A. V. Masloboev
Full Text Available The paper deals with development of methods and tools for mathematical and computer modeling of the multilevel network-centric control systems of regional security. This research is carried out under development strategy implementation of the Arctic zone of the Russian Federation and national safeguarding for the period before 2020 in the Murmansk region territory. Creation of unified interdepartmental multilevel computer-aided system is proposed intended for decision-making information support and socio-economic security monitoring of the Arctic regions of Russia. The distinctive features of the investigated system class are openness, self-organization, decentralization of management functions and decision-making, weak hierarchy in the decision-making circuit and goal generation capability inside itself. Research techniques include functional-target approach, mathematical apparatus of multilevel hierarchical system theory and principles of network-centric control of distributed systems with pro-active components and variable structure. The work considers network-centric management local decisions coordination problem-solving within the multilevel distributed systems intended for information support of regional security. The coordination problem-solving approach and problem formalization in the multilevel network-centric control systems of regional security have been proposed based on developed multilevel recurrent hierarchical model of regional socio-economic system complex security. The model provides coordination of regional security indexes, optimized by the different elements of multilevel control systems, subject to decentralized decision-making. The model specificity consists in application of functional-target technology and mathematical apparatus of multilevel hierarchical system theory for coordination procedures implementation of the network-centric management local decisions. The work-out and research results can find further
Trust chain is the core technology of trusted computing. A formal model of trust chain based on finite state automata theory is proposed. We use communicating sequential processes to describe the system state transition in trust chain and by combining with multi-level security strategy give the definition of trust system and trust decision theorem of trust chain transfer which is proved meantime. Finally, a prototype system is given to show the efficiency of the model.
Faragallah, Osama S; El-Samie, Fathi E Abd
Concepts of Database Security Database Concepts Relational Database Security Concepts Access Control in Relational Databases Discretionary Access Control Mandatory Access Control Role-Based Access Control Work Objectives Book Organization Basic Concept of Multilevel Database Security IntroductionMultilevel Database Relations Polyinstantiation Invisible Polyinstantiation Visible Polyinstantiation Types of Polyinstantiation Architectural Consideration
Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)
Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...
Finch, W Holmes; Kelley, Ken
A powerful tool for analyzing nested designs in a variety of fields, multilevel/hierarchical modeling allows researchers to account for data collected at multiple levels. Multilevel Modeling Using R provides you with a helpful guide to conducting multilevel data modeling using the R software environment.After reviewing standard linear models, the authors present the basics of multilevel models and explain how to fit these models using R. They then show how to employ multilevel modeling with longitudinal data and demonstrate the valuable graphical options in R. The book also describes models fo
Kang, Myong H; Froscher, Judith N; Sheth, Amit P; Kochut, Krys J; Miller, John A
The Department of Defense (DoD) needs multilevel secure (MLS) workflow management systems to enable globally distributed users and applications to cooperate across classification levels to achieve mission critical goals...
Full Text Available Multi-level security mechanism has been widely applied in the military, government, defense and other domains in which information is required to be divided by security-level. Through this type of security mechanism, users at different security levels are provided with information at corresponding security levels. Traditional multi-level security mechanism which depends on the safety of operating system finally proved to be not practical. We propose a container-based trusted multi-level security mechanism in this paper to improve the applicability of the multi-level mechanism. It guarantees multi-level security of the system through a set of multi-level security policy rules and trusted techniques. The technical feasibility and application scenarios are also discussed. The ease of realization, strong practical significance and low cost of our method will largely expand the application of multi-level security mechanism in real life.
Syed Asad Hussain
Full Text Available Threats jeopardize some basic security requirements in a cloud. These threats generally constitute privacy breach, data leakage and unauthorized data access at different cloud layers. This paper presents a novel multilevel classification model of different security attacks across different cloud services at each layer. It also identifies attack types and risk levels associated with different cloud services at these layers. The risks are ranked as low, medium and high. The intensity of these risk levels depends upon the position of cloud layers. The attacks get more severe for lower layers where infrastructure and platform are involved. The intensity of these risk levels is also associated with security requirements of data encryption, multi-tenancy, data privacy, authentication and authorization for different cloud services. The multilevel classification model leads to the provision of dynamic security contract for each cloud layer that dynamically decides about security requirements for cloud consumer and provider.
Repeated measures and repeated events data have a hierarchical structure which can be analysed by using multilevel models. A growth curve model is an example of a multilevel random-coefficients model, whereas a discrete time event history model for recurrent events can be fitted as a multilevel logistic regression model. The paper describes extensions to the basic growth curve model to handle auto-correlated residuals, multiple-indicator latent variables and correlated growth processes, and e...
Wang, Jichuan; Fisher, James F
This book covers a broad range of topics about multilevel modeling. The goal is to help readers to understand the basic concepts, theoretical frameworks, and application methods of multilevel modeling. It is at a level also accessible to non-mathematicians, focusing on the methods and applications of various multilevel models and using the widely used statistical software SAS®. Examples are drawn from analysis of real-world research data.
Hurlburt, George; Hildreth, Bradley; Acevedo, Teresa
The Test and Evaluation Community Network (TECNET) is building a Multilevel Secure (MLS) system. This system features simultaneous access to classified and unclassified information and easy access through widely available communications channels. It provides the necessary separation of classification levels, assured through the use of trusted system design techniques, security assessments and evaluations. This system enables cleared T&E users to view and manipulate classified and unclassified information resources either using a single terminal interface or multiple windows in a graphical user interface. TECNET is in direct partnership with the National Security Agency (NSA) to develop and field the MLS TECNET capability in the near term. The centerpiece of this partnership is a state-of-the-art Concurrent Systems Security Engineering (CSSE) process. In developing the MLS TECNET capability, TECNET and NSA are providing members, with various expertise and diverse backgrounds, to participate in the CSSE process. The CSSE process is founded on the concepts of both Systems Engineering and Concurrent Engineering. Systems Engineering is an interdisciplinary approach to evolve and verify an integrated and life cycle balanced set of system product and process solutions that satisfy customer needs (ASD/ENS-MIL STD 499B 1992). Concurrent Engineering is design and development using the simultaneous, applied talents of a diverse group of people with the appropriate skills. Harnessing diverse talents to support CSSE requires active participation by team members in an environment that both respects and encourages diversity.
Group LAMP Linux, Apache, MySQL and PHP LAN Local Area Network MAC Mandatory Access Control MILS Multiple Independent Levels of Security MLS Multilevel...Reader  Section 1.4.3 – X X X X X FeedShow  Section 1.4.3 – X X X X feed on feeds  Section 1.4.3 GPL PHP 4.3.2+, MySQL – X X / Tiny Tiny RSS...38] Section 1.4.3 GPL PHP 5+, MySQL /Postgres – X X X X – zFeeder  Section 1.4.3 GPL PHP 4.2+ – X X – / lylina  Section 1.4.3 GPL PHP 5.2
Ong, Kar L
The Monterey Security Architecture (MYSEA) provides a distributed multilevel secure networking environment where authenticated users can securely access data and services at different security classification levels...
This book is devoted to modeling of multi-level complex systems, a challenging domain for engineers, researchers and entrepreneurs, confronted with the transition from learning and adaptability to evolvability and autonomy for technologies, devices and problem solving methods. Chapter 1 introduces the multi-scale and multi-level systems and highlights their presence in different domains of science and technology. Methodologies as, random systems, non-Archimedean analysis, category theory and specific techniques as model categorification and integrative closure, are presented in chapter 2. Chapters 3 and 4 describe polystochastic models, PSM, and their developments. Categorical formulation of integrative closure offers the general PSM framework which serves as a flexible guideline for a large variety of multi-level modeling problems. Focusing on chemical engineering, pharmaceutical and environmental case studies, the chapters 5 to 8 analyze mixing, turbulent dispersion and entropy production for multi-scale sy...
Schotanus, H.A.; Hartog, T.; Verkoelen, C.A.A.
Multi-Level Security (MLS) is often viewed as the holy grail of information security, especially in those environments where information of different classifications is being processed. In this paper we argue that MLS cannot facilitate the right balance between need-to-protect and duty-to-share as
HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui
XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.
Karunarathna, G. H. S.; Sooriyarachchi, M. R.
Joint modeling approaches are often encountered for different outcomes of competing risk time to event and count in many biomedical and epidemiology studies in the presence of cluster effect. Hospital length of stay (LOS) has been the widely used outcome measure in hospital utilization due to the benchmark measurement for measuring multiple terminations such as discharge, transferred, dead and patients who have not completed the event of interest at the follow up period (censored) during hospitalizations. Competing risk models provide a method of addressing such multiple destinations since classical time to event models yield biased results when there are multiple events. In this study, the concept of joint modeling has been applied to the dengue epidemiology in Sri Lanka, 2006-2008 to assess the relationship between different outcomes of LOS and platelet count of dengue patients with the district cluster effect. Two key approaches have been applied to build up the joint scenario. In the first approach, modeling each competing risk separately using the binary logistic model, treating all other events as censored under the multilevel discrete time to event model, while the platelet counts are assumed to follow a lognormal regression model. The second approach is based on the endogeneity effect in the multilevel competing risks and count model. Model parameters were estimated using maximum likelihood based on the Laplace approximation. Moreover, the study reveals that joint modeling approach yield more precise results compared to fitting two separate univariate models, in terms of AIC (Akaike Information Criterion).
Constanta Nicoleta BODEA
Full Text Available Is an original paper, which contains a hierarchical model with three levels, for determining the linearized non-homogeneous and homogeneous credibility premiums at company level, at sector level and at contract level, founded on the relevant covariance relations between the risk premium, the observations and the weighted averages. We give a rather explicit description of the input data for the multi- level hierarchical model used, only to show that in practical situations, there will always be enough data to apply credibility theory to a real insurance portfolio.
Full Text Available Individuals and the social or organizational groups they belong to can be viewed as a hierarchical system situated on different levels. Individuals are situated on the first level of the hierarchy and they are nested together on the higher levels. Individuals interact with the social groups they belong to and are influenced by these groups. Traditional methods that study the relationships between data, like simple regression, do not take into account the hierarchical structure of the data and the effects of a group membership and, hence, results may be invalidated. Unlike standard regression modelling, the multilevel approach takes into account the individuals as well as the groups to which they belong. To take advantage of the multilevel analysis it is important that we recognize the multilevel characteristics of the data. In this article we introduce the outlines of multilevel data and we describe the models that work with such data. We introduce the basic multilevel model, the two-level model: students can be nested into classes, individuals into countries and the general two-level model can be extended very easily to several levels. Multilevel analysis has begun to be extensively used in many research areas. We present the most frequent study areas where multilevel models are used, such as sociological studies, education, psychological research, health studies, demography, epidemiology, biology, environmental studies and entrepreneurship. We support the idea that since hierarchies exist everywhere, multilevel data should be recognized and analyzed properly by using multilevel modelling.
Lynch, Martin F.
This article reports a test of a multilevel model investigating how attachment security and autonomy contribute to emotional reliance, or the willingness to seek interpersonal support. Participants ("N" = 247) completed online measures of attachment, autonomy, emotional reliance, and vitality with respect to several everyday…
Wright, Daniel B; London, Kamala
Over the last 30 years statistical algorithms have been developed to analyse datasets that have a hierarchical/multilevel structure. Particularly within developmental and educational psychology these techniques have become common where the sample has an obvious hierarchical structure, like pupils nested within a classroom. We describe two areas beyond the basic applications of multilevel modelling that are important to psychology: modelling the covariance structure in longitudinal designs and using generalized linear multilevel modelling as an alternative to methods from signal detection theory (SDT). Detailed code for all analyses is described using packages for the freeware R.
Peterson, M.F.; Arregle, J-L.; Martin, Xavier
Multiple-level (or mixed linear) modeling (MLM) can simultaneously test hypotheses at several levels of analysis (usually two or three), or control for confounding effects at one level while testing hypotheses at others. Advances in multi-level modeling allow increased precision in quantitative
Skrondal, Anders; Rabe-Hesketh, Sophia
This book unifies and extends latent variable models, including multilevel or generalized linear mixed models, longitudinal or panel models, item response or factor models, latent class or finite mixture models, and structural equation models.
Rehan Ahmad Khan
Full Text Available The concept of random intercept models in a multilevel model developed by Goldstein (1986 has been extended for k-levels. The random variation in intercepts at individual level is marginally split into components by incorporating higher levels of hierarchy in the single level model. So, one can control the random variation in intercepts by incorporating the higher levels in the model.
It is relatively easy to collect chromatographic measurements for a large number of analytes, especially with gradient chromatographic methods coupled with mass spectrometry detection. Such data often have a hierarchical or clustered structure. For example, analytes with similar hydrophobicity and dissociation constant tend to be more alike in their retention than a randomly chosen set of analytes. Multilevel models recognize the existence of such data structures by assigning a model for each parameter, with its parameters also estimated from data. In this work, a multilevel model is proposed to describe retention time data obtained from a series of wide linear organic modifier gradients of different gradient duration and different mobile phase pH for a large set of acids and bases. The multilevel model consists of (1) the same deterministic equation describing the relationship between retention time and analyte-specific and instrument-specific parameters, (2) covariance relationships relating various physicochemical properties of the analyte to chromatographically specific parameters through quantitative structure-retention relationship based equations, and (3) stochastic components of intra-analyte and interanalyte variability. The model was implemented in Stan, which provides full Bayesian inference for continuous-variable models through Markov chain Monte Carlo methods. Graphical abstract Relationships between log k and MeOH content for acidic, basic, and neutral compounds with different log P. CI credible interval, PSA polar surface area.
Multilevel Flow Modeling (MFM) is a methodology for functional modeling of industrial processes on several interconnected levels of means-end and part-whole abstractions. The basic idea of MFM is to represent an industrial plant as a system which provides the means required to serve purposes in i...... in detail by a water mill example. The overall reasoning capabilities of MFM and its basis in cause-effect relations are also explained. The appendix contains an overview of MFM concepts and their definitions....
Park, W.; Belova, E.V.; Fu, G.Y.; Tang, X.Z.; Strauss, H.R.; Sugiyama, L.E.
The question of how to proceed toward ever more realistic plasma simulation studies using ever increasing computing power is addressed. The answer presented here is the M3D (Multilevel 3D) project, which has developed a code package with a hierarchy of physics levels that resolve increasingly complete subsets of phase-spaces and are thus increasingly more realistic. The rationale for the multilevel physics models is given. Each physics level is described and examples of its application are given. The existing physics levels are fluid models (3D configuration space), namely magnetohydrodynamic (MHD) and two-fluids; and hybrid models, namely gyrokinetic-energetic-particle/MHD (5D energetic particle phase-space), gyrokinetic-particle-ion/fluid-electron (5D ion phase-space), and full-kinetic-particle-ion/fluid-electron level (6D ion phase-space). Resolving electron phase-space (5D or 6D) remains a future project. Phase-space-fluid models are not used in favor of δf particle models. A practical and accurate nonlinear fluid closure for noncollisional plasmas seems not likely in the near future. copyright 1999 American Institute of Physics
Park, W.; Belova, E.V.; Fu, G.Y.
The question of how to proceed toward ever more realistic plasma simulation studies using ever increasing computing power is addressed. The answer presented here is the M3D (Multilevel 3D) project, which has developed a code package with a hierarchy of physics levels that resolve increasingly complete subsets of phase-spaces and are thus increasingly more realistic. The rationale for the multilevel physics models is given. Each physics level is described and examples of its application are given. The existing physics levels are fluid models (3D configuration space), namely magnetohydrodynamic (MHD) and two-fluids; and hybrid models, namely gyrokinetic-energetic-particle/MHD (5D energetic particle phase-space), gyrokinetic-particle-ion/fluid-electron (5D ion phase-space), and full-kinetic-particle-ion/fluid-electron level (6D ion phase-space). Resolving electron phase-space (5D or 6D) remains a future project. Phase-space-fluid models are not used in favor of delta f particle models. A practical and accurate nonlinear fluid closure for noncollisional plasmas seems not likely in the near future
Kim, Eun Sook; Cao, Chunhua
Considering that group comparisons are common in social science, we examined two latent group mean testing methods when groups of interest were either at the between or within level of multilevel data: multiple-group multilevel confirmatory factor analysis (MG ML CFA) and multilevel multiple-indicators multiple-causes modeling (ML MIMIC). The performance of these methods were investigated through three Monte Carlo studies. In Studies 1 and 2, either factor variances or residual variances were manipulated to be heterogeneous between groups. In Study 3, which focused on within-level multiple-group analysis, six different model specifications were considered depending on how to model the intra-class group correlation (i.e., correlation between random effect factors for groups within cluster). The results of simulations generally supported the adequacy of MG ML CFA and ML MIMIC for multiple-group analysis with multilevel data. The two methods did not show any notable difference in the latent group mean testing across three studies. Finally, a demonstration with real data and guidelines in selecting an appropriate approach to multilevel multiple-group analysis are provided.
Zhang, Xinxin; Lind, Morten; Ravn, Ole
Consequence reasoning is a major element for operation support system to assess the plant situations. The purpose of this paper is to elaborate how Multilevel Flow Models can be used to reason about consequences of disturbances in complex engineering systems. MFM is a modelling methodology...... for representing process knowledge for complex systems. It represents the system by using means-end and part-whole decompositions, and describes not only the purposes and functions of the system but also the causal relations between them. Thus MFM is a tool for causal reasoning. The paper introduces MFM modelling...... syntax and gives detailed reasoning formulas for consequence reasoning. The reasoning formulas offers basis for developing rule-based system to perform consequence reasoning based on MFM, which can be used for alarm design, risk monitoring, and supervision and operation support system design....
Alexandre Teixeira Dias
Full Text Available Focusing on the identification of the role played by Industry on the relations between Corporate Strategic Factors and Performance, the hierarchical multilevel modeling method was adopted when measuring and analyzing the relations between the variables that comprise each level of analysis. The adequacy of the multilevel perspective to the study of the proposed relations was identified and the relative importance analysis point out to the lower relevance of industry as a moderator of the effects of corporate strategic factors on performance, when the latter was measured by means of return on assets, and that industry don‟t moderates the relations between corporate strategic factors and Tobin‟s Q. The main conclusions of the research are that the organizations choices in terms of corporate strategy presents a considerable influence and plays a key role on the determination of performance level, but that industry should be considered when analyzing the performance variation despite its role as a moderator or not of the relations between corporate strategic factors and performance.
Multilevel Flow Modeling (MFM) is a methodology for functional modeling of industrial processes on several interconnected levels of means-end and part-whole abstractions. The basic idea of MFM is to represent an industrial plant as a system which provides the means required to serve purposes in its environment. MFM has a primary focus on plant goals and functions and provide a methodological way of using those concepts to represent complex industrial plant. The paper gives a brief introduction to the historical development, introduces the concepts of MFM and presents the application of the concepts in detail by a water mill example. The overall reasoning capabilities of MFM and its basis in cause-effect relations are also explained. The appendix contains an overview of MFM concepts and their definitions. (author)
Huang, Hung-Yu; Wang, Wen-Chung
In the social sciences, latent traits often have a hierarchical structure, and data can be sampled from multiple levels. Both hierarchical latent traits and multilevel data can occur simultaneously. In this study, we developed a general class of item response theory models to accommodate both hierarchical latent traits and multilevel data. The…
Tanenbaum, A.S.; Popescu, B.C.; Crispo, B.; Hempelmann, C.F.; Raskin, V.
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no easy task, given that content needs to be protected while accessed through electronic devices in the hands of
Scott, Marc A; Marx, Brian D
Leading contributors combine practical pieces with overviews of the state of the art in the field, making this handbook essential reading for any student or researcher looking to apply multilevel techniques in their own research
Sudha Devi Dorairaj
Full Text Available Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.
Dorairaj, Sudha Devi; Kaliannan, Thilagavathy
Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions. PMID:26258165
Dorairaj, Sudha Devi; Kaliannan, Thilagavathy
Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.
Matsueda, Ross L.; Drakulich, Kevin M.
This article specifies a multilevel measurement model for survey response when data are nested. The model includes a test-retest model of reliability, a confirmatory factor model of inter-item reliability with item-specific bias effects, an individual-level model of the biasing effects due to respondent characteristics, and a neighborhood-level…
Brykalov, S. M.; Kryanev, A. V.
The mathematical model (scheme) of a multi-level comparison of the economic system, characterized by the system of indices, is worked out. In the mathematical model of the multi-level comparison of the economic systems, the indicators of peer review and forecasting of the economic system under consideration can be used. The model can take into account the uncertainty in the estimated values of the parameters or expert estimations. The model uses the multi-criteria approach based on the Pareto solutions.
Full Text Available This article explores the role of multi-level governance and power structures in local water security through a case study of the Nawalparasi district in Nepal. It focuses on economic sustainability as a measure to address water security, placing this thematic in the context of a complicated power structure consisting of local, district and national administration as well as external development cooperation actors. The study aims to find out whether efforts to improve the economic sustainability of water schemes have contributed to water security at the local level. In addition, it will consider the interactions between water security, power structures and local equality and justice. The research builds upon survey data from the Nepalese districts of Nawalparasi and Palpa, and a case study based on interviews and observation in Nawalparasi. The survey was performed in water schemes built within a Finnish development cooperation programme spanning from 1990 to 2004, allowing a consideration of the long-term sustainability of water management projects. This adds a crucial external influence into the intra-state power structures shaping water management in Nepal. The article thus provides an alternative perspective to cross-regional water security through a discussion combining transnational involvement with national and local points of view.
Georgi Petrov Bebrov
Full Text Available The paper concerns the quantum cryptography, more specifically, the quantum secure communication type of schemes. The main focus here is on making a comparison between the distinct secure quantum communication models – quantum secure direct communication and deterministic secure quantum communication, in terms of three parameters: resource efficiency, eavesdropping check efficiency, and security (degree of preserving the confidentiality.
Kahn, Jeffrey H.
Multilevel modeling (MLM) is rapidly becoming the standard method of analyzing nested data, for example, data from students within multiple schools, data on multiple clients seen by a smaller number of therapists, and even longitudinal data. Although MLM analyses are likely to increase in frequency in counseling psychology research, many readers…
Llano, Joseph Anthony
It is well established that universities encourage the acquisition and dissemination of new knowledge among university community members and beyond. However, what is less well understood is how universities encourage entrepreneurial (opportunity discovery, evaluation, and exploiting) behavior. This research investigated a multilevel model of the…
Schulz, W.; Maas, I.
In this article we propose to study occupational careers with historical data by using multilevel growth models. Historical career data are often characterized by a lack of information on the timing of occupational changes and by different numbers of observations of occupations per individual.
Full Text Available Multilevel organization of morphometric data (cells are “nested” within patients requires special methods for studying correlations between karyometric features. The most distinct feature of these methods is that separate correlation (covariance matrices are produced for every level in the hierarchy. In karyometric research, the cell‐level (i.e., within‐tumor correlations seem to be of major interest. Beside their biological importance, these correlation coefficients (CC are compulsory when dimensionality reduction is required. Using MLwiN, a dedicated program for multilevel modeling, we show how to use multivariate multilevel models (MMM to obtain and interpret CC in each of the levels. A comparison with two usual, “single‐level” statistics shows that MMM represent the only way to obtain correct cell‐level correlation coefficients. The summary statistics method (take average values across each patient produces patient‐level CC only, and the “pooling” method (merge all cells together and ignore patients as units of analysis yields incorrect CC at all. We conclude that multilevel modeling is an indispensable tool for studying correlations between morphometric variables.
Hong, Sehee; Kim, Soyoung
There are basically two modeling approaches applicable to analyzing an actor-partner interdependence model: the multilevel modeling (hierarchical linear model) and the structural equation modeling. This article explains how to use these two models in analyzing an actor-partner interdependence model and how these two approaches work differently. As an empirical example, marital conflict data were used to analyze an actor-partner interdependence model. The multilevel modeling and the structural equation modeling produced virtually identical estimates for a basic model. However, the structural equation modeling approach allowed more realistic assumptions on measurement errors and factor loadings, rendering better model fit indices.
The paper describes the multilevel flow modelling methodology which can be used to construct functional models of energy and material processing systems. The models describe mass and energy flow topology on different levels of abstraction and represent the hierarchical functional structure of complex systems. A model of a nuclear power plant (PWR) is presented in the paper for illustration. Due to the consistency of the method, multilevel flow models provide specifications of plant goals and functions and may be used as a basis for design of computer-based support systems for the plant operator. Plant control requirements can be derived from the models and due to independence of the actual controller implementation the method may be used as basic for design of control strategies and for the allocation of control tasks to the computer and the plant operator. (author)
The paper describes the multilevel flow modelling methodology which can be used to construct functional models of energy and material processing systems. The models describe mass and energy flow topology on different levels of abstraction and represent the hierarchical functional structure...... of complex systems. A model of a nuclear power plant (PWR) is presented in the paper for illustration. Due to the consistency of the method, multilevel flow models provide specifications of plant goals and functions and may be used as a basis for design of computer-based support systems for the plant...... operator. Plant control requirements can be derived from the models and due to independence of the actual controller implementation the method may be used as a basis for design of control strategies and for the allocation of control tasks to the computer and the plant operator....
Pardo, Antonio; Ruiz, Miguel A; San Martín, Rafael
Hierarchic or multilevel models are used to analyse data when cases belong to known groups and sample units are selected both from the individual level and from the group level. In this work, the multilevel models most commonly discussed in the statistic literature are described, explaining how to fit these models using the SPSS program (any version as of the 11 th ) and how to interpret the outcomes of the analysis. Five particular models are described, fitted, and interpreted: (1) one-way analysis of variance with random effects, (2) regression analysis with means-as-outcomes, (3) one-way analysis of covariance with random effects, (4) regression analysis with random coefficients, and (5) regression analysis with means- and slopes-as-outcomes. All models are explained, trying to make them understandable to researchers in health and behaviour sciences.
Information Security Maturity Model
To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...
Gola, G; Lind, Morten; Thunem, Harald P-J
, especially if extended to the whole plant. Monitoring plant performances by means of data reconciliation techniques has proved successful to detect anomalies during operation, provide early warnings and eventually schedule maintenance. At the same time, the large amount of information provided by large...... detected anomalies. The combination of a data reconciliation system and the Multilevel Flow Modeling approach is illustrated with regard to the secondary loop of the Loviisa-2 Pressurized Water Reactor located in Finland....
Zhang, Guangquan; Gao, Ya
This monograph presents new developments in multi-level decision-making theory, technique and method in both modeling and solution issues. It especially presents how a decision support system can support managers in reaching a solution to a multi-level decision problem in practice. This monograph combines decision theories, methods, algorithms and applications effectively. It discusses in detail the models and solution algorithms of each issue of bi-level and tri-level decision-making, such as multi-leaders, multi-followers, multi-objectives, rule-set-based, and fuzzy parameters. Potential readers include organizational managers and practicing professionals, who can use the methods and software provided to solve their real decision problems; PhD students and researchers in the areas of bi-level and multi-level decision-making and decision support systems; students at an advanced undergraduate, master’s level in information systems, business administration, or the application of computer science.
Wang, Wenlin; Yang, Ming
As for the knowledge representation, of course, there are a great many methods available for knowledge representation. These include frames, causal models, and many others. This paper presents a novel method called Multilevel Flow Model (MFM), which is used for knowledge representation in G2 expert system. Knowledge representation plays a vital role in constructing knowledge bases. Moreover, it also has impact on building of generic fault model as well as knowledge bases. The MFM is particularly useful to describe system knowledge concisely as domain map in expert system when domain experts are not available
Wang, Wenlin; Yang, Ming [Harbin Engineering University, Harbin (China)
As for the knowledge representation, of course, there are a great many methods available for knowledge representation. These include frames, causal models, and many others. This paper presents a novel method called Multilevel Flow Model (MFM), which is used for knowledge representation in G2 expert system. Knowledge representation plays a vital role in constructing knowledge bases. Moreover, it also has impact on building of generic fault model as well as knowledge bases. The MFM is particularly useful to describe system knowledge concisely as domain map in expert system when domain experts are not available.
Full Text Available In this article we propose to study occupational careers with historical data by using multilevel growth models. Historical career data are often characterized by a lack of information on the timing of occupational changes and by different numbers of observations of occupations per individual. Growth models can handle these specificities, whereas standard methods, such as event history analyses can't. We illustrate the use of growth models by studying career success of men and women, using data from the Historical Sample of the Netherlands. The results show that the method is applicable to male careers, but causes trouble when analyzing female careers.
Rodrigues, Matilde A; Arezes, Pedro M; Leão, Celina P
Furniture companies can analyze their safety status using quantitative measures. However, the data needed are not always available and the number of accidents is under-reported. Safety climate scales may be an alternative. However, there are no validated Portuguese scales that account for the specific attributes of the furniture sector. The current study aims to develop and validate an instrument that uses a multilevel structure to measure the safety climate of the Portuguese furniture industry. The Safety Climate in Wood Industries (SCWI) model was developed and applied to the safety climate analysis using three different scales: organizational, group and individual. A multilevel exploratory factor analysis was performed to analyze the factorial structure. The studied companies' safety conditions were also analyzed. Different factorial structures were found between and within levels. In general, the results show the presence of a group-level safety climate. The scores of safety climates are directly and positively related to companies' safety conditions; the organizational scale is the one that best reflects the actual safety conditions. The SCWI instrument allows for the identification of different safety climates in groups that comprise the same furniture company and it seems to reflect those groups' safety conditions. The study also demonstrates the need for a multilevel analysis of the studied instrument.
Schieferdecker, Ina; Großmann, Jürgen; Schneider, Martin
Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security...
Witt, Michael; Krefting, Dagmar
Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.
This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.
Lind, Morten; Yoshikawa, Hidekazu; Jørgensen, Sten Bay
Multilevel Flow Modeling is a method for modeling complex processes on multiple levels of means-end and part-whole abstraction. The modeling method has been applied on a wide range of processes including power plants, chemical engineering plants and power systems. The modeling method is supported...... with reasoning tools for fault diagnosis and control and is proposed to be used as a central knowledge base giving integrated support in diagnosis and maintenance tasks. Recent developments of MFM include the introduction of concepts for representation of control functions and the relations between plant...... functions and structure. The paper will describe how MFM can be used to represent the goals and functions of the Japanese Monju Nuclear Power Plant. A detailed explanation will be given of the model describing the relations between levels of goal, function and structural. Furthermore, it will be explained...
Diaz Tovar, Carlos Axel; Mustaffa, Azizul Azri; Hukkerikar, Amol
of a computer aided multilevel modeling network consisting a collection of new and adopted models, methods and tools for the systematic design and analysis of processes employing lipid technology. This is achieved by decomposing the problem into four levels of modeling: 1. pure component properties; 2. mixtures...... and phase behavior; 3. unit operations; and 4. process synthesis and design. The methods and tools in each level include: For the first level, a lipid‐database of collected experimental data from the open literature, confidential data from industry and generated data from validated predictive property...... of these unit operations with respect to performance parameters such as minimum total cost, product yield improvement, operability etc., and process intensification for the retrofit of existing biofuel plants. In the fourth level the information and models developed are used as building blocks...
Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.
Mohror, Kathryn [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Moody, Adam [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bronevetsky, Greg [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); de Supinski, Bronis R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
High-performance computing (HPC) systems are growing more powerful by utilizing more components. As the system mean time before failure correspondingly drops, applications must checkpoint frequently to make progress. But, at scale, the cost of checkpointing becomes prohibitive. A solution to this problem is multilevel checkpointing, which employs multiple types of checkpoints in a single run. Moreover, lightweight checkpoints can handle the most common failure modes, while more expensive checkpoints can handle severe failures. We designed a multilevel checkpointing library, the Scalable Checkpoint/Restart (SCR) library, that writes lightweight checkpoints to node-local storage in addition to the parallel file system. We present probabilistic Markov models of SCR's performance. We show that on future large-scale systems, SCR can lead to a gain in machine efficiency of up to 35 percent, and reduce the load on the parallel file system by a factor of two. In addition, we predict that checkpoint scavenging, or only writing checkpoints to the parallel file system on application termination, can reduce the load on the parallel file system by 20 × on today's systems and still maintain high application efficiency.
The general form of a multi-level mathematical programming problem is a set of nested optimization problems, in which each level controls a series of decision variables independently. However, the value of decision variables may also impact the objective function of other levels. A two-level model is called a bilevel model and can be considered as a Stackelberg game with a leader and a follower. The leader anticipates the response of the follower and optimizes its objective function, and then the follower reacts to the leader's action. The multi-level decision-making model has many real-world applications such as government decisions, energy policies, market economy, network design, etc. However, there is a lack of capable algorithms to solve medium and large scale these types of problems. The dissertation is devoted to both theoretical research and applications of multi-level mathematical programming models, which consists of three parts, each in a paper format. The first part studies the renewable energy portfolio under two major renewable energy policies. The potential competition for biomass for the growth of the renewable energy portfolio in the United States and other interactions between two policies over the next twenty years are investigated. This problem mainly has two levels of decision makers: the government/policy makers and biofuel producers/electricity generators/farmers. We focus on the lower-level problem to predict the amount of capacity expansions, fuel production, and power generation. In the second part, we address uncertainty over demand and lead time in a multi-stage mathematical programming problem. We propose a two-stage tri-level optimization model in the concept of rolling horizon approach to reducing the dimensionality of the multi-stage problem. In the third part of the dissertation, we introduce a new branch and bound algorithm to solve bilevel linear programming problems. The total time is reduced by solving a smaller relaxation
Zhang, Yong-ku; Song, Li-ren
Campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system, is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated, then design of a campus network security model, and detail the specific implementation principle.
Full Text Available It seems plausible that a person's demographic behaviour may be influenced by that among other people in the community, for example because of an inclination to imitate. When estimating multilevel models from clustered individual data, some investigators might perhaps feel tempted to try to capture this effect by simply including on the right-hand side the average of the dependent variable, constructed by aggregation within the clusters. However, such modelling must be avoided. According to simulation experiments based on real fertility data from India, the estimated effect of this obviously endogenous variable can be very different from the true effect. Also the other community effect estimates can be strongly biased. An "imitation effect" can only be estimated under very special assumptions that in practice will be hard to defend.
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur
Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.
Full Text Available This paper presents a model for an integrated security system, which can be implemented in any organization. It is based on security-specific standards and taxonomies as ISO 7498-2 and Common Criteria. The functionalities are derived from the classes proposed in the Common Criteria document. In the paper we present the process model for each functionality and also we focus on the specific components.
Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.
Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.
Nielsen, Emil Krabbe; Bram, Mads Valentin; Frutiger, Jerome
a procedure to measure model performance, according to diagnosticrequirements, to ensure reliability during operation. A simple procedure is proposed for validatingand evaluating Multilevel Flow Modeling models. For this purpose expert statements, a dynamicprocess simulation in K-spice, and pilot plant...
When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...
Emil K. Nielsen
Full Text Available Decision support systems are a key focus of research on developing control rooms to aid operators in making reliable decisions and reducing incidents caused by human errors. For this purpose, models of complex systems can be developed to diagnose causes or consequences for specific alarms. Models applied in safety systems of complex and safety-critical systems require rigorous and reliable model building and testing. Multilevel flow modeling is a qualitative and discrete method for diagnosing faults and has previously only been validated by subjective and qualitative means. To ensure reliability during operation, this work aims to synthesize a procedure to measure model performance according to diagnostic requirements. A simple procedure is proposed for validating and evaluating the concept of multilevel flow modeling. For this purpose, expert statements, dynamic process simulations, and pilot plant experiments are used for validation of simple multilevel flow modeling models of a hydrocyclone unit for oil removal from produced water. Keywords: Fault Diagnosis, Model Validation, Multilevel Flow Modeling, Produced Water Treatment
Safro, I. M. (Mathematics and Computer Science)
researchers. We propose to develop multilevel methods to model complex networks. The key point of the proposed strategy is that it will help to preserve part of the unknown structural attributes by guaranteeing the similar behavior of the real and artificial model on different scales.
Preacher, Kristopher J; Zhang, Zhen; Zyphur, Michael J
Social scientists are increasingly interested in multilevel hypotheses, data, and statistical models as well as moderation or interactions among predictors. The result is a focus on hypotheses and tests of multilevel moderation within and across levels of analysis. Unfortunately, existing approaches to multilevel moderation have a variety of shortcomings, including conflated effects across levels of analysis and bias due to using observed cluster averages instead of latent variables (i.e., "random intercepts") to represent higher-level constructs. To overcome these problems and elucidate the nature of multilevel moderation effects, we introduce a multilevel structural equation modeling (MSEM) logic that clarifies the nature of the problems with existing practices and remedies them with latent variable interactions. This remedy uses random coefficients and/or latent moderated structural equations (LMS) for unbiased tests of multilevel moderation. We describe our approach and provide an example using the publicly available High School and Beyond data with Mplus syntax in Appendix. Our MSEM method eliminates problems of conflated multilevel effects and reduces bias in parameter estimates while offering a coherent framework for conceptualizing and testing multilevel moderation effects. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Bardini, R; Politano, G; Benso, A; Di Carlo, S
During the last decades, high-throughput techniques allowed for the extraction of a huge amount of data from biological systems, unveiling more of their underling complexity. Biological systems encompass a wide range of space and time scales, functioning according to flexible hierarchies of mechanisms making an intertwined and dynamic interplay of regulations. This becomes particularly evident in processes such as ontogenesis, where regulative assets change according to process context and timing, making structural phenotype and architectural complexities emerge from a single cell, through local interactions. The information collected from biological systems are naturally organized according to the functional levels composing the system itself. In systems biology, biological information often comes from overlapping but different scientific domains, each one having its own way of representing phenomena under study. That is, the different parts of the system to be modelled may be described with different formalisms. For a model to have improved accuracy and capability for making a good knowledge base, it is good to comprise different system levels, suitably handling the relative formalisms. Models which are both multi-level and hybrid satisfy both these requirements, making a very useful tool in computational systems biology. This paper reviews some of the main contributions in this field.
Full Text Available Traditional Rasch estimation of the item and student parameters via marginal maximum likelihood, joint maximum likelihood or conditional maximum likelihood, assume individuals in clustered settings are uncorrelated and items within a test that share a grouping structure are also uncorrelated. These assumptions are often violated, particularly in educational testing situations, in which students are grouped into classrooms and many test items share a common grouping structure, such as a content strand or a reading passage. Consequently, one possible approach is to explicitly recognize the clustered nature of the data and directly incorporate random effects to account for the various dependencies. This article demonstrates how the multilevel Rasch model can be estimated using the functions in R for mixed-effects models with crossed or partially crossed random effects. We demonstrate how to model the following hierarchical data structures: a individuals clustered in similar settings (e.g., classrooms, schools, b items nested within a particular group (such as a content strand or a reading passage, and c how to estimate a teacher × content strand interaction.
Bogaerts, Annemie; Khosravian, Narjes; Van der Paal, Jonas; Verlackt, Christof C W; Yusupov, Maksudbek; Kamaraj, Balu; Neyts, Erik C
Modelling at the molecular or atomic scale can be very useful for obtaining a better insight in plasma medicine. This paper gives an overview of different atomic/molecular scale modelling approaches that can be used to study the direct interaction of plasma species with biomolecules or the consequences of these interactions for the biomolecules on a somewhat longer time-scale. These approaches include density functional theory (DFT), density functional based tight binding (DFTB), classical reactive and non-reactive molecular dynamics (MD) and united-atom or coarse-grained MD, as well as hybrid quantum mechanics/molecular mechanics (QM/MM) methods. Specific examples will be given for three important types of biomolecules, present in human cells, i.e. proteins, DNA and phospholipids found in the cell membrane. The results show that each of these modelling approaches has its specific strengths and limitations, and is particularly useful for certain applications. A multi-level approach is therefore most suitable for obtaining a global picture of the plasma–biomolecule interactions. (paper)
Ferreira, Fernando Fagundes; Campos, Paulo R. A.
In the present work we investigate the emergence of cooperation in a multilevel selection model that assumes limiting resources. Following the work by R. J. Requejo and J. Camacho [Phys. Rev. Lett.0031-900710.1103/PhysRevLett.108.038701 108, 038701 (2012)], the interaction among individuals is initially ruled by a prisoner's dilemma (PD) game. The payoff matrix may change, influenced by the resource availability, and hence may also evolve to a non-PD game. Furthermore, one assumes that the population is divided into groups, whose local dynamics is driven by the payoff matrix, whereas an intergroup competition results from the nonuniformity of the growth rate of groups. We study the probability that a single cooperator can invade and establish in a population initially dominated by defectors. Cooperation is strongly favored when group sizes are small. We observe the existence of a critical group size beyond which cooperation becomes counterselected. Although the critical size depends on the parameters of the model, it is seen that a saturation value for the critical group size is achieved. The results conform to the thought that the evolutionary history of life repeatedly involved transitions from smaller selective units to larger selective units.
The current study introduced a general modeling framework, multilevel mixture IRT (MMIRT) which detects and describes characteristics of population heterogeneity, while accommodating the hierarchical data structure. In addition to introducing both continuous and discrete approaches to MMIRT, the main focus of the current study was to distinguish…
Barnes, Christopher; Miller, James C; Elliott, Linda; Coovert, Michael
This briefing discusses methodology and preliminary findings focused on the application of multi-level modeling techniques to distinguish effects of sleep loss and task demands on individual and team...
Carvalho Humberto M.
