WorldWideScience

Sample records for networks friendly command

  1. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This paper summarizes the research results on the friendly network robotics in fiscal 1996. This research assumes an android robot as an ultimate robot and the future robot system utilizing computer network technology. The robot aiming at human daily work activities in factories or under extreme environments is required to work under usual human work environments. The human robot with similar size, shape and functions to human being is desirable. Such robot having a head with two eyes, two ears and mouth can hold a conversation with human being, can walk with two legs by autonomous adaptive control, and has a behavior intelligence. Remote operation of such robot is also possible through high-speed computer network. As a key technology to use this robot under coexistence with human being, establishment of human coexistent robotics was studied. As network based robotics, use of robots connected with computer networks was also studied. In addition, the R-cube (R{sup 3}) plan (realtime remote control robot technology) was proposed. 82 refs., 86 figs., 12 tabs.

  2. Network-Friendly Gossiping

    Science.gov (United States)

    Serbu, Sabina; Rivière, Étienne; Felber, Pascal

    The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on the underlying layers, notably the Internet routing infrastructure. To make an effective use of network resources, protocols should both limit the stress (amount of messages) on each infrastructure entity like routers and links, and balance as much as possible the load in the network. Most protocols use application-level metrics such as delays to improve efficiency of content dissemination or routing, but the extend to which such application-centric optimizations help reduce and balance the load imposed to the infrastructure is unclear. In this paper, we elaborate on the design of such network-friendly protocols and associated metrics. More specifically, we investigate random-based gossip dissemination. We propose and evaluate different ways of making this representative protocol network-friendly while keeping its desirable properties (robustness and low delays). Simulations of the proposed methods using synthetic and real network topologies convey and compare their abilities to reduce and balance the load while keeping good performance.

  3. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    A working group (WG) study was conducted aiming at realizing human type robots. The following six working groups in the basement field were organized to study in terms mostly of items of technical development and final technical targets: platform, and remote attendance control in the basement field, maintenance of plant, etc., home service, disaster/construction, and entertainment in the application field. In the platform WG, a robot of human like form is planning which walks with two legs and works with two arms, and the following were discussed: a length of 160cm, weight of 110kg, built-in LAN, actuator specifications, modulated structure, intelligent driver, etc. In the remote attendance control WG, remote control using working function, stabilized movement, stabilized control, and network is made possible. Studied were made on the decision on a remote control cockpit by open architecture added with function and reformable, problems on the development of the standard language, etc. 77 ref., 82 figs., 21 tabs.

  4. Human Systems Integration Assessment of Network Centric Command and Control

    National Research Council Canada - National Science Library

    Quashnock, Dee; Kelly, Richard T; Dunaway, John; Smillie, Robert J

    2004-01-01

    .... FORCEnet is the operational construct and architectural framework for Naval Network Centric Warfare in the information age that integrates warriors, sensors, networks, command and control, platforms...

  5. A Commander in Chief's Network-Centric Odyssey

    National Research Council Canada - National Science Library

    Copley, E

    2002-01-01

    .... Each Armed Service has begun training and equipping its force using the tenets of Network-Centric Operations, but those forces come together for the first time under the combatant Commander-in-Chief...

  6. Friend suggestion in social network based on user log

    Science.gov (United States)

    Kaviya, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    Simple friend recommendation algorithms such as similarity, popularity and social aspects is the basic requirement to be explored to methodically form high-performance social friend recommendation. Suggestion of friends is followed. No tags of character were followed. In the proposed system, we use an algorithm for network correlation-based social friend recommendation (NC-based SFR).It includes user activities like where one lives and works. A new friend recommendation method, based on network correlation, by considering the effect of different social roles. To model the correlation between different networks, we develop a method that aligns these networks through important feature selection. We consider by preserving the network structure for a more better recommendations so that it significantly improves the accuracy for better friend-recommendation.

  7. Ethnic Differences among Friend Networks Later in Life

    Science.gov (United States)

    Kang, Hyunsook; Hebert, Corie

    2014-01-01

    This study seeks to broaden the understanding of friend relationships in older adults and the differences in those friend relationships among various ethnic groups. Secondary data from the National Social Life, Health and Aging Project (NSHAP) was analyzed to test the hypothesis that Caucasian older adults have stronger friend networks than older…

  8. [Network Design of the Spaceport Command and Control System

    Science.gov (United States)

    Teijeiro, Antonio

    2017-01-01

    I helped the Launch Control System (LCS) hardware team sustain the network design of the Spaceport Command and Control System. I wrote the procedure that will be used to satisfy an official hardware test for the hardware carrying data from the Launch Vehicle. I installed hardware and updated design documents in support of the ongoing development of the Spaceport Command and Control System and applied firewall experience I gained during my spring 2017 semester to inspect and create firewall security policies as requested. Finally, I completed several online courses concerning networking fundamentals and Unix operating systems.

  9. Using LTE Networks for UAV Command and Control Link

    DEFF Research Database (Denmark)

    Nguyen, Huan Cong; Amorim, Rafhael Medeiros de; Wigard, Jeroen

    2017-01-01

    In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss on the hei......In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss...... on the height of the UAV, which is derived from actual measurements, and a real-world cellular network layout and configuration. The results indicate that interference is the dominant factor limiting the cellular coverage for UAVs in the downlink: outage level increases from 4.2% at 1.5 m height to 51.7% at 120...

  10. Friends First? The Peer Network Origins of Adolescent Dating

    Science.gov (United States)

    Kreager, Derek A.; Molloy, Lauren E.; Moody, James; Feinberg, Mark E.

    2015-01-01

    The proximity of dating partners in peer friendship networks has important implications for the diffusion of health-risk behaviors and adolescent social development. We derive two competing hypotheses for the friendship-romance association. The first predicts that daters are proximally positioned in friendship networks prior to dating and that opposite-gender friends are likely to transition to dating. The second predicts that dating typically crosses group boundaries and opposite-gender friends are unlikely to later date. We test these hypotheses with longitudinal friendship data for 626 9th grade PROSPER heterosexual dating couples. Results primarily support the second hypothesis: romantic partners are unlikely to be friends in the previous year or share the same cohesive subgroup, and opposite-gender friends are unlikely to transition into dating. PMID:27134511

  11. To friend or not to friend? Social networking and faculty perceptions of online professionalism.

    Science.gov (United States)

    Chretien, Katherine C; Farnan, Jeanne M; Greysen, S Ryan; Kind, Terry

    2011-12-01

    To assess faculty perceptions of professional boundaries and trainee-posted content on social networking sites (SNS). In June 2010, the Clerkship Directors in Internal Medicine conducted its annual survey of U.S. and Canadian member institutions. The survey included sections on demographics and social networking. The authors used descriptive statistics and tests of association to analyze the Likert scale responses and qualitatively analyzed the free-text responses. Of 110 institutional members, 82 (75%) responded to the survey. Of the 40 respondents who reported current or past SNS use, 21 (53%) reported receiving a "friend request" from a current student and 25 (63%) from a current resident. Of these, 4 (19%) accepted the student request and 12 (48%) accepted the resident request. Sixty-three of 80 (79%) felt it was inappropriate to send a friend request to a current student, 61 (76%) to accept a current student's request, 42 (53%) to become friends with a current resident, and 61 (81%) to become friends with a current patient. Becoming friends with a former student, former resident, or colleague was perceived as more appropriate. Younger respondents were less likely to deem specific student behaviors inappropriate (odds ratio [OR] 0.18-0.79; adjusted OR 0.12-0.86, controlling for respondents' sex, rank, and SNS use), although none reached statistical significance. Some internal medicine educators are using SNSs and interacting with trainees online. Their perceptions on the appropriateness of social networking behaviors provide some consensus for professional boundaries between faculty and trainees in the digital world.

  12. User-friendly matching protocol for online social networks

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in user can match her profile with that of an off-line stranger, while both profiles are maximally protected. Our solution

  13. Considerations on command and response language features for a network of heterogeneous autonomous computers

    Science.gov (United States)

    Engelberg, N.; Shaw, C., III

    1984-01-01

    The design of a uniform command language to be used in a local area network of heterogeneous, autonomous nodes is considered. After examining the major characteristics of such a network, and after considering the profile of a scientist using the computers on the net as an investigative aid, a set of reasonable requirements for the command language are derived. Taking into account the possible inefficiencies in implementing a guest-layered network operating system and command language on a heterogeneous net, the authors examine command language naming, process/procedure invocation, parameter acquisition, help and response facilities, and other features found in single-node command languages, and conclude that some features may extend simply to the network case, others extend after some restrictions are imposed, and still others require modifications. In addition, it is noted that some requirements considered reasonable (user accounting reports, for example) demand further study before they can be efficiently implemented on a network of the sort described.

  14. Best Friends: Alliances, Friend Ranking, and the MySpace Social Network.

    Science.gov (United States)

    DeScioli, Peter; Kurzban, Robert; Koch, Elizabeth N; Liben-Nowell, David

    2011-01-01

    Like many topics of psychological research, the explanation for friendship is at once intuitive and difficult to address empirically. These difficulties worsen when one seeks, as we do, to go beyond "obvious" explanations ("humans are social creatures") to ask deeper questions, such as "What is the evolved function of human friendship?" In recent years, however, a new window into human behavior has opened as a growing fraction of people's social activity has moved online, leaving a wealth of digital traces behind. One example is a feature of the MySpace social network that allows millions of users to rank their "Top Friends." In this study, we collected over 10 million people's friendship decisions from MySpace to test predictions made by hypotheses about human friendship. We found particular support for the alliance hypothesis, which holds that human friendship is caused by cognitive systems that function to create alliances for potential disputes. Because an ally's support can be undermined by a stronger outside relationship, the alliance model predicts that people will prefer partners who rank them above other friends. Consistent with the alliance model, we found that an individual's choice of best friend in MySpace is strongly predicted by how partners rank that individual. © The Author(s) 2011.

  15. Friends of friends: are indirect connections in social networks important to animal behaviour?

    Science.gov (United States)

    Brent, Lauren J N

    2015-05-01

    Friend of a friend relationships, or the indirect connections between people, influence our health, well-being, financial success and reproductive output. As with humans, social behaviours in other animals often occur within a broad interconnected network of social ties. Yet studies of animal social behaviour tend to focus on associations between pairs of individuals. With the increase in popularity of social network analysis, researchers have started to look beyond the dyad to examine the role of indirect connections in animal societies. Here, I provide an overview of the new knowledge that has been uncovered by these studies. I focus on research that has addressed both the causes of social behaviours, i.e. the cognitive and genetic basis of indirect connections, as well as their consequences, i.e. the impact of indirect connections on social cohesion, information transfer, cultural practices and fitness. From these studies, it is apparent that indirect connections play an important role in animal behaviour, although future research is needed to clarify their contribution.

  16. Friends of friends: are indirect connections in social networks important to animal behaviour?

    Science.gov (United States)

    Brent, Lauren J. N.

    2015-01-01

    Friend of a friend relationships, or the indirect connections between people, influence our health, well-being, financial success and reproductive output. As with humans, social behaviours in other animals often occur within a broad interconnected network of social ties. Yet studies of animal social behaviour tend to focus on associations between pairs of individuals. With the increase in popularity of social network analysis, researchers have started to look beyond the dyad to examine the role of indirect connections in animal societies. Here, I provide an overview of the new knowledge that has been uncovered by these studies. I focus on research that has addressed both the causes of social behaviours, i.e. the cognitive and genetic basis of indirect connections, as well as their consequences, i.e. the impact of indirect connections on social cohesion, information transfer, cultural practices and fitness. From these studies, it is apparent that indirect connections play an important role in animal behaviour, although future research is needed to clarify their contribution. PMID:25937639

  17. Zenith-100 Microcomputer Network for Air Command and Staff College.

    Science.gov (United States)

    1987-04-01

    34 AD-A182 495 ZENI T-ipo ml CROCOMFUT E NET WOR( FOR AIR COMAND AND h SAFF CoLLG (U) AIl COMMAND ANDCSTAFF COLL MAX(WELL AFS "CAL W L GALWAY El AL...processing of documents by eliminating the time required to physically move the documents from one office to the next. Reproduction Savings. Information

  18. Underage Use of Social Network Sites: It's About Friends.

    Science.gov (United States)

    Barbovschi, Monica; Macháčková, Hana; Ólafsson, Kjartan

    2015-06-01

    European self-regulation to ensure children's safety on social networking sites (SNS) stipulates that children should be old enough to use their services. However, a growing number of children are not. Drawing on data from the Net Children Go Mobile (NCGM) project (2012-2014), this study focuses on children aged 9-12 years, among whom 42% have a profile on Facebook, many with the explicit permission of their parents, despite the explicit policy allowing only children aged 13 years and older. Yet, such parental influence is not the only factor contributing to an underage child having a profile. Hierarchical logistic regressions were conducted in which the odds of having a profile on Facebook among children aged 9-12 years (N=1,723) were predicted. After controlling for demographic variables, Facebook use was connected to daily use of the Internet from home (bedroom and other places), looking for new friends online, and online disinhibition (e.g., being able to talk about different things on the Internet than when speaking to people face-to-face). In terms of parental mediation, restrictions lower the probabilities of an underage child having a SNS profile, while active parental mediation increases the odds. In addition to parental mediation, peer mediation increases the chances of underage Facebook use, indicating that children play a significant role in influencing each other in adoption of new technologies and applications. Finally, digital skills related to communication have a significant effect, suggesting an integrated adoption of communicative practices online. Daily use of mobile devices had no effect in the model.

