regulatory Commission is charged with assessing the safety of new instrument and control designs for nuclear power plants which may use computer-based reactor protection systems. Lawrence Livermore National Laboratory has evaluated the latest techniques in software reliability for measurement, estimation, error detection, and prediction that can be used during the software life cycle as a means of risk assessment for reactor protection systems. One aspect of this task has been a survey of the software industry to collect information to help identify the design factors used to improve the reliability and safety of software. The intent was to discover what practices really work in industry and what design factors are used by industry to achieve highly reliable software. The results of the survey are documented in this report. Three companies participated in the survey: Computer Sciences Corporation, International Business Machines (Federal Systems Company), and TRW. Discussions were also held with NASA Software Engineering Lab/University of Maryland/CSC, and the AIAA Software Reliability Project

  10. Survey on radionuclide producing using cyclotron method in Malaysia

    International Nuclear Information System (INIS)

    Mohd Fadli Mohammad Noh

    2008-01-01

    This research discuss about basic design and systems of medical cyclotron that Malaysia currently have, its applications in radionuclide production and upcoming technologies of cyclotron. Surveys have been carried out on cyclotron facilities at Hospital Putrajaya and Wijaya International Medical Center, WIMC as well as reactor facility at Malaysia Nuclear Agency. The sources in this research also involves on-line and library searches. Information obtained are recorded, categorized, synthesized and discussed. systems of cyclotron of Hospital Putrajaya are further discussed in details. Based from the surveys carried out, it is found out that cyclotron facilities both in Hospital Putrajaya and WIMC only produce ( 18 F)FDG with radioactivity of 18 F produced in 2007 are 16479 mCi and 92546 mCi respectively. Survey also revealed that radioisotope production at Nuclear Malaysia has had its operation been ceased. A new radiopharmaceutical, namely CHOL is suggested to be synthesized by both facilities as a new PET tracer. Latest developments concerning technologies of cyclotron as well as other accelerators such as laser for future medical accelerator, prospect of boron neutron capture and the potential of hadron therapy in Malaysia are discussed here. Radioisotope production in Malaysia is expected to keep booming in future due to increase in usage of PET techniques and the construction of more compact, easy to handle and less costly cyclotrons. (author)

  11. Geochemical drainage surveys for uranium: sampling and analytical methods based on trial surveys in Pennsylvania

    International Nuclear Information System (INIS)

    Rose, A.W.; Keith, M.L.; Suhr, N.H.

    1976-01-01

    Geochemical surveys near sandstone-type uranium prospects in northeastern and north-central Pennsylvania show that the deposits can be detected by carefully planned stream sediment surveys, but not by stream water surveys. Stream waters at single sites changed in U content by x10 to 50 during the 18 months of our studies, and even near known prospects, contain less than 0.2 ppB U most of the time. Uranium extractable from stream sediment by acetic acid--H 2 O 2 provides useful contrast between mineralized and nonmineralized drainages of a square mile or less; total U in sediment does not. High organic material results in increased U content of sediments and must be corrected. Changes in U content of sediment with time reach a maximum of x3 and appear to be of short duration. A sediment of about 200 mi 2 near Jim Thorpe detects anomalies extending over several square miles near known occurrences and a second anomaly about two miles northeast of Penn Haven Jct. A similar survey in Lycoming-Sullivan Counties shows anomalous zones near known prospects of the Beaver Lake area and northwest of Muncy Creek. As, Mn, Pb, and V are enriched in the mineralized zones, and perhaps in surrounding halo zones, but do not appear to be pathfinder elements useful for reconnaissance exploration

  12. Measuring fertility through mobile‒phone based household surveys: Methods, data quality, and lessons learned from PMA2020 surveys

    Directory of Open Access Journals (Sweden)

    Yoonjoung Choi

    2018-05-01

    Full Text Available Background: PMA2020 is a survey platform with resident enumerators using mobile phones. Instead of collecting full birth history, total fertility rates (TFR have been measured with a limited number of questions on recent births. Employing new approaches provides opportunities to test and advance survey methods. Objective: This study aims to assess the quality of fertility data in PMA2020 surveys, focusing on bias introduced from the questionnaire and completeness and distribution of birth month and year, and to estimate TFR adjusted for identified data quality issues. Methods: To assess underestimation from the questionnaire, we simulated births that would be counted using the PMA2020 questionnaires compared to births identified from full birth history. We analyzed the latest Demographic and Health Surveys in ten countries where PMA2020 surveys have been implemented. We assessed the level of reporting completeness for birth month and year and heaping of birth month, analyzing 39 PMA2020 surveys. Finally, TFR were calculated and adjusted for biases introduced from the questionnaire and heaping in birth month. Results: Simple questions introduced minor bias from undercounting multiple births, which was expected and correctable. Meanwhile, incomplete reporting of birth month was relatively high, and the default value of January in data collection software systematically moved births with missing months out of the reference period. On average across the 39 surveys, TFR increased by 1.6Š and 2.4Š, adjusted for undercounted multiple births and heaping on January, respectively. Contribution: This study emphasizes the importance of enumerator training and provides critical insight in software programming in surveys using mobile technologies.

  13. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  14. A Survey of Functional Behavior Assessment Methods Used by Behavior Analysts in Practice

    Science.gov (United States)

    Oliver, Anthony C.; Pratt, Leigh A.; Normand, Matthew P.

    2015-01-01

    To gather information about the functional behavior assessment (FBA) methods behavior analysts use in practice, we sent a web-based survey to 12,431 behavior analysts certified by the Behavior Analyst Certification Board. Ultimately, 724 surveys were returned, with the results suggesting that most respondents regularly use FBA methods, especially…

  15. Survey of Technetium Analytical Production Methods Supporting Hanford Nuclear Materials Processing

    International Nuclear Information System (INIS)

    TROYER, G.L.

    1999-01-01

    This document provides a historical survey of analytical methods used for measuring 99 Tc in nuclear fuel reprocessing materials and wastes at Hanford. Method challenges including special sludge matrices tested are discussed. Special problems and recommendations are presented

  16. An historical survey of computational methods in optimal control.

    Science.gov (United States)

    Polak, E.

    1973-01-01

    Review of some of the salient theoretical developments in the specific area of optimal control algorithms. The first algorithms for optimal control were aimed at unconstrained problems and were derived by using first- and second-variation methods of the calculus of variations. These methods have subsequently been recognized as gradient, Newton-Raphson, or Gauss-Newton methods in function space. A much more recent addition to the arsenal of unconstrained optimal control algorithms are several variations of conjugate-gradient methods. At first, constrained optimal control problems could only be solved by exterior penalty function methods. Later algorithms specifically designed for constrained problems have appeared. Among these are methods for solving the unconstrained linear quadratic regulator problem, as well as certain constrained minimum-time and minimum-energy problems. Differential-dynamic programming was developed from dynamic programming considerations. The conditional-gradient method, the gradient-projection method, and a couple of feasible directions methods were obtained as extensions or adaptations of related algorithms for finite-dimensional problems. Finally, the so-called epsilon-methods combine the Ritz method with penalty function techniques.

  17. An Efficient Big Data Anonymization Algorithm Based on Chaos and Perturbation Techniques

    Directory of Open Access Journals (Sweden)

    Can Eyupoglu

    2018-05-01

    Full Text Available The topic of big data has attracted increasing interest in recent years. The emergence of big data leads to new difficulties in terms of protection models used for data privacy, which is of necessity for sharing and processing data. Protecting individuals’ sensitive information while maintaining the usability of the data set published is the most important challenge in privacy preserving. In this regard, data anonymization methods are utilized in order to protect data against identity disclosure and linking attacks. In this study, a novel data anonymization algorithm based on chaos and perturbation has been proposed for privacy and utility preserving in big data. The performance of the proposed algorithm is evaluated in terms of Kullback–Leibler divergence, probabilistic anonymity, classification accuracy, F-measure and execution time. The experimental results have shown that the proposed algorithm is efficient and performs better in terms of Kullback–Leibler divergence, classification accuracy and F-measure compared to most of the existing algorithms using the same data set. Resulting from applying chaos to perturb data, such successful algorithm is promising to be used in privacy preserving data mining and data publishing.

  18. Multivariable control in nuclear power stations -survey of design methods

    International Nuclear Information System (INIS)

    Mcmorran, P.D.

    1979-12-01

    The development of larger nuclear generating stations increases the importance of dynamic interaction between controllers, because each control action may affect several plant outputs. Multivariable control provides the techniques to design controllers which perform well under these conditions. This report is a foundation for further work on the application of multivariable control in AECL. It covers the requirements of control and the fundamental mathematics used, then reviews the most important linear methods, based on both state-space and frequency-response concepts. State-space methods are derived from analysis of the system differential equations, while frequency-response methods use the input-output transfer function. State-space methods covered include linear-quadratic optimal control, pole shifting, and the theory of state observers and estimators. Frequency-response methods include the inverse Nyquist array method, and classical non-interactive techniques. Transfer-function methods are particularly emphasized since they can incorporate ill-defined design criteria. The underlying concepts, and the application strengths and weaknesses of each design method are presented. A review of significant applications is also given. It is concluded that the inverse Nyquist array method, a frequency-response technique based on inverse transfer-function matrices, is preferred for the design of multivariable controllers for nuclear power plants. This method may be supplemented by information obtained from a modal analysis of the plant model. (auth)

  19. Comparing two survey methods for estimating maternal and perinatal mortality in rural Cambodia.

    Science.gov (United States)

    Chandy, Hoeuy; Heng, Yang Van; Samol, Ha; Husum, Hans

    2008-03-01

    We need solid estimates of maternal mortality rates (MMR) to monitor the impact of maternal care programs. Cambodian health authorities and WHO report the MMR in Cambodia at 450 per 100,000 live births. The figure is drawn from surveys where information is obtained by interviewing respondents about the survival of all their adult sisters (sisterhood method). The estimate is statistically imprecise, 95% confidence intervals ranging from 260 to 620/100,000. The MMR estimate is also uncertain due to under-reporting; where 80-90% of women deliver at home maternal fatalities may go undetected especially where mortality is highest, in remote rural areas. The aim of this study was to attain more reliable MMR estimates by using survey methods other than the sisterhood method prior to an intervention targeting obstetric rural emergencies. The study was carried out in rural Northwestern Cambodia where access to health services is poor and poverty, endemic diseases, and land mines are endemic. Two survey methods were applied in two separate sectors: a community-based survey gathering data from public sources and a household survey gathering data direct from primary sources. There was no statistically significant difference between the two survey results for maternal deaths, both types of survey reported mortality rates around the public figure. The household survey reported a significantly higher perinatal mortality rate as compared to the community-based survey, 8.6% versus 5.0%. Also the household survey gave qualitative data important for a better understanding of the many problems faced by mothers giving birth in the remote villages. There are detection failures in both surveys; the failure rate may be as high as 30-40%. PRINCIPLE CONCLUSION: Both survey methods are inaccurate, therefore inappropriate for evaluation of short-term changes of mortality rates. Surveys based on primary informants yield qualitative information about mothers' hardships important for the design

  20. The swift UVOT stars survey. I. Methods and test clusters

    Energy Technology Data Exchange (ETDEWEB)

    Siegel, Michael H.; Porterfield, Blair L.; Linevsky, Jacquelyn S.; Bond, Howard E.; Hoversten, Erik A.; Berrier, Joshua L.; Gronwall, Caryl A. [Department of Astronomy and Astrophysics, The Pennsylvania State University, 525 Davey Laboratory, University Park, PA 16802 (United States); Holland, Stephen T. [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States); Breeveld, Alice A. [Mullard Space Science Laboratory, University College London, Holmbury St. Mary, Dorking, Surrey RH5 6NT (United Kingdom); Brown, Peter J., E-mail: siegel@astro.psu.edu, E-mail: blp14@psu.edu, E-mail: heb11@psu.edu, E-mail: caryl@astro.psu.edu, E-mail: sholland@stsci.edu, E-mail: aab@mssl.ucl.ac.uk, E-mail: grbpeter@yahoo.com [George P. and Cynthia Woods Mitchell Institute for Fundamental Physics and Astronomy, Texas A. and M. University, Department of Physics and Astronomy, 4242 TAMU, College Station, TX 77843 (United States)

    2014-12-01

    We describe the motivations and background of a large survey of nearby stellar populations using the Ultraviolet Optical Telescope (UVOT) on board the Swift Gamma-Ray Burst Mission. UVOT, with its wide field, near-UV sensitivity, and 2.″3 spatial resolution, is uniquely suited to studying nearby stellar populations and providing insight into the near-UV properties of hot stars and the contribution of those stars to the integrated light of more distant stellar populations. We review the state of UV stellar photometry, outline the survey, and address problems specific to wide- and crowded-field UVOT photometry. We present color–magnitude diagrams of the nearby open clusters M67, NGC 188, and NGC 2539, and the globular cluster M79. We demonstrate that UVOT can easily discern the young- and intermediate-age main sequences, blue stragglers, and hot white dwarfs, producing results consistent with previous studies. We also find that it characterizes the blue horizontal branch of M79 and easily identifies a known post-asymptotic giant branch star.

  1. The swift UVOT stars survey. I. Methods and test clusters

    International Nuclear Information System (INIS)

    Siegel, Michael H.; Porterfield, Blair L.; Linevsky, Jacquelyn S.; Bond, Howard E.; Hoversten, Erik A.; Berrier, Joshua L.; Gronwall, Caryl A.; Holland, Stephen T.; Breeveld, Alice A.; Brown, Peter J.

    2014-01-01

    We describe the motivations and background of a large survey of nearby stellar populations using the Ultraviolet Optical Telescope (UVOT) on board the Swift Gamma-Ray Burst Mission. UVOT, with its wide field, near-UV sensitivity, and 2.″3 spatial resolution, is uniquely suited to studying nearby stellar populations and providing insight into the near-UV properties of hot stars and the contribution of those stars to the integrated light of more distant stellar populations. We review the state of UV stellar photometry, outline the survey, and address problems specific to wide- and crowded-field UVOT photometry. We present color–magnitude diagrams of the nearby open clusters M67, NGC 188, and NGC 2539, and the globular cluster M79. We demonstrate that UVOT can easily discern the young- and intermediate-age main sequences, blue stragglers, and hot white dwarfs, producing results consistent with previous studies. We also find that it characterizes the blue horizontal branch of M79 and easily identifies a known post-asymptotic giant branch star.

  2. SLD Identification: A Survey of Methods Used by School Psychologists

    Science.gov (United States)

    Watson, Michael D., Jr.; Simon, Joan B.; Nunnley, Lenora

    2016-01-01

    IDEA 2004 opened the door for states, and in some cases districts, to choose among three different methods for identifying children with Specific Learning Disabilities (SLDs). This study provides an in-depth look at SLD identification practices in a state that allows school psychologists to use any of the three methods. Eighty-four school…

  3. A Survey of Restraint Methods for the Safe Transport of Children in Ground Ambulances.

    Science.gov (United States)

    Woods, Rashida H; Shah, Manish; Doughty, Cara; Gilchrest, Anthony

    2018-03-01

    The National Highway Traffic Safety Administration (NHTSA) released draft recommendations in 2010 on the safe transport of children in ground ambulances. The purpose of this study was to assess awareness of these guidelines among emergency medical service (EMS) agencies and to identify implementation barriers. We conducted a cross-sectional, anonymous online survey of 911-responding, ground transport EMS agencies in Texas. Demographics, modes of transport based on case scenarios, and barriers to implementation were assessed. Of 62 eligible EMS agencies that took the survey, 35.7% were aware of the NHTSA guidelines, 62.5% agreed they would improve safety, and 41.1% planned to implement them. Seventy-five percent of EMS agencies used the ideal or acceptable alternative to transport children requiring continuous monitoring, and 69.5% chose ideal or acceptable alternatives for children requiring spinal immobilization. The ideal or acceptable alternative was not chosen for children who were not injured or ill (93.2%), ill or injured but not requiring continuous monitoring (53.3%), and situations when multiple patients required transport (57.6%). The main requirements for implementation were provider education, ambulance interior modifications, new guidelines in the EMS agency, and purchase of new equipment. Few EMS agencies are aware of the NHTSA guidelines on safe transport of children in ground ambulances. Although most agencies appropriately transport children who require monitoring, interventions, or spinal immobilization, they use inappropriate means to transport children in situations with multiple patients, lack of injury or illness, or lack of need for monitoring.

  4. Surveying immigrants without sampling frames - evaluating the success of alternative field methods.

    Science.gov (United States)

    Reichel, David; Morales, Laura

    2017-01-01

    This paper evaluates the sampling methods of an international survey, the Immigrant Citizens Survey, which aimed at surveying immigrants from outside the European Union (EU) in 15 cities in seven EU countries. In five countries, no sample frame was available for the target population. Consequently, alternative ways to obtain a representative sample had to be found. In three countries 'location sampling' was employed, while in two countries traditional methods were used with adaptations to reach the target population. The paper assesses the main methodological challenges of carrying out a survey among a group of immigrants for whom no sampling frame exists. The samples of the survey in these five countries are compared to results of official statistics in order to assess the accuracy of the samples obtained through the different sampling methods. It can be shown that alternative sampling methods can provide meaningful results in terms of core demographic characteristics although some estimates differ to some extent from the census results.

  5. Calculation of radiation exposure in diagnostic radiology. Method and surveys

    International Nuclear Information System (INIS)

    Duvauferrier, R.; Ramee, A.; Ezzeldin, K.; Guibert, J.L.

    1984-01-01

    A computerized method for evaluating the radiation exposure of the main target organs during various diagnostic radiologic procedures is described. This technique was used for educational purposes: study of exposure variations according to the technical modalities of a given procedure, and study of exposure variations according to various technical protocols (IVU, EGD barium study, etc.). This method was also used for studying exposure of patients during hospitalization in the Rennes Regional Hospital Center (France) in 1982, according to departments (urology, neurology, etc.). This method and results of these three studies are discussed [fr

  6. Anonymous voting for multi-dimensional CV quantum system

    International Nuclear Information System (INIS)

    Shi Rong-Hua; Xiao Yi; Shi Jin-Jing; Guo Ying; Lee, Moon-Ho

    2016-01-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. (paper)

  7. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  8. Survey of methods for secure connection to the internet

    Science.gov (United States)

    Matsui, Shouichi

    1994-04-01

    This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet.

  9. Gamblers Anonymous as a Recovery Pathway: A Scoping Review

    OpenAIRE

    Schuler, Andr?e; Ferentzy, Peter; Turner, Nigel E.; Skinner, Wayne; McIsaac, Kathryn E.; Ziegler, Carolyn P.; Matheson, Flora I.

    2016-01-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligi...

  10. Taxonomy for and Analysis of Anonymous Communications Networks

    Science.gov (United States)

    2009-03-01

    degradation, preservation and elimination in cyberspace to enhance the security of information assets. This includes discovery/obfuscation of...a means of communication and information dissemination, concerns about Internet privacy and security are escalating. In 1980’s, Chaum began work...variety of different systems including the T9000 Transputer AFIT/DCS/ENG/09-08 - 123 - [Bar95] and a secure ecommerce system [HaC02]. Anonymity

  11. Informed Traders as Liquidity Providers: Anonymity, Liquidity and Price Formation

    OpenAIRE

    Barbara Rindi

    2008-01-01

    The tendency to introduce anonymity into financial markets apparently runs counter to the theory supporting transparency. This paper studies the impact of pre-trade transparency on liquidity in a market where risk-averse traders accommodate the liquidity demand of noise traders. When some risk-averse investors become informed, an adverse selection problem ensues for the others, making them reluctant to supply liquidity. Hence the disclosure of traders' identities improves liquidity by mitigat...

  12. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    Science.gov (United States)

    2014-02-01

    attack is also similar to those that rely on misbehaving receivers and optimistic ACKs to bypass flow control protocol mechanisms [40]–[42]. In particular...thank the anonymous reviewers for their feedback and suggestions, Damon McCoy for discussions about misbehaving receivers and authenticated signals...ping-o-death. html. [40] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Con- gestion Control with a Misbehaving Receiver,” ACM SIGCOMM CCR

  13. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  14. All or Nothing: The False Promise of Anonymity

    Directory of Open Access Journals (Sweden)

    Neil Walker

    2017-05-01

    Full Text Available In early 2016, the International Committee of Medical Journal Editors (ICMJE proposed that responsible sharing of de-identified individual-level data be required for clinical trials published in their affiliated journals. There would be a delay in implementing this policy to allow for the necessary informed consents to work their way through ethical review. Meanwhile, some researchers and policy makers have conflated the notions of de-identification and anonymity. The former is a process that seeks to mitigate disclosure risk though careful application of rules and statistical analysis, while the latter is an absolute state. The consequence of confusing the process and the state is profound. Extensions to the ICMJE proposal based on the presumed anonymity of data include: sharing unconsented data; sharing data without managing access, as Open Data; and proposals to sell data. This essay aims to show that anonymity (the state cannot be guaranteed by de-identification (the process, and so these extensions to the ICMJE proposal should be rejected on governance grounds, if no other. This is not as negative a position as it might seem, as other disciplines have been aware of these limitations and concomitant responsibilities for many years. The essay concludes with an example from social science of managed access strategies that could be adopted by the medical field.

  15. Enhancing physicians' use of Alcoholics Anonymous: Internet-based training.

    Science.gov (United States)

    Sellers, Brealyn; Galanter, Marc; Dermatis, Helen; Nachbar, Martin

    2005-01-01

    Alcoholics Anonymous is not yet fully employed by the medical community as a means to enhance patient outcome. The purpose of this study was to evaluate visitors' use of an Internet course on Alcoholics Anonymous, and to compare how various disciplines learned about, gained access to and participated in the course. Demographic information was collected from 414 visitors to the course. 64% of the 414 respondents received their last educational degree within the last 10 years, and had an interest in the topic of addiction prior to their accessing the site. 294 (71%) of those who accessed the course completed it, and those who accessed it learned about it from various sources other than print advertisement in professional journals. Within the 230 physician respondents, 143 (62%) were psychiatrists, 82 (78%) of whom learned about the Internet course via professional journal. Given the need for further training among physicians in the use of Alcoholics Anonymous, the Internet can be utilized to make information available to a large number of people. Because it allows the user to access information outside the traditional means, the barriers to its use are minimal, and it has the potential to effectively convey useful clinical information.

  16. General survey of detection methods for irradiation foods

    International Nuclear Information System (INIS)

    Yang, J. S.

    1997-01-01

    The development of detection techniques is needed, in order for regulating authorities to determine whether or not a particular food sample has been irradiated, and label it accordingly so that a consumer's free choice can be exercised. The chemical and physical changes brought about in foods by practical doses of irradiation are very small, and therefore very sensitive methods are required. A number of promising approaches have been developed and evaluated. These include chemical, physical and biological methods ranging from the very simple to highly sophisticated techniques. (author)

  17. The Canadian Human Activity Pattern Survey: report of methods and population surveyed.

    Science.gov (United States)

    Leech, J A; Wilby, K; McMullen, E; Laporte, K

    1996-01-01

    The assessment of health risk due to environmental contaminants depends upon accurate estimates of the distribution of population exposures. Exposure assessment, in turn, requires information on the time people spend in micro-environments and their activities during periods of exposure. This paper describes preliminary results including study methodology and population sampled in a large Canadian survey of time-activity patterns. A 24-hour diary recall survey was performed in 2381 households (representing a 65% response rate) to describe in detail the timing, location and activity pattern of one household member (the adult or child with the next birthday). Four cities (Toronto, Vancouver, Edmonton and Saint John, NB) and their suburbs were sampled by random-digit dialling over a nine-month period in 1994/1995. Supplemental questionnaires inquiring about sociodemographic information, house and household characteristics and potential exposure to toxins in the air and water were also administered. In general, the results show that respondents spend the majority of their time indoors (88.6%) with smaller proportions of time outdoors (6.1%) and in vehicles (5.3%). Children under the age of 12 spend more time both indoors and outdoors and less time in transit than do adults. The data from this study will be used to define more accurately the exposure of Canadians to a variety of toxins in exposure assessment models and to improve upon the accuracy of risk assessment for a variety of acute and chronic health effects known or suspected to be related to environmental exposures.

  18. A Survey of Procedural Methods for Terrain Modelling

    NARCIS (Netherlands)

    Smelik, R.M.; Kraker, J.K. de; Groenewegen, S.A.; Tutenel, T.; Bidarra, R.

    2009-01-01

    Procedural methods are a promising but underused alternative to manual content creation. Commonly heard drawbacks are the randomness of and the lack of control over the output and the absence of integrated solutions, although more recent publications increasingly address these issues. This paper

  19. Survey of waste disposal methods in Awka metropolis | Bill | Journal ...

    African Journals Online (AJOL)

    Waste disposal methods commonly practiced in Awka metropolis, Anambra state were investigated from August to October, 2013. Data was analyzed with both descriptive statistics of frequency and percentages, and alternate hypotheses were tested using Analysis of Variance (ANOVA) at a significance level of 0.05.

  20. GPS surveying method applied to terminal area navigation flight experiments

    Energy Technology Data Exchange (ETDEWEB)

    Murata, M; Shingu, H; Satsushima, K; Tsuji, T; Ishikawa, K; Miyazawa, Y; Uchida, T [National Aerospace Laboratory, Tokyo (Japan)

    1993-03-01

    With an objective of evaluating accuracy of new landing and navigation systems such as microwave landing guidance system and global positioning satellite (GPS) system, flight experiments are being carried out using experimental aircraft. This aircraft mounts a GPS and evaluates its accuracy by comparing the standard orbits spotted by a Kalman filter from the laser tracing data on the aircraft with the navigation results. The GPS outputs position and speed information from an earth-centered-earth-fixed system called the World Geodetic System, 1984 (WGS84). However, in order to compare the navigation results with output from a reference orbit sensor or other navigation sensor, it is necessary to structure a high-precision reference coordinates system based on the WGS84. A method that applies the GPS phase interference measurement for this problem was proposed, and used actually in analyzing a flight experiment data. As referred to a case of the method having been applied to evaluating an independent navigation accuracy, the method was verified sufficiently effective and reliable not only in navigation method analysis, but also in the aspect of navigational operations. 12 refs., 10 figs., 5 tabs.

  1. Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal K-Anonymity Dataset

    Science.gov (United States)

    Liu, Zhao; Zhu, Yunhong; Wu, Chenxue

    2016-01-01

    Spatial-temporal k-anonymity has become a mainstream approach among techniques for protection of users’ privacy in location-based services (LBS) applications, and has been applied to several variants such as LBS snapshot queries and continuous queries. Analyzing large-scale spatial-temporal anonymity sets may benefit several LBS applications. In this paper, we propose two location prediction methods based on transition probability matrices constructing from sequential rules for spatial-temporal k-anonymity dataset. First, we define single-step sequential rules mined from sequential spatial-temporal k-anonymity datasets generated from continuous LBS queries for multiple users. We then construct transition probability matrices from mined single-step sequential rules, and normalize the transition probabilities in the transition matrices. Next, we regard a mobility model for an LBS requester as a stationary stochastic process and compute the n-step transition probability matrices by raising the normalized transition probability matrices to the power n. Furthermore, we propose two location prediction methods: rough prediction and accurate prediction. The former achieves the probabilities of arriving at target locations along simple paths those include only current locations, target locations and transition steps. By iteratively combining the probabilities for simple paths with n steps and the probabilities for detailed paths with n-1 steps, the latter method calculates transition probabilities for detailed paths with n steps from current locations to target locations. Finally, we conduct extensive experiments, and correctness and flexibility of our proposed algorithm have been verified. PMID:27508502

  2. Energy-Based Acoustic Source Localization Methods: A Survey

    Directory of Open Access Journals (Sweden)

    Wei Meng

    2017-02-01

    Full Text Available Energy-based source localization is an important problem in wireless sensor networks (WSNs, which has been studied actively in the literature. Numerous localization algorithms, e.g., maximum likelihood estimation (MLE and nonlinear-least-squares (NLS methods, have been reported. In the literature, there are relevant review papers for localization in WSNs, e.g., for distance-based localization. However, not much work related to energy-based source localization is covered in the existing review papers. Energy-based methods are proposed and specially designed for a WSN due to its limited sensor capabilities. This paper aims to give a comprehensive review of these different algorithms for energy-based single and multiple source localization problems, their merits and demerits and to point out possible future research directions.

  3. Biometric antispoofing methods: A survey in face recognition

    OpenAIRE

    Galbally Herrero, Javier; Marcel, Sébastien; Fiérrez, Julián

    2014-01-01

    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. J. Galbally, S. Marcel and J. Fierrez, "Biometric Antispoofing Methods", IEEE Access, vol.2, pp. 1530-1552, Dec. 2014 In re...

  4. Survey of analytical methods for environmental monitoring of krypton-85

    International Nuclear Information System (INIS)

    Jaquish, R.E.; Moghissi, A.A.

    1973-01-01

    Numerous methods have been developed for measuring krypton-85 in air as krypton ultimately accumulates in air once it is released into the environment. However, krypton-85 can be present in other media such as natural gas from wells stimulated with nuclear devices or in water when krypton-85 is used for aeration studies. Methods for the measurement of ambient levels of krypton-85 require a concentration of krypton from a large air sample of one m 3 or more. If elevated levels are to be measured, carrier krypton may be used provided the contamination of atmospheric krypton with krypton-85 does not interfere with the measurement. In certain cases, such as in the vicinity of nuclear fuel processing plants, direct measurement techniques may be used. A variety of techniques are employed for krypton-85 counting. At low levels, internal gas counting or organic scintillation is used to measure the beta emission of this radionuclide. At higher levels the gamma emission of krypton-85 may be measured using scintillation or solid state gamma spectroscopic methods. Techniques for collection of the sample, concentration of krypton, and radioactivity measurement of krypton-85 are discussed and various processes are critically evaluated and compared

  5. Current-drive theory I: survey of methods

    International Nuclear Information System (INIS)

    Fisch, N.J.

    1986-01-01

    A variety of methods may be employed to drive toroidal electric current in a plasma torus. The most promising scheme is the injection of radiofrequency waves into the torus to push electrons or ions. The pushing mechanism can be either the direct conversion of wave to particle momentum, or a more subtle effect involving the alteration by waves of interparticle collisions. Alternatively, current can be produced through the injection of neutral beams, the reflection of plasma radiation, or the injection of frozen pellets. The efficacy of these schemes, in a variety of regimes, will be assessed. 9 refs

  6. Traveling the Silk Road: A Measurement of a Large Anonymous Online Marketplace

    Science.gov (United States)

    2012-11-28

    Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather...analysis of Silk Road, an anonymous, international on- line marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We...anonymity, Silk Road needs to also preserve payment anonymity. To that effect, Silk Road only supports Bitcoin (BTC, [30]) as a trading currency

  7. Survey of Cyber Security Methods for the Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yoo Rark; Lee, Jae Cheol; Choi, Young Soo; Hong, Seok Boong [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2009-10-15

    Cyber security includes the method of protecting information, computer programs, and other computer system assets. Hardware security, which is the security of computer assets and capital equipment, refers to computer location, access control, fire protection, and storage procedures. Such measures as badges, electronic identification keys, alarm systems, and physical barriers at entries are used for this purpose. Software security entails the protection of software assets such as Application Programs, the Operating System, and the Data Base Management System and stored information. Special user numbers and passwords are typically used to prevent unauthorized access to software and data. In addition to security for hardware and software, good internal control also requires that measures be taken to prevent loss or accidental destruction of data. Cyber attacks create substantial threats to large enterprises, including federal systems and digital I and C of a NPP (Nuclear Power Plant) is one of them. The cyber security policy for the digital I and C network of the NPP has been established for years by KINS, but its scope is very broad and conceptual. We will propose a cyber security method based on cryptography and authentication that is developed for the digital I and C network of the NPP.

  8. Survey of Cyber Security Methods for the Nuclear Power Plants

    International Nuclear Information System (INIS)

    Choi, Yoo Rark; Lee, Jae Cheol; Choi, Young Soo; Hong, Seok Boong

    2009-01-01

    Cyber security includes the method of protecting information, computer programs, and other computer system assets. Hardware security, which is the security of computer assets and capital equipment, refers to computer location, access control, fire protection, and storage procedures. Such measures as badges, electronic identification keys, alarm systems, and physical barriers at entries are used for this purpose. Software security entails the protection of software assets such as Application Programs, the Operating System, and the Data Base Management System and stored information. Special user numbers and passwords are typically used to prevent unauthorized access to software and data. In addition to security for hardware and software, good internal control also requires that measures be taken to prevent loss or accidental destruction of data. Cyber attacks create substantial threats to large enterprises, including federal systems and digital I and C of a NPP (Nuclear Power Plant) is one of them. The cyber security policy for the digital I and C network of the NPP has been established for years by KINS, but its scope is very broad and conceptual. We will propose a cyber security method based on cryptography and authentication that is developed for the digital I and C network of the NPP

  9. A survey on critical factors influencing new advertisement methods

    Directory of Open Access Journals (Sweden)

    Naser Azad

    2013-02-01

    Full Text Available Soft drink beverages are important part of many people’s foods and many prefer soft drink to water when they have dinner. Therefore, this business model can be considered as the longest lasting sector for many years and there has been not much change in these products. However, new methods of advertisement play important role for increasing market share. In this paper, we study the impact of new methods of advertisement in product development. The proposed study of this paper designs a questionnaire for one of Iranian soft drink producers, which consisted of 274 questions in Likert scale and uses factor analysis (FA to analyze the results. The study selects 250 people who live in city of Tehran, Iran and Cronbach alpha has been calculated as 0.88, which is well above the minimum desirable limit. According to our results, there were six important factors impacting in product development, including modern advertisement techniques, emotional impact, strategy of market leadership, pricing strategy, product life chain and supply entity. The most important factor loading in these six components include impact of social values, persuading unaware and uninformed customers, ability to monopolizing in production, improving pricing techniques, product life cycle and negative impact of high advertisement.