Full Text Available The aim of this paper was to outline a multilevel modeling approach to fit individual angle-specific torque curves describing concentric knee extension and flexion isokinetic muscular actions in Master athletes. The potential of the analytical approach to examine between individual differences across the angle-specific torque curves was illustrated including between-individuals variation due to gender differences at a higher level. Torques in concentric muscular actions of knee extension and knee extension at 60°·s-1 were considered within a range of motion between 5°and 85° (only torques “truly” isokinetic. Multilevel time series models with autoregressive covariance structures with standard multilevel models were superior fits compared with standard multilevel models for repeated measures to fit anglespecific torque curves. Third and fourth order polynomial models were the best fits to describe angle-specific torque curves of isokinetic knee flexion and extension concentric actions, respectively. The fixed exponents allow interpretations for initial acceleration, the angle at peak torque and the decrement of torque after peak torque. Also, the multilevel models were flexible to illustrate the influence of gender differences on the shape of torque throughout the range of motion and in the shape of the curves. The presented multilevel regression models may afford a general framework to examine angle-specific moment curves by isokinetic dynamometry, and add to the understanding mechanisms of strength development, particularly the force-length relationship, both related to performance and injury prevention.
Svetlana V. Sergeyeva
Full Text Available Introduction: the current leading trend of the educational development is characterised by its continuity. Institutions of higher education as multi-level educational complexes nurture favourable conditions for realisation of the strategy of lifelong education. Today a technical university offering training of future engineers is facing a topic issue of creating a multilevel educational complex. Materials and Methods: this paper is put together on the basis of modern Russian and foreign scientific literature about lifelong education. The authors used theoretical methods of scientific research: systemstructural analysis, synthesis, modeling, analysis and generalisations of concepts. Results: the paper presents a model of lifelong education developed by authors for a technical university as a multilevel educational complex. It is realised through a set of principles: multi-level and continuity, integration, conformity and quality, mobility, anticipation, openness, social partnership and feedback. In accordance with the purpose, objectives and principles, the content part of the model is formed. The syllabi following the described model are run in accordance with the training levels undertaken by a technical university as a multilevel educational complex. All syllabi are based on the gradual nature of their implementation. In this regard, the authors highlight three phases: diagnostic, constructive and transformative, assessing. Discussion and Conclusions: the expected result of the created model of lifelong education development in a technical university as a multilevel educational complex is presented by a graduate trained for effective professional activity, competitive, prepared and sought-after at the regional labour market.
Rolland, Joran; Simonnet, Eric
Adaptive multilevel splitting algorithms have been introduced rather recently for estimating tail distributions in a fast and efficient way. In particular, they can be used for computing the so-called reactive trajectories corresponding to direct transitions from one metastable state to another. The algorithm is based on successive selection–mutation steps performed on the system in a controlled way. It has two intrinsic parameters, the number of particles/trajectories and the reaction coordinate used for discriminating good or bad trajectories. We investigate first the convergence in law of the algorithm as a function of the timestep for several simple stochastic models. Second, we consider the average duration of reactive trajectories for which no theoretical predictions exist. The most important aspect of this work concerns some systems with two degrees of freedom. They are studied in detail as a function of the reaction coordinate in the asymptotic regime where the number of trajectories goes to infinity. We show that during phase transitions, the statistics of the algorithm deviate significatively from known theoretical results when using non-optimal reaction coordinates. In this case, the variance of the algorithm is peaking at the transition and the convergence of the algorithm can be much slower than the usual expected central limit behaviour. The duration of trajectories is affected as well. Moreover, reactive trajectories do not correspond to the most probable ones. Such behaviour disappears when using the optimal reaction coordinate called committor as predicted by the theory. We finally investigate a three-state Markov chain which reproduces this phenomenon and show logarithmic convergence of the trajectory durations
Bonavoglia, M.; Casadei, G.; Zarri, L.
Modular multilevel converter (MMC) is an emerging multilevel topology for high-voltage applications that has been developed in recent years. In this paper, the modeling and the control of MMCs are restated in terms of space vectors, which may allow a deeper understanding of the converter behavior....... As a result, a control scheme for three-phase MMCs based on the previous theoretical analysis is presented. Numerical simulations are used to test its feasibility.......Modular multilevel converter (MMC) is an emerging multilevel topology for high-voltage applications that has been developed in recent years. In this paper, the modeling and the control of MMCs are restated in terms of space vectors, which may allow a deeper understanding of the converter behavior...
In train collisions, multi-level rail passenger vehicles can deform in modes that are different from the behavior of single level cars. The deformation in single level cars usually occurs at the front end during a collision. In one particular inciden...
This article critiques traditional single-level statistical approaches (e.g., multiple regression analysis) to examining relationships between language test scores and variables in the assessment setting. It highlights the conceptual, methodological, and statistical problems associated with these techniques in dealing with multilevel or nested…
Rovine, Michael J.; Molenaar, Peter C. M.
Presents a method for estimating the random coefficients model using covariance structure modeling and allowing one to estimate both fixed and random effects. The method is applied to real and simulated data, including marriage data from J. Belsky and M. Rovine (1990). (SLD)
Full Text Available A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas expressing authentication and non-disclosure properties of protocols have a special form. They are quantified implications for all xs . (phi implies for some ys . psi. Models (interpretations for these formulas are *skeletons*, partially ordered structures consisting of a number of local protocol behaviors. *Realized* skeletons contain enough local sessions to explain all the behavior, when combined with some possible adversary behaviors. We show two results. (1 If phi is the antecedent of a security goal, then there is a skeleton A_phi such that, for every skeleton B, phi is satisfied in B iff there is a homomorphism from A_phi to B. (2 A protocol enforces for all xs . (phi implies for some ys . psi iff every realized homomorphic image of A_phi satisfies psi. Hence, to verify a security goal, one can use the Cryptographic Protocol Shapes Analyzer CPSA (TACAS, 2007 to identify minimal realized skeletons, or "shapes," that are homomorphic images of A_phi. If psi holds in each of these shapes, then the goal holds.
Zhang, Nan; Liu, Zehua; Han, Hongfeng
This paper introduces and inherit the multi-level trusted system model that solves the Trojan virus by encrypting the privacy of user data, and achieve the principle: "not to read the high priority hierarchy, not to write the hierarchy with low priority". Thus ensuring that the low-priority data privacy leak does not affect the disclosure of high-priority data privacy. This paper inherits the multi-level trustworthy system model of Trojan horse and divides seven different risk levels. The priority level 1˜7 represent the low to high value of user data privacy, and realize seven kinds of encryption with different execution efficiency Algorithm, the higher the priority, the greater the value of user data privacy, at the expense of efficiency under the premise of choosing a more encrypted encryption algorithm to ensure data security. For enterprises, the price point is determined by the unit equipment users to decide the length of time. The higher the risk sub-group algorithm, the longer the encryption time. The model assumes that users prefer the lower priority encryption algorithm to ensure efficiency. This paper proposes a privacy cost model for each of the seven risk subgroups. Among them, the higher the privacy cost, the higher the priority of the risk sub-group, the higher the price the user needs to pay to ensure the privacy of the data. Furthermore, by introducing the existing pricing model of economics and the human traffic model proposed by this paper and fluctuating with the market demand, this paper improves the price of unit products when the market demand is low. On the other hand, when the market demand increases, the profit of the enterprise will be guaranteed under the guidance of the government by reducing the price per unit of product. Then, this paper introduces the dynamic factors of consumers' mood and age to optimize. At the same time, seven algorithms are selected from symmetric and asymmetric encryption algorithms to define the enterprise
Sung, Yao-Ting; Chen, Ju-Ling; Cha, Ji-Her; Tseng, Hou-Chiang; Chang, Tao-Hsing; Chang, Kuo-En
Multilevel linguistic features have been proposed for discourse analysis, but there have been few applications of multilevel linguistic features to readability models and also few validations of such models. Most traditional readability formulae are based on generalized linear models (GLMs; e.g., discriminant analysis and multiple regression), but these models have to comply with certain statistical assumptions about data properties and include all of the data in formulae construction without pruning the outliers in advance. The use of such readability formulae tends to produce a low text classification accuracy, while using a support vector machine (SVM) in machine learning can enhance the classification outcome. The present study constructed readability models by integrating multilevel linguistic features with SVM, which is more appropriate for text classification. Taking the Chinese language as an example, this study developed 31 linguistic features as the predicting variables at the word, semantic, syntax, and cohesion levels, with grade levels of texts as the criterion variable. The study compared four types of readability models by integrating unilevel and multilevel linguistic features with GLMs and an SVM. The results indicate that adopting a multilevel approach in readability analysis provides a better representation of the complexities of both texts and the reading comprehension process.
Full Text Available Morphometric data usually have a hierarchical structure (i.e., cells are nested within patients, which should be taken into consideration in the analysis. In the recent years, special methods of handling hierarchical data, called multilevel models (MM, as well as corresponding software have received considerable development. However, there has been no application of these methods to morphometric data yet. In this paper we report our first experience of analyzing karyometric data by means of MLwiN – a dedicated program for multilevel modeling. Our data were obtained from 34 follicular adenomas and 44 follicular carcinomas of the thyroid. We show examples of fitting and interpreting MM of different complexity, and draw a number of interesting conclusions about the differences in nuclear morphology between follicular thyroid adenomas and carcinomas. We also demonstrate substantial advantages of multilevel models over conventional, single‐level statistics, which have been adopted previously to analyze karyometric data. In addition, some theoretical issues related to MM as well as major statistical software for MM are briefly reviewed.
Full Text Available The article presents the concept of building a network security model and its application in the process of risk analysis. It indicates the possibility of a new definition of the role of the network models in the safety analysis. Special attention was paid to the development of the use of an algorithm describing the process of identifying the assets, vulnerability and threats in a given context. The aim of the article is to present how this algorithm reduced the complexity of the problem by eliminating from the base model these components that have no links with others component and as a result and it was possible to build a real network model corresponding to reality.
Nielsen, Emil Krabbe; Bram, Mads Valentin; Frutiger, Jerome
Decision support systems are a key focus of research on developing control rooms to aid operators in making reliable decisions, and reducing incidents caused by human errors. For this purpose, models of complex systems can be developed to diagnose causes or consequences for specific alarms. Models...... during operation, this work aims to synthesize a procedure to measure model performance according to diagnostic requirements. A simple procedure is proposed for validating and evaluating the concept of Multilevel Flow Modelling. For this purpose, expert statements, dynamic process simulations, and pilot...
Multilevel random effect and marginal models for longitudinal data ... and random effect models that take the correlation among measurements of the same subject ... comparing the level of redness, pain and irritability ... clinical trial evaluating the safety profile of a new .... likelihood-based methods to compare models and.
Cheung, Mike W.-L.; Au, Kevin
Multilevel structural equation modeling (MSEM) has been proposed as an extension to structural equation modeling for analyzing data with nested structure. We have begun to see a few applications in cross-cultural research in which MSEM fits well as the statistical model. However, given that cross-cultural studies can only afford collecting data…
Beretvas, S. Natasha; Walker, Cindy M.
This study extends the multilevel measurement model to handle testlet-based dependencies. A flexible two-level testlet response model (the MMMT-2 model) for dichotomous items is introduced that permits assessment of differential testlet functioning (DTLF). A distinction is made between this study's conceptualization of DTLF and that of…
Anderson, Emma L; Tilling, Kate; Fraser, Abigail; Macdonald-Wallis, Corrie; Emmett, Pauline; Cribb, Victoria; Northstone, Kate; Lawlor, Debbie A; Howe, Laura D
Methods for the assessment of changes in dietary intake across the life course are underdeveloped. We demonstrate the use of linear-spline multilevel models to summarize energy-intake trajectories through childhood and adolescence and their application as exposures, outcomes, or mediators. The Avon Longitudinal Study of Parents and Children assessed children's dietary intake several times between ages 3 and 13 years, using both food frequency questionnaires (FFQs) and 3-day food diaries. We estimated energy-intake trajectories for 12,032 children using linear-spline multilevel models. We then assessed the associations of these trajectories with maternal body mass index (BMI), and later offspring BMI, and also their role in mediating the relation between maternal and offspring BMIs. Models estimated average and individual energy intake at 3 years, and linear changes in energy intake from age 3 to 7 years and from age 7 to 13 years. By including the exposure (in this example, maternal BMI) in the multilevel model, we were able to estimate the average energy-intake trajectories across levels of the exposure. When energy-intake trajectories are the exposure for a later outcome (in this case offspring BMI) or a mediator (between maternal and offspring BMI), results were similar, whether using a two-step process (exporting individual-level intercepts and slopes from multilevel models and using these in linear regression/path analysis), or a single-step process (multivariate multilevel models). Trajectories were similar when FFQs and food diaries were assessed either separately, or when combined into one model. Linear-spline multilevel models provide useful summaries of trajectories of dietary intake that can be used as an exposure, outcome, or mediator.
Guillen, Edward Paul; Quintero, Rulfo
Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.
Management," unpublished Ph.D. thesis, University of Texas, Austin, Texas, 1971. -23- (11) Daskin , M. and E. Stern, " A Multiobjective Set Covering...GOAL PROGRAM4MING MODEL FOR THE SITING OF MULTILEVEL EMS SYSTE-ETC(U) UNM1AR 80 A CHARNES, J E STORBECK N000iA-75-C-569 WICLASSIFIED CCS-366 N...366 A GOAL PROGRAMMING MODEL FOR THE SITING OF MULTILEVEL EMS SYSTEMS by A . Charnes J. Storbeck March 1980 This project was partially supported by
Zhang, Yi; Wang, Huai; Wang, Zhongxu
, this paper benchmarks the most commonly-employed lifetime models of power semiconductor devices for offshore Modular Multilevel Converters (MMC) based wind farms. The benchmarking reveals that the lifetime model selection has a significant impact on the lifetime estimation. The use of analytical lifetime...
de Jong, Martijn G.; Steenkamp, Jan-Benedict E. M.
We present a class of finite mixture multilevel multidimensional ordinal IRT models for large scale cross-cultural research. Our model is proposed for confirmatory research settings. Our prior for item parameters is a mixture distribution to accommodate situations where different groups of countries have different measurement operations, while…
Lu, Xingjiang; Yao, Chen; Zheng, Jianmin
This paper focuses on the training of undergraduate students' innovation ability. On top of the theoretical framework of the Quality Function Deployment (QFD), we propose a teaching quality management model. Based on this model, we establish a multilevel decomposition indicator system, which integrates innovation ability characterized by four…
Preacher, Kristopher J.; Curran, Patrick J.; Bauer, Daniel J.
Simple slopes, regions of significance, and confidence bands are commonly used to evaluate interactions in multiple linear regression (MLR) models, and the use of these techniques has recently been extended to multilevel or hierarchical linear modeling (HLM) and latent curve analysis (LCA). However, conducting these tests and plotting the…
Ergemen, Yunus Emre; Rodríguez-Caballero, Carlos Vladimir
A dynamic multi-level factor model with stationary or nonstationary global and regional factors is proposed. In the model, persistence in global and regional common factors as well as innovations allows for the study of fractional cointegrating relationships. Estimation of global and regional...
Han, Xue; Bindner, Henrik W.; You, Shi
The paper summarises several modelling applications of distributed energy resources (DERs) for various purposes, and describes the related operational issues regarding the complexity of the future distribution grid. Furthermore, a multi-level functioning interface framework is proposed for DER mo....... The information mapping for photovoltaic panel (PV) modelling is also provided as an example....
Liu, Feng; Ritzhaupt, Albert D.; Dawson, Kara; Barron, Ann E.
The purpose of this research was to design and test a model of classroom technology integration in the context of K-12 schools. The proposed multilevel path analysis model includes teacher, contextual, and school related variables on a teacher's use of technology and confidence and comfort using technology as mediators of classroom technology…
Beretvas, S. Natasha; Cawthon, Stephanie W.; Lockhart, L. Leland; Kaye, Alyssa D.
This pedagogical article is intended to explain the similarities and differences between the parameterizations of two multilevel measurement model (MMM) frameworks. The conventional two-level MMM that includes item indicators and models item scores (Level 1) clustered within examinees (Level 2) and the two-level cross-classified MMM (in which item…
Duvvuri, Sri Devi; Gruca, Thomas S.
Identifying price sensitive consumers is an important problem in marketing. We develop a Bayesian multi-level factor analytic model of the covariation among household-level price sensitivities across product categories that are substitutes. Based on a multivariate probit model of category incidence, this framework also allows the researcher to…
Konishi, Chiaki; Miyazaki, Yasuo; Hymel, Shelley; Waterhouse, Terry
This study examined how student reports of bullying were related to different dimensions of school climate, at both the school and the student levels, using a contextual effects model in a two-level multilevel modeling framework. Participants included 48,874 secondary students (grades 8 to 12; 24,244 girls) from 76 schools in Western Canada.…
Garcia-Garzon, Eduardo; Zhukovsky, Peter; Haller, Elisa; Plakolm, Sara; Fink, David; Petrova, Dafina; Mahalingam, Vaishali; Menezes, Igor G.; Ruggeri, Kai
Medical travel has expanded rapidly in recent years, resulting in new markets and increased access to medical care. Whereas several studies investigated the motives of individuals seeking healthcare abroad, the conventional analytical approach is limited by substantial caveats. Classical techniques as found in the literature cannot provide sufficient insight due to the nested nature of data generated. The application of adequate analytical techniques, specifically multilevel modeling, is scarce to non-existent in the context of medical travel. This study introduces the guidelines for application of multilevel techniques in public health research by presenting an application of multilevel modeling in analyzing the decision-making patterns of potential medical travelers. Benefits and potential limitations are discussed. PMID:27252672
Garcia-Garzon, Eduardo; Zhukovsky, Peter; Haller, Elisa; Plakolm, Sara; Fink, David; Petrova, Dafina; Mahalingam, Vaishali; Menezes, Igor G; Ruggeri, Kai
Medical travel has expanded rapidly in recent years, resulting in new markets and increased access to medical care. Whereas several studies investigated the motives of individuals seeking healthcare abroad, the conventional analytical approach is limited by substantial caveats. Classical techniques as found in the literature cannot provide sufficient insight due to the nested nature of data generated. The application of adequate analytical techniques, specifically multilevel modeling, is scarce to non-existent in the context of medical travel. This study introduces the guidelines for application of multilevel techniques in public health research by presenting an application of multilevel modeling in analyzing the decision-making patterns of potential medical travelers. Benefits and potential limitations are discussed.
The relationship between multilevel models and non-parametric multilevel mixture models: Discrete approximation of intraclass correlation, random coefficient distributions, and residual heteroscedasticity.
Rights, Jason D; Sterba, Sonya K
Multilevel data structures are common in the social sciences. Often, such nested data are analysed with multilevel models (MLMs) in which heterogeneity between clusters is modelled by continuously distributed random intercepts and/or slopes. Alternatively, the non-parametric multilevel regression mixture model (NPMM) can accommodate the same nested data structures through discrete latent class variation. The purpose of this article is to delineate analytic relationships between NPMM and MLM parameters that are useful for understanding the indirect interpretation of the NPMM as a non-parametric approximation of the MLM, with relaxed distributional assumptions. We define how seven standard and non-standard MLM specifications can be indirectly approximated by particular NPMM specifications. We provide formulas showing how the NPMM can serve as an approximation of the MLM in terms of intraclass correlation, random coefficient means and (co)variances, heteroscedasticity of residuals at level 1, and heteroscedasticity of residuals at level 2. Further, we discuss how these relationships can be useful in practice. The specific relationships are illustrated with simulated graphical demonstrations, and direct and indirect interpretations of NPMM classes are contrasted. We provide an R function to aid in implementing and visualizing an indirect interpretation of NPMM classes. An empirical example is presented and future directions are discussed. © 2016 The British Psychological Society.
Damman, Olga C; Stubbe, Janine H; Hendriks, Michelle; Arah, Onyebuchi A; Spreeuwenberg, Peter; Delnoij, Diana M J; Groenewegen, Peter P
Ratings on the quality of healthcare from the consumer's perspective need to be adjusted for consumer characteristics to ensure fair and accurate comparisons between healthcare providers or health plans. Although multilevel analysis is already considered an appropriate method for analyzing healthcare performance data, it has rarely been used to assess case-mix adjustment of such data. The purpose of this article is to investigate whether multilevel regression analysis is a useful tool to detect case-mix adjusters in consumer assessment of healthcare. We used data on 11,539 consumers from 27 Dutch health plans, which were collected using the Dutch Consumer Quality Index health plan instrument. We conducted multilevel regression analyses of consumers' responses nested within health plans to assess the effects of consumer characteristics on consumer experience. We compared our findings to the results of another methodology: the impact factor approach, which combines the predictive effect of each case-mix variable with its heterogeneity across health plans. Both multilevel regression and impact factor analyses showed that age and education were the most important case-mix adjusters for consumer experience and ratings of health plans. With the exception of age, case-mix adjustment had little impact on the ranking of health plans. On both theoretical and practical grounds, multilevel modeling is useful for adequate case-mix adjustment and analysis of performance ratings.
Ahmadpanah, Seyed Hossein
In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...
V. S. Kolomoitcev
Full Text Available We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls. The scheme is considered in view of the fact that the system has got common areas of removing threats in the channel for different means of protection. Parameters of average residence time of request in the system and its reliability were obtained for each variant of access scheme. Based on the results, comparison of the ways of design for access scheme was carried out between themselves and with the standard access scheme (with onefirewall. It was found out that design of access scheme with a single group of routers for the whole system has better performance and reliability than the other variants of "Direct Connection" access scheme.
Full Text Available This paper presents a three-cell converter DC / AC. Multilevel topologies are attracting attention in the industry, obtained as a ripple on the state variables much smaller, and reduces stress on the switching devices. The topology used in this work is known in the technical literature as floating capacitor multilevel inverter, which imposes the challenge of balancing the voltage across each cell switching using floating capacitors, besides obtaining a sinusoidal signal regulated. The paper presents the averaged model of the inverter, and results obtained through simulation.
Bennink, M.; Croon, M.A.; Kroon, B.; Vermunt, J.K.
An existing micro-macro method for a single individual-level variable is extended to the multivariate situation by presenting two multilevel latent class models in which multiple discrete individual-level variables are used to explain a group-level outcome. As in the univariate case, the
Jones, Leah; Totsika, Vasiliki; Hastings, Richard P.; Petalas, Michael A.
Parenting a child with autism may differentially affect mothers and fathers. Existing studies of mother-father differences often ignore the interdependence of data within families. We investigated gender differences within-families using multilevel linear modeling. Mothers and fathers of children with autism (161 couples) reported on their own…
Martinovic, B.; van Tubergen, F.; Maas, I.
Interethnic ties are considered important for the cohesion in society. Previous research has studied the determinants of interethnic ties with cross-sectional data or lagged panel designs. This study improves on prior research by applying multilevel growth curve modelling techniques with lagged
Martinovic, Borja|info:eu-repo/dai/nl/304822752; van Tubergen, Frank|info:eu-repo/dai/nl/271429534; Maas, Ineke|info:eu-repo/dai/nl/075229390
Interethnic ties are considered important for the cohesion in society. Previous research has studied the determinants of interethnic ties with cross-sectional data or lagged panel designs. This study improves on prior research by applying multilevel growth curve modelling techniques with lagged
Humphrey, Neil; Wigelsworth, Michael
The current study explores some of the factors associated with children's mental health difficulties in primary school. Multilevel modeling with data from 628 children from 36 schools was used to determine how much variation in mental health difficulties exists between and within schools, and to identify characteristics at the school and…
Li, Ci-Rong; Lin, Chen-Ju; Tien, Yun-Hsiang; Chen, Chien-Ming
We developed a multi-level model to test how team cultural diversity may relate to team- and individual-level creativity, integrating team diversity research and information-exchange perspective. We proposed that the team climate for inclusion would moderate both the relationship between cultural diversity and team information sharing and between…
Li, Baoyue; Bruyneel, Luk; Lesaffre, Emmanuel
A traditional Gaussian hierarchical model assumes a nested multilevel structure for the mean and a constant variance at each level. We propose a Bayesian multivariate multilevel factor model that assumes a multilevel structure for both the mean and the covariance matrix. That is, in addition to a multilevel structure for the mean we also assume that the covariance matrix depends on covariates and random effects. This allows to explore whether the covariance structure depends on the values of the higher levels and as such models heterogeneity in the variances and correlation structure of the multivariate outcome across the higher level values. The approach is applied to the three-dimensional vector of burnout measurements collected on nurses in a large European study to answer the research question whether the covariance matrix of the outcomes depends on recorded system-level features in the organization of nursing care, but also on not-recorded factors that vary with countries, hospitals, and nursing units. Simulations illustrate the performance of our modeling approach. Copyright © 2013 John Wiley & Sons, Ltd.
Dmitry Sergeevich Chernyavskiy
Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.
Full Text Available Thanks to scalability, performance and efficiency, the Modular Multilevel Converter (MMC, since its invention, becomes an attractive topology in industrial applications such as high voltage direct current (HVDC transmission system. However, modelling challenges related to the high number of switching elements in the MMC are highlighted when such systems are integrated into large simulated networks for stability or protection algorithms testing. In this work, a novel dynamic models for MMC is proposed. The proposed models are intended to simplify modeling challenges related to the high number of switching elements in the MMC. The models can be easily used to simulate the converter for stability analysis or protection algorithms for HVDC grids.
Lo, Celia C; Cheng, Tyrone C
We intended to determine (1) whether stress from employment disadvantages led to increased frequency of heavy drinking and (2) whether race had a role in the relationship between such disadvantages and heavy drinking. Study data came from the National Longitudinal Survey of Youth, a prospective study that has followed a representative sample of youth since 1979. Our study employed data from 11 particular years, during which the survey included items measuring respondents' heavy drinking. Our final sample numbered 10,171 respondents, which generated 75,394 person-waves for data analysis. Both of our hypotheses were supported by results from multilevel mixed-effects linear regression capturing the time-varying nature of three employment disadvantages and of the heavy-drinking outcome. Results show that more-frequent heavy drinking was associated with employment disadvantages, and that disadvantages' effects on drinking were stronger for Blacks and Hispanics than for Whites. That worsening employment disadvantages have worse effects on minority groups' heavy drinking (compared to Whites) probably contributes to the racial health disparities in our nation. Policies and programs addressing such disparities are especially important during economic downturns.
I. V. Khomyackov
Full Text Available A stochastic model of critically important object security system element has been developed. The model includes mathematical description of the security system element properties and external influences. The state evolution of the security system element is described by the semi-Markov process with finite states number, the semi-Markov matrix and the initial semi-Markov process states probabilities distribution. External influences are set with the intensity of the Poisson thread.
Full Text Available Konsekuensi dari penyakit-penyakit yang sering dialami oleh pekerja merupakan kerugian besar bagi perusahaan dan pekerja. Dalam rangka mengatasi persoalan penyakit pada pekerja, perlu upaya promosi kesehatan di tempat kerja, khususnya untuk mengubah perilaku. Penerapan perubahan perilaku di tempat kerja bersifat lebih kompleks. Perubahan perilaku tidak saja didorong oleh faktor-faktor individu, tetapi juga oleh peran faktor eksternal, sehingga pihak yang dijadikan sasaran workplace health promotion (WHP adalah secara multilevel. Artikel ini menjelaskan rumusan model WHP multilevel yang dapat diterapkan untuk mengubah perilaku pekerja yang tidak sehat, sehingga diharapkan dapat menurunkan kesakitan dan kematian penyakit pada pekerja. Prinsip pemilihan model perubahan perilaku, perlu diperhatikan dalam merumuskan WHP secara multilevel. Hal ini dijadikan sebagai acuan memodifikasi perilaku yang akan dituju. Selanjutnya, prinsip memilih strategi dan metode perubahan perilaku, disesuaikan dengan level sasaran yang diintervensi. Secara keseluruhan, prinsip-prinsip ini dirumuskan dalam sebuah acuan program WHP secara komprehensif dan dilaksanakan dengan efektif dan efisien di tempat kerja. Artikel ini dapat menjadi acuan bagi pihak yang akan mengimplementasikan WHP dengan pendekatan perubahan perilaku secara multilevel.
Ehret, Phillip J; Monroe, Brian M; Read, Stephen J
We present a neural network implementation of central components of the iterative reprocessing (IR) model. The IR model argues that the evaluation of social stimuli (attitudes, stereotypes) is the result of the IR of stimuli in a hierarchy of neural systems: The evaluation of social stimuli develops and changes over processing. The network has a multilevel, bidirectional feedback evaluation system that integrates initial perceptual processing and later developing semantic processing. The network processes stimuli (e.g., an individual's appearance) over repeated iterations, with increasingly higher levels of semantic processing over time. As a result, the network's evaluations of stimuli evolve. We discuss the implications of the network for a number of different issues involved in attitudes and social evaluation. The success of the network supports the IR model framework and provides new insights into attitude theory. © 2014 by the Society for Personality and Social Psychology, Inc.
Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.
Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.
Center for Homeland Defense and Security
Center for Homeland Defense and Security, OUT OF THE CLASSROOM Download the paper: Layered Defense: Modeling Terrorist Transfer Threat Networks and Optimizing Network Risk Reduction” Students in Ted Lewis’ Critical Infrastructure Protection course are taught how mathematic modeling can provide...
Arthur Low; Steven Muegge
Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor...
Nagel-Alne, G E; Krontveit, R; Bohlin, J; Valle, P S; Skjerve, E; Sølverød, L S
In 2001, the Norwegian Goat Health Service initiated the Healthier Goats program (HG), with the aim of eradicating caprine arthritis encephalitis, caseous lymphadenitis, and Johne's disease (caprine paratuberculosis) in Norwegian goat herds. The aim of the present study was to explore how control and eradication of the above-mentioned diseases by enrolling in HG affected milk yield by comparison with herds not enrolled in HG. Lactation curves were modeled using a multilevel cubic spline regression model where farm, goat, and lactation were included as random effect parameters. The data material contained 135,446 registrations of daily milk yield from 28,829 lactations in 43 herds. The multilevel cubic spline regression model was applied to 4 categories of data: enrolled early, control early, enrolled late, and control late. For enrolled herds, the early and late notations refer to the situation before and after enrolling in HG; for nonenrolled herds (controls), they refer to development over time, independent of HG. Total milk yield increased in the enrolled herds after eradication: the total milk yields in the fourth lactation were 634.2 and 873.3 kg in enrolled early and enrolled late herds, respectively, and 613.2 and 701.4 kg in the control early and control late herds, respectively. Day of peak yield differed between enrolled and control herds. The day of peak yield came on d 6 of lactation for the control early category for parities 2, 3, and 4, indicating an inability of the goats to further increase their milk yield from the initial level. For enrolled herds, on the other hand, peak yield came between d 49 and 56, indicating a gradual increase in milk yield after kidding. Our results indicate that enrollment in the HG disease eradication program improved the milk yield of dairy goats considerably, and that the multilevel cubic spline regression was a suitable model for exploring effects of disease control and eradication on milk yield. Copyright © 2014
Full Text Available This paper develops a methodology for extending multilevel modelling to incorporate spatial interaction effects. The motivation is that classic multilevel models are not specifically spatial. Lower level units may be nested into higher level ones based on a geographical hierarchy (or a membership structure--for example, census zones into regions but the actual locations of the units and the distances between them are not directly considered: what matters is the groupings but not how close together any two units are within those groupings. As a consequence, spatial interaction effects are neither modelled nor measured, confounding group effects (understood as some sort of contextual effect that acts 'top down' upon members of a group with proximity effects (some sort of joint dependency that emerges between neighbours. To deal with this, we incorporate spatial simultaneous autoregressive processes into both the outcome variable and the higher level residuals. To assess the performance of the proposed method and the classic multilevel model, a series of Monte Carlo simulations are conducted. The results show that the proposed method performs well in retrieving the true model parameters whereas the classic multilevel model provides biased and inefficient parameter estimation in the presence of spatial interactions. An important implication of the study is to be cautious of an apparent neighbourhood effect in terms of both its magnitude and statistical significance if spatial interaction effects at a lower level are suspected. Applying the new approach to a two-level land price data set for Beijing, China, we find significant spatial interactions at both the land parcel and district levels.
Neumayr, Bernd; Schuetz, Christoph G; Jeusfeld, Manfred A; Schrefl, Michael
An enterprise database contains a global, integrated, and consistent representation of a company's data. Multi-level modeling facilitates the definition and maintenance of such an integrated conceptual data model in a dynamic environment of changing data requirements of diverse applications. Multi-level models transcend the traditional separation of class and object with clabjects as the central modeling primitive, which allows for a more flexible and natural representation of many real-world use cases. In deep instantiation, the number of instantiation levels of a clabject or property is indicated by a single potency. Dual deep modeling (DDM) differentiates between source potency and target potency of a property or association and supports the flexible instantiation and refinement of the property by statements connecting clabjects at different modeling levels. DDM comes with multiple generalization of clabjects, subsetting/specialization of properties, and multi-level cardinality constraints. Examples are presented using a UML-style notation for DDM together with UML class and object diagrams for the representation of two-level user views derived from the multi-level model. Syntax and semantics of DDM are formalized and implemented in F-Logic, supporting the modeler with integrity checks and rich query facilities.
With more and more widespread usage of computer systems and networks, dependability becomes a paramount requirement. Dependability typically denotes tolerance or protection against all kinds of failures, errors and faults. Sources of failures can basically be accidental, e.g., in case of hardware errors or software bugs, or intentional due to some kind of malicious behavior. These intentional, malicious actions are subject of security. A more complete overview on the relations between dependability and security can be found in . In parallel to the increased use of technology, misuse also has grown significantly, requiring measures to deal with it.
Nielsen, Jesper Buus
you as possible. This is the general problem of secure multiparty computation. The usual way of formalizing the problem is to say that a number of parties who do not trust each other wish to compute some function of their local inputs, while keeping their inputs as secret as possible and guaranteeing...... the channels by which they communicate. A general solution to the secure multiparty computation problem is a compiler which given any feasible function describes an efficient protocol which allows the parties to compute the function securely on their local inputs over an open network. Over the past twenty...... years the secure multiparty computation problem has been the subject of a large body of research, both research into the models of multiparty computation and research aimed at realizing general secure multiparty computation. The main approach to realizing secure multiparty computation has been based...
Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel
This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.
Wang Huan; Guo Xiuhua; Jia Zhongwei; Li Hongkai; Liang Zhigang; Li Kuncheng; He Qian
Purpose: To introduce multilevel binomial logistic prediction model-based computer-aided diagnostic (CAD) method of small solitary pulmonary nodules (SPNs) diagnosis by combining patient and image characteristics by textural features of CT image. Materials and methods: Describe fourteen gray level co-occurrence matrix textural features obtained from 2171 benign and malignant small solitary pulmonary nodules, which belongs to 185 patients. Multilevel binomial logistic model is applied to gain these initial insights. Results: Five texture features, including Inertia, Entropy, Correlation, Difference-mean, Sum-Entropy, and age of patients own aggregating character on patient-level, which are statistically different (P < 0.05) between benign and malignant small solitary pulmonary nodules. Conclusion: Some gray level co-occurrence matrix textural features are efficiently descriptive features of CT image of small solitary pulmonary nodules, which can profit diagnosis of earlier period lung cancer if combined patient-level characteristics to some extent.
O. F. Shikhova
Full Text Available The paper considers the research findings aimed at the developing the new quality testing technique for students assessment at Technical Higher School. The model of multilevel estimation means is provided for diagnosing the level of general cultural and professional competences of students doing a bachelor degree in technological fields. The model implies the integrative character of specialists training - the combination of both the psycho-pedagogic (invariable and engineering (variable components, as well as the qualimetric approach substantiating the system of students competence estimation and providing the most adequate assessment means. The principles of designing the multilevel estimation means are defined along with the methodology approaches to their implementation. For the reasonable selection of estimation means, the system of quality criteria is proposed by the authors, being based on the group expert assessment. The research findings can be used for designing the competence-oriented estimation means.
Zhang, Xinxin; Lind, Morten; Ravn, Ole
For complex engineering systems, there is an increasing demand for safety and reliability. Decision support system (DSS) is designed to offer su-pervision and analysis about operational situations. A proper model representa-tion is required for DSS to understand the process knowledge. Multilevel ...... techniques of MFM reasoning and less mature yet relevant MFM concepts are considered. It also offers an architecture design of task organization for MFM software tools by using the concept of agent and technology of multiagent software system....
Serge-Étienne Parent; Michaël A. Leblanc; Annie-Claude Parent; Zonlehoua Coulibali; Léon E. Parent
Technologies of precision agriculture, digital soil maps, and meteorological stations provide a minimum data set to guide precision farming operations. However, determining optimal nutrient requirements for potato (Solanum tuberosum L.) crops at subfield scale remains a challenge given specific climatic, edaphic, and managerial conditions. Multilevel modeling can generalize yield response to fertilizer additions using data easily accessible to growers. Our objective was to elaborate a multile...
Wu, Jiun-Yu; Lee, Yuan-Hsuan; Lin, John J H
To construct CFA, MCFA, and maximum MCFA with LISREL v.8 and below, we provide iMCFA (integrated Multilevel Confirmatory Analysis) to examine the potential multilevel factorial structure in the complex survey data. Modeling multilevel structure for complex survey data is complicated because building a multilevel model is not an infallible statistical strategy unless the hypothesized model is close to the real data structure. Methodologists have suggested using different modeling techniques to investigate potential multilevel structure of survey data. Using iMCFA, researchers can visually set the between- and within-level factorial structure to fit MCFA, CFA and/or MAX MCFA models for complex survey data. iMCFA can then yield between- and within-level variance-covariance matrices, calculate intraclass correlations, perform the analyses and generate the outputs for respective models. The summary of the analytical outputs from LISREL is gathered and tabulated for further model comparison and interpretation. iMCFA also provides LISREL syntax of different models for researchers' future use. An empirical and a simulated multilevel dataset with complex and simple structures in the within or between level was used to illustrate the usability and the effectiveness of the iMCFA procedure on analyzing complex survey data. The analytic results of iMCFA using Muthen's limited information estimator were compared with those of Mplus using Full Information Maximum Likelihood regarding the effectiveness of different estimation methods.
Rehan Ahmad Khan
Full Text Available Random intercept model and random intercept & random slope model carrying two-levels of hierarchy in the population are presented and compared with the traditional regression approach. The impact of students’ satisfaction on their grade point average (GPA was explored with and without controlling teachers influence. The variation at level-1 can be controlled by introducing the higher levels of hierarchy in the model. The fanny movement of the fitted lines proves variation of student grades around teachers.
Min, Ari; Park, Chang Gi; Scott, Linda D
Data envelopment analysis (DEA) is an advantageous non-parametric technique for evaluating relative efficiency of performance. This article describes use of DEA to estimate technical efficiency of nursing care and demonstrates the benefits of using multilevel modeling to identify characteristics of efficient facilities in the second stage of analysis. Data were drawn from LTCFocUS.org, a secondary database including nursing home data from the Online Survey Certification and Reporting System and Minimum Data Set. In this example, 2,267 non-hospital-based nursing homes were evaluated. Use of DEA with nurse staffing levels as inputs and quality of care as outputs allowed estimation of the relative technical efficiency of nursing care in these facilities. In the second stage, multilevel modeling was applied to identify organizational factors contributing to technical efficiency. Use of multilevel modeling avoided biased estimation of findings for nested data and provided comprehensive information on differences in technical efficiency among counties and states. © The Author(s) 2016.
In addition to random effects, various time series correlation structures were evaluated to account for residual autocorrelation, and the AR(1) and ARMA(1,1) structures were selected for the branch diameter and length growth models, respectively. Model validation results using an independent data set confirmed that ...
Joshua Onome Imoniana
Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.
Rom-Jensen, Byron Zachary
of Scandinavian achievements were variable in their ideological outlook and sometimes deliberately challenged the existence and goals of New Deal policies. Moreover, this essay explores the usage of Scandinavia in New Deal social legislation by examining the policymaking rhetoric of the Social Security Act...... and its 1939 amendments. The surprising plasticity of the Scandinavian image amongst policymakers ultimately reveals the fluid nature of both New Deal-era politics and the Scandinavian images it appropriated....
Kirch, Alexsandro; de Almeida, James M; Miranda, Caetano R
The complexity displayed by nanofluidic-based systems involves electronic and dynamic aspects occurring across different size and time scales. To properly model such kind of system, we introduced a top-down multilevel approach, combining molecular dynamics simulations (MD) with first-principles electronic transport calculations. The potential of this technique was demonstrated by investigating how the water and ionic flow through a (6,6) carbon nanotube (CNT) influences its electronic transport properties. We showed that the confinement on the CNT favors the partially hydrated Na, Cl, and Li ions to exchange charge with the nanotube. This leads to a change in the electronic transmittance, allowing for the distinguishing of cations from anions. Such an ionic trace may handle an indirect measurement of the ionic current that is recorded as a sensing output. With this case study, we are able to show the potential of this top-down multilevel approach, to be applied on the design of novel nanofluidic devices.
Full Text Available In this Paper the problem of removing Power dissipation from single phase Induction Motor with DC sources is considered by the speed control of Induction Motor with highly advanced 9-Level multi-level Inverter which having approximate zero Harmonics. As the demand of power is increasing day by day. So that we must introduced very advanced Electrical Instruments which having high efficiency and less dissipation of power. The requirement of very advanced Inverter is necessary. Here we are designing a Multi-level Inverter up to the 9-level using IGBT Insulated-gate bipolar transistor by Mat lab which having negligible total harmonic distortion THD thats why it will control the speed of single phase Induction motor which is presently widely used in our daily needs. Also several informative Simulation results verify the authority and truthiness of the proposed Model.