  19. Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2017-11-22

    ARL-TN-0859 ● NOV 2017 US Army Research Laboratory Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled...Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command by John K Hawley Human Research and Engineering...REPORT TYPE Technical Note 3. DATES COVERED (From - To) 1 May 2016–20 April 2017 4. TITLE AND SUBTITLE Applied Knowledge Management to Mitigate

  20. A distributed command governor strategy for the operational control of drinking water networks

    OpenAIRE

    Tedesco, Francesco; Ocampo-Martínez, Carlos; Casavola, Alessandro; Puig Cayuela, Vicenç

    2014-01-01

    This paper proposes the application of a distributed command governor (DCG) strategy for the operational control of drinking water networks (DWN). This approach is very suitable to this kind of management problems given the large-scale and complex nature of DWNs, the relevant effect of persistent disturbances (water demands) over the network evolutions and their marginal stability feature. The performance improvement offered by DCG is compared with the consideration of two non-centralized mod...

  1. Social Networking for the Older and Wiser Connect with Family, and Friends Old and New

    CERN Document Server

    McManus, Sean

    2010-01-01

    Social networks enable anyone with a computer and Internet connection to stay in touch with friends and family across the globe, and rediscover old acquaintances.  Social Networking for the Older and Wiser starts with the basics of social networks, before moving onto intermediate topics, all whilst highlighting ways to protect your privacy and keep your details secure. The book is packed with step-by-step instructions on how to use Facebook, Twitter, Friends Reunited, Saga Zone, and other social networks to:Create an account on your chosen social networkReconnect and stay-in-touch with old fr

  2. Traffic Command Gesture Recognition for Virtual Urban Scenes Based on a Spatiotemporal Convolution Neural Network

    Directory of Open Access Journals (Sweden)

    Chunyong Ma

    2018-01-01

    Full Text Available Intelligent recognition of traffic police command gestures increases authenticity and interactivity in virtual urban scenes. To actualize real-time traffic gesture recognition, a novel spatiotemporal convolution neural network (ST-CNN model is presented. We utilized Kinect 2.0 to construct a traffic police command gesture skeleton (TPCGS dataset collected from 10 volunteers. Subsequently, convolution operations on the locational change of each skeletal point were performed to extract temporal features, analyze the relative positions of skeletal points, and extract spatial features. After temporal and spatial features based on the three-dimensional positional information of traffic police skeleton points were extracted, the ST-CNN model classified positional information into eight types of Chinese traffic police gestures. The test accuracy of the ST-CNN model was 96.67%. In addition, a virtual urban traffic scene in which real-time command tests were carried out was set up, and a real-time test accuracy rate of 93.0% was achieved. The proposed ST-CNN model ensured a high level of accuracy and robustness. The ST-CNN model recognized traffic command gestures, and such recognition was found to control vehicles in virtual traffic environments, which enriches the interactive mode of the virtual city scene. Traffic command gesture recognition contributes to smart city construction.

  3. Web-Based Interface for Command and Control of Network Sensors

    Science.gov (United States)

    Wallick, Michael N.; Doubleday, Joshua R.; Shams, Khawaja S.

    2010-01-01

    This software allows for the visualization and control of a network of sensors through a Web browser interface. It is currently being deployed for a network of sensors monitoring Mt. Saint Helen s volcano; however, this innovation is generic enough that it can be deployed for any type of sensor Web. From this interface, the user is able to fully control and monitor the sensor Web. This includes, but is not limited to, sending "test" commands to individual sensors in the network, monitoring for real-world events, and reacting to those events

  4. Discrete event command and control for networked teams with multiple missions

    Science.gov (United States)

    Lewis, Frank L.; Hudas, Greg R.; Pang, Chee Khiang; Middleton, Matthew B.; McMurrough, Christopher

    2009-05-01

    During mission execution in military applications, the TRADOC Pamphlet 525-66 Battle Command and Battle Space Awareness capabilities prescribe expectations that networked teams will perform in a reliable manner under changing mission requirements, varying resource availability and reliability, and resource faults. In this paper, a Command and Control (C2) structure is presented that allows for computer-aided execution of the networked team decision-making process, control of force resources, shared resource dispatching, and adaptability to change based on battlefield conditions. A mathematically justified networked computing environment is provided called the Discrete Event Control (DEC) Framework. DEC has the ability to provide the logical connectivity among all team participants including mission planners, field commanders, war-fighters, and robotic platforms. The proposed data management tools are developed and demonstrated on a simulation study and an implementation on a distributed wireless sensor network. The results show that the tasks of multiple missions are correctly sequenced in real-time, and that shared resources are suitably assigned to competing tasks under dynamically changing conditions without conflicts and bottlenecks.

  5. Commanders and Cyber Chat: Should More Guidance be Provided for Social Networking Sites

    Science.gov (United States)

    2011-04-01

    networks. On one hand, the perception is there should be rules of etiquette for friending someone related to social norms of endorsing that person...agreed.. Reasons given in free text by lieutenants were as follows: - “Plenty of briefings were given on basic protocol regarding what goes on

  6. Command Filtered Adaptive Fuzzy Neural Network Backstepping Control for Marine Power System

    Directory of Open Access Journals (Sweden)

    Xin Zhang

    2014-01-01

    Full Text Available In order to retrain chaotic oscillation of marine power system which is excited by periodic electromagnetism perturbation, a novel command-filtered adaptive fuzzy neural network backstepping control method is designed. First, the mathematical model of marine power system is established based on the two parallel nonlinear model. Then, main results of command-filtered adaptive fuzzy neural network backstepping control law are given. And the Lyapunov stability theory is applied to prove that the system can remain closed-loop asymptotically stable with this controller. Finally, simulation results indicate that the designed controller can suppress chaotic oscillation with fast convergence speed that makes the system return to the equilibrium point quickly; meanwhile, the parameter which induces chaotic oscillation can also be discriminated.

  7. MyGeneFriends: A Social Network Linking Genes, Genetic Diseases, and Researchers.

    Science.gov (United States)

    Allot, Alexis; Chennen, Kirsley; Nevers, Yannis; Poidevin, Laetitia; Kress, Arnaud; Ripp, Raymond; Thompson, Julie Dawn; Poch, Olivier; Lecompte, Odile

    2017-06-16

    The constant and massive increase of biological data offers unprecedented opportunities to decipher the function and evolution of genes and their roles in human diseases. However, the multiplicity of sources and flow of data mean that efficient access to useful information and knowledge production has become a major challenge. This challenge can be addressed by taking inspiration from Web 2.0 and particularly social networks, which are at the forefront of big data exploration and human-data interaction. MyGeneFriends is a Web platform inspired by social networks, devoted to genetic disease analysis, and organized around three types of proactive agents: genes, humans, and genetic diseases. The aim of this study was to improve exploration and exploitation of biological, postgenomic era big data. MyGeneFriends leverages conventions popularized by top social networks (Facebook, LinkedIn, etc), such as networks of friends, profile pages, friendship recommendations, affinity scores, news feeds, content recommendation, and data visualization. MyGeneFriends provides simple and intuitive interactions with data through evaluation and visualization of connections (friendships) between genes, humans, and diseases. The platform suggests new friends and publications and allows agents to follow the activity of their friends. It dynamically personalizes information depending on the user's specific interests and provides an efficient way to share information with collaborators. Furthermore, the user's behavior itself generates new information that constitutes an added value integrated in the network, which can be used to discover new connections between biological agents. We have developed MyGeneFriends, a Web platform leveraging conventions from popular social networks to redefine the relationship between humans and biological big data and improve human processing of biomedical data. MyGeneFriends is available at lbgi.fr/mygenefriends. ©Alexis Allot, Kirsley Chennen, Yannis

  8. Tele command and network automation: strategy and results; Telecomando e automacao de redes: estrategia e resultados

    Energy Technology Data Exchange (ETDEWEB)

    Bargigia, Angelo; Cerreti, Alberto; Lembo, Giorgio di; Rogai, Sergio; Veglio, Gianfranco [Enel Distribuzione Spa, Rome (Italy)

    2004-02-01

    This article presents the adopted by the ENEL Distribuzione, Italy, for the tele command and automation in the distribution line. The article describes the medium term implementation program, based on the installation of remote terminal unities, with communication through cell phone GMS for transmission of collected data to the control centers of the network. A cost versus benefit analysis conducted and the obtained results are also evaluated.

  9. Learning from Your Network of Friends: A Trajectory Representation Learning Model Based on Online Social Ties

    KAUST Repository

    Alharbi, Basma Mohammed; Zhang, Xiangliang

    2017-01-01

    Location-Based Social Networks (LBSNs) capture individuals whereabouts for a large portion of the population. To utilize this data for user (location)-similarity based tasks, one must map the raw data into a low-dimensional uniform feature space. However, due to the nature of LBSNs, many users have sparse and incomplete check-ins. In this work, we propose to overcome this issue by leveraging the network of friends, when learning the new feature space. We first analyze the impact of friends on individuals's mobility, and show that individuals trajectories are correlated with thoseof their friends and friends of friends (2-hop friends) in an online setting. Based on our observation, we propose a mixed-membership model that infers global mobility patterns from users' check-ins and their network of friends, without impairing the model's complexity. Our proposed model infers global patterns and learns new representations for both usersand locations simultaneously. We evaluate the inferred patterns and compare the quality of the new user representation against baseline methods on a social link prediction problem.

  10. Learning from Your Network of Friends: A Trajectory Representation Learning Model Based on Online Social Ties

    KAUST Repository

    Alharbi, Basma Mohammed

    2017-02-07

    Location-Based Social Networks (LBSNs) capture individuals whereabouts for a large portion of the population. To utilize this data for user (location)-similarity based tasks, one must map the raw data into a low-dimensional uniform feature space. However, due to the nature of LBSNs, many users have sparse and incomplete check-ins. In this work, we propose to overcome this issue by leveraging the network of friends, when learning the new feature space. We first analyze the impact of friends on individuals\\'s mobility, and show that individuals trajectories are correlated with thoseof their friends and friends of friends (2-hop friends) in an online setting. Based on our observation, we propose a mixed-membership model that infers global mobility patterns from users\\' check-ins and their network of friends, without impairing the model\\'s complexity. Our proposed model infers global patterns and learns new representations for both usersand locations simultaneously. We evaluate the inferred patterns and compare the quality of the new user representation against baseline methods on a social link prediction problem.

  11. A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack.

    Science.gov (United States)

    Li, Xuran; Wang, Qiu; Dai, Hong-Ning; Wang, Hao

    2018-06-14

    Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this paper, we propose a novel anti-eavesdropping scheme by introducing friendly jammers to an industrial crowdsensing network. In particular, we establish a theoretical framework considering both the probability of eavesdropping attacks and the probability of successful transmission to evaluate the effectiveness of our scheme. Our framework takes into account various channel conditions such as path loss, Rayleigh fading, and the antenna type of friendly jammers. Our results show that using jammers in industrial crowdsensing networks can effectively reduce the eavesdropping risk while having no significant influence on legitimate communications.

  12. Friend or Foe? Fake Profile Identification in Online Social Networks

    OpenAIRE

    Fire, Michael; Kagan, Dima; Elyashar, Aviad; Elovici, Yuval

    2013-01-01

    The amount of personal information unwillingly exposed by users on online social networks is staggering, as shown in recent research. Moreover, recent reports indicate that these networks are infested with tens of millions of fake users profiles, which may jeopardize the users' security and privacy. To identify fake users in such networks and to improve users' security and privacy, we developed the Social Privacy Protector software for Facebook. This software contains three protection layers,...

  13. Friend networking sites and their relationship to adolescents' well-being and social self-esteem.

    Science.gov (United States)

    Valkenburg, Patti M; Peter, Jochen; Schouten, Alexander P

    2006-10-01

    The aim of this study was to investigate the consequences of friend networking sites (e.g., Friendster, MySpace) for adolescents' self-esteem and well-being. We conducted a survey among 881 adolescents (10-19-year-olds) who had an online profile on a Dutch friend networking site. Using structural equation modeling, we found that the frequency with which adolescents used the site had an indirect effect on their social self-esteem and well-being. The use of the friend networking site stimulated the number of relationships formed on the site, the frequency with which adolescents received feedback on their profiles, and the tone (i.e., positive vs. negative) of this feedback. Positive feedback on the profiles enhanced adolescents' social self-esteem and well-being, whereas negative feedback decreased their self-esteem and well-being.

  14. Family and Friends: Which Types of Personal Relationships Go Together in a Network?

    Science.gov (United States)

    Rözer, Jesper; Mollenhorst, Gerald; Poortman, Anne-Rigt

    We examine the link between family and personal networks. Using arguments about meeting opportunities, competition and social influence, we hypothesise how the presence of specific types of family members (i.e., a partner, children, parents and siblings) and non-family members (i.e., friends, neighbours and colleagues) in the network mutually affect one another. In addition, we propose that-beyond their mere presence-the active role of family members in the network strongly affects the presence of non-family members in the network. Data from the third wave of the Survey on the Social Networks of the Dutch, collected in 2012 and 2013, show that active involvement is of key importance; more than merely having family members present in one's personal network, the active involvement of specific types of family members in the personal network is associated with having disproportionally more other family members and having somewhat fewer non-family members in the network.

  15. Motives for online friending and following: The dark side of social network site connections

    NARCIS (Netherlands)

    Ouwerkerk, J.W.; Johnson, B.K.