  10. Mobile phones are a viable option for surveying young Australian women: a comparison of two telephone survey methods

    Directory of Open Access Journals (Sweden)

    Liu Bette

    2011-11-01

    Full Text Available Abstract Background Households with fixed-line telephones have decreased while mobile (cell phone ownership has increased. We therefore sought to examine the feasibility of recruiting young women for a national health survey through random digit dialling mobile phones. Methods Two samples of women aged 18 to 39 years were surveyed by random digit dialling fixed and mobile numbers. We compared participation rates and responses to a questionnaire between women surveyed by each contact method. Results After dialling 5,390 fixed-lines and 3,697 mobile numbers, 140 and 128 women were recruited respectively. Among women contacted and found to be eligible, participation rates were 74% for fixed-lines and 88% for mobiles. Taking into account calls to numbers where eligibility was unknown (e.g. unanswered calls the estimated response rates were 54% and 45% respectively. Of women contacted by fixed-line, 97% reported having a mobile while 61% of those contacted by mobile reported having a fixed-line at home. After adjusting for age, there were no significant differences between mobile-only and fixed-line responders with respect to education, residence, and various health behaviours; however compared to those with fixed-lines, mobile-only women were more likely to identify as Indigenous (OR 4.99, 95%CI 1.52-16.34 and less likely to live at home with their parents (OR 0.09, 95%CI 0.03-0.29. Conclusions Random digit dialling mobile phones to conduct a health survey in young Australian women is feasible, gives a comparable response rate and a more representative sample than dialling fixed-lines only. Telephone surveys of young women should include mobile dialling.

  11. Photogrammetric methods in surveying environmental state and changes

    Energy Technology Data Exchange (ETDEWEB)

    Sitek, Z.

    1980-01-01

    Various types of maps prepared by means of photogrammetry are reviewed. So-called orthophotomaps, showing air, land or water pollution and their sources on the background of ground, vegetation and various surface objects are characterized. Methods of interpreting orthophotomaps showing environmental effects of mining coal, coal combustion and other pollution sources are reviewed. Role of statistical data in evaluation of pollution and the general environmental impact of mines or power stations are discussed. A comprehensive system of describing the condition of the natural environment, observed environmental changes, and forecasting environmental effects of coal mining, combustion and other pollution sources is described. It is called environmental monitoring. Role of photogrammetry in environmental monitoring is stressed: air photography, satellite data, and infrared photography of vegetation. (7 refs.) (In Polish)

  12. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    Science.gov (United States)

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  13. College Students' Experiences with Anonymous Social Media: Implications for Campus Racial Climate

    Science.gov (United States)

    Armstrong, Amanda; Thomas, Jaymi; Smith, Madeline

    2017-01-01

    The purpose of this exploratory case study was to gather undergraduate students' perceptions of anonymous racist messages found on Yik Yak and to better understand the implications of anonymous platforms on campus racial climate. Given the limited research surrounding students' use of anonymous social media platforms, as well as the predominant…

  14. Social Media and Higher Education: The Problem of Anonymous Electronic Threats to the Campus Community

    Science.gov (United States)

    Reynolds, Cristin Lee; Platt, R. Eric; Malone Schaffer, Lenore; Foster, Holly

    2017-01-01

    This case is for use in graduate courses pertaining to student affairs and higher education administration. It presents challenges higher education professionals face concerning anonymous social media, and specifically how threats made through anonymous social media platforms such as Yik Yak affect the entire university community. The anonymity of…

  15. Proper survey methods for research of aquatic plant ecology and management

    Science.gov (United States)

    Proper survey methods are essential for objective, quantitative assessment of the distribution and abundance of aquatic plants as part of research and demonstration efforts. For research, the use of the appropriate method is an essential part of the scientific method, to ensure that the experimenta...

  16. A survey about methods dedicated to epistasis detection

    Directory of Open Access Journals (Sweden)

    Clément eNiel

    2015-09-01

    Full Text Available During the past decade, findings of genome-wide association studies (GWAS improved our knowledge and understanding of disease genetics. To date, thousands of SNPs have been associated to diseases and other complex traits. Statistical analysis typically looks for association between a phenotype and a SNP taken individually via single-locus tests. However, geneticists admit this is an oversimplified approach to tackle the complexity of underlying biological mechanisms. Interaction between SNPs, namely epistasis, must be considered. Unfortunately, epistasis detection gives rise to analytic challenges since analyzing every SNP combination is at present impractical at a genome-wide scale. In this review, we will present the main strategies recently proposed to detect epistatic interactions, along with their operating principle. Some of these methods are exhaustive, such as multifactor dimensionality reduction, likelihood ratio-based tests or receiver operating characteristic curve analysis; some are non-exhaustive, such as machine learning techniques (random forests, Bayesian networks or combinatorial optimization approaches (ant colony optimization, computational evolution system.

  17. De-anonymizing Genomic Databases Using Phenotypic Traits

    Directory of Open Access Journals (Sweden)

    Humbert Mathias

    2015-06-01

    Full Text Available People increasingly have their genomes sequenced and some of them share their genomic data online. They do so for various purposes, including to find relatives and to help advance genomic research. An individual’s genome carries very sensitive, private information such as its owner’s susceptibility to diseases, which could be used for discrimination. Therefore, genomic databases are often anonymized. However, an individual’s genotype is also linked to visible phenotypic traits, such as eye or hair color, which can be used to re-identify users in anonymized public genomic databases, thus raising severe privacy issues. For instance, an adversary can identify a target’s genome using known her phenotypic traits and subsequently infer her susceptibility to Alzheimer’s disease. In this paper, we quantify, based on various phenotypic traits, the extent of this threat in several scenarios by implementing de-anonymization attacks on a genomic database of OpenSNP users sequenced by 23andMe. Our experimental results show that the proportion of correct matches reaches 23% with a supervised approach in a database of 50 participants. Our approach outperforms the baseline by a factor of four, in terms of the proportion of correct matches, in most scenarios. We also evaluate the adversary’s ability to predict individuals’ predisposition to Alzheimer’s disease, and we observe that the inference error can be halved compared to the baseline. We also analyze the effect of the number of known phenotypic traits on the success rate of the attack. As progress is made in genomic research, especially for genotype-phenotype associations, the threat presented in this paper will become more serious.

  18. National Survey on Access, Use and Promotion of Rational Use of Medicines (PNAUM: household survey component methods

    Directory of Open Access Journals (Sweden)

    Sotero Serrate Mengue

    Full Text Available ABSTRACT OBJECTIVE To describe methodological aspects of the household survey National Survey on Access, Use and Promotion of Rational Use of Medicines (PNAUM related to sampling design and implementation, the actual obtained sample, instruments and fieldwork. METHODS A cross-sectional, population-based study with probability sampling in three stages of the population living in households located in Brazilian urban areas. Fieldwork was carried out between September 2013 and February 2014. The data collection instrument included questions related to: information about households, residents and respondents; chronic diseases and medicines used; use of health services; acute diseases and events treated with drugs; use of contraceptives; use of pharmacy services; behaviors that may affect drug use; package inserts and packaging; lifestyle and health insurance. RESULTS In total, 41,433 interviews were carried out in 20,404 households and 576 urban clusters corresponding to 586 census tracts distributed in the five Brazilian regions, according to eight domains defined by age and gender. CONCLUSIONS The results of the survey may be used as a baseline for future studies aiming to assess the impact of government action on drug access and use. For local studies using a compatible method, PNAUM may serve as a reference point to evaluate variations in space and population. With a comprehensive evaluation of drug-related aspects, PNAUM is a major source of data for a variety of analyses to be carried out both at academic and government level.

  19. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  20. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    Digital tools of research dissemination make scholarly publications accessible to the public at large through simple search engines. As a result, the users that we study, interview, and cite may be at risk of exposure to unwelcome types of scrutiny and scholars must grapple with challenges...... to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...

  1. THINKING ABOUT REFERRALS TO ALCOHOLICS ANONYMOUS IN RELATIONAL WAYS

    Directory of Open Access Journals (Sweden)

    Christopher K. Bitten

    2010-02-01

    Full Text Available This article examines Alcoholics Anonymous (AA as a relational therapy, seen through the lens of the relational needs described by Richard Erskine. AA as a resource may be underemployed by therapists who do not realize its potential to heal the relational damage suffered and inflicted by their alcoholic clients. Common misconceptions about AA are addressed, and ways for therapists to facilitate successful referrals of clients to AA are described. The author posits that there is a synergistic benefit in combining integrative psychotherapy with the client’s involvement in AA.

  2. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  3. Combining Internet-Based and Postal Survey Methods in a Survey among Gynecologists: Results of a Randomized Trial.

    Science.gov (United States)

    Ernst, Sinja Alexandra; Brand, Tilman; Lhachimi, Stefan K; Zeeb, Hajo

    2018-04-01

    To assess whether a combination of Internet-based and postal survey methods (mixed-mode) compared to postal-only survey methods (postal-only) leads to improved response rates in a physician survey, and to compare the cost implications of the different recruitment strategies. All primary care gynecologists in Bremen and Lower Saxony, Germany, were invited to participate in a cross-sectional survey from January to July 2014. The sample was divided into two strata (A; B) depending on availability of an email address. Within each stratum, potential participants were randomly assigned to mixed-mode or postal-only group. In Stratum A, the mixed-mode group had a lower response rate compared to the postal-only group (12.5 vs. 20.2 percent; RR = 0.61, 95 percent CI: 0.44-0.87). In stratum B, no significant differences were found (15.6 vs. 16.2 percent; RR = 0.95, 95 percent CI: 0.62-1.44). Total costs (in €) per valid questionnaire returned (Stratum A: 399.72 vs. 248.85; Stratum B: 496.37 vs. 455.15) and per percentage point of response (Stratum A: 1,379.02 vs. 861.02; Stratum B 1,116.82 vs. 1,024.09) were higher, whereas variable costs were lower in mixed-mode compared to the respective postal-only groups (Stratum A cost ratio: 0.47, Stratum B cost ratio: 0.71). In this study, primary care gynecologists were more likely to participate by traditional postal-only than by mixed-mode survey methods that first offered an Internet option. However, the lower response rate for the mixed-mode method may be partly due to the older age structure of the responding gynecologists. Variable costs per returned questionnaire were substantially lower in mixed-mode groups and indicate the potential for cost savings if the sample population is sufficiently large. © Health Research and Educational Trust.

  4. A Delphi Method Analysis to Create an Emergency Medicine Educational Patient Satisfaction Survey

    Directory of Open Access Journals (Sweden)

    Kory S. London

    2015-12-01

    Full Text Available Introduction: Feedback on patient satisfaction (PS as a means to monitor and improve performance in patient communication is lacking in residency training. A physician’s promotion, compensation and job satisfaction may be impacted by his individual PS scores, once he is in practice. Many communication and satisfaction surveys exist but none focus on the emergency department setting for educational purposes. The goal of this project was to create an emergency medicine-based educational PS survey with strong evidence for content validity. Methods: We used the Delphi Method (DM to obtain expert opinion via an iterative process of surveying. Questions were mined from four PS surveys as well as from group suggestion. The DM analysis determined the structure, content and appropriate use of the tool. The group used four-point Likert-type scales and Lynn’s criteria for content validity to determine relevant questions from the stated goals. Results: Twelve recruited experts participated in a series of seven surveys to achieve consensus. A 10-question, single-page survey with an additional page of qualitative questions and demographic questions was selected. Thirty one questions were judged to be relevant from an original 48-question list. Of these, the final 10 questions were chosen. Response rates for individual survey items was 99.5%. Conclusion: The DM produced a consensus survey with content validity evidence. Future work will be needed to obtain evidence for response process, internal structure and construct validity.

  5. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Science.gov (United States)

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-01-01

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298

  6. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Directory of Open Access Journals (Sweden)

    Abdul Majeed

    2017-05-01

    Full Text Available Personally identifiable information (PII affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.

  7. [Essential procedure and key methods for survey of traditional knowledge related to Chinese materia medica resources].

    Science.gov (United States)

    Cheng, Gong; Huang, Lu-qi; Xue, Da-yuan; Zhang, Xiao-bo

    2014-12-01

    The survey of traditional knowledge related to Chinese materia medica resources is the important component and one of the innovative aspects of the fourth national survey of the Chinese materia medica resources. China has rich traditional knowledge of traditional Chinese medicine (TCM) and the comprehensive investigation of TCM traditional knowledge aims to promote conservation and sustainable use of Chinese materia medica resources. Building upon the field work of pilot investigations, this paper introduces the essential procedures and key methods for conducting the survey of traditional knowledge related to Chinese materia medica resources. The essential procedures are as follows. First is the preparation phrase. It is important to review all relevant literature and provide training to the survey teams so that they have clear understanding of the concept of traditional knowledge and master key survey methods. Second is the field investigation phrase. When conducting field investigations, survey teams should identify the traditional knowledge holders by using the 'snowball method', record the traditional knowledge after obtaining prior informed concerned from the traditional knowledge holders. Researchers should fill out the survey forms provided by the Technical Specification of the Fourth National Survey of Chinese Materia Medica Resources. Researchers should pay particular attention to the scope of traditional knowledge and the method of inheriting the knowledge, which are the key information for traditional knowledge holders and potential users to reach mutual agreed terms to achieve benefit sharing. Third is the data compilation and analysis phrase. Researchers should try to compile and edit the TCM traditional knowledge in accordance with intellectual property rights requirements so that the information collected through the national survey can serve as the basic data for the TCM traditional knowledge database. The key methods of the survey include regional

  8. Effects of Cultural Orientation on Attitude Toward Anonymity in E-Collaboration

    Science.gov (United States)

    Zhong, Yingqin; Liu, Na; Lim, John

    The important role of attitude in the acceptance and diffusion of technology has been widely acknowledged. Greater research efforts have been called for examining the relationships between cultural variables and attitude toward technology. In this regard, this study investigates the impact of cultural orientation (focusing on an individual's degree of collectivism) on attitude toward e-collaboration technology. A theoretical model is proposed and subsequently tested using a questionnaire survey involving 236 data points. Self-reliance, competitive success, and group work orientation are found as significant indicators reflecting an individual's degree of collectivism, which in turn influences willingness to participate, evaluation of collaborative effort, and preference for anonymity feature. Subsequently, the three variables are found to affect perceptions about decision quality, enjoyment, uncertainty, and pressure in e-collaboration.

  9. A Comparison of Web-Based and Paper-Based Survey Methods: Testing Assumptions of Survey Mode and Response Cost

    Science.gov (United States)

    Greenlaw, Corey; Brown-Welty, Sharon

    2009-01-01

    Web-based surveys have become more prevalent in areas such as evaluation, research, and marketing research to name a few. The proliferation of these online surveys raises the question, how do response rates compare with traditional surveys and at what cost? This research explored response rates and costs for Web-based surveys, paper surveys, and…

  10. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  11. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  12. Optimal power flow: a bibliographic survey II. Non-deterministic and hybrid methods

    Energy Technology Data Exchange (ETDEWEB)

    Frank, Stephen [Colorado School of Mines, Department of Electrical Engineering and Computer Science, Golden, CO (United States); Steponavice, Ingrida [Univ. of Jyvaskyla, Dept. of Mathematical Information Technology, Agora (Finland); Rebennack, Steffen [Colorado School of Mines, Division of Economics and Business, Golden, CO (United States)

    2012-09-15

    Over the past half-century, optimal power flow (OPF) has become one of the most important and widely studied nonlinear optimization problems. In general, OPF seeks to optimize the operation of electric power generation, transmission, and distribution networks subject to system constraints and control limits. Within this framework, however, there is an extremely wide variety of OPF formulations and solution methods. Moreover, the nature of OPF continues to evolve due to modern electricity markets and renewable resource integration. In this two-part survey, we survey both the classical and recent OPF literature in order to provide a sound context for the state of the art in OPF formulation and solution methods. The survey contributes a comprehensive discussion of specific optimization techniques that have been applied to OPF, with an emphasis on the advantages, disadvantages, and computational characteristics of each. Part I of the survey provides an introduction and surveys the deterministic optimization methods that have been applied to OPF. Part II of the survey (this article) examines the recent trend towards stochastic, or non-deterministic, search techniques and hybrid methods for OPF. (orig.)

  13. Optimal power flow: a bibliographic survey I. Formulations and deterministic methods

    Energy Technology Data Exchange (ETDEWEB)

    Frank, Stephen [Colorado School of Mines, Department of Electrical Engineering and Computer Science, Golden, CO (United States); Steponavice, Ingrida [University of Jyvaskyla, Department of Mathematical Information Technology, Agora (Finland); Rebennack, Steffen [Colorado School of Mines, Division of Economics and Business, Golden, CO (United States)

    2012-09-15

    Over the past half-century, optimal power flow (OPF) has become one of the most important and widely studied nonlinear optimization problems. In general, OPF seeks to optimize the operation of electric power generation, transmission, and distribution networks subject to system constraints and control limits. Within this framework, however, there is an extremely wide variety of OPF formulations and solution methods. Moreover, the nature of OPF continues to evolve due to modern electricity markets and renewable resource integration. In this two-part survey, we survey both the classical and recent OPF literature in order to provide a sound context for the state of the art in OPF formulation and solution methods. The survey contributes a comprehensive discussion of specific optimization techniques that have been applied to OPF, with an emphasis on the advantages, disadvantages, and computational characteristics of each. Part I of the survey (this article) provides an introduction and surveys the deterministic optimization methods that have been applied to OPF. Part II of the survey examines the recent trend towards stochastic, or non-deterministic, search techniques and hybrid methods for OPF. (orig.)

  14. Preparing investigation of methods for surveying tree seed demands among farmers in Tanzania

    DEFF Research Database (Denmark)

    Aabæk, Anders

    Insufficient seed supplies is often a major constraint on tree planting activities in developing countries. A central problem is to assess the actual demands for tree seed. This report shall, as a part of a PhD-study, prepare an investigation of different methods for surveying tree seed demands...... and preferences among private farmers in Tanzania. A framework for investigating seed demand and supply is outlined. The role of a national tree seed project in a seed supply sector is discussed and data requirements for strategy on seed procurement and tree improvement are outlined. Earlier surveys on seed...... demand pattern in Tanzania, Uganda and Nicaragua are discussed and a choice of strategy for an extensive survey of seed demand and supply in Tanzania is made. Different data collection methods and tools, e.g. quantitative and qualitative surveys and rapid rural appraisals, are described in detail...

  15. Methods of surveying and monitoring marine radioactivity. Report of an ad hoc panel of experts

    International Nuclear Information System (INIS)

    1965-01-01

    An effective control of the radioactive pollution of the sea depends partly on the availability of adequate technical methods for surveying and monitoring the sea and marine products with regard to the presence of radioactive substances. The purpose of this manual is to offer such methods.

  16. The Danish Youth Survey 2002

    DEFF Research Database (Denmark)

    Helweg-Larsen, Karin; Sundaram, Vanita; Curtis, Tine

    2004-01-01

    OBJECTIVES: To explore ethical, legal and practical issues related to conducting a youth survey in Denmark on sexual experiences before the age of 15 and thereby achieve reliable data on child sexual abuse. STUDY DESIGN AND METHODS: The relevant authorities were consulted on possible legal...... of the accompanying offer of counselling. CONCLUSION: An anonymous youth survey based on computer-assisted self-interview (CASI) would increase the validity of youth surveys on child sexual abuse to which no ethical or legal objections were found....... obtaining parental consent. The Central Scientific Ethical Committee had no objections. In a number of fields, Danish legislation accords 15-to-18-year-olds the competence to make independent decisions regarding their personal circumstances, and the UN Convention of Children's Rights states that a child...

  17. Preference for anonymity in sperm donation for artificial insemination: an experience from low-resource settings in Nigeria

    Science.gov (United States)

    Ezugwu, Euzebus Chinonye; Eleje, George U; Iyoke, Chukwuemeka A; Mba, Sunday G; Nnaji, Henry C; Enechukwu, Chukwunonso I; Nkwo, Peter O

    2018-01-01

    Objective Anonymous sperm donation is a common practice in Nigeria with its associated legal and ethical challenges. This study aimed to investigate infertile couples’ opinions about issues of sperm donor anonymity and to determine factors that might influence their preferences. Methods A cross-sectional, multicentered, questionnaire-based study was conducted among infertile couples attending infertility clinics in three tertiary hospitals in the south-eastern region of Nigeria over a period of 6 months. Results A total of 450 infertile couples were recruited consecutively from the three study centers. However, 450 females and 352 males (total=802) participated in the study. The level of awareness of artificial insemination using donor sperm for the management of male infertility among the respondents was 69.2%, while its acceptability rate was 62.7%. The majority of the respondents indicated their preference for secrecy and anonymity in sperm donation. Approximately 84% of the respondents indicated that the mode of conception should never be disclosed to the donor-conceived child, and ~92% of them indicated that the identity of the sperm donor should never be revealed to the donor-conceived child. Fear of adverse effect of such disclosure on the child and the possible of rejection of the father in order to seek for the donor were the major reasons for their preference for anonymity. Conclusion Although it has been argued that every child has a right to know their genetic parents, the reasons proffered by the respondents for their preference for anonymity cannot be totally ignored. Establishing a regulatory body and enacting laws that will address both the ethical and legal issues associated with gamete donation in the developing world will go a long way in promoting openness and honest communication with donor-conceived children. PMID:29670338

  18. Comparing two survey methods of measuring health-related indicators: Lot Quality Assurance Sampling and Demographic Health Surveys.

    Science.gov (United States)

    Anoke, Sarah C; Mwai, Paul; Jeffery, Caroline; Valadez, Joseph J; Pagano, Marcello

    2015-12-01

    Two common methods used to measure indicators for health programme monitoring and evaluation are the demographic and health surveys (DHS) and lot quality assurance sampling (LQAS); each one has different strengths. We report on both methods when utilised in comparable situations. We compared 24 indicators in south-west Uganda, where data for prevalence estimations were collected independently for the two methods in 2011 (LQAS: n = 8876; DHS: n = 1200). Data were stratified (e.g. gender and age) resulting in 37 comparisons. We used a two-sample two-sided Z-test of proportions to compare both methods. The average difference between LQAS and DHS for 37 estimates was 0.062 (SD = 0.093; median = 0.039). The average difference among the 21 failures to reject equality of proportions was 0.010 (SD = 0.041; median = 0.009); among the 16 rejections, it was 0.130 (SD = 0.010, median = 0.118). Seven of the 16 rejections exhibited absolute differences of 0.10 and 0.20 (mean = 0.261, SD = 0.083). There is 75.7% agreement across the two surveys. Both methods yield regional results, but only LQAS provides information at less granular levels (e.g. the district level) where managerial action is taken. The cost advantage and localisation make LQAS feasible to conduct more frequently, and provides the possibility for real-time health outcomes monitoring. © 2015 The Authors. Tropical Medicine & International Health Published by John Wiley & Sons Ltd.

  19. Google Street View as an alternative method to car surveys in large-scale vegetation assessments.

    Science.gov (United States)

    Deus, Ernesto; Silva, Joaquim S; Catry, Filipe X; Rocha, Miguel; Moreira, Francisco

    2015-10-01

    Car surveys (CS) are a common method for assessing the distribution of alien invasive plants. Google Street View (GSV), a free-access web technology where users may experience a virtual travel along roads, has been suggested as a cost-effective alternative to car surveys. We tested if we could replicate the results from a countrywide survey conducted by car in Portugal using GSV as a remote sensing tool, aiming at assessing the distribution of Eucalyptus globulus Labill. wildlings on roadsides adjacent to eucalypt stands. Georeferenced points gathered along CS were used to create road transects visible as lines overlapping the road in GSV environment, allowing surveying the same sampling areas using both methods. This paper presents the results of the comparison between the two methods. Both methods produced similar models of plant abundance, selecting the same explanatory variables, in the same hierarchical order of importance and depicting a similar influence on plant abundance. Even though the GSV model had a lower performance and the GSV survey detected fewer plants, additional variables collected exclusively with GSV improved model performance and provided a new insight into additional factors influencing plant abundance. The survey using GSV required ca. 9 % of the funds and 62 % of the time needed to accomplish the CS. We conclude that GSV may be a cost-effective alternative to CS. We discuss some advantages and limitations of GSV as a survey method. We forecast that GSV may become a widespread tool in road ecology, particularly in large-scale vegetation assessments.

  20. Comparing Coral Reef Survey Methods. Unesco Reports in Marine Science No. 21 Report of a Regional Unesco/UNEP Workshop on Coral Reef Survey Management and Assessment Methods in Asia and the Pacific (Phuket, Thailand, December 13-17, 1982).

    Science.gov (United States)

    United Nations Educational, Scientific, and Cultural Organization, Paris (France). Div. of Marine Sciences.

    This report includes nine papers prepared for a workshop on coral reef survey management and assessment methods in Asia and the Pacific. The papers are: "A Contrast in Methodologies between Surveying and Testing" (Charles Birkeland); "Coral Reef Survey Methods in the Andaman Sea" (Hansa Chansang); "A Review of Coral Reef…

  1. The Jamaica asthma and allergies national prevalence survey: rationale and methods

    Directory of Open Access Journals (Sweden)

    Edwards Nancy C

    2010-04-01

    Full Text Available Abstract Background Asthma is a significant public health problem in the Caribbean. Prevalence surveys using standardized measures of asthma provide valid prevalence estimates to facilitate regional and international comparisons and monitoring of trends. This paper describes methods used in the Jamaica Asthma and Allergies National Prevalence Survey, challenges associated with this survey and strategies used to overcome these challenges. Methods/Design An island wide, cross-sectional, community-based survey of asthma, asthma symptoms and allergies was done among adults and children using the European Community Respiratory Health Survey Questionnaire for adults and the International Study of Asthma and Allergies in Children. Stratified multi-stage cluster sampling was used to select 2, 163 adults aged 18 years and older and 2, 017 children aged 2-17 years for the survey. The Kish selection table was used to select one adult and one child per household. Data analysis accounted for sampling design and prevalence estimates were weighted to produce national estimates. Discussion The Jamaica Asthma and Allergies National Prevalence Survey is the first population- based survey in the Caribbean to determine the prevalence of asthma and allergies both in adults and children using standardized methods. With response rates exceeding 80% in both groups, this approach facilitated cost-effective gathering of high quality asthma prevalence data that will facilitate international and regional comparison and monitoring of asthma prevalence trends. Another unique feature of this study was the partnership with the Ministry of Health in Jamaica, which ensured the collection of data relevant for decision-making to facilitate the uptake of research evidence. The findings of this study will provide important data on the burden of asthma and allergies in Jamaica and contribute to evidence-informed planning of comprehensive asthma management and education programs.

  2. An UAV scheduling and planning method for post-disaster survey

    Science.gov (United States)

    Li, G. Q.; Zhou, X. G.; Yin, J.; Xiao, Q. Y.

    2014-11-01

    Annually, the extreme climate and special geological environments lead to frequent natural disasters, e.g., earthquakes, floods, etc. The disasters often bring serious casualties and enormous economic losses. Post-disaster surveying is very important for disaster relief and assessment. As the Unmanned Aerial Vehicle (UAV) remote sensing with the advantage of high efficiency, high precision, high flexibility, and low cost, it is widely used in emergency surveying in recent years. As the UAVs used in emergency surveying cannot stop and wait for the happening of the disaster, when the disaster happens the UAVs usually are working at everywhere. In order to improve the emergency surveying efficiency, it is needed to track the UAVs and assign the emergency surveying task for each selected UAV. Therefore, a UAV tracking and scheduling method for post-disaster survey is presented in this paper. In this method, Global Positioning System (GPS), and GSM network are used to track the UAVs; an emergency tracking UAV information database is built in advance by registration, the database at least includes the following information, e.g., the ID of the UAVs, the communication number of the UAVs; when catastrophe happens, the real time location of all UAVs in the database will be gotten using emergency tracking method at first, then the traffic cost time for all UAVs to the disaster region will be calculated based on the UAVs' the real time location and the road network using the nearest services analysis algorithm; the disaster region is subdivided to several emergency surveying regions based on DEM, area, and the population distribution map; the emergency surveying regions are assigned to the appropriated UAV according to shortest cost time rule. The UAVs tracking and scheduling prototype is implemented using SQLServer2008, ArcEnginge 10.1 SDK, Visual Studio 2010 C#, Android, SMS Modem, and Google Maps API.

  3. AN EFFECTIVE MULTI-CLUSTERING ANONYMIZATION APPROACH USING DISCRETE COMPONENT TASK FOR NON-BINARY HIGH DIMENSIONAL DATA SPACES

    Directory of Open Access Journals (Sweden)

    L.V. Arun Shalin

    2016-01-01

    Full Text Available Clustering is a process of grouping elements together, designed in such a way that the elements assigned to similar data points in a cluster are more comparable to each other than the remaining data points in a cluster. During clustering certain difficulties related when dealing with high dimensional data are ubiquitous and abundant. Works concentrated using anonymization method for high dimensional data spaces failed to address the problem related to dimensionality reduction during the inclusion of non-binary databases. In this work we study methods for dimensionality reduction for non-binary database. By analyzing the behavior of dimensionality reduction for non-binary database, results in performance improvement with the help of tag based feature. An effective multi-clustering anonymization approach called Discrete Component Task Specific Multi-Clustering (DCTSM is presented for dimensionality reduction on non-binary database. To start with we present the analysis of attribute in the non-binary database and cluster projection identifies the sparseness degree of dimensions. Additionally with the quantum distribution on multi-cluster dimension, the solution for relevancy of attribute and redundancy on non-binary data spaces is provided resulting in performance improvement on the basis of tag based feature. Multi-clustering tag based feature reduction extracts individual features and are correspondingly replaced by the equivalent feature clusters (i.e. tag clusters. During training, the DCTSM approach uses multi-clusters instead of individual tag features and then during decoding individual features is replaced by corresponding multi-clusters. To measure the effectiveness of the method, experiments are conducted on existing anonymization method for high dimensional data spaces and compared with the DCTSM approach using Statlog German Credit Data Set. Improved tag feature extraction and minimum error rate compared to conventional anonymization

  4. Protecting whistle-blowers: Anonymity on the internet

    International Nuclear Information System (INIS)

    Guinnessy, P.

    1997-01-01

    Even though strict legislation exists in many countries, it appears that the next few years should be a golden opportunity for groups to successfully monitor and publish the activity of the nuclear states, and human right violations through use of the Internet. The reasons for this are: 1. The Internet is becoming widespread even in repressive regimes; 2. Software is available to either hide messages from others or hide the mailers account; 3. Information from sites in other countries can be easily obtained to be read inside repressive regimes from the Internet. In this regard It is suggested the Pugwash or a similar organization should set up either an anonymous account to receive information or maybe use a more heavily protected cyperpunk remailer. Such an ability would hopefully prompt more people to notify treaty violations

  5. dCache, towards Federated Identities & Anonymized Delegation

    Science.gov (United States)

    Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.

    2017-10-01

    For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.

  6. Cloud Based Data Protection in Anonymously Controlled SDN

    Directory of Open Access Journals (Sweden)

    Jian Shen

    2018-01-01

    Full Text Available Nowadays, Software Defined Network (SDN develops rapidly for its novel structure which separates the control plane and the data plane of network devices. Many researchers devoted themselves to the study of such a special network. However, some limitations restrict the development of SDN. On the one hand, the single controller in the conventional model bears all threats, and the corruption of it will result in network paralysis. On the other hand, the data will be increasing more in SDN switches in the data plane, while the storage space of these switches is limited. In order to solve the mentioned issues, we propose two corresponding protocols in this paper. Specifically, one is an anonymous protocol in the control plane, and the other is a verifiable outsourcing protocol in the data plane. The evaluation indicates that our protocol is correct, secure, and efficient.