Ellen L. Hamaker
Full Text Available Whether level 1 predictors should be centered per cluster has received considerable attention in the multilevel literature. While most agree that there is no one preferred approach, it has also been argued that cluster mean centering is desirable when the within-cluster slope and the between-cluster slope are expected to deviate, and the main interest is in the within-cluster slope. However, we show in a series of simulations that if one has a multilevel autoregressive model in which the level 1 predictor is the lagged outcome variable (i.e., the outcome variable at the previous occasion, cluster mean centering will in general lead to a downward bias in the parameter estimate of the within-cluster slope (i.e., the autoregressive relationship. This is particularly relevant if the main question is whether there is on average an autoregressive effect. Nonetheless, we show that if the main interest is in estimating the effect of a level 2 predictor on the autoregressive parameter (i.e., a cross-level interaction, cluster mean centering should be preferred over other forms of centering. Hence, researchers should be clear on what is considered the main goal of their study, and base their choice of centering method on this when using a multilevel autoregressive model.
Yoshimura, Seiichi; Takano, Kenichi; Sasou, Kunihide
It is necessary to analyze an operator's thinking process and a operator team's intension forming process for preventing human errors in a highly advanced huge system like a nuclear power plant. Central Research Institute of Electric Power Industry is promoting a research project to establish human error prevention countermeasures by modeling the thinking and intension forming process. The important is the future prediction and the cause identification when abnormal situations occur in a nuclear power plant. The concept of Multilevel Flow Modeling (MFM) seems to be effective as an operator's mental model which performs the future prediction and the cause identification. MFM is a concept which qualitatively describes the plant functions by energy and mass flows and also describes the plant status by breaking down the targets in a hierarchical manner which a plant should achieve. In this paper, an operator's mental model using the concept of MFM was proposed and a nuclear power plant diagnosis support system using MFM was developed. The system evaluation test by personnel who have operational experience in nuclear power plants revealed that MFM was superior in the future prediction and the cause identification to a traditional nuclear power plant status display system which used mimics and trends. MFM proved to be useful as an operator's mental model by the test. (author)
Full Text Available Video surveillance system senses and trails out all the threatening issues in the real time environment. It prevents from security threats with the help of visual devices which gather the information related to videos like CCTV’S and IP (Internet Protocol cameras. Video surveillance system has become a key for addressing problems in the public security. They are mostly deployed on the IP based network. So, all the possible security threats exist in the IP based application might also be the threats available for the reliable application which is available for video surveillance. In result, it may increase cybercrime, illegal video access, mishandling videos and so on. Hence, in this paper an intelligent model is used to propose security for video surveillance system which ensures safety and it provides secured access on video.
The models were applied to data obtained from a phase-III clinical trial on a new meningococcal vaccine. The goal is to investigate whether children injected by the candidate vaccine have a lower or higher risk for the occurrence of specific adverse events than children injected with licensed vaccine, and if so, to quantify the ...
Mustaffa, Azizul Azri; Díaz Tovar, Carlos Axel; Hukkerikar, Amol
). The applicability of this methodology is highlighted in each level of modeling through the analysis of a lipid process that has significant relevance in the edible oil and biodiesel industries since it determines the quality of the final oil product, the physical refining process of oils and fats....
42 H. FIREWALL AND IPS LANGUAGES...Research Laboratory AIS automated information system ANOA advance notice of arrival APT advanced persistent threat BFM boundary flow modeling...of Investigation FW firewall GENSER general service xvi GUI graphical user interface HAG high-assurance guard HGS high-grade service H-H-H High
Reed, Don Collins
The model of moral functioning scaffolded in the 2008 "JME" Special Issue is here revisited in response to three papers criticising that volume. As guest editor of that Special Issue I have formulated the main body of this response, concerning the dynamic systems approach to moral development, the problem of moral relativism and the role of…
Porrill, John; Dean, Paul; Anderson, Sean R
Cerebellar function is increasingly discussed in terms of engineering schemes for motor control and signal processing that involve internal models. To address the relation between the cerebellum and internal models, we adopt the chip metaphor that has been used to represent the combination of a homogeneous cerebellar cortical microcircuit with individual microzones having unique external connections. This metaphor indicates that identifying the function of a particular cerebellar chip requires knowledge of both the general microcircuit algorithm and the chip's individual connections. Here we use a popular candidate algorithm as embodied in the adaptive filter, which learns to decorrelate its inputs from a reference ('teaching', 'error') signal. This algorithm is computationally powerful enough to be used in a very wide variety of engineering applications. However, the crucial issue is whether the external connectivity required by such applications can be implemented biologically. We argue that some applications appear to be in principle biologically implausible: these include the Smith predictor and Kalman filter (for state estimation), and the feedback-error-learning scheme for adaptive inverse control. However, even for plausible schemes, such as forward models for noise cancellation and novelty-detection, and the recurrent architecture for adaptive inverse control, there is unlikely to be a simple mapping between microzone function and internal model structure. This initial analysis suggests that cerebellar involvement in particular behaviours is therefore unlikely to have a neat classification into categories such as 'forward model'. It is more likely that cerebellar microzones learn a task-specific adaptive-filter operation which combines a number of signal-processing roles. Copyright © 2012 Elsevier Ltd. All rights reserved.
Koch, Tobias; Schultze, Martin; Eid, Michael; Geiser, Christian
One of the key interests in the social sciences is the investigation of change and stability of a given attribute. Although numerous models have been proposed in the past for analyzing longitudinal data including multilevel and/or latent variable modeling approaches, only few modeling approaches have been developed for studying the construct validity in longitudinal multitrait-multimethod (MTMM) measurement designs. The aim of the present study was to extend the spectrum of current longitudinal modeling approaches for MTMM analysis. Specifically, a new longitudinal multilevel CFA-MTMM model for measurement designs with structurally different and interchangeable methods (called Latent-State-Combination-Of-Methods model, LS-COM) is presented. Interchangeable methods are methods that are randomly sampled from a set of equivalent methods (e.g., multiple student ratings for teaching quality), whereas structurally different methods are methods that cannot be easily replaced by one another (e.g., teacher, self-ratings, principle ratings). Results of a simulation study indicate that the parameters and standard errors in the LS-COM model are well recovered even in conditions with only five observations per estimated model parameter. The advantages and limitations of the LS-COM model relative to other longitudinal MTMM modeling approaches are discussed. PMID:24860515
Hajizadeh, Amin; Shahirinia, Amir
Investigation of an advanced control structure for integration of Photovoltaic Power Systems through Grid Connected-Modular Multilevel Converter (GC-MMC) is proposed in this paper. To achieve this goal, a non-linear model of MMC regarding considering of negative and positive sequence components has...... been presented. Then, due to existence of unbalance voltage faults in distribution grid, non-linarites and uncertainties in model, model predictive controller which is developed for GC-MMC. They are implemented based upon positive and negative components of voltage and current to mitigate the power...
Full Text Available Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor” models nor the silicon intellectual-property licensing (“IP-licensing” models allow small technology companies to successfully compete. This article describes an alternative approach that produces an ongoing stream of novel network security processors for niche markets through continuous innovation by both large and small companies. This approach, referred to here as the "business ecosystem model for network security processors", includes a flexible and reconfigurable technology platform, a “keystone” business model for the company that maintains the platform architecture, and an extended ecosystem of companies that both contribute and share in the value created by innovation. New opportunities for business model innovation by participating companies are made possible by the ecosystem model. This ecosystem model builds on: i the lessons learned from the experience of the first author as a senior integrated circuit architect for providers of public-key cryptography solutions and as the owner of a semiconductor startup, and ii the latest scholarly research on technology entrepreneurship, business models, platforms, and business ecosystems. This article will be of interest to all technology entrepreneurs, but it will be of particular interest to owners of small companies that provide security solutions and to specialized security professionals seeking to launch their own companies.
Full Text Available Multi Level Marketing is a very popular business model in the Western countries. It is a kind of hybrid of the method of distribution of goods and the method of building a sales network. It is one of the safest (carries a very low risk ways of conducting a business activity. The knowledge about functioning of this business model, both among theoreticians (scanty literature on the subject and practitioners, is still insufficient in Poland. Thus, the presented paper has been prepared as — in the Authors' opinion — it, at least infinitesimally, bridges the gap in the recognition of Multi Level Marketing issues. The aim of the study was, first of all, to describe Multi Level Marketing, to indicate practical benefits of this business model as well as to present basic systems of calculating a commission, which are used in marketing plans of companies. The discussion was based on the study of literature and the knowledge gained in the course of free-form interviews with the leaders of the sector.
Ming, Wei; Xiao, Jianli
Vehicle logo recognition plays an important role in manufacturer identification and vehicle recognition. This paper proposes a new vehicle logo recognition algorithm. It has a hierarchical framework, which consists of two fusion levels. At the first level, a feature fusion model is employed to map the original features to a higher dimension feature space. In this space, the vehicle logos become more recognizable. At the second level, a weighted voting strategy is proposed to promote the accuracy and the robustness of the recognition results. To evaluate the performance of the proposed algorithm, extensive experiments are performed, which demonstrate that the proposed algorithm can achieve high recognition accuracy and work robustly.
Full Text Available Tujuan umum penelitian ini untuk mengkaji bagaimana berbagai variabel mempengaruhi pertumbuhan anak usia 0-24 bulan di kabupaten Sleman. Penelitian noneksperimen desain korelasional ini dilakukan pada 272 anak usia 0-24 bulan yang diambil secara acak stratifikasi dari dua kecamatan (Sleman dan Moyudan yang ditentukan secara purposif. Analisis multilevel pertumbuhan anak dilakukan dengan program Stata-10 dan analisis jalur dilakukan dengan program Amos-8. Hasil penelitian menunjukkan bahwa ada hubungan variabel berat badan lahir, jenis kelamin dan strata usia anak dan status gizi ibu dengan pertumbuhan anak pada level-1 dan ada hubungan variabel hasil penimbangan pada level-2, sedangkan pada level 3 ada hubungan yang tidak signifikan hasil penimbangan dan pencapaian program. Hasil analisis jalur yang mempengaruhi pertumbuhan anak 0-24 bulan, yakni variabel endogenous terdiri dari status gizi ibu, pengetahuan ibu tentang gizi seimbang, pertumbuhan anak indeks BB/U, hasil penimbangan tingkat dusun dan hasil program tingkat desa. Sedangkan variabel exogenous terdiri dari sikap ibu terhadap posyandu, berat badan lahir, jenis kelamin dan stratifikasi usia anak. Kata kunci: Model multilevel, Pertumbuhan anak 0-24 bulan ______________________________________________________________ A MULTILEVEL MODEL FOR THE GROWTH OF CHILDREN AGED 0-24 MONTHS AND THE VARIABLES AFFECTING IT Abstract The main objective of this study is to investigate how various variables contribute to the growth of children between 0-24 months old in Sleman Regency. This study was a non-experimental correlational design which was conducted on 272 children aged 0-24 months, selected using the purposive stratified random sampling technique from 21 hamlets in two districts (Sleman and Moyudan. The multilevel analysis of children’s growth of was carried out using the Stata-10 program and the path analysis using the Amos-8 program. The results show that there is a significant
Mackaronis, Julia E; Strassberg, Donald S; Cundiff, Jeanne M; Cann, Deanna J
When individuals (observers) assess how appealing they find sexual stimuli (targets), which factors matter and to whom? The present study examined how observer and target characteristics interact and impact perceived sexual appeal. Participants were 302 men (206 heterosexual, 96 gay) and 289 women (196 heterosexual, 93 lesbian) between the ages of 18 and 67 years, who viewed 34 photographs of targets of their preferred gender and rated each target for sexual appeal, masculinity-femininity, and estimated age. Participants also rated their own masculinity-femininity. A baseline model indicated that roughly 30 % of the variance in sexual appeal ratings was at the observer level (between observers) and 70 % of the variance was at the target level (within observers). In the final model, five characteristics of the participant observers (gender, sexual orientation, age, race/ethnicity, and self-described masculinity-femininity) and six characteristics of the target photographs (gender, whether the photographs were taken from heterosexual versus gay/lesbian media, race/ethnicity, perceived masculinity-femininity, and estimated age) were independently and interactively related to observer ratings of target sexual appeal. Observers displayed preferences for similar targets in terms of race/ethnicity and masculinity-femininity, while also displaying a general preference for target youth. Variation in the strength of these preferences occurred according to observers' own gender, race/ethnicity, masculinity-femininity, and sexual orientation.
, software components and human actors interacting with each other to form so-called socio-technical systems. The importance of socio-technical systems to modern societies requires verifying their security properties formally, while their inherent complexity makes manual analyses impracticable. Graphical...... models for security offer an unrivalled opportunity to describe socio-technical systems, for they allow to represent different aspects like human behaviour, computation and physical phenomena in an abstract yet uniform manner. Moreover, these models can be assigned a formal semantics, thereby allowing...... formal verification of their properties. Finally, their appealing graphical notations enable to communicate security concerns in an understandable way also to non-experts, often in charge of the decision making. This dissertation argues that automated techniques can be developed on graphical security...
Tae-Hyoung Tommy Gim
Full Text Available Interests in weekend trips are increasing, but few have studied how they are affected by land use. In this study, we analyze the relationship between compact land use characteristics and trip time in Seoul, Korea by comparing two research models, each of which uses the weekday and weekend data of the same travelers. To secure sufficient numbers of subjects and groups, full random coefficients multilevel models define the trip as level one and the neighborhood as level two, and find that level-two land use characteristics account for less variation in trip time than level-one individual characteristics. At level one, weekday trip time is found to be reduced by the choice of the automobile as a travel mode, but not by its ownership per se. In addition, it becomes reduced if made by high income travelers and extended to travel to quality jobs. Among four land use characteristics at level two, population density, road connectivity, and subway availability are shown to be significant in the weekday model. Only subway availability has a positive relationship with trip time and this finding is consistent with the level-one result that the choice of automobile alternatives increases trip time. The other land use characteristic, land use balance, turns out to be a single significant land use variable in the weekend model, implying that it is concerned mainly with non-work, non-mandatory travel.
Zhang, Yi; Wang, Huai; Wang, Zhongxu
One of the future challenges in Modular Multilevel Converters (MMCs) is how to size key components with compromised costs and design margins while fulfilling specific reliability targets. It demands better thermal modeling compared to the state-of-the-art in terms of both accuracy and simplicity....... Different from two-level power converters, MMCs have inherent dc-bias in arm currents and the power device conduction time is affected by operational parameters. A time-wise thermal modeling for the power devices in MMCs is, therefore, an iteration process and time-consuming. This paper thus proposes...
Businaro, T.; Di Lorenzo, A.; Meo, G.B.; Rabbani, M.I.; Rubino, E.
With the advent of advanced digital techniques it has been rendered possible, necessity of which has long since been recognised, to develop a computer based man-machine interface and hance an expert system based on knowledge based decision making for operator support in the control rooms of nuclear plants. The Multilevel Flow Modelling method developed at RISO Laboratories, Denmark, has been applied in the present experiment to model Italian PEC reactor and to verify applicability of this method in plant state identification. In MFM method functional structure of a process plant is described in terms of a set of interrelated mass and energy flow structures on different levels of physical aggregation
Strathe, Anders Bjerring; Danfær, Allan Christian; Sørensen, H.
Growth functions have been used to predict market weight of pigs and maximize return over feed costs. This study was undertaken to compare 4 growth functions and methods of analyzing data, particularly one that considers nonlinear repeated measures. Data were collected from an experiment with 40...... pigs maintained from birth to maturity and their BW measured weekly or every 2 wk up to 1,007 d. Gompertz, logistic, Bridges, and Lopez functions were fitted to the data and compared using information criteria. For each function, a multilevel nonlinear mixed effects model was employed because....... Furthermore, studies should consider adding continuous autoregressive process when analyzing nonlinear mixed models with repeated measures....
Ludtke, Oliver; Marsh, Herbert W.; Robitzsch, Alexander; Trautwein, Ulrich
In multilevel modeling, group-level variables (L2) for assessing contextual effects are frequently generated by aggregating variables from a lower level (L1). A major problem of contextual analyses in the social sciences is that there is no error-free measurement of constructs. In the present article, 2 types of error occurring in multilevel data…
Pigot, Corentin; Gilibert, Fabien; Reyboz, Marina; Bocquet, Marc; Zuliani, Paola; Portal, Jean-Michel
Phase-change memory (PCM) compact modeling of the threshold switching based on a thermal runaway in Poole–Frenkel conduction is proposed. Although this approach is often used in physical models, this is the first time it is implemented in a compact model. The model accuracy is validated by a good correlation between simulations and experimental data collected on a PCM cell embedded in a 90 nm technology. A wide range of intermediate states is measured and accurately modeled with a single set of parameters, allowing multilevel programing. A good convergence is exhibited even in snapback simulation owing to this fully continuous approach. Moreover, threshold properties extraction indicates a thermally enhanced switching, which validates the basic hypothesis of the model. Finally, it is shown that this model is compliant with a new drift-resilient cell-state metric. Once enriched with a phase transition module, this compact model is ready to be implemented in circuit simulators.
Communication Periods Processing Resource Sanitization Minimum Interrupt Servicing Semaphores Multi-Core Synchronization Primitives Timers And nothing else...Communities of Interest Secure Configuration of all Nodes in Enclave Bandwidth provisioning & partitioning Secure Clock Synchronization Suppression of
Full Text Available In order to keep the price down, a purchaser sends out the request for quotation to a group of suppliers in a supply chain network. The purchaser will then choose a supplier with the best combination of price and quality. A potential supplier will try to collect the related information about other suppliers so he/she can offer the best bid to the purchaser. Therefore, confidentiality becomes an important consideration for the design of a supply chain network. Chen et al. have proposed the application of the Bell-LaPadula model in the design of a secured supply chain network. In the Bell-LaPadula model, a subject can be in one of different security clearances and an object can be in one of various security classifications. All the possible combinations of (Security Clearance, Classification pair in the Bell-LaPadula model can be thought as different states in the Markov Chain model. This paper extends the work done by Chen et al., provides more details on the Markov Chain model and illustrates how to use it to monitor the security state transition in the supply chain network.
Adelino R. Ferreira da Silva
Full Text Available Graphic processing units (GPUs are rapidly gaining maturity as powerful general parallel computing devices. A key feature in the development of modern GPUs has been the advancement of the programming model and programming tools. Compute Unified Device Architecture (CUDA is a software platform for massively parallel high-performance computing on Nvidia many-core GPUs. In functional magnetic resonance imaging (fMRI, the volume of the data to be processed, and the type of statistical analysis to perform call for high-performance computing strategies. In this work, we present the main features of the R-CUDA package cudaBayesreg which implements in CUDA the core of a Bayesian multilevel model for the analysis of brain fMRI data. The statistical model implements a Gibbs sampler for multilevel/hierarchical linear models with a normal prior. The main contribution for the increased performance comes from the use of separate threads for fitting the linear regression model at each voxel in parallel. The R-CUDA implementation of the Bayesian model proposed here has been able to reduce significantly the run-time processing of Markov chain Monte Carlo (MCMC simulations used in Bayesian fMRI data analyses. Presently, cudaBayesreg is only configured for Linux systems with Nvidia CUDA support.
The main goal of this project is to develop a multilevel converter topology to be useful in power system applications. Although many topologies are introduced rapidly using a bunch of switches and isolated dc sources, having a single-dc-source multilevel inverter is still a matter of controversy. In fact, each isolated dc source means a bulky transformer and a rectifier that have their own losses and costs forcing the industries to avoid entering in this topic conveniently. On the other hand, multilevel inverters topologies with single-dc-source require associated controllers to regulate the dc capacitors voltages in order to have multilevel voltage waveform at the output. Thus, a complex controller would not interest investors properly. Consequently, developing a single-dc-source multilevel inverter topology along with a light and reliable voltage control is still a challenging topic to replace the 2-level inverters in the market effectively. The first effort in this project was devoted to the PUC7 inverter to design a simple and yet efficient controller. A new modelling is performed on the PUC7 inverter and it has been simplified to first order system. Afterwards, a nonlinear cascaded controller is designed and applied to regulate the capacitor voltage at 1/3 of the DC source amplitude and to generate 7 identical voltage levels at the output supplying different type of loads such as RL or rectifier harmonic ones. In next work, the PUC5 topology is proposed as a remedy to the PUC7 that requires a complicated controller to operate properly. The capacitor voltage is regulated at half of dc source amplitude to generate 5 voltage levels at the output. Although the 7-level voltage waveform is replaced by a 5-level one in PUC5 topology, it is shown that the PUC5 needs a very simple and reliable voltage balancing technique due to having some redundant switching states. Moreover, a sensor-less voltage balancing technique is designed and implemented on the PUC5 inverter
Zhou Yangping; Hidekazu Yoshikawa; Liu Jingquan; Yang Ming; Ouyang Jun
Computerized Operation Support Systems (COSS), integrating Artificial Intelligence, Multimedia and Network Technology, are now being proposed for reducing operator's cognitive load for process operation. This study proposed a Human-Centralized Development (HCD) that COSS can be developed and maintained independently, conveniently and flexibly by operator and expert of industry system with little expertise on software development. A graphical interface system for HCD, Multilevel Flow Models Studio (MFMS), is proposed for development assistance of COSS. An Extensible Markup Language based file structure is designed to represent the Multilevel Flow Models (MFM) model for the target system. With a friendly graphical interface, MFMS mainly consists of two components: 1) an editor to intelligently assist user establish and maintain the MFM model; 2) an executor to implement the application for monitoring, diagnosis and operational instruction in terms of the established MFM model. A prototype MFMS system has been developed and applied to construct a trial operation support system for a Nuclear Power Plant simulated by RELAP5/MOD2. (authors)
Pârvu, Ovidiu; Gilbert, David
Insights gained from multilevel computational models of biological systems can be translated into real-life applications only if the model correctness has been verified first. One of the most frequently employed in silico techniques for computational model verification is model checking. Traditional model checking approaches only consider the evolution of numeric values, such as concentrations, over time and are appropriate for computational models of small scale systems (e.g. intracellular networks). However for gaining a systems level understanding of how biological organisms function it is essential to consider more complex large scale biological systems (e.g. organs). Verifying computational models of such systems requires capturing both how numeric values and properties of (emergent) spatial structures (e.g. area of multicellular population) change over time and across multiple levels of organization, which are not considered by existing model checking approaches. To address this limitation we have developed a novel approximate probabilistic multiscale spatio-temporal meta model checking methodology for verifying multilevel computational models relative to specifications describing the desired/expected system behaviour. The methodology is generic and supports computational models encoded using various high-level modelling formalisms because it is defined relative to time series data and not the models used to generate it. In addition, the methodology can be automatically adapted to case study specific types of spatial structures and properties using the spatio-temporal meta model checking concept. To automate the computational model verification process we have implemented the model checking approach in the software tool Mule (http://mule.modelchecking.org). Its applicability is illustrated against four systems biology computational models previously published in the literature encoding the rat cardiovascular system dynamics, the uterine contractions of labour
Mohd Fo'ad Rohani; Mohd Aizaini Maarof; Ali Selamat; Houssain Kettani
This paper proposes a Multi-Level Sampling (MLS) approach for continuous Loss of Self-Similarity (LoSS) detection using iterative window. The method defines LoSS based on Second Order Self-Similarity (SOSS) statistical model. The Optimization Method (OM) is used to estimate self-similarity parameter since it is fast and more accurate in comparison with other estimation methods known in the literature. Probability of LoSS detection is introduced to measure continuous LoSS detection performance...
Yoshihama, Mieko; Bybee, Deborah
Intimate partner violence (IPV) is prevalent and often recurrent in women's lives. To better understand the changing risk of IPV over the life course, which could guide more effective policies and program responses, methodological innovations are needed. Life History Calendar methods enhance respondents' recall of the timing of specific types of IPV experienced over the life course. Multilevel modeling provides a way to analyze individual and collective trajectories and examine covariates of IPV risk. We apply these complementary methods to examine IPV trajectories for a sample of women of Filipina descent living in the United States, examining life course timing and cohort effects. © The Author(s) 2011.
Zhang, Xinxin; Lind, Morten; Jørgensen, Sten Bay
situation and support operational decisions. This paper will provide a general MFM model of the primary side in a standard Westinghouse Pressurized Water Reactor ( PWR ) system including sub - systems of Reactor Coolant System, Rod Control System, Chemical and Volume Control System, emergency heat removal......The aim of this paper is to explore the capability of representing operational knowledge by using Multilevel Flow Modelling ( MFM ) methodology. The paper demonstrate s how the operational knowledge can be inserted into the MFM models and be used to evaluate the plant state, identify the current...... systems. And the sub - systems’ functions will be decomposed into sub - models according to different operational situations. An operational model will be developed based on the operating procedure by using MFM symbols and this model can be used to implement coordination rules for organize the utilizati...
Liu Jingquan; Yoshikawa, H.; Zhou Yangping
Complex energy and environment system, especially nuclear fuel cycle system recently raised social concerns about the issues of economic competitiveness, environmental effect and nuclear proliferation. Only under the condition that those conflicting issues are gotten a consensus between stakeholders with different knowledge background, can nuclear power industry be continuingly developed. In this paper, a new analysis platform has been developed to help stakeholders to recognize and analyze various socio-technical issues in the nuclear fuel cycle sys- tem based on the functional modeling method named Multilevel Flow Models (MFM) according to the cognition theory of human being, Its character is that MFM models define a set of mass, energy and information flow structures on multiple levels of abstraction to describe the functional structure of a process system and its graphical symbol representation and the means-end and part-whole hierarchical flow structure to make the represented process easy to be understood. Based upon this methodology, a micro-process and a macro-process of nuclear fuel cycle system were selected to be simulated and some analysis processes such as economics analysis, environmental analysis and energy balance analysis related to those flows were also integrated to help stakeholders to understand the process of decision-making with the introduction of some new functions for the improved Multilevel Flow Models Studio, and finally the simple simulation such as spent fuel management process simulation and money flow of nuclear fuel cycle and its levelised cost analysis will be represented as feasible examples. (authors)
LIU Jing-Quan; YOSHIKAWA Hidekazu; ZHOU Yang-Ping
Complex energy and environment system, especially nuclear fuel cycle system recently raised social concerns about the issues of economic competitiveness, environmental effect and nuclear proliferation. Only under the condition that those conflicting issues are gotten a consensus between stakeholders with different knowledge background, can nuclear power industry be continuingly developed. In this paper, a new analysis platform has been developed to help stakeholders to recognize and analyze various socio-technical issues in the nuclear fuel cycle system based on the functional modeling method named Multilevel Flow Models (MFM) according to the cognition theory of human being. Its character is that MFM models define a set of mass, energy and information flow structures on multiple levels of abstraction to describe the functional structure of a process system and its graphical symbol representation and the means-end and part-whole hierarchical flow structure to make the represented process easy to be understood. Based upon this methodology, a micro-process and a macro-process of nuclear fuel cycle system were selected to be simulated and some analysis processes such as economics analysis, environmental analysis and energy balance analysis related to those flows were also integrated to help stakeholders to understand the process of decision-making with the introduction of some new functions for the improved Multilevel Flow Models Studio, and finally the simple simulation such as spent fuel management process simulation and money flow of nuclear fuel cycle and its levelised cost analysis will be represented as feasible examples.
Hastings, Paul D; Helm, Jonathan; Mills, Rosemary S L; Serbin, Lisa A; Stack, Dale M; Schwartzman, Alex E
This investigation evaluated a multilevel model of dispositional and environmental factors contributing to the development of internalizing problems from preschool-age to school-age. In a sample of 375 families (185 daughters, 190 sons) drawn from three independent samples, preschoolers' behavioral inhibition, cortisol and gender were examined as moderators of the links between mothers' negative parenting behavior, negative emotional characteristics, and socioeconomic status when children were 3.95 years, and their internalizing problems when they were 8.34 years. Children's dispositional characteristics moderated all associations between these environmental factors and mother-reported internalizing problems in patterns that were consistent with either diathesis-stress or differential-susceptibility models of individual-environment interaction, and with gender models of developmental psychopathology. Greater inhibition and lower socioeconomic status were directly predictive of more teacher reported internalizing problems. These findings highlight the importance of using multilevel models within a bioecological framework to understand the complex pathways through which internalizing difficulties develop.
Full Text Available Technologies of precision agriculture, digital soil maps, and meteorological stations provide a minimum data set to guide precision farming operations. However, determining optimal nutrient requirements for potato (Solanum tuberosum L. crops at subfield scale remains a challenge given specific climatic, edaphic, and managerial conditions. Multilevel modeling can generalize yield response to fertilizer additions using data easily accessible to growers. Our objective was to elaborate a multilevel N fertilizer response model for potato crops using the Mitscherlich equation and a core data set of 93 N fertilizer trials conducted in Québec, Canada. Daily climatic data were collected at 10 × 10 km resolution. Soils were characterized by organic matter content, pH, and texture in the arable layer, and by texture and tools of pedometrics across a gleization-podzolization continuum in subsoil layers. There were five categories of preceding crops and five cultivar maturity orders. The three Mitscherlich parameters (Asymptote, Rate, and Environment were most often site-specific. Sensitivity analysis showed that optimum N dosage increased with non-leguminous high-residue preceding crops, coarser soils, podzolization, drier climatic condition, and late cultivar maturity. The inferential model could guide site-specific N fertilization using an accessible minimum data set to support fertilization decisions. As decision-support system, the model could also provide a range of optimum N doses across a large spectrum of site-specific conditions including climate change.
Lin, Yea-Wen; Lin, Yueh-Ysen
Organizational health culture is a health-oriented core characteristic of the organization that is shared by all members. It is effective in regulating health-related behavior for employees and could therefore influence the effectiveness of health promotion efforts among organizations and employees. This study applied a multilevel analysis to verify the effects of organizational health culture on the organizational and individual effectiveness of health promotion. At the organizational level, we investigated the effect of organizational health culture on the organizational effectiveness of health promotion. At the individual level, we adopted a cross-level analysis to determine if organizational health culture affects employee effectiveness through the mediating effect of employee health behavior. The study setting consisted of the workplaces of various enterprises. We selected 54 enterprises in Taiwan and surveyed 20 full-time employees from each organization, for a total sample of 1011 employees. We developed the Organizational Health Culture Scale to measure employee perceptions and aggregated the individual data to formulate organization-level data. Organizational effectiveness of health promotion included four dimensions: planning effectiveness, production, outcome, and quality, which were measured by scale or objective indicators. The Health Promotion Lifestyle Scale was adopted for the measurement of health behavior. Employee effectiveness was measured subjectively in three dimensions: self-evaluated performance, altruism, and happiness. Following the calculation of descriptive statistics, hierarchical linear modeling (HLM) was used to test the multilevel hypotheses. Organizational health culture had a significant effect on the planning effectiveness (β = .356, p production (β = .359, p promotion. In addition, results of cross-level moderating effect analysis by HLM demonstrated that the effects of organizational health culture on three dimensions of
Suzuki, Mitsutoshi; Terao, Norichika
Nuclear security risk assessment with the Markov model based on random event is performed to explore evaluation methodology for physical protection in nuclear facilities. Because the security incidences are initiated by malicious and intentional acts, expert judgment and Bayes updating are used to estimate scenario and initiation likelihood, and it is assumed that the Markov model derived from stochastic process can be applied to incidence sequence. Both an unauthorized intrusion as Design Based Threat (DBT) and a stand-off attack as beyond-DBT are assumed to hypothetical facilities, and performance of physical protection and mitigation and minimization of consequence are investigated to develop the assessment methodology in a semi-quantitative manner. It is shown that cooperation between facility operator and security authority is important to respond to the beyond-DBT incidence. (author)
Zhang, Lei; Huang, Chunping; Lan, Yajia; Wang, Mianzhen
To analyze the correlation between population characteristics and work ability of employees with a multilevel model, to investigate the important influencing factors for work ability, and to provide a basis for improvement in work ability. Work ability index (WAI)was applied to measure the work ability of 1686 subjects from different companies (n=6). MLwi N2.0 software was applied for two-level variance component model fitting. The WAI of employees showed differences between various companies (χ2=3.378 6, P=0.0660); working years was negatively correlated with WAI (χ2=38.229 2, P=0.0001), and the WAI of the employees with 20 or more working years was 1.63 lower than that of the employees with less than 20 working years; the work ability of manual workers was lower than that of mental-manual workers (χ2=8.2726, P=0.0040), and the work ability showed no significant difference between mental workers and mental-manual workers (χ2=2.086 0, P=0.148 7). From the perspective of probability, the multilevel model analysis reveals the differences in work ability of employees between different companies, and suggests that company, work type, and working years are the important influencing factors for work ability of employees. These factors should be improved and adjusted to protect or enhance the work ability of employees.
Chen, Jun-Jie; Tan, Lei; Zheng, Bo
In complex financial systems, the sector structure and volatility clustering are respectively important features of the spatial and temporal correlations. However, the microscopic generation mechanism of the sector structure is not yet understood. Especially, how to produce these two features in one model remains challenging. We introduce a novel interaction mechanism, i.e., the multi-level herding, in constructing an agent-based model to investigate the sector structure combined with volatility clustering. According to the previous market performance, agents trade in groups, and their herding behavior comprises the herding at stock, sector and market levels. Further, we propose methods to determine the key model parameters from historical market data, rather than from statistical fitting of the results. From the simulation, we obtain the sector structure and volatility clustering, as well as the eigenvalue distribution of the cross-correlation matrix, for the New York and Hong Kong stock exchanges. These properties are in agreement with the empirical ones. Our results quantitatively reveal that the multi-level herding is the microscopic generation mechanism of the sector structure, and provide new insight into the spatio-temporal interactions in financial systems at the microscopic level.
Zhang, Yue; Berhane, Kiros
Questionnaire-based health status outcomes are often prone to misclassification. When studying the effect of risk factors on such outcomes, ignoring any potential misclassification may lead to biased effect estimates. Analytical challenges posed by these misclassified outcomes are further complicated when simultaneously exploring factors for both the misclassification and health processes in a multi-level setting. To address these challenges, we propose a fully Bayesian Mixed Hidden Markov Model (BMHMM) for handling differential misclassification in categorical outcomes in a multi-level setting. The BMHMM generalizes the traditional Hidden Markov Model (HMM) by introducing random effects into three sets of HMM parameters for joint estimation of the prevalence, transition and misclassification probabilities. This formulation not only allows joint estimation of all three sets of parameters, but also accounts for cluster level heterogeneity based on a multi-level model structure. Using this novel approach, both the true health status prevalence and the transition probabilities between the health states during follow-up are modeled as functions of covariates. The observed, possibly misclassified, health states are related to the true, but unobserved, health states and covariates. Results from simulation studies are presented to validate the estimation procedure, to show the computational efficiency due to the Bayesian approach and also to illustrate the gains from the proposed method compared to existing methods that ignore outcome misclassification and cluster level heterogeneity. We apply the proposed method to examine the risk factors for both asthma transition and misclassification in the Southern California Children's Health Study (CHS). PMID:24254432
Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...
Kordy, Barbara; Pouly, Marc; Schweitzer, Patrick
This work provides a computational framework for meaningful probabilistic evaluation of attack–defense scenarios involving dependent actions. We combine the graphical security modeling technique of attack–defense trees with probabilistic information expressed in terms of Bayesian networks. In order
Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J.; Barthe, G.; Burdy, L.; Huisman, Marieke; Lanet, J.-L.; Muntean, T.
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of
This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation-hierarchical data model is extended to multilevel relation-hierarchical data model. Based on the multilevel relation-hierarchical data model, the concept of upper-lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation-hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects (e. g., multilevel spatial data) and multilevel conventional data ( e. g., integer. real number and character string).
Zulvia, Pepi; Kurnia, Anang; Soleh, Agus M.
Individual and environment are a hierarchical structure consist of units grouped at different levels. Hierarchical data structures are analyzed based on several levels, with the lowest level nested in the highest level. This modeling is commonly call multilevel modeling. Multilevel modeling is widely used in education research, for example, the average score of National Examination (UN). While in Indonesia UN for high school student is divided into natural science and social science. The purpose of this research is to develop multilevel and panel data modeling using linear mixed model on educational data. The first step is data exploration and identification relationships between independent and dependent variable by checking correlation coefficient and variance inflation factor (VIF). Furthermore, we use a simple model approach with highest level of the hierarchy (level-2) is regency/city while school is the lowest of hierarchy (level-1). The best model was determined by comparing goodness-of-fit and checking assumption from residual plots and predictions for each model. Our finding that for natural science and social science, the regression with random effects of regency/city and fixed effects of the time i.e multilevel model has better performance than the linear mixed model in explaining the variability of the dependent variable, which is the average scores of UN.
Full Text Available In order to reflect the situation of network security assessment performance fully and accurately, a new network security situation awareness model based on information fusion was proposed. Network security situation is the result of fusion three aspects evaluation. In terms of attack, to improve the accuracy of evaluation, a situation assessment method of DDoS attack based on the information of data packet was proposed. In terms of vulnerability, a improved Common Vulnerability Scoring System (CVSS was raised and maked the assessment more comprehensive. In terms of node weights, the method of calculating the combined weights and optimizing the result by Sequence Quadratic Program (SQP algorithm which reduced the uncertainty of fusion was raised. To verify the validity and necessity of the method, a testing platform was built and used to test through evaluating 2000 DAPRA data sets. Experiments show that the method can improve the accuracy of evaluation results.
Hung, Peter W.; Johnson, Stephen B.; Kaufman, David R.; Mendonça, Eneida A.
Objective: Clinicians often have difficulty translating information needs into effective search strategies to find appropriate answers. Information retrieval systems employing an intelligent search agent that generates adaptive search strategies based on human search expertise could be helpful in meeting clinician information needs. A prerequisite for creating such systems is an information seeking model that facilitates the representation of human search expertise. The purpose of developing such a model is to provide guidance to information seeking system development and to shape an empirical research program. Design: The information seeking process was modeled as a complex problem-solving activity. After considering how similarly complex activities had been modeled in other domains, we determined that modeling context-initiated information seeking across multiple problem spaces allows the abstraction of search knowledge into functionally consistent layers. The knowledge layers were identified in the information science literature and validated through our observations of searches performed by health science librarians. Results: A hierarchical multi-level model of context-initiated information seeking is proposed. Each level represents (1) a problem space that is traversed during the online search process, and (2) a distinct layer of knowledge that is required to execute a successful search. Grand strategy determines what information resources will be searched, for what purpose, and in what order. The strategy level represents an overall approach for searching a single resource. Tactics are individual moves made to further a strategy. Operations are mappings of abstract intentions to information resource-specific concrete input. Assessment is the basis of interaction within the strategic hierarchy, influencing the direction of the search. Conclusion: The described multi-level model provides a framework for future research and the foundation for development of an
Full Text Available There are many CPU scheduling algorithms inliterature like FIFO, Round Robin, Shortest-Job-First and so on.The Multilevel-Queue-Scheduling is superior to these due to itsbetter management of a variety of processes. In this paper, aMarkov chain model is used for a general setup of Multilevelqueue-scheduling and the scheduler is assumed to performrandom movement on queue over the quantum of time.Performance of scheduling is examined through a rowdependent data model. It is found that with increasing value of αand d, the chance of system going over the waiting state reduces.At some of the interesting combinations of α and d, it diminishesto zero, thereby, provides us some clue regarding better choice ofqueues over others for high priority jobs. It is found that ifqueue priorities are added in the scheduling intelligently thenbetter performance could be obtained. Data model helpschoosing appropriate preferences.
The Systems Security Engineering Capability Maturity Model (SSE-CMM) describes the essential characteristics of an organization's security engineering process that must exist to ensure good security engineering...
van Witteloostuijn, Arjen
In this paper, we develop an ecological, multi-level model that can be used to study the evolution of emerging technology. More specifically, by defining technology as a system composed of a set of interacting components, we can build upon the argument of multi-level density dependence from organizational ecology to develop a distribution-independent model of technological evolution. This allows us to distinguish between different stages of component development, which provides more insight into the emergence of stable component configurations, or dominant designs. We validate our hypotheses in the biotechnology industry by using patent data from the USPTO from 1976 to 2003. PMID:29795575
Andreh, Angga Muhamad; Subiyanto, Sunardiyo, Said
Development of non-linear loading in the application of industry and distribution system and also harmonic compensation becomes important. Harmonic pollution is an urgent problem in increasing power quality. The main contribution of the study is the modeling approach used to design a shunt active filter and the application of the cascade multilevel inverter topology to improve the power quality of electrical energy. In this study, shunt active filter was aimed to eliminate dominant harmonic component by injecting opposite currents with the harmonic component system. The active filter was designed by shunt configuration with cascaded multilevel inverter method controlled by PID controller and SPWM. With this shunt active filter, the harmonic current can be reduced so that the current wave pattern of the source is approximately sinusoidal. Design and simulation were conducted by using Power Simulator (PSIM) software. Shunt active filter performance experiment was conducted on the IEEE four bus test system. The result of shunt active filter installation on the system (IEEE four bus) could reduce THD current from 28.68% to 3.09%. With this result, the active filter can be applied as an effective method to reduce harmonics.
Ahmed, Naveed; Jensen, Christian D.
suffer because of the identified vulnerabilities. Therefore, we may need to analyze a protocol for weaker notions of security. In this paper, we present a security model that supports such weaker notions. In this model, the overall goals of an authentication protocol are broken into a finer granularity......; for each fine level authentication goal, we determine the “least strongest-attacker” for which the authentication goal can be satisfied. We demonstrate that this model can be used to reason about the security of supposedly insecure protocols. Such adaptability is particularly useful in those applications...
It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...
Yoshikawa, H.; Ouyang, J.; Niwa, Y.