    Motives for “friending,” following, or connecting with others on social network sites are often positive, but darker motives may also play an important role. A survey with a novel Following Motives Scale (FMS) demonstrates accordingly that positive, sociable motives (i.e., others providing a valued

  16. Parents, Friends, and Romantic Partners: Enmeshment in Deviant Networks and Adolescent Delinquency Involvement

    Science.gov (United States)

    Lonardo, Robert A.; Giordano, Peggy C.; Longmore, Monica A.; Manning, Wendy D.

    2009-01-01

    Adolescent networks include parents, friends, and romantic partners, but research on the social learning mechanisms related to delinquency has not typically examined the characteristics of all three domains simultaneously. Analyses draw on data from the Toledo Adolescent Relationships Study (n = 957), and our analytic sample contains 51% male and…

  17. Do Parental Networks Pay Off? Linking Children's Labor-Market Outcomes to Their Parents' Friends

    NARCIS (Netherlands)

    Plug, E.; van der Klaauw, B.; Ziegler, L.

    In this paper, we examine whether children are better off if their parents have more elaborate social networks. Using data on high-school friendships of parents, we analyze whether the number and characteristics of friends affect the labor-market outcomes of children. While parental friendships

  18. An algorithm for identifying the best current friend in a social network

    Directory of Open Access Journals (Sweden)

    Francisco Javier Moreno

    2015-05-01

    Full Text Available A research field in the area of social networks (SNs is the identification of some types of users and groups. To facilitate this process, a SN is usually represented by a graph. The centrality measures, which identify the most important vertices in a graph according to some criterion, are usual tools to analyze a graph. One of these measures is the PageRank (a measure originally designed to classify web pages. Informally, in the context of a SN, the PageRank of a user i represents the probability that another user of the SN is seeing the page of i after a considerable time of navigation in the SN. In this paper, we define a new type of user in a SN: the best current friend. The idea is to identify, among the friends of a user i, who is the friend k that would generate the highest decrease in the PageRank of i if k stops being his/her friend. This may be useful to identify the users/customers whose friendship/relationship should be a priority to keep. We provide formal definitions, algorithms and some experiments for this subject. Our experiments showed that the best current friend of a user is not necessarily the one who has the highest PageRank in the SN nor the one who has more friends.

  19. Improved head direction command classification using an optimised Bayesian neural network.

    Science.gov (United States)

    Nguyen, Son T; Nguyen, Hung T; Taylor, Philip B; Middleton, James

    2006-01-01

    Assistive technologies have recently emerged to improve the quality of life of severely disabled people by enhancing their independence in daily activities. Since many of those individuals have limited or non-existing control from the neck downward, alternative hands-free input modalities have become very important for these people to access assistive devices. In hands-free control, head movement has been proved to be a very effective user interface as it can provide a comfortable, reliable and natural way to access the device. Recently, neural networks have been shown to be useful not only for real-time pattern recognition but also for creating user-adaptive models. Since multi-layer perceptron neural networks trained using standard back-propagation may cause poor generalisation, the Bayesian technique has been proposed to improve the generalisation and robustness of these networks. This paper describes the use of Bayesian neural networks in developing a hands-free wheelchair control system. The experimental results show that with the optimised architecture, classification Bayesian neural networks can detect head commands of wheelchair users accurately irrespective to their levels of injuries.

  20. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    Science.gov (United States)

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In

  1. Interactions with parents and friends among chronically ill children: examining social networks.

    Science.gov (United States)

    Herzer, Michele; Umfress, Kris; Aljadeff, Gabriel; Ghai, Kanika; Zakowski, Sandra G

    2009-12-01

    Children with medical conditions often experience a combination of positive and negative social interactions with parents and friends. Adult research examining cross-domain buffering effects has documented that supportive social ties can make up for shortcomings in other social relationships. This study examined whether negative effects of strained relationships with loved ones can be buffered when children feel supported by individuals in different support networks (i.e., cross-domain buffering effects). Children with Type I diabetes (n = 56), chronic asthma (n = 54), and cystic fibrosis (n = 17) completed questionnaires during an outpatient hospital visit that assessed perceptions of support and strain from parents and friends, quality of life, self-concept, and emotional/behavioral difficulties. Parental strain was conceptualized as parental overprotection and parental rejection. Hierarchical regression analyses showed that friend support buffered the adverse effects of parental strain on child quality of life, self-concept, and emotional/behavioral difficulties. Interestingly, parental support did not buffer the negative effects of experiencing strained relationships with friends; only main effects on outcome were found. These findings partially support our hypotheses of cross-domain buffering. In this study, friendships were a protective factor for children who experienced strained relationships with parents. In contrast, although parent support had a direct impact on child outcome, it did not make up for feeling rejected by friends. Because close relationships are often strained during medical stressors, findings underscore the importance of promoting social connectedness in chronically ill children to maximize opportunities for experiencing positive social relationships.

  2. An Appraisal of Asia-Pacific Cities as Control and Command Centres Embedded in World City Network

    Directory of Open Access Journals (Sweden)

    Z. Li

    2017-08-01

    Full Text Available Since the globalization trend is proliferating at a staggering rate, world cities have emerged as the most dominant vanguard incorporated into global economy. Control and command function is one of the robust integral parts of world city formation, which is closely associated with the corporate headquarter status of some dominant multinational companies. Previous research works on this topic tend to concentrate on the Western Europe and North American arenas neglecting the Asia-Pacific region. Hence, the objective of this paper is to explore control and command functions of Asia-Pacific cities with reference to headquarters’ locations of multinational companies. The methodology will utilize the Forbes global 2000 dataset from the seminal study of GaWC research group, and apply the control and command center model and the interlocking city network model to discover the control and command index, as well as network connectivity of Asia-Pacific cities. Based upon the empirical study of this research, we could identify the hierarchical structure and spatial structure of Asia-Pacific world cities to emerge as some control and command centers embedded in world city network.

  3. Motives for online friending and following: The dark side of social network site connections

    OpenAIRE

    Ouwerkerk, J.W.; Johnson, B.K.

    2016-01-01

    Motives for “friending,” following, or connecting with others on social network sites are often positive, but darker motives may also play an important role. A survey with a novel Following Motives Scale (FMS) demonstrates accordingly that positive, sociable motives (i.e., others providing a valued source for humor and information, others sharing a common background, as well as relationship maintenance) and inspirational motives (i.e., others providing a target for upward social comparison) c...

  4. Privacy‐Preserving Friend Matching Protocol approach for Pre‐match in Social Networks

    DEFF Research Database (Denmark)

    Ople, Shubhangi S.; Deshmukh, Aaradhana A.; Mihovska, Albena Dimitrova

    2016-01-01

    Social services make the most use of the user profile matching to help the users to discover friends with similar social attributes (e.g. interests, location, age). However, there are many privacy concerns that prevent to enable this functionality. Privacy preserving encryption is not suitable...... for use in social networks due to its data sharing problems and information leakage. In this paper, we propose a novel framework for privacy–preserving profile matching. We implement both the client and server portion of the secure match and evaluate its performance network dataset. The results show...

  5. School, Friends, and Substance Use: Gender Differences on the Influence of Attitudes Toward School and Close Friend Networks on Cannabis Involvement.

    Science.gov (United States)

    Zaharakis, Nikola; Mason, Michael J; Mennis, Jeremy; Light, John; Rusby, Julie C; Westling, Erika; Crewe, Stephanie; Flay, Brian R; Way, Thomas

    2018-02-01

    The school environment is extremely salient in young adolescents' lives. Adolescents who have unfavorable attitudes toward school and teachers are at elevated risk for dropping out of school and engaging in behavioral health risks. Peer network health-a summation of the positive and negative behaviors in which one's close friend group engages-may be one way by which attitudes toward school exert influence on youth substance use. Utilizing a sample of 248 primarily African-American young urban adolescents, we tested a moderated mediation model to determine if the indirect effect of attitude to school on cannabis involvement through peer network health was conditioned on gender. Attitude toward school measured at baseline was the predictor (X), peer network health measured at 6 months was the mediator (M), cannabis involvement (including use, offers to use, and refusals to use) measured at 24 months was the outcome (Y), and gender was the moderator (W). Results indicated that negative attitudes toward school were indirectly associated with increased cannabis involvement through peer network health. This relationship was not moderated by gender. Adolescents in our sample with negative attitudes toward school were more likely to receive more offers to use cannabis and to use cannabis more frequently through the perceived health behaviors of their close friends. Implications from these results point to opportunities to leverage the dynamic associations among school experiences, friends, and cannabis involvement, such as offers and use.

  6. MySpace and Facebook: applying the uses and gratifications theory to exploring friend-networking sites.

    Science.gov (United States)

    Raacke, John; Bonds-Raacke, Jennifer

    2008-04-01

    The increased use of the Internet as a new tool in communication has changed the way people interact. This fact is even more evident in the recent development and use of friend-networking sites. However, no research has evaluated these sites and their impact on college students. Therefore, the present study was conducted to evaluate: (a) why people use these friend-networking sites, (b) what the characteristics are of the typical college user, and (c) what uses and gratifications are met by using these sites. Results indicated that the vast majority of college students are using these friend-networking sites for a significant portion of their day for reasons such as making new friends and locating old friends. Additionally, both men and women of traditional college age are equally engaging in this form of online communication with this result holding true for nearly all ethnic groups. Finally, results showed that many uses and gratifications are met by users (e.g., "keeping in touch with friends"). Results are discussed in light of the impact that friend-networking sites have on communication and social needs of college students.

  7. On the comparison of predictive control and command governor approaches for operational control of drinking water networks: A case study

    OpenAIRE

    Tedesco, Francesco; Ocampo-Martinez, Carlos; Cassavola, Alessandro; Puig, Vicenç

    2014-01-01

    This paper evaluates the application of command governor (CG) strategy for the operational control of drinking water networks (DWN) given their large-scale and complex nature, the permanent and relevant effect of the disturbances (water demands) and their marginal stability feature. Moreover, the performance improvement offered by CG is compared with the application of model predictive control for the same management purposes and in the same context. The paper also discusses the effectiveness...

  8. The role of gender and friends' gender on peer socialization of adolescent drinking: a prospective multilevel social network analysis.

    Science.gov (United States)

    Deutsch, Arielle R; Steinley, Douglas; Slutske, Wendy S

    2014-09-01

    Although socializing effects of friends' drinking on adolescent drinking behavior have been firmly established in previous literature, study results on the importance of gender, as well as the specific role that gender may play in peer socialization, are very mixed. Given the increasing importance of gender in friendships (particularly opposite-sex friendships) during adolescence, it is necessary to better understand the nuanced roles that gender can play in peer socialization effects on alcohol use. In addition, previous studies focusing on the interplay between individual gender and friends' gender have been largely dyadic; less is known about potential gendered effects of broader social networks. The current study sought to further investigate potential effects of gender on friends' influence on adolescent drinking behavior with particular emphasis on the number of same-sex and opposite-sex friends within one's friendship network, as well as closeness to these friends. Using Waves I and II of the saturated sample of the National Longitudinal Study of Adolescent Health (Add Health), adolescent friendship networks were used to calculate the mean drinking behaviors of adolescent friends. Multi-level models estimated the effects of individual drinking behaviors, friend drinking behaviors, and school-level drinking behaviors on adolescent drinking 1 year later, as well as moderating effects of gender composition of friendship groups and male and female friend closeness on the relationship between friends' drinking behaviors and adolescent drinking behavior. Results documented that gender composition of friendship groups did not influence the effect of friends' drinking on individual drinking 1 year later. However, closeness to friends did influence this relationship. As closeness to male friends decreased, the influence of their drinking behavior increased, for both boys and girls. A similar effect was found for female friends, but only for boys. Female friend

  9. Neural network algorithm for image reconstruction using the grid friendly projections

    International Nuclear Information System (INIS)

    Cierniak, R.

    2011-01-01

    Full text: The presented paper describes a development of original approach to the reconstruction problem using a recurrent neural network. Particularly, the 'grid-friendly' angles of performed projections are selected according to the discrete Radon transform (DRT) concept to decrease the number of projections required. The methodology of our approach is consistent with analytical reconstruction algorithms. Reconstruction problem is reformulated in our approach to optimization problem. This problem is solved in present concept using method based on the maximum likelihood methodology. The reconstruction algorithm proposed in this work is consequently adapted for more practical discrete fan beam projections. Computer simulation results show that the neural network reconstruction algorithm designed to work in this way improves obtained results and outperforms conventional methods in reconstructed image quality. (author)

  10. TROVE: A User-friendly Tool for Visualizing and Analyzing Cancer Hallmarks in Signaling Networks.

    Science.gov (United States)

    Chua, Huey Eng; Bhowmick, Sourav S; Zheng, Jie

    2017-09-22

    Cancer hallmarks, a concept that seeks to explain the complexity of cancer initiation and development, provide a new perspective of studying cancer signaling which could lead to a greater understanding of this complex disease. However, to the best of our knowledge, there is currently a lack of tools that support such hallmark-based study of the cancer signaling network, thereby impeding the gain of knowledge in this area. We present TROVE, a user-friendly software that facilitates hallmark annotation, visualization and analysis in cancer signaling networks. In particular, TROVE facilitates hallmark analysis specific to particular cancer types. Available under the Eclipse Public License from: https://sites.google.com/site/cosbyntu/softwares/trove and https://github.com/trove2017/Trove. hechua@ntu.edu.sg or assourav@ntu.edu.sg. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  11. Network, system, and status software enhancements for the autonomously managed electrical power system breadboard. Volume 3: Commands specification

    Science.gov (United States)

    Mckee, James W.