  7. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  8. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  9. Study on method of dose estimation for the Dual-moderated neutron survey meter

    International Nuclear Information System (INIS)

    Zhou, Bo; Li, Taosheng; Xu, Yuhai; Gong, Cunkui; Yan, Qiang; Li, Lei

    2013-01-01

    In order to study neutron dose measurement in high energy radiation field, a Dual-moderated survey meter in the range from 1 keV to 300 MeV mean energies spectra has been developed. Measurement results of some survey meters depend on the neutron spectra characteristics in different neutron radiation fields, so the characteristics of the responses to various neutron spectra should be studied in order to get more reasonable dose. In this paper the responses of the survey meter were calculated under different neutron spectra data from IAEA of Technical Reports Series No. 318 and other references. Finally one dose estimation method was determined. The range of the reading per H*(10) for the method estimated is about 0.7–1.6 for the neutron mean energy range from 50 keV to 300 MeV. -- Highlights: • We studied a novel high energy neutron survey meter. • Response characteristics of the survey meter were calculated by using a series of neutron spectra. • One significant advantage of the survey meter is that it can provide mean energy of radiation field. • Dose estimate deviation can be corrected. • The range of corrected reading per H*(10) is about 0.7–1.6 for the neutron fluence mean energy range from 0.05 MeV to 300 MeV

  10. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  11. [Data validation methods and discussion on Chinese materia medica resource survey].

    Science.gov (United States)

    Zhang, Yue; Ma, Wei-Feng; Zhang, Xiao-Bo; Zhu, Shou-Dong; Guo, Lan-Ping; Wang, Xing-Xing

    2013-07-01

    From the beginning of the fourth national survey of the Chinese materia medica resources, there were 22 provinces have conducted pilots. The survey teams have reported immense data, it put forward the very high request to the database system construction. In order to ensure the quality, it is necessary to check and validate the data in database system. Data validation is important methods to ensure the validity, integrity and accuracy of census data. This paper comprehensively introduce the data validation system of the fourth national survey of the Chinese materia medica resources database system, and further improve the design idea and programs of data validation. The purpose of this study is to promote the survey work smoothly.

  12. Estimating health expectancies from two cross-sectional surveys: The intercensal method

    Directory of Open Access Journals (Sweden)

    Michel Guillot

    2009-10-01

    Full Text Available Health expectancies are key indicators for monitoring the health of populations, as well as for informing debates about compression or expansion of morbidity. However, current methodologies for estimating them are not entirely satisfactory. They are either of limited applicability because of high data requirements (the multistate method or based on questionable assumptions (the Sullivan method. This paper proposes a new method, called the "intercensal" method, which relies on the multistate framework but uses widely available data. The method uses age-specific proportions "healthy" at two successive, independent cross-sectional health surveys, and, together with information on general mortality, solves for the set of transition probabilities that produces the observed sequence of proportions healthy. The system is solved by making realistic parametric assumptions about the age patterns of transition probabilities. Using data from the Health and Retirement Survey (HRS and from the National Health Interview Survey (NHIS, the method is tested against both the multistate method and the Sullivan method. We conclude that the intercensal approach is a promising framework for the indirect estimation of health expectancies.

  13. Establishing survey validity and reliability for American Indians through "think aloud" and test-retest methods.

    Science.gov (United States)

    Hauge, Cindy Horst; Jacobs-Knight, Jacque; Jensen, Jamie L; Burgess, Katherine M; Puumala, Susan E; Wilton, Georgiana; Hanson, Jessica D

    2015-06-01

    The purpose of this study was to use a mixed-methods approach to determine the validity and reliability of measurements used within an alcohol-exposed pregnancy prevention program for American Indian women. To develop validity, content experts provided input into the survey measures, and a "think aloud" methodology was conducted with 23 American Indian women. After revising the measurements based on this input, a test-retest was conducted with 79 American Indian women who were randomized to complete either the original measurements or the new, modified measurements. The test-retest revealed that some of the questions performed better for the modified version, whereas others appeared to be more reliable for the original version. The mixed-methods approach was a useful methodology for gathering feedback on survey measurements from American Indian participants and in indicating specific survey questions that needed to be modified for this population. © The Author(s) 2015.

  14. Sampling methods. A survey of methods in use in the Nordic countries

    International Nuclear Information System (INIS)

    Isaksson, M.

    2000-10-01

    This report is a survey of sampling techniques currently in use for radioactivity measurements in the Nordic countries, but restricted to sampling techniques for pasture, soil and deposition in emergency situations. It is found that the participating laboratories apply similar sampling procedures for pasture, including cutting height and size of sampled areas. Soil samples are generally taken by some sort of corer of different diameter. The number of cores taken varies, different sampling patterns are used, and pooling of the samples is done by some of the laboratories. The analysis of pasture and of soil is made with Nal-detectors or by high-resolution gamma spectrometry on fresh or dried samples. Precipitation collectors of a range of sizes are used to determine the activity concentration in precipitation and of dry deposited radionuclides. The analysis is made with high-resolution gamma-spectrometry, either directly on a water sample or on ion exchange resins. (au)

  15. Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol

    Science.gov (United States)

    2017-06-01

    node anonymity, base station anonymity, Wireless Sensor Networks (WSN), Mobile Ad hoc Network (MANET), Lightweight Ad hoc On-Demand – Next Generation ... Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without...within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand – Next Generation

  16. Analysis of method of polarization surveying of water surface oil pollution

    Science.gov (United States)

    Zhukov, B. S.

    1979-01-01

    A method of polarization surveying of oil films on the water surface is analyzed. Model calculations of contrasted oil and water obtained with different orientations of the analyzer are discussed. The model depends on the spectral range, water transparency and oil film, and the selection of observational direction.

  17. Examining Stress in Graduate Assistants: Combining Qualitative and Quantitative Survey Methods

    Science.gov (United States)

    Mazzola, Joseph J.; Walker, Erin J.; Shockley, Kristen M.; Spector, Paul E.

    2011-01-01

    The aim of this study was to employ qualitative and quantitative survey methods in a concurrent mixed model design to assess stressors and strains in graduate assistants. The stressors most frequently reported qualitatively were work overload, interpersonal conflict, and organizational constraints; the most frequently reported psychological…

  18. Sample size methods for estimating HIV incidence from cross-sectional surveys.

    Science.gov (United States)

    Konikoff, Jacob; Brookmeyer, Ron

    2015-12-01

    Understanding HIV incidence, the rate at which new infections occur in populations, is critical for tracking and surveillance of the epidemic. In this article, we derive methods for determining sample sizes for cross-sectional surveys to estimate incidence with sufficient precision. We further show how to specify sample sizes for two successive cross-sectional surveys to detect changes in incidence with adequate power. In these surveys biomarkers such as CD4 cell count, viral load, and recently developed serological assays are used to determine which individuals are in an early disease stage of infection. The total number of individuals in this stage, divided by the number of people who are uninfected, is used to approximate the incidence rate. Our methods account for uncertainty in the durations of time spent in the biomarker defined early disease stage. We find that failure to account for this uncertainty when designing surveys can lead to imprecise estimates of incidence and underpowered studies. We evaluated our sample size methods in simulations and found that they performed well in a variety of underlying epidemics. Code for implementing our methods in R is available with this article at the Biometrics website on Wiley Online Library. © 2015, The International Biometric Society.

  19. A Survey on Chinese Scholars' Adoption of Mixed Methods

    Science.gov (United States)

    Zhou, Yuchun

    2018-01-01

    Since the 1980s when mixed methods emerged as "the third research methodology", it was widely adopted in Western countries. However, inadequate literature revealed how this methodology was accepted by scholars in Asian countries, such as China. Therefore, this paper used a quantitative survey to investigate Chinese scholars' perceptions…

  20. A Mixed Methods Survey Research Study of Novice Special Education Teachers: Investigation of Reading Preparedness

    Science.gov (United States)

    Stratton, Mary P.

    2017-01-01

    Novice special education teachers have become an integral part of the public and private school systems throughout Pennsylvania. This mixed-methods research study explored the expertise and preparedness of current novice special education teachers. A combination of an electronic survey questionnaire and phone and face-to-face interviews were…

  1. Survey of systems safety analysis methods and their application to nuclear waste management systems

    International Nuclear Information System (INIS)

    Pelto, P.J.; Winegardner, W.K.; Gallucci, R.H.V.

    1981-11-01

    This report reviews system safety analysis methods and examines their application to nuclear waste management systems. The safety analysis methods examined include expert opinion, maximum credible accident approach, design basis accidents approach, hazard indices, preliminary hazards analysis, failure modes and effects analysis, fault trees, event trees, cause-consequence diagrams, G0 methodology, Markov modeling, and a general category of consequence analysis models. Previous and ongoing studies on the safety of waste management systems are discussed along with their limitations and potential improvements. The major safety methods and waste management safety related studies are surveyed. This survey provides information on what safety methods are available, what waste management safety areas have been analyzed, and what are potential areas for future study

  2. Survey of systems safety analysis methods and their application to nuclear waste management systems

    Energy Technology Data Exchange (ETDEWEB)

    Pelto, P.J.; Winegardner, W.K.; Gallucci, R.H.V.

    1981-11-01

    This report reviews system safety analysis methods and examines their application to nuclear waste management systems. The safety analysis methods examined include expert opinion, maximum credible accident approach, design basis accidents approach, hazard indices, preliminary hazards analysis, failure modes and effects analysis, fault trees, event trees, cause-consequence diagrams, G0 methodology, Markov modeling, and a general category of consequence analysis models. Previous and ongoing studies on the safety of waste management systems are discussed along with their limitations and potential improvements. The major safety methods and waste management safety related studies are surveyed. This survey provides information on what safety methods are available, what waste management safety areas have been analyzed, and what are potential areas for future study.

  3. An automated radiological survey method for performing site remediation and decommissioning

    International Nuclear Information System (INIS)

    Handy, R.G.; Bolch, W.E.; Harder, G.F.; Tolaymat, T.M.

    1994-01-01

    A portable, computer-based method of performing environmental monitoring and assessment for site remediation and decommissioning has been developed. The integrated system has been developed to provide for survey time reductions and real-time data analysis. The technique utilizes a notebook 486 computer with the necessary hardware and software components that makes it possible to be used in an almost unlimited number of environmental monitoring and assessment scenarios. The results from a pilot, open-quotes hide-and-seekclose quotes gamma survey and an actual alpha decontamination survey were elucidated. It was found that a open-quotes hide-and-seekclose quotes survey could come up with timely and accurate conclusions about the position of the source. The use of the automated system in a Th-232 alpha survey resulted in a reduction in the standard time necessary to do a radiological survey. In addition, the ability to analyze the data on-site allowed for identification and location of areas which needed further decontamination. Finally, a discussion on possible future improvements and field conclusions was made

  4. "People Are Either Too Fake or Too Real": Opportunities and Challenges in Tie-Based Anonymity

    DEFF Research Database (Denmark)

    Ma, Xiao; Andabili, Nazanin; Barkhuus, Louise

    2017-01-01

    In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi-structu...... disclosure needs and social probing. Still, challenges for making such applications successful, for example the prevalence of negativity and bullying, are substantial.......In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi...

  5. Studying Cannabis Use Behaviors With Facebook and Web Surveys: Methods and Insights

    Science.gov (United States)

    2018-01-01

    The rapid and wide-reaching expansion of internet access and digital technologies offers epidemiologists numerous opportunities to study health behaviors. One particularly promising new data collection strategy is the use of Facebook’s advertising platform in conjunction with Web-based surveys. Our research team at the Center for Technology and Behavioral Health has used this quick and cost-efficient method to recruit large samples and address unique scientific questions related to cannabis use. In conducting this research, we have gleaned several insights for using this sampling method effectively and have begun to document the characteristics of the resulting data. We believe this information could be useful to other researchers attempting to study cannabis use or, potentially, other health behaviors. The first aim of this paper is to describe case examples of procedures for using Facebook as a survey sampling method for studying cannabis use. We then present several distinctive features of the data produced using this method. Finally, we discuss the utility of this sampling method for addressing specific types of epidemiological research questions. Overall, we believe that sampling with Facebook advertisements and Web surveys is best conceptualized as a targeted, nonprobability-based method for oversampling cannabis users across the United States. PMID:29720366

  6. Research on 3-D terrain correction methods of airborne gamma-ray spectrometry survey

    International Nuclear Information System (INIS)

    Liu Yanyang; Liu Qingcheng; Zhang Zhiyong

    2008-01-01

    The general method of height correction is not effectual in complex terrain during the process of explaining airborne gamma-ray spectrometry data, and the 2-D terrain correction method researched in recent years is just available for correction of section measured. A new method of 3-D sector terrain correction is studied. The ground radiator is divided into many small sector radiators by the method, then the irradiation rate is calculated in certain survey distance, and the total value of all small radiate sources is regarded as the irradiation rate of the ground radiator at certain point of aero- survey, and the correction coefficients of every point are calculated which then applied to correct to airborne gamma-ray spectrometry data. The method can achieve the forward calculation, inversion calculation and terrain correction for airborne gamma-ray spectrometry survey in complex topography by dividing the ground radiator into many small sectors. Other factors are considered such as the un- saturated degree of measure scope, uneven-radiator content on ground, and so on. The results of for- ward model and an example analysis show that the 3-D terrain correction method is proper and effectual. (authors)

  7. Studying Cannabis Use Behaviors With Facebook and Web Surveys: Methods and Insights.

    Science.gov (United States)

    Borodovsky, Jacob T; Marsch, Lisa A; Budney, Alan J

    2018-05-02

    The rapid and wide-reaching expansion of internet access and digital technologies offers epidemiologists numerous opportunities to study health behaviors. One particularly promising new data collection strategy is the use of Facebook's advertising platform in conjunction with Web-based surveys. Our research team at the Center for Technology and Behavioral Health has used this quick and cost-efficient method to recruit large samples and address unique scientific questions related to cannabis use. In conducting this research, we have gleaned several insights for using this sampling method effectively and have begun to document the characteristics of the resulting data. We believe this information could be useful to other researchers attempting to study cannabis use or, potentially, other health behaviors. The first aim of this paper is to describe case examples of procedures for using Facebook as a survey sampling method for studying cannabis use. We then present several distinctive features of the data produced using this method. Finally, we discuss the utility of this sampling method for addressing specific types of epidemiological research questions. Overall, we believe that sampling with Facebook advertisements and Web surveys is best conceptualized as a targeted, nonprobability-based method for oversampling cannabis users across the United States. ©Jacob T Borodovsky, Lisa A Marsch, Alan J Budney. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 02.05.2018.

  8. Methods of removing uranium from drinking water. 1. A literature survey. 2. Present municipal water treatment and potential removal methods

    International Nuclear Information System (INIS)

    Drury, J.S.; Michelson, D.; Ensminger, J.T.; Lee, S.Y.; White, S.K.

    1982-12-01

    Literature was searched for methods of removing uranium from drinking water. U.S. manufacturers and users of water-treatment equipment and products were also contacted regarding methods of removing uranium from potable water. Based on the results of these surveys, it was recommended that untreated, partially treated, and finished water samples from municipal water-treatment facilities be analyzed to determine the extent of removal of uranium by presently used procedures, and that additional laboratory studies be performed to determine what changes are needed to maximize the effectiveness of treatments that are already in use in existing water-treatment plants

  9. Preference for anonymity in sperm donation for artificial insemination: an experience from low-resource settings in Nigeria

    Directory of Open Access Journals (Sweden)

    Ezugwu EC

    2018-04-01

    Full Text Available Euzebus Chinonye Ezugwu,1,2 George U Eleje,3,4 Chukwuemeka A Iyoke,1,2 Sunday G Mba,5 Henry C Nnaji,2 Chukwunonso I Enechukwu,4 Peter O Nkwo1,2 1Department of Obstetrics and Gynecology, Faculty of Medical Sciences, College of Medicine, University of Nigeria, Ittuku Ozalla Campus, Enugu State, Nigeria; 2Department of Obstetrics and Gynecology, University of Nigeria Teaching Hospital, Ituku-Ozalla, Enugu State, Nigeria; 3Department of Obstetrics and Gynecology, Faculty of Medicine, Nnamdi Azikiwe University, Awka, Anambra State, Nigeria; 4Department of Obstetrics and Gynecology, Nnamdi Azikiwe University Teaching Hospital, Nnewi, Anambra State, Nigeria; 5Department of Obstetrics and Gynecology, Enugu State University Teaching Hospital, Enugu State, Nigeria Objective: Anonymous sperm donation is a common practice in Nigeria with its associated legal and ethical challenges. This study aimed to investigate infertile couples’ opinions about issues of sperm donor anonymity and to determine factors that might influence their preferences.Methods: A cross-sectional, multicentered, questionnaire-based study was conducted among infertile couples attending infertility clinics in three tertiary hospitals in the south-eastern region of Nigeria over a period of 6 months.Results: A total of 450 infertile couples were recruited consecutively from the three study centers. However, 450 females and 352 males (total=802 participated in the study. The level of awareness of artificial insemination using donor sperm for the management of male infertility among the respondents was 69.2%, while its acceptability rate was 62.7%. The majority of the respondents indicated their preference for secrecy and anonymity in sperm donation. Approximately 84% of the respondents indicated that the mode of conception should never be disclosed to the donor-conceived child, and ~92% of them indicated that the identity of the sperm donor should never be revealed to the donor

  10. The acceptability among health researchers and clinicians of social media to translate research evidence to clinical practice: mixed-methods survey and interview study.

    Science.gov (United States)

    Tunnecliff, Jacqueline; Ilic, Dragan; Morgan, Prue; Keating, Jennifer; Gaida, James E; Clearihan, Lynette; Sadasivan, Sivalal; Davies, David; Ganesh, Shankar; Mohanty, Patitapaban; Weiner, John; Reynolds, John; Maloney, Stephen

    2015-05-20

    Establishing and promoting connections between health researchers and health professional clinicians may help translate research evidence to clinical practice. Social media may have the capacity to enhance these connections. The aim of this study was to explore health researchers' and clinicians' current use of social media and their beliefs and attitudes towards the use of social media for communicating research evidence. This study used a mixed-methods approach to obtain qualitative and quantitative data. Participation was open to health researchers and clinicians. Data regarding demographic details, current use of social media, and beliefs and attitudes towards the use of social media for professional purposes were obtained through an anonymous Web-based survey. The survey was distributed via email to research centers, educational and clinical institutions, and health professional associations in Australia, India, and Malaysia. Consenting participants were stratified by country and role and selected at random for semistructured telephone interviews to explore themes arising from the survey. A total of 856 participants completed the questionnaire with 125 participants declining to participate, resulting in a response rate of 87.3%. 69 interviews were conducted with participants from Australia, India, and Malaysia. Social media was used for recreation by 89.2% (749/840) of participants and for professional purposes by 80.0% (682/852) of participants. Significant associations were found between frequency of professional social media use and age, gender, country of residence, and graduate status. Over a quarter (26.9%, 229/852) of participants used social media for obtaining research evidence, and 15.0% (128/852) of participants used social media for disseminating research evidence. Most participants (95.9%, 810/845) felt there was a role for social media in disseminating or obtaining research evidence. Over half of the participants (449/842, 53.3%) felt they had a

  11. Results of a survey on accident and safety analysis codes, benchmarks, verification and validation methods

    International Nuclear Information System (INIS)

    Lee, A.G.; Wilkin, G.B.

    1995-01-01

    This report is a compilation of the information submitted by AECL, CIAE, JAERI, ORNL and Siemens in response to a need identified at the 'Workshop on R and D Needs' at the IGORR-3 meeting. The survey compiled information on the national standards applied to the Safety Quality Assurance (SQA) programs undertaken by the participants. Information was assembled for the computer codes and nuclear data libraries used in accident and safety analyses for research reactors and the methods used to verify and validate the codes and libraries. Although the survey was not comprehensive, it provides a basis for exchanging information of common interest to the research reactor community

  12. Scientists' attitudes on science and values: Case studies and survey methods in philosophy of science.

    Science.gov (United States)

    Steel, Daniel; Gonnerman, Chad; O'Rourke, Michael

    2017-06-01

    This article examines the relevance of survey data of scientists' attitudes about science and values to case studies in philosophy of science. We describe two methodological challenges confronting such case studies: 1) small samples, and 2) potential for bias in selection, emphasis, and interpretation. Examples are given to illustrate that these challenges can arise for case studies in the science and values literature. We propose that these challenges can be mitigated through an approach in which case studies and survey methods are viewed as complementary, and use data from the Toolbox Dialogue Initiative to illustrate this claim. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Random sampling of quantum states: a survey of methods and some issues regarding the Overparametrized Method

    International Nuclear Information System (INIS)

    Maziero, Jonas

    2015-01-01

    The numerical generation of random quantum states (RQS) is an important procedure for investigations in quantum information science. Here, we review some methods that may be used for performing that task. We start by presenting a simple procedure for generating random state vectors, for which the main tool is the random sampling of unbiased discrete probability distributions (DPD). Afterwards, the creation of random density matrices is addressed. In this context, we first present the standard method, which consists in using the spectral decomposition of a quantum state for getting RQS from random DPDs and random unitary matrices. In the sequence, the Bloch vector parametrization method is described. This approach, despite being useful in several instances, is not in general convenient for RQS generation. In the last part of the article, we regard the overparametrized method (OPM) and the related Ginibre and Bures techniques. The OPM can be used to create random positive semidefinite matrices with unit trace from randomly produced general complex matrices in a simple way that is friendly for numerical implementations. We consider a physically relevant issue related to the possible domains that may be used for the real and imaginary parts of the elements of such general complex matrices. Subsequently, a too fast concentration of measure in the quantum state space that appears in this parametrization is noticed. (author)

  14. Research and application of soil-mercury-surveys method for locating uranium

    International Nuclear Information System (INIS)

    You Yunfei; Lu Shili; Jiao Zongrun

    1995-06-01

    Soil-Hg-Surveys method for locating uranium ore was presented. Soil-sampler of drilling bottom, the ability of surveying the deep uranium orebodies was raised by using this method. Application of minicomputer technology to pyrolytic-Hg-analysis raises the degree of automation and precision of the analysis. Application condition of optimum is Hg content of orebodies >1 x 10 -6 . Locating deep is about 100 m. The forecast of uranium orebodies achieved success in two unknown section that are 534 and 510 mining area, therefore two little size deposits expanded into middle size deposits. This method is as well applicable to locating gold, silver, copper, lead zinc and oil-gas natural resource and so on. (8 figs., 3 tabs.)

  15. A survey of U.S. prosthodontists and dental schools on the current materials and methods for final impressions for complete denture prosthodontics.

    Science.gov (United States)

    Petrie, Cynthia S; Walker, Mary P; Williams, Karen

    2005-12-01

    The purpose of this study was to survey members of The American College of Prosthodontists (ACP) to evaluate current materials and methods for final impressions for complete denture prosthodontics in the United States. In addition, those methods were compared with methods and materials taught in U.S. dental schools via a second survey sent to the chairpersons of prosthodontic/restorative departments. An anonymous questionnaire was mailed to all 1762 active ACP members in the United States in 2003. A slightly modified questionnaire was also distributed to chairpersons of prosthodontic/restorative departments in the 54 U.S. dental schools. Data analysis was performed via frequency distribution and chi-square statistics. Nine hundred and forty-five questionnaires were returned by members of the ACP (54% return rate) and 42 questionnaires were returned by the U.S. dental schools (78% return rate). The majority of the reporting prosthodontists (88%) and dental schools (98%) use a border-molded custom tray for final impressions for complete denture prosthodontics. The most popular material for border molding was plastic modeling compound (67% of reporting ACP members, and 95% of the responding dental schools). Variability of the materials used for final impressions was observed, with the most popular materials being polyvinylsiloxane for the ACP members (36%) and polysulfide for the dental schools (64%). Statistically significant differences were found in the materials used for border molding by prosthodontists based on the time elapsed since completion of prosthodontic training. No differences were found in the materials used for impression of edentulous arches based on years of experience. Geographic location did not influence the materials and methods used by prosthodontists for complete denture final impressions. There was variability of the materials and techniques used for final impressions by ACP members and dental schools; however, overall there was an agreement

  16. Results of a survey on accident and safety analysis codes, benchmarks, verification and validation methods

    International Nuclear Information System (INIS)

    Lee, A.G.; Wilkin, G.B.

    1996-03-01

    During the 'Workshop on R and D needs' at the 3rd Meeting of the International Group on Research Reactors (IGORR-III), the participants agreed that it would be useful to compile a survey of the computer codes and nuclear data libraries used in accident and safety analyses for research reactors and the methods various organizations use to verify and validate their codes and libraries. Five organizations, Atomic Energy of Canada Limited (AECL, Canada), China Institute of Atomic Energy (CIAE, People's Republic of China), Japan Atomic Energy Research Institute (JAERI, Japan), Oak Ridge National Laboratories (ORNL, USA), and Siemens (Germany) responded to the survey. The results of the survey are compiled in this report. (author) 36 refs., 3 tabs

  17. Web-based Survey Data Collection With Peer Support and Advocacy Organizations: Implications of Participatory Methods.

    Science.gov (United States)

    Ostrow, Laysha; Penney, Darby; Stuart, Elizabeth; Leaf, Phillip J

    2017-01-01

    The 2012 National Survey of Peer-Run Organizations is one of the first to survey a nationally representative sample of mental health peer-run organizations, nonprofit venues for support and advocacy which are defined by people with psychiatric histories being in positions of authority and control. This paper describes data collection methods and demonstrates how participatory strategies to involve people with psychiatric histories intersected with Internet research to achieve study aims. People with psychiatric histories were involved in designing and implementing a web-based survey to collect data on peer-run organizations' operations and views on national policy. Participatory approaches were used throughout design, data collection analysis, and dissemination. The extensive involvement of people with psychiatric histories in project design and implementation were important strategies that contributed to this study's success.

  18. GPR survey, as one of the best geophysical methods for social and industrial needs

    Science.gov (United States)

    Chernov, Anatolii

    2016-04-01

    This paper is about ways and methods of applying non-invasive geophysical method - Ground penetrating radar (GPR) survey in different spheres of science, industry, social life and culture. Author would like to show that geological methods could be widely used for solving great variety of industrial, human safety and other problems. In that article, we take GPR survey as an example of such useful geophysical methods. It is a fact that investigation of near surface underground medium is important process, which influence on development of different spheres of science and social life: investigation of near surface geology (layering, spreading of rock types, identification of voids, etc.), hydrogeology (depth to water horizons, their thickness), preparation step for construction of roads and buildings (civil geology, engineering geology), investigation of cultural heritage (burial places, building remains,...), ecological investigations (land slides, variation in underground water level, etc.), glaciology. These tasks can be solved by geological methods, but as usual, geophysical survey takes a lot of time and energy (especially electric current and resistivity methods, seismic survey). Author claims that GPR survey can be performed faster than other geophysical surveys and results of GPR survey are informative enough to make proper conclusions. Some problems even cannot be solved without GPR. For example, identification of burial place (one of author's research objects): results of magnetic and electric resistivity tomography survey do not contain enough information to identify burial place, but according to anomalies on GPR survey radarograms, presence of burial place can be proven. Identification of voids and non-magnetic objects also hardly can be done by another non-invasive geophysics surveys and GPR is applicable for that purpose. GPR can be applied for monitoring of dangerous processes in geological medium under roads, buildings, parks and other places of human

  19. Delineating social network data anonymization via random edge perturbation

    KAUST Repository

    Xue, Mingqiang

    2012-01-01

    Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations. © 2012 ACM.

  20. On the Anonymity Risk of Time-Varying User Profiles

    Directory of Open Access Journals (Sweden)

    Silvia Puglisi

    2017-04-01

    Full Text Available Websites and applications use personalisation services to profile their users, collect their patterns and activities and eventually use this data to provide tailored suggestions. User preferences and social interactions are therefore aggregated and analysed. Every time a user publishes a new post or creates a link with another entity, either another user, or some online resource, new information is added to the user profile. Exposing private data does not only reveal information about single users’ preferences, increasing their privacy risk, but can expose more about their network that single actors intended. This mechanism is self-evident in social networks where users receive suggestions based on their friends’ activities. We propose an information-theoretic approach to measure the differential update of the anonymity risk of time-varying user profiles. This expresses how privacy is affected when new content is posted and how much third-party services get to know about the users when a new activity is shared. We use actual Facebook data to show how our model can be applied to a real-world scenario.

  1. RESPECTING THE CONFIDENTIALITY AND ANONYMITY IN QUALITATIVE RESEARCH IN SOCIOLOGY

    Directory of Open Access Journals (Sweden)

    Maria OPREA

    2018-06-01

    Full Text Available Ethics, a philosophical discipline, formulates a set of principles that must be followed, in respect of good and truth, fundamental values of humanity. The world of scientific research, of all kinds, also obeys moral imperatives and principles and is called upon to answer to society not only in relation to the discoveries themselves but, above all, in relation to the possible destructive effects on man or his life environment. The researcher in the sphere of social sciences is more involved in the act of responsibility, the more the topic subject of the study is the individual, the social group, the social environment. He must rigorously follow the principles and requirements of fair, honest, objective studies that do not harm the dignity of the human being. In line with the ethical rigors of scientific research, the article aims to highlight some aspects of respecting the principle of confidentiality and anonymity in qualitative research in the field of sociology, with reference to the study of vulnerable groups in Arad County.

  2. iDASH: integrating data for analysis, anonymization, and sharing

    Science.gov (United States)

    Bafna, Vineet; Boxwala, Aziz A; Chapman, Brian E; Chapman, Wendy W; Chaudhuri, Kamalika; Day, Michele E; Farcas, Claudiu; Heintzman, Nathaniel D; Jiang, Xiaoqian; Kim, Hyeoneui; Kim, Jihoon; Matheny, Michael E; Resnic, Frederic S; Vinterbo, Staal A

    2011-01-01

    iDASH (integrating data for analysis, anonymization, and sharing) is the newest National Center for Biomedical Computing funded by the NIH. It focuses on algorithms and tools for sharing data in a privacy-preserving manner. Foundational privacy technology research performed within iDASH is coupled with innovative engineering for collaborative tool development and data-sharing capabilities in a private Health Insurance Portability and Accountability Act (HIPAA)-certified cloud. Driving Biological Projects, which span different biological levels (from molecules to individuals to populations) and focus on various health conditions, help guide research and development within this Center. Furthermore, training and dissemination efforts connect the Center with its stakeholders and educate data owners and data consumers on how to share and use clinical and biological data. Through these various mechanisms, iDASH implements its goal of providing biomedical and behavioral researchers with access to data, software, and a high-performance computing environment, thus enabling them to generate and test new hypotheses. PMID:22081224

  3. Analytic neutrality, anonymity, abstinence, and elective self-disclosure.

    Science.gov (United States)

    Shill, Merton A

    2004-01-01

    Recent contributions to the psychoanalytic literature propose new ways of understanding analytic neutrality, anonymity, abstinence, and self-disclosure. They advocate elective self-disclosure by the analyst as an antidote to the allegedly game-playing quality of transference and resistance analysis. The analytic relationship, they assert, becomes unreal when attempts are made to observe the principles of neutrality and abstinence. Both are seen as ill-conceived because of the irreducible subjectivity and unwarranted authority of the analyst. These relational and interactional views are criticized because (1) they ignore the fact that transference and resistance analysis have from Freud onward been accepted as minimal criteria qualifying a clinical process as psychoanalytic; (2) elective self-disclosure carries metapsychological implications dismissing not only Freud's theory of motivation but motivation as a basic feature of human personality; (3) they do not recognize interpersonal relations as mental events and so do not consider the ego's ability to create intrapsychic representations of object relations; (4) elective self-disclosures within the empathic parameters of the analytic situation are themselves unreal compared to the reality of the patient's experience with other objects. Abstinence and neutrality as ideals facilitate maintenance of an internal holding environment or container for the analyst's countertransference.

  4. Contingent valuation method applied to survey on personal preferences on choice of electric power source

    International Nuclear Information System (INIS)

    Takahashi, Reiko; Nakagome, Yoshihiro

    2004-01-01

    A Survey was conducted on personal preferences regarding their choice of electric power source to verify the applicability of Contingent Valuation Method (CVM) to such analysis. The survey was carried out on local and urban inhabitants in two steps, first by mail and thereafter by direct interview. A choice of four typical forms of power source was presented: nuclear, coal, hydro and green power; and the question was asked whether the respondent would be willing to pay additional charge for specifying their preferable power source. The mail survey indicated more than half of the respondents hold some willingness to pay either for disuse of nuclear power or expansion of green power. The interview survey revealed various complex motives lying behind their answers. Consequently, it was found that their preference is significantly correlated to their personal image or knowledge of power sources, their thinking or attitude toward energy conservation, their sense of consumption and their private view of life. It is concluded that CVM is pertinently applicable to quantitative analysis of individual opinions, particularly in terms of their motivation to participate in national energy issues. A number of modifications, however, should be required to be brought to the survey design in order to ensure smooth application in practice. (author)

  5. A Survey of Symplectic and Collocation Integration Methods for Orbit Propagation

    Science.gov (United States)

    Jones, Brandon A.; Anderson, Rodney L.