In this paper, a new accident inference method is proposed by using a goal and function oriented modeling method called Multilevel Flow Model focusing on explaining the causal-consequence relations and the objective of automatic action in the accident of nuclear power plant. Users can easily grasp how the various plant parameters will behave and how the various safety facilities will be activated sequentially to cope with the accident until the nuclear power plants are settled into safety state, i.e., shutdown state. The applicability of the developed method was validated by the conduction of internet-based 'view' experiment to the voluntary respondents, and in the future, further elaboration of interface design and the further introduction of instruction contents will be developed to make it become the usable CAI system. (authors)
This work presents an equivalent model and simulation architecture for real-time electromagnetic transient analysis of either half-bridge or full-bridge modular multilevel converter (MMC) with 400 sub-modules (SMs) per arm. The proposed CPU/FPGA-based architecture is optimized for the parallel implementation of the presented MMC model on the FPGA and is beneficiary of a high-throughput floating-point computational engine. The developed real-time simulation architecture is capable of simulating MMCs with 400 SMs per arm at 825 nanoseconds. To address the difficulties of the sorting process implementation, a modified Odd-Even Bubble sorting is presented in this work. The comparison of the results under various test scenarios reveals that the proposed real-time simulator is representing the system responses in the same way of its corresponding off-line counterpart obtained from the PSCAD/EMTDC program.
Loredo, Thomas J.
This tutorial presentation will introduce some of the key ideas and techniques involved in applying Bayesian methods to problems in astrostatistics. The focus will be on the big picture: understanding the foundations (interpreting probability, Bayes's theorem, the law of total probability and marginalization), making connections to traditional methods (propagation of errors, least squares, chi-squared, maximum likelihood, Monte Carlo simulation), and highlighting problems where a Bayesian approach can be particularly powerful (Poisson processes, density estimation and curve fitting with measurement error). The "graphical" component of the title reflects an emphasis on pictorial representations of some of the math, but also on the use of graphical models (multilevel or hierarchical models) for analyzing complex data. Code for some examples from the talk will be available to participants, in Python and in the Stan probabilistic programming language.
Prudencio, Ernesto; Cheung, Sai Hung
In recent years, Bayesian model updating techniques based on measured data have been applied to many engineering and applied science problems. At the same time, parallel computational platforms are becoming increasingly more powerful and are being used more frequently by the engineering and scientific communities. Bayesian techniques usually require the evaluation of multi-dimensional integrals related to the posterior probability density function (PDF) of uncertain model parameters. The fact that such integrals cannot be computed analytically motivates the research of stochastic simulation methods for sampling posterior PDFs. One such algorithm is the adaptive multilevel stochastic simulation algorithm (AMSSA). In this paper we discuss the parallelization of AMSSA, formulating the necessary load balancing step as a binary integer programming problem. We present a variety of results showing the effectiveness of load balancing on the overall performance of AMSSA in a parallel computational environment.
Full Text Available Using a longitudinal network analysis approach, we investigate the structural development of the knowledge base of Wikipedia in order to explain the appearance of new knowledge. The data consists of the articles in two adjacent knowledge domains: psychology and education. We analyze the development of networks of knowledge consisting of interlinked articles at seven snapshots from 2006 to 2012 with an interval of one year between them. Longitudinal data on the topological position of each article in the networks is used to model the appearance of new knowledge over time. Thus, the structural dimension of knowledge is related to its dynamics. Using multilevel modeling as well as eigenvector and betweenness measures, we explain the significance of pivotal articles that are either central within one of the knowledge domains or boundary-crossing between the two domains at a given point in time for the future development of new knowledge in the knowledge base.
Kubovcikova, Annamária; van Bakel, Marian
of the network members with the type and amount of support they provide. The dataset consisted of 165 expatriates who rated 575 of their network members on the following learned characteristics: host country knowledge, employment status, and host country origin. The ego-centered network that consists...... of the rated ties is the context in which expatriates are embedded. It was therefore analyzed utilizing a multilevel mediation model. We have hypothesized that all learned characteristics will be determining the frequency of interaction and thus the level and type of support received. Host country knowledge......This article explores the immediate network context of self-initiated expatriates and how it influences their work information and emotional support. Building on the information seeking theory and the theory of weak and strong ties, we have created a model connecting specific characteristics...
Chen Qiang; Yang Ming
Multilevel flow models (MFM) and fault tree method describe the system knowledge in different forms, so the two methods express an equivalent logic of the system reliability under the same boundary conditions and assumptions. Based on this and combined with the characteristics of MFM, a method mapping MFM to fault tree was put forward, thus providing a way to establish fault tree rapidly and realizing qualitative reliability analysis based on MFM. Taking the safety injection system of pressurized water reactor nuclear power plant as an example, its MFM was established and its reliability was analyzed qualitatively. The analysis result shows that the logic of mapping MFM to fault tree is correct. The MFM is easily understood, created and modified. Compared with the traditional fault tree analysis, the workload is greatly reduced and the modeling time is saved. (authors)
Tran, Giang T.; Oliver, Kevin I. C.; Holden, Philip B.; Edwards, Neil R.; Sóbester, András; Challenor, Peter
Climate model components involve both high-dimensional input and output fields. It is desirable to efficiently generate spatio-temporal outputs of these models for applications in integrated assessment modelling or to assess the statistical relationship between such sets of inputs and outputs, for example, uncertainty analysis. However, the need for efficiency often compromises the fidelity of output through the use of low complexity models. Here, we develop a technique which combines statistical emulation with a dimensionality reduction technique to emulate a wide range of outputs from an atmospheric general circulation model, PLASIM, as functions of the boundary forcing prescribed by the ocean component of a lower complexity climate model, GENIE-1. Although accurate and detailed spatial information on atmospheric variables such as precipitation and wind speed is well beyond the capability of GENIE-1's energy-moisture balance model of the atmosphere, this study demonstrates that the output of this model is useful in predicting PLASIM's spatio-temporal fields through multi-level emulation. Meaningful information from the fast model, GENIE-1 was extracted by utilising the correlation between variables of the same type in the two models and between variables of different types in PLASIM. We present here the construction and validation of several PLASIM variable emulators and discuss their potential use in developing a hybrid model with statistical components.
WANG, Jiahai; HAN, Fangxi; Tang, Zheng; TAMURA, Hiroki; Ishii, Masahiro
The security of information is a key problem in the development of network technology. The basic requirements of security of information clearly include confidentiality, integrity, authentication and non-repudiation. This paper proposes a network security model that is composed of security system, security connection and communication, and key management. The model carries out encrypting, decrypting, signature and ensures confidentiality, integrity, authentication and non-repudiation. Finally...
Tasca, Giorgio A; Illing, Vanessa; Joyce, Anthony S; Ogrodniczuk, John S
Researchers have known for years about the negative impact on Type I error rates caused by dependencies in hierarchically nested and longitudinal data. Despite this, group treatment researchers do not consistently use methods such as multilevel models (MLMs) to assess dependence and appropriately analyse their nested data. The goals of this study are to review some of the study design issues with regard to hierarchically nested and longitudinal data, discuss MLMs for assessing and handling dependence in data, and present a guide for developing a three-level growth MLM that is appropriate for group treatment data, design, and research questions. The authors present an example from group treatment research to illustrate these issues and methods.
Hong, Ying; Liao, Hui; Raub, Steffen; Han, Joo Hun
Building upon and extending Parker, Bindl, and Strauss's (2010) theory of proactive motivation, we develop an integrated, multilevel model to examine how contextual factors shape employees' proactive motivational states and, through these proactive motivational states, influence their personal initiative behavior. Using data from a sample of hotels collected from 3 sources and over 2 time periods, we show that establishment-level initiative-enhancing human resource management (HRM) systems were positively related to departmental initiative climate, which was positively related to employee personal initiative through employee role-breadth self-efficacy. Further, department-level empowering leadership was positively related to initiative climate only when initiative-enhancing HRM systems were low. These findings offer interesting implications for research on personal initiative and for the management of employee proactivity in organizations. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Fairbrother, Malcolm; Martin, Isaac W
Previous research has argued that income inequality reduces people's trust in other people, and that declining social trust in the United States in recent decades has been due to rising levels of income inequality. Using multilevel models fitted to data from the General Social Survey, this paper substantially qualifies these arguments. We show that while people are less trusting in US states with higher income inequality, this association holds only cross-sectionally, not longitudinally; since the 1970s, states experiencing larger increases in inequality have not suffered systematically larger declines in trust. For counties, there is no statistically significant relationship either cross-sectionally or longitudinally. There is therefore only limited empirical support for the argument that inequality influences generalized social trust; and the declining trust of recent decades certainly cannot be attributed to rising inequality. Copyright © 2012 Elsevier Inc. All rights reserved.
Full Text Available The purpose of this study was to examine individual- and classroom-level differences in the longitudinal change in motivational regulations during physical education students’ transition from elementary (Grade 6 across middle school (Grades 7 to 9. A sample of 757 Finnish adolescents (M = 12.71, SD = 0.23 participated in this study. Participants of the study responded to questionnaires collected six times. A multilevel latent growth modelling approach was used to analyze the data. Results showed that motivational regulations in physical education developed at different rates during middle school. More specifically, students’: (a identified regulation increased across Grades 6 to 9; (b amotivation increased during middle school transition from Grade 6 to 7; and (c introjected regulation declined from Grade 8 to 9. Other motivational regulations remained stable across time. The changes in amotivation and introjected regulation were largely due to individual factors, whereas the changes in identified regulation were due to environmental factors.
Telwatte, Apsara; Anglim, Jeromy; Wynton, Sarah K A; Moulding, Richard
Existing research suggests that the decision to grant or deny workplace accommodations for people with disabilities is influenced by a range of legal and nonlegal factors. However, less is known about how these factors operate at the within-person level. Thus, we proposed and tested a multilevel model of the accommodation decision-making process, which we applied to better understand why people with psychological disabilities often experience greater challenges in obtaining accommodations. A sample of 159 Australian adults, composed mostly of managers and HR professionals, read 12 vignettes involving requests for accommodations from existing employees. The requests differed in whether they were for psychological or physical disabilities. For each vignette, participants rated their empathy with the employee, the legitimacy of the employee's disability, the necessity for productivity, the perceived cost, and the reasonableness, and indicated whether they would grant the accommodation. Multilevel modeling indicated that greater empathy, legitimacy, and necessity, and lower perceived cost predicted perceptions of greater reasonableness and greater granting. Accommodation requests from employees with psychological disabilities were seen as less reasonable and were less likely to be granted; much of this effect seemed to be driven by perceptions that such accommodations were less necessary for productivity. Ratings on accommodations were influenced both by general between-person tendencies and within-person appraisals of particular scenarios. The study points to a need for organizations to more clearly establish guidelines for how decision-makers should fairly evaluate accommodation requests for employees with psychological disabilities and disability more broadly. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Ottley, Jennifer Riggie; Ferron, John M.; Hanline, Mary Frances
The purpose of this study was to explain the variability in data collected from a single-case design study and to identify predictors of communicative outcomes for children with developmental delays or disabilities (n = 4). Using SAS® University Edition, we fit multilevel models with time nested within children. Children's level of baseline…
Full Text Available This article details a correction to the article: Sommet, N. & Morselli, D., (2017. Keep Calm and Learn Multilevel Logistic Modeling: A Simplified Three-Step Procedure Using Stata, R, Mplus, and SPSS. 'International Review of Social Psychology'. 30(1, pp. 203–218. DOI: https://doi.org/10.5334/irsp.90
Schmidt, Susanne; Zlatkin-Troitschanskaia, Olga; Fox, Gerardus J.A.
Longitudinal research in higher education faces several challenges. Appropriate methods of analyzing competence growth of students are needed to deal with those challenges and thereby obtain valid results. In this article, a pretest-posttest-posttest multivariate multilevel IRT model for repeated
Wang, Ya-Ling; Tsai, Chin-Chung
This study aimed to investigate the factors accounting for science learning self-efficacy (the specific beliefs that people have in their ability to complete tasks in science learning) from both the teacher and the student levels. We thus propose a multilevel model to delineate its relationships with teacher and student science hardiness (i.e.,…
Dean, Danielle O.; Bauer, Daniel J.; Prinstein, Mitchell J.
A social network perspective can bring important insight into the processes that shape human behavior. Longitudinal social network data, measuring relations between individuals over time, has become increasingly common—as have the methods available to analyze such data. A friendship duration model utilizing discrete-time multilevel survival analysis with a multiple membership random effect structure is developed and applied here to study the processes leading to undirected friendship dissolution within a larger social network. While the modeling framework is introduced in terms of understanding friendship dissolution, it can be used to understand microlevel dynamics of a social network more generally. These models can be fit with standard generalized linear mixed-model software, after transforming the data to a pair-period data set. An empirical example highlights how the model can be applied to understand the processes leading to friendship dissolution between high school students, and a simulation study is used to test the use of the modeling framework under representative conditions that would be found in social network data. Advantages of the modeling framework are highlighted, and potential limitations and future directions are discussed. PMID:28463022
Gustavsson, R.; Mellstrand, P.; Tornqvist, B.
The deliverable D1.6 includes background material and specifications of a CRISP Framework on protection of information assets related to power net management and management of business operations related to energy services. During the project it was discovered by the CRISP consortium that the original description of WP 1.6 was not adequate for the project as such. The main insight was that the original emphasis on cost-benefit analysis of security protection measures was to early to address in the project. This issue is of course crucial in itself but requires new models of consequence analysis that still remains to be developed, especially for the new business models we are investigated in the CRISP project. The updated and approved version of the WP1.6 description, together with the also updated WP2.4 focus on Dependable ICT support of Power Grid Operations constitutes an integrated approach towards dependable and secure future utilities and their business processes. This document (D1.6) is a background to deliverable D2.4. Together they provide a dependability and security framework to the three CRISP experiments in WP3
Liu, Dong; Zhang, Shu; Wang, Lei; Lee, Thomas W.
Extending research on voluntary turnover in the team setting, this study adopts a multilevel self-determination theoretical approach to examine the unique roles of individual and social-contextual motivational precursors, autonomy orientation and autonomy support, in reducing team member voluntary turnover. Analysis of multilevel time-lagged data…
Full Text Available Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers’ security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.
Shin, Jinsoo; Son, Hanseong; Khalil ur, Rahman; Heo, Gyunyoung
Cyber security is an emerging safety issue in the nuclear industry, especially in the instrumentation and control (I and C) field. To address the cyber security issue systematically, a model that can be used for cyber security evaluation is required. In this work, a cyber security risk model based on a Bayesian network is suggested for evaluating cyber security for nuclear facilities in an integrated manner. The suggested model enables the evaluation of both the procedural and technical aspects of cyber security, which are related to compliance with regulatory guides and system architectures, respectively. The activity-quality analysis model was developed to evaluate how well people and/or organizations comply with the regulatory guidance associated with cyber security. The architecture analysis model was created to evaluate vulnerabilities and mitigation measures with respect to their effect on cyber security. The two models are integrated into a single model, which is called the cyber security risk model, so that cyber security can be evaluated from procedural and technical viewpoints at the same time. The model was applied to evaluate the cyber security risk of the reactor protection system (RPS) of a research reactor and to demonstrate its usefulness and feasibility. - Highlights: • We developed the cyber security risk model can be find the weak point of cyber security integrated two cyber analysis models by using Bayesian Network. • One is the activity-quality model signifies how people and/or organization comply with the cyber security regulatory guide. • Other is the architecture model represents the probability of cyber-attack on RPS architecture. • The cyber security risk model can provide evidence that is able to determine the key element for cyber security for RPS of a research reactor
van Cleeff, A.
Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model
Cuffney, T.F.; Kashuba, R.; Qian, S.S.; Alameddine, I.; Cha, Y.K.; Lee, B.; Coles, J.F.; McMahon, G.
Multilevel hierarchical regression was used to examine regional patterns in the responses of benthic macroinvertebrates and algae to urbanization across 9 metropolitan areas of the conterminous USA. Linear regressions established that responses (intercepts and slopes) to urbanization of invertebrates and algae varied among metropolitan areas. Multilevel hierarchical regression models were able to explain these differences on the basis of region-scale predictors. Regional differences in the type of land cover (agriculture or forest) being converted to urban and climatic factors (precipitation and air temperature) accounted for the differences in the response of macroinvertebrates to urbanization based on ordination scores, total richness, Ephemeroptera, Plecoptera, Trichoptera richness, and average tolerance. Regional differences in climate and antecedent agriculture also accounted for differences in the responses of salt-tolerant diatoms, but differences in the responses of other diatom metrics (% eutraphenic, % sensitive, and % silt tolerant) were best explained by regional differences in soils (mean % clay soils). The effects of urbanization were most readily detected in regions where forest lands were being converted to urban land because agricultural development significantly degraded assemblages before urbanization and made detection of urban effects difficult. The effects of climatic factors (temperature, precipitation) on background conditions (biogeographic differences) and rates of response to urbanization were most apparent after accounting for the effects of agricultural development. The effects of climate and land cover on responses to urbanization provide strong evidence that monitoring, mitigation, and restoration efforts must be tailored for specific regions and that attainment goals (background conditions) may not be possible in regions with high levels of prior disturbance (e.g., agricultural development). ?? 2011 by The North American
Eduardo B. Fernandez
Full Text Available Clouds do not work in isolation but interact with other clouds and with a variety of systems either developed by the same provider or by external entities with the purpose to interact with them; forming then an ecosystem. A software ecosystem is a collection of software systems that have been developed to coexist and evolve together. The stakeholders of such a system need a variety of models to give them a perspective of the possibilities of the system, to evaluate specific quality attributes, and to extend the system. A powerful representation when building or using software ecosystems is the use of architectural models, which describe the structural aspects of such a system. These models have value for security and compliance, are useful to build new systems, can be used to define service contracts, find where quality factors can be monitored, and to plan further expansion. We have described a cloud ecosystem in the form of a pattern diagram where its components are patterns and reference architectures. A pattern is an encapsulated solution to a recurrent problem. We have recently expanded these models to cover fog systems and containers. Fog Computing is a highly-virtualized platform that provides compute, storage, and networking services between end devices and Cloud Computing Data Centers; a Software Container provides an execution environment for applications sharing a host operating system, binaries, and libraries with other containers. We intend to use this architecture to answer a variety of questions about the security of this system as well as a reference to design interacting combinations of heterogeneous components. We defined a metamodel to relate security concepts which is being expanded.
Full Text Available Abstract Background Since Swanson proposed the Undiscovered Public Knowledge (UPK model, there have been many approaches to uncover UPK by mining the biomedical literature. These earlier works, however, required substantial manual intervention to reduce the number of possible connections and are mainly applied to disease-effect relation. With the advancement in biomedical science, it has become imperative to extract and combine information from multiple disjoint researches, studies and articles to infer new hypotheses and expand knowledge. Methods We propose MKEM, a Multi-level Knowledge Emergence Model, to discover implicit relationships using Natural Language Processing techniques such as Link Grammar and Ontologies such as Unified Medical Language System (UMLS MetaMap. The contribution of MKEM is as follows: First, we propose a flexible knowledge emergence model to extract implicit relationships across different levels such as molecular level for gene and protein and Phenomic level for disease and treatment. Second, we employ MetaMap for tagging biological concepts. Third, we provide an empirical and systematic approach to discover novel relationships. Results We applied our system on 5000 abstracts downloaded from PubMed database. We performed the performance evaluation as a gold standard is not yet available. Our system performed with a good precision and recall and we generated 24 hypotheses. Conclusions Our experiments show that MKEM is a powerful tool to discover hidden relationships residing in extracted entities that were represented by our Substance-Effect-Process-Disease-Body Part (SEPDB model.
Gofuku, Akio; Ohara, Ai
The fault tree analysis (FTA) is widely applied for the safety evaluation of a large-scale and mission-critical system. Because the potential of the FTA, however, strongly depends on human skill of analyzers, problems are pointed out in (1) education and training, (2) unreliable quality, (3) necessity of expertise knowledge, and (4) update of FTA results after the reconstruction of a target system. To get rid of these problems, many techniques to systematize FTA activities by applying computer technologies have been proposed. However, these techniques only use structural information of a target system and do not use functional information that is one of important properties of an artifact. The principle of FTA is to trace comprehensively cause-effect relations from a top undesirable effect to anomaly causes. The tracing is similar to the causality estimation technique that the authors proposed to find plausible counter actions to prevent or to mitigate the undesirable behavior of plants based on the model by a functional modeling technique, Multilevel Flow Modeling (MFM). The authors have extended this systematic technique to construct a fault tree (FT). This paper presents an algorithm of systematic construction of FT based on MFM models and demonstrates the applicability of the extended technique by the FT construction result of a cooling plant of nitric acid. (author)
Zhang Yong; Zhou Yangping
In this paper, we focus on the application of Multilevel Flow Model (MFM) in the automatic real-time fault diagnosis of High Temperature Gas-cooled Reactor Pebble-bed Module (HTR-PM) accidents. In the MFM, the plant process is described abstractly in function level by mass, energy and information flows, which reveal the interaction between different components and capacitate the causal reasoning between functions according to the flow properties. Thus, in the abnormal status, a goal-function-component oriented fault diagnosis can be performed with the model at a very quick speed and abnormal alarms can be also precisely explained by the reasoning relationship of the model. By using MFM, a fault diagnosis model of HTR-PM plant is built, and the detailed process of fault diagnosis is also shown by the flowcharts. Due to lack of simulation data about HTR-PM, experiments are not conducted to evaluate the fault diagnosis performance, but analysis of algorithm feasibility and complexity shows that the diagnosis system will have a good ability to detect and diagnosis accidents timely. (author)
Tesfay, Welderufael Berhane; Booth, Todd; Andersson, Karl
The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitiga...
Chan, W. S.; Fuentes, J. D.; Lerdau, M.
This presentation will provide research findings to evaluate the hypothesis that the loss of biogenic volatile organic compound (BVOC) within plant canopies is dynamic and depends on factors such as plant canopy architecture (height and leaf area distribution), atmospheric turbulence, concentration of oxidants (OH, O3, NO3), and the reactivity of BVOC species. Results will be presented from a new one dimensional, multilevel canopy model that couples algorithms for canopy microclimate, leaf physiology, BVOC emission, turbulent transport, and atmospheric chemistry to investigate the relative importance of factors that impact BVOC loss within a forest canopy. Model sensitivity tests will be presented and discussed to identify factors driving canopy loss. Results show isoprene and monoterpene canopy losses as high as 9 and 18%, respectively, for tall canopies during the daytime. We hypothesize that canopy height and wind speed (i.e. canopy residence time) may be the most important in dictating within-canopy loss. This work will reduce the error in bottom-up flux estimates of BVOCs and ultimately improve parameterizations of BVOC sources in air quality models by accounting for within canopy processes.
Full Text Available To enable the design of large capacity memory structures, novel memory technologies such as non-volatile memory (NVM and novel fabrication approaches, e.g., 3D stacking and multi-level cell (MLC design have been explored. The existing modeling tools, however, cover only a few memory technologies, technology nodes and fabrication approaches. We present DESTINY, a tool for modeling 2D/3D memories designed using SRAM, resistive RAM (ReRAM, spin transfer torque RAM (STT-RAM, phase change RAM (PCM and embedded DRAM (eDRAM and 2D memories designed using spin orbit torque RAM (SOT-RAM, domain wall memory (DWM and Flash memory. In addition to single-level cell (SLC designs for all of these memories, DESTINY also supports modeling MLC designs for NVMs. We have extensively validated DESTINY against commercial and research prototypes of these memories. DESTINY is very useful for performing design-space exploration across several dimensions, such as optimizing for a target (e.g., latency, area or energy-delay product for a given memory technology, choosing the suitable memory technology or fabrication method (i.e., 2D v/s 3D for a given optimization target, etc. We believe that DESTINY will boost studies of next-generation memory architectures used in systems ranging from mobile devices to extreme-scale supercomputers. The latest source-code of DESTINY is available from the following git repository: https://bitbucket.org/sparshmittal/destinyv2.
Nielson, K K; Rogers, V C; Rogers, V; Holt, R B
The RAETRAD model was generalized to characterize radon generation and movement from soils and building materials into multi-level buildings with basements or crawl spaces. With the generalization, the model retains its original simplicity and ease of use. The model calculates radon entry rates that are consistent with measurements published for basement test structures at Colorado State University, confirming approximately equal contributions from diffusion and pressure-driven air flow at indoor-outdoor air pressure differences of deltaP(i-o) = -3.5 Pa. About one-fourth of the diffusive radon entry comes from concrete slabs and three-fourths comes from the surrounding soils. Calculated radon entry rates with and without a barrier over floor-wall shrinkage cracks generally agree with Colorado State University measurements when a sustained pressure of deltaP(i-o) = -2 Pa is used to represent calm wind (<1 m s(-1)) conditions. Calculated radon distributions in a 2-level house also are consistent with published measurements and equations.
Kashuba, Roxolana; Cha, YoonKyung; Alameddine, Ibrahim; Lee, Boknam; Cuffney, Thomas F.
Multilevel hierarchical modeling methodology has been developed for use in ecological data analysis. The effect of urbanization on stream macroinvertebrate communities was measured across a gradient of basins in each of nine metropolitan regions across the conterminous United States. The hierarchical nature of this dataset was harnessed in a multi-tiered model structure, predicting both invertebrate response at the basin scale and differences in invertebrate response at the region scale. Ordination site scores, total taxa richness, Ephemeroptera, Plecoptera, Trichoptera (EPT) taxa richness, and richness-weighted mean tolerance of organisms at a site were used to describe invertebrate responses. Percentage of urban land cover was used as a basin-level predictor variable. Regional mean precipitation, air temperature, and antecedent agriculture were used as region-level predictor variables. Multilevel hierarchical models were fit to both levels of data simultaneously, borrowing statistical strength from the complete dataset to reduce uncertainty in regional coefficient estimates. Additionally, whereas non-hierarchical regressions were only able to show differing relations between invertebrate responses and urban intensity separately for each region, the multilevel hierarchical regressions were able to explain and quantify those differences within a single model. In this way, this modeling approach directly establishes the importance of antecedent agricultural conditions in masking the response of invertebrates to urbanization in metropolitan regions such as Milwaukee-Green Bay, Wisconsin; Denver, Colorado; and Dallas-Fort Worth, Texas. Also, these models show that regions with high precipitation, such as Atlanta, Georgia; Birmingham, Alabama; and Portland, Oregon, start out with better regional background conditions of invertebrates prior to urbanization but experience faster negative rates of change with urbanization. Ultimately, this urbanization
Wu, Jing; Zhang, Laibin; Lind, Morten
on function-oriented modeling, Multilevel Flow Modeling (MFM), is extended with function roles. A graphical MFM editor, which is combined with the reasoning capabilities of the MFM Workbench developed by DTU is applied to automate HAZOP studies. The method is proposed to support the “brain-storming” sessions...... is the first paper discussing and demonstrate the potential of the roles concept in MFM to supplement the integrity of HAZOP analysis....
Wang, Lei; Fan, Youping; Zhang, Dai; Ge, Mengxin; Zou, Xianbin; Li, Jingjiao
This paper proposes a method to simulate a back-to-back modular multilevel converter (MMC) HVDC transmission system. In this paper we utilize an equivalent networks to simulate the dynamic power system. Moreover, to account for the performance of converter station, core components of model of the converter station gives a basic model of simulation. The proposed method is applied to an equivalent real power system.
Damman, Olga C.; Stubbe, Janine H.; Hendriks, Michelle; Arah, Onyebuchi A.; Spreeuwenberg, Peter; Delnoij, Diana M. J.; Groenewegen, Peter P.
Background: Ratings on the quality of healthcare from the consumer's perspective need to be adjusted for consumer characteristics to ensure fair and accurate comparisons between healthcare providers or health plans. Although multilevel analysis is already considered an appropriate method for
Chockalingam, S.; Pieters, W.; Herdeiro Teixeira, A.M.; van Gelder, P.H.A.J.M.; Lipmaa, Helger; Mitrokotsa, Aikaterini; Matulevicius, Raimundas
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a systematic review of the scientific literature and identify 17 standard BN models in cyber security. We analyse these models based on 9 different criteri...
Howe, Laura D; Tilling, Kate; Matijasevich, Alicia; Petherick, Emily S; Santos, Ana Cristina; Fairley, Lesley; Wright, John; Santos, Iná S; Barros, Aluísio Jd; Martin, Richard M; Kramer, Michael S; Bogdanovich, Natalia; Matush, Lidia; Barros, Henrique; Lawlor, Debbie A
Childhood growth is of interest in medical research concerned with determinants and consequences of variation from healthy growth and development. Linear spline multilevel modelling is a useful approach for deriving individual summary measures of growth, which overcomes several data issues (co-linearity of repeat measures, the requirement for all individuals to be measured at the same ages and bias due to missing data). Here, we outline the application of this methodology to model individual trajectories of length/height and weight, drawing on examples from five cohorts from different generations and different geographical regions with varying levels of economic development. We describe the unique features of the data within each cohort that have implications for the application of linear spline multilevel models, for example, differences in the density and inter-individual variation in measurement occasions, and multiple sources of measurement with varying measurement error. After providing example Stata syntax and a suggested workflow for the implementation of linear spline multilevel models, we conclude with a discussion of the advantages and disadvantages of the linear spline approach compared with other growth modelling methods such as fractional polynomials, more complex spline functions and other non-linear models. © The Author(s) 2013.
Muhammad Qaiser Saleem; Jafreezal Jaafar; Mohd Fadzil Hassan
Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a modelling language for business process modelling. Along with the increased connectivity in SOA environment, security risks rise exponentially. Security is not defined during the early phases of development and left onto developer. Properly configuring security requirements in SOA applications is...
Full Text Available Automatic image registration is a vital yet challenging task, particularly for multi-sensor remote sensing images. Given the diversity of the data, it is unlikely that a single registration algorithm or a single image feature will work satisfactorily for all applications. Focusing on this issue, the mainly contribution of this paper is to propose an automatic optical-to-SAR image registration method using –level and refinement model: Firstly, a multi-level strategy of coarse-to-fine registration is presented, the visual saliency features is used to acquire coarse registration, and then specific area and line features are used to refine the registration result, after that, sub-pixel matching is applied using KNN Graph. Secondly, an iterative strategy that involves adaptive parameter adjustment for re-extracting and re-matching features is presented. Considering the fact that almost all feature-based registration methods rely on feature extraction results, the iterative strategy improve the robustness of feature matching. And all parameters can be automatically and adaptively adjusted in the iterative procedure. Thirdly, a uniform level set segmentation model for optical and SAR images is presented to segment conjugate features, and Voronoi diagram is introduced into Spectral Point Matching (VSPM to further enhance the matching accuracy between two sets of matching points. Experimental results show that the proposed method can effectively and robustly generate sufficient, reliable point pairs and provide accurate registration.
Valente, Maria I B; Vettore, Mario V
To investigate the relationship of contextual and individual factors with periodontal disease in dentate adults and older people using the Andersen's behavioural model. Secondary individual data from 6011 adults and 2369 older people from the Brazilian Oral Health Survey (2010) were combined with contextual data for 27 cities. Attachment loss (AL) categories for each sextant were coded and summed to obtain the periodontal disease measure. The association of predisposing, enabling and need characteristics at city and individual level with periodontal disease was assessed using an adapted version of the Andersen's behavioural model. Multilevel Poisson regression was used to estimate rate ratios (RR) and 95% CIs. Periodontal disease was associated with contextual predisposing (RR 0.93; 95% CI = 0.87-0.99) and enabling factors (RR 0.99; 95% CI = 0.98-0.99) in adults. Contextual predisposing was also associated with periodontal disease in older people (RR 0.82; 95% CI = 0.73-0.92). Individual predisposing (age, sex and schooling) and need characteristics (perceived treatment need) were common predictors of periodontal disease in adults and older people. Periodontal disease was also associated with behaviours in the latter age group. Contextual predisposing factors and individual characteristics influenced periodontal disease experience in adults and older people. Contextual enabling factors were also meaningful determinants of periodontal disease in the former age group. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Slides for the opening panel on "Issues in the Security of Wireless Network systems" at ICETE 2008.......Slides for the opening panel on "Issues in the Security of Wireless Network systems" at ICETE 2008....
Full Text Available This paper aims to introduce multilevel logistic regression analysis in a simple and practical way. First, we introduce the basic principles of logistic regression analysis (conditional probability, logit transformation, odds ratio. Second, we discuss the two fundamental implications of running this kind of analysis with a nested data structure: In multilevel logistic regression, the odds that the outcome variable equals one (rather than zero may vary from one cluster to another (i.e. the intercept may vary and the effect of a lower-level variable may also vary from one cluster to another (i.e. the slope may vary. Third and finally, we provide a simplified three-step “turnkey” procedure for multilevel logistic regression modeling: -Preliminary phase: Cluster- or grand-mean centering variables -Step #1: Running an empty model and calculating the intraclass correlation coefficient (ICC -Step #2: Running a constrained and an augmented intermediate model and performing a likelihood ratio test to determine whether considering the cluster-based variation of the effect of the lower-level variable improves the model fit -Step #3 Running a final model and interpreting the odds ratio and confidence intervals to determine whether data support your hypothesis Command syntax for Stata, R, Mplus, and SPSS are included. These steps will be applied to a study on Justin Bieber, because everybody likes Justin Bieber.1
The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.
Wolf, Jennyfer; Bonjour, Sophie; Prüss-Ustün, Annette
Monitoring progress towards the targets for access to safe drinking-water and sanitation under the Millennium Development Goals (MDG) requires reliable estimates and indicators. We analyzed trends and reviewed current indicators used for those targets. We developed continuous time series for 1990 to 2015 for access to improved drinking-water sources and improved sanitation facilities by country using multilevel modeling (MLM). We show that MLM is a reliable and transparent tool with many advantages over alternative approaches to estimate access to facilities. Using current indicators, the MDG target for water would be met, but the target for sanitation missed considerably. The number of people without access to such services is still increasing in certain regions. Striking differences persist between urban and rural areas. Consideration of water quality and different classification of shared sanitation facilities would, however, alter estimates considerably. To achieve improved monitoring we propose: (1) considering the use of MLM as an alternative for estimating access to safe drinking-water and sanitation; (2) completing regular assessments of water quality and supporting the development of national regulatory frameworks as part of capacity development; (3) evaluating health impacts of shared sanitation; (4) using a more equitable presentation of countries' performances in providing improved services.
Igor Gomes Menezes
Full Text Available Large-scale educational assessment has been established as source of descriptive, evaluative and interpretative information that influence educational policies worldwide throughout the last third of the 20th century. In the 1990s the Brazilian Ministry of Education developed the National Basic Education Assessment System (SAEB that regularly measures management, resource and contextual school features and academic achievement in public and private institutions. In 2005, after significant piloting and review of the SAEB, a new sampling strategy was taken and Prova Brasil became the new instrument used by the Ministry to assess skills in Portuguese (reading comprehension and Mathematics (problem solving, as well as collecting contextual information concerning the school, principal, teacher, and the students. This study aims to identify which variables are predictors of academic achievement of fifth grade students on Prova Brasil. Across a large sample of students, multilevel models tested a large number of variables relevant to student achievement. This approach uncovered critical variables not commonly seen as significant in light of other achievement determinants, including student habits, teacher ethnicity, and school technological resources. As such, this approach demonstrates the value of MLM to appropriately nuanced educational policies that reflect critical influences on student achievement. Its implications for wider application for psychology studies that may have relevant impacts for policy are also discussed.
Del Piccolo, Lidia; Mazzi, Maria Angela; Dunn, Graham; Sandri, Marco; Zimmermann, Christa
The aims of the study were to explore the importance of macro (patient, physician, consultation) and micro (doctor-patient speech sequences) variables in promoting patient cues (unsolicited new information or expressions of feelings), and to describe the methodological implications related to the study of speech sequences. Patient characteristics, a consultation index of partnership and doctor-patient speech sequences were recorded for 246 primary care consultations in six primary care surgeries in Verona, Italy. Homogeneity and stationarity conditions of speech sequences allowed the creation of a hierarchy of multilevel logit models including micro and macro level variables, with the presence/absence of cues as the dependent variable. We found that emotional distress of the patient increased cues and that cues appeared among other patient expressions and were preceded by physicians' facilitations and handling of emotion. Partnership, in terms of open-ended inquiry, active listening skills and handling of emotion by the physician and active participation by the patient throughout the consultation, reduced cue frequency.
Jaakkola, Timo; Wang, John; Yli-Piipari, Sami; Liukkonen, Jarmo
The purpose of this study was to examine individual- and classroom-level differences in the longitudinal change in motivational regulations during physical education students' transition from elementary (Grade 6) across middle school (Grades 7 to 9). A sample of 757 Finnish adolescents (M = 12.71, SD = 0.23) participated in this study. Participants of the study responded to questionnaires collected six times. A multilevel latent growth modelling approach was used to analyze the data. Results showed that motivational regulations in physical education developed at different rates during middle school. More specifically, students': (a) identified regulation increased across Grades 6 to 9; (b) amotivation increased during middle school transition from Grade 6 to 7; and (c) introjected regulation declined from Grade 8 to 9. Other motivational regulations remained stable across time. The changes in amotivation and introjected regulation were largely due to individual factors, whereas the changes in identified regulation were due to environmental factors. Key pointsStudents' identified regulation increased across Grades 6 to 9.Students' amotivation increased across middle school transition from Grade 6 to 7.Students' introjected regulation declined from Grade 8 to 9.Other motivational regulations remained stable across time.
Bastani, Ali Foroush; Dastgerdi, Maryam Vahid; Mighani, Abolfazl
The main aim of this paper is the analytical and numerical study of a time-dependent second-order nonlinear partial differential equation (PDE) arising from the endogenous stochastic volatility model, introduced in [Bensoussan, A., Crouhy, M. and Galai, D., Stochastic equity volatility related to the leverage effect (I): equity volatility behavior. Applied Mathematical Finance, 1, 63-85, 1994]. As the first step, we derive a consistent set of initial and boundary conditions to complement the PDE, when the firm is financed by equity and debt. In the sequel, we propose a Newton-based iteration scheme for nonlinear parabolic PDEs which is an extension of a method for solving elliptic partial differential equations introduced in [Fasshauer, G. E., Newton iteration with multiquadrics for the solution of nonlinear PDEs. Computers and Mathematics with Applications, 43, 423-438, 2002]. The scheme is based on multilevel collocation using radial basis functions (RBFs) to solve the resulting locally linearized elliptic PDEs obtained at each level of the Newton iteration. We show the effectiveness of the resulting framework by solving a prototypical example from the field and compare the results with those obtained from three different techniques: (1) a finite difference discretization; (2) a naive RBF collocation and (3) a benchmark approximation, introduced for the first time in this paper. The numerical results confirm the robustness, higher convergence rate and good stability properties of the proposed scheme compared to other alternatives. We also comment on some possible research directions in this field.
Wagaman, M. Alex; Geiger, Jennifer Mullins; Bermudez-Parsai, Monica; Hedberg, E. C.
Although schools have been trying to address bulling by utilizing different approaches that stop or reduce the incidence of bullying, little remains known about what specific intervention strategies are most successful in reducing bullying in the school setting. Using the social-ecological framework, this paper examines school-based disciplinary interventions often used to deliver consequences to deter the reoccurrence of bullying and aggressive behaviors among school-aged children. Data for this study are drawn from the School-Wide Information System (SWIS) with the final analytic sample consisting of 1,221 students in grades K – 12 who received an office disciplinary referral for bullying during the first semester. Using Kaplan-Meier Failure Functions and Multi-level discrete time hazard models, determinants of the probability of a student receiving a second referral over time were examined. Of the seven interventions tested, only Parent-Teacher Conference (AOR=0.65, pbullying and aggressive behaviors. By using a social-ecological framework, schools can develop strategies that deter the reoccurrence of bullying by identifying key factors that enhance a sense of connection between the students’ mesosystems as well as utilizing disciplinary strategies that take into consideration student’s microsystem roles. PMID:22878779
Jung, Minsoo; Choi, Mankyu
There has been little conceptual understanding as to how community capacity works, although it allows for an important, population-based health promotional strategy. In this study, the mechanism of community capacity was studied through literature reviews to suggest a comprehensive conceptual model. The research results found that the key to community capacity prevailed in how actively the capacities of individuals and their communities are able to interact with one another. Under active interactions, community-based organizations, which are a type of voluntary association, were created within the community, and cohesion among residents was enhanced. In addition, people were more willing to address community issues. During the process, many services were initiated to meet the people's health needs and strengthen their social and psychological ties. The characteristics of community capacity were named as the contextual multilevel effects. Because an increase in community capacity contributes to a boosted health status, encourages health behaviors, and eventually leads to the overall prosperity of the community, more public health-related attention is required.
Bellucci, Michael A; Coker, David F
We describe a new method for constructing empirical valence bond potential energy surfaces using a parallel multilevel genetic program (PMLGP). Genetic programs can be used to perform an efficient search through function space and parameter space to find the best functions and sets of parameters that fit energies obtained by ab initio electronic structure calculations. Building on the traditional genetic program approach, the PMLGP utilizes a hierarchy of genetic programming on two different levels. The lower level genetic programs are used to optimize coevolving populations in parallel while the higher level genetic program (HLGP) is used to optimize the genetic operator probabilities of the lower level genetic programs. The HLGP allows the algorithm to dynamically learn the mutation or combination of mutations that most effectively increase the fitness of the populations, causing a significant increase in the algorithm's accuracy and efficiency. The algorithm's accuracy and efficiency is tested against a standard parallel genetic program with a variety of one-dimensional test cases. Subsequently, the PMLGP is utilized to obtain an accurate empirical valence bond model for proton transfer in 3-hydroxy-gamma-pyrone in gas phase and protic solvent. © 2011 American Institute of Physics
Raab, Melinda; Dunst, Carl J; Hamby, Deborah W
The purpose of the study was to isolate the sources of variations in the rates of response-contingent learning among young children with multiple disabilities and significant developmental delays randomly assigned to contrasting types of early childhood intervention. Multilevel, hierarchical linear growth curve modelling was used to analyze four different measures of child response-contingent learning where repeated child learning measures were nested within individual children (Level-1), children were nested within practitioners (Level-2), and practitioners were nested within the contrasting types of intervention (Level-3). Findings showed that sources of variations in rates of child response-contingent learning were associated almost entirely with type of intervention after the variance associated with differences in practitioners nested within groups were accounted for. Rates of child learning were greater among children whose existing behaviour were used as the building blocks for promoting child competence (asset-based practices) compared to children for whom the focus of intervention was promoting child acquisition of missing skills (needs-based practices). The methods of analysis illustrate a practical approach to clustered data analysis and the presentation of results in ways that highlight sources of variations in the rates of response-contingent learning among young children with multiple developmental disabilities and significant developmental delays. Copyright © 2018 The Author(s). Published by Elsevier Ltd.. All rights reserved.