    1990-01-01

    This volume (3 of 4) contains the specification for the command language for the AMPS system. The volume contains a requirements specification for the operating system and commands and a design specification for the operating system and command. The operating system and commands sits on top of the protocol. The commands are an extension of the present set of AMPS commands in that the commands are more compact, allow multiple sub-commands to be bundled into one command, and have provisions for identifying the sender and the intended receiver. The commands make no change to the actual software that implement the commands.

  12. The Positive Aspects of Network Centric Command. The Ties Between Behavioral Doctrine and Technology

    National Research Council Canada - National Science Library

    Baldree, Steven

    1999-01-01

    .... Centralizing execution at the operational level due to "informational" superiority will be a step back in terms of war-fighting effectiveness and will be detrimental to commanders participating...

  13. Network Centric Warfare and Its Effect on Unit of Employmentx (UEx) Use of Mission Command

    National Research Council Canada - National Science Library

    Hannon, Jeffery A

    2005-01-01

    The 2002 NSS call for "transformING to meet the challenges and opportunities of the twenty-first century", and the Army's leadership elected to concentrate the service's transformation efforts on battle command...

  14. OPTIMAL CONFIGURATION OF A COMMAND AND CONTROL NETWORK: BALANCING PERFORMANCE AND RECONFIGURATION CONSTRAINTS

    Energy Technology Data Exchange (ETDEWEB)

    L. DOWELL

    1999-08-01

    The optimization of the configuration of communications and control networks is important for assuring the reliability and performance of the networks. This paper presents techniques for determining the optimal configuration for such a network in the presence of communication and connectivity constraints. reconfiguration to restore connectivity to a data-fusion network following the failure of a network component.

  15. Facebook friends with (health) benefits? Exploring social network site use and perceptions of social support, stress, and well-being.

    Science.gov (United States)

    Nabi, Robin L; Prestin, Abby; So, Jiyeon

    2013-10-01

    There is clear evidence that interpersonal social support impacts stress levels and, in turn, degree of physical illness and psychological well-being. This study examines whether mediated social networks serve the same palliative function. A survey of 401 undergraduate Facebook users revealed that, as predicted, number of Facebook friends associated with stronger perceptions of social support, which in turn associated with reduced stress, and in turn less physical illness and greater well-being. This effect was minimized when interpersonal network size was taken into consideration. However, for those who have experienced many objective life stressors, the number of Facebook friends emerged as the stronger predictor of perceived social support. The "more-friends-the-better" heuristic is proposed as the most likely explanation for these findings.

  16. Beyond command and control: USSOUTHCOM's use of social networking to 'connect and collaborate' during Haiti relief operations

    Science.gov (United States)

    Arias, Ricardo

    2011-06-01

    On 12 January 2010, a magnitude 7.0 earthquake devastated Haiti killing over 230,000 unsuspecting victims, injuring tens of thousands more and displacing over 1.1 million people. The physical damage was so severe that over 50 percent of buildings in and near the affected areas were completely destroyed or damaged. After struggling for decades with adversity, and besieged by a myriad of social, economic and political challenges, Haiti, its government, and its people were by most accounts already in a state of crisis. The earthquake's devastation and its aftermath shocked the world and prompted a global response. Over 800 institutions and organizations representing the whole of society - governments and their militaries, international organizations, nongovernmental organizations, public institutions, academia, corporations, and private citizens - mobilized to provide aid and relief. However, coordinating and managing their activities seemed a daunting, if not impossible, task. How could a global response achieve "unity of effort" when "unity of command" was not feasible? To provide a solution, US Southern Command (USSOUTHCOM) looked beyond traditional Command and Control systems for collaboration with non-traditional partners and implemented the All Partners Access Network (APAN) in order to "Connect and Collaborate."

  17. Friends with Faces: How Social Networks Can Enhance Face Recognition and Vice Versa

    Science.gov (United States)

    Mavridis, Nikolaos; Kazmi, Wajahat; Toulis, Panos

    The "friendship" relation, a social relation among individuals, is one of the primary relations modeled in some of the world's largest online social networking sites, such as "FaceBook." On the other hand, the "co-occurrence" relation, as a relation among faces appearing in pictures, is one that is easily detectable using modern face detection techniques. These two relations, though appearing in different realms (social vs. visual sensory), have a strong correlation: faces that co-occur in photos often belong to individuals who are friends. Using real-world data gathered from "Facebook," which were gathered as part of the "FaceBots" project, the world's first physical face-recognizing and conversing robot that can utilize and publish information on "Facebook" was established. We present here methods as well as results for utilizing this correlation in both directions. Both algorithms for utilizing knowledge of the social context for faster and better face recognition are given, as well as algorithms for estimating the friendship network of a number of individuals given photos containing their faces. The results are quite encouraging. In the primary example, doubling of the recognition accuracy as well as a sixfold improvement in speed is demonstrated. Various improvements, interesting statistics, as well as an empirical investigation leading to predictions of scalability to much bigger data sets are discussed.

  18. When BOLD is thicker than water: processing social information about kin and friends at different levels of the social network.

    Science.gov (United States)

    Wlodarski, Rafael; Dunbar, Robin I M

    2016-12-01

    The aim of this study was to examine differences in the neural processing of social information about kin and friends at different levels of closeness and social network level. Twenty-five female participants engaged in a cognitive social task involving different individuals in their social network while undergoing functional magnetic resonance imaging scanning to detect BOLD (Blood Oxygen Level Dependent) signals changes. Greater levels of activation occurred in several regions of the brain previously associated with social cognition when thinking about friends than when thinking about kin, including the posterior cingulate cortex (PCC) and the ventral medial prefrontal cortex (vMPFC). Linear parametric analyses across network layers further showed that, when it came to thinking about friends, activation increased in the vMPFC, lingual gyrus, and sensorimotor cortex as individuals thought about friends at closer layers of the network. These findings suggest that maintaining friendships may be more cognitively exacting than maintaining kin relationships. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  19. Publishing at "the request of friends": Alexander Ross and James Beattie’s Authorial Networks in Eighteenth-Century Aberdeen

    OpenAIRE

    Ruth Knezevich

    2016-01-01

    Authorship in eighteenth-century Aberdeen often functioned differently than in London and Edinburgh. The Aberdeen model of authorship relied heavily on an intricate network of booksellers, patrons, readers, and critics involved in preparing a text to be consumed by the reading public; yet the prevailing narrative of the author as rising to “inspired genius” disallows for this network. The authorial career of poet Alexander Ross and his friend/mentorship with philosopher James Beattie offers a...

  20. OPTIMAL CONFIGURATION OF A COMMAND AND CONTROL NETWORK: BALANCING PERFORMANCE AND RECONFIGURATION CONSTRAINTS

    Energy Technology Data Exchange (ETDEWEB)

    L. DOWELL

    1999-07-01

    The optimization of the configuration of communications and control networks is important for assuring the reliability and performance of the networks. This paper presents techniques for determining the optimal configuration for such a network in the presence of communication and connectivity constraints.

  1. Show me your friends and I will tell you what type of person you are: how own profile, number of friends, and type of friends influence impression formation on social network sites

    NARCIS (Netherlands)

    Utz, S.

    2010-01-01

    This experiment examines how far extraversion of the target (self-generated information), extraversion of the target's friends (friends-generated information), and number of friends (system-generated information) influence the perceived popularity, communal orientation, and social attractiveness of

  2. Sensor Network-Based and User-Friendly User Location Discovery for Future Smart Homes.

    Science.gov (United States)

    Ahvar, Ehsan; Lee, Gyu Myoung; Han, Son N; Crespi, Noel; Khan, Imran

    2016-06-27

    User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD) will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i) users' privacy; (ii) device-/tag-free; and (iii) fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.

  3. Sensor Network-Based and User-Friendly User Location Discovery for Future Smart Homes

    Directory of Open Access Journals (Sweden)

    Ehsan Ahvar

    2016-06-01

    Full Text Available User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i users’ privacy; (ii device-/tag-free; and (iii fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.

  4. Motives for Online Friending and Following: The Dark Side of Social Network Site Connections

    Directory of Open Access Journals (Sweden)

    Jaap W. Ouwerkerk

    2016-08-01

    Full Text Available Motives for “friending,” following, or connecting with others on social network sites are often positive, but darker motives may also play an important role. A survey with a novel Following Motives Scale (FMS demonstrates accordingly that positive, sociable motives (i.e., others providing a valued source for humor and information, others sharing a common background, as well as relationship maintenance and inspirational motives (i.e., others providing a target for upward social comparison can be distinguished from darker motives related to insecurity (i.e., others providing reassurance, preference for online interaction, mediated voyeurism, as well as social obligation, and even darker antisocial motives related to self-enhancement (i.e., others providing a target for downward social comparison, competition, schadenfreude, gossip, as well as “hate-following”. Results show that lower self-esteem and higher levels of need for popularity, narcissism, and dispositional schadenfreude characterize users with stronger dark side motives, whereas users with more sociable motives report more satisfaction with life, thereby providing construct validity for the novel scale. Convergent validity is demonstrated by positive relations between following motives and both time spent and following counts on different social network sites. Moreover, an embedded experiment shows that antisocial motives predicted acceptance of a Facebook friendship request from a male or female high school acquaintance who suffered a setback in the domain of appearance or status (i.e., a convenient source for self-enhancement, thereby providing additional convergent validity for the Antisocial Motives subscale.

  5. OA20 The positioning of family, friends, community, and service providers in support networks for caring at end-of-life: a social network analysis.

    Science.gov (United States)

    Leonard, Rosemary; Horsfall, Debbie; Rosenberg, John; Noonan, Kerrie

    2015-04-01

    Although there is ample evidence of the risk to carers from the burden of caring, there is also evidence that a caring network can relieve the burden on the principal carer, strengthen community relationships, and increase 'Death Literacy' in the community. There is often an assumption that, in caring networks, family and service providers are central and friends and community are marginal. We examined whether this is the case in practice using SNA. To identify the relative positioning of family, friends, community, and service providers in caring networks. In interviews with carers (N = 23) and focus groups with caring networks (N = 13) participants were asked to list the people in the caring network and rate the strength of their relationships to them (0 no relationship to 3 strong relationship). SNA in UCInet was used to map the networks, examine density (number and strength of relationships) across time (when caring began to the present) and across relationship types (family, friends, community, and service providers) supplemented by qualitative data. The analysis revealed significant increases in the density of the networks over time. The density of relationships with friends was similar to that other family. Community and service providers had significantly lower density. Qualitative analysis revealed that often service providers were not seen as part of the networks. To avoid carer burnout, it is important not to make assumptions about where carers obtain support but work with each carer to mobilise any support that is available. © 2015, Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  6. The Unspoken Consequence of Command, Control Communications Technology: Enhanced Micromanagement by Risk-Averse Commanders

    National Research Council Canada - National Science Library

    Carozza, John

    2004-01-01

    .... However, along with its benefits, this command, control and communications (C3) network includes the dangerous consequence of eroding the autonomy of tactical command through enhanced micromanagement by risk-averse operational commanders...

  7. Online Social Network Users’ Attitudes toward Personality Traits Predict Behaviour of their Friends

    Directory of Open Access Journals (Sweden)

    Sergei A. Shchebetenko

    2016-12-01

    Full Text Available The research considers attitudes toward personality traits in online social network (OSN Vkontakte users’ behaviour. Users’ friends’ activity on a given user’s profile was supposed to be affected by attitudes toward traits of the latter. Within a broader context, the role of metacognitive type of characteristic adaptations as a key element of the five-factor theory of personality is studied. Accordingly, along with attitudes toward traits, other metacognitive characteristic adaptations are examined (e.g. dispositional efficiency, reflected trait, and reflected attitude toward a trait. 1030 undergraduates participated in the study. The research results confirm that extraversion is the most important predictor of OSN behavior among other personality traits. The information presented in this research is obtained using behavioural data instead of more convenient self-reports. Moreover, these behavioural data characterise other users’ (friends’ behaviour while addressing a certain user’s profile. Positive attitudes toward each Big Five traits (extraversion, agreeableness, conscientiousness, emotional stability, and openness to experience separately affected the number of “Likes” of the avatars representing users’ photographs. Furthermore, revealed correlations between traits and “Likes” were subsequently eliminated by the attitudes toward respective traits. Positive attitudes toward conscientiousness predicted the increase of friends’ number unlike trait conscientiousness. Positive attitude toward agreeableness predicted the increase of the number of posts written by friends on user’s wall unlike trait agreeableness. Attitudes toward traits are argued to affect social environment governed by an individual: one may select those social relationships and partners that fit better one’s attitudes toward traits. This, in turn, may affect actions of other people towards the given individual including those of online behaviour.

  8. Preventing Network Centric Overload (End State Education for the Operational Commander/Staff)

    National Research Council Canada - National Science Library

    Beck, John

    2001-01-01

    .... An end state education system must be devised that prepares our senior leaders to operate a newly formed network centric task force with equipment, organizations and theory of use that most likely...

  9. Neural networks applied to inverters control; Les reseaux de neurones appliques a la commande des convertisseurs

    Energy Technology Data Exchange (ETDEWEB)

    Jammes, B; Marpinard, J C

    1996-12-31

    Neural networks are scarcely applied to power electronics. This attempt includes two different topics: optimal control and computerized simulation. The learning has been performed through output error feedback. For implementation, a buck converter has been used as a voltage pulse generator. (D.L.) 7 refs.