    2012-01-01

    Demands on numerical integration algorithms for astrodynamics applications continue to increase. Common methods, like explicit Runge-Kutta, meet the orbit propagation needs of most scenarios, but more specialized scenarios require new techniques to meet both computational efficiency and accuracy needs. This paper provides an extensive survey on the application of symplectic and collocation methods to astrodynamics. Both of these methods benefit from relatively recent theoretical developments, which improve their applicability to artificial satellite orbit propagation. This paper also details their implementation, with several tests demonstrating their advantages and disadvantages.

  6. Short assessment of the Big Five: robust across survey methods except telephone interviewing.

    Science.gov (United States)

    Lang, Frieder R; John, Dennis; Lüdtke, Oliver; Schupp, Jürgen; Wagner, Gert G

    2011-06-01

    We examined measurement invariance and age-related robustness of a short 15-item Big Five Inventory (BFI-S) of personality dimensions, which is well suited for applications in large-scale multidisciplinary surveys. The BFI-S was assessed in three different interviewing conditions: computer-assisted or paper-assisted face-to-face interviewing, computer-assisted telephone interviewing, and a self-administered questionnaire. Randomized probability samples from a large-scale German panel survey and a related probability telephone study were used in order to test method effects on self-report measures of personality characteristics across early, middle, and late adulthood. Exploratory structural equation modeling was used in order to test for measurement invariance of the five-factor model of personality trait domains across different assessment methods. For the short inventory, findings suggest strong robustness of self-report measures of personality dimensions among young and middle-aged adults. In old age, telephone interviewing was associated with greater distortions in reliable personality assessment. It is concluded that the greater mental workload of telephone interviewing limits the reliability of self-report personality assessment. Face-to-face surveys and self-administrated questionnaire completion are clearly better suited than phone surveys when personality traits in age-heterogeneous samples are assessed.

  7. A Survey of a System of Methods for Fire Safety Design of Traditional Concrete Constructions

    DEFF Research Database (Denmark)

    Hertz, Kristian

    2000-01-01

    constructions DS411. And the bases for many of the methods have been distributed by CIB W14 reports. But a survey of all the methods in coherence has never been presented, and much of this documentation and the additional documentation produced for the work with the codes needs still to be printed in papers......During the years since 1978 the author has been developing a series of calculation methods and sup-porting test methods for the fire safety design of concrete constructions. The basic methods have been adopted in the fire chapters of the Eurocode ENV1992-1-2 and the Danish code for concrete.......It is the aim of this paper to give a coherent presentation of the design methods, their degree of documentation and the available references in order to facilitate the application of them....

  8. Comparison of survey and photogrammetry methods to position gravity data, Yucca Mountain, Nevada

    International Nuclear Information System (INIS)

    Ponce, D.A.; Wu, S.S.C.; Spielman, J.B.

    1985-01-01

    Locations of gravity stations at Yucca Mountain, Nevada, were determined by a survey using an electronic distance-measuring device and by a photogram-metric method. The data from both methods were compared to determine if horizontal and vertical coordinates developed from photogrammetry are sufficently accurate to position gravity data at the site. The results show that elevations from the photogrammetric data have a mean difference of 0.57 +- 0.70 m when compared with those of the surveyed data. Comparison of the horizontal control shows that the two methods agreed to within 0.01 minute. At a latitude of 45 0 , an error of 0.01 minute (18 m) corresponds to a gravity anomaly error of 0.015 mGal. Bouguer gravity anomalies are most sensitive to errors in elevation, thus elevation is the determining factor for use of photogrammetric or survey methods to position gravity data. Because gravity station positions are difficult to locate on aerial photographs, photogrammetric positions are not always exactly at the gravity station; therefore, large disagreements may appear when comparing electronic and photogrammetric measurements. A mean photogrammetric elevation error of 0.57 m corresponds to a gravity anomaly error of 0.11 mGal. Errors of 0.11 mGal are too large for high-precision or detailed gravity measurements but acceptable for regional work. 1 ref. 2 figs., 4 tabs

  9. The use of qualitative methods to inform Delphi surveys in core outcome set development.

    Science.gov (United States)

    Keeley, T; Williamson, P; Callery, P; Jones, L L; Mathers, J; Jones, J; Young, B; Calvert, M

    2016-05-04

    Core outcome sets (COS) help to minimise bias in trials and facilitate evidence synthesis. Delphi surveys are increasingly being used as part of a wider process to reach consensus about what outcomes should be included in a COS. Qualitative research can be used to inform the development of Delphi surveys. This is an advance in the field of COS development and one which is potentially valuable; however, little guidance exists for COS developers on how best to use qualitative methods and what the challenges are. This paper aims to provide early guidance on the potential role and contribution of qualitative research in this area. We hope the ideas we present will be challenged, critiqued and built upon by others exploring the role of qualitative research in COS development. This paper draws upon the experiences of using qualitative methods in the pre-Delphi stage of the development of three different COS. Using these studies as examples, we identify some of the ways that qualitative research might contribute to COS development, the challenges in using such methods and areas where future research is required. Qualitative research can help to identify what outcomes are important to stakeholders; facilitate understanding of why some outcomes may be more important than others, determine the scope of outcomes; identify appropriate language for use in the Delphi survey and inform comparisons between stakeholder data and other sources, such as systematic reviews. Developers need to consider a number of methodological points when using qualitative research: specifically, which stakeholders to involve, how to sample participants, which data collection methods are most appropriate, how to consider outcomes with stakeholders and how to analyse these data. A number of areas for future research are identified. Qualitative research has the potential to increase the research community's confidence in COS, although this will be dependent upon using rigorous and appropriate

  10. Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference.

    Science.gov (United States)

    Teich, Al; Frankel, Mark S.; Kling, Rob; Lee, Yaching

    1999-01-01

    Reports the results of a conference on the Internet and anonymous communication organized by the American Association for the Advancement of Science (AAAS). Discusses how anonymous communications can be shaped by the law, education, and public awareness, and highlights the importance of involving all affected interests in policy development.…

  11. Use of WhatsApp in Higher Education: What's Up with Assessing Peers Anonymously?

    Science.gov (United States)

    Güler, Çetin

    2017-01-01

    The aim of this study is to investigate the use of WhatsApp application in anonymous peer assessment in higher education. The mobile phone application WhatsApp was used as both an anonymous and nonanonymous peer assessment tool in a classroom environment. The participants of the study were the students of two classes (sophomores and juniors), half…

  12. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    Science.gov (United States)

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  13. Men who have sex with men in Great Britain: comparing methods and estimates from probability and convenience sample surveys

    OpenAIRE

    Prah, Philip; Hickson, Ford; Bonell, Chris; McDaid, Lisa M; Johnson, Anne M; Wayal, Sonali; Clifton, Soazig; Sonnenberg, Pam; Nardone, Anthony; Erens, Bob; Copas, Andrew J; Riddell, Julie; Weatherburn, Peter; Mercer, Catherine H

    2016-01-01

    Objective: To examine sociodemographic and behavioural differences between men whohave sex with men (MSM) participating in recent UK convenience surveys and a national probability sample survey.\\ud Methods: We compared 148 MSM aged 18–64 years interviewed for Britain's third National Survey of Sexual Attitudes and Lifestyles (Natsal-3) undertaken in 2010–2012, with men inthe same age range participating in contemporaneous convenience surveys of MSM: 15 500 British resident men in the European...

  14. The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Mingshan Xie

    2017-01-01

    Full Text Available In order to enhance the enthusiasm of the data provider in the process of data interaction and improve the adequacy of data interaction, we put forward the concept of the ego of data and then analyzed the characteristics of the ego of data in the Internet of Things (IOT in this paper. We implement two steps of data clustering for the Internet of things; the first step is the spatial location of adjacent fuzzy clustering, and the second step is the sampling time fuzzy clustering. Equivalent classes can be obtained through the two steps. In this way we can make the data with layout characteristics to be classified into different equivalent classes, so that the specific location information of the data can be obscured, the layout characteristics of tags are eliminated, and ultimately anonymization protection would be achieved. The experimental results show that the proposed algorithm can greatly improve the efficiency of protection of the data in the interaction with others in the incompletely open manner, without reducing the quality of anonymization and enhancing the information loss. The anonymization data set generated by this method has better data availability, and this algorithm can effectively improve the security of data exchange.

  15. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    Directory of Open Access Journals (Sweden)

    Balázs Bodó

    2014-11-01

    Full Text Available This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs. Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.

  16. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  17. Culture or anonymity? Differences in proposer behaviour in Korea and Germany.

    Science.gov (United States)

    Horak, Sven

    2015-10-01

    This study explores the proposer behaviour in an ultimatum game (UG) frame under anonymous and non-anonymous conditions among a Korean and German subject pool (n = 590) in comparison. Whereas the anonymous condition is represented by the standard UG, the non-anonymous condition integrates an aggregate of the Korean cultural context variables university affiliation, regional origin and seniority. The latter, a classic Confucian context variable, is measured by age differentials. The former two are impactful components of so-called Yongo networks, a unique Korean informal institution identical to Chinese Guanxi ties. Yongo networks, yet underrepresented in research, are said to be a central context variable to explain Korean social ties and decision-making behaviour. We observe significant differences between the offer behaviours of Korean and German subjects when exposing selected cultural variables. We argue that the behavioural differences observed are in fact due to culture not anonymity. © 2015 International Union of Psychological Science.

  18. Pairing field methods to improve inference in wildlife surveys while accommodating detection covariance.

    Science.gov (United States)

    Clare, John; McKinney, Shawn T; DePue, John E; Loftin, Cynthia S

    2017-10-01

    It is common to use multiple field sampling methods when implementing wildlife surveys to compare method efficacy or cost efficiency, integrate distinct pieces of information provided by separate methods, or evaluate method-specific biases and misclassification error. Existing models that combine information from multiple field methods or sampling devices permit rigorous comparison of method-specific detection parameters, enable estimation of additional parameters such as false-positive detection probability, and improve occurrence or abundance estimates, but with the assumption that the separate sampling methods produce detections independently of one another. This assumption is tenuous if methods are paired or deployed in close proximity simultaneously, a common practice that reduces the additional effort required to implement multiple methods and reduces the risk that differences between method-specific detection parameters are confounded by other environmental factors. We develop occupancy and spatial capture-recapture models that permit covariance between the detections produced by different methods, use simulation to compare estimator performance of the new models to models assuming independence, and provide an empirical application based on American marten (Martes americana) surveys using paired remote cameras, hair catches, and snow tracking. Simulation results indicate existing models that assume that methods independently detect organisms produce biased parameter estimates and substantially understate estimate uncertainty when this assumption is violated, while our reformulated models are robust to either methodological independence or covariance. Empirical results suggested that remote cameras and snow tracking had comparable probability of detecting present martens, but that snow tracking also produced false-positive marten detections that could potentially substantially bias distribution estimates if not corrected for. Remote cameras detected marten

  19. Methods and representativeness of a European survey in children and adolescents: the KIDSCREEN study

    Directory of Open Access Journals (Sweden)

    von Rueden Ursula

    2007-07-01

    Full Text Available Abstract Background The objective of the present study was to compare three different sampling and questionnaire administration methods used in the international KIDSCREEN study in terms of participation, response rates, and external validity. Methods Children and adolescents aged 8–18 years were surveyed in 13 European countries using either telephone sampling and mail administration, random sampling of school listings followed by classroom or mail administration, or multistage random sampling of communities and households with self-administration of the survey materials at home. Cooperation, completion, and response rates were compared across countries and survey methods. Data on non-respondents was collected in 8 countries. The population fraction (PF, respondents in each sex-age, or educational level category, divided by the population in the same category from Eurostat census data and population fraction ratio (PFR, ratio of PF and their corresponding 95% confidence intervals were used to analyze differences by country between the KIDSCREEN samples and a reference Eurostat population. Results Response rates by country ranged from 18.9% to 91.2%. Response rates were highest in the school-based surveys (69.0%–91.2%. Sample proportions by age and gender were similar to the reference Eurostat population in most countries, although boys and adolescents were slightly underrepresented (PFR Conclusion School-based sampling achieved the highest overall response rates but also produced slightly more biased samples than the other methods. The results suggest that the samples were sufficiently representative to provide reference population values for the KIDSCREEN instrument.

  20. Survey VS audit by using method 2 to dedicate commercial grade services

    International Nuclear Information System (INIS)

    Martinez ayucar, F. J.

    2014-01-01

    Since the start of the commercial grade dedications, both 10CFR21 and EPRI documents, plus the dedication of commercial grade components, and the stage of commercial grade dedication of the services contemplated. And recently the NRC through various communications and answers trafficking among other issues the commercial grade dedication service. The NRC has detected repeatedly incorrect application of the survey as a method of commercial grade dedication and instead has done an audit of the program elements of commercial quality. (Author)

  1. Catalytic Enzyme-Based Methods for Water Treatment and Water Distribution System Decontamination. 1. Literature Survey

    Science.gov (United States)

    2006-06-01

    best examples of this is glucose isomerase, which has been used in the commercial production of high fructose corn syrup (HFCS) since 1967.230 Most...EDGEWOOD CHEMICAL BIOLOGICAL CENTER U.S. ARMY RESEARCH, DEVELOPMENT AND ENGINEERING COMMAND ECBC-TR-489 CATALYTIC ENZYME-BASED METHODS FOR WATER ...TREATMENT AND WATER DISTRIBUTION SYSTEM DECONTAMINATION 1. LITERATURE SURVEY Joseph J. DeFrank RESEARCH AND TECHNOLOGY DIRECTORATE June 2006 Approved for

  2. Application of multivariate statistical methods in analyzing expectation surveys in Central Bank of Nigeria

    OpenAIRE

    Raymond, Ogbuka Obinna

    2017-01-01

    In analyzing survey data, most researchers and analysts make use of statistical methods with straight forward statistical approaches. More common, is the use of one‐way, two‐way or multi‐way tables, and graphical displays such as bar charts, line charts, etc. A brief overview of these approaches and a good discussion on aspects needing attention during the data analysis process can be found in Wilson & Stern (2001). In most cases however, analysis procedures that go beyond simp...

  3. Photometric calibration of the COMBO-17 survey with the Softassign Procrustes Matching method

    Science.gov (United States)

    Sheikhbahaee, Z.; Nakajima, R.; Erben, T.; Schneider, P.; Hildebrandt, H.; Becker, A. C.

    2017-11-01

    Accurate photometric calibration of optical data is crucial for photometric redshift estimation. We present the Softassign Procrustes Matching (SPM) method to improve the colour calibration upon the commonly used Stellar Locus Regression (SLR) method for the COMBO-17 survey. Our colour calibration approach can be categorised as a point-set matching method, which is frequently used in medical imaging and pattern recognition. We attain a photometric redshift precision Δz/(1 + zs) of better than 2 per cent. Our method is based on aligning the stellar locus of the uncalibrated stars to that of a spectroscopic sample of the Sloan Digital Sky Survey standard stars. We achieve our goal by finding a correspondence matrix between the two point-sets and applying the matrix to estimate the appropriate translations in multidimensional colour space. The SPM method is able to find the translation between two point-sets, despite the existence of noise and incompleteness of the common structures in the sets, as long as there is a distinct structure in at least one of the colour-colour pairs. We demonstrate the precision of our colour calibration method with a mock catalogue. The SPM colour calibration code is publicly available at https://neuronphysics@bitbucket.org/neuronphysics/spm.git.

  4. Using mark-recapture distance sampling methods on line transect surveys

    Science.gov (United States)

    Burt, Louise M.; Borchers, David L.; Jenkins, Kurt J.; Marques, Tigao A

    2014-01-01

    Mark–recapture distance sampling (MRDS) methods are widely used for density and abundance estimation when the conventional DS assumption of certain detection at distance zero fails, as they allow detection at distance zero to be estimated and incorporated into the overall probability of detection to better estimate density and abundance. However, incorporating MR data in DS models raises survey and analysis issues not present in conventional DS. Conversely, incorporating DS assumptions in MR models raises issues not present in conventional MR. As a result, being familiar with either conventional DS methods or conventional MR methods does not on its own put practitioners in good a position to apply MRDS methods appropriately. This study explains the sometimes subtly different varieties of MRDS survey methods and the associated concepts underlying MRDS models. This is done as far as possible without giving mathematical details – in the hope that this will make the key concepts underlying the methods accessible to a wider audience than if we were to present the concepts via equations.

  5. Social networks as mediators of the effect of Alcoholics Anonymous.

    Science.gov (United States)

    Kaskutas, Lee Ann; Bond, Jason; Humphreys, Keith

    2002-07-01

    This study tested the hypothesis that the relationship between Alcoholics Anonymous (AA) involvement and reduced substance use is partially explained (or 'mediated') by changes in social networks. This is a naturalistic longitudinal study of the course of alcohol problems. Study sites were the 10 largest public and private alcohol treatment programs in a northern California county. Three hundred and seventy-seven men and 277 women were recruited upon seeking treatment at study sites. At baseline and 1-year follow-up, we assessed alcohol consequences and dependence symptoms, consumption, social support for abstinence, pro-drinking social influences and AA involvement. In the structural equation model, AA involvement was a significant predictor of lower alcohol consumption and fewer related problems. The size of this effect decreased by 36% when network size and support for drinking were included as mediators. In logistic regression models predicting abstinence at follow-up, AA remained highly significant after including social network variables but was again reduced in magnitude. Thirty-day abstinence was predicted by AA involvement (OR=2.9), not having pro-drinking influences in one's network (OR=0.7) and having support for reducing consumption from people met in AA (versus no support; OR=3.4). In contrast, having support from non-AA members was not a significant predictor of abstinence. For alcohol-related outcomes other than abstinence, significant relationships were found for both AA-based and non-AA-based support. The type of social support specifically given by AA members, such as 24-hour availability, role modeling and experientially based advice for staying sober, may help to explain AA's mechanism of action. Results highlight the value of focusing on outcomes reflective of AA's goals (such as abstinence) when studying how AA works.

  6. U.S. Geological Survey experience with the residual absolutes method

    Directory of Open Access Journals (Sweden)

    E. W. Worthington

    2017-10-01

    Full Text Available The U.S. Geological Survey (USGS Geomagnetism Program has developed and tested the residual method of absolutes, with the assistance of the Danish Technical University's (DTU Geomagnetism Program. Three years of testing were performed at College Magnetic Observatory (CMO, Fairbanks, Alaska, to compare the residual method with the null method. Results show that the two methods compare very well with each other and both sets of baseline data were used to process the 2015 definitive data. The residual method will be implemented at the other USGS high-latitude geomagnetic observatories in the summer of 2017 and 2018.

  7. Assessment of distribution and abundance estimates for Mariana swiftlets (Aerodramus bartschi) via examination of survey methods

    Science.gov (United States)

    Johnson, Nathan C.; Haig, Susan M.; Mosher, Stephen M.

    2018-01-01

    We described past and present distribution and abundance data to evaluate the status of the endangered Mariana Swiftlet (Aerodramus bartschi), a little-known echolocating cave swiftlet that currently inhabits 3 of 5 formerly occupied islands in the Mariana archipelago. We then evaluated the survey methods used to attain these estimates via fieldwork carried out on an introduced population of Mariana Swiftlets on the island of O'ahu, Hawaiian Islands, to derive better methods for future surveys. We estimate the range-wide population of Mariana Swiftlets to be 5,704 individuals occurring in 15 caves on Saipan, Aguiguan, and Guam in the Marianas; and 142 individuals occupying one tunnel on O'ahu. We further confirm that swiftlets have been extirpated from Rota and Tinian and have declined on Aguiguan. Swiftlets have remained relatively stable on Guam and Saipan in recent years. Our assessment of survey methods used for Mariana Swiftlets suggests overestimates depending on the technique used. We suggest the use of night vision technology and other changes to more accurately reflect their distribution, abundance, and status.

  8. Attitudes toward plagiarism among pharmacy and medical biochemistry students – cross-sectional survey study

    OpenAIRE

    Pupovac, Vanja; Bilic-Zulle, Lidija; Mavrinac, Martina; Petrovecki, Mladen

    2010-01-01

    Introduction: Plagiarism is one of the most frequent and serious forms of misconduct in academic environment. The cross-sectional survey study was done with aim to explore the attitudes toward plagiarism. Materials and methods: First year students of Faculty of Pharmacy and Medical Biochemistry, University of Zagreb, Croatia (N = 146) were anonymously tested using Attitude toward Plagiarism (ATP) questionnaire. The questionnaire is composed of 29 statements on a 5 point Likert scale, (1 - ...

  9. Nationwide Survey of Work Environment, Work-Life Balance and Burnout among Psychiatrists in Japan

    OpenAIRE

    Umene-Nakano, Wakako; Kato, Takahiro A.; Kikuchi, Saya; Tateno, Masaru; Fujisawa, Daisuke; Hoshuyama, Tsutomu; Nakamura, Jun

    2013-01-01

    BACKGROUND: Psychiatry has been consistently shown to be a profession characterised by 'high-burnout'; however, no nationwide surveys on this topic have been conducted in Japan. AIMS: The objective of this study was to estimate the prevalence of burnout and to ascertain the relationship between work environment satisfaction, work-life balance satisfaction and burnout among psychiatrists working in medical schools in Japan. METHOD: We mailed anonymous questionnaires to all 80 psychiatry depart...

  10. Inseminação artificial e anonimato do doador Artificial insemination and donor anonymity

    Directory of Open Access Journals (Sweden)

    Maria do Carmo Demasi Wanssa

    2010-12-01

    Full Text Available Através desse trabalho, objetiva-se abordar o tema de doação de gametas e do anonimato envolvendo este ato na reprodução medicamente assistida. Analisando rapidamente o caráter técnico da doação e seleção dos gametas e a necessidade de uma legislação específica sobre o assunto nos diferentes países do mundo que adotaram esse método, diante da pluralidade social existente. Consideram-se os aspectos éticos e legais vigentes no Brasil ditados pela Resolução do Conselho Federal de Medicina n° 1.358/93 que determina as condutas dos médicos brasileiros e define, dentre outros aspectos, o da doação e do anonimato, envolvendo o aspecto autonomia. A necessidade de proteção dos sujeitos através do termo de consentimento informado ou de recusa informada, permitindo garantir a informação e esclarecimento necessário ao casal que decide submeter-se aos planos de reprodução medicamente assistida assim como ao doador que, por sua vez, também deve dar garantias escritas quanto à espontaneidade e à alienação dos direitos sobre os gametas à instituição que se torna a responsável por estes. Tudo isso, aliado à veracidade e confidencialidade, compõe os elementos fundamentais para a manutenção do anonimato entre o doador e o receptor. Anonimato este, ainda muito discutido pelos estudiosos de diversas áreas e países.This article aims to address the issue of the donation of gametes and the anonymity involved in this act of medically-assisted reproduction. It briefly discusses the technical aspects of the donation and selection of gametes and the need for specific legislation on the issue in various countries that have adopted this method, in view of the plurality of different social systems in the world today. The article addresses the legal and ethical issues that are currently being aired in Brazil, and the rulings contained in the Federal Medical Council Resolution 1,358/93, which rules on the conduct of physicians in

  11. Quem controla a política de ninguém? Anonymous Brasil e o ativismo hacker nas redes de comunicação (Who control the politics of no one? Anonymous Brazil and hacktivism in communication networks Doi: 10.5212/Emancipacao.v.15i2.0008

    Directory of Open Access Journals (Sweden)

    Bárbara Maria Farias Mota

    2016-08-01

    Full Text Available Resumo: Esse artigo analisa a atuação política dos hackers a partir de um estudo de caso da rede Anonymous Brasil, uma das vertentes do hacktivismo no contexto brasileiro. Para tanto, utiliza as postagens de um dos diferentes perfis Anonymous no Twitter, no período da Operação Hacking Cup (#OpHackingCup, que consistiu em uma série de protestos virtuais contra a Copa do Mundo de 2014. Metodologicamente, o desenho de pesquisa adota uma abordagem multimétodo, unindo análise de conteúdo e estatística descritiva. Os resultados evidenciam que por meio da utilização de ferramentas digitais transgressivas e do anonimato, esses atores não estatais evidenciam táticas estratégicas de ação diante do controle/vigilância presentes na sociedade contemporânea. Palavras-chave: Anonymous Brasil. Ativismo hacker. Redes informacionais. Abstract: This article analyses the political actuation of hackers from a study case of the Anonymous Brazil network, one of the faces of hacktivism in the Brazilian context. For such, this paper utilises tweets from one Anonymous profile in Twitter, during the period of the Operation Hacking Cup (#OpHackingCup, which entailed several digital protests against the 2014 World Cup. Methodologically, this paper adopts a research design based on a multi-method approach, uniting content analysis and descriptive statistics. The results show that, by the means of transgressive digital tools and anonymity, those actors spotlight strategical tactics as a countermeasure to the control/surveillance that is present in the contemporary society. Keywords: Anonymous Brazil. Hacktivism. Informational networks.

  12. Survey of engineering computational methods and experimental programs for estimating supersonic missile aerodynamic characteristics

    Science.gov (United States)

    Sawyer, W. C.; Allen, J. M.; Hernandez, G.; Dillenius, M. F. E.; Hemsch, M. J.

    1982-01-01

    This paper presents a survey of engineering computational methods and experimental programs used for estimating the aerodynamic characteristics of missile configurations. Emphasis is placed on those methods which are suitable for preliminary design of conventional and advanced concepts. An analysis of the technical approaches of the various methods is made in order to assess their suitability to estimate longitudinal and/or lateral-directional characteristics for different classes of missile configurations. Some comparisons between the predicted characteristics and experimental data are presented. These comparisons are made for a large variation in flow conditions and model attitude parameters. The paper also presents known experimental research programs developed for the specific purpose of validating analytical methods and extending the capability of data-base programs.

  13. A Survey of Rabbit Handling Methods Within the United Kingdom and the Republic of Ireland.

    Science.gov (United States)

    Oxley, James Andrew; Ellis, Clare Frances; McBride, E Anne; McCormick, Wanda Denise

    2018-04-25

    Rabbits are commonly kept in a variety of settings, including homes, laboratories, and veterinary clinics. Despite the popularity of keeping this prey species, little research has investigated current methods of handling. The aim of this study was to examine the experience of caregivers (owners and keepers) in using five handling methods commonly referred to in books written for companion animal (pet) owners and veterinary and/or laboratory personnel. An online survey was completed by 2644 respondents, representing all three of these groups, and breeders. Data were acquired to determine sources that participants used to gain knowledge of different handling methods, the methods they used and for what purposes they used them, and their perceptions of any associated difficulties or welfare concerns. Results indicated that participants most frequently used the method of supporting a rabbit's body against a person's chest, which was considered the easiest and most welfare-friendly method of the handling methods explored. "Scruffing with rear support" was the least used method and was considered to be distressing and painful for the rabbit. As rabbits are a terrestrial prey species, being picked up is likely an innately stressful experience. Additional research is encouraged to explore the experience of rabbits during handling to identify methods that can be easily used with the fewest welfare compromises.

  14. Prospective parents' intentions regarding disclosure following the removal of donor anonymity.

    Science.gov (United States)

    Crawshaw, Marilyn

    2008-06-01

    This short survey of UK infertility counsellors was designed to determine whether the removal of donor anonymity resulted in noticeable changes in prospective parents' stated intentions regarding disclosure of their origins to any children conceived through donor conception. Members of the British Infertility Counselling Association working in Human Fertilisation and Embryology Authority (HFEA) -- licensed centres, before and after the legal changes, were sent a short questionnaire that included space for free comments (take-up: 62%). Three-quarters reported changes. Of these, two-thirds said prospective parents were more likely to say they would disclose, while less than a tenth said prospective parents were less likely do so. Where no changes were noted, this was primarily because the majority of prospective parents had stated their intention to be open even prior to the legal changes. Possible influences on intentions included: the culture within the centre, moves towards openness within the wider society, and parents' lack of confidence regarding how to go about disclosure. Follow-up studies are needed to improve understanding of whether influences on decision making carry through to patterns of actual disclosure; whether involvement in counselling affects outcomes; and whether access to professional assistance at the time of planned disclosure is helpful.

  15. Securing the anonymity of content providers in the World Wide Web

    Science.gov (United States)

    Demuth, Thomas; Rieke, Andreas

    1999-04-01

    Nowadays the World Wide Web (WWW) is an established service used by people all over the world. Most of them do not recognize the fact that they reveal plenty of information about themselves or their affiliation and computer equipment to the providers of web pages they connect to. As a result, a lot of services offer users to access web pages unrecognized or without risk of being backtracked, respectively. This kind of anonymity is called user or client anonymity. But on the other hand, an equivalent protection for content providers does not exist, although this feature is desirable for many situations in which the identity of a publisher or content provider shall be hidden. We call this property server anonymity. We will introduce the first system with the primary target to offer anonymity for providers of information in the WWW. Beside this property, it provides also client anonymity. Based on David Chaum's idea of mixes and in relation to the context of the WWW, we explain the term 'server anonymity' motivating the system JANUS which offers both client and server anonymity.

  16. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    Science.gov (United States)

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  17. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  18. Indications and organisational methods for autologous blood transfusion procedures in Italy: results of a national survey.

    Science.gov (United States)

    Catalano, Liviana; Campolongo, Alessandra; Caponera, Maurizio; Berzuini, Alessandra; Bontadini, Andrea; Furlò, Giuseppe; Pasqualetti, Patrizio; Liumbruno, Giancarlo M

    2014-10-01

    Pre-operative donation of autologous blood is a practice that is now being abandoned. Alternative methods of transfusing autologous blood, other than predeposited blood, do however play a role in limiting the need for transfusion of allogeneic blood. This survey of autologous blood transfusion practices, promoted by the Italian Society of Transfusion Medicine and Immunohaematology more than 2 years after the publication of national recommendations on the subject, was intended to acquire information on the indications for predeposit in Italy and on some organisational aspects of the alternative techniques of autotransfusion. A structured questionnaire consisting of 22 questions on the indications and organisational methods of autologous blood transfusion was made available on a web platform from 15 January to 15 March, 2013. The 232 Transfusion Services in Italy were invited by e-mail to complete the online survey. Of the 232 transfusion structures contacted, 160 (69%) responded to the survey, with the response rate decreasing from the North towards the South and the Islands. The use of predeposit has decreased considerably in Italy and about 50% of the units collected are discarded because of lack of use. Alternative techniques (acute isovolaemic haemodilution and peri-operative blood salvage) are used at different frequencies across the country. The data collected in this survey can be considered representative of national practice; they show that the already very limited indications for predeposit autologous blood transfusion must be adhered to even more scrupulously, also to avoid the notable waste of resources due to unused units.Users of alternative autotransfusion techniques must be involved in order to gain a full picture of the degree of use of such techniques; multidisciplinary agreement on the indications for their use is essential in order for these indications to have an effective role in "patient blood management" programmes.