Žukovič, Milan; Hristopulos, Dionissios T
A current problem of practical significance is how to analyze large, spatially distributed, environmental data sets. The problem is more challenging for variables that follow non-Gaussian distributions. We show by means of numerical simulations that the spatial correlations between variables can be captured by interactions between 'spins'. The spins represent multilevel discretizations of environmental variables with respect to a number of pre-defined thresholds. The spatial dependence between the 'spins' is imposed by means of short-range interactions. We present two approaches, inspired by the Ising and Potts models, that generate conditional simulations of spatially distributed variables from samples with missing data. Currently, the sampling and simulation points are assumed to be at the nodes of a regular grid. The conditional simulations of the 'spin system' are forced to respect locally the sample values and the system statistics globally. The second constraint is enforced by minimizing a cost function representing the deviation between normalized correlation energies of the simulated and the sample distributions. In the approach based on the N c -state Potts model, each point is assigned to one of N c classes. The interactions involve all the points simultaneously. In the Ising model approach, a sequential simulation scheme is used: the discretization at each simulation level is binomial (i.e., ± 1). Information propagates from lower to higher levels as the simulation proceeds. We compare the two approaches in terms of their ability to reproduce the target statistics (e.g., the histogram and the variogram of the sample distribution), to predict data at unsampled locations, as well as in terms of their computational complexity. The comparison is based on a non-Gaussian data set (derived from a digital elevation model of the Walker Lake area, Nevada, USA). We discuss the impact of relevant simulation parameters, such as the domain size, the number of
Žukovič, Milan; Hristopulos, Dionissios T.
A current problem of practical significance is how to analyze large, spatially distributed, environmental data sets. The problem is more challenging for variables that follow non-Gaussian distributions. We show by means of numerical simulations that the spatial correlations between variables can be captured by interactions between 'spins'. The spins represent multilevel discretizations of environmental variables with respect to a number of pre-defined thresholds. The spatial dependence between the 'spins' is imposed by means of short-range interactions. We present two approaches, inspired by the Ising and Potts models, that generate conditional simulations of spatially distributed variables from samples with missing data. Currently, the sampling and simulation points are assumed to be at the nodes of a regular grid. The conditional simulations of the 'spin system' are forced to respect locally the sample values and the system statistics globally. The second constraint is enforced by minimizing a cost function representing the deviation between normalized correlation energies of the simulated and the sample distributions. In the approach based on the Nc-state Potts model, each point is assigned to one of Nc classes. The interactions involve all the points simultaneously. In the Ising model approach, a sequential simulation scheme is used: the discretization at each simulation level is binomial (i.e., ± 1). Information propagates from lower to higher levels as the simulation proceeds. We compare the two approaches in terms of their ability to reproduce the target statistics (e.g., the histogram and the variogram of the sample distribution), to predict data at unsampled locations, as well as in terms of their computational complexity. The comparison is based on a non-Gaussian data set (derived from a digital elevation model of the Walker Lake area, Nevada, USA). We discuss the impact of relevant simulation parameters, such as the domain size, the number of
Song, J; Zhao, H; Pan, C; Li, C; Liu, J; Pan, Y
Chronic periodontitis is a multifactorial polygenetic disease with an increasing number of associated factors that have been identified over recent decades. Longitudinal epidemiologic studies have demonstrated that the risk factors were related to the progression of the disease. A traditional multivariate regression model was used to find risk factors associated with chronic periodontitis. However, the approach requirement of standard statistical procedures demands individual independence. Multilevel modelling (MLM) data analysis has widely been used in recent years, regarding thorough hierarchical structuring of the data, decomposing the error terms into different levels, and providing a new analytic method and framework for solving this problem. The purpose of our study is to investigate the relationship of clinical periodontal index and the risk factors in chronic periodontitis through MLM analysis and to identify high-risk individuals in the clinical setting. Fifty-four patients with moderate to severe periodontitis were included. They were treated by means of non-surgical periodontal therapy, and then made follow-up visits regularly at 3, 6, and 12 months after therapy. Each patient answered a questionnaire survey and underwent measurement of clinical periodontal parameters. Compared with baseline, probing depth (PD) and clinical attachment loss (CAL) improved significantly after non-surgical periodontal therapy with regular follow-up visits at 3, 6, and 12 months after therapy. The null model and variance component models with no independent variables included were initially obtained to investigate the variance of the PD and CAL reductions across all three levels, and they showed a statistically significant difference (P periodontal therapy with regular follow-up visits had a remarkable curative effect. All three levels had a substantial influence on the reduction of PD and CAL. Site-level had the largest effect on PD and CAL reductions.
Gilthorpe, Mark S; Harrison, Wendy J; Downing, Amy; Forman, David; West, Robert M
Using routinely collected patient data we explore the utility of multilevel latent class (MLLC) models to adjust for patient casemix and rank Trust performance. We contrast this with ranks derived from Trust standardised mortality ratios (SMRs). Patients with colorectal cancer diagnosed between 1998 and 2004 and resident in Northern and Yorkshire regions were identified from the cancer registry database (n = 24,640). Patient age, sex, stage-at-diagnosis (Dukes), and Trust of diagnosis/treatment were extracted. Socioeconomic background was derived using the Townsend Index. Outcome was survival at 3 years after diagnosis. MLLC-modelled and SMR-generated Trust ranks were compared. Patients were assigned to two classes of similar size: one with reasonable prognosis (63.0% died within 3 years), and one with better prognosis (39.3% died within 3 years). In patient class one, all patients diagnosed at stage B or C died within 3 years; in patient class two, all patients diagnosed at stage A, B or C survived. Trusts were assigned two classes with 51.3% and 53.2% of patients respectively dying within 3 years. Differences in the ranked Trust performance between the MLLC model and SMRs were all within estimated 95% CIs. A novel approach to casemix adjustment is illustrated, ranking Trust performance whilst facilitating the evaluation of factors associated with the patient journey (e.g. treatments) and factors associated with the processes of healthcare delivery (e.g. delays). Further research can demonstrate the value of modelling patient pathways and evaluating healthcare processes across provider institutions.
Full Text Available Abstract Background Using routinely collected patient data we explore the utility of multilevel latent class (MLLC models to adjust for patient casemix and rank Trust performance. We contrast this with ranks derived from Trust standardised mortality ratios (SMRs. Methods Patients with colorectal cancer diagnosed between 1998 and 2004 and resident in Northern and Yorkshire regions were identified from the cancer registry database (n = 24,640. Patient age, sex, stage-at-diagnosis (Dukes, and Trust of diagnosis/treatment were extracted. Socioeconomic background was derived using the Townsend Index. Outcome was survival at 3 years after diagnosis. MLLC-modelled and SMR-generated Trust ranks were compared. Results Patients were assigned to two classes of similar size: one with reasonable prognosis (63.0% died within 3 years, and one with better prognosis (39.3% died within 3 years. In patient class one, all patients diagnosed at stage B or C died within 3 years; in patient class two, all patients diagnosed at stage A, B or C survived. Trusts were assigned two classes with 51.3% and 53.2% of patients respectively dying within 3 years. Differences in the ranked Trust performance between the MLLC model and SMRs were all within estimated 95% CIs. Conclusions A novel approach to casemix adjustment is illustrated, ranking Trust performance whilst facilitating the evaluation of factors associated with the patient journey (e.g. treatments and factors associated with the processes of healthcare delivery (e.g. delays. Further research can demonstrate the value of modelling patient pathways and evaluating healthcare processes across provider institutions.
Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Working Paper is intended for readers who wish to explore the MOSES methodology in depth; there is also a brochure which provides an overview of the analysis and results.
NEISSE RICARDO; STERI GARY; NAI FOVINO Igor; BALDINI Gianmarco; VAN HOESEL Lodewijk
We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the control and protection of user data in the deployment of the Internet of Things (IoT). This toolkit takes a more general approach for security engineering including risk analysis, establishment of aspect-specific trust relationships, and enforceable security policies. We describe the integrated metamodels used in the toolkit and the accompanying security engineering methodology for IoT systems...
Fu, Yu Long; Xin, Xiao Long
The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.
Full Text Available The issue of equality in the between-and within-level structures in Multilevel Confirmatory Factor Analysis (MCFA models has been influential for obtaining unbiased parameter estimates and statistical inferences. A commonly seen condition is the inequality of factor loadings under equal level-varying structures. With mathematical investigation and Monte Carlo simulation, this study compared the robustness of five statistical models including two model-based (a true and a mis-specified models, one design-based, and two maximum models (two models where the full rank of variance-covariance matrix is estimated in between level and within level, respectively in analyzing complex survey measurement data with level-varying factor loadings. The empirical data of 120 3rd graders' (from 40 classrooms perceived Harter competence scale were modeled using MCFA and the parameter estimates were used as true parameters to perform the Monte Carlo simulation study. Results showed maximum models was robust to unequal factor loadings while the design-based and the miss-specified model-based approaches produced conflated results and spurious statistical inferences. We recommend the use of maximum models if researchers have limited information about the pattern of factor loadings and measurement structures. Measurement models are key components of Structural Equation Modeling (SEM; therefore, the findings can be generalized to multilevel SEM and CFA models. Mplus codes are provided for maximum models and other analytical models.
Maxwell, Sophie; Reynolds, Katherine J.; Lee, Eunro; Subasic, Emina; Bromhead, David
School climate is a leading factor in explaining student learning and achievement. Less work has explored the impact of both staff and student perceptions of school climate raising interesting questions about whether staff school climate experiences can add “value” to students' achievement. In the current research, multiple sources were integrated into a multilevel model, including staff self-reports, student self-reports, objective school records of academic achievement, and socio-economic d...
Cho, Sun-Joo; Goodwin, Amanda P
When word learning is supported by instruction in experimental studies for adolescents, word knowledge outcomes tend to be collected from complex data structure, such as multiple aspects of word knowledge, multilevel reader data, multilevel item data, longitudinal design, and multiple groups. This study illustrates how generalized linear mixed models can be used to measure and explain word learning for data having such complexity. Results from this application provide deeper understanding of word knowledge than could be attained from simpler models and show that word knowledge is multidimensional and depends on word characteristics and instructional contexts.
Title: Transportation and Socioeconomic Impacts of Bypasses on Communities: An Integrated Synthesis of Panel Data, Multilevel, and Spatial Econometric Models with Case Studies. The title used at the start of this project was Transportation and Soc...
Theiss, Jennifer A.; Solomon, Denise Haunani
We used longitudinal data and multilevel modeling to examine how intimacy, relational uncertainty, and failed attempts at interdependence influence emotional, cognitive, and communicative responses to romantic jealousy, and how those experiences shape subsequent relationship characteristics. The relational turbulence model (Solomon & Knobloch,…
Stennikov, V. A.; Barakhtenko, E. A.; Sokolov, D. V.
The problem of finding optimal parameters of a heat-supply system (HSS) is in ensuring the required throughput capacity of a heat network by determining pipeline diameters and characteristics and location of pumping stations. Effective methods for solving this problem, i.e., the method of stepwise optimization based on the concept of dynamic programming and the method of multicircuit optimization, were proposed in the context of the hydraulic circuit theory developed at Melentiev Energy Systems Institute (Siberian Branch, Russian Academy of Sciences). These methods enable us to determine optimal parameters of various types of piping systems due to flexible adaptability of the calculation procedure to intricate nonlinear mathematical models describing features of used equipment items and methods of their construction and operation. The new and most significant results achieved in developing methodological support and software for finding optimal parameters of complex heat supply systems are presented: a new procedure for solving the problem based on multilevel decomposition of a heat network model that makes it possible to proceed from the initial problem to a set of interrelated, less cumbersome subproblems with reduced dimensionality; a new algorithm implementing the method of multicircuit optimization and focused on the calculation of a hierarchical model of a heat supply system; the SOSNA software system for determining optimum parameters of intricate heat-supply systems and implementing the developed methodological foundation. The proposed procedure and algorithm enable us to solve engineering problems of finding the optimal parameters of multicircuit heat supply systems having large (real) dimensionality, and are applied in solving urgent problems related to the optimal development and reconstruction of these systems. The developed methodological foundation and software can be used for designing heat supply systems in the Central and the Admiralty regions in
Ntoumanis, N; Stenling, A; Thøgersen-Ntoumani, C; Vlachopoulos, S; Lindwall, M; Gucciardi, D F; Tsakonitis, C
Past work linking exercise identity and exercise motivation has been cross-sectional. This is the first study to model the relations between different types of exercise identity and exercise motivation longitudinally. Understanding the dynamic associations between these sets of variables has implications for theory development and applied research. This was a longitudinal survey study. Participants were 180 exercisers (79 men, 101 women) from Greece, who were recruited from fitness centers and were asked to complete questionnaires assessing exercise identity (exercise beliefs and role-identity) and exercise motivation (intrinsic, identified, introjected, external motivation, and amotivation) three times within a 6 month period. Multilevel growth curve modeling examined the role of motivational regulations as within- and between-level predictors of exercise identity, and a model in which exercise identity predicted exercise motivation at the within- and between-person levels. Results showed that within-person changes in intrinsic motivation, introjected, and identified regulations were positively and reciprocally related to within-person changes in exercise beliefs; intrinsic motivation was also a positive predictor of within-person changes in role-identity but not vice versa. Between-person differences in the means of predictor variables were predictive of initial levels and average rates of change in the outcome variables. The findings show support to the proposition that a strong exercise identity (particularly exercise beliefs) can foster motivation for behaviors that reinforce this identity. We also demonstrate that such relations can be reciprocal overtime and can depend on the type of motivation in question as well as between-person differences in absolute levels of these variables. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Karassin, Orr; Bar-Haim, Aviad
The multilevel empirical study of the antecedents of corporate social responsibility (CSR) has been identified as "the first knowledge gap" in CSR research. Based on an extensive literature review, the present study outlines a conceptual multilevel model of CSR, then designs and empirically validates an operational multilevel model of the principal driving factors affecting corporate environmental responsibility (CER), as a measure of CSR. Both conceptual and operational models incorporate three levels of analysis: institutional, organizational, and individual. The multilevel nature of the design allows for the assessment of the relative importance of the levels and of their components in the achievement of CER. Unweighted least squares (ULS) regression analysis reveals that the institutional-level variables have medium relationships with CER, some variables having a negative effect. The organizational level is revealed as having strong and positive significant relationships with CER, with organizational culture and managers' attitudes and behaviors as significant driving forces. The study demonstrates the importance of multilevel analysis in improving the understanding of CSR drivers, relative to single level models, even if the significance of specific drivers and levels may vary by context. Copyright © 2016 Elsevier Ltd. All rights reserved.
Leeuw, Jan de; Meijer, Erik
... appropriate and eﬃcient model-based methods have become available to deal with this issue, that we have come to appreciate the power that more complex models provide for describing the world and providing new insights. This book sets out to present some of the most recent developments in what has come to be known as multilevel modelling. An...
Zhao, Gansen; Chunming, Rong; Jaatun, Martin Gilje; Sandnes, Frode Eika
Cloud computing has become a popular choice as an alternative to investing new IT systems. When making decisions on adopting cloud computing related solutions, security has always been a major concern. This article summarizes security concerns in cloud computing and proposes five service deployment models to ease these concerns. The proposed models provide different security related features to address different requirements and scenarios and can serve as reference models for deployment. D...
V. S. Oladko
Full Text Available The article deals with the problem assessment of information security risks in the ERP-system. ERP-system functions and architecture are studied. The model malicious impacts on levels of ERP-system architecture are composed. Model-based risk assessment, which is the quantitative and qualitative approach to risk assessment, built on the partial unification 3 methods for studying the risks of information security - security models with full overlapping technique CRAMM and FRAP techniques developed.
Cipiti, B.B.; Duran, F.A.; Mendoza, L.A.; Parks, M.J.; Dominguez, D.; Le, T.D.
Safeguards and security design for reprocessing plants can lead to excessive costs if not incorporated early in the design process. The design for electrochemical plants is somewhat uncertain since these plants have not been built at a commercial scale in the past. The Separation and Safeguards Performance Model (SSPM), developed at Sandia National Laboratories, has been used for safeguards design and evaluation for multiple reprocessing plant types. The SSPM includes the following capabilities: -) spent fuel source term library, -) mass tracking of elements 1-99 and bulk solid/liquids, -) tracking of heat load and activity, -) customisable measurement points, -) automated calculation of ID and error propagation, -) alarm conditions and statistical tests, and -) user-defined diversion scenarios. Materials accountancy and process monitoring data can provide more timely detection of material loss specifically to protect against the insider threat. While the SSPM is capable of determining detection probabilities and examining detection times for material loss scenarios, it does not model the operations or spatial effects for a plant design. The STAGE software was chosen to model the physical protection system. STAGE provides a framework to create end-to-end scalable force-on-force combat simulations. It allows for a complete 3D model of a facility to be designed along with the design of physical protection elements. This software, then, can be used to model operations and response for various material loss scenarios. The future integration of the SSPM model data with the STAGE software will provide a more complete analysis of diversion scenarios to assist plant designers
Cipiti, B.B.; Duran, F.A.; Mendoza, L.A.; Parks, M.J.; Dominguez, D.; Le, T.D. [Sandia National Laboratories, PO Box 5800 MS 0747, Albuquerque, NM 87185 (United States)
Safeguards and security design for reprocessing plants can lead to excessive costs if not incorporated early in the design process. The design for electrochemical plants is somewhat uncertain since these plants have not been built at a commercial scale in the past. The Separation and Safeguards Performance Model (SSPM), developed at Sandia National Laboratories, has been used for safeguards design and evaluation for multiple reprocessing plant types. The SSPM includes the following capabilities: -) spent fuel source term library, -) mass tracking of elements 1-99 and bulk solid/liquids, -) tracking of heat load and activity, -) customisable measurement points, -) automated calculation of ID and error propagation, -) alarm conditions and statistical tests, and -) user-defined diversion scenarios. Materials accountancy and process monitoring data can provide more timely detection of material loss specifically to protect against the insider threat. While the SSPM is capable of determining detection probabilities and examining detection times for material loss scenarios, it does not model the operations or spatial effects for a plant design. The STAGE software was chosen to model the physical protection system. STAGE provides a framework to create end-to-end scalable force-on-force combat simulations. It allows for a complete 3D model of a facility to be designed along with the design of physical protection elements. This software, then, can be used to model operations and response for various material loss scenarios. The future integration of the SSPM model data with the STAGE software will provide a more complete analysis of diversion scenarios to assist plant designers.
Full Text Available Multilevel analyses are ideally suited to assess the effects of ecological (higher level and individual (lower level exposure variables simultaneously. In applying such analyses to measures of ecologies in epidemiological studies, individual variables are usually aggregated into the higher level unit. Typically, the aggregated measure includes responses of every individual belonging to that group (i.e. it constitutes a self-included measure. More recently, researchers have developed an aggregate measure which excludes the response of the individual to whom the aggregate measure is linked (i.e. a self-excluded measure. In this study, we clarify the substantive and technical properties of these two measures when they are used as exposures in multilevel models.Although the differences between the two aggregated measures are mathematically subtle, distinguishing between them is important in terms of the specific scientific questions to be addressed. We then show how these measures can be used in two distinct types of multilevel models-self-included model and self-excluded model-and interpret the parameters in each model by imposing hypothetical interventions. The concept is tested on empirical data of workplace social capital and employees' systolic blood pressure.Researchers assume group-level interventions when using a self-included model, and individual-level interventions when using a self-excluded model. Analytical re-parameterizations of these two models highlight their differences in parameter interpretation. Cluster-mean centered self-included models enable researchers to decompose the collective effect into its within- and between-group components. The benefit of cluster-mean centering procedure is further discussed in terms of hypothetical interventions.When investigating the potential roles of aggregated variables, researchers should carefully explore which type of model-self-included or self-excluded-is suitable for a given situation
Moroz Maxim O.
Full Text Available The article explores approaches to modelling the system of ensuring the investment security. Necessity of observance of investment security of Ukraine has been substantiated. The author’s own vision of the modelling essentials has been provided. The eligibility for consideration of the system of ensuring the investment security of Ukraine in the functional, structural, process, formative, and factor aspects has been proved. The target setting and tasks of a functional model of the system of ensuring the investment security have been defined. The functions, subjects, organizational-economic mechanisms of the system of ensuring the investment security of Ukraine have been characterized. A structural model of the system of ensuring the investment security has been presented. Special attention has been given to the definition of objects of direct and indirect influence, control and controlled subsystems, aggregate of indicators, safe levels, principles of formation of the investment security system. The process and formative models of the system of ensuring the investment security, as well as the algorithm of the complex assessment of the level of investment security, were analyzed in detail. Measures to ensure the investment security of Ukraine have been defined.
Almohri, Hussain M. J.
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Bittig, Arne T; Uhrmacher, Adelinde M
Spatio-temporal dynamics of cellular processes can be simulated at different levels of detail, from (deterministic) partial differential equations via the spatial Stochastic Simulation algorithm to tracking Brownian trajectories of individual particles. We present a spatial simulation approach for multi-level rule-based models, which includes dynamically hierarchically nested cellular compartments and entities. Our approach ML-Space combines discrete compartmental dynamics, stochastic spatial approaches in discrete space, and particles moving in continuous space. The rule-based specification language of ML-Space supports concise and compact descriptions of models and to adapt the spatial resolution of models easily.
Mouheb, Djedjiga; Pourzandi, Makan; Wang, Lingyu; Nouh, Mariam; Ziarati, Raha; Alhadidi, Dima; Talhi, Chamseddine; Lima, Vitor
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The
Maulana, Ridwan; Opdenakker, Marie-Christine; Bosker, Roel
Research has shown that the teacher-student interpersonal relationship (TSIR) is important for student motivation. Although TSIR has received a growing interest, there are only few studies that focus on changes and links between TSIR and student academic motivation in a longitudinal fashion in non-Western contexts. This study investigated changes in TSIR and links with academic motivation as perceived by first-grade secondary school students in Indonesia. TSIR was studied from the perspective of interpersonal behaviour in terms of Influence and Proximity. Students' academic motivation was studied from the perspective of self-determination theory. A total of 504 first-grade secondary school students of 16 mathematics and English classes participated in the study. Surveys were administered in five waves throughout the school year. Multilevel growth curve modelling was applied. Contrary to the (limited) general research findings from Western contexts, we found that the quality of TSIR (student perceptions) increased over time. The increase was slightly more pronounced for Proximity than for Influence. In accordance with the findings for the Western countries, the level of students' controlled motivation increased, while that of autonomous motivation decreased over time. However, the negative change in autonomous motivation was less pronounced. As in Western countries, TSIR was longitudinally linked with academic motivation, in particular, with autonomous motivation. Evidence is found that TSIR can change in a favourable way, and this positively affects student motivation. Future research could benefit from unravelling the influences of cultures on changes in TSIR in broader contexts. © 2013 The British Psychological Society.
Full Text Available Objective: To explore the effect of a school-family-individual (SFI multi-level education intervention model on knowledge and attitudes about accidental injuries among school-aged children to improve injury prevention strategies and reduce the incidence of pediatric injuries. Methods: The random sample of rural school-aged children were recruited by using a multistage, stratified, cluster sampling method in Zunyi, Southwest China from 2012 to 2014, and 2342 children were randomly divided into intervention and control groups. Then children answered a baseline survey to collect knowledge and attitude scores (KAS of accidental injuries. In the intervention group, children, their parents/guardians and the school received a SFI multi-level education intervention, which included a children’s injury-prevention poster at schools, an open letter about security instruction for parents/guardians and multiple-media health education (Microsoft PowerPoint lectures, videos, handbooks, etc. to children. Children in the control group were given only handbook education. After 16 months, children answered a follow-up survey to collect data on accidental injury types and accidental injury-related KAS for comparing the intervention and control groups and baseline and follow-up data. Results: The distribution of gender was not significantly different while age was different between the baseline and follow-up survey. At baseline, the mean KAS was lower for the intervention than control group (15.37 ± 3.40 and 18.35 ± 5.01; p < 0.001. At follow-up, the mean KAS was higher for the intervention than control group (21.16 ± 3.05 and 20.02 ± 3.40; p < 0.001. The increase in KAS in the intervention and control groups was significant (p < 0.001; KAS: 5.79 vs. 1.67 and suggested that children’s injury-related KAS improved in the intervention group. Moreover, the KAS between the groups differed for most subtypes of incidental injuries (based on International
C-H, Huang; Wildish, T.; X, Zhang
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.
Huang C-H; Wildish, T; Zhang X
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.
Damman, O.C.; Stubbe, J.H.; Hendriks, M.; Arah, O.A.; Spreeuwenberg, P.; Delnoij, D.M.J.; Groenewegen, P.P.
Background: Ratings on the quality of healthcare from the consumer’s perspective need to be adjusted for consumer characteristics to ensure fair and accurate comparisons between healthcare providers or health plans. Although multilevel analysis is already considered an appropriate method for
Damman, O.C.; Stubbe, J.H.; Hendriks, M.; Arah, O.A.; Spreeuwenberg, P.; Delnoij, D.M.J.; Groenewegen, P.P.
Background: Ratings on the quality of healthcare from the consumer’s perspective need to be adjusted for consumer characteristics to ensure fair and accurate comparisons between healthcare providers or health plans. Although multilevel analysis is already considered an appropriate method for
Ramsey, Jase R.; Barakat, Livia L.; Aad, Amine Abi
Adopting a multilevel theoretical framework, we examined how metacognitive and motivational cultural intelligence influence an individual's commitment to the study of international business (IB). Data from 292 undergraduate and graduate business students nested in 12 U.S. business school classes demonstrated that individuals' metacognitive and…
Welch, Chiquitia L.; Roberts-Lewis, Amelia C.; Parker, Sharon
The rise in female delinquency has resulted in large numbers of girls being incarcerated in Youth Development Centers (YDC). However, there are few gender specific treatment programs for incarcerated female adolescent offenders, particularly for those with a history of substance dependency. In this article, we present a Multi-level Risk Model…
Hald, Sara Ligaard; Pedersen, Jens Myrup; Prasad, Neeli R.
for Compliance (SEC) model offers a lightweight alternative for use by decision makers to get a quick overview of the security attributes of different technologies for easy comparison and requirement compliance evaluation. The scientific contribution is this new approach to security modelling as well...
Chockalingam, S.; Pieters, W.; Herdeiro Teixeira, A.M.; van Gelder, P.H.A.J.M.; Lipmaa, Helger; Mitrokotsa, Aikaterini; Matulevicius, Raimundas
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these
Liu, Kai; Wang, Jiangbo; Yamamoto, Toshiyuki; Morikawa, Takayuki
Highlights: • The impacts of driving heterogeneity on EVs’ energy efficiency are examined. • Several multilevel mixed-effects regression models are proposed and compared. • The most reasonable nested structure is extracted from the long term GPS data. • Proposed model improves the energy estimation accuracy by 7.5%. - Abstract: To improve the accuracy of estimation of the energy consumption of electric vehicles (EVs) and to enable the alleviation of range anxiety through the introduction of EV charging stations at suitable locations for the near future, multilevel mixed-effects linear regression models were used in this study to estimate the actual energy efficiency of EVs. The impacts of the heterogeneity in driving behaviour among various road environments and traffic conditions on EV energy efficiency were extracted from long-term daily trip-based energy consumption data, which were collected over 12 months from 68 in-use EVs in Aichi Prefecture in Japan. Considering the variations in energy efficiency associated with different types of EV ownership, different external environments, and different driving habits, a two-level random intercept model, three two-level mixed-effects models, and two three-level mixed-effects models were developed and compared. The most reasonable nesting structure was determined by comparing the models, which were designed with different nesting structures and different random variance component specifications, thereby revealing the potential correlations and non-constant variability of the energy consumption per kilometre (ECPK) and improving the estimation accuracy by 7.5%.
Abbas, R.; Farooq, A.
Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. It has many service modes like Software as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS). In SaaS model, service providers install and activate the applications in cloud and cloud customers access the software from cloud. So, the user does not have the need to purchase and install a particular software on his/her machine. While using SaaS model, there are multiple security issues and problems like Data security, Data breaches, Network security, Authentication and authorization, Data integrity, Availability, Web application security and Backup which are faced by users. Many researchers minimize these security problems by putting in hard work. A large work has been done to resolve these problems but there are a lot of issues that persist and need to overcome. In this research work, we have developed a security model that improves the security of data according to the desire of the End-user. The proposed model for different data security options can be helpful to increase the data security through which trade-off between functionalities can be optimized for private and public data. (author)
Yu, Yijun; Kaiya, Haruhiko; Washizaki, Hironori; Xiong, Yingfei; Hu, Zhenjiang; Yoshioka, Nobukazu
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order to facilitate early detection and resolution of security problems, in this paper, we formally describe a role-based access control (RBAC) as a pattern that may occur in stakeholder requirements models. We also implemented in our goal-oriented modeling tool the formally described pattern using model-driven queries and ...
Niu, Jingyu; Hu, Jian; He, Wenjing; Meng, Fanrong; Li, Chuanrong
Currently, the design of embedded signal processing system is often based on a specific application, but this idea is not conducive to the rapid development of signal processing technology. In this paper, a parallel processing model architecture based on multi-core DSP platform is designed, and it is mainly suitable for the complex algorithms which are composed of different modules. This model combines the ideas of multi-level pipeline parallelism and message passing, and summarizes the advantages of the mainstream model of multi-core DSP (the Master-Slave model and the Data Flow model), so that it has better performance. This paper uses three-dimensional image generation algorithm to validate the efficiency of the proposed model by comparing with the effectiveness of the Master-Slave and the Data Flow model.
Correia, Anacleto; Gonçalves, António; Teodoro, M. Filomena
The availability, integrity and confidentiality of information are fundamental to the long-term survival of any organization. Information security is a complex issue that must be holistically approached, combining assets that support corporate systems, in an extended network of business partners, vendors, customers and other stakeholders. This paper addresses the conception and implementation of information security systems, conform the ISO/IEC 27000 set of standards, using the model-driven approach. The process begins with the conception of a domain level model (computation independent model) based on information security vocabulary present in the ISO/IEC 27001 standard. Based on this model, after embedding in the model mandatory rules for attaining ISO/IEC 27001 conformance, a platform independent model is derived. Finally, a platform specific model serves the base for testing the compliance of information security systems with the ISO/IEC 27000 set of standards.
Baek, Eun Kyeng; Ferron, John M
Multilevel models (MLM) have been used as a method for analyzing multiple-baseline single-case data. However, some concerns can be raised because the models that have been used assume that the Level-1 error covariance matrix is the same for all participants. The purpose of this study was to extend the application of MLM of single-case data in order to accommodate across-participant variation in the Level-1 residual variance and autocorrelation. This more general model was then used in the analysis of single-case data sets to illustrate the method, to estimate the degree to which the autocorrelation and residual variances differed across participants, and to examine whether inferences about treatment effects were sensitive to whether or not the Level-1 error covariance matrix was allowed to vary across participants. The results from the analyses of five published studies showed that when the Level-1 error covariance matrix was allowed to vary across participants, some relatively large differences in autocorrelation estimates and error variance estimates emerged. The changes in modeling the variance structure did not change the conclusions about which fixed effects were statistically significant in most of the studies, but there was one exception. The fit indices did not consistently support selecting either the more complex covariance structure, which allowed the covariance parameters to vary across participants, or the simpler covariance structure. Given the uncertainty in model specification that may arise when modeling single-case data, researchers should consider conducting sensitivity analyses to examine the degree to which their conclusions are sensitive to modeling choices.
Zhang, Xinxin; Lind, Morten; Ravn, Ole
For complex engineering systems, there is an increasing demand forsafety and reliability. Decision support system (DSS) is designed to offersupervision and analysis about operational situations. A proper modelrepresentation is required for DSS to understand the process knowledge.Multilevel flow...... available techniques of MFM reasoning and less matureyet relevant MFM concepts are considered. It also offers an architecture designof task organisation for MFM software tools by using the concept of agent andtechnology of multiagent software system...
This working paper contributes to a collective discussion in a workshop occurring in January 2011 at the International Institute of Social Studies, bringing scholars from Europe and Brazil and aiming inter-university research collaboration on linking policies on social responsibility to development and equity. The paper serves as an introductory discussion for reframing the concept of corporate social responsibility into a broader umbrella concept of multi-actor and multilevel social responsi...
Tunia, Marcin A.
Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.
Full text: Nuclear security culture found its way into professional parlance several years ago, but still lacks an agreed-upon definition and description. The February 2005 U.S.-Russian Joint Statement, issued at the presidential summit meeting in Bratislava, referred specifically to security culture, focusing renewed attention on the concept. Numerous speakers at the March 2005 International Atomic Energy Agency's (IAEA) international conference on nuclear security referred to security culture, but their visions and interpretations were often at odds with one another. Clearly, there is a need for a generic model of nuclear security culture with universal applicability. Internationally acceptable standards in this area would be invaluable for evaluation, comparison, cooperation, and assistance. They would also help international bodies better manage their relations with the nuclear sectors in various countries. This paper will develop such a model. It will use the IAEA definition of nuclear security, and then apply Edgar Schein's model of organizational culture to security culture at a generic nuclear facility. A cultural approach to physical protection involves determining what attitudes and beliefs need to be established in an organization, how these attitudes and beliefs manifest themselves in the behavior of assigned personnel, and how desirable attitudes and beliefs can be transcribed into formal working methods to produce good outcomes, i.e., effective protection. The security-culture mechanism I will propose is broken into four major units: facility leadership, proactive policies and procedures, personnel performance, and learning and professional improvement. The paper will amplify on the specific traits characteristic of each of these units. Security culture is not a panacea. In a time of mounting terrorist threats, it should nonetheless be looked upon as a necessary organizational tool that enhances the skills of nuclear personnel and ensures that
Mihail N. Dudin
Full Text Available The leading countries of the world consider food security the important condition of internal political and social-economic stability of the state and its external independence. The topic of the article is crucial due to the fact that the problem of food security is rather complicated and multilevel and should be considered at different interrelated hierarchical levels. In this context the efficient model of food security is the result of the permanent dialogue between the representatives of the state government, business entities, social organizations and scientific institutions. The article justifies the fact that the model of innovation development, known as ‘the triple helix model’ should be applied at the modern stage of economic development as an efficient tool for the food security provision, which can be implemented in the activity of regional economic entities and the whole economic system of the Russian Federation.
L. A. Zaporozhtseva
Full Text Available Article explains the necessity the application of the ontological approach to modeling the strategic economic security in the formalization of the basic categories of domain company recognized its benefits. Among the advantages of the model distinguishes its versatility and ability to describe various aspects of strategic security - the system strategies and goals of the organization and business processes; possibility of its use at different levels of detail - from the top-level description of the basic categories of management, to design-level analytic applications; as well as the adaptability of the model, with depth on particular aspects determined by practical necessity and not regulated methodology. The model integrates various aspects of the concept of enterprise architecture and organizes conceptual apparatus. Ontological model easy to understand and adjust as business architects and specialists in designing systems of economic security and offers many categories of verbal representation of the domain of the enterprise. Proved the feasibility of using process-functional approach in providing strategic economic security, according to which the components of such a security company proposed as business processes, finance, staff and contractors. The article presents the author's ontological model of strategic economic security, including endangered sites, the presence of factors that threaten the security of the object and the subject of providing security. Further, it is proved that in the subjects of security impact on the object using the tools, measures and activities within the strategy formed the mechanism is implemented managerial decisions to strengthen the strategic economic security. The process of diagnosis, detection, identification of threats of economic security, and the development of enterprise development strategies, taking into account its level of economic security must be under the constant supervision of the process of
Full Text Available Information and collaboration patterns embedded in social networks play key roles in multilevel and polycentric modes of governance. However, modeling the dynamics of such social networks in multilevel settings has been seldom addressed in the literature. Here we use an adaptive social network model to elaborate the interplay between a central and a local government in order to maintain a polycentric governance. More specifically, our analysis explores in what ways specific policy choices made by a central agent affect the features of an emerging social network composed of local organizations and local users. Using two types of stylized policies, adaptive co-management and adaptive one-level management, we focus on the benefits of multi-level adaptive cooperation for network management. Our analysis uses viability theory to explore and to quantify the ability of these policies to achieve specific network properties. Viability theory gives the family of policies that enables maintaining the polycentric governance unlike optimal control that gives a unique blueprint. We found that the viability of the policies can change dramatically depending on the goals and features of the social network. For some social networks, we also found a very large difference between the viability of the adaptive one-level management and adaptive co-management policies. However, results also show that adaptive co-management doesn’t always provide benefits. Hence, we argue that applying viability theory to governance networks can help policy design by analyzing the trade-off between the costs of adaptive co-management and the benefits associated with its ability to maintain desirable social network properties in a polycentric governance framework.
Isaac Figueiredo de Sousa
This work aims to build models using econometrics techniques to explain the components of the balance of Social Security System, or in other words, the net value of tax revenues and the benefit values of the General Regime of Social Security. These models were subjected to statistic validations indicated in the theoretical reference of econometrics, to apply the method of ordinary least square from the classic model of linear regression. From an increasing longevity and the gradual decr...
Zhang, Xinghui; Xuan, Xin; Chen, Fumei; Zhang, Cai; Luo, Yuhan; Wang, Yun
Perceptions of school safety have an important effect on students' development. Based on the model of "context-process-outcomes," we examined school safety as a context variable to explore how school safety at the school level affected students' self-esteem. We used hierarchical linear modeling to examine the link between school safety at the school level and students' self-esteem, including school liking as a mediator. The data were from the National Children's Study of China (NCSC), in which 6618 fourth- to fifth-grade students in 79 schools were recruited from 100 counties in 31 provinces in China. Multilevel mediation analyses showed that the positive relationship between school safety at the school level and self-esteem was partially mediated by school liking, controlling for demographics at both student and school levels. Furthermore, a sex difference existed in the multilevel mediation model. For boys, school liking fully mediated the relationship between school safety at the school level and self-esteem. However, school liking partially mediated the relationship between school safety at the school level and self-esteem among girls. School safety should receive increasing attention from policymakers because of its impact on students' self-esteem. © 2016, American School Health Association.
Browne, William J; Steele, Fiona; Golalizadeh, Mousa; Green, Martin J
We consider the application of Markov chain Monte Carlo (MCMC) estimation methods to random-effects models and in particular the family of discrete time survival models. Survival models can be used in many situations in the medical and social sciences and we illustrate their use through two examples that differ in terms of both substantive area and data structure. A multilevel discrete time survival analysis involves expanding the data set so that the model can be cast as a standard multilevel binary response model. For such models it has been shown that MCMC methods have advantages in terms of reducing estimate bias. However, the data expansion results in very large data sets for which MCMC estimation is often slow and can produce chains that exhibit poor mixing. Any way of improving the mixing will result in both speeding up the methods and more confidence in the estimates that are produced. The MCMC methodological literature is full of alternative algorithms designed to improve mixing of chains and we describe three reparameterization techniques that are easy to implement in available software. We consider two examples of multilevel survival analysis: incidence of mastitis in dairy cattle and contraceptive use dynamics in Indonesia. For each application we show where the reparameterization techniques can be used and assess their performance.
Full Text Available In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.
N. Elisov Lev
Full Text Available The paper presents a mathematical formulation of the problem formalization of the subject area related to aviation security in civil aviation. The formalization task is determined by the modern issue of providing aviation security. Aviationsecurity in modern systems is based upon organizational standard of security control. This standard doesn’t require calcu- lating the security level. It allows solving the aviation security task without estimating the solution and evaluating the per- formance of security facilities. The issue of acceptable aviation security level stays unsolved, because its control lies in inspections that determine whether the object security facilities meet the requirements or not. The pending problem is also in whether the requirements are calculable and the evaluation is subjective.Lately, there has been determined quite a certain tendency to consider aviation security issues from the perspective of its level optimal control with the following identification, calculation and evaluation problems solving and decision mak- ing. The obtained results analysis in this direction shows that it’s strongly recommended to move to object formalization problem, which provides a mathematical modeling for aviation security control optimization.In this case, the authors assume to find the answer in the process of object formalization. Therefore aviation secu- rity is presented as some security environment condition, which defines the parameters associated with the object protec-tion system quality that depends on the use of protective equipment in conditions of counteraction to factors of external andinternal threats. It is shown that the proposed model belongs to a class of boundary value problems described by differential equations in partial derivatives. The classification of boundary value problems is presented.