  10. Social Network Sites, Friends, and Celebrities: The Roles of Social Comparison and Celebrity Involvement in Adolescents’ Body Image Dissatisfaction

    Directory of Open Access Journals (Sweden)

    Shirley S. Ho

    2016-08-01

    Full Text Available This study applies the social comparison theory to examine the effects of adolescents’ engagement in comparison with friends and celebrities on social network sites (SNSs on (a their body image dissatisfaction (BID and (b their drive to be thin (DT or muscular (DM. The study also examines celebrity involvement as an antecedent of the outcome variables. Data were collected through a survey of 1,059 adolescents in Singapore. Regression analyses indicate that SNSs use was related to adolescents’ BID. Specifically, social comparison with friends on SNSs was significantly associated with adolescents’ BID, DT, and DM. Gender differences were also observed—social comparison with celebrities was significantly associated with BID and DT among female adolescents. Celebrity involvement was significantly associated with male BID. Theoretical and practical implications were discussed.

  11. Command World

    National Research Council Canada - National Science Library

    Wong, Leah Y; Lange, Douglas S; Sebastyn, Jerome T; Roof, William H

    2006-01-01

    .... The Command World scenario was expressly designed as a crisis action planning exercise in order to replicate the communications, collaboration, and information requirements inherent in a military...

  12. Design and Implementation of a MAC Protocol for Timely and Reliable Delivery of Command and Data in Dynamic Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Phan Van Vinh

    2013-09-01

    Full Text Available This paper proposes and implements a new TDMA-based MAC protocol for providing timely and reliable delivery of data and command for monitoring and control networks. In this kind of network, sensor nodes are required to sense data from the monitoring environment periodically and then send the data to a sink. The sink determines whether the environment is safe or not by analyzing the acquired data. Sometimes, a command or control message is sent from the sink to a particular node or a group of nodes to execute the services or request further interested data. The proposed MAC protocol enables bidirectional communication, controls active and sleep modes of a sensor node to conserve energy, and addresses the problem of load unbalancing between the nodes near a sink and the other nodes. It can improve reliability of communication significantly while extending network lifetime. These claims are supported by the experimental results.

  13. Friendship selection and friends' influence : Dynamics of networks and actor attributes in early adolescence

    NARCIS (Netherlands)

    Knecht, Andrea Beate

    2008-01-01

    Adolescent friends are often found to be similar. Similarity can be caused by selection and influence processes. This book examines selection and influence processes for delinquency, school attitudes, and alcohol use in early adolescence. For selection processes, we hypothesize that adolescents

  14. Friending, IMing, and hanging out face-to-face: overlap in adolescents' online and offline social networks.

    Science.gov (United States)

    Reich, Stephanie M; Subrahmanyam, Kaveri; Espinoza, Guadalupe

    2012-03-01

    Many new and important developmental issues are encountered during adolescence, which is also a time when Internet use becomes increasingly popular. Studies have shown that adolescents are using these online spaces to address developmental issues, especially needs for intimacy and connection to others. Online communication with its potential for interacting with unknown others, may put teens at increased risk. Two hundred and fifty-one high school students completed an in-person survey, and 126 of these completed an additional online questionnaire about how and why they use the Internet, their activities on social networking sites (e.g., Facebook, MySpace) and their reasons for participation, and how they perceive these online spaces to impact their friendships. To examine the extent of overlap between online and offline friends, participants were asked to list the names of their top interaction partners offline and online (Facebook and instant messaging). Results reveal that adolescents mainly use social networking sites to connect with others, in particular with people known from offline contexts. While adolescents report little monitoring by their parents, there was no evidence that teens are putting themselves at risk by interacting with unknown others. Instead, adolescents seem to use the Internet, especially social networking sites, to connect with known others. While the study found moderate overlap between teens' closest online and offline friends, the patterns suggest that adolescents use online contexts to strengthen offline relationships. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  15. Social Network Analysis Reveals the Negative Effects of Attention-Deficit/Hyperactivity Disorder (ADHD) Symptoms on Friend-Based Student Networks.

    Science.gov (United States)

    Kim, Jun Won; Kim, Bung-Nyun; Kim, Johanna Inhyang; Lee, Young Sik; Min, Kyung Joon; Kim, Hyun-Jin; Lee, Jaewon

    2015-01-01

    Social network analysis has emerged as a promising tool in modern social psychology. This method can be used to examine friend-based social relationships in terms of network theory, with nodes representing individual students and ties representing relationships between students (e.g., friendships and kinships). Using social network analysis, we investigated whether greater severity of ADHD symptoms is correlated with weaker peer relationships among elementary school students. A total of 562 sixth-graders from two elementary schools (300 males) provided the names of their best friends (maximum 10 names). Their teachers rated each student's ADHD symptoms using an ADHD rating scale. The results showed that 10.2% of the students were at high risk for ADHD. Significant group differences were observed between the high-risk students and other students in two of the three network parameters (degree, centrality and closeness) used to assess friendship quality, with the high-risk group showing significantly lower values of degree and closeness compared to the other students. Moreover, negative correlations were found between the ADHD rating and two social network analysis parameters. Our findings suggest that the severity of ADHD symptoms is strongly correlated with the quality of social and interpersonal relationships in students with ADHD symptoms.

  16. Social Network Analysis Reveals the Negative Effects of Attention-Deficit/Hyperactivity Disorder (ADHD Symptoms on Friend-Based Student Networks.

    Directory of Open Access Journals (Sweden)

    Jun Won Kim

    Full Text Available Social network analysis has emerged as a promising tool in modern social psychology. This method can be used to examine friend-based social relationships in terms of network theory, with nodes representing individual students and ties representing relationships between students (e.g., friendships and kinships. Using social network analysis, we investigated whether greater severity of ADHD symptoms is correlated with weaker peer relationships among elementary school students.A total of 562 sixth-graders from two elementary schools (300 males provided the names of their best friends (maximum 10 names. Their teachers rated each student's ADHD symptoms using an ADHD rating scale.The results showed that 10.2% of the students were at high risk for ADHD. Significant group differences were observed between the high-risk students and other students in two of the three network parameters (degree, centrality and closeness used to assess friendship quality, with the high-risk group showing significantly lower values of degree and closeness compared to the other students. Moreover, negative correlations were found between the ADHD rating and two social network analysis parameters.Our findings suggest that the severity of ADHD symptoms is strongly correlated with the quality of social and interpersonal relationships in students with ADHD symptoms.

  17. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness

    Science.gov (United States)

    2016-06-22

    socio-technical limitations that restrict the free flow of information and communications (e.g., Bateman , 1996). The flow of information among the...networks. Phys. A Stat. Mech. Appl. 272, 173–187. doi: 10.1016/S0378- 4371(99)00291-5 Bateman , R. L. (1996). Force XXI and the death of

  18. Defending one's friends, not one's enemies: A social network analysis of children's defending, friendship, and dislike relationships using XPNet.

    Science.gov (United States)

    Oldenburg, Beau; Van Duijn, Marijtje; Veenstra, René

    2018-01-01

    Previous studies investigating to what extent students in elementary schools defend their victimized classmates typically treated defending as an individual characteristic. Defending should, however, be seen as a directed dyadic relationship between a victim and a defender, who are embedded multiple positive and negative relationships with each other and their classmates. Accordingly, in the present study defending was investigated using social network analysis. More specifically, it was investigated to what extent defending relationships co-occurred with friendship and dislike relationships involving not only the victim and the defender but also other classmates. Bivariate Exponential Random Graph Models (ERGMs) were used to analyze the defending-friendship and defending-dislike relationships in seven grade-three classrooms. As hypothesized, the results indicated that victimized students were likely to be defended by students who they perceive as friends or who perceive them as friends. Moreover, defending was likely to occur when the victim and (potential) defender had the same friends. Victimized students were unlikely to be defended by classmates whom they disliked or who had indicated to dislike them. Finally, defending was likely to occur between students who disliked the same classmates.

  19. Too Many Friends: Social Integration, Network Cohesion and Adolescent Depressive Symptoms

    Science.gov (United States)

    Falci, Christina; McNeely, Clea

    2009-01-01

    Using a nationally representative sample of adolescents, we examine associations among social integration (network size), network cohesion (alter-density), perceptions of social relationships (e.g., social support) and adolescent depressive symptoms. We find that adolescents with either too large or too small a network have higher levels of…

  20. Interference Effects Redress over Power-Efficient Wireless-Friendly Mesh Networks for Ubiquitous Sensor Communications across Smart Cities.

    Science.gov (United States)

    Santana, Jose; Marrero, Domingo; Macías, Elsa; Mena, Vicente; Suárez, Álvaro

    2017-07-21

    Ubiquitous sensing allows smart cities to take control of many parameters (e.g., road traffic, air or noise pollution levels, etc.). An inexpensive Wireless Mesh Network can be used as an efficient way to transport sensed data. When that mesh is autonomously powered (e.g., solar powered), it constitutes an ideal portable network system which can be deployed when needed. Nevertheless, its power consumption must be restrained to extend its operational cycle and for preserving the environment. To this end, our strategy fosters wireless interface deactivation among nodes which do not participate in any route. As we show, this contributes to a significant power saving for the mesh. Furthermore, our strategy is wireless-friendly, meaning that it gives priority to deactivation of nodes receiving (and also causing) interferences from (to) the rest of the smart city. We also show that a routing protocol can adapt to this strategy in which certain nodes deactivate their own wireless interfaces.

  1. Me and my 400 friends: the anatomy of college students' Facebook networks, their communication patterns, and well-being.

    Science.gov (United States)

    Manago, Adriana M; Taylor, Tamara; Greenfield, Patricia M

    2012-03-01

    Is there a trade-off between having large networks of social connections on social networking sites such as Facebook and the development of intimacy and social support among today's generation of emerging adults? To understand the socialization context of Facebook during the transition to adulthood, an online survey was distributed to college students at a large urban university; participants answered questions about their relationships by systematically sampling their Facebook contacts while viewing their Facebook profiles online. Results confirmed that Facebook facilitates expansive social networks that grow disproportionately through distant kinds of relationship (acquaintances and activity connections), while also expanding the number of close relationships and stranger relationships, albeit at slower rates. Those with larger networks estimated that larger numbers of contacts in their networks were observing their status updates, a form of public communication to one's entire contact list. The major function of status updates was emotional disclosure, the key feature of intimacy. This finding indicates the transformation of the nature of intimacy in the environment of a social network site. In addition, larger networks and larger estimated audiences predicted higher levels of life satisfaction and perceived social support on Facebook. These findings emphasize the psychological importance of audience in the Facebook environment. Findings also suggest that social networking sites help youth to satisfy enduring human psychosocial needs for permanent relations in a geographically mobile world--college students with higher proportions of maintained contacts from the past (primarily high school friends) perceived Facebook as a more useful tool for procuring social support. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  2. A Net of Friends: Investigating Friendship by Integrating Attachment Theory and Social Network Analysis.

    Science.gov (United States)

    Gillath, Omri; Karantzas, Gery C; Selcuk, Emre

    2017-11-01

    The current article focuses on attachment style-an individual difference widely studied in the field of close relationships-and its application to the study of social networks. Specifically, we investigated whether attachment style predicts perception and management of social networks. In Study 1, we examined the associations of attachment style with perceptions of network tie strength and multiplexity. In Studies 2a and 2b, we investigated the association between attachment style and network management skills (initiating, maintaining, and dissolving ties) and whether network management skills mediated the associations of attachment style with network tie strength and multiplexity. In Study 3, experimentally enhancing attachment security made people more likely to initiate and less likely to dissolve social ties (for the latter, especially among those high on avoidance or anxiety). As for maintenance, security priming also increased maintenance; however, mainly among people high on attachment anxiety or low on attachment avoidance.

  3. How Many "Friends" Do You Need? Teaching Students How to Network Using Social Media

    Science.gov (United States)

    Sacks, Michael Alan; Graves, Nikki

    2012-01-01

    Student reliance on social media is undeniable. However, while we largely regard social media as a new phenomena, the concepts underlying it come directly from social network theory in sociology and organizational behavior. In this article, the authors examine how the social network concepts of size, quality, complexity, diffusion, and distance…

  4. Enablers of Self-Synchronization for Network-Centric Operations: Design of a Complex Command and Control Experiment

    National Research Council Canada - National Science Library

    Hutchins, Susan G; Kleinman, David L; Hocevar, Susan P; Kemple, William G; Porter, Gary R

    2001-01-01

    ... that is shorter than an adversary"s. Self synchronization is viewed as an essential process within military organizations that can increase speed of command and thus accelerate execution of the mission...

  5. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Program. Volume 2

    National Research Council Canada - National Science Library

    1997-01-01

    ...) Systems, and 33-2, Information Protection. This instruction prescribes the requirements, responsibilities and procedures for the security program for the Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS...

  6. With a little help from my friends : music consumption and networks

    Directory of Open Access Journals (Sweden)

    Paul Widdop

    2015-01-01

    Full Text Available It is widely accepted that a shift has occurred in the cultural consumption patterns of those higher in the social strata. Where tastes were based around rules of exclusion, they are now based on openness to a variety of cultures, both esoteric and popular. What is less understood is how an individual’s social networks affect their cultural tastes. Using social survey data on cultural participation, we find that musical consumption is mediated and construed through networks, and these networks play a much more significant role in cultural behaviour than current theoretical frameworks suggest.

  7. Friends' Alcohol-Related Social Networking Site Activity Predicts Escalations in Adolescent Drinking: Mediation by Peer Norms.