  19. THE BOLOCAM GALACTIC PLANE SURVEY. VIII. A MID-INFRARED KINEMATIC DISTANCE DISCRIMINATION METHOD

    Energy Technology Data Exchange (ETDEWEB)

    Ellsworth-Bowers, Timothy P.; Glenn, Jason; Battersby, Cara; Ginsburg, Adam; Bally, John [CASA, University of Colorado, UCB 389, University of Colorado, Boulder, CO 80309 (United States); Rosolowsky, Erik [Department of Physics and Astronomy, University of British Columbia Okanagan, 3333 University Way, Kelowna, BC V1V 1V7 (Canada); Mairs, Steven [Department of Physics and Astronomy, University of Victoria, 3800 Finnerty Road, Victoria, BC V8P 1A1 (Canada); Evans, Neal J. II [Department of Astronomy, University of Texas, 1 University Station C1400, Austin, TX 78712 (United States); Shirley, Yancy L., E-mail: timothy.ellsworthbowers@colorado.edu [Steward Observatory, University of Arizona, 933 North Cherry Avenue, Tucson, AZ 85721 (United States)

    2013-06-10

    We present a new distance estimation method for dust-continuum-identified molecular cloud clumps. Recent (sub-)millimeter Galactic plane surveys have cataloged tens of thousands of these objects, plausible precursors to stellar clusters, but detailed study of their physical properties requires robust distance determinations. We derive Bayesian distance probability density functions (DPDFs) for 770 objects from the Bolocam Galactic Plane Survey in the Galactic longitude range 7. Degree-Sign 5 {<=} l {<=} 65 Degree-Sign . The DPDF formalism is based on kinematic distances, and uses any number of external data sets to place prior distance probabilities to resolve the kinematic distance ambiguity (KDA) for objects in the inner Galaxy. We present here priors related to the mid-infrared absorption of dust in dense molecular regions and the distribution of molecular gas in the Galactic disk. By assuming a numerical model of Galactic mid-infrared emission and simple radiative transfer, we match the morphology of (sub-)millimeter thermal dust emission with mid-infrared absorption to compute a prior DPDF for distance discrimination. Selecting objects first from (sub-)millimeter source catalogs avoids a bias towards the darkest infrared dark clouds (IRDCs) and extends the range of heliocentric distance probed by mid-infrared extinction and includes lower-contrast sources. We derive well-constrained KDA resolutions for 618 molecular cloud clumps, with approximately 15% placed at or beyond the tangent distance. Objects with mid-infrared contrast sufficient to be cataloged as IRDCs are generally placed at the near kinematic distance. Distance comparisons with Galactic Ring Survey KDA resolutions yield a 92% agreement. A face-on view of the Milky Way using resolved distances reveals sections of the Sagittarius and Scutum-Centaurus Arms. This KDA-resolution method for large catalogs of sources through the combination of (sub-)millimeter and mid-infrared observations of molecular

  20. Mobile acoustic transects miss rare bat species: implications of survey method and spatio-temporal sampling for monitoring bats

    Directory of Open Access Journals (Sweden)

    Elizabeth C. Braun de Torrez

    2017-11-01

    Full Text Available Due to increasing threats facing bats, long-term monitoring protocols are needed to inform conservation strategies. Effective monitoring should be easily repeatable while capturing spatio-temporal variation. Mobile acoustic driving transect surveys (‘mobile transects’ have been touted as a robust, cost-effective method to monitor bats; however, it is not clear how well mobile transects represent dynamic bat communities, especially when used as the sole survey approach. To assist biologists who must select a single survey method due to resource limitations, we assessed the effectiveness of three acoustic survey methods at detecting species richness in a vast protected area (Everglades National Park: (1 mobile transects, (2 stationary surveys that were strategically located by sources of open water and (3 stationary surveys that were replicated spatially across the landscape. We found that mobile transects underrepresented bat species richness compared to stationary surveys across all major vegetation communities and in two distinct seasons (dry/cool and wet/warm. Most critically, mobile transects failed to detect three rare bat species, one of which is federally endangered. Spatially replicated stationary surveys did not estimate higher species richness than strategically located stationary surveys, but increased the rate at which species were detected in one vegetation community. The survey strategy that detected maximum species richness and the highest mean nightly species richness with minimal effort was a strategically located stationary detector in each of two major vegetation communities during the wet/warm season.

  1. Mobile acoustic transects miss rare bat species: implications of survey method and spatio-temporal sampling for monitoring bats.

    Science.gov (United States)

    Braun de Torrez, Elizabeth C; Wallrichs, Megan A; Ober, Holly K; McCleery, Robert A

    2017-01-01

    Due to increasing threats facing bats, long-term monitoring protocols are needed to inform conservation strategies. Effective monitoring should be easily repeatable while capturing spatio-temporal variation. Mobile acoustic driving transect surveys ('mobile transects') have been touted as a robust, cost-effective method to monitor bats; however, it is not clear how well mobile transects represent dynamic bat communities, especially when used as the sole survey approach. To assist biologists who must select a single survey method due to resource limitations, we assessed the effectiveness of three acoustic survey methods at detecting species richness in a vast protected area (Everglades National Park): (1) mobile transects, (2) stationary surveys that were strategically located by sources of open water and (3) stationary surveys that were replicated spatially across the landscape. We found that mobile transects underrepresented bat species richness compared to stationary surveys across all major vegetation communities and in two distinct seasons (dry/cool and wet/warm). Most critically, mobile transects failed to detect three rare bat species, one of which is federally endangered. Spatially replicated stationary surveys did not estimate higher species richness than strategically located stationary surveys, but increased the rate at which species were detected in one vegetation community. The survey strategy that detected maximum species richness and the highest mean nightly species richness with minimal effort was a strategically located stationary detector in each of two major vegetation communities during the wet/warm season.

  2. Serbs in the poetry of Theodore Prodromos and anonymous Manganeios

    Directory of Open Access Journals (Sweden)

    Stanković Vlada

    2006-01-01

    Full Text Available Numerous rhetorical writings of the Comnenian period constitute a fruitful field of research, both with respect to historical data, i.e. hard historical facts hidden, though still recognizable, behind the peculiar and somewhat abstract mode of expression of the authors of the twelfth century, and with regard to the poetics of the literary works themselves, i.e. the internal elements characteristic not only for the genre chosen, but also for each particular author. A comparative, historical and literary approach to these works renders their sense clearer and their complex allusions more readily understood. This is a matter of some importance, since allusions constitute one of the basic elements of historical rhetoric, which reached its peak at the time of Emperor Manuel Komnenos (1143-1180, especially during the first half of his reign, i.e. till the end of the fifties of the twelfth century. The poetry of Theodore Prodromes and of the somewhat younger Anonymous ('Prodromos' Manganeios is an excellent example of this intertwining of historical and literary elements, i.e. of the presentation of historical data through rhetorical patterns. One has to concentrate on individual works attempting to determine, as far as possible, the date of composition, the circumstances of writing and the purpose of a particular poem, the occasion for which it was written and the character of the expected audience, in order to better understand both the poetry written by these two rhetoricians and the individual features of the authors, as well as their respective positions in the circle around Emperor Manuel Komnenos. The poems dealt with in the present paper stand out for calling the Serbs by their real name. This naming practice was invariably employed by both rhetoricians in cases when new achievements of the basileus were to be announced and proclaimed immediately after the event, on the occasions of first reports, first celebrations of the new victories and

  3. Application of QMC methods to PDEs with random coefficients : a survey of analysis and implementation

    KAUST Repository

    Kuo, Frances

    2016-01-05

    In this talk I will provide a survey of recent research efforts on the application of quasi-Monte Carlo (QMC) methods to PDEs with random coefficients. Such PDE problems occur in the area of uncertainty quantification. In recent years many papers have been written on this topic using a variety of methods. QMC methods are relatively new to this application area. I will consider different models for the randomness (uniform versus lognormal) and contrast different QMC algorithms (single-level versus multilevel, first order versus higher order, deterministic versus randomized). I will give a summary of the QMC error analysis and proof techniques in a unified view, and provide a practical guide to the software for constructing QMC points tailored to the PDE problems.

  4. Comparison of self-administered survey questionnaire responses collected using mobile apps versus other methods.

    Science.gov (United States)

    Marcano Belisario, José S; Jamsek, Jan; Huckvale, Kit; O'Donoghue, John; Morrison, Cecily P; Car, Josip

    2015-07-27

    Self-administered survey questionnaires are an important data collection tool in clinical practice, public health research and epidemiology. They are ideal for achieving a wide geographic coverage of the target population, dealing with sensitive topics and are less resource-intensive than other data collection methods. These survey questionnaires can be delivered electronically, which can maximise the scalability and speed of data collection while reducing cost. In recent years, the use of apps running on consumer smart devices (i.e., smartphones and tablets) for this purpose has received considerable attention. However, variation in the mode of delivering a survey questionnaire could affect the quality of the responses collected. To assess the impact that smartphone and tablet apps as a delivery mode have on the quality of survey questionnaire responses compared to any other alternative delivery mode: paper, laptop computer, tablet computer (manufactured before 2007), short message service (SMS) and plastic objects. We searched MEDLINE, EMBASE, PsycINFO, IEEEXplore, Web of Science, CABI: CAB Abstracts, Current Contents Connect, ACM Digital, ERIC, Sociological Abstracts, Health Management Information Consortium, the Campbell Library and CENTRAL. We also searched registers of current and ongoing clinical trials such as ClinicalTrials.gov and the World Health Organization (WHO) International Clinical Trials Registry Platform. We also searched the grey literature in OpenGrey, Mobile Active and ProQuest Dissertation & Theses. Lastly, we searched Google Scholar and the reference lists of included studies and relevant systematic reviews. We performed all searches up to 12 and 13 April 2015. We included parallel randomised controlled trials (RCTs), crossover trials and paired repeated measures studies that compared the electronic delivery of self-administered survey questionnaires via a smartphone or tablet app with any other delivery mode. We included data obtained from

  5. Methods for rapidly processing angular masks of next-generation galaxy surveys

    Science.gov (United States)

    Swanson, M. E. C.; Tegmark, Max; Hamilton, Andrew J. S.; Hill, J. Colin

    2008-07-01

    As galaxy surveys become larger and more complex, keeping track of the completeness, magnitude limit and other survey parameters as a function of direction on the sky becomes an increasingly challenging computational task. For example, typical angular masks of the Sloan Digital Sky Survey contain about N = 300000 distinct spherical polygons. Managing masks with such large numbers of polygons becomes intractably slow, particularly for tasks that run in time with a naive algorithm, such as finding which polygons overlap each other. Here we present a `divide-and-conquer' solution to this challenge: we first split the angular mask into pre-defined regions called `pixels', such that each polygon is in only one pixel, and then perform further computations, such as checking for overlap, on the polygons within each pixel separately. This reduces tasks to , and also reduces the important task of determining in which polygon(s) a point on the sky lies from to , resulting in significant computational speedup. Additionally, we present a method to efficiently convert any angular mask to and from the popular HEALPIX format. This method can be generically applied to convert to and from any desired spherical pixelization. We have implemented these techniques in a new version of the MANGLE software package, which is freely available at http://space.mit.edu/home/tegmark/mangle/, along with complete documentation and example applications. These new methods should prove quite useful to the astronomical community, and since MANGLE is a generic tool for managing angular masks on a sphere, it has the potential to benefit terrestrial mapmaking applications as well.

  6. Survey and analysis of deep water mineral deposits using nuclear methods

    International Nuclear Information System (INIS)

    Staehle, C.M.; Noakes, J.E.; Spaulding, J.

    1991-01-01

    Present knowledge of the location, quality, quantity and recoverability of sea floor minerals is severely limited, particularly in the abyssal depths and deep water within the 200 mile Exclusion Economic Zone (EEZ) surrounding the U.S. Pacific Islands. To improve this understanding and permit exploitation of these mineral reserves much additional data is needed. This paper will discuss a sponsored program for extending existing proven nuclear survey methods currently used on the shallow continental margins of the Atlantic and Gulf of Mexico into the deeper waters of the Pacific. This nuclear technology can be readily integrated and extended to depths of 2000 m using the existing RCV-150 remotely operated vehicle (ROV) and the PISCESE V manned deep submersible vehicle (DSV) operated by The University of Hawaii's, Hawaii Underseas Research Laboratory (HURL). Previous papers by the authors have also proposed incorporating these nuclear analytical methods for survey of the deep ocean through the use of Autonomous Underwater Vehicle (AUX). Such a vehicle could extend the use of passive nuclear instrument operation, in addition to conventional analytical methods, into the abyssal depths and do so with speed and economy not otherwise possible. The natural radioactivity associated with manganese nodules and crustal deposits is sufficiently above normal background levels to allow discrimination and quantification in near real time

  7. Methods of practice and guidelines for using survey-grade global navigation satellite systems (GNSS) to establish vertical datum in the United States Geological Survey

    Science.gov (United States)

    Rydlund, Jr., Paul H.; Densmore, Brenda K.

    2012-01-01

    Geodetic surveys have evolved through the years to the use of survey-grade (centimeter level) global positioning to perpetuate and post-process vertical datum. The U.S. Geological Survey (USGS) uses Global Navigation Satellite Systems (GNSS) technology to monitor natural hazards, ensure geospatial control for climate and land use change, and gather data necessary for investigative studies related to water, the environment, energy, and ecosystems. Vertical datum is fundamental to a variety of these integrated earth sciences. Essentially GNSS surveys provide a three-dimensional position x, y, and z as a function of the North American Datum of 1983 ellipsoid and the most current hybrid geoid model. A GNSS survey may be approached with post-processed positioning for static observations related to a single point or network, or involve real-time corrections to provide positioning "on-the-fly." Field equipment required to facilitate GNSS surveys range from a single receiver, with a power source for static positioning, to an additional receiver or network communicated by radio or cellular for real-time positioning. A real-time approach in its most common form may be described as a roving receiver augmented by a single-base station receiver, known as a single-base real-time (RT) survey. More efficient real-time methods involving a Real-Time Network (RTN) permit the use of only one roving receiver that is augmented to a network of fixed receivers commonly known as Continually Operating Reference Stations (CORS). A post-processed approach in its most common form involves static data collection at a single point. Data are most commonly post-processed through a universally accepted utility maintained by the National Geodetic Survey (NGS), known as the Online Position User Service (OPUS). More complex post-processed methods involve static observations among a network of additional receivers collecting static data at known benchmarks. Both classifications provide users

  8. Survey of the status of finite element methods for partial differential equations

    Science.gov (United States)

    Temam, Roger

    1986-01-01

    The finite element methods (FEM) have proved to be a powerful technique for the solution of boundary value problems associated with partial differential equations of either elliptic, parabolic, or hyperbolic type. They also have a good potential for utilization on parallel computers particularly in relation to the concept of domain decomposition. This report is intended as an introduction to the FEM for the nonspecialist. It contains a survey which is totally nonexhaustive, and it also contains as an illustration, a report on some new results concerning two specific applications, namely a free boundary fluid-structure interaction problem and the Euler equations for inviscid flows.

  9. Application of iterative method with dynamic weight based on observation equation's constant in NPP's surveying

    International Nuclear Information System (INIS)

    Chen Benfu; Guo Xianchun; Zou Zili

    2009-01-01

    It' s useful to identify the data with errors from the large number of observations during the process of adjustment to decrease the influence of the errors and to improve the quality of the final surveying result. Based on practical conditions of the nuclear power plant's plain control network, it has been given on how to simply calculate the threshold value which used to pre-weight each datum before adjustment calculation; it shows some superiorities in efficiency on data snooping and in quality of the final calculation compared with some traditional methods such as robust estimation, which process data with dynamic weight based the observation' s correction after each iteration. (authors)

  10. A survey of modelling methods for high-fidelity wind farm simulations using large eddy simulation

    DEFF Research Database (Denmark)

    Breton, Simon-Philippe; Sumner, J.; Sørensen, Jens Nørkær

    2017-01-01

    surveys the most common schemes available to model the rotor, atmospheric conditions and terrain effects within current state-of-the-art LES codes, of which an overview is provided. A summary of the experimental research data available for validation of LES codes within the context of single and multiple......Large eddy simulations (LES) of wind farms have the capability to provide valuable and detailed information about the dynamics of wind turbine wakes. For this reason, their use within the wind energy research community is on the rise, spurring the development of new models and methods. This review...

  11. Survey of artificial intelligence methods for detection and identification of component faults in nuclear power plants

    International Nuclear Information System (INIS)

    Reifman, J.

    1997-01-01

    A comprehensive survey of computer-based systems that apply artificial intelligence methods to detect and identify component faults in nuclear power plants is presented. Classification criteria are established that categorize artificial intelligence diagnostic systems according to the types of computing approaches used (e.g., computing tools, computer languages, and shell and simulation programs), the types of methodologies employed (e.g., types of knowledge, reasoning and inference mechanisms, and diagnostic approach), and the scope of the system. The major issues of process diagnostics and computer-based diagnostic systems are identified and cross-correlated with the various categories used for classification. Ninety-five publications are reviewed

  12. Men who have sex with men in Great Britain: comparing methods and estimates from probability and convenience sample surveys

    Science.gov (United States)

    Prah, Philip; Hickson, Ford; Bonell, Chris; McDaid, Lisa M; Johnson, Anne M; Wayal, Sonali; Clifton, Soazig; Sonnenberg, Pam; Nardone, Anthony; Erens, Bob; Copas, Andrew J; Riddell, Julie; Weatherburn, Peter; Mercer, Catherine H

    2016-01-01

    Objective To examine sociodemographic and behavioural differences between men who have sex with men (MSM) participating in recent UK convenience surveys and a national probability sample survey. Methods We compared 148 MSM aged 18–64 years interviewed for Britain's third National Survey of Sexual Attitudes and Lifestyles (Natsal-3) undertaken in 2010–2012, with men in the same age range participating in contemporaneous convenience surveys of MSM: 15 500 British resident men in the European MSM Internet Survey (EMIS); 797 in the London Gay Men's Sexual Health Survey; and 1234 in Scotland's Gay Men's Sexual Health Survey. Analyses compared men reporting at least one male sexual partner (past year) on similarly worded questions and multivariable analyses accounted for sociodemographic differences between the surveys. Results MSM in convenience surveys were younger and better educated than MSM in Natsal-3, and a larger proportion identified as gay (85%–95% vs 62%). Partner numbers were higher and same-sex anal sex more common in convenience surveys. Unprotected anal intercourse was more commonly reported in EMIS. Compared with Natsal-3, MSM in convenience surveys were more likely to report gonorrhoea diagnoses and HIV testing (both past year). Differences between the samples were reduced when restricting analysis to gay-identifying MSM. Conclusions National probability surveys better reflect the population of MSM but are limited by their smaller samples of MSM. Convenience surveys recruit larger samples of MSM but tend to over-represent MSM identifying as gay and reporting more sexual risk behaviours. Because both sampling strategies have strengths and weaknesses, methods are needed to triangulate data from probability and convenience surveys. PMID:26965869

  13. The former Semipalatinsk Test Site survey by field γ-spectrometry method

    International Nuclear Information System (INIS)

    Pakhomov, S.A.; Dubasov, Yu.V.; Biryukov, E.I.; Gavrilin, S.S.; Ilyin, L.I.

    2001-01-01

    Full text: Field γ-spectrometry method is the most productive method of getting an information on gamma-irradiating radionuclides contents in objects under survey. For many years the Radium Institute was the most active participant of works on radiation survey of the Semipalatinsk Test Site, field γ-spectrometry method including. In field γ-spectrometry method realization the existence of corresponding apparatus, and methodic software is supposed to be allowing to carry out both measurement, recording of γ-spectrometry energetic characteristics in field conditions and final treatment (using corresponding physical models) ensuring obtaining the information on radionuclides' contents. Different variants of such apparatus were developed and made at the Radium Institute. Under conditions of complex spectral structure and high intensity existence a portable variant of Ge(Li)-detector spectrometer fed by alkaline accumulators and allowing to record a spectrum at high load was elaborated. For walk γ-survey in common with the University two variants of portable spectrometers 'Skif-3' were elaborated: one of them with a standard scintillation detector on the base of Nal(Ti) crystal, having the size of 63x63 mm, and the other is an 'X-ray' detector of large dimension on the base of CsI crystal with a diameter of 165 mm, designated for soft gamma-irradiation registration, 241 Am including. During 8 hours of independent works 'Skif-3' is able to record into internal memory up to 100 spectra with an exposure up to 9999 s. At 10 min exposure in its sensitivity of 241 Am finding (10 Bq/kg) a spectrometer 'Skif-3' excels a portable spectrometer 'InSpector' (Canberra) working with the exposure of 1 hour. For automobile measurements a car spectrometer was elaborated fed. from car board supply and having four detectors based on NaI crystals with the dimensions 200x110 mm and total volume of about 121. For express treatment of a 'Skif-3' spectrometer scintillation spectra special

  14. Cross-continental comparison of national food consumption survey methods--a narrative review

    Science.gov (United States)

    Food consumption surveys are performed in many countries. Comparison of results from those surveys across nations is difficult because of differences in methodological approaches. While consensus about the preferred methodology associated with national food consumption surveys is increasing, no in...

  15. Computerized tablet based versus traditional paper- based survey methods: results from adolescent's health research in schools of Maharashtra, India

    OpenAIRE

    Naveen Agarwal; Balram Paswan; Prakash H. Fulpagare; Dhirendra N Sinha; Thaksaphon Thamarangsi; Manju Rani

    2018-01-01

    Background and challenges to implementation Technological advancement is growing very fast in India and majority of young population is handling electronic devices often during leisure as well as at work. This study indicates that electronic tablets are less time consuming and improves survey response rate over the traditional paper-pencil survey method. Intervention or response An Android-based Global School-based Health Survey (GSHS) questionnaire was used with the...

  16. The SAGES Legacy Unifying Globulars and Galaxies survey (SLUGGS): sample definition, methods, and initial results

    Energy Technology Data Exchange (ETDEWEB)

    Brodie, Jean P.; Romanowsky, Aaron J.; Jennings, Zachary G.; Pota, Vincenzo; Kader, Justin; Roediger, Joel C.; Villaume, Alexa; Arnold, Jacob A.; Woodley, Kristin A. [University of California Observatories, 1156 High Street, Santa Cruz, CA 95064 (United States); Strader, Jay [Department of Physics and Astronomy, Michigan State University, East Lansing, MI 48824 (United States); Forbes, Duncan A.; Pastorello, Nicola; Usher, Christopher; Blom, Christina; Kartha, Sreeja S. [Centre for Astrophysics and Supercomputing, Swinburne University, Hawthorn, VIC 3122 (Australia); Foster, Caroline; Spitler, Lee R., E-mail: jbrodie@ucsc.edu [Australian Astronomical Observatory, P.O. Box 915, North Ryde, NSW 1670 (Australia)

    2014-11-20

    We introduce and provide the scientific motivation for a wide-field photometric and spectroscopic chemodynamical survey of nearby early-type galaxies (ETGs) and their globular cluster (GC) systems. The SAGES Legacy Unifying Globulars and GalaxieS (SLUGGS) survey is being carried out primarily with Subaru/Suprime-Cam and Keck/DEIMOS. The former provides deep gri imaging over a 900 arcmin{sup 2} field-of-view to characterize GC and host galaxy colors and spatial distributions, and to identify spectroscopic targets. The NIR Ca II triplet provides GC line-of-sight velocities and metallicities out to typically ∼8 R {sub e}, and to ∼15 R {sub e} in some cases. New techniques to extract integrated stellar kinematics and metallicities to large radii (∼2-3 R {sub e}) are used in concert with GC data to create two-dimensional (2D) velocity and metallicity maps for comparison with simulations of galaxy formation. The advantages of SLUGGS compared with other, complementary, 2D-chemodynamical surveys are its superior velocity resolution, radial extent, and multiple halo tracers. We describe the sample of 25 nearby ETGs, the selection criteria for galaxies and GCs, the observing strategies, the data reduction techniques, and modeling methods. The survey observations are nearly complete and more than 30 papers have so far been published using SLUGGS data. Here we summarize some initial results, including signatures of two-phase galaxy assembly, evidence for GC metallicity bimodality, and a novel framework for the formation of extended star clusters and ultracompact dwarfs. An integrated overview of current chemodynamical constraints on GC systems points to separate, in situ formation modes at high redshifts for metal-poor and metal-rich GCs.

  17. Laser Scanning in Engineering Surveying: Methods of Measurement and Modeling of Structures

    Directory of Open Access Journals (Sweden)

    Lenda Grzegorz

    2016-06-01

    Full Text Available The study is devoted to the uses of laser scanning in the field of engineering surveying. It is currently one of the main trends of research which is developed at the Department of Engineering Surveying and Civil Engineering at the Faculty of Mining Surveying and Environmental Engineering of AGH University of Science and Technology in Krakow. They mainly relate to the issues associated with tower and shell structures, infrastructure of rail routes, or development of digital elevation models for a wide range of applications. These issues often require the use of a variety of scanning techniques (stationary, mobile, but the differences also regard the planning of measurement stations and methods of merging point clouds. Significant differences appear during the analysis of point clouds, especially when modeling objects. Analysis of the selected parameters is already possible basing on ad hoc measurements carried out on a point cloud. However, only the construction of three-dimensional models provides complete information about the shape of structures, allows to perform the analysis in any place and reduces the amount of the stored data. Some structures can be modeled in the form of simple axes, sections, or solids, for others it becomes necessary to create sophisticated models of surfaces, depicting local deformations. The examples selected for the study allow to assess the scope of measurement and office work for a variety of uses related to the issue set forth in the title of this study. Additionally, the latest, forward-looking technology was presented - laser scanning performed from Unmanned Aerial Vehicles (drones. Currently, it is basically in the prototype phase, but it might be expected to make a significant progress in numerous applications in the field of engineering surveying.

  18. Curriculum and instructional methods for drug information, literature evaluation, and biostatistics: survey of US pharmacy schools.

    Science.gov (United States)

    Phillips, Jennifer A; Gabay, Michael P; Ficzere, Cathy; Ward, Kristina E

    2012-06-01

    The drug information curriculum in US colleges of pharmacy continues to evolve. The American College of Clinical Pharmacy (ACCP) Drug Information Practice and Research Network (DI PRN) published an opinion paper with specific recommendations regarding drug information education in 2009. Adoption of these recommendations has not been evaluated. To assess which recommendations made in the ACCP DI PRN opinion paper are included in US pharmacy school curricula and characterize faculty qualifications, educational methods, and recent changes in drug information education. An electronic survey was designed using the ACCP DI PRN opinion paper and the Accreditation Council for Pharmacy Education standards and guidelines for accreditation of PharmD programs in the US. Survey questions addressed curricular content within the following categories: drug information, literature evaluation, and biostatistics. A letter including the online survey link was sent via email to the dean of each US college/school of pharmacy (N = 128). Recipients were instructed to forward the email to the individual at their institution who was the most knowledgeable about the content and methodology used for didactic drug information education. Sixty-four responses were included in the final analysis. Of the 19 ACCP DI PRN minimum core concepts, 9 (47%) were included in curricula of all responding institutions; 14 of 19 (74%) were included in curricula for all but 1 institution. In contrast, 5 of 16 concepts (31%) were not formally taught by a number of institutions. Many respondents noted an increased focus on evidence-based medicine, medication safety, and informatics. Although a survey of drug information curricula documented substantial inclusion of the essential concepts presented in the ACCP DI PRN opinion paper, room for improvement remains in drug information curricula in US colleges of pharmacy.

  19. An Experience of Statistical Method Application in Forest Survey at Angara River Region in 1932

    Directory of Open Access Journals (Sweden)

    L. N. Vashchuk

    2014-10-01

    Full Text Available Report of the Angara forest economic expedition of forest economic survey in 1932 on the left bank of the Angara River has been found. The survey covered a part of Krasnoyarsk Territory and Irkutsk region, a total area of 18641.8 thousand ha. The report describes technology of forest inventory and achievements that have not previously been published. The survey was conducted by statistical method, which consisted of a sample by a continuous forest inventory enumeration of trees on sample plots (SP, arranged in an array on a particular system, followed by mathematical-statistical recalculation of the sample results to the entire survey. To do this, strip finders (sights were cut in the latitudinal direction at a distance from one another at 16 km. On the hacked sights, by every 2 km, 0.1 ha (10 × 100 m SP were established. In total 32 forest inventory sights were hacked, with total length of 9931 km, which incorporated 4817 SP. The accuracy of forest resources’ inventory characteristics determining also was investigated using smaller sample plots. For this purpose, each of the SP were cut to smaller area of 0.01 ha (10 × 10 m, where independent continuous enumeration of trees was conducted, andsample trees were cut, measured and bucked to the assortments, to explore the tree stand assortment structure. At each «sample cutting area» all the trees were felled out from 44 cm and above DBH. At half of the sample plot with 5 × 10 m size, located in the eastern end, all the trees were felled out and measured from 24 cm and above DBH. Every four «sample cutting area» in the fifth, all the trees with 12 cm and above DBH were cut down and measured. According to the results of the work, a detailed description of forest resources in the whole Angara river basin, and across 17 forest exploitation areas was completed.

  20. Analysis of Drugs of Abuse in Anonymously Collected Urine and Soil samples from a Music Festival in Scandinavia

    DEFF Research Database (Denmark)

    Mardal, Marie; Ramin, Pedram; Plósz, Benedek G.

    Aim: Pooled human urine and soil from urinating spots were collected anonymously at a Scandinavian music festival. Samples should be screened for drugs of abuse, particularly novel psychoactive substances (NPS), but also therapeutic drugs and ethanol. Methods: Twenty-one urine samples were...... be detected besides several therapeutic drugs: cocaine (9), MDMA (7), sildenafil (2), ketamine (1), amphetamine (1), and oxycodone (1). Conclusions: NPS were detected neither in urine nor in soil samples. This might be due to low concentrations based on their negligible consumption at the studied festival...

  1. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  2. K-Anonymity Based Privacy Risk Budgeting System for Interactive Record Linkage

    Directory of Open Access Journals (Sweden)

    Hye-Chung Kum

    2017-04-01

    The k-anonymity based privacy risk budgeting system provides a mechanism where we can concretely reason about the tradeoff between the privacy risks due to information disclosed, accuracy gained, and biases reduced during interactive record linkage.

  3. Anonymous letters? DNA and fingerprints technologies combined to solve a case.

    Science.gov (United States)

    Barbaro, A; Cormaci, P; Teatino, A; La Marca, A; Barbaro, A

    2004-12-02

    Two brothers, living in two different cities, received two different anonymous letters. We performed latent prints development and DNA research on the letters and also on a glass used by a cousin suspected to be the letters' sender.

  4. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of

  5. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  6. A citizen science based survey method for estimating the density of urban carnivores

    Science.gov (United States)

    Baker, Rowenna; Charman, Naomi; Karlsson, Heidi; Yarnell, Richard W.; Mill, Aileen C.; Smith, Graham C.; Tolhurst, Bryony A.

    2018-01-01

    Globally there are many examples of synanthropic carnivores exploiting growth in urbanisation. As carnivores can come into conflict with humans and are potential vectors of zoonotic disease, assessing densities in suburban areas and identifying factors that influence them are necessary to aid management and mitigation. However, fragmented, privately owned land restricts the use of conventional carnivore surveying techniques in these areas, requiring development of novel methods. We present a method that combines questionnaire distribution to residents with field surveys and GIS, to determine relative density of two urban carnivores in England, Great Britain. We determined the density of: red fox (Vulpes vulpes) social groups in 14, approximately 1km2 suburban areas in 8 different towns and cities; and Eurasian badger (Meles meles) social groups in three suburban areas of one city. Average relative fox group density (FGD) was 3.72 km-2, which was double the estimates for cities with resident foxes in the 1980’s. Density was comparable to an alternative estimate derived from trapping and GPS-tracking, indicating the validity of the method. However, FGD did not correlate with a national dataset based on fox sightings, indicating unreliability of the national data to determine actual densities or to extrapolate a national population estimate. Using species-specific clustering units that reflect social organisation, the method was additionally applied to suburban badgers to derive relative badger group density (BGD) for one city (Brighton, 2.41 km-2). We demonstrate that citizen science approaches can effectively obtain data to assess suburban carnivore density, however publicly derived national data sets need to be locally validated before extrapolations can be undertaken. The method we present for assessing densities of foxes and badgers in British towns and cities is also adaptable to other urban carnivores elsewhere. However this transferability is contingent on

  7. Knowledge-attitude-practice survey among Portuguese gynaecologists regarding combined hormonal contraceptives methods.

    Science.gov (United States)

    Bombas, Teresa; Costa, Ana Rosa; Palma, Fátima; Vicente, Lisa; Sá, José Luís; Nogueira, Ana Maria; Andrade, Sofia

    2012-04-01

    ABSTRACT Objectives To evaluate knowledge, attitude and practices of Portuguese gynaecologists regarding combined hormonal contraceptives. Methods A cross-sectional survey was conducted among 303 gynaecologists. Results Ninety percent of the gynaecologists considered that deciding on contraceptive methods is a process wherein the woman has her say. Efficacy, safety and the woman's preference were the major factors influencing gynaecologists, while efficacy, tolerability and ease of use were the major factors perceived by the specialists to influence the women's choice. Gynaecologists believed that only 2% of women taking the pill were 100% compliant compared to 48% of those using the patch and 75% of those using the ring. The lower risk of omission was the strong point for the latter methods. Side effects were the main reason to change to another method. Vaginal manipulation was the most difficult topic to discuss. Conclusions Most gynaecologists decided with the woman on the contraceptive method. The main reasons for the gynaecologist's recommendation of a given contraceptive method and the women's choice were different. Counselling implies an open discussion and topics related to sexuality were considered difficult to discuss. Improving communication skills and understanding women's requirements are critical for contraceptive counselling.

  8. Chapter 12: Survey Design and Implementation for Estimating Gross Savings Cross-Cutting Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Baumgartner, Robert [Tetra Tech, Madison, WI (United States)

    2017-10-05

    This chapter presents an overview of best practices for designing and executing survey research to estimate gross energy savings in energy efficiency evaluations. A detailed description of the specific techniques and strategies for designing questions, implementing a survey, and analyzing and reporting the survey procedures and results is beyond the scope of this chapter. So for each topic covered below, readers are encouraged to consult articles and books cited in References, as well as other sources that cover the specific topics in greater depth. This chapter focuses on the use of survey methods to collect data for estimating gross savings from energy efficiency programs.

  9. Impact of Anonymity and Identity Deception on Social Media eWOM

    OpenAIRE

    Kapoor , Payal ,; Gunta , Srinivas

    2016-01-01

    Part 4: Information Sharing on Social Media; International audience; Brand-related consumer to consumer communication, eWOM, is taking place in many forms across the social media space. Rules that governed credibility assessment of brand-related communication, WOM, in the Face to Face context may vary on social media, specifically because of anonymity that is afforded on different social media sites. The current study looks closely on the impact of anonymity in typical eWOM behaviour context ...