Lewis Jordon; Richard F. Daniels; Alexander Clark; Rechun He
Earlywood and latewood microfibril angle (MFA) was determined at I-millimeter intervals from disks at 1.4 meters, then at 3-meter intervals to a height of 13.7 meters, from 18 loblolly pine (Pinus taeda L.) trees grown in southeastern Texas. A modified three-parameter logistic function with mixed effects is used for modeling earlywood and latewood...
law , constitutional powers, environmental regulations, and civil rights, http://tpplegal.files.wordpress.com/2012/05/isds-domestic-legal-process...Violation NAFTA North American Free Trade Agreement NII Non-Intrusive Inspection POE Port of Entry PPD-8 Presidential Policy Directive 8...security measured? What constitutes a measure of effectiveness for protection? These are all questions presented to representatives of the Department of
Markandya, Anil [Basque Centre for Climate Change (Spain); University of Bath (United Kingdom); Pemberton, Malcolm [University College London (United Kingdom)
The paper develops a framework to analyze energy security in an expected utility framework, where there is a risk of disruption of imported energy. The analysis shows the importance of an energy tax as a tool in maximizing expected utility, and how the level of that tax varies according to the key parameters of the system: risk aversion, probability of disruption, demand elasticity and cost of disruption. (author)
Markandya, Anil; Pemberton, Malcolm
The paper develops a framework to analyze energy security in an expected utility framework, where there is a risk of disruption of imported energy. The analysis shows the importance of an energy tax as a tool in maximizing expected utility, and how the level of that tax varies according to the key parameters of the system: risk aversion, probability of disruption, demand elasticity and cost of disruption. (author)
Choi, Sunha; Lee, Sungkyu; Matejkowski, Jason
This study aimed to examine how states' Medicaid expansion affected insurance status and access to health care among low-income expansion state residents in 2015, the second year of the expansion. Data from the 2012 and 2015 Behavioral Risk Factor Surveillance System were linked to state-level data. A nationally representative sample of 544,307 adults (ages 26-64 years) from 50 states and Washington, DC were analyzed using multilevel modeling. The results indicate substantial increases in health care access between 2012 and 2015 among low-income adults in Medicaid expansion states. The final conditional multilevel models with low-income adults who had income at or below 138% of the poverty line indicate that, after controlling for individual- and state-level covariates, those who resided in the Medicaid expansion states were more likely to have health insurance (OR = 1.97, P income residents in non-expansion states in 2015. Moreover, the significant interaction terms indicate that adults living in non-expansion states with income below 100% of the poverty line are the most vulnerable compared with their counterparts in expansion states and with those with income between 100%-138% of the poverty line. This study demonstrates that state-level Medicaid expansion improved health care access among low-income US residents. However, residents with income below 100% of the poverty line in non-expansion states were disproportionately negatively affected by states' decision to not expand Medicaid coverage.
Hank, Karsten; Erlinghagen, Marcel
Using data from the 2004 Survey of Health, Ageing and Retirement in Europe, this paper investigates older workers' perceptions of job security in eleven countries. We describe cross-national patterns and estimate multilevel models to analyse individual and societal determinants of self-perceived job security in the older labour force. While there…
Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming
, we identify an important gap in the specification on key updates, and present a methodology for determining optimal key update policies and security parameters. We exploit the stochastic model checking approach using the probabilistic model checker PRISM, and assess the security needs for realistic......ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report...
previously proposed certificateless signature schemes were insecure under a considerably strong security model in the sense that they suffered from outsiders’ key replacement attacks or the attacks from the key generation center (KGC. In this paper, we propose a certificateless signature scheme without random oracles. Moreover, our scheme is secure under the strong security model and provides a public revocation mechanism, called revocable certificateless signature (RCLS. Under the standard computational Diffie-Hellman assumption, we formally demonstrate that our scheme possesses existential unforgeability against adaptive chosen-message attacks.
Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.
Chagovets, L. О.; Nevezhin, V. P.; Zakharova, О. V.
The article deals with econometric modeling of economic security. The model of evaluating transaction costs effect on the level of enterprise economic security is provided. The econometric models of evaluating economic security that are used in research are based on panel data. According to the results, the reserves for increasing the general level of economic security due to transaction costs reduction are revealed. Розглянуто питання економетричного моделювання економічної безпеки. Предс...
Cheng, Cecilia; Cheung, Mike W-L; Montasem, Alex
This multinational study simultaneously tested three prominent hypotheses--universal disposition, cultural relativity, and livability--that explained differences in subjective well-being across nations. We performed multilevel structural equation modeling to examine the hypothesized relationships at both individual and cultural levels in 33 nations. Participants were 6,753 university students (2,215 men; 4,403 women; 135 did not specify), and the average age of the entire sample was 20.97 years (SD = 2.39). Both individual- and cultural-level analyses supported the universal disposition and cultural relativity hypotheses by revealing significant associations of subjective well-being with Extraversion, Neuroticism, and independent self-construal. In addition, interdependent self-construal was positively related to life satisfaction at the individual level only, whereas aggregated negative affect was positively linked with aggregate levels of Extraversion and interdependent self-construal at the cultural level only. Consistent with the livability hypothesis, gross national income (GNI) was related to aggregate levels of negative affect and life satisfaction. There was also a quadratic relationship between GNI and aggregated positive affect. Our findings reveal that universal disposition, cultural self-construal, and national income can elucidate differences in subjective well-being, but the multilevel analyses advance the literature by yielding new findings that cannot be identified in studies using individual-level analyses alone. © 2014 Wiley Periodicals, Inc.
Patricia A.H. Williams
Full Text Available Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security. In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing research into how to meet governance requirements. The limited research that exists describes information security governance frameworks at a strategic level. However, since medical practice is already lagging in the implementation of appropriate security, such definition may not be practical although it is obviously desirable. This paper describes an on-going action research project undertaken in the area of medical information security, and presents a tactical approach model aimed at addressing information security governance and the protection of medical data.
The Space Station contains safety critical computer software components in systems that can affect life and vital property. These components require a multilevel secure system that provides dynamic access control of the data and processes involved. A study is under way to define requirements for a security model providing access control through level B3 of the Orange Book. The model will be prototyped at NASA-Johnson Space Center.
Liu Yachun; Zou Shuliang; Yang Xiaohua; Ouyang Zigen; Dai Jianyong
In the field of nuclear safety, traditional work places extra emphasis on risk assessment related to technical skills, production operations, accident consequences through deterministic or probabilistic analysis, and on the basis of which risk management and control are implemented. However, high quality of product does not necessarily mean good safety quality, which implies a predictable degree of uniformity and dependability suited to the specific security needs. In this paper, we make use of the system security engineering - capability maturity model (SSE-CMM) in the field of spent fuel reprocessing, establish a spent fuel reprocessing systems security engineering capability maturity model (SFR-SSE-CMM). The base practices in the model are collected from the materials of the practice of the nuclear safety engineering, which represent the best security implementation activities, reflect the regular and basic work of the implementation of the security engineering in the spent fuel reprocessing plant, the general practices reveal the management, measurement and institutional characteristics of all process activities. The basic principles that should be followed in the course of implementation of safety engineering activities are indicated from 'what' and 'how' aspects. The model provides a standardized framework and evaluation system for the safety engineering of the spent fuel reprocessing system. As a supplement to traditional methods, this new assessment technique with property of repeatability and predictability with respect to cost, procedure and quality control, can make or improve the activities of security engineering to become a serial of mature, measurable and standard activities. (author)
Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.
and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...
Lüdtke, Oliver; Marsh, Herbert W; Robitzsch, Alexander; Trautwein, Ulrich
In multilevel modeling, group-level variables (L2) for assessing contextual effects are frequently generated by aggregating variables from a lower level (L1). A major problem of contextual analyses in the social sciences is that there is no error-free measurement of constructs. In the present article, 2 types of error occurring in multilevel data when estimating contextual effects are distinguished: unreliability that is due to measurement error and unreliability that is due to sampling error. The fact that studies may or may not correct for these 2 types of error can be translated into a 2 × 2 taxonomy of multilevel latent contextual models comprising 4 approaches: an uncorrected approach, partial correction approaches correcting for either measurement or sampling error (but not both), and a full correction approach that adjusts for both sources of error. It is shown mathematically and with simulated data that the uncorrected and partial correction approaches can result in substantially biased estimates of contextual effects, depending on the number of L1 individuals per group, the number of groups, the intraclass correlation, the number of indicators, and the size of the factor loadings. However, the simulation study also shows that partial correction approaches can outperform full correction approaches when the data provide only limited information in terms of the L2 construct (i.e., small number of groups, low intraclass correlation). A real-data application from educational psychology is used to illustrate the different approaches.
Cheyne, Alistair; Tomás, José M; Oliver, Amparo
This study examines the relationships between components of organizational safety climate, including employee attitudes to organizational safety issues; perceptions of the physical working environment, and evaluations of worker engagement with safety issues; and relates these to self-reported levels of safety behavior. It attempts to explore the relationships between these variables in 1189 workers across 78 work groups in a large transportation organization. Evaluations of safety climate, the working environment and worker engagement, as well as safe behaviors, were collected using a self report questionnaire. The multilevel analysis showed that both levels of evaluation (the work group and the individual), and some cross-level interactions, were significant in explaining safe behaviors. Analyses revealed that a number of variables, at both levels, were associated with worker engagement and safe behaviors. The results suggest that, while individual evaluations of safety issues are important, there is also a role for the fostering of collective safety climates in encouraging safe behaviors and therefore reducing accidents.
Herrero Olaizola, Juan; Rodríguez Díaz, Francisco Javier; Musitu Ochoa, Gonzalo
The literature has rarely paid attention to the differential influence of intergroup contact on subtle and blatant prejudice. In this study, we hypothesized that the influence of intergroup contact on subtle prejudice will be smaller than its influence on blatant prejudice. This hypothesis was tested with data from a cross-sectional design on 1,655 school-aged native Spanish adolescents. Prejudice was measured with a shortened version of the Meertens and Pettigrew scale of blatant and subtle prejudice adapted to Spanish adolescent population. Results from multivariate multilevel analyses for correlated outcome variables supported the hypothesis. Students tended to score higher on the subtle prejudice scale; contact with the outgroup was statistically related both to levels of blatant and subtle prejudice; and, the negative relationship of contact with the outgroup and prejudice is greater for blatant prejudice as compared to subtle prejudice. Overall, results provide statistical evidence supporting the greater resistance to change of subtle forms of prejudice.
I. A. Zikratov
Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.
Full Text Available Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these devices are induced by design shortcomings and vulnerabilities related to user behavior. Therefore, deploying suitable risk treatments requires the investigation of how security experts perceive the digital natives (young people, born in the digital era, when utilizing their user behavior models in the design and analysis of related systems. In this article, we present the results of a survey performed across a multinational sample of security professionals, in comparison to our earlier study over the security awareness of digital natives. Through this study, we seek to identify divergences between user behavior and the conceptual user-models that security experts utilise in their professional tasks. Our results indicate that the experts understanding over the user behaviour does not follow a solidified user-model, while influences from personal perceptions and randomness are also noticeable.
Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan
Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.
Full Text Available Background:Obesity and hypertension are the most important non-communicable diseases thatin many studies, the prevalence and their risk factors have been performedin each geographic region univariately.Study of factors affecting both obesity and hypertension may have an important role which to be adrressed in this study. Materials &Methods:This cross-sectional study was conducted on 1000 men aged 20-70 living in Bushehr province. Blood pressure was measured three times and the average of them was considered as one of the response variables. Hypertension was defined as systolic blood pressure ≥140 (and-or diastolic blood pressure ≥90 and obesity was defined as body mass index ≥25. Data was analyzed by using multilevel, multivariate logistic regression model by MlwiNsoftware. Results:Intra class correlations in cluster level obtained 33% for high blood pressure and 37% for obesity, so two level model was fitted to data. The prevalence of obesity and hypertension obtained 43.6% (0.95%CI; 40.6-46.5, 29.4% (0.95%CI; 26.6-32.1 respectively. Age, gender, smoking, hyperlipidemia, diabetes, fruit and vegetable consumption and physical activity were the factors affecting blood pressure (p≤0.05. Age, gender, hyperlipidemia, diabetes, fruit and vegetable consumption, physical activity and place of residence are effective on obesity (p≤0.05. Conclusion: The multilevel models with considering levels distribution provide more precise estimates. As regards obesity and hypertension are the major risk factors for cardiovascular disease, by knowing the high-risk groups we can d careful planning to prevention of non-communicable diseases and promotion of society health.
Ruff, Ryan Richard; Akhund, Ali; Adjoian, Tamar
Local food environments can influence the diet and health of individuals through food availability, proximity to retail stores, pricing, and promotion. This study focused on how small convenience stores, known in New York City as bodegas, influence resident shopping behavior and the food environment. Using a cross-sectional design, 171 bodegas and 2118 shoppers were sampled. Small convenience stores in New York City. Any bodega shopper aged 18+ who purchased food or beverage from a participating store. Data collection consisted of a store assessment, a health and behavior survey given to exiting customers, and a bag check that recorded product information for all customer purchases. Descriptive statistics were generated for bodega store characteristics, shopper demographics, and purchase behavior. Multilevel models were used to assess the influence of product availability, placement, and advertising on consumer purchases of sugar-sweetened beverages (SSBs), water, and fruits and vegetables. Seventy-one percent of participants reported shopping at bodegas five or more times per week, and 35% reported purchasing all or most of their monthly food allotment at bodegas. Model results indicated that lower amounts of available fresh produce were significantly and independently associated with a higher likelihood of SSB purchases. A second, stratified multilevel model showed that the likelihood of purchasing an SSB increased with decreasing varieties of produce when produce was located at the front of the store. No significant effects were found for water placement and beverage advertising. Small convenience stores in New York City are an easily accessible source of foods and beverages. Bodegas may be suitable for interventions designed to improve food choice and diet.
Sang Hoon Kim
Full Text Available The authors found the behavioral factors that influence the organization members’ compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members’ attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1 the study is expected to play a role of the baseline for future research about organization members’ compliance with the information security policy, (2 the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3 the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training
Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung
The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing
Lindberg, Kasper; Jensen, Christian D.
Wiki systems form a subclass of the more general Open Collaborative Authoring Systems, where content is created by a user community. The ability of anyone to edit the content is, at the same time, their strength and their weakness. Anyone can write documents that improve the value of the wiki-system......, but this also means that anyone can introduce errors into documents, either by accident or on purpose. A security model for wiki-style authoring systems, called the Secure Wiki Model, has previously been proposed to address this problem. This model is designed to prevent corruption of good quality documents......, by limiting updates, to such documents, to users who have demonstrated their ability to produce documents of similar or better quality. While this security model prevents all user from editing all documents, it does respect the wiki philosophy by allowing any author who has produced documents of a certain...
Wei, Huaqiang; Alves-Foss, James; Soule, Terry; Pforsich, Hugh; Zhang, Du; Frincke, Deborah A.
System security involves decisions in at least three areas: identification of well-defined security policies, selection of cost-effective defence strategies, and implementation of real-time defence tactics. Although choices made in each of these areas affect the others, existing decision models typically handle these three decision areas in isolation. There is no comprehensive tool that can integrate them to provide a single efficient model for safeguarding a network. In addition, there is no clear way to determine which particular combinations of defence decisions result in cost-effective solutions. To address these problems, this paper introduces a Layered Decision Model (LDM) for use in deciding how to address defence decisions based on their cost-effectiveness. To validate the LDM and illustrate how it is used, we used simulation to test model rationality and applied the LDM to the design of system security for an e-commercial business case.
Ramasamy, Vijayalakshmi; Sheen, Shina; Veeramani, C; Bonato, Anthony; Batten, Lynn
This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 – 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas.
Full Text Available Transmission demand continues to grow and higher capacity optical communication systems are required to economically meet this ever-increasing need for communication services. This article expands and deepens the study of a novel optical communication system for high-capacity Local Area Networks (LANs, based on twisted optical fibers. The complete statistical behavior of this system is shown, designed for more efficient use of the fiber single-channel capacity by adopting an unconventional multilevel polarization modulation (called “bands of polarization”. Starting from simulative results, a possible reference mathematical model is proposed. Finally, the system performance is analyzed in the presence of shot-noise (coherent detection or thermal noise (direct detection.
Zhang, Yi; Wang, Huai; Wang, Zhongxu
and electrical power modeling methods on the estimated lifetime of IGBT modules in an MMC for offshore wind power application. In a 30 MW MMC case study, an annual wind speed profile with a resolution of 1 s/data, 10 minute/data, and 1 hour/data are considered, respectively. A method to re-generate higher......The reliability aspect study of Modular Multilevel Converter (MMC) is of great interest in industry applications, such as offshore wind. Lifetime prediction of key components is an important tool to design MMC with fulfilled reliability specifications. While many efforts have been made...... to the lifetime prediction of IGBT modules in renewable energy applications by considering long-term varying operation conditions (i.e., mission profile), the justifications of using the associated mission profiles are still missed. This paper investigates the impact of mission profile data resolutions...
Zhang Jiande; Yang Ming; Zhang Zhijian
An alarm analysis system based on Multi-level Flow Models (MFM) was developed for a PWR NPP. By automatically identifying the primary root causes in complex fault situations, the workload of the operators can be reduced. In addition, because MFM also provides a set of graphical symbols that implies causalities, operators can confirm diagnosis results by semiotic analysis, and hence the understandability of the process of alarm analysis as well as the reliability of maintenance task can be increased. 19 cases of simulation data from RELAP5/MOD2 code were utilized for evaluating the performance of the proposed system. The simulation results show that the proposed alarm analysis system has a good ability to detect and diagnose accidents earlier in time before reactor trip. (authors)
Full Text Available The purpose of this research work is to evaluate the effects which some factors could have on articles publication regarding survey interviewer characteristics. For this, the author studied the existing literature from the various fields in which articles on survey interviewer characteristics has been published and which can be found in online articles database. The analysis was performed on 243 articles achieved by researchers in the time period 1949-2012. Using statistical software R and applying multilevel regression model, the results showed that the time period when the studied articles are made and the interaction between the number of authors and the number of pages affect the most their publication in journals with a certain level of impact factor.
Baptista, Filipa Matos; Dahl, Jan; Nielsen, Liza Rosenbaum
In Denmark, a Surveillance-and-Control Programme for Salmonella in pigs has been in place for several years. This study investigated factors associated with Salmonella pig carcass contamination, namely estimated daily number of Salmonella seropositive pigs delivered to slaughter, average Salmonella...... seroprevalence of the source herds that delivered each of five pigs contributing to the pool, weekday, year, season and abattoir size. A total of 20128 pooled carcass swabs collected in 22 Danish abattoirs, from 2002 to 2008, were included in a multilevel logistic regression model. Study results indicate...... that the probability of Salmonella positive carcasses is mainly influenced by the Salmonella herd seroprevalence of the swabbed pigs, the number of seropositive pigs delivered to the abattoir on the same day and weekday. Further reduction in carcass pool Salmonella prevalence may require new or improved methods...
Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K
The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.
Iskandar Maratovich Azhmuhamedov
Full Text Available It is proposed the model, which takes into account the main features of the integrated system of information security: weak structure, bad formal description, fuzzy description of the status of system components and the relationships between them. Adequacy of the model is tested on the example of Astrakhan State Technical University.
Full Text Available Olatunde Aremu School of Health, Sport, and Bioscience, Health Studies Field, University of East London, London, United Kingdom Background: Contraceptives are one of the most cost effective public health interventions. An understanding of the factors influencing users' preferences for contraceptives sources, in addition to their preferred methods of contraception, is an important factor in increasing contraceptive uptake. This study investigates the effect of women’s contextual and individual socioeconomic positions on their preference for contraceptive sources among current users in Nigeria. Methods: A multilevel modeling analysis was conducted using the most recent 2008 Nigerian Demographic and Health Surveys data of women aged between 15 and 49 years old. The analysis included 1,834 ever married women from 888 communities across the 36 states of the federation, including the Federal Capital Territory of Abuja. Three outcome variables, private, public, and informal provisions of contraceptive sources, were considered in the modeling. Results: There was variability in women's preferences for providers across communities. The result shows that change in variance accounted for about 31% and 19% in the odds of women's preferences for both private and public providers across communities. Younger age and being from the richest households are strongly associated with preference for both private and public providers. Living in rural areas and economically deprived neighborhoods were the community level determinants of women's preferences. Conclusion: This study documents the independent association of contextual socioeconomic characteristics and individual level socioeconomic factors with women's preferences for contraceptive commodity providers in Nigeria. Initiatives that seek to improve modern contraceptive uptake should jointly consider users’ preferences for sources of these commodities in addition to their preference for contraceptive type
Mervis, Carolyn B.; Kistler, Doris J.; John, Angela E.; Morris, Colleen A.
Multilevel modeling was used to address the longitudinal stability of standard scores (SSs) measuring intellectual ability for children with Williams syndrome (WS). Participants were 40 children with genetically confirmed WS who completed the Kaufman Brief Intelligence Test--Second Edition (KBIT-2; A. S. Kaufman & N. L. Kaufman, 2004) 4-7…
Marsh, Herbert W.; Kong, Chit-Kwong; Hau, Kit-Tai
Longitudinal multilevel path models (7,997 students, 44 high schools, 4 years) evaluated the effects of school-average achievement and perceived school status on academic self-concept in Hong Kong, a collectivist culture with a highly achievement-segregated high school system. Consistent with a priori predictions based on the big-fish-little-pond…
Gkolia, Aikaterini; Koustelios, Athanasios; Belias, Dimitrios
The main aim of this study is to examine the effect of principals' transformational leadership on teachers' self-efficacy across 77 different Greek elementary and secondary schools based on a centralized education system. For the investigation of the above effect multilevel Structural Equation Modelling analysis was conducted, recognizing the…
Alexey A. A. Magazev
Full Text Available In this work, a model for computer system security threats formulated in terms of Markov processes is investigated. In the framework of this model the functioning of the computer system is considered as a sequence of failures and recovery actions which appear as results of information security threats acting on the system. We provide a detailed description of the model: the explicit analytical formulas for the probabilities of computer system states at any arbitrary moment of time are derived, some limiting cases are discussed, and the long-run dynamics of the system is analysed. The dependence of the security state probability (i.e. the state for which threats are absent on the probabilities of threats is separately investigated. In particular, it is shown that this dependence is qualitatively different for odd and even moments of time. For instance, in the case of one threat the security state probability demonstrates non-monotonic dependence on the probability of threat at even moments of time; this function admits at least one local minimum in its domain of definition. It is believed that the mentioned feature is important because it allows to locate the most dangerous areas of threats where the security state probability can be lower then the permissible level. Finally, we introduce an important characteristic of the model, called the relaxation time, by means of which we construct the permitting domain of the security parameters. Also the prospects of the received results application to the problem of finding the optimal values of the security parameters is discussed.
PhEDEx. the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model was designed to provide a safe working environment for site agents and operators, but provided little more protection than that. CMS data was not sufficiently protected against accidental loss caused by operator error or software bugs or from loss of data caused by deliberate manipulation of the database. Operations staff were given high levels of access to the database, beyond what should have been needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time.In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and r...
Koch, J. A.; Tang, W.; Meentemeyer, R. K.
The FUTure Urban-Regional Environment Simulation (FUTURES) integrates information on nonstationary drivers of land change (per capita land area demand, site suitability, and spatial structure of conversion events) into spatial-temporal projections of changes in landscape patterns (Meentemeyer et al., 2013). One striking feature of FUTURES is its patch-growth algorithm that includes feedback effects of former development events across several temporal and spatial scales: cell-level transition events are aggregated into patches of land change and their further growth is based on empirically derived parameters controlling its size, shape, and dispersion. Here, we augment the FUTURES modeling framework by expanding its multilevel structure and its representation of human decision making. The new modeling framework is hierarchically organized as nested subsystems including the latest theory on telecouplings in coupled human-natural systems (Liu et al., 2013). Each subsystem represents a specific level of spatial scale and embraces agents that have decision making authority at a particular level. The subsystems are characterized with regard to their spatial representation and are connected via flows of information (e.g. regulations and policies) or material (e.g. population migration). To provide a modeling framework that is applicable to a wide range of settings and geographical regions and to keep it computationally manageable, we implement a 'zooming factor' that allows to enable or disable subsystems (and hence the represented processes), based on the extent of the study region. The implementation of the FUTURES modeling framework for a specific case study follows the observational modeling approach described in Grimm et al. (2005), starting from the analysis of empirical data in order to capture the processes relevant for specific scales and to allow a rigorous calibration and validation of the model application. In this paper, we give an introduction to the basic
Troelsen, Jens; Klinker, Charlotte Demant; Breum, Lars
Settings for Physical Activity – Developing a Site-specific Physical Activity Behavior Model based on Multi-level Intervention Studies Introduction: Ecological models of health behavior have potential as theoretical framework to comprehend the multiple levels of factors influencing physical...... to be taken into consideration. A theoretical implication of this finding is to develop a site-specific physical activity behavior model adding a layered structure to the ecological model representing the determinants related to the specific site. Support: This study was supported by TrygFonden, Realdania...... activity (PA). The potential is shown by the fact that there has been a dramatic increase in application of ecological models in research and practice. One proposed core principle is that an ecological model is most powerful if the model is behavior-specific. However, based on multi-level interventions...
Full Text Available Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.
Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya
Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.
Muthu Sivashanmugam, Premapriya
Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization. PMID:26065024
Lang, Ulrich; Schreiner, Rudolf
Compliance with regulatory and governance standards is rapidly becoming one of the hot topics of information security today. This is because, especially with regulatory compliance, both business and government have to expect large financial and reputational losses if compliance cannot be ensured and demonstrated. One major difficulty of implementing such regulations is caused the fact that they are captured at a high level of abstraction that is business-centric and not IT centric. This means that the abstract intent needs to be translated in a trustworthy, traceable way into compliance and security policies that the IT security infrastructure can enforce. Carrying out this mapping process manually is time consuming, maintenance-intensive, costly, and error-prone. Compliance monitoring is also critical in order to be able to demonstrate compliance at any given point in time. The problem is further complicated because of the need for business-driven IT agility, where IT policies and enforcement can change frequently, e.g. Business Process Modelling (BPM) driven Service Oriented Architecture (SOA). Model Driven Security (MDS) is an innovative technology approach that can solve these problems as an extension of identity and access management (IAM) and authorization management (also called entitlement management). In this paper we will illustrate the theory behind Model Driven Security for compliance, provide an improved and extended architecture, as well as a case study in the healthcare industry using our OpenPMF 2.0 technology.
Full Text Available According to the complexity and differences between Iranian banks and other developed countries the appropriate actions to implement effective security management of information technology have not been taken. The aim of this study was to create a powerful model by selecting the appropriate security controls to protect information assets in the bank. In this model, at first the principle set fort in ISO standard 27001, was extracted and then by further studies derived from best practices carried out in the world on the related subject from 2008 to 2016 using a qualitative descriptive method, points comply with information security management in the banking industry were added to it. With the study of Iranian banks in dealing with IT security management system and with help of action research tools, provisions which prevent the actual implementation of this standard was removed and finally a conceptual model with operating instructions and considering all the principles of information security management standard, as well as banking institutions focusing on the characteristics of Iran was proposed.
Li, Wenjuan; Ping, Lingdi
Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.
Full Text Available The current study sought to meet three aims: (a to understand the optimal factor structure of the Professional Engineering (ProfEng test, a measure aiming to assess competency in engineering, within a multilevel (nested perspective; (b to examine the psychometric measurement invariance of the ProfEng test across levels due to nesting and across gender at the person level, and, (c to examine the internal consistency of the engineering competency measure at both levels in the analysis. Data involved 1,696 individuals across 21 universities who took a national licensure test as part of the professional accreditation process to obtain a work permit and practice the engineering profession in the Kingdom of Saudi Arabia. Data were analyzed by use of Multilevel Structural Equation Modeling (MLSEM. Results indicated that a 2-factor model at both levels of analysis provided the best fit to the data. We also examined violation of measurement invariance across clusters (cluster bias. Results showed that all factor loadings were invariant across levels, suggesting the presence of strong measurement invariance. Last, invariance across gender was tested by use of the MIMIC multilevel model. Results pointed to the existence of significant differences between genders on levels of personal and professional skills with females having higher levels on personal skills and males on professional. Estimates of internal consistency reliability also varied markedly due to nesting. It is concluded that ignoring a multilevel structure is associated with errors and inaccuracies in the measurement of person abilities as both measurement wise and precision wise the multilevel model provides increased accuracy at each level in the analysis.
Burdick, Clark; Manchester, Joyce
Each year in March, the Board of Trustees of the Social Security trust funds reports on the current and projected financial condition of the Social Security programs. Those programs, which pay monthly benefits to retired workers and their families, to the survivors of deceased workers, and to disabled workers and their families, are financed through the Old-Age, Survivors, and Disability Insurance (OASDI) Trust Funds. In their 2003 report, the Trustees present, for the first time, results from a stochastic model of the combined OASDI trust funds. Stochastic modeling is an important new tool for Social Security policy analysis and offers the promise of valuable new insights into the financial status of the OASDI trust funds and the effects of policy changes. The results presented in this article demonstrate that several stochastic models deliver broadly consistent results even though they use very different approaches and assumptions. However, they also show that the variation in trust fund outcomes differs as the approach and assumptions are varied. Which approach and assumptions are best suited for Social Security policy analysis remains an open question. Further research is needed before the promise of stochastic modeling is fully realized. For example, neither parameter uncertainty nor variability in ultimate assumption values is recognized explicitly in the analyses. Despite this caveat, stochastic modeling results are already shedding new light on the range and distribution of trust fund outcomes that might occur in the future.
Criqui, Patrick; Mima, Silvana
In this research, we have provided an overview of the climate-security nexus in the European sector through a model based scenario analysis with POLES model. The analysis underline that under stringent climate policies, Europe take advantage of a double dividend in its capacity to develop a new cleaner energy model and in lower vulnerability to potential shocks on the international energy markets. (authors)
Ryżyński, Grzegorz; Nałęcz, Tomasz
The efficient geological data management in Poland is necessary to support multilevel decision processes for government and local authorities in case of spatial planning, mineral resources and groundwater supply and the rational use of subsurface. Vast amount of geological information gathered in the digital archives and databases of Polish Geological Survey (PGS) is a basic resource for multi-scale national subsurface management. Data integration is the key factor to allow development of GIS and web tools for decision makers, however the main barrier for efficient geological information management is the heterogeneity of data in the resources of the Polish Geological Survey. Engineering-geological database is the first PGS thematic domain applied in the whole data integration plan. The solutions developed within this area will facilitate creation of procedures and standards for multilevel data management in PGS. Twenty years of experience in delivering digital engineering-geological mapping in 1:10 000 scale and archival geotechnical reports acquisition and digitisation allowed gathering of more than 300 thousands engineering-geological boreholes database as well as set of 10 thematic spatial layers (including foundation conditions map, depth to the first groundwater level, bedrock level, geohazards). Historically, the desktop approach was the source form of the geological-engineering data storage, resulting in multiple non-correlated interbase datasets. The need for creation of domain data model emerged and an object-oriented modelling (UML) scheme has been developed. The aim of the aforementioned development was to merge all datasets in one centralised Oracle server and prepare the unified spatial data structure for efficient web presentation and applications development. The presented approach will be the milestone toward creation of the Polish national standard for engineering-geological information management. The paper presents the approach and methodology
Full Text Available Abstract Background Estimates of disease prevalence for small areas are increasingly required for the allocation of health funds according to local need. Both individual level and geographic risk factors are likely to be relevant to explaining prevalence variations, and in turn relevant to the procedure for small area prevalence estimation. Prevalence estimates are of particular importance for major chronic illnesses such as cardiovascular disease. Methods A multilevel prevalence model for cardiovascular outcomes is proposed that incorporates both survey information on patient risk factors and the effects of geographic location. The model is applied to derive micro area prevalence estimates, specifically estimates of cardiovascular disease for Zip Code Tabulation Areas in the USA. The model incorporates prevalence differentials by age, sex, ethnicity and educational attainment from the 2005 Behavioral Risk Factor Surveillance System survey. Influences of geographic context are modelled at both county and state level, with the county effects relating to poverty and urbanity. State level influences are modelled using a random effects approach that allows both for spatial correlation and spatial isolates. Results To assess the importance of geographic variables, three types of model are compared: a model with person level variables only; a model with geographic effects that do not interact with person attributes; and a full model, allowing for state level random effects that differ by ethnicity. There is clear evidence that geographic effects improve statistical fit. Conclusion Geographic variations in disease prevalence partly reflect the demographic composition of area populations. However, prevalence variations may also show distinct geographic 'contextual' effects. The present study demonstrates by formal modelling methods that improved explanation is obtained by allowing for distinct geographic effects (for counties and states and for
Komeil Raisian; Jamaiah Yahaya
By developing the cloud computing, viewpoint of many people regarding the infrastructure architectures, software distribution and improvement model changed significantly. Cloud computing associates with the pioneering deployment architecture, which could be done through grid calculating, effectiveness calculating and autonomic calculating. The fast transition towards that, has increased the worries regarding a critical issue for the effective transition of cloud computing. From the security v...
Full Text Available Today's, Organizations are exposed with huge and diversity of information and information assets that are produced in different systems shuch as KMS, financial and accounting systems, official and industrial automation sysytems and so on and protection of these information is necessary. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released.several benefits of this model cuses that organization has a great trend to implementing Cloud computing. Maintaining and management of information security is the main challenges in developing and accepting of this model. In this paper, at first, according to "design science research methodology" and compatible with "design process at information systems research", a complete categorization of organizational assets, including 355 different types of information assets in 7 groups and 3 level, is presented to managers be able to plan corresponding security controls according to importance of each groups. Then, for directing of organization to architect it’s information security in cloud computing environment, appropriate methodology is presented. Presented cloud computing security architecture , resulted proposed methodology, and presented classification model according to Delphi method and expers comments discussed and verified.
This ineffectiveness extends to promoting household food security within the context of encouraging biodiversity conservation on farm lands. To examine this, this paper draws on recently conducted research to sketch the current model within which extension pursues these seemingly dichotomous objectives and identifies ...
Hatfield, L.A.; Gutreuter, S.; Boogaard, M.A.; Carlin, B.P.
Estimation of extreme quantal-response statistics, such as the concentration required to kill 99.9% of test subjects (LC99.9), remains a challenge in the presence of multiple covariates and complex study designs. Accurate and precise estimates of the LC99.9 for mixtures of toxicants are critical to ongoing control of a parasitic invasive species, the sea lamprey, in the Laurentian Great Lakes of North America. The toxicity of those chemicals is affected by local and temporal variations in water chemistry, which must be incorporated into the modeling. We develop multilevel empirical Bayes models for data from multiple laboratory studies. Our approach yields more accurate and precise estimation of the LC99.9 compared to alternative models considered. This study demonstrates that properly incorporating hierarchical structure in laboratory data yields better estimates of LC99.9 stream treatment values that are critical to larvae control in the field. In addition, out-of-sample prediction of the results of in situ tests reveals the presence of a latent seasonal effect not manifest in the laboratory studies, suggesting avenues for future study and illustrating the importance of dual consideration of both experimental and observational data. ?? 2011, The International Biometric Society.
Zohar, Dov; Lee, Jin
The study was designed to test a multilevel path model whose variables exert opposing effects on school bus drivers' performance. Whereas departmental safety climate was expected to improve driving safety, the opposite was true for in-vehicle disruptive children behavior. The driving safety path in this model consists of increasing risk-taking practices starting with safety shortcuts leading to rule violations and to near-miss events. The study used a sample of 474 school bus drivers in rural areas, driving children to school and school-related activities. Newly developed scales for measuring predictor, mediator and outcome variables were validated with video data taken from inner and outer cameras, which were installed in 29 buses. Results partially supported the model by indicating that group-level safety climate and individual-level children distraction exerted opposite effects on the driving safety path. Furthermore, as hypothesized, children disruption moderated the strength of the safety rule violation-near miss relationship, resulting in greater strength under high disruptiveness. At the same time, the hypothesized interaction between the two predictor variables was not supported. Theoretical and practical implications for studying safety climate in general and distracted driving in particular for professional drivers are discussed. Copyright © 2016 Elsevier Ltd. All rights reserved.
Arias-Rodil, Manuel; Castedo-Dorado, Fernando; Cámara-Obregón, Asunción; Diéguez-Aranda, Ulises
Stem taper data are usually hierarchical (several measurements per tree, and several trees per plot), making application of a multilevel mixed-effects modelling approach essential. However, correlation between trees in the same plot/stand has often been ignored in previous studies. Fitting and calibration of a variable-exponent stem taper function were conducted using data from 420 trees felled in even-aged maritime pine (Pinus pinaster Ait.) stands in NW Spain. In the fitting step, the tree level explained much more variability than the plot level, and therefore calibration at plot level was omitted. Several stem heights were evaluated for measurement of the additional diameter needed for calibration at tree level. Calibration with an additional diameter measured at between 40 and 60% of total tree height showed the greatest improvement in volume and diameter predictions. If additional diameter measurement is not available, the fixed-effects model fitted by the ordinary least squares technique should be used. Finally, we also evaluated how the expansion of parameters with random effects affects the stem taper prediction, as we consider this a key question when applying the mixed-effects modelling approach to taper equations. The results showed that correlation between random effects should be taken into account when assessing the influence of random effects in stem taper prediction. PMID:26630156
Konold, Timothy R; Cornell, Dewey
This study tested a conceptual model of school climate in which two key elements of an authoritative school, structure and support variables, are associated with student engagement in school and lower levels of peer aggression. Multilevel multivariate structural modeling was conducted in a statewide sample of 48,027 students in 323 public high schools who completed the Authoritative School Climate Survey. As hypothesized, two measures of structure (Disciplinary Structure and Academic Expectations) and two measures of support (Respect for Students and Willingness to Seek Help) were associated with higher student engagement (Affective Engagement and Cognitive Engagement) and lower peer aggression (Prevalence of Teasing and Bullying) on both student and school levels of analysis, controlling for the effects of school demographics (school size, percentage of minority students, and percentage of low income students). These results support the extension of authoritative school climate model to high school and guide further research on the conditions for a positive school climate. Copyright © 2015 Society for the Study of School Psychology. Published by Elsevier Ltd. All rights reserved.
Full Text Available We analyze the existing DS from the point of security and construct a two-level hierarchy of models. Such approach allows us to separate the abstraction (architecture level and the concrete (component level of ISS. The core set of methods, i. e. authentication and key exchange protocols, corresponds to the abstraction level and is defined as security infrastructure (SI. The final security parameters optimization and additional mechanisms such as authorization, routing and data auditing of the protection mechanisms are configured on the component level of the DS. In addition, we outline the systematic step-by-step ISS configuration method.
Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna
This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.
Nicolas Sommet; Davide Morselli
This paper aims to introduce multilevel logistic regression analysis in a simple and practical way. First, we introduce the basic principles of logistic regression analysis (conditional probability, logit transformation, odds ratio). Second, we discuss the two fundamental implications of running this kind of analysis with a nested data structure: In multilevel logistic regression, the odds that the outcome variable equals one (rather than zero) may vary from one cluster to another (i.e. the i...
Borchers, Allison M.; Xiarchos, Irene; Beckman, Jayson
This article offers the first national examination of the determinants of adoption of wind and solar energy generation on U.S. farming operations. The inclusion of state policies and characteristics in a multilevel modeling approach distinguishes this study from past research utilizing logit models of technology adoption which focus only on the characteristics of the farm operation. Results suggest the propensity to adopt is higher for livestock operations, larger farms, operators with internet access, organic operations, and newer farmers. The results find state characteristics such as solar resources, per capita income levels, and predominantly democratic voting increasing the odds of farm adoption. This research suggests the relevance of state policy variables in explaining farm level outcomes is limited, although in combination best practice net metering and interconnection policies—policies designed to encourage the development of small scale distributed applications—are shown to increase the likelihood of farm solar and wind adoption. The prevalence of electric cooperatives—which are often not subject to state renewable energy policies and often service farms—is negatively related with the propensity to adopt and suggests that policy design may be a factor. - Highlights: • This is the first national examination of wind and solar energy adoption on U.S. farms. • Controlling for state policies distinguishes this study from past research of technology adoption. • We find net metering and interconnection policies increase the likelihood of farm adoption. • Results suggest that the design of renewable energy policies may limit their impact on farms
Ibrahim Al Kattan; Ahmed Al Nunu; Kassem Saleh
This article presents a probabilistic security model for supply chain management systems (SCM) in which the basic goals of security (including confidentiality, integrity, availability and accountability, CIAA) are modeled and analyzed. Consequently, the weak points in system security are identified. A stochastic model using measurable values to describe the information system security of a SCM is introduced. Information security is a crucial and integral part of the network of supply chains. ...
Muñoz, David F; Palacios, Arturo; Lascurain, Miguel
The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...
Muñoz, David F.; Palacios, Arturo; de Lascurain, Miguel
The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...
Augutis, Juozas; Krikštolaitis, Ričardas; Pečiulytė, Sigita; Žutautaitė, Inga
Highlights: • Methodology for dynamic indicator model construction and forecasting of indicators. • Application of dynamic indicator model for energy system development scenarios. • Expert judgement involvement using Bayesian method. - Abstract: The methodology for the dynamic indicator model construction and forecasting of indicators for the assessment of energy security level is presented in this article. An indicator is a special index, which provides numerical values to important factors for the investigated area. In real life, models of different processes take into account various factors that are time-dependent and dependent on each other. Thus, it is advisable to construct a dynamic model in order to describe these dependences. The energy security indicators are used as factors in the dynamic model. Usually, the values of indicators are obtained from statistical data. The developed dynamic model enables to forecast indicators’ variation taking into account changes in system configuration. The energy system development is usually based on a new object construction. Since the parameters of changes of the new system are not exactly known, information about their influences on indicators could not be involved in the model by deterministic methods. Thus, dynamic indicators’ model based on historical data is adjusted by probabilistic model with the influence of new factors on indicators using the Bayesian method
Paletou, Frédéric; Léger, Ludovick
The vast majority of recent advances in the field of numerical radiative transfer relies on approximate operator methods better known in astrophysics as Accelerated Lambda-Iteration (ALI). A superior class of iterative schemes, in term of rates of convergence, such as Gauss-Seidel and Successive Overrelaxation methods were therefore quite naturally introduced in the field of radiative transfer by Trujillo Bueno & Fabiani Bendicho (1995); it was thoroughly described for the non-LTE two-level atom case. We describe hereafter in details how such methods can be generalized when dealing with non-LTE unpolarised radiation transfer with multilevel atomic models, in monodimensional geometry.