    Science.gov (United States)

    Nesi, Jacqueline; Rothenberg, W Andrew; Hussong, Andrea M; Jackson, Kristina M

    2017-06-01

    Adolescents' increased use of social networking sites (SNS) coincides with a developmental period of heightened risk for alcohol use initiation. However, little is known regarding associations between adolescents' SNS use and drinking initiation nor the mechanisms of this association. This study examined longitudinal associations among adolescents' exposure to friends' alcohol-related SNS postings, alcohol-favorable peer injunctive norms, and initiation of drinking behaviors. Participants were 658 high-school students who reported on posting of alcohol-related SNS content by self and friends, alcohol-related injunctive norms, and other developmental risk factors for alcohol use at two time points, 1 year apart. Participants also reported on initiation of three drinking behaviors: consuming a full drink, becoming drunk, and heavy episodic drinking (three or more drinks per occasion). Probit regression analyses were used to predict initiation of drinking behaviors from exposure to alcohol-related SNS content. Path analyses examined mediation of this association by peer injunctive norms. Exposure to friends' alcohol-related SNS content predicted adolescents' initiation of drinking and heavy episodic drinking 1 year later, controlling for demographic and known developmental risk factors for alcohol use (i.e., parental monitoring and peer orientation). In addition, alcohol-favorable peer injunctive norms statistically mediated the relationship between alcohol-related SNS exposure and each drinking milestone. Results suggest that social media plays a unique role in contributing to peer influence processes surrounding alcohol use and highlight the need for future investigative and preventive efforts to account for adolescents' changing social environments. Copyright © 2017 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  8. Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns

    OpenAIRE

    Siegel, David A.

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to con...

  9. How people make friends in social networking sites—A microscopic perspective

    Science.gov (United States)

    Hu, Haibo; Wang, Xiaofan

    2012-02-01

    We study the detailed growth of a social networking site with full temporal information by examining the creation process of each friendship relation that can collectively lead to the macroscopic properties of the network. We first study the reciprocal behavior of users, and find that link requests are quickly responded to and that the distribution of reciprocation intervals decays in an exponential form. The degrees of inviters/accepters are slightly negatively correlative with reciprocation time. In addition, the temporal feature of the online community shows that the distributions of intervals of user behaviors, such as sending or accepting link requests, follow a power law with a universal exponent, and peaks emerge for intervals of an integral day. We finally study the preferential selection and linking phenomena of the social networking site and find that, for the former, a linear preference holds for preferential sending and reception, and for the latter, a linear preference also holds for preferential acceptance, creation, and attachment. Based on the linearly preferential linking, we put forward an analyzable network model which can reproduce the degree distribution of the network. The research framework presented in the paper could provide a potential insight into how the micro-motives of users lead to the global structure of online social networks.

  10. Hundred rubles or hundred friends? (The causes of network and market corruption

    Directory of Open Access Journals (Sweden)

    M V Kravtsova

    2014-12-01

    Full Text Available The author distinguishes two forms of corruption - market corruption and network corruption. The market corruption is the use of public office for personal gain, when every firm or individual who pays a bribe receives public services. The network corruption is the use of public office for personal gain, when only those firms or individuals who are in kinship, friendship or business relationships with public officials receive public services. The author believes that network and market corruption may have different causes and consequences, that is why they should be treated separately. Using Life in Transition Survey II from EBRD (2010 the aggregated level of the market corruption, network corruption and the mixed form of corruption was measured. The results showed that the market corruption and the mixed form are strongly positively correlated and are very sensitive to worsening of socio-economic conditions. The pure network corruption correlates negatively with two other forms and is more inert and stable. The pure network corruption is not associated with worsening of socio-economic conditions and is rather a reaction to the strict anticorruption measures in the poor institutional environment.

  11. Will you accept the government's friend request? Social networks and privacy concerns.

    Directory of Open Access Journals (Sweden)

    David A Siegel

    Full Text Available Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  12. An Environment-Friendly Multipath Routing Protocol for Underwater Acoustic Sensor Network

    Directory of Open Access Journals (Sweden)

    Yun Li

    2017-01-01

    Full Text Available Underwater Acoustic Sensor Network (UASN is a promising technique by facilitating a wide range of aquatic applications. However, routing scheme in UASN is a challenging task because of the characteristics of the nodes mobility, interruption of link, and interference caused by other underwater acoustic systems such as marine mammals. In order to achieve reliable data delivery in UASN, in this work, we present a disjoint multipath disruption-tolerant routing protocol for UASN (ENMR, which incorporates the Hue, Saturation, and Value color space (HSV model to establish routing paths to greedily forward data packets to sink nodes. ENMR applies the mechanism to maintain the network topology. Simulation results show that, compared with the classic underwater routing protocols named PVBF, ENMR can improve packet delivery ratio and reduce network latency while avoiding introducing additional energy consumption.

  13. Will you accept the government's friend request? Social networks and privacy concerns.

    Science.gov (United States)

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  14. User-friendly Establishment of Trust in Distributed Home Automation Networks

    DEFF Research Database (Denmark)

    Solberg Hjorth, Theis; Torbensen, Rune; Madsen, Per Printz

    2014-01-01

    Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup...... these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented...

  15. Friend me: which factors influence top global brands participation in social network sites

    NARCIS (Netherlands)

    Araujo, T.; Neijens, P.

    2012-01-01

    Purpose - This study focuses on how brands participate in social network sites (SNSs) and investigates both the different strategies they adopt and the factors that influence these strategies. Design/methodology/approach - The activities of top brands in SNSs were investigated through a content

  16. The right friends in the right places: Understanding network structure as a predictor of voluntary turnover.

    Science.gov (United States)

    Ballinger, Gary A; Cross, Rob; Holtom, Brooks C

    2016-04-01

    Research examining the relationship between social networks and employee retention has focused almost exclusively on the number of direct links and generally found that having more ties decreases the likelihood of turnover. The present research moves beyond simple measures of network centrality to investigate the relationship between 2 additional, and theoretically distinct, facets of social capital and voluntary turnover. In 2 organizations, we found consistent evidence of a negative relationship between reputation, as measured by relationships with highly sought-out others (incoming eigenvector centrality) and voluntary turnover. Further, we found that the negative relationship between brokerage (structural holes) and turnover is significant, but only for higher-level employees. The theoretical and practical implications of expanding the suite of social capital measures to understand voluntary turnover are discussed. (c) 2016 APA, all rights reserved).

  17. User-friendly establishment of trust in distributed home automation networks

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Madsen, Per Printz; Torbensen, Rune

    2012-01-01

    Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup...... these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented...... of predefined pictograms. This method is designed to scale from smart-phones and tablets down to low-resource embedded systems. The presented approach is supported by an extensive literature study, and the ease of use and feasibility of the method has been indicated through a preliminary user study...

  18. Research Issues on Customer-Oriented and Eco-friendly Networks for Healthy Fashionable Goods

    OpenAIRE

    Fornasiero , Rosanna; Chiodi , Andrea; Carpanzano , Emanuele; Carneiro , Luis

    2010-01-01

    International audience; Needs and expectations of specific target groups - such as elderly, obese, disabled, or diabetic persons- are arising as challenging opportunities for European companies which are asked to supply small series of functional and fashionable goods of high quality, affordable price and eco-compatible. In order to design, develop, produce and distribute such products, a new framework and related components of collaborative networking need to be developed, enabling the produ...

  19. Formulation based on artificial neural network of thermodynamic properties of ozone friendly refrigerant/absorbent couples

    International Nuclear Information System (INIS)

    Soezen, Adnan; Arcaklioglu, Erol; Oezalp, Mehmet

    2005-01-01

    This paper presents a new approach based on artificial neural networks (ANNs) to determine the properties of liquid and two phase boiling and condensing of two alternative refrigerant/absorbent couples (methanol/LiBr and methanol/LiCl). These couples do not cause ozone depletion and use in the absorption thermal systems (ATSs). ANNs are able to learn the key information patterns within multidimensional information domain. ANNs operate such as a 'black box' model, requiring no detailed information about the system. On the other hand, they learn the relationship between the input and the output. In order to train the neural network, limited experimental measurements were used as training data and test data. In this study, in input layer, there are temperatures in the range of 298-498 K, pressures (0.1-40 MPa) and concentrations of 2%, 7%, 12% of the couples; specific volume is in output layer. The back-propagation learning algorithm with three different variants, namely scaled conjugate gradient (SCG), Pola-Ribiere conjugate gradient (CGP), and Levenberg-Marquardt (LM), and logistic sigmoid transfer function were used in the network so that the best approach can find. The most suitable algorithm and neuron number in the hidden layer are found as SCG with 8 neurons. For this number level, after the training, it is found that maximum error is less than 3%, average error is about 1% and R 2 value are 99.999%. As seen from the results obtained the thermodynamic equations for each pair by using the weights of network have been obviously predicted within acceptable errors. This paper shows that values predicted with ANN can be used to define the thermodynamic properties instead of approximate and complex analytic equations

  20. User-friendly Tool for Power Flow Analysis and Distributed Generation Optimisation in Radial Distribution Networks

    Directory of Open Access Journals (Sweden)

    M. F. Akorede

    2017-06-01

    Full Text Available The intent of power distribution companies (DISCOs is to deliver electric power to their customers in an efficient and reliable manner – with minimal energy loss cost. One major way to minimise power loss on a given power system is to install distributed generation (DG units on the distribution networks. However, to maximise benefits, it is highly crucial for a DISCO to ensure that these DG units are of optimal size and sited in the best locations on the network. This paper gives an overview of a software package developed in this study, called Power System Analysis and DG Optimisation Tool (PFADOT. The main purpose of the graphical user interface-based package is to guide a DISCO in finding the optimal size and location for DG placement in radial distribution networks. The package, which is also suitable for load flow analysis, employs the GUI feature of MATLAB. Three objective functions are formulated into a single optimisation problem and solved with fuzzy genetic algorithm to simultaneously obtain DG optimal size and location. The accuracy and reliability of the developed tool was validated using several radial test systems, and the results obtained are evaluated against the existing similar package cited in the literature, which are impressive and computationally efficient.

  1. A game theoretical approach for cooperative environmentally friendly cellular networks powered by the smart grid

    KAUST Repository

    Ghazzai, Hakim

    2014-11-01

    This paper investigates the collaboration between multiple mobile operators to optimize the energy efficiency of cellular networks, maximize their profits or achieve or tradeoff between both objectives. Mobile operators cooperate together by eliminating redundant base stations (BSs) using a low complexity algorithm that aims to maximize their objective functions subject to a quality of service constraint. The problem is modeled as a two-level Stackelberg game: a mobile operator level and a smart grid level. Indeed, in our framework, we assume that cellular networks are powered by multiple energy providers existing in the smart grid characterized by different pollutant levels in addition to renewable energy source deployed in BS sites. The objective is to find the best active BS combination and the optimal procurement decision needed to the network operation during collaboration by considering electricity real-time pricing. Our study includes the daily traffic variation in addition to the daily green energy availability. Our simulation results show a significant saving in terms of CO2 emissions compared to the non-collaboration case and that cooperative mobile operators exploiting renewables are more awarded than traditional operators. © 2014 IEEE.

  2. Reconstructing social networks : The Importance of friends and family in the acculturation of unaccompanied minors

    OpenAIRE

    Spaun, Hege

    2007-01-01

    The main goal of this study was to explore how social network variables and social skills influence acculturation in a group of immigrants who came to Norway as unaccompanied minor asylum seekers. Acculturation, as measured by ethnic and host culture competence, is seen as a resource for the individual, and a necessity in order to be successful and have a sense of belonging in a given culture. Sixty-two youth who came to Norway as unaccompanied minor asylum seekers (UMAs) between the years 20...

  3. Friend or Foe: MicroRNAs in the p53 network.

    Science.gov (United States)

    Luo, Zhenghua; Cui, Ri; Tili, Esmerina; Croce, Carlo

    2018-04-10

    The critical tumor suppressor gene TP53 is either lost or mutated in more than half of human cancers. As an important transcriptional regulator, p53 modulates the expression of many microRNAs. While wild-type p53 uses microRNAs to suppress cancer development, microRNAs that are activated by gain-of-function mutant p53 confer oncogenic properties. On the other hand, the expression of p53 is tightly controlled by a fine-tune machinery including microRNAs. MicroRNAs can target the TP53 gene directly or other factors in the p53 network so that expression and function of either the wild-type or the mutant forms of p53 is downregulated. Therefore, depending on the wild-type or mutant p53 context, microRNAs contribute substantially to suppress or exacerbate tumor development. Copyright © 2018. Published by Elsevier B.V.