  10. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  11. Method and Mchievement of Survey and Evaluation of Groundwater Resources of Guangzhou City

    Science.gov (United States)

    Lin, J.

    2017-12-01

    Based on the documents and achievements relevant to hydrogeological surveying and mapping of 1:100000, hydrogeological drilling, pumping test and dynamic monitoring of groundwater level in Guangzhou, considering the hydrogeological conditions of Guangzhou and combining the advanced technologies such as remote sensing, the survey and evaluation of the volume of the groundwater resources of Guangzhou was carried out in plain and mountain areas separately. The recharge method was used to evaluate the volume of groundwater resources in plain areas, meanwhile, the output volume and the storage change volume of groundwater were calculated and the volume of groundwater resources was corrected by water balance analysis; while the discharge method was used to evaluated the volume of groundwater resources in mountain areas. The result of survey and evaluation indicates that: the volume of the natural groundwater resources in Guangzhou City is 1.83 billion m3 of which the groundwater replenishment quantity in plain areas is 510,045,000 m3, with a total output of 509,729,000 m3, an absolute balance difference of 316,000 m3 and a relative balance difference of 0.062%; the volume of groundwater resources in mountain areas is 1,358,208,000 m3 including the river basic flow is 965,054,000 m3; the repetitive counted volume of groundwater resources in both plain areas and mountain areas is 38,839,000 m3. This work was realized by refined means for the first time to entirely find out the volume of groundwater resources of Guangzhou City and the law of their distribution so as to lay an important foundation for the protection and reasonable development and exploration of the groundwater resources of Guangzhou City.

  12. Teaching Intercultural Communication in a Basic Technical Writing Course: A Survey of Our Current Practices and Methods

    Science.gov (United States)

    Matveeva, Natalia

    2008-01-01

    This research article reports the results of an online survey distributed among technical writing instructors in 2006. The survey aimed to examine how we teach intercultural communication in basic technical writing courses: our current practices and methods. The article discusses three major challenges that instructors may face when teaching about…

  13. Continuing to Confront COPD International Patient Survey : methods, COPD prevalence, and disease burden in 2012-2013

    NARCIS (Netherlands)

    Landis, Sarah H.; Muellerova, Hana; Mannino, David M.; Menezes, Ana M.; Han, MeiLan K.; van der Molen, Thys; Ichinose, Masakazu; Aisanov, Zaurbek; Oh, Yeon-Mok; Davis, Kourtney J.

    2014-01-01

    Purpose: The Continuing to Confront COPD International Patient Survey aimed to estimate the prevalence and burden of COPD globally and to update findings from the Confronting COPD International Survey conducted in 1999-2000. Materials and methods: Chronic obstructive pulmonary disease (COPD)

  14. A Method for Recruiting Participants from Isolated Islands of Small Island Developing States (SIDS) for Survey Research

    Science.gov (United States)

    Moosa, Sheena; Koopman-Boyden, Peggy

    2016-01-01

    Representing isolated small island communities through social survey research continues to be challenging. We examine a locally developed method to reach and recruit older people (65+ years) for a survey on well-being in the small island developing state of Maldives. The use of messengers to recruit participants is examined in the context of these…

  15. A field survey on coffee beans drying methods of Indonesian small holder farmers

    Science.gov (United States)

    Siagian, Parulian; Setyawan, Eko Y.; Gultom, Tumiur; Napitupulu, Farel H.; Ambarita, Himsar

    2017-09-01

    Drying agricultural product is a post-harvest process that consumes significant energy. It can affect the quality of the product. This paper deals with literature review and field survey of drying methods of coffee beans of Indonesia farmers. The objective is to supply the necessary information on developing continuous solar drier. The results show that intermittent characteristic of sun drying results in a better quality of coffee beans in comparison with constant convective drying. In order to use energy efficiently, the drying process should be divided into several stages. In the first stage when the moist content is high, higher drying air temperature is more effective. After this step, where the moist content is low, lower drying air temperature is better. The field survey of drying coffee beans in Sumatera Utara province reveals that the used drying process is very traditional. It can be divided into two modes and depend on the coffee beans type. The Arabica coffee is firstly fermented and dried to moisture content of 80% using sun drying method, then followed by Green House model of drying up to moisture content about 12%. The latter typically spends 3 days of drying time. On the other hand, The Robusta coffee is dried by exposing to the sun directly without any treatment. After the coffee beans dried follow by peeled process. These findings can be considered to develop a continuous solar drying that suitable for coffee beans drying.

  16. Geostatistical methods for rock mass quality prediction using borehole and geophysical survey data

    Science.gov (United States)

    Chen, J.; Rubin, Y.; Sege, J. E.; Li, X.; Hehua, Z.

    2015-12-01

    For long, deep tunnels, the number of geotechnical borehole investigations during the preconstruction stage is generally limited. Yet tunnels are often constructed in geological structures with complex geometries, and in which the rock mass is fragmented from past structural deformations. Tunnel Geology Prediction (TGP) is a geophysical technique widely used during tunnel construction in China to ensure safety during construction and to prevent geological disasters. In this paper, geostatistical techniques were applied in order to integrate seismic velocity from TGP and borehole information into spatial predictions of RMR (Rock Mass Rating) in unexcavated areas. This approach is intended to apply conditional probability methods to transform seismic velocities to directly observed RMR values. The initial spatial distribution of RMR, inferred from the boreholes, was updated by including geophysical survey data in a co-kriging approach. The method applied to a real tunnel project shows significant improvements in rock mass quality predictions after including geophysical survey data, leading to better decision-making for construction safety design.

  17. A survey on the task analysis methods and techniques for nuclear power plant operators

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yong Heui; Chun, Se Woo; Suh, Sang Moon; Lee, Jung Woon [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1994-04-01

    We have surveyed techniques and methods of task analysis from very traditional ones to recently developed ones that are being applicated to various industrial fields. We compare each other and analyse their fundamental characteristics and methodological specification in order to find a proper one enough to apply to nuclear power plant operators tasks. Generally, the fundamental process of task analyses has well been understandable, but its process of application in practice has not been so simple due to the wide and varying range of applications according to specific domain. Operators` tasks in NPPs are supposed to be performed strictly according to operational procedures written in a text and well trained, so the method of task analysis for operators` tasks in NPPs can be established to have its unique characteristics of task analysis based on the operational procedures. 8 figs., 10 tabs., 18 refs. (Author).

  18. A survey on the task analysis methods and techniques for nuclear power plant operators

    International Nuclear Information System (INIS)

    Lee, Yong Heui; Chun, Se Woo; Suh, Sang Moon; Lee, Jung Woon

    1994-04-01

    We have surveyed techniques and methods of task analysis from very traditional ones to recently developed ones that are being applicated to various industrial fields. We compare each other and analyse their fundamental characteristics and methodological specification in order to find a proper one enough to apply to nuclear power plant operators tasks. Generally, the fundamental process of task analyses has well been understandable, but its process of application in practice has not been so simple due to the wide and varying range of applications according to specific domain. Operators' tasks in NPPs are supposed to be performed strictly according to operational procedures written in a text and well trained, so the method of task analysis for operators' tasks in NPPs can be established to have its unique characteristics of task analysis based on the operational procedures. 8 figs., 10 tabs., 18 refs. (Author)

  19. Methods for solving reasoning problems in abstract argumentation – A survey

    Science.gov (United States)

    Charwat, Günther; Dvořák, Wolfgang; Gaggl, Sarah A.; Wallner, Johannes P.; Woltran, Stefan

    2015-01-01

    Within the last decade, abstract argumentation has emerged as a central field in Artificial Intelligence. Besides providing a core formalism for many advanced argumentation systems, abstract argumentation has also served to capture several non-monotonic logics and other AI related principles. Although the idea of abstract argumentation is appealingly simple, several reasoning problems in this formalism exhibit high computational complexity. This calls for advanced techniques when it comes to implementation issues, a challenge which has been recently faced from different angles. In this survey, we give an overview on different methods for solving reasoning problems in abstract argumentation and compare their particular features. Moreover, we highlight available state-of-the-art systems for abstract argumentation, which put these methods to practice. PMID:25737590

  20. An enhanced sine dwell method as applied to the Galileo core structure modal survey

    Science.gov (United States)

    Smith, Kenneth S.; Trubert, Marc

    1990-01-01

    An incremental modal survey performed in 1988 on the core structure of the Galileo spacecraft with its adapters with the purpose of assessing the dynamics of the new portions of the structure is considered. Emphasis is placed on the enhancements of the sine dwell method employed in the test. For each mode, response data is acquired at 32 frequencies in a narrow band enclosing the resonance, utilizing the SWIFT technique. It is pointed out that due to the simplicity of the data processing involved, the diagnostic and modal-parameter data is available within several minutes after data acquisition; however, compared with straight curve-fitting approaches, the method requires more time for data acquisition.

  1. Study on Developments in Accident Investigation Methods: A Survey of the 'State-of-the-Art'

    International Nuclear Information System (INIS)

    Hollnagel, Erik; Speziali, Josephine

    2008-01-01

    The objective of this project was to survey the main accident investigation methods that have been developed since the early or mid-1990s. The motivation was the increasing frequency of accidents that defy explanations in simple terms, for instance cause-effect chains or 'human error'. Whereas the complexity of socio-technical systems is steadily growing across all industrial domains, including nuclear power production, accident investigation methods are only updated when their inability to account for novel types of accidents and incidents becomes inescapable. Accident investigation methods therefore typically lag behind the socio-technological developments by 20 years or more. The project first compiled a set of methods from the recognised scientific literature and in major major research and development programs, excluding methods limited to risk assessment, technological malfunctions, human reliability, and safety management methods. An initial set of 21 methods was further reduced to seven by retaining only prima facie accident investigation methods and avoiding overlapping or highly similar methods. The second step was to develop a set of criteria used to characterise the methods. The starting point was Perrow's description of normal accidents in socio-technical systems, which used the dimensions of coupling, going from loose to tight, and interactions, going from linear to complex. For practical reasons, the second dimension was changed to that of tractability or how easy it is to describe the system, where the sub-criteria are the level of detail, the availability of an articulated model, and the system dynamics. On this basis the seven selected methods were characterised in terms of the systems - or conditions - they could account for, leading to the following four groups: methods suitable for systems that are loosely coupled and tractable, methods suitable for systems that are tightly coupled and tractable, methods suitable for systems that are loosely

  2. Survey of sterile admixture practices in canadian hospital pharmacies: part 1. Methods and results.

    Science.gov (United States)

    Warner, Travis; Nishi, Cesilia; Checkowski, Ryan; Hall, Kevin W

    2009-03-01

    The 1996 Guidelines for Preparation of Sterile Products in Pharmacies of the Canadian Society of Hospital Pharmacists (CSHP) represent the current standard of practice for sterile compounding in Canada. However, these guidelines are practice recommendations, not enforceable standards. Previous surveys of sterile compounding practices have shown that actual practice deviates markedly from voluntary practice recommendations. In 2004, the United States Pharmacopeia (USP) published its "General Chapter Pharmaceutical Compounding-Sterile Preparations", which set a more rigorous and enforceable standard for sterile compounding in the United States. To assess sterile compounding practices in Canadian hospital pharmacies and to compare them with current CSHP recommendations and USP chapter standards. An online survey, based on previous studies of sterile compounding practices, the CSHP guidelines, and the chapter standards, was created and distributed to 193 Canadian hospital pharmacies. A total of 133 pharmacies completed at least part of the survey, for a response rate of 68.9%. All respondents reported the preparation of sterile products. Various degrees of deviation from the practice recommendations were noted for virtually all areas of the CSHP guidelines and the USP standards. Low levels of compliance were most notable in the areas of facilities and equipment, process validation, and product testing. Availability in the central pharmacy of a clean room facility meeting or exceeding the criteria of International Organization for Standardization (ISO) class 8 is a requirement of the chapter standards, but more than 40% of responding pharmacies reported that they did not have such a facility. Higher levels of compliance were noted for policies and procedures, garbing requirements, aseptic technique, and handling of hazardous products. Part 1 of this series reports the survey methods and results relating to policies, personnel, raw materials, storage and handling

  3. Interest of LQAS method in a survey of HTLV-I infection in Benin (West Africa).

    Science.gov (United States)

    Houinato, Dismand; Preux, Pierre-Marie; Charriere, Bénédicte; Massit, Bruno; Avodé, Gilbert; Denis, François; Dumas, Michel; Boutros-Toni, Fernand; Salamon, Roger

    2002-02-01

    HTLV-I is heterogeneously distributed in Sub-Saharan Africa. Traditional survey methods as cluster sampling could provide information for a country or region of interest. However, they cannot identify small areas with higher prevalences of infection to help in the health policy planning. Identification of such areas could be done by a Lot Quality Assurance Sampling (LQAS) method, which is currently used in industry to identify a poor performance in assembly lines. The LQAS method was used in Atacora (Northern Benin) between March and May 1998 to identify areas with a HTLV-I seroprevalence higher than 4%. Sixty-five subjects were randomly selected in each of 36 communes (lots) of this department. Lots were classified as unacceptable when the sample contained at least one positive subject. The LQAS method identified 25 (69.4 %) communes with a prevalence higher than 4%. Using stratified sampling theory, the overall HTLV-I seroprevalence was 4.5% (95% CI: 3.6-5.4%). These data show the interest of LQAS method application under field conditions to detect clusters of infection.

  4. Men who have sex with men in Great Britain: comparing methods and estimates from probability and convenience sample surveys.

    Science.gov (United States)

    Prah, Philip; Hickson, Ford; Bonell, Chris; McDaid, Lisa M; Johnson, Anne M; Wayal, Sonali; Clifton, Soazig; Sonnenberg, Pam; Nardone, Anthony; Erens, Bob; Copas, Andrew J; Riddell, Julie; Weatherburn, Peter; Mercer, Catherine H

    2016-09-01

    To examine sociodemographic and behavioural differences between men who have sex with men (MSM) participating in recent UK convenience surveys and a national probability sample survey. We compared 148 MSM aged 18-64 years interviewed for Britain's third National Survey of Sexual Attitudes and Lifestyles (Natsal-3) undertaken in 2010-2012, with men in the same age range participating in contemporaneous convenience surveys of MSM: 15 500 British resident men in the European MSM Internet Survey (EMIS); 797 in the London Gay Men's Sexual Health Survey; and 1234 in Scotland's Gay Men's Sexual Health Survey. Analyses compared men reporting at least one male sexual partner (past year) on similarly worded questions and multivariable analyses accounted for sociodemographic differences between the surveys. MSM in convenience surveys were younger and better educated than MSM in Natsal-3, and a larger proportion identified as gay (85%-95% vs 62%). Partner numbers were higher and same-sex anal sex more common in convenience surveys. Unprotected anal intercourse was more commonly reported in EMIS. Compared with Natsal-3, MSM in convenience surveys were more likely to report gonorrhoea diagnoses and HIV testing (both past year). Differences between the samples were reduced when restricting analysis to gay-identifying MSM. National probability surveys better reflect the population of MSM but are limited by their smaller samples of MSM. Convenience surveys recruit larger samples of MSM but tend to over-represent MSM identifying as gay and reporting more sexual risk behaviours. Because both sampling strategies have strengths and weaknesses, methods are needed to triangulate data from probability and convenience surveys. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  5. Effectiveness of narcotics anonymous training programs in personality characters in substance abuse patients

    Directory of Open Access Journals (Sweden)

    Namat Sotodeh Asl

    2013-03-01

    Full Text Available Introduction: Substance abuse is one of the most common disorders that exert a high impact on the life of patients and their families. There are many treatment methods for Addiction. The purpose of the present study was to determine the effects of narcotics anonymous (NA program on personality characters in substance abuse patients.Materials and Methods: This quasi experimental design was performed on 100 patients with substance abuse disorders that they had been randomly selected from those patients who were referred to psychiatric clinics and counseling centers in Esfehan in 2008. Then, the subjects were equally divided into two groups; experimental and control. All the patients carried out Eysenk test prior to any intervention and also a demographic questionnaire were filled out by all the subjects. Then, Eysenk test was performed on all the patients following the intervention. Changing in personality character in the experimental group (before and after the intervention was compared with those of the control group. Results: The findings showed that narcotic program has significant effects on personality characters of experimental group to substance abuse in post test, but these effects are not significant in control group.Conclusion: According to the findings of this work, we suggest the effectiveness of NA program in changing personality characters of the patients with substance abuse

  6. Assessment Role of Participation in Narcotic Anonymous in Opiate Dependents during Abstinence

    Directory of Open Access Journals (Sweden)

    Hossien Zare

    2012-09-01

    Full Text Available Background: The activity level of Narcotics Anonymous group (NA is expanding in many countries, including Iran. Some research has confessed the benefits of 12-step NA approach compared with similar methods. In the present study, the role of regular participation of opioid addicts in the NA group was studied in terms of abstinence rate and compared with routine program of detoxification centers of the person Welfare Organization and Medical Sciences University. Materials and Methods: All addicts who attempted to quit in self-introducer clinical centers of Medical Sciences University and the Welfare Organization of Rafsanjan were suggested to participate and not to participate in NA, based on even and odd numbers, respectively. Among them, two equal 120-person (NA and control groups were selected, then evaluated every three months and followed up for 12 months. Their status was assessed through questionnaires, interviews, and morphine tests.Results: The purity rate of NA group with 8.49 months was significantly different with normal addicts in 5.19 months (p=0.001. The recurrence rate at 12 months was significantly lower in the NA group compared with the control group, calculated through independent t-test (p=0.001. Quitting history and addiction duration in the NA group was significantly higher than control group.Conclusion: The findings of the research support a better prognosis for participants of NA group. Further researches are recommended to provide useful clinical information for patients and professionals.

  7. Personality Patterns in Narcotics Anonymous Members versus Individuals with Addiction Receiving Methadone Maintenance Therapy.

    Science.gov (United States)

    Akhondzadeh, Shahin; Shabrang, Moslem; Rezaei, Omid; Rezaei, Farzin

    2014-07-01

    Therapeutic interventions can be classified into two distinct approaches: abstinent and maintenance method. Currently, there are no clear criteria for referring addicted patients to one of these modalities. We aimed to compare the personality characteristics of individuals with addiction who attended narcotics anonymous sessions with those who received methadone maintenance therapy. This was a cross- sectional study. The participants were NA members and patients who were undergoing methadone maintenance treatment in outpatient clinics. Using the randomized cluster sampling method, 200 individuals with opioid dependence were selected (each group 100 persons). Data were collected through a demographic questionnaire and the five-factor personality inventory (NEO-FFI). Comparison of the mean scores of NEO-PPI in the two groups was performed by independent t test, and qualitative variables were compared using the Chi-square test. We found a significant difference between the MMT and NA groups with respect to neuroticism, extroversion, and agreeableness. No significant difference was found in the subscales of conscientious and openness. People who regularly attended the NA sessions had lower neuroticism and higher agreeableness than patients who were under the maintenance modality. Whether this is the cause or effect of attending NA sessions requires future large-scale cohort studies.

  8. Personality Patterns in Narcotics Anonymous Members versus Individuals with Addiction Receiving Methadone Maintenance Therapy.

    Directory of Open Access Journals (Sweden)

    Shahin Akhondzadeh

    2014-09-01

    Full Text Available Therapeutic interventions can be classified into two distinct approaches: abstinent and maintenance method. Currently, there are no clear criteria for referring addicted patients to one of these modalities. We aimed to compare the personality characteristics of individuals with addiction who attended narcotics anonymous sessions with those who received methadone maintenance therapy.This was a cross- sectional study. The participants were NA members and patients who were undergoing methadone maintenance treatment in outpatient clinics. Using the randomized cluster sampling method, 200 individuals with opioid dependence were selected (each group 100 persons. Data were collected through a demographic questionnaire and the five-factor personality inventory (NEO-FFI. Comparison of the mean scores of NEO-PPI in the two groups was performed by independent t test, and qualitative variables were compared using the Chi-square test.We found a significant difference between the MMT and NA groups with respect to neuroticism, extroversion, and agreeableness. No significant difference was found in the subscales of conscientious and openness.People who regularly attended the NA sessions had lower neuroticism and higher agreeableness than patients who were under the maintenance modality. Whether this is the cause or effect of attending NA sessions requires future large-scale cohort studies.

  9. Structural dynamics in LMFBR containment analysis. A brief survey of computational methods and codes

    International Nuclear Information System (INIS)

    Chang, Y.W.

    1977-01-01

    This paper gives a brief survey of the computational methods and codes available for LMFBR containment analysis. The various numerical methods commonly used in the computer codes are compared. It provides the reactor engineers to up-to-date information on the development of structural dynamics in LMFBR containment analysis. It can also be used as a basis for the selection of the numerical method in the future code development. First, the commonly used finite-difference expressions in the Lagrangian codes will be compared. Sample calculations will be used as a basis for discussing and comparing the accuracy of the various finite-difference representations. The distortion of the meshes will also be compared; the techniques used for eliminating the numerical instabilities will be discussed and compared using examples. Next, the numerical methods used in the Eulerian formulation will be compared, first among themselves and then with the Lagrangian formulations. Special emphasis is placed on the effect of mass diffusion of the Eulerian calculation on the propagation of discontinuities. Implicit and explicit numerical integrations will be discussed and results obtained from these two techniques will be compared. Then, the finite-element methods are compared with the finite-difference methods. The advantages and disadvantages of the two methods will be discussed in detail, together with the versatility and ease of application of the method to containment analysis having complex geometries. It will also be shown that the finite-element equations for a constant-pressure fluid element is identical to the finite-difference equations using contour integrations. Finally, conclusions based on this study will be given

  10. A detailed survey of numerical methods for unconstrained minimization. Pt. 1

    International Nuclear Information System (INIS)

    Mika, K.; Chaves, T.

    1980-01-01

    A detailed description of numerical methods for unconstrained minimization is presented. This first part surveys in particular conjugate direction and gradient methods, whereas variable metric methods will be the subject of the second part. Among the results of special interest we quote the following. The conjugate direction methods of Powell, Zangwill and Sutti can be best interpreted if the Smith approach is adopted. The conditions for quadratic termination of Powell's first procedure are analyzed. Numerical results based on nonlinear least squares problems are presented for the following conjugate direction codes: VA04AD from Harwell Subroutine Library and ZXPOW from IMSL, both implementations of Powell's second procedure, DFMND from IBM-SILMATH (Zangwill's method) and Brent's algorithm PRAXIS. VA04AD turns out to be superior in all cases, PRAXIS improves for high-dimensional problems. All codes clearly exhibit superlinear convergence. Akaike's result for the method of steepest descent is derived directly from a set of nonlinear recurrence relations. Numerical results obtained with the highly ill conditioned Hilbert function confirm the theoretical predictions. Several properties of the conjugate gradient method are presented and a new derivation of the equivalence of steepest descent partan and the CG method is given. A comparison of numerical results from the CG codes VA08AD (Fletcher-Reeves), DFMCG (the SSP version of the Fletcher-Reevens algorithm) and VA14AD (Powell's implementation of the Polak-Ribiere formula) reveals that VA14AD is clearly superior in all cases, but that the convergence rate of these codes is only weakly superlinear such that high accuracy solutions require extremely large numbers of function calls. (orig.)

  11. Comparison of Health Examination Survey Methods in Brazil, Chile, Colombia, Mexico, England, Scotland, and the United States.

    Science.gov (United States)

    Mindell, Jennifer S; Moody, Alison; Vecino-Ortiz, Andres I; Alfaro, Tania; Frenz, Patricia; Scholes, Shaun; Gonzalez, Silvia A; Margozzini, Paula; de Oliveira, Cesar; Sanchez Romero, Luz Maria; Alvarado, Andres; Cabrera, Sebastián; Sarmiento, Olga L; Triana, Camilo A; Barquera, Simón

    2017-09-15

    Comparability of population surveys across countries is key to appraising trends in population health. Achieving this requires deep understanding of the methods used in these surveys to examine the extent to which the measurements are comparable. In this study, we obtained detailed protocols of 8 nationally representative surveys from 2007-2013 from Brazil, Chile, Colombia, Mexico, the United Kingdom (England and Scotland), and the United States-countries that that differ in economic and inequity indicators. Data were collected on sampling frame, sample selection procedures, recruitment, data collection methods, content of interview and examination modules, and measurement protocols. We also assessed their adherence to the World Health Organization's "STEPwise Approach to Surveillance" framework for population health surveys. The surveys, which included half a million participants, were highly comparable on sampling methodology, survey questions, and anthropometric measurements. Heterogeneity was found for physical activity questionnaires and biological samples collection. The common age range included by the surveys was adults aged 18-64 years. The methods used in these surveys were similar enough to enable comparative analyses of the data across the 7 countries. This comparability is crucial in assessing and comparing national and subgroup population health, and to assisting the transfer of research and policy knowledge across countries. © The Author(s) 2017. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  12. Impact on and use of an inner-city London Infectious Diseases Department by international migrants: a questionnaire survey

    OpenAIRE

    Cooke, Graham; Hargreaves, Sally; Natkunarajah, Jana; Sandhu, Gurjinder; Dhasmana, Devesh; Eliahoo, Joseph; Holmes, Alison; Friedland, Jon S

    2007-01-01

    Abstract Background The UK has witnessed a considerable increase in immigration in the past decade. Migrant may face barriers to accessing appropriate health care on arrival and the current focus on screening certain migrants for tuberculosis on arrival is considered inadequate. We assessed the implications for an inner-city London Infectious Diseases Department in a high migrant area. Methods We administered an anonymous 20-point questionnaire survey to all admitted patients during a 6 week ...

  13. Survey of meshless and generalized finite element methods: A unified approach

    Science.gov (United States)

    Babuška, Ivo; Banerjee, Uday; Osborn, John E.

    In the past few years meshless methods for numerically solving partial differential equations have come into the focus of interest, especially in the engineering community. This class of methods was essentially stimulated by difficulties related to mesh generation. Mesh generation is delicate in many situations, for instance, when the domain has complicated geometry; when the mesh changes with time, as in crack propagation, and remeshing is required at each time step; when a Lagrangian formulation is employed, especially with nonlinear PDEs. In addition, the need for flexibility in the selection of approximating functions (e.g., the flexibility to use non-polynomial approximating functions), has played a significant role in the development of meshless methods. There are many recent papers, and two books, on meshless methods; most of them are of an engineering character, without any mathematical analysis.In this paper we address meshless methods and the closely related generalized finite element methods for solving linear elliptic equations, using variational principles. We give a unified mathematical theory with proofs, briefly address implementational aspects, present illustrative numerical examples, and provide a list of references to the current literature.The aim of the paper is to provide a survey of a part of this new field, with emphasis on mathematics. We present proofs of essential theorems because we feel these proofs are essential for the understanding of the mathematical aspects of meshless methods, which has approximation theory as a major ingredient. As always, any new field is stimulated by and related to older ideas. This will be visible in our paper.

  14. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  15. Methods and introductory results of the Greek national health and nutrition survey - HYDRIA

    Directory of Open Access Journals (Sweden)

    Georgia Martimianaki

    2018-06-01

    Full Text Available Background:  According to a large prospective cohort study (with baseline examination in the 1990s and smaller studies that followed, the population in Greece has been gradually deprived of the favorable morbidity and mortality indices recorded in the 1960s. The HYDRIA survey conducted in 2013-14 is the first nationally representative survey, which collected data related to the health and nutrition of the population in Greece. Methods: The survey sample consists of 4011 males (47% and females aged 18 years and over. Data collection included interviewer-administered questionnaires on personal characteristics, lifestyle choices, dietary habits and medical history; measurements of somatometry and blood pressure; and, blood drawing. Weighting factors were applied to ensure national representativeness of results. Results: Three out of five adults in Greece reported suffering of a chronic disease, with diabetes mellitus and chronic depression being the more frequent ones among older individuals. The population is also experiencing an overweight/obesity epidemic, since seven out of 10 adults are either overweight or obese. In addition, 40% of the population bears indications of hypertension. Smoking is still common and among women the prevalence was higher in younger age groups. Social disparities were observed in the prevalence of chronic diseases and mortality risk factors (hypertension, obesity, impaired lipid profile and high blood glucose levels. Conclusion: Excess body weight, hypertension, the smoking habit and the population’s limited physical activity are the predominant challenges that public health officials have to deal with in formulating policies and designing actions for the population in Greece.

  16. A review of neutron scattering correction for the calibration of neutron survey meters using the shadow cone method

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sang In; Kim, Bong Hwan; Kim, Jang Lyul; Lee, Jung Il [Health Physics Team, Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2015-12-15

    The calibration methods of neutron-measuring devices such as the neutron survey meter have advantages and disadvantages. To compare the calibration factors obtained by the shadow cone method and semi-empirical method, 10 neutron survey meters of five different types were used in this study. This experiment was performed at the Korea Atomic Energy Research Institute (KAERI; Daejeon, South Korea), and the calibration neutron fields were constructed using a {sup 252}Californium ({sup 252}Cf) neutron source, which was positioned in the center of the neutron irradiation room. The neutron spectra of the calibration neutron fields were measured by a europium-activated lithium iodide scintillator in combination with KAERI's Bonner sphere system. When the shadow cone method was used, 10 single moderator-based survey meters exhibited a smaller calibration factor by as much as 3.1 - 9.3% than that of the semi-empirical method. This finding indicates that neutron survey meters underestimated the scattered neutrons and attenuated neutrons (i.e., the total scatter corrections). This underestimation of the calibration factor was attributed to the fact that single moderator-based survey meters have an under-ambient dose equivalent response in the thermal or thermal-dominant neutron field. As a result, when the shadow cone method is used for a single moderator-based survey meter, an additional correction and the International Organization for Standardization standard 8529-2 for room-scattered neutrons should be considered.

  17. A review of neutron scattering correction for the calibration of neutron survey meters using the shadow cone method

    International Nuclear Information System (INIS)

    Kim, Sang In; Kim, Bong Hwan; Kim, Jang Lyul; Lee, Jung Il

    2015-01-01

    The calibration methods of neutron-measuring devices such as the neutron survey meter have advantages and disadvantages. To compare the calibration factors obtained by the shadow cone method and semi-empirical method, 10 neutron survey meters of five different types were used in this study. This experiment was performed at the Korea Atomic Energy Research Institute (KAERI; Daejeon, South Korea), and the calibration neutron fields were constructed using a 252 Californium ( 252 Cf) neutron source, which was positioned in the center of the neutron irradiation room. The neutron spectra of the calibration neutron fields were measured by a europium-activated lithium iodide scintillator in combination with KAERI's Bonner sphere system. When the shadow cone method was used, 10 single moderator-based survey meters exhibited a smaller calibration factor by as much as 3.1 - 9.3% than that of the semi-empirical method. This finding indicates that neutron survey meters underestimated the scattered neutrons and attenuated neutrons (i.e., the total scatter corrections). This underestimation of the calibration factor was attributed to the fact that single moderator-based survey meters have an under-ambient dose equivalent response in the thermal or thermal-dominant neutron field. As a result, when the shadow cone method is used for a single moderator-based survey meter, an additional correction and the International Organization for Standardization standard 8529-2 for room-scattered neutrons should be considered

  18. Technical errors in complete mouth radiographic survey according to radiographic techniques and film holding methods

    International Nuclear Information System (INIS)

    Choi, Karp Sik; Byun, Chong Soo; Choi, Soon Chul

    1986-01-01

    The purpose of this study was to investigate the numbers and causes of retakes in 300 complete mouth radiographic surveys made by 75 senior dental students. According to radiographic techniques and film holding methods, they were divided into 4 groups: Group I: Bisecting-angle technique with patient's fingers. Group II: Bisecting-angle technique with Rinn Snap-A-Ray device. Group III: Bisecting-angle technique with Rinn XCP instrument (short cone) Group IV: Bisecting-angle technique with Rinn XCP instrument (long cone). The most frequent cases of retakes, the most frequent tooth area examined, of retakes and average number of retakes per complete mouth survey were evaluated. The obtained results were as follows: Group I: Incorrect film placement (47.8), upper canine region, and 0.89. Group II: Incorrect film placement (44.0), upper canine region, and 1.12. Group III: Incorrect film placement (79.2), upper canine region, and 2.05. Group IV: Incorrect film placement (67.7), upper canine region, and 1.69.

  19. Use of methods for specifying the target difference in randomised controlled trial sample size calculations: Two surveys of trialists' practice.