Xu, Jinchao [Pennsylvania State Univ., University Park, PA (United States). Dept. of Mathematics
In this project, we carried out many studies on adaptive and parallel multilevel methods for numerical modeling for various applications, including Magnetohydrodynamics (MHD) and complex fluids. We have made significant efforts and advances in adaptive multilevel methods of the multiphysics problems: multigrid methods, adaptive finite element methods, and applications.
markdownabstract__Abstract__ In this chapter, a concise overview is provided for the statistical techniques that are applied in this thesis. This includes two classes of statistical modeling approaches which have been commonly applied in plenty of research areas for many decades. Namely, we will describe the fundamental ideas about mixed effects models and factor analytic (FA) models. To be specific, this chapter covers several types of these two classes of modeling approaches. For the mixed ...
Pegalajar Jurado, Antonio Manuel; Bredmose, Henrik; Borg, Michael
and focused waves is run in the three models, where only wave loads are considered. The simulation results are compared against the test data, and the numerical models are assessed based on their ability to reproduce the test results. Finally, the possibility of enhancing the simple model by using...
Ye, Xiao-hua; Xu, Ya; Zhou, Shu-dong; Gao, Yan-hui; Li, Yan-fen
To analyze the awareness on health among high school students and its influencing factors in Guangdong. Multi-stage sampling and questionnaire "2009 health awareness survey of the Chinese citizens" developed by our Department of Health, were used. Data were analyzed by multivariate multilevel model under MLwinN 2.19 software. The mean scores on knowledge and ideas, behaviors and related skills among 1606 high school students of Guangdong province, were 69.08 ± 14.81, 60.05 ± 16.85 and 74.99 ± 21.17 respectively. Three items on health showed that they all related to each other and relations between grades (0.972, 0.715 and 0.855) were greater than the individuals (0.565, 0.426 and 0.438). Factors as students from outside the Pearl River Delta region or from the rural areas, being male, at general secondary schools, at grade one, with poor academic performance and more pocket money etc., had lower levels on those related information of health.
Li, Alex Ning; Liao, Hui
Integrating leader-member exchange (LMX) research with role engagement theory (Kahn, 1990) and role system theory (Katz & Kahn, 1978), we propose a multilevel, dual process model to understand the mechanisms through which LMX quality at the individual level and LMX differentiation at the team level simultaneously affect individual and team performance. With regard to LMX differentiation, we introduce a new configural approach focusing on the pattern of LMX differentiation to complement the traditional approach focusing on the degree of LMX differentiation. Results based on multiphase, multisource data from 375 employees of 82 teams revealed that, at the individual level, LMX quality positively contributed to customer-rated employee performance through enhancing employee role engagement. At the team level, LMX differentiation exerted negative influence on teams' financial performance through disrupting team coordination. In particular, teams with the bimodal form of LMX configuration (i.e., teams that split into 2 LMX-based subgroups with comparable size) suffered most in team performance because they experienced greatest difficulty in coordinating members' activities. Furthermore, LMX differentiation strengthened the relationship between LMX quality and role engagement, and team coordination strengthened the relationship between role engagement and employee performance. Theoretical and practical implications of the findings are discussed. PsycINFO Database Record (c) 2014 APA, all rights reserved.
Full Text Available Despite its potential risks, nuclear power energy offers some economic benefits including cheap electricity. This benefit clarifies part of the reason why people support nuclear energy. Our research examined whether there was a difference in the acceptance of nuclear energy across 27 European countries in 2009, before the Fukushima accident. In particular, we analyzed how each factor at the individual and contextual level influences the acceptance. To answer this question, we set up the acceptance of nuclear energy as a dependent variable, and 5 perception variables at the individual level and 11 structural ones at the contextual level as independent variables. We executed multilevel modeling by using a Eurobarometer survey, which covered 27 European countries. The analysis results showed that at the individual level, the perceived benefit explained the largest variance of the acceptance, followed by perceived risk and trust. At the contextual level, the share of the energy supply by nuclear power, environmentalism and ideology influenced the acceptance of nuclear energy. This study shows that individuals’ acceptance of nuclear energy is based on individual beliefs and perceptions, but it is also influenced by the institutional and socio-cultural context which each country faces.
Maxwell, Sophie; Reynolds, Katherine J; Lee, Eunro; Subasic, Emina; Bromhead, David
School climate is a leading factor in explaining student learning and achievement. Less work has explored the impact of both staff and student perceptions of school climate raising interesting questions about whether staff school climate experiences can add "value" to students' achievement. In the current research, multiple sources were integrated into a multilevel model, including staff self-reports, student self-reports, objective school records of academic achievement, and socio-economic demographics. Achievement was assessed using a national literacy and numeracy tests ( N = 760 staff and 2,257 students from 17 secondary schools). In addition, guided by the "social identity approach," school identification is investigated as a possible psychological mechanism to explain the relationship between school climate and achievement. In line with predictions, results show that students' perceptions of school climate significantly explain writing and numeracy achievement and this effect is mediated by students' psychological identification with the school. Furthermore, staff perceptions of school climate explain students' achievement on numeracy, writing and reading tests (while accounting for students' responses). However, staff's school identification did not play a significant role. Implications of these findings for organizational, social, and educational research are discussed.
Full Text Available School climate is a leading factor in explaining student learning and achievement. Less work has explored the impact of both staff and student perceptions of school climate raising interesting questions about whether staff school climate experiences can add “value” to students' achievement. In the current research, multiple sources were integrated into a multilevel model, including staff self-reports, student self-reports, objective school records of academic achievement, and socio-economic demographics. Achievement was assessed using a national literacy and numeracy tests (N = 760 staff and 2,257 students from 17 secondary schools. In addition, guided by the “social identity approach,” school identification is investigated as a possible psychological mechanism to explain the relationship between school climate and achievement. In line with predictions, results show that students' perceptions of school climate significantly explain writing and numeracy achievement and this effect is mediated by students' psychological identification with the school. Furthermore, staff perceptions of school climate explain students' achievement on numeracy, writing and reading tests (while accounting for students' responses. However, staff's school identification did not play a significant role. Implications of these findings for organizational, social, and educational research are discussed.
Hossain, Mian B
With a population of over 131 million and a fertility rate of 29.9 per 1000, population growth constitutes a primary threat to continued economic growth and development in Bangladesh. One strategy that has been used to cease further increases in fertility in Bangladesh involves using family planning outreach workers who travel throughout rural and urban areas educating women regarding contraceptive alternatives. This study uses a longitudinal database to assess the impact of family planning outreach workers' contact upon contraceptive switching and upon the risk of an unintended pregnancy. Using longitudinal data on contraceptive use from the Operations Research Project (ORP) of the International Centre for Diarrhoeal Disease Research (ICDDR,B) in Bangladesh, multiple decrement life table analysis and multilevel, discrete-time competing risk hazards models were used to estimate the cumulative probabilities of switching to an alternative form of contraceptive use after a woman engaged in a discussion with an outreach worker. After controlling for the effects of socio-demographic and economic characteristics, the analysis revealed that family planning outreach workers' contact with women significantly decreases the risk of transitioning to the non-use of contraceptives. This contact also reduces the risk of an unintended pregnancy. Family planning workers' contact with women is associated with the increased risk of a woman switching from one modern method to another modern method. The study results indicate that side-effects and other method-related reasons are the two primary reasons for contraceptive discontinuation in rural Bangladesh.
Sturgeon, John A; Zautra, Alex J; Arewasikporn, Anne
The processes of individual adaptation to chronic pain are complex and occur across multiple domains. We examined the social, cognitive, and affective context of daily pain adaptation in individuals with fibromyalgia and osteoarthritis. By using a sample of 260 women with fibromyalgia or osteoarthritis, we examined the contributions of pain catastrophizing, negative interpersonal events, and positive interpersonal events to daily negative and positive affect across 30days of daily diary data. Individual differences and daily fluctuations in predictor variables were estimated simultaneously by utilizing multilevel structural equation modeling techniques. The relationships between pain and negative and positive affect were mediated by stable and day-to-day levels of pain catastrophizing as well as day-to-day positive interpersonal events, but not negative interpersonal events. There were significant and independent contributions of pain catastrophizing and positive interpersonal events to adaptation to pain and pain-related affective dysregulation. These effects occur both between persons and within a person's everyday life. Copyright © 2013 International Association for the Study of Pain. Published by Elsevier B.V. All rights reserved.
Shaw, R.; Swanson, S.M.; Lagimodiere, M.; Gulley, J.
A multi-level, multi-scale approach was used to assess potential impacts to fish health from oil sands water releases. The method used to arrive at predicted impacts involved assembling experimental data on the effects of chronic exposure to oil sands wastewaters on biochemical, physiological and whole-organism endpoint. This information was used to determine no effect levels (NOELs) and lowest effect levels (LOELs) for the suite of fish health parameters used in laboratory experiments (primarily biochemical and physiological measurement endpoints). LOELs and NOELs were compared to modeled concentrations of wastewater in the Athabasca River for five time snapshots. For each time period, concentrations were predicted based on mean annual flows and 7Q10 flows (low flows). This comparison was used to predict impacts on biochemical/physiological endpoints. Impacts on at the whole-organism and population-level were determined by comparing what the laboratory data would predict with what was observed in the field. This process was used to draw a conclusion regarding the health and sustainability of fish populations
Leineweber, Constanze; Westerlund, Hugo; Chungkham, Holendro Singh; Lindqvist, Rikard; Runesdotter, Sara; Tishelman, Carol
To investigate associations between nurse work practice environment measured at department level and individual level work-family conflict on burnout, measured as emotional exhaustion, depersonalization and personal accomplishment among Swedish RNs. A multilevel model was fit with the individual RN at the 1st, and the hospital department at the 2nd level using cross-sectional RN survey data from the Swedish part of RN4CAST, an EU 7th framework project. The data analysed here is based on a national sample of 8,620 RNs from 369 departments in 53 hospitals. Generally, RNs reported high values of personal accomplishment and lower values of emotional exhaustion and depersonalization. High work-family conflict increased the risk for emotional exhaustion, but for neither depersonalization nor personal accomplishment. On department level adequate staffing and good leadership and support for nurses reduced the risk for emotional exhaustion and depersonalization. Personal accomplishment was statistically significantly related to staff adequacy. The findings suggest that adequate staffing, good leadership, and support for nurses are crucial for RNs' mental health. Our findings also highlight the importance of hospital managers developing policies and practices to facilitate the successful combination of work with private life for employees.
Feng, Zhi-Gang; Michaelides, Efstathios; Mao, Shaolin
The simulation of particulate flows for industrial applications often requires the use of a two-fluid model (TFM), where the solid particles are considered as a separate continuous phase. One of the underlining uncertainties in the use of aTFM in multiphase computations comes from the boundary condition of the solid phase. The no-slip condition at a solid boundary is not a valid assumption for the solid phase. Instead, several researchers advocate a slip condition as a more appropriate boundary condition. However, the question on the selection of an exact slip length or a slip velocity coefficient is still unanswered. In the present work we propose a multilevel simulation approach to compute the slip length that is applicable to a TFM. We investigate the motion of a number of particles near a vertical solid wall, while the particles are in fluidization using a direct numerical simulation (DNS); the positions and velocities of the particles are being tracked and analyzed at each time step. It is found that the time- and vertical-space averaged values of the particle velocities converge, yielding velocity profiles that can be used to deduce the particle slip length close to a solid wall. This work was supported by a grant from the DOE-NETL (DE-NT0008064) and by a grant from NSF (HRD-0932339).
Fiona Steele; Jon Rasbash; Jennifer Jenkins
There has been substantial interest in the social and health sciences in the reciprocal causal influences that people in close relationships have on one another. Most research has considered reciprocal processes involving only 2 units, although many social relationships of interest occur within a larger group (e.g., families, work groups, peer groups, classrooms). This article presents a general longitudinal multilevel modeling framework for the simultaneous estimation of reciprocal relations...
Chen, Linjie; Monteiro, Thibaud; Wang, Tao; Marcon, Eric
Unit-dose drug distribution systems provide optimal choices in terms of medication security and efficiency for organizing the drug-use process in large hospitals. As small hospitals have to share such automatic systems for economic reasons, the structure of their logistic organization becomes a very sensitive issue. In the research reported here, we develop a generalized multi-level optimization method - multi-level particle swarm optimization (MLPSO) - to design a shared unit-dose drug distribution network. Structurally, the problem studied can be considered as a type of capacitated location-routing problem (CLRP) with new constraints related to specific production planning. This kind of problem implies that a multi-level optimization should be performed in order to minimize logistic operating costs. Our results show that with the proposed algorithm, a more suitable modeling framework, as well as computational time savings and better optimization performance are obtained than that reported in the literature on this subject.
Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian
In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in . Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.
Qing, Hai; Mishnaevsky, Leon
A 3D hierarchical computational model of damage and strength of wood is developed. The model takes into account the four scale microstructures of wood, including the microfibril reinforced structure at nanoscale, multilayered cell walls at microscale, hexagon-shape-tube cellular structure...
Darya Sergeevna Simonenkova
Full Text Available The subject of the research is modeling and security threat assessments of data processed in cloud based information systems (CBIS. This method allow to determine the current security threats of CBIS, state of the system in which vulnerabilities exists, level of possible violators, security properties and to generate recommendations for neutralizing security threats of CBIS.
Marechal, T.M.A.; Smith, A.E.; Ustun, V.; Smith, J.S.; Lefeber, A.A.J.; Badiru, A.B.; Thomas, M.U.
This research is focused on using a highly detailed simulation model to create a physical security system to prevent intrusions in a building. Security consists of guards and security cameras. The problem is represented as a binary optimization problem. A new heuristic is proposed to do the security
Kroll, Andrew J.; Garcia, Tiffany S.; Jones, Jay E.; Dugger, Catherine; Murden, Blake; Johnson, Josh; Peerman, Summer; Brintz, Ben; Rochelle, Michael
Plethodontid salamanders are diverse and widely distributed taxa and play critical roles in ecosystem processes. Due to salamander use of structurally complex habitats, and because only a portion of a population is available for sampling, evaluation of sampling designs and estimators is critical to provide strong inference about Plethodontid ecology and responses to conservation and management activities. We conducted a simulation study to evaluate the effectiveness of multi-scale and hierarchical single-scale occupancy models in the context of a Before-After Control-Impact (BACI) experimental design with multiple levels of sampling. Also, we fit the hierarchical single-scale model to empirical data collected for Oregon slender and Ensatina salamanders across two years on 66 forest stands in the Cascade Range, Oregon, USA. All models were fit within a Bayesian framework. Estimator precision in both models improved with increasing numbers of primary and secondary sampling units, underscoring the potential gains accrued when adding secondary sampling units. Both models showed evidence of estimator bias at low detection probabilities and low sample sizes; this problem was particularly acute for the multi-scale model. Our results suggested that sufficient sample sizes at both the primary and secondary sampling levels could ameliorate this issue. Empirical data indicated Oregon slender salamander occupancy was associated strongly with the amount of coarse woody debris (posterior mean = 0.74; SD = 0.24); Ensatina occupancy was not associated with amount of coarse woody debris (posterior mean = -0.01; SD = 0.29). Our simulation results indicate that either model is suitable for use in an experimental study of Plethodontid salamanders provided that sample sizes are sufficiently large. However, hierarchical single-scale and multi-scale models describe different processes and estimate different parameters. As a result, we recommend careful consideration of study questions
Andrew J Kroll
Full Text Available Plethodontid salamanders are diverse and widely distributed taxa and play critical roles in ecosystem processes. Due to salamander use of structurally complex habitats, and because only a portion of a population is available for sampling, evaluation of sampling designs and estimators is critical to provide strong inference about Plethodontid ecology and responses to conservation and management activities. We conducted a simulation study to evaluate the effectiveness of multi-scale and hierarchical single-scale occupancy models in the context of a Before-After Control-Impact (BACI experimental design with multiple levels of sampling. Also, we fit the hierarchical single-scale model to empirical data collected for Oregon slender and Ensatina salamanders across two years on 66 forest stands in the Cascade Range, Oregon, USA. All models were fit within a Bayesian framework. Estimator precision in both models improved with increasing numbers of primary and secondary sampling units, underscoring the potential gains accrued when adding secondary sampling units. Both models showed evidence of estimator bias at low detection probabilities and low sample sizes; this problem was particularly acute for the multi-scale model. Our results suggested that sufficient sample sizes at both the primary and secondary sampling levels could ameliorate this issue. Empirical data indicated Oregon slender salamander occupancy was associated strongly with the amount of coarse woody debris (posterior mean = 0.74; SD = 0.24; Ensatina occupancy was not associated with amount of coarse woody debris (posterior mean = -0.01; SD = 0.29. Our simulation results indicate that either model is suitable for use in an experimental study of Plethodontid salamanders provided that sample sizes are sufficiently large. However, hierarchical single-scale and multi-scale models describe different processes and estimate different parameters. As a result, we recommend careful consideration of
Li, Yanyan; Xie, Mengjun; Bian, Jiang
Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.
Efe Biresselioglu, Mehmet; Hakan Demir, Muhittin; Kandemir, Cansu
Turkey was among those countries which decided to increase its natural gas consumption in the 1990s, due to its relative low cost and lack of impact on the environment. However, a heavy dependence on imports, from Algeria, Qatar and Nigeria, respectively, creates a threat to energy security, both in terms of source and supply diversity. Accordingly, we follow an analytical approach to identify the accuracy of our assumption, considering the current economic, political and security risk. To this end, we formulate and solve a mixed integer programming model that determines the optimal sourcing strategy for Turkey’s increasing LNG demand. This model demonstrates a number of alternative policy options for LNG supply. Furthermore, we consider that increasing the proportion of LNG in the overall gas supply will contribute to the aim of improving Turkey’s level of energy security. - Highlights: ► Turkey’s best policy option is to increase the share of LNG. ► Turkey’s main suppliers of LNG will be Algeria, Egypt, Nigeria, and Trinidad and Tobago. ► Norway, Libya, and Oman contribute to the supply with rather smaller shares. ► With high risk scenario Algeria, Egypt, Nigeria and Libya will not be suppliers. ► Oman and Qatar will cover; even though they are high-cost suppliers.
Archer, Myla; Leonard, Elizabeth; Pradella, Matteo
Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...
Massacci, F.; Mylopoulos, J.; Zannone, N.; Ras, Z.W.; Tsay, L.-S.
Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years, spurred by the realization that security must be dealt with in the earliest phases of the software development process as
van Cleeff, A.
In the interconnected world that we live in, traditional security barriers are broken down. Developments such as outsourcing, increased usage of mobile devices and wireless networks each cause new security problems. To address the new security threats, a number of solutions have been suggested,
El-Khatib, Walid Ziad; Holbøll, Joachim; Rasmussen, Tonny Wederberg
). This means that a high frequency model of the converter has to be designed, which gives a better overview of the impact of high frequency transients etc. The functionality of the model is demonstrated by application to grid connections of off-shore wind power plants. Grid connection of an offshore wind power...... wind power plant employing HVDC. In the present study, a back to back HVDC transmission system is designed in PSCAD/EMTDC. Simulations and results showing the importance of high frequent modeling are presented....... plant using HVDC fundamentally changes the electrical environment for the power plant. Detailed knowledge and understanding of the characteristics and behavior of all relevant power system components under all conditions, including under transients, are required in order to develop reliable offshore...
injected by the candidate vaccine have a lower or higher risk for the occurrence of ... outcome relationship and test whether subjects inject- ... contains an agent that resembles a disease-causing ... to have different random effect variability at each cat- ... In the marginal models settings, the responses are ... Behavior as usual.
Mistler, Stephen A.; Enders, Craig K.
Multiple imputation methods can generally be divided into two broad frameworks: joint model (JM) imputation and fully conditional specification (FCS) imputation. JM draws missing values simultaneously for all incomplete variables using a multivariate distribution, whereas FCS imputes variables one at a time from a series of univariate conditional…
Lo, Celia C.; Kim, Young S.; Allen, Thomas M.; Allen, Andrea N.; Minugh, P. Allison; Lomuto, Nicoletta
Effects on delinquency made by grade level, school type (based on grade levels accommodated), and prosocial school climate were assessed, controlling for individual-level risk and protective factors. Data were obtained from the Substance Abuse Services Division of Alabama's state mental health agency and analyzed via hierarchical linear modeling,…
Tsai, S. L.; Smith, Michael; Hauser, R. M.
Roč. 90, č. 1 (2017), s. 64-88 ISSN 0038-0407 R&D Projects: GA ČR GCP404/12/J006; GA ČR GB14-36154G Institutional support: RVO:67985998 Keywords : MIMIC model * educational inequality * academic performance Subject RIV: AO - Sociology, Demography OBOR OECD: Sociology Impact factor: 2.697, year: 2016
B. Li (Bayoue)
markdownabstract__Abstract__ In this chapter, a concise overview is provided for the statistical techniques that are applied in this thesis. This includes two classes of statistical modeling approaches which have been commonly applied in plenty of research areas for many decades. Namely, we
Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Gray, Genetha Anne (Sandia National Laboratories, Livermore, CA); Castro, Joseph Pete Jr. (; .); Giunta, Anthony Andrew
Many engineering application problems use optimization algorithms in conjunction with numerical simulators to search for solutions. The formulation of relevant objective functions and constraints dictate possible optimization algorithms. Often, a gradient based approach is not possible since objective functions and constraints can be nonlinear, nonconvex, non-differentiable, or even discontinuous and the simulations involved can be computationally expensive. Moreover, computational efficiency and accuracy are desirable and also influence the choice of solution method. With the advent and increasing availability of massively parallel computers, computational speed has increased tremendously. Unfortunately, the numerical and model complexities of many problems still demand significant computational resources. Moreover, in optimization, these expenses can be a limiting factor since obtaining solutions often requires the completion of numerous computationally intensive simulations. Therefore, we propose a multifidelity optimization algorithm (MFO) designed to improve the computational efficiency of an optimization method for a wide range of applications. In developing the MFO algorithm, we take advantage of the interactions between multi fidelity models to develop a dynamic and computational time saving optimization algorithm. First, a direct search method is applied to the high fidelity model over a reduced design space. In conjunction with this search, a specialized oracle is employed to map the design space of this high fidelity model to that of a computationally cheaper low fidelity model using space mapping techniques. Then, in the low fidelity space, an optimum is obtained using gradient or non-gradient based optimization, and it is mapped back to the high fidelity space. In this paper, we describe the theory and implementation details of our MFO algorithm. We also demonstrate our MFO method on some example problems and on two applications: earth penetrators and
Xu, X.Y.; Ang, B.W.
With the growing interest in using the technique of index decomposition analysis (IDA) in energy and energy-related emission studies, such as to analyze the impacts of activity structure change or to track economy-wide energy efficiency trends, the conventional single-level IDA may not be able to meet certain needs in policy analysis. In this paper, some limitations of single-level IDA studies which can be addressed through applying multilevel decomposition analysis are discussed. We then introduce and compare two multilevel decomposition procedures, which are referred to as the multilevel-parallel (M-P) model and the multilevel-hierarchical (M-H) model. The former uses a similar decomposition procedure as in the single-level IDA, while the latter uses a stepwise decomposition procedure. Since the stepwise decomposition procedure is new in the IDA literature, the applicability of the popular IDA methods in the M-H model is discussed and cases where modifications are needed are explained. Numerical examples and application studies using the energy consumption data of the US and China are presented. - Highlights: • We discuss the limitations of single-level decomposition in IDA applied to energy study. • We introduce two multilevel decomposition models, study their features and discuss how they can address the limitations. • To extend from single-level to multilevel analysis, necessary modifications to some popular IDA methods are discussed. • We further discuss the practical significance of the multilevel models and present examples and cases to illustrate
Wu, Xuan; Wang, Xiaojie; Mei, Tao; Sun, Shaoming
This paper proposes a multi-level hierarchical model for the Tokay gecko (Gekko gecko) adhesive system and analyses the digital behaviour of the G. gecko under macro/meso-level scale. The model describes the structures of G. gecko's adhesive system from the nano-level spatulae to the sub-millimetre-level lamella. The G. gecko's seta is modelled using inextensible fibril based on Euler's elastica theorem. Considering the side contact of the spatular pads of the seta on the flat and rigid subst...
Shaji, C.; Bahulayan, N.; Dube, S.K.; Rao, A.D.
and diffusion terms in the momentum equations and also in the resultant vorticity balance. The results of the calculation indicated realistic climatological Gulf Stream behaviour in the South Atlantic Bight. Sarmiento and Bryan  also developed a robust... be balanced. In case the volume flux or the velocities are not balanced, appropriate corrections should be applied to the velocity fields at the boundary so that the velocities are balanced to the maximum extent possible. We have used a quasi-geostrophic model...
Loeys, Tom; Josephy, Haeike; Dewitte, Marieke
In hierarchical data, the effect of a lower-level predictor on a lower-level outcome may often be confounded by an (un)measured upper-level factor. When such confounding is left unaddressed, the effect of the lower-level predictor is estimated with bias. Separating this effect into a within- and between-component removes such bias in a linear random intercept model under a specific set of assumptions for the confounder. When the effect of the lower-level predictor is additionally moderated by another lower-level predictor, an interaction between both lower-level predictors is included into the model. To address unmeasured upper-level confounding, this interaction term ought to be decomposed into a within- and between-component as well. This can be achieved by first multiplying both predictors and centering that product term next, or vice versa. We show that while both approaches, on average, yield the same estimates of the interaction effect in linear models, the former decomposition is much more precise and robust against misspecification of the effects of cross-level and upper-level terms, compared to the latter.
Harvey, Natalie J.; Huntley, Nathan; Dacre, Helen F.; Goldstein, Michael; Thomson, David; Webster, Helen
Following the disruption to European airspace caused by the eruption of Eyjafjallajökull in 2010 there has been a move towards producing quantitative predictions of volcanic ash concentration using volcanic ash transport and dispersion simulators. However, there is no formal framework for determining the uncertainties of these predictions and performing many simulations using these complex models is computationally expensive. In this paper a Bayesian linear emulation approach is applied to the Numerical Atmospheric-dispersion Modelling Environment (NAME) to better understand the influence of source and internal model parameters on the simulator output. Emulation is a statistical method for predicting the output of a computer simulator at new parameter choices without actually running the simulator. A multi-level emulation approach is applied using two configurations of NAME with different numbers of model particles. Information from many evaluations of the computationally faster configuration is combined with results from relatively few evaluations of the slower, more accurate, configuration. This approach is effective when it is not possible to run the accurate simulator many times and when there is also little prior knowledge about the influence of parameters. The approach is applied to the mean ash column loading in 75 geographical regions on 14 May 2010. Through this analysis it has been found that the parameters that contribute the most to the output uncertainty are initial plume rise height, mass eruption rate, free tropospheric turbulence levels and precipitation threshold for wet deposition. This information can be used to inform future model development and observational campaigns and routine monitoring. The analysis presented here suggests the need for further observational and theoretical research into parameterisation of atmospheric turbulence. Furthermore it can also be used to inform the most important parameter perturbations for a small operational
N. J. Harvey
Full Text Available Following the disruption to European airspace caused by the eruption of Eyjafjallajökull in 2010 there has been a move towards producing quantitative predictions of volcanic ash concentration using volcanic ash transport and dispersion simulators. However, there is no formal framework for determining the uncertainties of these predictions and performing many simulations using these complex models is computationally expensive. In this paper a Bayesian linear emulation approach is applied to the Numerical Atmospheric-dispersion Modelling Environment (NAME to better understand the influence of source and internal model parameters on the simulator output. Emulation is a statistical method for predicting the output of a computer simulator at new parameter choices without actually running the simulator. A multi-level emulation approach is applied using two configurations of NAME with different numbers of model particles. Information from many evaluations of the computationally faster configuration is combined with results from relatively few evaluations of the slower, more accurate, configuration. This approach is effective when it is not possible to run the accurate simulator many times and when there is also little prior knowledge about the influence of parameters. The approach is applied to the mean ash column loading in 75 geographical regions on 14 May 2010. Through this analysis it has been found that the parameters that contribute the most to the output uncertainty are initial plume rise height, mass eruption rate, free tropospheric turbulence levels and precipitation threshold for wet deposition. This information can be used to inform future model development and observational campaigns and routine monitoring. The analysis presented here suggests the need for further observational and theoretical research into parameterisation of atmospheric turbulence. Furthermore it can also be used to inform the most important parameter perturbations
Padula, William V; Gibbons, Robert D; Pronovost, Peter J; Hedeker, Donald; Mishra, Manish K; Makic, Mary Beth F; Bridges, John Fp; Wald, Heidi L; Valuck, Robert J; Ginensky, Adam J; Ursitti, Anthony; Venable, Laura Ruth; Epstein, Ziv; Meltzer, David O
Hospital-acquired pressure ulcers (HAPUs) have a mortality rate of 11.6%, are costly to treat, and result in Medicare reimbursement penalties. Medicare codes HAPUs according to Agency for Healthcare Research and Quality Patient-Safety Indicator 3 (PSI-03), but they are sometimes inappropriately coded. The objective is to use electronic health records to predict pressure ulcers and to identify coding issues leading to penalties. We evaluated all hospitalized patient electronic medical records at an academic medical center data repository between 2011 and 2014. These data contained patient encounter level demographic variables, diagnoses, prescription drugs, and provider orders. HAPUs were defined by PSI-03: stages III, IV, or unstageable pressure ulcers not present on admission as a secondary diagnosis, excluding cases of paralysis. Random forests reduced data dimensionality. Multilevel logistic regression of patient encounters evaluated associations between covariates and HAPU incidence. The approach produced a sample population of 21 153 patients with 1549 PSI-03 cases. The greatest odds ratio (OR) of HAPU incidence was among patients diagnosed with spinal cord injury (ICD-9 907.2: OR = 14.3; P coded for paralysis, leading to a PSI-03 flag. Other high ORs included bed confinement (ICD-9 V49.84: OR = 3.1, P coded without paralysis, leading to PSI-03 flags. The resulting statistical model can be tested to predict HAPUs during hospitalization. Inappropriate coding of conditions leads to poor hospital performance measures and Medicare reimbursement penalties. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: email@example.com
Full Text Available The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP, TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.
This document is designed to acquaint the reader with the SSE-CMM Project as a whole and present the project's major work product - the Systems Security Engineering Capability Maturity Model (SSE- CMM...
Full Text Available The goal of this contribution is especially to familiarize experts in various fields with the need for a new approach to the system-defined model and modelling of processes in the engineering practice and the expression of some state variables' possibilities for the modelling of real-world systems with regard to the highly dynamic development of structures and to the behaviour of systems of logistics. Thus, in this contribution, the necessity of making full use of cybernetics as a field for the management and communication of information is expressed, and also the environment of cybernetics as a much needed cybernetic realm (cyberspace, determining the steady state between cyber-attacks and cyber-defence as a modern knowledge-based potential in general and specifically of logistics in cyber security. Connected with this process is the very important area of lifelong training of experts in the dynamic world of science and technology (that is, also in a social system which is also expressed here briefly, and also the cyber and information security, all of which falls under the cyberspace of new perspective electronic learning (e-learning with the use of modern laboratories with new effects also for future possibilities of process modelling of artificial intelligence (AI with a perspective of mass use of UAVs in logistics.
Nyman, E.; Rozendaal, Y.J.W.; Helmlinger, G.; Hamrén, B.; Kjellsson, M.C.; Strålfors, P.; van Riel, N.A.W.; Gennemark, P.; Cedersund, G.
We are currently in the middle of a major shift in biomedical research: unprecedented and rapidly growing amounts of data may be obtained today, from in vitro, in vivo and clinical studies, at molecular, physiological and clinical levels. To make use of these large-scale, multi-level datasets,
Nyman, Elin; Rozendaal, Yvonne J. W.; Helmlinger, Gabriel; Hamrén, Bengt; Kjellsson, Maria C.; Strålfors, Peter; van Riel, Natal A. W.; Gennemark, Peter; Cedersund, Gunnar
We are currently in the middle of a major shift in biomedical research: unprecedented and rapidly growing amounts of data may be obtained today, from in vitro, in vivo and clinical studies, at molecular, physiological and clinical levels. To make use of these large-scale, multi-level datasets,
Lai, Mark H. C.; Kwok, Oi-man
Educational researchers commonly use the rule of thumb of "design effect smaller than 2" as the justification of not accounting for the multilevel or clustered structure in their data. The rule, however, has not yet been systematically studied in previous research. In the present study, we generated data from three different models…
Full Text Available With the rapid development of economy, the supplier network is becoming more and more complicated. It is important to choose the right suppliers for improving the efficiency of the supply chain, so how to choose the right ones is one of the important research directions of supply chain management. This paper studies the partner selection problem from the perspective of supplier network global optimization. Firstly, this paper discusses and forms the evaluation system to estimate the supplier from the two indicators of risk and greenness and then applies the value as the weight of the network between two nodes to build a weighted-directed supplier network; secondly, the study establishes the optimal combination model of supplier selection based on the global network perspective and solves the model by the dynamic programming-tabu search algorithm and the improved ant colony algorithm, respectively; finally, different scale simulation examples are given to testify the efficiency of the two algorithms. The results show that the ant colony algorithm is superior to the tabu search one as a whole, but the latter is slightly better than the former when network scale is small.
Judge, Timothy A; Scott, Brent A; Ilies, Remus
The authors tested a model, inspired by affective events theory (H. M. Weiss & R. Cropanzano, 1996), that examines the dynamic nature of emotions at work, work attitudes, and workplace deviance. Sixty-four employees completed daily surveys over 3 weeks, reporting their mood, job satisfaction, perceived interpersonal treatment, and deviance. Supervisors and significant others also evaluated employees' workplace deviance and trait hostility, respectively. Over half of the total variance in workplace deviance was within-individual, and this intraindividual variance was predicted by momentary hostility, interpersonal justice, and job satisfaction. Moreover, trait hostility moderated the interpersonal justice-state hostility relation such that perceived injustice was more strongly related to state hostility for individuals high in trait hostility. (c) 2006 APA, all rights reserved.
Suwa, Yoshihiro; Aizawa, Tatsuhiko; Takaya, Shigeru; Nagae, Yuji; Aoto, Kazumi
The present research aims at a proposal of theoretical treatise to describe the local phase transformation from austenite to ferrite in the stainless steels under hot cyclic fatigue conditions. In experiments, this local phase transformation is detected as a magnetized region in the non-magnetic matrix after low-cycle fatigue test at the elevated temperature. The theoretical frame proposed here is composed of two methodologies. In the first approach, microstructure evolution with γ → α transformation is described by the phase field method. In the second approach, micromechanical method on the basis of the unit cell modeling is proposed to develop a new micromechanical analysis. The details of two approached are summarized in the following. (1) Phase formation simulation by the phase field method. Most of reports have started that γ-α phase transformation as a creep damage is induced by dechromization, which comes from carbide precipitation around grain boundaries. A new theoretical treatise is proposed for simulating this γ → α transformation in Fe-Cr-Ni system. Stabilities of both phases are investigated for various chemical compositions. Furthermore, in order to investigate dechromization phenomena in Fe-Cr-Ni-C system, a new theoretical frame is also proposed to handle an interstitial element in phase field method. (2) Low cycle fatigue elasto-plastic analysis by the unit-cell modeling. In experiments, the magnetized zones are generated to distribute at the vicinity of the hard, delta-phase inclusion in the austenitic matrix. The cumulative plastic region advances in the surroundings of this hard inclusion with increasing the number of cycles in the controlled strain range. This predicted profile of cumulative plastic regions corresponds to the experimentally measured, magnetized zones. In addition, the effect of geometric configuration of this inclusion on the plastic region evolution has close relationship of creep damage advancement in experiments
Richmond-Bryant, Jennifer; Meng, Qingyu; Davis, J Allen; Cohen, Jonathan; Svendsgaard, David; Brown, James S; Tuttle, Lauren; Hubbard, Heidi; Rice, Joann; Kirrane, Ellen; Vinikoor-Imler, Lisa; Kotchmar, Dennis; Hines, Erin; Ross, Mary
National and local declines in lead (Pb) in blood (PbB) over the past several years coincide with the decline in ambient air Pb (PbA) concentrations. The objective of this work is to evaluate how the relationship between PbB levels and PbA levels has changed following the phase out of leaded gasoline and tightened controls on industrial Pb emissions over the past 30 years among a national population sample. Participant-level data from the National Health and Nutrition Examination Survey (NHANES) were employed for two time periods (1988-1994 and 1999-2008), and the model was corrected for housing, demographic, socioeconomic, and other covariates present in NHANES. NHANES data for PbB and covariates were merged with PbA data from the U.S. Environmental Protection Agency. Linear mixed effects models (LMEs) were run to assess the relationship of PbB with PbA; sample weights were omitted, given biases encountered with the use of sample weights in LMEs. The 1988-1994 age-stratified results found that ln(PbB) was statistically significantly associated with ln(PbA) for all age groups. The consistent influence of PbA on PbB across age groups for the years 1988-1994 suggests a ubiquitous exposure unrelated to age of the sample population. The comparison of effect estimates for ln(PbA) shows a statistically significant effect estimate and ANOVA results for ln(PbB) for the 6- to 11-year and 12- to 19-year age groups during 1999-2008. The more recent finding suggests that PbA has less consistent influence on PbB compared with other factors. Copyright © 2013 Elsevier B.V. All rights reserved.
Full Text Available Background: Dairy products account for approximately 60% of the iodine intake in the Norwegian population. The iodine concentration in cow's milk varies considerably, depending on feeding practices, season, and amount of iodine and rapeseed products in cow fodder. The variation in iodine in milk affects the risk of iodine deficiency or excess in the population. Objective: The first goal of this study was to develop a model to predict the iodine concentration in milk based on the concentration of iodine and rapeseed or glucosinolate in feed, as a tool to securing stable iodine concentration in milk. A second aim was to estimate the impact of different iodine levels in milk on iodine nutrition in the Norwegian population. Design: Two models were developed on the basis of results from eight published and two unpublished studies from the past 20 years. The models were based on different iodine concentrations in the fodder combined with either glucosinolate (Model 1 or rapeseed cake/meal (Model 2. To illustrate the impact of different iodine concentrations in milk on iodine intake, we simulated the iodine contribution from dairy products in different population groups based on food intake data in the most recent dietary surveys in Norway. Results: The models developed could predict iodine concentration in milk. Cross-validation showed good fit and confirmed the explanatory power of the models. Our calculations showed that dairy products with current iodine level in milk (200 µg/kg cover 68, 49, 108 and 56% of the daily iodine requirements for men, women, 2-year-old children, and pregnant women, respectively. Conclusions: Securing a stable level of iodine in milk by adjusting iodine concentration in different cow feeds is thus important for preventing excess intake in small children and iodine deficiency in pregnant and non-pregnant women.
missions that the I&A focuses on is, “border security, including narcotics smuggling, alien and human smuggling, and money laundering ...and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION
Mishra, Saurabh; Snehlata, Snehlata; Srivastava, Anjali
Information Security has become a significant concern for today's organizations. The internal security threats acts as the most curtail type of security threat within an organization. These internal security threats are a result of poor conduct of security behavior by the employees within an organization. If not deal properly, it may hamper the auditing of organization. Auditing plays an important role in the business environment. Before conducting auditing it is essential to examine the beha...
A. O. Vybornov
Full Text Available Categories roles of information security employees of the banking organization are defined. Functional roles are described. The relationship between functional roles, employees, functions and authority are defined. The role of information security employees of the banking organization for information security system and information security management system are described. Recommendations for the implementation phases of the selection and appointment of the functional roles and to control the selection and role assignment information security employees of the banking organization are stated.
Latimore, Amanda D; Burrell, Lori; Crowne, Sarah; Ojo, Kristen; Cluxton-Keller, Fallon; Gustin, Sunday; Kruse, Lakota; Hellman, Daniela; Scott, Lenore; Riordan, Annette; Duggan, Anne
The associations of family, home visitor and site characteristics with family engagement within the first 6 months were examined. The variation in family engagement was also explored. Home visiting program participants were drawn from 21 Healthy Families America sites (1707 families) and 9 Nurse-Family Partnership sites (650 families) in New Jersey. Three-level nested generalized linear mixed models assessed the associations of family, home visitor and site characteristics with family receipt of a high dose of services in the first 6 months of enrollment. A family was considered to have received a high dose of service in the first 6 months of enrollment if they were active at 6 months and had received at least 50% of their expected visits in the first 6 months. In general, both home visiting programs engaged, at a relatively high level (Healthy Families America (HFA) 59%, Nurse-Family Partnership (NFP) 64%), with families demonstrating high-risk characteristics such as lower maternal education, maternal smoking, and maternal mental health need. Home visitor characteristics explained more of the variation (87%) in the receipt of services for HFA, while family characteristics explained more of the variation (75%) in the receipt of services for NFP. At the family level, NFP may improve the consistency with which they engage families by increasing retention efforts among mothers with lower education and smoking mothers. HFA sites seeking to improve engagement consistency should consider increasing the flexible in home visitor job responsibilities and examining the current expected-visit policies followed by home visitors on difficult-to-engage families.