  4. Suicidal Disclosures among Friends: Using Social Network Data to Understand Suicide Contagion*

    Science.gov (United States)

    Mueller, Anna S.; Abrutyn, Seth

    2015-01-01

    A robust literature suggests that suicide is socially contagious; however, we know little about how and why suicide spreads. Using network data from the National Longitudinal Study of Adolescent to Adult Health, we examine the effects of alter’s (1) disclosed and (2) undisclosed suicide attempts, (3) suicide ideation and (4) emotional distress on ego’s mental health one year later to gain insights into the emotional and cultural mechanisms that underlie suicide contagion. We find that when egos know about alter’s suicide attempt, they report significantly higher levels of emotional distress and are more likely to report suicidality, net of extensive controls; however, alter’s undisclosed suicide attempts and ideation have no significant effect on ego’s mental health. Finally, we find evidence that emotional distress is contagious in adolescence, though it does not seem to promote suicidality. We discuss the implications of our findings for suicide contagion specifically and sociology more generally. PMID:25722129

  5. The ING Seismic Network Databank (ISND : a friendly parameters and waveform database

    Directory of Open Access Journals (Sweden)

    G. Smriglio

    1995-06-01

    Full Text Available he Istituto Nazionale di Geofisica (ING Seismic Network Database (ISND includes over 300000 arrivaI times of Italian, Mediterranean and teleseismic earthquakes from 1983 to date. This database is a useful tool for Italian and foreign seismologists ( over 1000 data requests in the first 6 months of this year. Recently (1994 the ING began storing in the ISND, the digital waveforms associated with arri,Tal times and experimen- tally allowed users to retrieve waveforms recorded by the ING acquisition system. In this paper we describe the types of data stored and the interactive and batch procedures available to obtain arrivaI times and/or asso- ciated waveforms. The ISND is reachable via telephone line, P.S.I., Internet and DecNet. Users can read and send to their E-mail address alI selected earthquakes locations, parameters, arrivaI times and associated digital waveforms (in SAC, SUDS or ASCII format. For r;aedium or large amounts of data users can ask to receive data by means of magnetic media (DAT, Video 8, floppy disk.

  6. Is agritourism eco-friendly? A comparison between agritourisms and other farms in Italy using farm accountancy data network dataset.

    Science.gov (United States)

    Mastronardi, Luigi; Giaccio, Vincenzo; Giannelli, Agostino; Scardera, Alfonso

    2015-01-01

    This paper presents the results of research regarding the environmental performances of Italian farms with agritourism compared with farms without agritourism. In Italy, agritourism is considered an agricultural activity and can only be performed by a farmer. Moreover, Italian national legislation forces the farmer to dedicate himself mainly to traditional farming, rather than to tourism activities. For this reason, environmental performances have been highlighted by analyzing only features and production systems of the farms. By utilizing the most frequent indicators used in studies regarding sustainability, the authors show how Italian agritourisms tend to develop more environmentally friendly agricultural methods, which have a positive impact on biodiversity, landscape and natural resources. The empirical analysis is based on the Italian FADN (Farm Accountancy Data Network) dataset. The European FADN was created to represent farms' technical and economic operation in the European Union and on which it drafts the agricultural and rural policies. The dichotomous structure of the dependent variable (presence or absence of agritourism at the farm) has a propensity for an assessment method based on Binary Response Model Regression.

  7. Human-Systems Integration (HSI) and the Network Integration Evaluations (NIEs), Part 3: Mitigating Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2016-06-01

    require higher levels of mental ability as well as higher levels of education , training, and experience for effective use . In short, ICT insertions such...the people using the gizmos” (Wallace 2005, p. 20). Personnel, training, and organization are important aspects of overall mission command system...organizational learning is important with respect to how well a test unit will use new equipment suites during an exercise such as the NIEs (Alberts

  8. Commanders' Survey: School for Command Preparation Feedback

    National Research Council Canada - National Science Library

    Frame, Adela

    1997-01-01

    .... All command designees attend the PreCommand Course (PCC). PCC provides common understanding of current doctrine, and up-to-date information on Army-wide policy, programs and special items of interest...

  9. Design of a hybrid command and control mobile botnet

    CSIR Research Space (South Africa)

    Pieterse, H

    2013-05-01

    Full Text Available and control mobile botnet. The hybrid design explores the efficiency of multiple command and control channels against the following objectives: no single point of failure within the topology, low cost for command dissemination, limited network activities...

  10. Building a Capabilities Network to Improve Disaster Preparation Efforts in the European Command (EUCOM) Area of Responsibility

    Science.gov (United States)

    2012-12-01

    She planned and executed a wedding, worked full time and withstood many lonely days and nights as I traversed my way through a master’s degree. For...We believe God has equipped the church - the most diverse social network on the planet - to be at the center of these stories, leveraging time

  11. Intermediate peer contexts and educational outcomes: Do the friends of students' friends matter?

    Science.gov (United States)

    Carbonaro, William; Workman, Joseph

    2016-07-01

    Sociologists of education have long been interested in the effects of peer relations on educational outcomes. Recent theory and research on adolescence suggest that peers on the boundaries of students' friendship networks may play an important role in shaping behaviors and educational outcomes. In this study, we examine the importance of a key "intermediate peer context" for students' outcomes: the friends of a student's friends. Our findings indicate both friends' and friends' friends' characteristics independently predict students' college expectations and their risk of dropping out of high school (although only friends' characteristics predict GPA). Our models suggest the magnitude of students' friends-of-friends' characteristics are at least as large their friends' characteristics. Together, the association between the peer context and students outcomes is considerably larger when accounting for both the characteristics of students' friends and the friends of their friends. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. A friend request from dear old dad: associations between parent-child social networking and adolescent outcomes.

    Science.gov (United States)

    Coyne, Sarah M; Padilla-Walker, Laura M; Day, Randal D; Harper, James; Stockdale, Laura

    2014-01-01

    This study examined the relationship between parent-child social networking, connection, and outcomes for adolescents. Participants (491 adolescents and their parents) completed a number of questionnaires on social networking use, feelings of connection, and behavioral outcomes. Social networking with parents was associated with increased connection between parents and adolescents. Feelings of connection then mediated the relationship between social networking with parents and behavioral outcomes, including higher prosocial behavior and lower relational aggression and internalizing behavior. Conversely, adolescent social networking use without parents was associated with negative outcomes, such as increased relational aggression, internalizing behaviors, delinquency, and decreased feelings of connection. These results indicate that although high levels of social networking use may be problematic for some individuals, social networking with parents may potentially strengthen parent-child relationships and then lead to positive outcomes for adolescents.

  13. "You've got a friend in me": can social networks mediate the relationship between mood and MCI?

    Science.gov (United States)

    Yates, Jennifer A; Clare, Linda; Woods, Robert T

    2017-07-13

    Social networks can change with age, for reasons that are adaptive or unwanted. Social engagement is beneficial to both mental health and cognition, and represents a potentially modifiable factor. Consequently this study explored this association and assessed whether the relationship between mild cognitive impairment (MCI) and mood problems was mediated by social networks. This study includes an analysis of data from the Cognitive Function and Ageing Study Wales (CFAS Wales). CFAS Wales Phase 1 data were collected from 2010 to 2013 by conducting structured interviews with older people aged over 65 years of age living in urban and rural areas of Wales, and included questions that assessed cognitive functioning, mood, and social networks. Regression analyses were used to investigate the associations between individual variables and the mediating role of social networks. Having richer social networks was beneficial to both mood and cognition. Participants in the MCI category had weaker social networks than participants without cognitive impairment, whereas stronger social networks were associated with a decrease in the odds of experiencing mood problems, suggesting that they may offer a protective effect against anxiety and depression. Regression analyses revealed that social networks are a significant mediator of the relationship between MCI and mood problems. These findings are important, as mood problems are a risk factor for progression from MCI to dementia, so interventions that increase and strengthen social networks may have beneficial effects on slowing the progression of cognitive decline.

  14. Design of a hybrid command and control mobile botnet: Presentation

    CSIR Research Space (South Africa)

    Pieterse, H

    2013-03-01

    Full Text Available smartphones controlled by a botmaster through a command and control network to serve a malicious purpose. This study presents the design of a hybrid command and control mobile botnet. It describes the propagation vectors, command and control channels...

  15. Understanding the Selection Bias : Social Network Processes and the Effect of Prejudice on the Avoidance of Outgroup Friends

    NARCIS (Netherlands)

    Stark, Tobias H.|info:eu-repo/dai/nl/335996701

    2015-01-01

    Research has found that prejudiced people avoid friendships with members of ethnic outgroups. Results of this study suggest that this effect is mediated by a social network process. Longitudinal network analysis of a three-wave panel study of 12- to 13-year-olds (N = 453) found that more prejudiced

  16. Me and My 400 Friends: The Anatomy of College Students' Facebook Networks, Their Communication Patterns, and Well-Being

    Science.gov (United States)

    Manago, Adriana M.; Taylor, Tamara; Greenfield, Patricia M.

    2012-01-01

    Is there a trade-off between having large networks of social connections on social networking sites such as Facebook and the development of intimacy and social support among today's generation of emerging adults? To understand the socialization context of Facebook during the transition to adulthood, an online survey was distributed to college…

  17. Do narcissism and emotional intelligence win us friends? : modeling dynamics of peer popularity using inferential network analysis

    OpenAIRE

    Czarna, Anna; Leifeld, Philip; Śmieja-Nęcka, Magdalena; Dufner, Michael; Salovey, Peter

    2016-01-01

    This research investigated effects of narcissism and emotional intelligence (EI) on popularity in social networks. In a longitudinal field study, we examined the dynamics of popularity in 15 peer groups in two waves (N = 273). We measured narcissism, ability EI, and explicit and implicit self-esteem. In addition, we measured popularity at zero acquaintance and 3 months later. We analyzed the data using inferential network analysis (temporal exponential random graph modeling, TERGM) accounting...

  18. "You've got a friend in me": can social networks mediate the relationship between mood and MCI?

    OpenAIRE

    Yates, Jennifer A.; Clare, Linda; Woods, Robert T.

    2017-01-01

    Background Social networks can change with age, for reasons that are adaptive or unwanted. Social engagement is beneficial to both mental health and cognition, and represents a potentially modifiable factor. Consequently this study explored this association and assessed whether the relationship between mild cognitive impairment (MCI) and mood problems was mediated by social networks. Methods This study includes an analysis of data from the Cognitive Function and Ageing Study Wales (CFAS Wales...

  19. l-Glutamic acid assisted eco-friendly one-pot synthesis of sheet-assembled platinum-palladium alloy networks for methanol oxidation and oxygen reduction reactions.

    Science.gov (United States)

    Shi, Ya-Cheng; Mei, Li-Ping; Wang, Ai-Jun; Yuan, Tao; Chen, Sai-Sai; Feng, Jiu-Ju

    2017-10-15

    In this work, bimetallic platinum-palladium sheet-assembled alloy networks (PtPd SAANs) were facilely synthesized by an eco-friendly one-pot aqueous approach under the guidance of l-glutamic acid at room temperature, without any additive, seed, toxic or organic solvent involved. l-Glutamic acid was served as the green shape-director and weak-stabilizing agent. A series of characterization techniques were employed to examine the morphology, structure and formation mechanism of the product. The architectures exhibited improved electrocatalytic activity and durable ability toward methanol oxidation reaction (MOR) and oxygen reduction reaction (ORR) in contrast with commercial Pt black and Pd black catalysts. This is ascribed to the unique structures of the obtained PtPd SAANs and the synergistic effects of the bimetals. These results demonstrate the potential application of the prepared catalyst in fuel cells. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. US command improvements and command vulnerability

    International Nuclear Information System (INIS)

    Ball, D.; Bethe, H.A.; Blair, B.G.; Bracken, P.; Carter, A.B.; Dickinson, H.; Garwin, R.L.; Holloway, D.; Kendall, H.W.

    1988-01-01

    In essence, the United States still relies on the strategic command system erected during the 1960s and 1970s, but as we have seen, this system suffers from a number of serious weaknesses. Among these the authors emphasized the vulnerability of vital communications even before any warheads impact directly on U.S. targets, as well as the systems; heavy reliance on a relatively small number of limited-endurance aircraft as command posts and radio relays. This paper focuses on the committed improvement program, assess its impact on command vulnerability, and offer suggestions for further command improvements designed to enhance crisis stability and to facilitate ware termination should deterrence fail. The reader should note that this chapter is rather more technical than the remainder of this book

  1. Do Narcissism and Emotional Intelligence Win Us Friends? Modeling Dynamics of Peer Popularity Using Inferential Network Analysis.

    Science.gov (United States)

    Czarna, Anna Z; Leifeld, Philip; Śmieja, Magdalena; Dufner, Michael; Salovey, Peter

    2016-09-27

    This research investigated effects of narcissism and emotional intelligence (EI) on popularity in social networks. In a longitudinal field study, we examined the dynamics of popularity in 15 peer groups in two waves (N = 273). We measured narcissism, ability EI, and explicit and implicit self-esteem. In addition, we measured popularity at zero acquaintance and 3 months later. We analyzed the data using inferential network analysis (temporal exponential random graph modeling, TERGM) accounting for self-organizing network forces. People high in narcissism were popular, but increased less in popularity over time than people lower in narcissism. In contrast, emotionally intelligent people increased more in popularity over time than less emotionally intelligent people. The effects held when we controlled for explicit and implicit self-esteem. These results suggest that narcissism is rather disadvantageous and that EI is rather advantageous for long-term popularity. © 2016 by the Society for Personality and Social Psychology, Inc.

  2. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  3. Customer-Oriented and Eco-friendly Networks for Health Fashionable Goods – The CoReNet Approach

    OpenAIRE

    Azevedo , Américo; Bastos , João; Almeida , António; Soares , Carlos; Magaletti , Nicola; Grosso , Enrico ,; Stellmach , Dieter; Winkler , Marcus; Fornasiero , Rosanna; Zangiacomi , Andrea; Chiodi , Andrea

    2011-01-01

    Part 3: Value Chain for Enhancing Collaborative Networks; International audience; The design, production and distribution of small series of health fashionable goods for specific target groups of wide impact in terms of market for the European industry as elderly, disables, diabetics and obese people represents a challenging opportunity for European companies which are asked to supply the demand with affordable price and eco-compatible products. Added to this challenge, textile, clothing and ...