    Science.gov (United States)

    Cook, Jonathan A; Hislop, Jennifer M; Altman, Doug G; Briggs, Andrew H; Fayers, Peter M; Norrie, John D; Ramsay, Craig R; Harvey, Ian M; Vale, Luke D

    2014-06-01

    Central to the design of a randomised controlled trial (RCT) is a calculation of the number of participants needed. This is typically achieved by specifying a target difference, which enables the trial to identify a difference of a particular magnitude should one exist. Seven methods have been proposed for formally determining what the target difference should be. However, in practice, it may be driven by convenience or some other informal basis. It is unclear how aware the trialist community is of these formal methods or whether they are used. To determine current practice regarding the specification of the target difference by surveying trialists. Two surveys were conducted: (1) Members of the Society for Clinical Trials (SCT): participants were invited to complete an online survey through the society's email distribution list. Respondents were asked about their awareness, use of, and willingness to recommend methods; (2) Leading UK- and Ireland-based trialists: the survey was sent to UK Clinical Research Collaboration registered Clinical Trials Units, Medical Research Council UK Hubs for Trial Methodology Research, and the Research Design Services of the National Institute for Health Research. This survey also included questions about the most recent trial developed by the respondent's group. Survey 1: Of the 1182 members on the SCT membership email distribution list, 180 responses were received (15%). Awareness of methods ranged from 69 (38%) for health economic methods to 162 (90%) for pilot study. Willingness to recommend among those who had used a particular method ranged from 56% for the opinion-seeking method to 89% for the review of evidence-base method. Survey 2: Of the 61 surveys sent out, 34 (56%) responses were received. Awareness of methods ranged from 33 (97%) for the review of evidence-base and pilot methods to 14 (41%) for the distribution method. The highest level of willingness to recommend among users was for the anchor method (87%). Based upon

  20. The discussion of method for survey the radiosensitivity of human glioma cell line SHG-44

    International Nuclear Information System (INIS)

    Li Li; Xu Changshao; Zhou Juying; Xu Xiaoting; Luo Jialin

    2005-01-01

    Objective: To investigate if thiazolyl blue colorimetric assay (MTT) and cell counting kit-8 (CCK-8) can replace clone forming assay for survey the radiosensitivity of SHG-44. Methods; Three assays was applied to examine the growth inhibition of human glioma cell line SHG-44 in eight dose groups of 0, 1, 2, 3, 4, 6, 8 and 10 Gy, and statistical research was applied to analyze the correlation between survival fraction and various doses. Results: Dose was associated with survival fraction in these three assays at some range of irradiation doseage (dose≤3 Gy). If out of the range, the relation is poor. CCK-8 has no rather superiority than MTT. Conclusion: By now clone forming assay is still the 'gold standard'. In some cases, MTT and other assays can give us some reference, but these assays still can not replace clone forming assay. (authors)

  1. Application of Classical Land Surveying Measurement Methods for Determining the Vertical Displacement of Railway Bridges

    Science.gov (United States)

    Gawronek, Pelagia; Makuch, Maria

    2017-12-01

    The classical measurements of stability of railway bridge, in the context of determining the vertical displacements of the object, consisted on precise leveling of girders and trigonometric leveling of controlled points (fixed into girders' surface). The construction elements, which were measured in two ways, in real terms belonged to the same vertical planes. Altitude measurements of construction were carried out during periodic structural stability tests and during static load tests of bridge by train. The specificity of displacement measurements, the type of measured object and the rail land surveying measurement conditions were determinants to define methodology of altitude measurement. The article presents compatibility of vertical displacements of steel railway bridge, which were developed in two measurement methods. In conclusion, the authors proposed the optimum concept of determining the vertical displacements of girders by using precise and trigonometric leveling (in terms of accuracy, safety and economy of measurement).

  2. Application of Classical Land Surveying Measurement Methods for Determining the Vertical Displacement of Railway Bridges

    Directory of Open Access Journals (Sweden)

    Gawronek Pelagia

    2017-12-01

    Full Text Available The classical measurements of stability of railway bridge, in the context of determining the vertical displacements of the object, consisted on precise leveling of girders and trigonometric leveling of controlled points (fixed into girders' surface. The construction elements, which were measured in two ways, in real terms belonged to the same vertical planes. Altitude measurements of construction were carried out during periodic structural stability tests and during static load tests of bridge by train. The specificity of displacement measurements, the type of measured object and the rail land surveying measurement conditions were determinants to define methodology of altitude measurement. The article presents compatibility of vertical displacements of steel railway bridge, which were developed in two measurement methods. In conclusion, the authors proposed the optimum concept of determining the vertical displacements of girders by using precise and trigonometric leveling (in terms of accuracy, safety and economy of measurement.

  3. Psychosocial factors related to gambling abstinence and relapse in members of gamblers anonymous.

    Science.gov (United States)

    Oei, Tian P S; Gordon, Leon M

    2008-03-01

    Problem gamblers account for almost one-third of the industry's total revenue with the adverse effects of problem gambling including significant financial loss, legal and occupational difficulties, family problems, psychological distress and suicide. As such, it is important to understand the influential factors in gambling abstinence and relapse, which will assist in the development of relapse prevention methods in therapeutic treatment regimes. This paper reported the role of a set of seven predictors in distinguishing between abstinent and relapsed gamblers among 75 Gambling Anonymous (GA) members (55 males; 20 females; Mean age 45 years) in Southeast Queensland. The measures taken were meeting Attendance and Participation, Social Support, God Belief, Belief in a Higher Power, Working the 12-steps of Recovery, Gambling Urges and Erroneous Cognitions. Discriminant analysis revealed that the variables separating the two groups were significant, suggesting that GA members achieving abstinence could be distinguished from those who relapsed, with Attendance and Participation, and Social Support contributing the greatest influence on member's ability to abstain from gambling. The findings suggested that GA member's involvement in meetings, and support from family and friends had significant impact on their gambling abstinence. In contrast, increased gambling urges and erroneous cognitions increased the chance of relapse.

  4. Cardinality Estimation Algorithm in Large-Scale Anonymous Wireless Sensor Networks

    KAUST Repository

    Douik, Ahmed

    2017-08-30

    Consider a large-scale anonymous wireless sensor network with unknown cardinality. In such graphs, each node has no information about the network topology and only possesses a unique identifier. This paper introduces a novel distributed algorithm for cardinality estimation and topology discovery, i.e., estimating the number of node and structure of the graph, by querying a small number of nodes and performing statistical inference methods. While the cardinality estimation allows the design of more efficient coding schemes for the network, the topology discovery provides a reliable way for routing packets. The proposed algorithm is shown to produce a cardinality estimate proportional to the best linear unbiased estimator for dense graphs and specific running times. Simulation results attest the theoretical results and reveal that, for a reasonable running time, querying a small group of nodes is sufficient to perform an estimation of 95% of the whole network. Applications of this work include estimating the number of Internet of Things (IoT) sensor devices, online social users, active protein cells, etc.

  5. A Survey of tooth morphology teaching methods employed in the United Kingdom and Ireland.

    Science.gov (United States)

    Lone, M; McKenna, J P; Cryan, J F; Downer, E J; Toulouse, A

    2018-01-15

    Tooth morphology is a central component of the dental curriculum and is applicable to all dental specialities. Traditional teaching methods are being supplemented with innovative strategies to tailor teaching and accommodate the learning styles of the recent generation of students. An online survey was compiled and distributed to the staff involved in teaching tooth morphology in the United Kingdom and Ireland to assess the importance of tooth morphology in the dentistry curriculum and the methodologies employed in teaching. The results of the survey show that tooth morphology constitutes a small module in the dental curriculum. It is taught in the first 2 years of the dental curriculum but is applicable in the clinical years and throughout the dental career. Traditional teaching methods, lecture and practical, are being augmented with innovative teaching including e-learning via virtual learning environment, tooth atlas and e-books leading to blended learning. The majority of the schools teach both normal dental anatomy and morphologic variations of dental anatomy and utilise plastic teeth for practical and examination purposes. Learning the 3D aspects of tooth morphology was deemed important by most of the respondents who also agreed that tooth morphology is a difficult topic for the students. Despite being core to the dental curriculum, overall minimal time is dedicated to the delivery of tooth morphology, creating a reliance on the student to learn the material. New forms of delivery including computer-assisted learning tools should help sustain learning and previously acquired knowledge. © 2018 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  6. Dark Energy Survey Year 1 results: cross-correlation redshifts - methods and systematics characterization

    Science.gov (United States)

    Gatti, M.; Vielzeuf, P.; Davis, C.; Cawthon, R.; Rau, M. M.; DeRose, J.; De Vicente, J.; Alarcon, A.; Rozo, E.; Gaztanaga, E.; Hoyle, B.; Miquel, R.; Bernstein, G. M.; Bonnett, C.; Carnero Rosell, A.; Castander, F. J.; Chang, C.; da Costa, L. N.; Gruen, D.; Gschwend, J.; Hartley, W. G.; Lin, H.; MacCrann, N.; Maia, M. A. G.; Ogando, R. L. C.; Roodman, A.; Sevilla-Noarbe, I.; Troxel, M. A.; Wechsler, R. H.; Asorey, J.; Davis, T. M.; Glazebrook, K.; Hinton, S. R.; Lewis, G.; Lidman, C.; Macaulay, E.; Möller, A.; O'Neill, C. R.; Sommer, N. E.; Uddin, S. A.; Yuan, F.; Zhang, B.; Abbott, T. M. C.; Allam, S.; Annis, J.; Bechtol, K.; Brooks, D.; Burke, D. L.; Carollo, D.; Carrasco Kind, M.; Carretero, J.; Cunha, C. E.; D'Andrea, C. B.; DePoy, D. L.; Desai, S.; Eifler, T. F.; Evrard, A. E.; Flaugher, B.; Fosalba, P.; Frieman, J.; García-Bellido, J.; Gerdes, D. W.; Goldstein, D. A.; Gruendl, R. A.; Gutierrez, G.; Honscheid, K.; Hoormann, J. K.; Jain, B.; James, D. J.; Jarvis, M.; Jeltema, T.; Johnson, M. W. G.; Johnson, M. D.; Krause, E.; Kuehn, K.; Kuhlmann, S.; Kuropatkin, N.; Li, T. S.; Lima, M.; Marshall, J. L.; Melchior, P.; Menanteau, F.; Nichol, R. C.; Nord, B.; Plazas, A. A.; Reil, K.; Rykoff, E. S.; Sako, M.; Sanchez, E.; Scarpine, V.; Schubnell, M.; Sheldon, E.; Smith, M.; Smith, R. C.; Soares-Santos, M.; Sobreira, F.; Suchyta, E.; Swanson, M. E. C.; Tarle, G.; Thomas, D.; Tucker, B. E.; Tucker, D. L.; Vikram, V.; Walker, A. R.; Weller, J.; Wester, W.; Wolf, R. C.

    2018-06-01

    We use numerical simulations to characterize the performance of a clustering-based method to calibrate photometric redshift biases. In particular, we cross-correlate the weak lensing source galaxies from the Dark Energy Survey Year 1 sample with redMaGiC galaxies (luminous red galaxies with secure photometric redshifts) to estimate the redshift distribution of the former sample. The recovered redshift distributions are used to calibrate the photometric redshift bias of standard photo-z methods applied to the same source galaxy sample. We apply the method to two photo-z codes run in our simulated data: Bayesian Photometric Redshift and Directional Neighbourhood Fitting. We characterize the systematic uncertainties of our calibration procedure, and find that these systematic uncertainties dominate our error budget. The dominant systematics are due to our assumption of unevolving bias and clustering across each redshift bin, and to differences between the shapes of the redshift distributions derived by clustering versus photo-zs. The systematic uncertainty in the mean redshift bias of the source galaxy sample is Δz ≲ 0.02, though the precise value depends on the redshift bin under consideration. We discuss possible ways to mitigate the impact of our dominant systematics in future analyses.

  7. Optimizing Methods of Obtaining Stellar Parameters for the H3 Survey

    Science.gov (United States)

    Ivory, KeShawn; Conroy, Charlie; Cargile, Phillip

    2018-01-01

    The Stellar Halo at High Resolution with Hectochelle Survey (H3) is in the process of observing and collecting stellar parameters for stars in the Milky Way's halo. With a goal of measuring radial velocities for fainter stars, it is crucial that we have optimal methods of obtaining this and other parameters from the data from these stars.The method currently developed is The Payne, named after Cecilia Payne-Gaposchkin, a code that uses neural networks and Markov Chain Monte Carlo methods to utilize both spectra and photometry to obtain values for stellar parameters. This project was to investigate the benefit of fitting both spectra and spectral energy distributions (SED). Mock spectra using the parameters of the Sun were created and noise was inserted at various signal to noise values. The Payne then fit each mock spectrum with and without a mock SED also generated from solar parameters. The result was that at high signal to noise, the spectrum dominated and the effect of fitting the SED was minimal. But at low signal to noise, the addition of the SED greatly decreased the standard deviation of the data and resulted in more accurate values for temperature and metallicity.

  8. Contraception coverage and methods used among women in South Africa: A national household survey

    Directory of Open Access Journals (Sweden)

    M F Chersich

    2017-04-01

    Full Text Available Background. Globally, family planning services are being strengthened and the range of contraceptive choices expanded. Data on contraceptive coverage and service gaps could help to shape these initiatives. Objective. To assess contraception coverage in South Africa (SA and identify underserved populations and aspects of programming that require strengthening. Methods. Data from a 2012 SA household survey assessed contraception coverage among 6 296 women aged 15 - 49 years and identified underserved populations. Results. Two-thirds had an unintended pregnancy in the past 5 years, a quarter of which were contraceptive failures. Most knew of injectable (92.0% and oral contraception (89.9%, but fewer of intrauterine devices (56.1% and emergency contraception (47.3%. Contraceptive prevalence was 49.1%, and 41.8% women used modern non-barrier methods. About half had ever used injectable contraception. Contraception was lower in black Africans and younger women, who used a limited range of methods. Conclusion. Contraception coverage is higher than many previous estimates. Rates of unintended pregnancy, contraceptive failure and knowledge gaps, however, demonstrate high levels of unmet need, especially among black Africans and young women.

  9. Vision and Control for UAVs: A Survey of General Methods andof Inexpensive Platforms for Infrastructure Inspection

    Directory of Open Access Journals (Sweden)

    Koppány Máthé

    2015-06-01

    Full Text Available Unmanned aerial vehicles (UAVs have gained significant attention in recent years. Low-cost platforms using inexpensive sensor payloads have been shown to provide satisfactory flight and navigation capabilities. In this report, we survey vision and control methods that can be applied to low-cost UAVs, and we list some popular inexpensive platforms and application fields where they are useful. We also highlight the sensor suites used where this information is available. We overview, among others, feature detection and tracking, optical flow and visual servoing, low-level stabilization and high-level planning methods. We then list popular low-cost UAVs, selecting mainly quadrotors. We discuss applications, restricting our focus to the field of infrastructure inspection. Finally, as an example, we formulate two use-cases for railway inspection, a less explored application field, and illustrate the usage of the vision and control techniques reviewed by selecting appropriate ones to tackle these use-cases. To select vision methods, we run a thorough set of experimental evaluations.

  10. A Study for Optimum Survey Method of Underwater Structure Using the Dual Sonar Sensor

    Directory of Open Access Journals (Sweden)

    Youngseok Kim

    2017-01-01

    Full Text Available We have developed dual sonar equipment and an improved operating method for improving resolution in order to solve the problems of limitations of the optical equipment and the application method of SSS (side scan sonar in the investigation of damage of underwater structures. We analyzed the influence factors of the resolution of sonar data through the comparison of resolution and data quality in indoor test. Also we confirmed the problems about the overlapping area of the dual sonar. Depth and distance were analyzed as major influencing factors for survey angle. Specimens were scanned while adjusting distance and towfish angle according to depth change in order to verify applicability of the developed dual sonar in the field experiment. Optimal resolution was found to be 3 cm in specimen spacing, and 20 sample data items were extracted. We developed the regression model based on the multiple regression analysis and developed the RealDualSONAR-DAQ tool, the dual sonar optimum operating method program based on proposed correlation equations. We can use the developed tools to get the value of the major influencing factors for dual sonar operation and obtain high quality sonar data to analyze damage of underwater structures.

  11. Wet treatment of ashes, a survey of methods; Vaat rening av askor, metodoeversikt

    Energy Technology Data Exchange (ETDEWEB)

    Bjurstroem, Henrik [AaF-Energi och Miljoe AB, Stockhom (Sweden); Steenari, Britt-Marie [Chalmers Univ. of Technology, Goeteborg (Sweden)

    2003-10-01

    Ash contains elements and compounds that are questionable from an environmental point of view, such as very soluble salts, alkali yielding a high pH-value, metals, heavy metals and organic compounds. When ash is to be used, one requires that it is stable, i. e. that it does not influence the immediate surroundings and the environment in a negative way. Stability means that water that comes into contact with ash shall not pick up environmentally disruptive compounds to any significant extent. The presence of heavy metals in the ash does not always lead to their being leached to the surroundings, but it does always imply an uncertainty. It is probable that fly ash from incineration of municipal solid waste has to be treated in some way before it is landfilled. Washing the ash or dissolving it partially with a solvent such as water or an acid is a relatively simple method to reduce the risk for contamination of the environment by removing soluble compounds from the ash. Such methods consist of techniques that in other applications are proven and robust, and that may be adapted to the present conditions: the composition and the properties of the ash. In this report, a survey of methods is presented. Wet treatments may be apprehended as a combined separation and concentration process: on the one hand environmentally disruptive compounds are removed from ash, on the other hand these are concentrated in a remainder survival remission rate. These methods are a perfect pretreatment for various stabilization methods, a. o. thermal treatments such as vitrifying or sintering, or for utilization of the ashes e. g. in public works as they remove the obstacles to a good performance, namely the soluble salts. In this report are presented a systematic description of wet treatments aiming at purification and a survey of methods of industrial interest. A certain number of wet treatment methods are in operation outside Sweden, principally for fly ash from municipal solid waste

  12. Have "new" methods in medical education reached German-speaking Central Europe: a survey.

    Science.gov (United States)

    Fandler, Martin; Habersack, Marion; Dimai, Hans P

    2014-08-16

    Simulation-based-training (SBT) in the education of health professionals is discussed as an effective alternative for knowledge and skills enhancement as well as for the establishment of a secure learning environment, for learners and patients. In the Anglo-American region, SBT and simulation and training centers (STC) are numbered as standard for medical training. In German-speaking Central Europe, priority is still given to the establishment of SBT and STC. The purpose of this study was (i) to survey the status quo relating to the existence and facilities of simulation and training centers at medical universities in German-speaking Central Europe and (ii) the evaluation of training methods, especially in the area of emergency medicine skills. All public and private medical universities or medical faculties in Germany (36), Austria (4) and German-speaking Switzerland (3) were interviewed. In the survey, information regarding the existence and facilities of STCs and information with regards to the use of SBT in the area of emergency medicine was requested. The questions were partly posed in a closed-ended-, in an open-ended- and in a multiple choice format (with the possibility of selecting more than one answer). Of a total of 43 contacted medical universities/medical faculties, 40 ultimately participated in the survey. As decisive for the establishment of a STC the potential to improve the clinical-practical training and the demand by students were listed. Obligatory training in a STC during the first and sixth academic year was confirmed only by 12 institutions, before the first invasive procedure on patients by 17 institutions. 13 institutions confirmed the use of the STC for the further training of physicians and care-staff. Training for the acute care and emergency medicine skills in the field of pediatrics, for the most part, occurs decentralized. New methods in medical training have reached German-speaking Central Europe, but the simulation and training

  13. A survey on the human reliability analysis methods for the design of Korean next generation reactor

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yong Hee; Lee, J. W.; Park, J. C.; Kwack, H. Y.; Lee, K. Y.; Park, J. K.; Kim, I. S.; Jung, K. W

    2000-03-01

    Enhanced features through applying recent domestic technologies may characterize the safety and efficiency of KNGR(Korea Next Generation Reactor). Human engineered interface and control room environment are expected to be beneficial to the human aspects of KNGR design. However, since the current method for human reliability analysis is not up to date after THERP/SHARP, it becomes hard to assess the potential of human errors due to both of the positive and negative effect of the design changes in KNGR. This is a state of the art report on the human reliability analysis methods that are potentially available for the application to the KNGR design. We surveyed every technical aspects of existing HRA methods, and compared them in order to obtain the requirements for the assessment of human error potentials within KNGR design. We categorized the more than 10 methods into the first and the second generation according to the suggestion of Dr. Hollnagel. THERP was revisited in detail. ATHEANA proposed by US NRC for an advanced design and CREAM proposed by Dr. Hollnagel were reviewed and compared. We conclude that the key requirements might include the enhancement in the early steps for human error identification and the quantification steps with considerations of more extended error shaping factors over PSFs(performance shaping factors). The utilization of the steps and approaches of ATHEANA and CREAM will be beneficial to the attainment of an appropriate HRA method for KNGR. However, the steps and data from THERP will be still maintained because of the continuity with previous PSA activities in KNGR design.

  14. A survey on the human reliability analysis methods for the design of Korean next generation reactor

    International Nuclear Information System (INIS)

    Lee, Yong Hee; Lee, J. W.; Park, J. C.; Kwack, H. Y.; Lee, K. Y.; Park, J. K.; Kim, I. S.; Jung, K. W.

    2000-03-01

    Enhanced features through applying recent domestic technologies may characterize the safety and efficiency of KNGR(Korea Next Generation Reactor). Human engineered interface and control room environment are expected to be beneficial to the human aspects of KNGR design. However, since the current method for human reliability analysis is not up to date after THERP/SHARP, it becomes hard to assess the potential of human errors due to both of the positive and negative effect of the design changes in KNGR. This is a state of the art report on the human reliability analysis methods that are potentially available for the application to the KNGR design. We surveyed every technical aspects of existing HRA methods, and compared them in order to obtain the requirements for the assessment of human error potentials within KNGR design. We categorized the more than 10 methods into the first and the second generation according to the suggestion of Dr. Hollnagel. THERP was revisited in detail. ATHEANA proposed by US NRC for an advanced design and CREAM proposed by Dr. Hollnagel were reviewed and compared. We conclude that the key requirements might include the enhancement in the early steps for human error identification and the quantification steps with considerations of more extended error shaping factors over PSFs(performance shaping factors). The utilization of the steps and approaches of ATHEANA and CREAM will be beneficial to the attainment of an appropriate HRA method for KNGR. However, the steps and data from THERP will be still maintained because of the continuity with previous PSA activities in KNGR design

  15. A survey of variable selection methods in two Chinese epidemiology journals

    Directory of Open Access Journals (Sweden)

    Lynn Henry S

    2010-09-01

    Full Text Available Abstract Background Although much has been written on developing better procedures for variable selection, there is little research on how it is practiced in actual studies. This review surveys the variable selection methods reported in two high-ranking Chinese epidemiology journals. Methods Articles published in 2004, 2006, and 2008 in the Chinese Journal of Epidemiology and the Chinese Journal of Preventive Medicine were reviewed. Five categories of methods were identified whereby variables were selected using: A - bivariate analyses; B - multivariable analysis; e.g. stepwise or individual significance testing of model coefficients; C - first bivariate analyses, followed by multivariable analysis; D - bivariate analyses or multivariable analysis; and E - other criteria like prior knowledge or personal judgment. Results Among the 287 articles that reported using variable selection methods, 6%, 26%, 30%, 21%, and 17% were in categories A through E, respectively. One hundred sixty-three studies selected variables using bivariate analyses, 80% (130/163 via multiple significance testing at the 5% alpha-level. Of the 219 multivariable analyses, 97 (44% used stepwise procedures, 89 (41% tested individual regression coefficients, but 33 (15% did not mention how variables were selected. Sixty percent (58/97 of the stepwise routines also did not specify the algorithm and/or significance levels. Conclusions The variable selection methods reported in the two journals were limited in variety, and details were often missing. Many studies still relied on problematic techniques like stepwise procedures and/or multiple testing of bivariate associations at the 0.05 alpha-level. These deficiencies should be rectified to safeguard the scientific validity of articles published in Chinese epidemiology journals.

  16. The Preference for Internet-Based Psychological Interventions by Individuals Without Past or Current Use of Mental Health Treatment Delivered Online: A Survey Study With Mixed-Methods Analysis

    Science.gov (United States)

    Mattsson, Susanne; Olsson, Erik Martin Gustaf

    2016-01-01

    Background The use of the Internet has the potential to increase access to evidence-based mental health services for a far-reaching population at a low cost. However, low take-up rates in routine care indicate that barriers for implementing Internet-based interventions have not yet been fully identified. Objective The aim of this study was to evaluate the preference for Internet-based psychological interventions as compared to treatment delivered face to face among individuals without past or current use of mental health treatment delivered online. A further aim was to investigate predictors of treatment preference and to complement the quantitative analyses with qualitative data about the perceived advantages and disadvantages of Internet-based interventions. Methods Two convenience samples were used. Sample 1 was recruited in an occupational setting (n=231) and Sample 2 consisted of individuals previously treated for cancer (n=208). Data were collected using a paper-and-pencil survey and analyzed using mixed methods. Results The preference for Internet-based psychological interventions was low in both Sample 1 (6.5%) and Sample 2 (2.6%). Most participants preferred psychological interventions delivered face to face. Use of the Internet to search for and read health-related information was a significant predictor of treatment preference in both Sample 1 (odds ratio [OR] 2.82, 95% CI 1.18-6.75) and Sample 2 (OR 3.52, 95% CI 1.33-9.29). Being born outside of Sweden was a significant predictor of preference for Internet-based interventions, but only in Sample 2 (OR 6.24, 95% CI 1.29-30.16). Similar advantages and disadvantages were mentioned in both samples. Perceived advantages of Internet-based interventions included flexibility regarding time and location, low effort, accessibility, anonymity, credibility, user empowerment, and improved communication between therapist and client. Perceived disadvantages included anonymity, low credibility, impoverished

  17. Getting from neuron to checkmark: Models and methods in cognitive survey research

    NARCIS (Netherlands)

    Holleman, B.C.; Murre, J.M.J.

    2008-01-01

    Since the 1980s much work has been done in the field of Cognitive Survey Research. In an interdisciplinary endeavour, survey methodologists and cognitive psychologists (as well as social psychologists and linguists) have worked to unravel the cognitive processes underlying survey responses: to

  18. Internet, Phone, Mail, and Mixed-Mode Surveys: The Tailored Design Method, 4th Edition

    Science.gov (United States)

    Dillman, Don A.; Smyth, Jolene D.; Christian, Lean Melani

    2014-01-01

    For over two decades, Dillman's classic text on survey design has aided both students and professionals in effectively planning and conducting mail, telephone, and, more recently, Internet surveys. The new edition is thoroughly updated and revised, and covers all aspects of survey research. It features expanded coverage of mobile phones, tablets,…

  19. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    Science.gov (United States)

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  20. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ling Xiong

    2017-11-01

    Full Text Available Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  1. BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-12-01

    Full Text Available With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI as a distributed public ledger is also briefly described.

  2. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  3. Communication methods and production techniques in fixed prosthesis fabrication: a UK based survey. Part 2: Production techniques

    Science.gov (United States)

    Berry, J.; Nesbit, M.; Saberi, S.; Petridis, H.

    2014-01-01

    Aim The aim of this study was to identify the communication methods and production techniques used by dentists and dental technicians for the fabrication of fixed prostheses within the UK from the dental technicians' perspective. This second paper reports on the production techniques utilised. Materials and methods Seven hundred and eighty-two online questionnaires were distributed to the Dental Laboratories Association membership and included a broad range of topics, such as demographics, impression disinfection and suitability, and various production techniques. Settings were managed in order to ensure anonymity of respondents. Statistical analysis was undertaken to test the influence of various demographic variables such as the source of information, the location, and the size of the dental laboratory. Results The number of completed responses totalled 248 (32% response rate). Ninety percent of the respondents were based in England and the majority of dental laboratories were categorised as small sized (working with up to 25 dentists). Concerns were raised regarding inadequate disinfection protocols between dentists and dental laboratories and the poor quality of master impressions. Full arch plastic trays were the most popular impression tray used by dentists in the fabrication of crowns (61%) and bridgework (68%). The majority (89%) of jaw registration records were considered inaccurate. Forty-four percent of dental laboratories preferred using semi-adjustable articulators. Axial and occlusal under-preparation of abutment teeth was reported as an issue in about 25% of cases. Base metal alloy was the most (52%) commonly used alloy material. Metal-ceramic crowns were the most popular choice for anterior (69%) and posterior (70%) cases. The various factors considered did not have any statistically significant effect on the answers provided. The only notable exception was the fact that more methods of communicating the size and shape of crowns were utilised for

  4. Strapdown Airborne Gravimetry Quality Assessment Method Based on Single Survey Line Data: A Study by SGA-WZ02 Gravimeter

    Science.gov (United States)

    Wu, Meiping; Cao, Juliang; Zhang, Kaidong; Cai, Shaokun; Yu, Ruihang

    2018-01-01

    Quality assessment is an important part in the strapdown airborne gravimetry. Root mean square error (RMSE) evaluation method is a classical way to evaluate the gravimetry quality, but classical evaluation methods are preconditioned by extra flight or reference data. Thus, a method, which is able to largely conquer the premises of classical quality assessment methods and can be used in single survey line, has been developed in this paper. According to theoretical analysis, the method chooses the stability of two horizontal attitude angles, horizontal specific force and vertical specific force as the determinants of quality assessment method. The actual data, collected by SGA-WZ02 from 13 flights 21 lines in certain survey, was used to build the model and elaborate the method. To substantiate the performance of the quality assessment model, the model is applied in extra repeat line flights from two surveys. Compared with internal RMSE, standard deviation of assessment residuals are 0.23 mGal and 0.16 mGal in two surveys, which shows that the quality assessment method is reliable and stricter. The extra flights are not necessary by specially arranging the route of flights. The method, summarized from SGA-WZ02, is a feasible approach to assess gravimetry quality using single line data and is also suitable for other strapdown gravimeters. PMID:29373535

  5. Web-based surveys as an alternative to traditional mail methods.

    Science.gov (United States)

    Fleming, Christopher M; Bowden, Mark

    2009-01-01

    Environmental economists have long used surveys to gather information about people's preferences. A recent innovation in survey methodology has been the advent of web-based surveys. While the Internet appears to offer a promising alternative to conventional survey administration modes, concerns exist over potential sampling biases associated with web-based surveys and the effect these may have on valuation estimates. This paper compares results obtained from a travel cost questionnaire of visitors to Fraser Island, Australia, that was conducted using two alternate survey administration modes; conventional mail and web-based. It is found that response rates and the socio-demographic make-up of respondents to the two survey modes are not statistically different. Moreover, both modes yield similar consumer surplus estimates.

  6. Soil surveying using electromagnetic methods; Denji tansaho wo mochiita jiban chosa

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki, I; Kawauchi, K; Goto, N [Muroran Institute of Technology, Hokkaido (Japan); Takahashi, N; Yamada, T [Zukohsya Co. Ltd., Hokkaido (Japan)

    1997-10-22

    Electromagnetic surveying method is applied in Muroran Institute of Technology`s site for power transmission steel towers for the locating of structures buried in the ground and for the study of obstruction to the application of the method. The devices employed are the EM31 and EM38 which are portable conductivity measuring instruments manufactured by GEONICS Company. With the probeable depth in the horizontal dipole mode being approximately half that in the vertical dipole mode, depths of 0.5m, 1m, 3m, and 6m may be explored using the two instruments. In the measurement test, the devices are used to determine a reinforced concrete-made multi-purpose duct that accommodates water pipes, sewers, various electric wires, and heating pipes and is buried at a depth of 2-3m in the ground. In the measurement for a 3m-deep level, a spot high in conductivity due to the reinforced concrete is detected, and the result roughly corresponds to the lay of the duct. In the measurement for a 6m-deep level, no high-conductivity spot is found, meaning there is no such structure at this depth. Although there are some other high conductivity values recorded, they are attributed to manhole covers or steel tower bases on the ground surface. 3 refs., 8 figs.

  7. Optimization Models and Methods for Demand-Side Management of Residential Users: A Survey

    Directory of Open Access Journals (Sweden)

    Antimo Barbato

    2014-09-01

    Full Text Available The residential sector is currently one of the major contributors to the global energy balance. However, the energy demand of residential users has been so far largely uncontrollable and inelastic with respect to the power grid conditions. With the massive introduction of renewable energy sources and the large variations in energy flows, also the residential sector is required to provide some flexibility in energy use so as to contribute to the stability and efficiency of the electric system. To address this issue, demand management mechanisms can be used to optimally manage the energy resources of customers and their energy demand profiles. A very promising technique is represented by demand-side management (DSM, which consists in a proactive method aimed at making users energy-efficient in the long term. In this paper, we survey the most relevant studies on optimization methods for DSM of residential consumers. Specifically, we review the related literature according to three axes defining contrasting characteristics of the schemes proposed: DSM for individual users versus DSM for cooperative consumers, deterministic DSM versus stochastic DSM and day-ahead DSM versus real-time DSM. Based on this classification, we provide a big picture of the key features of different approaches and techniques and discuss future research directions.