Full Text Available Researchers and practitioners often use standardized vocabulary tests such as the Peabody Picture Vocabulary Test-4 (PPVT-4; Dunn and Dunn, 2007 and its companion, the Expressive Vocabulary Test-2 (EVT-2; Williams, 2007, to assess English vocabulary skills as an indicator of children's school readiness. Despite their psychometric excellence in the norm sample, issues arise when standardized vocabulary tests are used to asses children from culturally, linguistically and ethnically diverse backgrounds (e.g., Spanish-speaking English language learners or delayed in some manner. One of the biggest challenges is establishing the appropriateness of these measures with non-English or non-standard English speaking children as often they score one to two standard deviations below expected levels (e.g., Lonigan et al., 2013. This study re-examines the issues in analyzing the PPVT-4 and EVT-2 scores in a sample of 4-to-5-year-old low SES Hispanic preschool children who were part of a larger randomized clinical trial on the effects of a supplemental English shared-reading vocabulary curriculum (Pollard-Durodola et al., 2016. It was found that data exhibited strong floor effects and the presence of floor effects made it difficult to differentiate the invention group and the control group on their vocabulary growth in the intervention. A simulation study is then presented under the multilevel structural equation modeling (MSEM framework and results revealed that in regular multilevel data analysis, ignoring floor effects in the outcome variables led to biased results in parameter estimates, standard error estimates, and significance tests. Our findings suggest caution in analyzing and interpreting scores of ethnically and culturally diverse children on standardized vocabulary tests (e.g., floor effects. It is recommended appropriate analytical methods that take into account floor effects in outcome variables should be considered.
Netzer, Colonel Gideon
This paper presents a generic model for dealing with security problems along borders between countries. It presents descriptions and characteristics of various borders and identifies the threats to border security, while emphasizing cooperative monitoring solutions.
Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran
Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.
Melchiorre, Maria Gabriella; Di Rosa, Mirko; Lamura, Giovanni; Torres-Gonzales, Francisco; Lindert, Jutta; Stankunas, Mindaugas; Ioannidi-Kapolou, Elisabeth; Barros, Henrique; Macassa, Gloria; Soares, Joaquim J F
Several studies on elder abuse indicate that a large number of victims are women, but others report that men in later life are also significantly abused, especially when they show symptoms of disability and poor health, and require help for their daily activities as a result. This study focused on the prevalence of different types of abuse experienced by men and on a comparison of male victims and non-victims concerning demographic/socio-economic characteristics, lifestyle/health variables, social support and quality of life. Additionally, the study identified factors associated with different types of abuse experienced by men and characteristics associated with the victims. The cross-sectional data concerning abuse in the past 12 months were collected by means of interviews and self-response during January-July 2009, from a sample of 4,467 not demented individuals aged between 60-84 years living in seven European countries (Germany, Greece, Italy, Lithuania, Portugal, Spain and Sweden). We used a multilevel approach, within the framework of an Ecological Model, to explore the phenomenon of abuse against males as the complex result of factors from multiple levels: individual, relational, community and societal. Multivariate analyses showed that older men educated to higher levels, blue-collar workers and men living in a rented accommodation were more often victims than those educated to lower levels, low-rank white-collar workers and home owners, respectively. In addition, high scores for factors such as somatic and anxiety symptoms seemed linked with an increased probability of being abused. Conversely, factors such as increased age, worries about daily expenses (financial strain) and greater social support seemed linked with a decreased probability of being abused. Male elder abuse is under-recognized, under-detected and under-reported, mainly due to the vulnerability of older men and to social/cultural norms supporting traditional male characteristics of
Quistberg, D Alex; Howard, Eric J; Ebel, Beth E; Moudon, Anne V; Saelens, Brian E; Hurvitz, Philip M; Curtin, James E; Rivara, Frederick P
Walking is a popular form of physical activity associated with clear health benefits. Promoting safe walking for pedestrians requires evaluating the risk of pedestrian-motor vehicle collisions at specific roadway locations in order to identify where road improvements and other interventions may be needed. The objective of this analysis was to estimate the risk of pedestrian collisions at intersections and mid-blocks in Seattle, WA. The study used 2007-2013 pedestrian-motor vehicle collision data from police reports and detailed characteristics of the microenvironment and macroenvironment at intersection and mid-block locations. The primary outcome was the number of pedestrian-motor vehicle collisions over time at each location (incident rate ratio [IRR] and 95% confidence interval [95% CI]). Multilevel mixed effects Poisson models accounted for correlation within and between locations and census blocks over time. Analysis accounted for pedestrian and vehicle activity (e.g., residential density and road classification). In the final multivariable model, intersections with 4 segments or 5 or more segments had higher pedestrian collision rates compared to mid-blocks. Non-residential roads had significantly higher rates than residential roads, with principal arterials having the highest collision rate. The pedestrian collision rate was higher by 9% per 10 feet of street width. Locations with traffic signals had twice the collision rate of locations without a signal and those with marked crosswalks also had a higher rate. Locations with a marked crosswalk also had higher risk of collision. Locations with a one-way road or those with signs encouraging motorists to cede the right-of-way to pedestrians had fewer pedestrian collisions. Collision rates were higher in locations that encourage greater pedestrian activity (more bus use, more fast food restaurants, higher employment, residential, and population densities). Locations with higher intersection density had a lower
Maria Gabriella Melchiorre
Full Text Available Several studies on elder abuse indicate that a large number of victims are women, but others report that men in later life are also significantly abused, especially when they show symptoms of disability and poor health, and require help for their daily activities as a result. This study focused on the prevalence of different types of abuse experienced by men and on a comparison of male victims and non-victims concerning demographic/socio-economic characteristics, lifestyle/health variables, social support and quality of life. Additionally, the study identified factors associated with different types of abuse experienced by men and characteristics associated with the victims.The cross-sectional data concerning abuse in the past 12 months were collected by means of interviews and self-response during January-July 2009, from a sample of 4,467 not demented individuals aged between 60-84 years living in seven European countries (Germany, Greece, Italy, Lithuania, Portugal, Spain and Sweden. We used a multilevel approach, within the framework of an Ecological Model, to explore the phenomenon of abuse against males as the complex result of factors from multiple levels: individual, relational, community and societal.Multivariate analyses showed that older men educated to higher levels, blue-collar workers and men living in a rented accommodation were more often victims than those educated to lower levels, low-rank white-collar workers and home owners, respectively. In addition, high scores for factors such as somatic and anxiety symptoms seemed linked with an increased probability of being abused. Conversely, factors such as increased age, worries about daily expenses (financial strain and greater social support seemed linked with a decreased probability of being abused.Male elder abuse is under-recognized, under-detected and under-reported, mainly due to the vulnerability of older men and to social/cultural norms supporting traditional male
Full Text Available Transport and deposition of particles in the upper tracheobronchial tree were analyzed using a multi-level asymmetric lung bifurcation model. The first three generations of tracheobronchial tree were included in the study. The laryngeal jet at the trachea entrance was modeled as an effective turbulence disturbance, and the study was focused on how to accurately simulate the airflow and predict the motion of the inhaled particles. Downstream in the lower level of the bronchial region, a laminar flow model was used, as smoother flow condition was expected. Transport and deposition of nano- and micro-scale spherical particles in the range of 0.01 μm to 30 μm were evaluated. The particle local deposition pattern and deposition rate in the lung bifurcation was discussed. The proposed multi-level asymmetric lung bifurcation model was found to be flexible, easy to use and computationally highly efficient. It was also shown that the selection of the anisotropic Reynolds stress transport turbulence model (RSTM was appropriate, and the use of the enhanced two-layer model boundary treatment was needed for accurate simulation of the turbulent airflow conditions in the upper airways.
Neal, Andrew; Hannah, Sam; Sanderson, Penelope; Bolland, Scott; Mooij, Martijn; Murphy, Sean
The aim of this study was to develop a model capable of predicting variability in the mental workload experienced by frontline operators under routine and nonroutine conditions. Excess workload is a risk that needs to be managed in safety-critical industries. Predictive models are needed to manage this risk effectively yet are difficult to develop. Much of the difficulty stems from the fact that workload prediction is a multilevel problem. A multilevel workload model was developed in Study I with data collected from an en route air traffic management center. Dynamic density metrics were used to predict variability in workload within and between work units while controlling for variability among raters.The model was cross-validated in Studies 2 and 3 with the use of a high-fidelity simulator. Reported workload generally remained within the bounds of the 90% prediction interval in Studies 2 and 3. Workload crossed the upper bound of the prediction interval only under nonroutine conditions. Qualitative analyses suggest that nonroutine events caused workload to cross the upper bound of the prediction interval because the controllers could not manage their workload strategically. The model performed well under both routine and nonroutine conditions and over different patterns of workload variation. Workload prediction models can be used to support both strategic and tactical workload management. Strategic uses include the analysis of historical and projected workflows and the assessment of staffing needs.Tactical uses include the dynamic reallocation of resources to meet changes in demand.
Jensen, Meiko; Feja, Sven
a transformation that automatically derives WS-SecurityPolicy-conformant security policies from the process model, which in conjunction with the generated WS-BPEL processes and WSDL documents provides the ability to deploy and run the complete security-enhanced process based on Web Service technology.......The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality...... of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide...
Paletou, Frederic; Leger, Ludovick
The vast majority of recent advances in the field of numerical radiative transfer relies on approximate operator methods better known in astrophysics as Accelerated Lambda-Iteration (ALI). A superior class of iterative schemes, in term of rates of convergence, such as Gauss-Seidel and successive overrelaxation methods were therefore quite naturally introduced in the field of radiative transfer by Trujillo Bueno and Fabiani Bendicho [A novel iterative scheme for the very fast and accurate solution of non-LTE radiative transfer problems. Astrophys J 1995;455:646]; it was thoroughly described for the non-LTE two-level atom case. We describe hereafter in details how such methods can be generalized when dealing with non-LTE unpolarised radiation transfer with multilevel atomic models, in monodimensional geometry
Feng, Nan; Zheng, Chundong
Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.
Cryptography is a mathematical technique that plays an important role in information security techniques for addressing authentication, interactive proofs, data origination, sender/receiver identity, non-repudiation, secure computation, data integrity and confidentiality, message integrity checking and digital signatures.
Chernov, Alexey; Hoel, Haakon; Law, Kody; Nobile, Fabio; Tempone, Raul
This work embeds a multilevel Monte Carlo (MLMC) sampling strategy into the Monte Carlo step of the ensemble Kalman filter (EnKF). In terms of computational cost vs. approximation error the asymptotic performance of the multilevel ensemble Kalman filter (MLEnKF) is superior to the EnKF s.
This work embeds a multilevel Monte Carlo (MLMC) sampling strategy into the Monte Carlo step of the ensemble Kalman filter (EnKF). In terms of computational cost vs. approximation error the asymptotic performance of the multilevel ensemble Kalman filter (MLEnKF) is superior to the EnKF s.
Mohd Alwi, Najwa Hayaati
The motivation to conduct this research has come from awareness that the Internet exposes the e-learning environment to information security threats and vulnerabilities. Information security management as practised as a top down approach in many organisations tend to detach of people’s responsibility in ensuring the security of e-learning. Literature has pointed out that people’s behaviour required to be addressed to control the information security threats. This research proposes an ISM huma...
Lindgren, Peter; Taran, Yariv
of secure business models and how business models can be operated and innovated in a secure context have intensified tremendously. The development of new mobile and wireless security technologies gives hopes to really realize a secure cloud clustering society where business models can act and be innovated......The development and innovation of business models to a secure distributed cloud clustering society (DISC)—is indeed still a complex venture and has not been widely researched yet. Numerous types of security technologies are in these years proposed and in the “slip stream” of these the study...... secure—but we still have some steps to go before we reach the final destination. The paper gives a conceptual futuristic outlook on behalf of the input from SW2010 and state of the art business model research to what we can expect of business Model and business model innovation in a future secure cloud...
Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...
Relevant Security Standards, Certifications, and Guidance NIST SP 800 series ISO /IEC 27001 framework Cloud Security Alliance Statement of...CSA Domains / Cloud Features ISO 27001 Cloud Service Provider Responsibility Government Agency Responsibility Analyze Security gaps Compensating
Henry, Matthew H; Haimes, Yacov Y
The risk of cyber attacks on process control networks (PCN) is receiving significant attention due to the potentially catastrophic extent to which PCN failures can damage the infrastructures and commodity flows that they support. Risk management addresses the coupled problems of (1) reducing the likelihood that cyber attacks would succeed in disrupting PCN operation and (2) reducing the severity of consequences in the event of PCN failure or manipulation. The Network Security Risk Model (NSRM) developed in this article provides a means of evaluating the efficacy of candidate risk management policies by modeling the baseline risk and assessing expectations of risk after the implementation of candidate measures. Where existing risk models fall short of providing adequate insight into the efficacy of candidate risk management policies due to shortcomings in their structure or formulation, the NSRM provides model structure and an associated modeling methodology that captures the relevant dynamics of cyber attacks on PCN for risk analysis. This article develops the NSRM in detail in the context of an illustrative example.
Houghton, Robert F.
A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…
Steele, Fiona; Rasbash, Jon; Jenkins, Jennifer
There has been substantial interest in the social and health sciences in the reciprocal causal influences that people in close relationships have on one another. Most research has considered reciprocal processes involving only 2 units, although many social relationships of interest occur within a larger group (e.g., families, work groups, peer groups, classrooms). This article presents a general longitudinal multilevel modeling framework for the simultaneous estimation of reciprocal relationships among individuals with unique roles operating in a social group. We use family data for illustrative purposes, but the model is generalizable to any social group in which measurements of individuals in the social group occur over time, individuals have unique roles, and clustering of the data is evident. We allow for the possibility that the outcomes of family members are influenced by a common set of unmeasured family characteristics. The multilevel model we propose allows for residual variation in the outcomes of parents and children at the occasion, individual, and family levels and residual correlation between parents and children due to the unmeasured shared environment, genetic factors, and shared measurement. Another advantage of this method over approaches used in previous family research is it can handle mixed family sizes. The method is illustrated in an analysis of maternal depression and child delinquency using data from the Avon Brothers and Sisters Study. PsycINFO Database Record (c) 2013 APA, all rights reserved.
Full Text Available A process of market regulation and a system of multi-level governance and several supranational, national and subnational levels of decision making, European integration subscribes to being a multilevel phenomenon. The individual characteristics of citizens, as well as the environment where the integration process takes place, are important. To understand the European integration and its consequences it is important to develop and test multi-level theories that consider individual-level characteristics, as well as the overall context where individuals act and express their characteristics. A central argument of this paper is that support for European integration is influenced by factors operating at different levels. We review and present theories and related research on the use of multilevel analysis in the European area. This paper draws insights on various aspects and consequences of the European integration to take stock of what we know about how and why to use multilevel modeling.
Arenas, A.; Aziz, Benjamin; Bicarregui, J.; Matthews, B.; Yang, E.
In this paper, we discuss the use of formal requirements-engineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to represent two security goals for Grid systems, namely authorisation and single-sign on authentication. We apply goal-refinement to derive security requirements for these two security goals and we develop a model of antigoals and show how system vulnerabilities and threats to the security goals can arise from such anti-m...
Rutqvist, J.; Rinaldi, A. P.; Cappa, F.; Jeanne, P.; Mazzoldi, A.; Urpi, L.; Vilarrasa, V.; Guglielmi, Y.
This presentation summarizes recent modeling studies on geomechanical aspects related to Geologic Carbon Sequestration (GCS,) including modeling potential fault reactivation, seismicity and CO2 leakage. The model simulations demonstrates that the potential for fault reactivation and the resulting seismic magnitude as well as the potential for creating a leakage path through overburden sealing layers (caprock) depends on a number of parameters such as fault orientation, stress field, and rock properties. The model simulations further demonstrate that seismic events large enough to be felt by humans requires brittle fault properties as well as continuous fault permeability allowing for the pressure to be distributed over a large fault patch to be ruptured at once. Heterogeneous fault properties, which are commonly encountered in faults intersecting multilayered shale/sandstone sequences, effectively reduce the likelihood of inducing felt seismicity and also effectively impede upward CO2 leakage. Site specific model simulations of the In Salah CO2 storage site showed that deep fractured zone responses and associated seismicity occurred in the brittle fractured sandstone reservoir, but at a very substantial reservoir overpressure close to the magnitude of the least principal stress. It is suggested that coupled geomechanical modeling be used to guide the site selection and assisting in identification of locations most prone to unwanted and damaging geomechanical changes, and to evaluate potential consequence of such unwanted geomechanical changes. The geomechanical modeling can be used to better estimate the maximum sustainable injection rate or reservoir pressure and thereby provide for improved CO2 storage security. Whether damaging geomechanical changes could actually occur very much depends on the local stress field and local reservoir properties such the presence of ductile rock and faults (which can aseismically accommodate for the stress and strain induced by
Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.
Rush, Jonathan; Hofer, Scott M
The Positive and Negative Affect Schedule (PANAS) is a widely used measure of emotional experience. The factor structure of the PANAS has been examined predominantly with cross-sectional designs, which fails to disaggregate within-person variation from between-person differences. There is still uncertainty as to the factor structure of positive and negative affect and whether they constitute 2 distinct independent factors. The present study examined the within-person and between-person factor structure of the PANAS in 2 independent samples that reported daily affect over 7 and 14 occasions, respectively. Results from multilevel confirmatory factor analyses revealed that a 2-factor structure at both the within-person and between-person levels, with correlated specific factors for overlapping items, provided good model fit. The best-fitting solution was one where within-person factors of positive and negative affect were inversely correlated, but between-person factors were independent. The structure was further validated through multilevel structural equation modeling examining the effects of cognitive interference, daily stress, physical symptoms, and physical activity on positive and negative affect factors.
Dunn, Erin C; Richmond, Tracy K; Milliren, Carly E; Subramanian, S V
Despite much interest in understanding the influence of contexts on health, most research has focused on one context at a time, ignoring the reality that individuals have simultaneous memberships in multiple settings. Using the example of smoking behavior among adolescents in the National Longitudinal Study of Adolescent Health, we applied cross-classified multilevel modeling (CCMM) to examine fixed and random effects for schools and neighborhoods. We compared the CCMM results with those obtained from a traditional multilevel model (MLM) focused on either the school and neighborhood separately. In the MLMs, 5.2% of the variation in smoking was due to differences between neighborhoods (when schools were ignored) and 6.3% of the variation in smoking was due to differences between schools (when neighborhoods were ignored). However in the CCMM examining neighborhood and school variation simultaneously, the neighborhood-level variation was reduced to 0.4%. Results suggest that using MLM, instead of CCMM, could lead to overestimating the importance of certain contexts and could ultimately lead to targeting interventions or policies to the wrong settings. Copyright © 2014 Elsevier Ltd. All rights reserved.
Pardalos, Panos; Värbrand, Peter
Researchers working with nonlinear programming often claim "the word is non linear" indicating that real applications require nonlinear modeling. The same is true for other areas such as multi-objective programming (there are always several goals in a real application), stochastic programming (all data is uncer tain and therefore stochastic models should be used), and so forth. In this spirit we claim: The word is multilevel. In many decision processes there is a hierarchy of decision makers, and decisions are made at different levels in this hierarchy. One way to handle such hierar chies is to focus on one level and include other levels' behaviors as assumptions. Multilevel programming is the research area that focuses on the whole hierar chy structure. In terms of modeling, the constraint domain associated with a multilevel programming problem is implicitly determined by a series of opti mization problems which must be solved in a predetermined sequence. If only two levels are considered, we have ...
This work embeds a multilevel Monte Carlo sampling strategy into the Monte Carlo step of the ensemble Kalman filter (EnKF) in the setting of finite dimensional signal evolution and noisy discrete-time observations. The signal dynamics is assumed to be governed by a stochastic differential equation (SDE), and a hierarchy of time grids is introduced for multilevel numerical integration of that SDE. The resulting multilevel EnKF is proved to asymptotically outperform EnKF in terms of computational cost versus approximation accuracy. The theoretical results are illustrated numerically.
Hoel, Hakon; Law, Kody J. H.; Tempone, Raul
This work embeds a multilevel Monte Carlo sampling strategy into the Monte Carlo step of the ensemble Kalman filter (EnKF) in the setting of finite dimensional signal evolution and noisy discrete-time observations. The signal dynamics is assumed to be governed by a stochastic differential equation (SDE), and a hierarchy of time grids is introduced for multilevel numerical integration of that SDE. The resulting multilevel EnKF is proved to asymptotically outperform EnKF in terms of computational cost versus approximation accuracy. The theoretical results are illustrated numerically.
van der Wusten, H.; Agnew, J.; Mamadouh, V.; Secor, A.J.; Sharp, J.
Federalism and multilevel governance both emphasize polycentricity in governing arrangements. With their different intellectual pedigrees, these concepts are discussed in two separate sections. Fragments are now increasingly mixed up in hybrid forms of governance that also encompass originally
Full Text Available The paper presents a mathematical model for the optimal security-technology investment evaluation and decision-making processes based on the quantitative analysis of security risks and digital asset assessments in an enterprise. The model makes use of the quantitative analysis of different security measures that counteract individual risks by identifying the information system processes in an enterprise and the potential threats. The model comprises the target security levels for all identified business processes and the probability of a security accident together with the possible loss the enterprise may suffer. The selection of security technology is based on the efficiency of selected security measures. Economic metrics are applied for the efficiency assessment and comparative analysis of different protection technologies. Unlike the existing models for evaluation of the security investment, the proposed model allows direct comparison and quantitative assessment of different security measures. The model allows deep analyses and computations providing quantitative assessments of different options for investments, which translate into recommendations facilitating the selection of the best solution and the decision-making thereof. The model was tested using empirical examples with data from real business environment.
System security assessment tools are either restricted to manual risk evaluation methodologies that are not appropriate for real-time application or used to determine the impact of certain events on the security status of networked systems. In this paper, we determine the strength of computer systems from the perspective of ...
Jönsson, B.H.B.; Schoutens, W.
Asset backed securities (ABSs) are structured finance products backed by pools of assets and are created through a securitisation process. The risks in asset backed securities, such as, credit risk, prepayment risk, market risks, operational risk, and legal risks, are directly connected with the
Che Wan Jasimah bt Wan Mohamed Radzi; Huang Hui; Nur Anisah Binti Mohamed @ A. Rahman; Hashem Salarzadeh Jenatabadi
Structural Equation Modeling (SEM) has been used extensively in sustainability studies to model relationships among latent and manifest variables. This paper provides a tutorial exposition of the SEM approach in food security studies and introduces a basic framework based on family food security and children’s environment sustainability. This framework includes family food security and three main concepts representing children’s environment, including children’s BMI, health, and school perfor...
Vladislav D. Veksler; Norbou Buchler; Blaine E. Hoffman; Daniel N. Cassenti; Char Sample; Shridat Sugrim
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision li...
Full Text Available In this article the performance analysis of the new model, used to integration between QoS and Security, is introduced. OPNET modeler simulation testing of the new model with comparation with the standard model is presented. This new model enables the process of cooperation between QoS and Security in MANET. The introduction how the model is implemented to the simulation OPNET modeler is also showed. Model provides possibilities to integration and cooperation of QoS and security by the cross layer design (CLD with modified security service vector (SSV. An overview of the simulation tested of the new model, comparative study in mobile ad-hoc networks, describe requirements and directions for adapted solutions are presented. Main idea of the testing is to show how QoS and Security related services could be provided simultaneously with using minimal interfering with each service.
To keep pace with our adversaries, we must expand the scope of machine learning and reasoning to address the breadth of possible attacks. One approach is to employ an algorithm to learn a set of causal models that describes the entire cyber network and each host end node. Such a learning algorithm would run continuously on the system and monitor activity in real time. With a set of causal models, the algorithm could anticipate novel attacks, take actions to thwart them, and predict the second-order effects flood of information, and the algorithm would have to determine which streams of that flood were relevant in which situations. This paper will present the results of efforts toward the application of a developmental learning algorithm to the problem of cyber security. The algorithm is modeled on the principles of human developmental learning and is designed to allow an agent to learn about the computer system in which it resides through active exploration. Children are flexible learners who acquire knowledge by actively exploring their environment and making predictions about what they will find,1, 2 and our algorithm is inspired by the work of the developmental psychologist Jean Piaget.3 Piaget described how children construct knowledge in stages and learn new concepts on top of those they already know. Developmental learning allows our algorithm to focus on subsets of the environment that are most helpful for learning given its current knowledge. In experiments, the algorithm was able to learn the conditions for file exfiltration and use that knowledge to protect sensitive files.
Full Text Available Abstract Background Diarrhoea disease which has been attributed to poverty constitutes a major cause of morbidity and mortality in children aged five and below in most low-and-middle income countries. This study sought to examine the contribution of individual and neighbourhood socio-economic characteristics to caregiver's treatment choices for managing childhood diarrhoea at household level in sub-Saharan Africa. Methods Multilevel multinomial logistic regression analysis was applied to Demographic and Health Survey data conducted in 11 countries in sub-Saharan Africa. The unit of analysis were the 12,988 caregivers of children who were reported to have had diarrhoea two weeks prior to the survey period. Results There were variability in selecting treatment options based on several socioeconomic characteristics. Multilevel-multinomial regression analysis indicated that higher level of education of both the caregiver and that of the partner, as well as caregivers occupation were associated with selection of medical centre, pharmacies and home care as compared to no treatment. In contrast, caregiver's partners' occupation was negatively associated with selection medical centre and home care for managing diarrhoea. In addition, a low-level of neighbourhood socio-economic disadvantage was significantly associated with selection of both medical centre and pharmacy stores and medicine vendors. Conclusion In the light of the findings from this study, intervention aimed at improving on care seeking for managing diarrhoea episode and other childhood infectious disease should jointly consider the influence of both individual SEP and the level of economic development of the communities in which caregivers of these children resides.
Banks, Sheila B.; Stytz, Martin R.
Simulation environments serve many purposes, but they are only as good as their content. One of the most challenging and pressing areas that call for improved content is the simulation of bot armies (botnets) and their effects upon networks and computer systems. Botnets are a new type of malware, a type that is more powerful and potentially dangerous than any other type of malware. A botnet's power derives from several capabilities including the following: 1) the botnet's capability to be controlled and directed throughout all phases of its activity, 2) a command and control structure that grows increasingly sophisticated, and 3) the ability of a bot's software to be updated at any time by the owner of the bot (a person commonly called a bot master or bot herder.) Not only is a bot army powerful and agile in its technical capabilities, a bot army can be extremely large, can be comprised of tens of thousands, if not millions, of compromised computers or it can be as small as a few thousand targeted systems. In all botnets, their members can surreptitiously communicate with each other and their command and control centers. In sum, these capabilities allow a bot army to execute attacks that are technically sophisticated, difficult to trace, tactically agile, massive, and coordinated. To improve our understanding of their operation and potential, we believe that it is necessary to develop computer security simulations that accurately portray bot army activities, with the goal of including bot army simulations within military simulation environments. In this paper, we investigate issues that arise when simulating bot armies and propose a combination of the biologically inspired MSEIR infection spread model coupled with the jump-diffusion infection spread model to portray botnet propagation.
Heckman, Mark; Joshi, Nikhil; Tylutki, Marcus; Levitt, Karl; Just, James; Clough, Lawrence
The goal of any intrusion detection, anti-virus, firewall or other security mechanism is not simply to stop attacks, but to protect a computing resource so that the resource can continue to perform its function...
Britton, David W; Brown, Ian A
.... The intent is to quantify the risk involved in a single information transaction. Additionally, this thesis will attempt to identify the risk factors involved when calculating the total security risk measurement...
Chapter I : Introduction to Mobile Business and Mobile Banking Chapter II : Review of Literature on Mobile Business Technology, Mobile Banking Services & Security Chapter III : Research Objectives and Methodology Chapter IV : Results and Discussion Chapter V : Summary and Conclusions Bibliography
Ahmed, Naveed; Jensen, Christian D.
achieve only a subset of all fine level goals. We believe that these flexible choices of attackers and security goals are more practical in many real world scenarios. An applications may require the protection against a weaker attacker and may require to achieve fewer security goals....... of communication security. One potent argument often presented is we keep designing new protocols due the demand of new type of applications and due to the discovery of flaws in existing protocols. While designing new protocols for new type of applications, such as RFID, is definitely an important driving factor....... In fact, the most of the published protocols are considered insecure from this point of view. In practice, however, this approach has a side effect, namely, we rarely bother to explore how much insecure is the protocol. This question asks us to explore the area between security and insecurity; after all...
.... Cameras, sensors and other components used along with the simple rules in the home automation software provide an environment where the lights, security and other appliances can be monitored and controlled...
N. Elisov Lev
Full Text Available The authors’ original problem-solution-approach concerning aviation security management in civil aviation apply- ing parallel calculation processes method and the usage of neural computers is considered in this work. The statement of secure environment modeling problems for grid models and with the use of neural networks is presented. The research sub- ject area of this article is airport activity in the field of civil aviation, considered in the context of aviation security, defined as the state of aviation security against unlawful interference with the aviation field. The key issue in this subject area is aviation safety provision at an acceptable level. In this case, airport security level management becomes one of the main objectives of aviation security. Aviation security management is organizational-regulation in modern systems that can no longer correspond to changing requirements, increasingly getting complex and determined by external and internal envi- ronment factors, associated with a set of potential threats to airport activity. Optimal control requires the most accurate identification of management parameters and their quantitative assessment. The authors examine the possibility of applica- tion of mathematical methods for the modeling of security management processes and procedures in their latest works. Par- allel computing methods and network neurocomputing for modeling of airport security control processes are examined in this work. It is shown that the methods’ practical application of the methods is possible along with the decision support system, where the decision maker plays the leading role.
Kovačević-Lepojević Marina M.
Full Text Available The model of technological pragmatism assumes awareness that technological development involves both benefits and dangers. Most modern security technologies represent citizens' mass surveillance tools, which can lead to compromising a significant amount of personal data due to the lack of institutional monitoring and control. On the other hand, people are interested in improving crime control and reducing the fear of potential victimization which this framework provides as a rational justification for the apparent loss of privacy, personal rights and freedoms. Citizens' perception on the categories of security and privacy, and their balancing, can provide the necessary guidelines to regulate the application of security technologies in the actual context. The aim of this paper is to analyze the attitudes of students at the University of Belgrade (N = 269 toward the application of security technology and identification of the key dimensions. On the basis of the relevant research the authors have formed assumptions about the following dimensions: security, privacy, trust in institutions and concern about the misuse of security technology. The Prise Questionnaire on Security Technology and Privacy was used for data collection. Factor analysis abstracted eight factors which together account for 58% of variance, with the highest loading of the four factors that are identified as security, privacy, trust and concern. The authors propose a model of technological pragmatism considering security and privacy. The data also showed that students are willing to change their privacy for the purpose of improving security and vice versa.
Shin, Jin Soo; Heo, Gyun Young [Kyung Hee University, Youngin (Korea, Republic of); Kang, Hyun Gook [KAIST, Dajeon (Korea, Republic of); Son, Han Seong [Joongbu University, Chubu (Korea, Republic of)
There are several advantages to use digital equipment such as cost, convenience, and availability. It is inevitable to use the digital I and C equipment replaced analog. Nuclear facilities have already started applying the digital system to I and C system. However, the nuclear facilities also have to change I and C system even though it is difficult to use digital equipment due to high level of safety, irradiation embrittlement, and cyber security. A cyber security which is one of important concerns to use digital equipment can affect the whole integrity of nuclear facilities. For instance, cyber-attack occurred to nuclear facilities such as the SQL slammer worm, stuxnet, DUQU, and flame. The regulatory authorities have published many regulatory requirement documents such as U.S. NRC Regulatory Guide 5.71, 1.152, IAEA guide NSS-17, IEEE Standard, and KINS Regulatory Guide. One of the important problem of cyber security research for nuclear facilities is difficulty to obtain the data through the penetration experiments. Therefore, we make cyber security risk evaluation model with Bayesian network (BN) for nuclear reactor protection system (RPS), which is one of the safety-critical systems to trip the reactor when the accident is happened to the facilities. BN can be used for overcoming these problems. We propose a method to apply BN cyber security model to probabilistic safety assessment (PSA) model, which had been used for safety assessment of system, structure and components of facility. The proposed method will be able to provide the insight of safety as well as cyber risk to the facility.
Shin, Jin Soo; Heo, Gyun Young; Kang, Hyun Gook; Son, Han Seong
There are several advantages to use digital equipment such as cost, convenience, and availability. It is inevitable to use the digital I and C equipment replaced analog. Nuclear facilities have already started applying the digital system to I and C system. However, the nuclear facilities also have to change I and C system even though it is difficult to use digital equipment due to high level of safety, irradiation embrittlement, and cyber security. A cyber security which is one of important concerns to use digital equipment can affect the whole integrity of nuclear facilities. For instance, cyber-attack occurred to nuclear facilities such as the SQL slammer worm, stuxnet, DUQU, and flame. The regulatory authorities have published many regulatory requirement documents such as U.S. NRC Regulatory Guide 5.71, 1.152, IAEA guide NSS-17, IEEE Standard, and KINS Regulatory Guide. One of the important problem of cyber security research for nuclear facilities is difficulty to obtain the data through the penetration experiments. Therefore, we make cyber security risk evaluation model with Bayesian network (BN) for nuclear reactor protection system (RPS), which is one of the safety-critical systems to trip the reactor when the accident is happened to the facilities. BN can be used for overcoming these problems. We propose a method to apply BN cyber security model to probabilistic safety assessment (PSA) model, which had been used for safety assessment of system, structure and components of facility. The proposed method will be able to provide the insight of safety as well as cyber risk to the facility
Maria Eugénia Ferrão
Full Text Available Abstract The paper extends the literature on grade repetition in Brazil by (a describing and synthesizing the main research findings and contributions since 1940, (b enlarging the understanding of the inequity mechanism in education, and (c providing new findings on the effects of the school socioeconomic composition and school proportion of repeaters on the individual probability of grade repetition. Based on the analyses of empirical distributions and multilevel logistic modelling of PISA 2012 data, the findings indicate that higher student socioeconomic status is associated with lower probability of repetition, there is a cumulative risk of repetition after an early repetition, the school socioeconomic composition is strongly correlated with the school proportion of repeaters, and both are related to the individual probability of repetition. The results suggest the existence of a pattern that cumulatively reinforces the effects of social disadvantage, in which the school plays a central role.
Yoshida, Kazuo; Tanabe, Fumiya; Kawase, Katumi.
It has been proposed to use the Multilevel Flow Modeling (MFM) by M. Lind as a framework for functional knowledge representation for qualitative reasoning in a complex process system such as nuclear power plant. To build a knowledge base with MFM framework makes it possible to represent functional characteristics in different levels of abstraction and aggregation. A pilot inference system based on the qualitative reasoning with MFM has been developed to diagnose a cause of abnormal events in a typical PWR power plant. Some single failure events has been diagnosed with this system to verify the proposed method. In the verification study, some investigation has been also performed to clarify the effects of this knowledge representation in efficiency of reasoning and ambiguity of qualitative reasoning. (author)
Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.
This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.
Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.
is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....
Space Vector Pulse Width Modulation of a Multi-Level Diode Clamped ... of MATLAB /SIMULINK modeling of the space vector pulse-width modulation and the ... two adjacent active vectors in determining the switching process of the multilevel ...
LI Xinghua; MA Jianfeng; SangJae Moon
The Canetti-Krawczyk (CK) model is a formalism for the analysis of keyexchange protocols, which can guarantee many security properties for the protocols proved secure by this model. But we find this model lacks the ability to guarantee key generation center (KGC) forward secrecy, which is an important security property for key-agreement protocols based on Identity. The essential reason leading to this weakness is that it does not fully consider the attacker's capabilities. In this paper, the CK model is accordingly extended with a new additional attacker's capability of the KGC corruption in Identity-based systems, which enables it to support KGC forward secrecy.
Rodgers, Jocelyn M.; Fast, Patton L.; Truhlar, Donald G.
Geometry optimization has been carried out for three test molecules using six multilevel electronic structure methods, in particular Gaussian-2, Gaussian-3, multicoefficient G2, multicoefficient G3, and two multicoefficient correlation methods based on correlation-consistent basis sets. In the Gaussian-2 and Gaussian-3 methods, various levels are added and subtracted with unit coefficients, whereas the multicoefficient Gaussian-x methods involve noninteger parameters as coefficients. The multilevel optimizations drop the average error in the geometry (averaged over the 18 cases) by a factor of about two when compared to the single most expensive component of a given multilevel calculation, and in all 18 cases the accuracy of the atomization energy for the three test molecules improves; with an average improvement of 16.7 kcal/mol.
Rodgers, Jocelyn M. [Department of Chemistry and Supercomputer Institute, University of Minnesota, Minneapolis, Minnesota 55455-0431 (United States); Fast, Patton L. [Department of Chemistry and Supercomputer Institute, University of Minnesota, Minneapolis, Minnesota 55455-0431 (United States); Truhlar, Donald G. [Department of Chemistry and Supercomputer Institute, University of Minnesota, Minneapolis, Minnesota 55455-0431 (United States)
Geometry optimization has been carried out for three test molecules using six multilevel electronic structure methods, in particular Gaussian-2, Gaussian-3, multicoefficient G2, multicoefficient G3, and two multicoefficient correlation methods based on correlation-consistent basis sets. In the Gaussian-2 and Gaussian-3 methods, various levels are added and subtracted with unit coefficients, whereas the multicoefficient Gaussian-x methods involve noninteger parameters as coefficients. The multilevel optimizations drop the average error in the geometry (averaged over the 18 cases) by a factor of about two when compared to the single most expensive component of a given multilevel calculation, and in all 18 cases the accuracy of the atomization energy for the three test molecules improves; with an average improvement of 16.7 kcal/mol. (c) 2000 American Institute of Physics.
Full Text Available Allometric models of internodes are an important component of Functional-Structural Plant Models (FSPMs, which represent the shape of internodes in tree architecture and help our understanding of resource allocation in organisms. Constant allometry is always assumed in these models. In this paper, multilevel nonlinear mixed-effect models were used to characterize the variability of internode allometry, describing the relationship between the last internode length and biomass of Pinus tabulaeformis Carr. trees within the GreenLab framework. We demonstrated that there is significant variability in allometric relationships at the tree and different-order branch levels, and the variability decreases among levels from trees to first-order branches and, subsequently, to second-order branches. The variability was partially explained by the random effects of site characteristics, stand age, density, and topological position of the internode. Tree- and branch-level-specific allometric models are recommended because they produce unbiased and accurate internode length estimates. The model and method developed in this study are useful for understanding and describing the structure and functioning of trees.
Giacobe, Nicklaus A.
A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.
Ng, Chee W
.... Discrete-event simulation (DES) was used to simulate a typical port-security, local, waterside-threat response model and to test the adaptive response of asymmetric threats in reaction to port-security procedures, while a multi-agent system (MAS...
Pou, Sonia Alejandra; Díaz, María del Pilar; Osella, Alberto Rubén
Scientific literature has consistently shown the effects of certain diets on health but regional variations of dietary habits, and their relationship colorectal cancer (CRC) has been poorly studied in Argentina. Our aims were to identify dietary patterns and estimate their effect on CRC occurrence and to quantify the association between family history of CRC and CRC occurrence by applying multilevel models to estimate and interpret measures of variation. Principal components factor analysis was performed to identify dietary patterns that were then used in a multilevel logistic regression applied to an ongoing case-control data about dietary exposure and CRC occurrence taking into account familiar clustering. Three dietary patterns were identified: "Southern Cone pattern" (red meat, wine, and starchy vegetables), "High-sugar drinks pattern", and "Prudent pattern". The study considered 41 cases and 95 controls. There was a significant promoting effects on CRC of "Southern Cone" (OR 1.5, 95%CI 1.0-2.2) and "High-sugar drinks" (OR 3.8, 95%CI 2.0-7.1) patterns, whereas "Prudent pattern" (OR 0.3, 95%CI 0.2-0.4) showed a significant protective effect at third tertile level. BMI, use of NSAIDs, and to have medical insurance showed significant effects. Variance of the random effect of family history of CRC was highly significant. This novel approach for Argentina showed that Southern Cone and High-sugar drinks patterns were associated with a higher risk of CRC, whereas the Prudent pattern showed a protective effect. There was a significant clustering effect of family history of CRC.
Leineweber, C; Chungkham, H S; Westerlund, H; Tishelman, C; Lindqvist, R
The present shortage of registered nurses (RNs) in many European countries is expected to continue and worsen, which poses a substantial threat to the maintenance of healthcare in this region. Work-family conflict is a known risk factor for turnover and sickness absence. This paper empirically examines whether the nurse practice environment is associated with experienced work-family conflict. A multilevel model was fit with the individual RN at the 1st, and the hospital department at the 2nd level using cross-sectional RN survey data from the Swedish part of RN4CAST, an EU 7th framework project. The data analyzed here is based on a national sample of 8356 female and 592 male RNs from 369 hospital departments. We found that 6% of the variability in work-family conflict experienced by RNs was at the department level. Organizational level factors significantly accounted for most of the variability at this level with two of the work practice environment factors examined, staffing adequacy and nurse involvement in hospital affairs, significantly related to work-family conflict. Due to the design of the study, factors on ward and work group levels could not be analyzed, but are likely to account for additional variance which in the present analysis appears to be on the individual level, with private life factors likely explaining another major part. These results suggest that higher level organizational factors in health care have a significant impact on the risk of work-family conflict among RNs through their impact on the nurse practice environment. Lower level organizational factors should be investigated in future studies using hierarchical multilevel sampling. Copyright © 2013 The Authors. Published by Elsevier Ltd.. All rights reserved.