  8. Content and Methods used to Train Tobacco Cessation Treatment Providers: An International Survey.

    Science.gov (United States)

    Kruse, Gina R; Rigotti, Nancy A; Raw, Martin; McNeill, Ann; Murray, Rachael; Piné-Abata, Hembadoon; Bitton, Asaf; McEwen, Andy

    2017-12-01

    There are limited existing data describing the training methods used to educate tobacco cessation treatment providers around the world. To measure the prevalence of tobacco cessation treatment content, skills training and teaching methods reported by tobacco treatment training programs across the world. Web-based survey in May-September 2013 among tobacco cessation training experts across six geographic regions and four World Bank income levels. Response rate was 73% (84 of 115 countries contacted). Of 104 individual programs from 84 countries, most reported teaching brief advice (78%) and one-to-one counseling (74%); telephone counseling was uncommon (33%). Overall, teaching of knowledge topics was more commonly reported than skills training. Programs in lower income countries less often reported teaching about medications, behavioral treatments and biomarkers and less often reported skills-based training about interviewing clients, medication management, biomarker measurement, assessing client outcomes, and assisting clients with co-morbidities. Programs reported a median 15 hours of training. Face-to-face training was common (85%); online programs were rare (19%). Almost half (47%) included no learner assessment. Only 35% offered continuing education. Nearly all programs reported teaching evidence-based treatment modalities in a face-to-face format. Few programs delivered training online or offered continuing education. Skills-based training was less common among low- and middle-income countries (LMICs). There is a large unmet need for tobacco treatment training protocols which emphasize practical skills, and which are more rapidly scalable than face-to-face training in LMICs.

  9. The DEEP2 Galaxy Redshift Survey: The Voronoi-Delaunay Method Catalog of Galaxy Groups

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Brian F.; /UC, Berkeley; Newman, Jeffrey A.; /LBNL, NSD; Davis, Marc; /UC, Berkeley /UC, Berkeley, Astron.Dept.; Marinoni, Christian; /Brera Observ.; Yan, Renbin; Coil, Alison L.; Conroy, Charlie; Cooper, Michael C.; /UC, Berkeley, Astron.Dept.; Faber, S.M.; /Lick Observ.; Finkbeiner, Douglas P.; /Princeton U. Observ.; Guhathakurta, Puragra; /Lick Observ.; Kaiser, Nick; /Hawaii U.; Koo, David C.; Phillips, Andrew C.; /Lick Observ.; Weiner, Benjamin J.; /Maryland U.

    2012-02-14

    We use the first 25% of the DEEP2 Galaxy Redshift Survey spectroscopic data to identify groups and clusters of galaxies in redshift space. The data set contains 8370 galaxies with confirmed redshifts in the range 0.7 {<=} z {<=} 1.4, over one square degree on the sky. Groups are identified using an algorithm (the Voronoi-Delaunay Method) that has been shown to accurately reproduce the statistics of groups in simulated DEEP2-like samples. We optimize this algorithm for the DEEP2 survey by applying it to realistic mock galaxy catalogs and assessing the results using a stringent set of criteria for measuring group-finding success, which we develop and describe in detail here. We find in particular that the group-finder can successfully identify {approx}78% of real groups and that {approx}79% of the galaxies that are true members of groups can be identified as such. Conversely, we estimate that {approx}55% of the groups we find can be definitively identified with real groups and that {approx}46% of the galaxies we place into groups are interloper field galaxies. Most importantly, we find that it is possible to measure the distribution of groups in redshift and velocity dispersion, n({sigma}, z), to an accuracy limited by cosmic variance, for dispersions greater than 350 km s{sup -1}. We anticipate that such measurements will allow strong constraints to be placed on the equation of state of the dark energy in the future. Finally, we present the first DEEP2 group catalog, which assigns 32% of the galaxies to 899 distinct groups with two or more members, 153 of which have velocity dispersions above 350 km s{sup -1}. We provide locations, redshifts and properties for this high-dispersion subsample. This catalog represents the largest sample to date of spectroscopically detected groups at z {approx} 1.

  10. Application of the geological surveying methods employed at Gorleben to cavern projects in the central European zechstein basin

    International Nuclear Information System (INIS)

    Wilke, F.; Bornemann, O.; Behlau, J.; Mingerzahn, G.

    2002-01-01

    The investigations at Gorleben date back more than 20 years. New methods were developed and applied, especially for detailed stratigraphic and geochemical characterization of the zechstein formation and also geophysical survey methods and geological mapping of complex folds in saline structures. The greatest feat was the 3D imaging of all geological information accompanied by visualization of complex stratigraphic entities [de

  11. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  12. Methods for computing water-quality loads at sites in the U.S. Geological Survey National Water Quality Network

    Science.gov (United States)

    Lee, Casey J.; Murphy, Jennifer C.; Crawford, Charles G.; Deacon, Jeffrey R.

    2017-10-24

    The U.S. Geological Survey publishes information on concentrations and loads of water-quality constituents at 111 sites across the United States as part of the U.S. Geological Survey National Water Quality Network (NWQN). This report details historical and updated methods for computing water-quality loads at NWQN sites. The primary updates to historical load estimation methods include (1) an adaptation to methods for computing loads to the Gulf of Mexico; (2) the inclusion of loads computed using the Weighted Regressions on Time, Discharge, and Season (WRTDS) method; and (3) the inclusion of loads computed using continuous water-quality data. Loads computed using WRTDS and continuous water-quality data are provided along with those computed using historical methods. Various aspects of method updates are evaluated in this report to help users of water-quality loading data determine which estimation methods best suit their particular application.

  13. EPRINT ARCHIVE USER SURVEY

    CERN Multimedia

    2001-01-01

    University of Southampton invites the CERN community to participate in a survey Professor Stevan Harnad is conducting on current users and non-users of Eprint Archives. http://www.eprints.org/survey/ The findings will be used to suggest potential enhancements of the services as well as to get a deeper understanding of the very rapid developments in the on-line dissemination and use of scientific and scholarly research. (The survey is anonymous. Revealing your identity is optional and it will be kept confidential.)

  14. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  15. Report on the survey of geothermal development at Okushiri Island, Hokkaido. Geochemical survey (Finger print method); Hokkaido Okushiritou chinetsu kaihatsu chosa chikagaku chosa (Finga print ho) hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1989-07-01

    The geochemical survey by the finger print method was carried out in the Okushiri Island area, Hokkaido, and places of fracture existence were extracted and districts of possible geothermal existence were estimated. The finger print method is a geochemical survey method of soil gas, and the soil gas was collected along the main roads and mountain streams at measuring intervals of 100-300m. The gas collector was buried 30cm deep from the ground surface for 17 days, and the soil gas that rose from deep underground was adsorbed/accumulated into activated carbon. The gas analysis was made by the high sensitivity Curie point pyrolysis/quadrupole mass spectrometer. As a result of the survey analysis, the existence of fracture zone was presumed in the district along the Shiromizusawa that is a branch of the Horonai River, district along the road of the Okushiri Island line and district 1.5km WSW from the 5.8K Pass. Further, out of all 12 specimens, 6 specimens of Type X were distributed in a group in the district 1km square in north, south, east and west with the top of Mt. Shokan almost as the center. The possible existence of geothermal reservoirs was presumed. (NEDO)

  16. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  17. Darknet and bitcoin, the obscure and anonymous side of the internet in healthcare.

    Science.gov (United States)

    Masoni, Marco; Guelfi, Maria Renza; Gensini, Gian Franco

    2016-11-14

    Illegal activities prosecutable by law in the real life can be committed on the internet alike. In the healthcare domain, we refer mainly to selling of illegal and counterfeit drugs, exchange of pedo-pornographic material and marketing of stolen medical records. These illegal activities are made easier by recent developments of the Internet that medical community must be aware of: darknet and bitcoin. The first allows anonymous surfing and the last anonymous financial transactions. After discussing which healthcare areas are affected by these technological developments of the Internet and the deriving consequences, then the Authors express their opinion on what actions can be taken to protect internet community.

  18. Don't spin the pen: two alternative methods for second-stage sampling in urban cluster surveys

    Directory of Open Access Journals (Sweden)

    Rose Angela MC

    2007-06-01

    Full Text Available Abstract In two-stage cluster surveys, the traditional method used in second-stage sampling (in which the first household in a cluster is selected is time-consuming and may result in biased estimates of the indicator of interest. Firstly, a random direction from the center of the cluster is selected, usually by spinning a pen. The houses along that direction are then counted out to the boundary of the cluster, and one is then selected at random to be the first household surveyed. This process favors households towards the center of the cluster, but it could easily be improved. During a recent meningitis vaccination coverage survey in Maradi, Niger, we compared this method of first household selection to two alternatives in urban zones: 1 using a superimposed grid on the map of the cluster area and randomly selecting an intersection; and 2 drawing the perimeter of the cluster area using a Global Positioning System (GPS and randomly selecting one point within the perimeter. Although we only compared a limited number of clusters using each method, we found the sampling grid method to be the fastest and easiest for field survey teams, although it does require a map of the area. Selecting a random GPS point was also found to be a good method, once adequate training can be provided. Spinning the pen and counting households to the boundary was the most complicated and time-consuming. The two methods tested here represent simpler, quicker and potentially more robust alternatives to spinning the pen for cluster surveys in urban areas. However, in rural areas, these alternatives would favor initial household selection from lower density (or even potentially empty areas. Bearing in mind these limitations, as well as available resources and feasibility, investigators should choose the most appropriate method for their particular survey context.

  19. Surveying wolves without snow: a critical review of the methods used in Spain

    OpenAIRE

    Blanco, Juan Carlos; Cortés, Yolanda

    2011-01-01

    Wolves (Canis lupus) are difficult to survey, and in most countries, snow is used for identifying the species, counting individuals, recording movements and determining social position. However, in the Iberian peninsula and other southern regions of its gobal range, snow is very scarce in winter, so wolves must be surveyed without snow. In Spain and Portugal, wolves are surveyed through estimating number of wolf packs in summer by means of locating litters of pups when they are at rendezvous ...

  20. Coordination and resource-related difficulties encountered by Quebec's public health specialists and infectious diseases/medical microbiologists in the management of A (H1N1 - a mixed-method, exploratory survey

    Directory of Open Access Journals (Sweden)

    Nhan Charles

    2012-02-01

    Full Text Available Abstract Background In Quebec, the influenza A (H1N1 pandemic was managed using a top-down style that left many involved players with critical views and frustrations. We aimed to describe physicians' perceptions - infectious diseases specialists/medical microbiologists (IDMM and public health/preventive medicine specialists (PHPMS - in regards to issues encountered with the pandemics management at the physician level and highlight suggested improvements for future healthcare emergencies. Methods In April 2010, Quebec IDMM and PHPMS physicians were invited to anonymously complete a web-based learning needs assessment. The survey included both open-ended and multiple-choice questions. Descriptive statistics were used to report on the frequency distribution of multiple choice responses whereas thematic content analysis was used to analyse qualitative data generated from the survey and help understand respondents' experience and perceptions with the pandemics. Results Of the 102 respondents, 85.3% reported difficulties or frustrations in their practice during the pandemic. The thematic analysis revealed two core themes describing the problems experienced in the pandemic management: coordination and resource-related difficulties. Coordination issues included communication, clinical practice guidelines, decision-making, roles and responsibilities, epidemiological investigation, and public health expert advisory committees. Resources issues included laboratory resources, patient management, and vaccination process. Conclusion Together, the quantitative and qualitative data suggest a need for improved coordination, a better definition of roles and responsibilities, increased use of information technologies, merged communications, and transparency in the decisional process. Increased flexibility and less contradiction in clinical practice guidelines from different sources and increased laboratory/clinical capacity were felt critical to the proper

  1. Survey research with a random digit dial national mobile phone sample in Ghana: Methods and sample quality

    Science.gov (United States)

    Sefa, Eunice; Adimazoya, Edward Akolgo; Yartey, Emmanuel; Lenzi, Rachel; Tarpo, Cindy; Heward-Mills, Nii Lante; Lew, Katherine; Ampeh, Yvonne

    2018-01-01

    Introduction Generating a nationally representative sample in low and middle income countries typically requires resource-intensive household level sampling with door-to-door data collection. High mobile phone penetration rates in developing countries provide new opportunities for alternative sampling and data collection methods, but there is limited information about response rates and sample biases in coverage and nonresponse using these methods. We utilized data from an interactive voice response, random-digit dial, national mobile phone survey in Ghana to calculate standardized response rates and assess representativeness of the obtained sample. Materials and methods The survey methodology was piloted in two rounds of data collection. The final survey included 18 demographic, media exposure, and health behavior questions. Call outcomes and response rates were calculated according to the American Association of Public Opinion Research guidelines. Sample characteristics, productivity, and costs per interview were calculated. Representativeness was assessed by comparing data to the Ghana Demographic and Health Survey and the National Population and Housing Census. Results The survey was fielded during a 27-day period in February-March 2017. There were 9,469 completed interviews and 3,547 partial interviews. Response, cooperation, refusal, and contact rates were 31%, 81%, 7%, and 39% respectively. Twenty-three calls were dialed to produce an eligible contact: nonresponse was substantial due to the automated calling system and dialing of many unassigned or non-working numbers. Younger, urban, better educated, and male respondents were overrepresented in the sample. Conclusions The innovative mobile phone data collection methodology yielded a large sample in a relatively short period. Response rates were comparable to other surveys, although substantial coverage bias resulted from fewer women, rural, and older residents completing the mobile phone survey in

  2. A new survey method of tsunami inundation area using chemical analysis of soil. Application to the field survey on the 2010 Chilean tsunami at Chile

    International Nuclear Information System (INIS)

    Yoshii, Takumi; Matsuyama, Masafumi; Koshimura, Shunichi; Mas, Erick; Matsuoka, Masashi; Jimenez, Cesar

    2011-01-01

    The severe earthquake of Mw 8.8 occurred on 27 Feb. 2010 at the center of Chile. The tsunami generated by the earthquake attacked the coast of Chile and it propagated to the Pacific Ocean coastline. The field survey on the disaster damages due to the tsunami was conducted near Talcahuano in Chile to prepare for the great tsunamis accompanied by the earthquakes predicted to occur near Japan within several decades. The aims of this field survey were to survey disaster damages especially relevant to electric equipments and to develop the survey method based on a chemical analysis of the inundated soil which supplies objective data with high accuracy compared to the conventional methods. In the survey area, the average of inundation heights was 6 m, however it locally reached up to 25 m. The maximum sea-level height of the series of the tsunamis was recorded in the third or fourth wave (roughly 3 hours after the earthquake occurrence). The first floors of houses were severely destroyed and some ships were carried and left on land by the tsunamis. Furthermore, the large amount of sediment was deposited in towns. Removing the drifted ships and tsunami deposit is important consideration for quick recovery from a disaster due to a tsunami. The soil samples were obtained from both the inundated and the not-inundated position. The stirred solution was made by the soil and ultrapure water, then, the content of water-soluble ions, electric conductivity (EC), and pH were measured. The soil obtained in the tsunami inundated area contains much water-soluble ions (Na + , Mg 2+ , Cl - , Br - , SO 4 2- ) compared to the samples obtained in the not-inundated area. The discriminant analysis of the tsunami inundation was conducted using the amount of ions in the soil. High discriminant accuracy (over 90%) was obtained with Na + , Mg 2+ , Cl - , Br - , SO 4 2- and EC. Br - , Cl - , Na + are believed to be suitable for the discriminant analysis about tsunamis considering the contaminant

  3. Reporting on methods of subgroup analysis in clinical trials: a survey of four scientific journals

    Directory of Open Access Journals (Sweden)

    E.D. Moreira Jr.

    2001-11-01

    Full Text Available Results of subgroup analysis (SA reported in randomized clinical trials (RCT cannot be adequately interpreted without information about the methods used in the study design and the data analysis. Our aim was to show how often inaccurate or incomplete reports occur. First, we selected eight methodological aspects of SA on the basis of their importance to a reader in determining the confidence that should be placed in the author's conclusions regarding such analysis. Then, we reviewed the current practice of reporting these methodological aspects of SA in clinical trials in four leading journals, i.e., the New England Journal of Medicine, the Journal of the American Medical Association, the Lancet, and the American Journal of Public Health. Eight consecutive reports from each journal published after July 1, 1998 were included. Of the 32 trials surveyed, 17 (53% had at least one SA. Overall, the proportion of RCT reporting a particular methodological aspect ranged from 23 to 94%. Information on whether the SA preceded/followed the analysis was reported in only 7 (41% of the studies. Of the total possible number of items to be reported, NEJM, JAMA, Lancet and AJPH clearly mentioned 59, 67, 58 and 72%, respectively. We conclude that current reporting of SA in RCT is incomplete and inaccurate. The results of such SA may have harmful effects on treatment recommendations if accepted without judicious scrutiny. We recommend that editors improve the reporting of SA in RCT by giving authors a list of the important items to be reported.

  4. Methods used by accredited dental specialty programs to advertise faculty positions: results of a national survey.

    Science.gov (United States)

    Ballard, Richard W; Hagan, Joseph L; Armbruster, Paul C; Gallo, John R

    2011-01-01

    The various reasons for the current and projected shortages of dental faculty members in the United States have received much attention. Dental school deans have reported that the top three factors impacting their ability to fill faculty positions are meeting the requirements of the position, lack of response to position announcement, and salary/budget limitations. An electronic survey sent to program directors of specialty programs at all accredited U.S. dental schools inquired about the number of vacant positions, advertised vacant positions, reasons for not advertising, selection of advertising medium, results of advertising, and assistance from professional dental organizations. A total of seventy-three permanently funded full-time faculty positions were reported vacant, with 89.0 percent of these positions having been advertised in nationally recognized professional journals and newsletters. Networking or word-of-mouth was reported as the most successful method for advertising. The majority of those responding reported that professional dental organizations did not help with filling vacant faculty positions, but that they would utilize the American Dental Association's website or their specialty organization's website to post faculty positions if they were easy to use and update.

  5. An empirical survey to investigate quality of men's clothing market using QFD method

    Directory of Open Access Journals (Sweden)

    Samira Golshan

    2012-08-01

    Full Text Available One of the most important techniques on improving customer satisfaction in clothing and textile industry is to increase the quality of goods and services. There are literally different methods for detecting important items influencing clothing products and the proposed model of this paper uses quality function deployment (QFD. The proposed model of this paper designs and distributes a questionnaire among some experts to detect necessary factors and using house of quality we determine the most important factors impacting the customer's clothing selection. The proposed study of this paper focuses men who are 15 to 45 years old living in Yazd/Iran. The brand we do the investigation sells the products in three shopping centers located in this city. We have distributed 100 questionnaires and collected 65 properly filled ones. Based on the results of our survey, suitable design, printing and packaging specifications, necessary requirements, optimization of production planning and appropriate sewing machine setting are considered as the most important characteristics influencing the purchase of a clothing products.

  6. A method for mapping corn using the US Geological Survey 1992 National Land Cover Dataset

    Science.gov (United States)

    Maxwell, S.K.; Nuckols, J.R.; Ward, M.H.

    2006-01-01

    Long-term exposure to elevated nitrate levels in community drinking water supplies has been associated with an elevated risk of several cancers including non-Hodgkin's lymphoma, colon cancer, and bladder cancer. To estimate human exposure to nitrate, specific crop type information is needed as fertilizer application rates vary widely by crop type. Corn requires the highest application of nitrogen fertilizer of crops grown in the Midwest US. We developed a method to refine the US Geological Survey National Land Cover Dataset (NLCD) (including map and original Landsat images) to distinguish corn from other crops. Overall average agreement between the resulting corn and other row crops class and ground reference data was 0.79 kappa coefficient with individual Landsat images ranging from 0.46 to 0.93 kappa. The highest accuracies occurred in Regions where corn was the single dominant crop (greater than 80.0%) and the crop vegetation conditions at the time of image acquisition were optimum for separation of corn from all other crops. Factors that resulted in lower accuracies included the accuracy of the NLCD map, accuracy of corn areal estimates, crop mixture, crop condition at the time of Landsat overpass, and Landsat scene anomalies.

  7. Estimating factors influencing the detection probability of semiaquatic freshwater snails using quadrat survey methods

    Science.gov (United States)

    Roesler, Elizabeth L.; Grabowski, Timothy B.

    2018-01-01

    Developing effective monitoring methods for elusive, rare, or patchily distributed species requires extra considerations, such as imperfect detection. Although detection is frequently modeled, the opportunity to assess it empirically is rare, particularly for imperiled species. We used Pecos assiminea (Assiminea pecos), an endangered semiaquatic snail, as a case study to test detection and accuracy issues surrounding quadrat searches. Quadrats (9 × 20 cm; n = 12) were placed in suitable Pecos assiminea habitat and randomly assigned a treatment, defined as the number of empty snail shells (0, 3, 6, or 9). Ten observers rotated through each quadrat, conducting 5-min visual searches for shells. The probability of detecting a shell when present was 67.4 ± 3.0%, but it decreased with the increasing litter depth and fewer number of shells present. The mean (± SE) observer accuracy was 25.5 ± 4.3%. Accuracy was positively correlated to the number of shells in the quadrat and negatively correlated to the number of times a quadrat was searched. The results indicate quadrat surveys likely underrepresent true abundance, but accurately determine the presence or absence. Understanding detection and accuracy of elusive, rare, or imperiled species improves density estimates and aids in monitoring and conservation efforts.

  8. Sample Size Calculations for Population Size Estimation Studies Using Multiplier Methods With Respondent-Driven Sampling Surveys.

    Science.gov (United States)

    Fearon, Elizabeth; Chabata, Sungai T; Thompson, Jennifer A; Cowan, Frances M; Hargreaves, James R

    2017-09-14

    While guidance exists for obtaining population size estimates using multiplier methods with respondent-driven sampling surveys, we lack specific guidance for making sample size decisions. To guide the design of multiplier method population size estimation studies using respondent-driven sampling surveys to reduce the random error around the estimate obtained. The population size estimate is obtained by dividing the number of individuals receiving a service or the number of unique objects distributed (M) by the proportion of individuals in a representative survey who report receipt of the service or object (P). We have developed an approach to sample size calculation, interpreting methods to estimate the variance around estimates obtained using multiplier methods in conjunction with research into design effects and respondent-driven sampling. We describe an application to estimate the number of female sex workers in Harare, Zimbabwe. There is high variance in estimates. Random error around the size estimate reflects uncertainty from M and P, particularly when the estimate of P in the respondent-driven sampling survey is low. As expected, sample size requirements are higher when the design effect of the survey is assumed to be greater. We suggest a method for investigating the effects of sample size on the precision of a population size estimate obtained using multipler methods and respondent-driven sampling. Uncertainty in the size estimate is high, particularly when P is small, so balancing against other potential sources of bias, we advise researchers to consider longer service attendance reference periods and to distribute more unique objects, which is likely to result in a higher estimate of P in the respondent-driven sampling survey. ©Elizabeth Fearon, Sungai T Chabata, Jennifer A Thompson, Frances M Cowan, James R Hargreaves. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 14.09.2017.

  9. The Global Survey Method Applied to Ground-level Cosmic Ray Measurements

    Science.gov (United States)

    Belov, A.; Eroshenko, E.; Yanke, V.; Oleneva, V.; Abunin, A.; Abunina, M.; Papaioannou, A.; Mavromichalaki, H.

    2018-04-01

    The global survey method (GSM) technique unites simultaneous ground-level observations of cosmic rays in different locations and allows us to obtain the main characteristics of cosmic-ray variations outside of the atmosphere and magnetosphere of Earth. This technique has been developed and applied in numerous studies over many years by the Institute of Terrestrial Magnetism, Ionosphere and Radiowave Propagation (IZMIRAN). We here describe the IZMIRAN version of the GSM in detail. With this technique, the hourly data of the world-wide neutron-monitor network from July 1957 until December 2016 were processed, and further processing is enabled upon the receipt of new data. The result is a database of homogeneous and continuous hourly characteristics of the density variations (an isotropic part of the intensity) and the 3D vector of the cosmic-ray anisotropy. It includes all of the effects that could be identified in galactic cosmic-ray variations that were caused by large-scale disturbances of the interplanetary medium in more than 50 years. These results in turn became the basis for a database on Forbush effects and interplanetary disturbances. This database allows correlating various space-environment parameters (the characteristics of the Sun, the solar wind, et cetera) with cosmic-ray parameters and studying their interrelations. We also present features of the coupling coefficients for different neutron monitors that enable us to make a connection from ground-level measurements to primary cosmic-ray variations outside the atmosphere and the magnetosphere. We discuss the strengths and weaknesses of the current version of the GSM as well as further possible developments and improvements. The method developed allows us to minimize the problems of the neutron-monitor network, which are typical for experimental physics, and to considerably enhance its advantages.

  10. A method of encountering the ratio of adjacent sides and its applied study in nuclear engineering survey

    International Nuclear Information System (INIS)

    Wu Jingqin

    1996-01-01

    The cross side or range net survey method is to compute the average error of the measured lengths of sides. With the increment of the side length, the viewing variance increases greatly. Generally the photo-electrical distance survey equipment has a high inside precision, but it is affected by typical weather error so that the outside precision is decreased, and this weather error similar to systematic error greatly decreases the viewing side precision. To solve this problem, theoretical study and field test were carried out for the correlation of ratios among short sides by photo-electrical survey, and the stability degree of the ratios of sides, a new method of ratio encountering of adjacent sides is put forward. Because of the weights of the ration variance σ γ 2 = 2η 2 γ 2 and the angular variance σ β 2 = 2J 2 ρ 2 match each other, so the systematic error can be eliminated completely, and a survey point co-ordinate of high precision can be obtained. It is easy to operate, as it does not require multi-photo-band survey or to operate at the optimal observation time, and is especially suitable to nuclear engineering survey applications. (3 tabs.)

  11. Teaching research methods in nursing using Aronson's Jigsaw Technique. A cross-sectional survey of student satisfaction.

    Science.gov (United States)

    Leyva-Moral, Juan M; Riu Camps, Marta

    2016-05-01

    To adapt nursing studies to the European Higher Education Area, new teaching methods have been included that assign maximum importance to student-centered learning and collaborative work. The Jigsaw Technique is based on collaborative learning and everyone in the group must play their part because each student's mark depends on the other students. Home group members are given the responsibility to become experts in a specific area of knowledge. Experts meet together to reach an agreement and improve skills. Finally, experts return to their home groups to share all their findings. The aim of this study was to evaluate nursing student satisfaction with the Jigsaw Technique used in the context of a compulsory course in research methods for nursing. A cross-sectional study was conducted using a self-administered anonymous questionnaire administered to students who completed the Research Methods course during the 2012-13 and 2013-14 academic years. The questionnaire was developed taking into account the learning objectives, competencies and skills that should be acquired by students, as described in the course syllabus. The responses were compared by age group (younger or older than 22years). A total of 89.6% of nursing students under 22years believed that this methodology helped them to develop teamwork, while this figure was 79.6% in older students. Nursing students also believed it helped them to work independently, with differences according to age, 79.7% and 58% respectively (p=0.010). Students disagreed with the statement "The Jigsaw Technique involves little workload", with percentages of 88.5% in the group under 22years and 80% in older students. Most believed that this method should not be employed in upcoming courses, although there were differences by age, with 44.3% of the younger group being against and 62% of the older group (p=0.037). The method was not highly valued by students, mainly by those older than 22years, who concluded that they did not learn

  12. Methods for estimating private forest ownership statistics: revised methods for the USDA Forest Service's National Woodland Owner Survey

    Science.gov (United States)

    Brenton J. ​Dickinson; Brett J. Butler

    2013-01-01

    The USDA Forest Service's National Woodland Owner Survey (NWOS) is conducted to better understand the attitudes and behaviors of private forest ownerships, which control more than half of US forestland. Inferences about the populations of interest should be based on theoretically sound estimation procedures. A recent review of the procedures disclosed an error in...

  13. Traditional methods v. new technologies – dilemmas for dietary assessment in large-scale nutrition surveys and studies

    DEFF Research Database (Denmark)

    Amoutzopoulos, B.; Steer, T.; Roberts, C.

    2018-01-01

    assessment in population surveys’, was held at the 9th International Conference on Diet and Activity Methods (ICDAM9), Brisbane, September 2015. Despite respondent and researcher burden, traditional methods have been most commonly used in nutrition surveys. However, dietary assessment technologies offer...... of traditional dietary assessment methods (food records, FFQ, 24 h recalls, diet history with interviewer-assisted data collection) v. new technology-based dietary assessment methods (web-based and mobile device applications). The panel discussion ‘Traditional methods v. new technologies: dilemmas for dietary......The aim of the present paper is to summarise current and future applications of dietary assessment technologies in nutrition surveys in developed countries. It includes the discussion of key points and highlights of subsequent developments from a panel discussion to address strengths and weaknesses...

  14. Survey research with a random digit dial national mobile phone sample in Ghana: Methods and sample quality.

    Science.gov (United States)

    L'Engle, Kelly; Sefa, Eunice; Adimazoya, Edward Akolgo; Yartey, Emmanuel; Lenzi, Rachel; Tarpo, Cindy; Heward-Mills, Nii Lante; Lew, Katherine; Ampeh, Yvonne

    2018-01-01

    Generating a nationally representative sample in low and middle income countries typically requires resource-intensive household level sampling with door-to-door data collection. High mobile phone penetration rates in developing countries provide new opportunities for alternative sampling and data collection methods, but there is limited information about response rates and sample biases in coverage and nonresponse using these methods. We utilized data from an interactive voice response, random-digit dial, national mobile phone survey in Ghana to calculate standardized response rates and assess representativeness of the obtained sample. The survey methodology was piloted in two rounds of data collection. The final survey included 18 demographic, media exposure, and health behavior questions. Call outcomes and response rates were calculated according to the American Association of Public Opinion Research guidelines. Sample characteristics, productivity, and costs per interview were calculated. Representativeness was assessed by comparing data to the Ghana Demographic and Health Survey and the National Population and Housing Census. The survey was fielded during a 27-day period in February-March 2017. There were 9,469 completed interviews and 3,547 partial interviews. Response, cooperation, refusal, and contact rates were 31%, 81%, 7%, and 39% respectively. Twenty-three calls were dialed to produce an eligible contact: nonresponse was substantial due to the automated calling system and dialing of many unassigned or non-working numbers. Younger, urban, better educated, and male respondents were overrepresented in the sample. The innovative mobile phone data collection methodology yielded a large sample in a relatively short period. Response rates were comparable to other surveys, although substantial coverage bias resulted from fewer women, rural, and older residents completing the mobile phone survey in comparison to household surveys. Random digit dialing of mobile

  15. Survey research with a random digit dial national mobile phone sample in Ghana: Methods and sample quality.

    Directory of Open Access Journals (Sweden)

    Kelly L'Engle

    Full Text Available Generating a nationally representative sample in low and middle income countries typically requires resource-intensive household level sampling with door-to-door data collection. High mobile phone penetration rates in developing countries provide new opportunities for alternative sampling and data collection methods, but there is limited information about response rates and sample biases in coverage and nonresponse using these methods. We utilized data from an interactive voice response, random-digit dial, national mobile phone survey in Ghana to calculate standardized response rates and assess representativeness of the obtained sample.The survey methodology was piloted in two rounds of data collection. The final survey included 18 demographic, media exposure, and health behavior questions. Call outcomes and response rates were calculated according to the American Association of Public Opinion Research guidelines. Sample characteristics, productivity, and costs per interview were calculated. Representativeness was assessed by comparing data to the Ghana Demographic and Health Survey and the National Population and Housing Census.The survey was fielded during a 27-day period in February-March 2017. There were 9,469 completed interviews and 3,547 partial interviews. Response, cooperation, refusal, and contact rates were 31%, 81%, 7%, and 39% respectively. Twenty-three calls were dialed to produce an eligible contact: nonresponse was substantial due to the automated calling system and dialing of many unassigned or non-working numbers. Younger, urban, better educated, and male respondents were overrepresented in the sample.The innovative mobile phone data collection methodology yielded a large sample in a relatively short period. Response rates were comparable to other surveys, although substantial coverage bias resulted from fewer women, rural, and older residents completing the mobile phone survey in comparison to household surveys. Random digit

  16. Medical Relabeling in Gamblers Anonymous: The Construction of an Ideal Member.

    Science.gov (United States)

    Turner, David N.; Saunders, Danny

    1990-01-01

    Observed 2 Gamblers Anonymous (GA) groups in South Wales over a 12-month period. Determined 2 broad consequences arose from encountering fellow sufferers: acceptance of diagnosis and commitment to recovery and to will of GA, or rejection of the diagnosis with the knowledge that they are returning to the outside world with a reconstituted…

  17. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  18. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  19. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    Science.gov (United States)

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  20. Social influence in computer-mediated communication : The effects of anonymity on group behavior

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Sakhel, K; de Groot, D

    2001-01-01

    Two studies examined hypotheses derived from a Social Identity model of Deindividuation Effects (SIDE) as applied to social influence in computer-mediated communication (CMC) in groups. This model predicts that anonymity can increase social influence if a common group identity is salient. In a first