  4. Comigrants and friends: informal networks and the transmission of traditional ecological knowledge among seminomadic pastoralists of Gujarat, India

    Directory of Open Access Journals (Sweden)

    Matthieu Salpeteur

    2016-06-01

    Full Text Available Previous research has shown that social organization may affect the distribution of traditional ecological knowledge (TEK within local communities of natural resource users in multiple ways. However, in this line of research the potential role of informal relationships has mostly been overlooked. In this article, we contribute toward filling this research gap by studying how two types of informal relationships, namely migration partnership and friendship, affect the distribution of TEK within a community of seminomadic pastoralists from the Kutch area, Gujarat, India. Using social network analysis, we map three networks, migration, men friendship, and women friendship, and compare with similarity-based quantitative approaches the clusters extracted from these networks in relation to four domains of TEK: knowledge about soils, about ethnoveterinary practices, about sheep breeds, and in ethnobotany. Our results show that (1 migration clusters are associated to significant variations in three TEK domains, while (2 friendship clusters are associated to minor variations. We relate these results to the importance of common practical experiences involved by joint migration. Moreover, kin relations are shown to strongly underlie friendship and migration relations, and as such appear as a potential driver of the dynamics of the local TEK system. We conclude by advocating for a better inclusion of such informal relationships in future research on local TEK dynamics, following recent developments in studies on natural resource governance.

  5. What's Love Got to Do with It? Exploring the Impact of Maintenance Rules, Love Attitudes, and Network Support on Friends with Benefits Relationships

    Science.gov (United States)

    Hughes, Mikayla; Morrison, Kelly; Asada, Kelli Jean K.

    2005-01-01

    Friends with benefits relationships (FWBRs) are defined as relationships between cross-sex friends in which the friends engage in sexual activity but do not define their relationship as romantic. Relationship scholars have only recently begun to examine these relationships, despite their mention in the popular media (e.g., HBO's 'Sex in the City,'…

  6. When Sharing Is a Bad Idea: The Effects of Online Social Network Engagement and Sharing Passwords with Friends on Cyberbullying Involvement.

    Science.gov (United States)

    Meter, Diana J; Bauman, Sheri

    2015-08-01

    Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior.

  7. The Effects of Profile Pictures and Friends' Comments on Social Network Site Users' Body Image and Adherence to the Norm.

    Science.gov (United States)

    Flynn, Mark A

    2016-04-01

    This study sought to explore the effects of exposure to Facebook body ideal profile pictures and norm conforming comments on users' body image. In addition, the social identity and self-categorization theoretical frameworks were used to explore users' endorsement of a body ideal norm. A mock Facebook page was used to conduct a pretest posttest 2 × 2 between-group web-based experiment that featured body ideal profile pictures (body ideal vs. no body) and body ideal comments (conforming vs. nonconforming). Five hundred and one participants completed the experiment and passed all manipulation checks. Participants viewed pictures and comments on the status page and were able to leave their own comment before exiting. Results demonstrated no significant main effects. However, predispositional body satisfaction significantly moderated the relationship between body ideal pictures and body satisfaction. Most comments supported the body ideal norm. However, in support of self-categorization theory, participants exposed to nonconforming comments made nonconforming comments themselves significantly more than those exposed to conforming comments. The findings demonstrated the importance of continued body image research in social network sites, as well as the potential for self-categorization theory to guide such research.

  8. A development of user-friendly graphical interface for a blanket simulator

    International Nuclear Information System (INIS)

    Lee, Young-Seok; Yoon, Seok-Heun; Han, Jung-Hoon

    2010-01-01

    A web-based user-friendly graphical interface (GUI) system, named GUMBIS (Graphical User-friendly Monte-Carlo-Application Blanket-Design Interface System), was developed to cut down the efforts of the researchers and practitioners who study tokamak blanket designs with the Monte Carlo MCNP/MCNPX codes. GUMBIS was also aimed at supporting them to use the codes for their study without having through understanding on the complex menus and commands of the codes. Developed on the web-based environment, GUMBIS provides task sharing capability on a network. GUMBIS, applicable for both blanket design and neutronics analysis, could facilitate not only advanced blanket R and D but also the education and training of the researchers in the R and D.

  9. A Framework for Architecture-Based Planning and Assessment to Support Modeling and Simulation of Network-Centric Command and Control

    Science.gov (United States)

    2006-02-17

    included system-unique specifications derived to counter these threats. But the international security environment has changed --- and it will continue... Netowrk -Centric Command and Control 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 20 19a. NAME

  10. Robot Task Commander with Extensible Programming Environment

    Science.gov (United States)

    Hart, Stephen W (Inventor); Yamokoski, John D. (Inventor); Wightman, Brian J (Inventor); Dinh, Duy Paul (Inventor); Gooding, Dustin R (Inventor)

    2014-01-01

    A system for developing distributed robot application-level software includes a robot having an associated control module which controls motion of the robot in response to a commanded task, and a robot task commander (RTC) in networked communication with the control module over a network transport layer (NTL). The RTC includes a script engine(s) and a GUI, with a processor and a centralized library of library blocks constructed from an interpretive computer programming code and having input and output connections. The GUI provides access to a Visual Programming Language (VPL) environment and a text editor. In executing a method, the VPL is opened, a task for the robot is built from the code library blocks, and data is assigned to input and output connections identifying input and output data for each block. A task sequence(s) is sent to the control module(s) over the NTL to command execution of the task.

  11. Cyber Friendly Fire

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2011-09-01

    Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public

  12. Army Aviation and the Mission Command Warfighting Function

    Science.gov (United States)

    2017-06-09

    information systems , processes and procedures, optimize facilities and equipment, and build understanding of the networks that link the headquarters...however further publication or sale of copyrighted images is not permissible. ii REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188...Command System , Mission Command Information Systems , Training, Mission Training Complex 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  13. AFRICOM: Combatant Command for the 21st Century

    National Research Council Canada - National Science Library

    Juergens, Jr., Richard A

    2008-01-01

    ...: European Command, Southern Command, Northern Command, Central Command, and Pacific Command, as the Department of Defense's unified command structure responsible for specific geographical regions of the world...

  14. Communication for command and control systems

    CERN Document Server

    Morris, D J

    1983-01-01

    Communication for Command and Control Systems provides a thorough exposition of the basic theoretical and practical features involved in the design of communication networks for command and control systems. This book focuses primarily on the practical side of computer-controlled communication. This text concentrates on the communication sides of the subject by surveying the means of transferring data between the various processing points and by appraising their potential advantages and possible defects in implementation. In this respect, this book should prove useful for the practicing enginee

  15. The Role of Friendship within Social Networks of Divisions at Recruit Training Command and its Effect on the Resilience of Naval Recruits

    Science.gov (United States)

    2017-06-01

    Review, 2(3), 538–555. doi: 10.2307/259141 Luthar, S. S., Cicchetti, D., & Becker , B. (2000). The construct of resilience: a critical evaluation and...Friendship Network at T2 . Integrated Division–Received No Intervention...54  Figure 11.  Division 1 Venting Network at T2 . Integrated Division–Received No Intervention

  16. Command History for 1990

    Science.gov (United States)

    1991-05-01

    Marine Corps Tiaining Systems (CBESS) memorization training Inteligence Center, Dam Neck Threat memorization training Commander Tactical Wings, Atlantic...News Shipbuilding Technical training AEGIS Training Center, Dare Artificial Intelligence (Al) Tools Computerized firm-end analysis tools NETSCPAC...Technology Department and provides computational and electronic mail support for research in areas of artificial intelligence, computer-assisted instruction

  17. Command Home Page

    Science.gov (United States)

    Inclusion And Diversity Navy Standard Integrated Personnel System (NSIPS) My Navy Portal Board of One Source USA.gov U.S. Office of Special Counsel Social Media Directory and Policy US Navy App Locker Navy Personnel Command (NPC) Navy SAPR Navy EEO Inclusion And Diversity Navy Standard Integrated

  18. SOA approach to battle command: simulation interoperability

    Science.gov (United States)

    Mayott, Gregory; Self, Mid; Miller, Gordon J.; McDonnell, Joseph S.

    2010-04-01

    NVESD is developing a Sensor Data and Management Services (SDMS) Service Oriented Architecture (SOA) that provides an innovative approach to achieve seamless application functionality across simulation and battle command systems. In 2010, CERDEC will conduct a SDMS Battle Command demonstration that will highlight the SDMS SOA capability to couple simulation applications to existing Battle Command systems. The demonstration will leverage RDECOM MATREX simulation tools and TRADOC Maneuver Support Battle Laboratory Virtual Base Defense Operations Center facilities. The battle command systems are those specific to the operation of a base defense operations center in support of force protection missions. The SDMS SOA consists of four components that will be discussed. An Asset Management Service (AMS) will automatically discover the existence, state, and interface definition required to interact with a named asset (sensor or a sensor platform, a process such as level-1 fusion, or an interface to a sensor or other network endpoint). A Streaming Video Service (SVS) will automatically discover the existence, state, and interfaces required to interact with a named video stream, and abstract the consumers of the video stream from the originating device. A Task Manager Service (TMS) will be used to automatically discover the existence of a named mission task, and will interpret, translate and transmit a mission command for the blue force unit(s) described in a mission order. JC3IEDM data objects, and software development kit (SDK), will be utilized as the basic data object definition for implemented web services.

  19. 32 CFR 724.406 - Commander, Naval Medical Command.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander, Naval Medical Command. 724.406 Section 724.406 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Principal Elements of the Navy Department Discharge Review System § 724.406 Commander...

  20. Combatant Commanders Informational Series, USEUCOM

    National Research Council Canada - National Science Library

    Burton, Steven

    1996-01-01

    ...) and the diverse challenges it faces require it to maintain one of the highest operational and personnel tempos of the combatant command, are limited in the opportunity of personnel new to the command...

  1. Network-Centric Applications and Tactical Networks

    National Research Council Canada - National Science Library

    Krout, Timothy; Durbano, Steven; Shearer, Ruth

    2003-01-01

    .... Command and control applications will always require communications capabilities. There are numerous examples of command and control applications that have been developed without adequate attention to the realities of tactical networks...

  2. Command and motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher; Hvidtved, Johan; Andersen, Lotte Bøgh

    2014-01-01

    Motivated employees are crucial to organizations, but external interventions such as command systems and financial incentives may decrease motivation. If these external interventions are perceived to be controlling, they are expected to crowd out intrinsic motivation, and this may also apply...... to other types of autonomous motivation such as public service motivation. The perception of external interventions is thus expected to be vital. This article investigates how the perception of a specific command system (obligatory student plans) is associated with intrinsic motivation and public service...... motivation. Using a dataset with 3,230 school teachers in Denmark, a structural equation model shows that the perception of obligatory student plans as controlling is negatively associated with all of the investigated types of employee motivation, supporting that motivation crowding can occur....

  3. Joint Mission Command Implementation

    Science.gov (United States)

    2016-01-22

    choose. The paper finds that trust is strongly influenced by the subconscious brain and treating it like a tool ignores biology and results in... bias for action and empowerment.14 Since then, the services have evaluated their own concepts of command assessing them against Dempsey’s vision. Lt...understanding, intent, and trust, only trust is strongly influenced by the subconscious brain. Treating trust like it can be taught, or a behavior that

  4. "Friending" Professors, Parents and Bosses: A Facebook Connection Conundrum

    Science.gov (United States)

    Karl, Katherine A.; Peluchette, Joy V.

    2011-01-01

    The ever-growing popularity of Facebook has led some educators to ponder what role social networking might have in education. The authors examined student reactions to friend requests from people outside their regular network of friends including professors, parents, and employers. We found students have the most positive reactions to friend…

  5. Force Protection and Command Relationships: Who's Responsible

    National Research Council Canada - National Science Library

    Moller, James

    1998-01-01

    .... This monograph analyzes the joint force protection program by investigating the terms: command, chain of command, command relationship, and how these terms authorize and empower a commander to implement this program across the joint force...

  6. Command History, 1993.

    Science.gov (United States)

    1994-04-01

    his space capsule. The ()CUILAR COtJNTI:,RROI,.L I)FVICI" was built by the Naval Air Rework Facility, NAS Pensacola. tfor NAMRI, in the early 1960s...Dunwoody, GA Kevin G. Singleton, ENS USNR Naval Aviation Schools Command Kyle W M. Taylor, ENS USNR U.S. Naval Academy Jason A. Temple, ENS USNR Auburn...Pensacola, 13-15 Oct 93. Pokorski, T.L., LICDR MSC USN, attended Aircrew Modified IEquipment for Ladies in Aviation (AMELIA) Fri -service Long-range Planning

  7. Recommendations on Future Operational Environments Command Control and Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2015-01-01

    It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of army as command control. Some significant recommendations on command control (C2) and cyber security h...

  8. Friend or Foe?

    Science.gov (United States)

    ... Ribbon Commands Skip to main content Turn off Animations Turn on Animations Our Sponsors Log in | Register Menu Log in | ... best in him, rather than the worst. By reading up on the subject, discussing it with my ...

  9. Friend Finder (Game)

    Science.gov (United States)

    ... for a spot on the Friend Finder All-Star List. Earn your spot by showing you're savvy when it comes to making friends online . Downloads Please download and share our ... Email Updates Blog Feed Facebook YouTube Twitter The Federal Trade Commission (FTC) is the ...

  10. OS Friendly Microprocessor Architecture

    Science.gov (United States)

    2017-04-01

    NOTES Patrick La Fratta is now affiliated with Micron Technology, Inc., Boise, Idaho. 14. ABSTRACT We present an introduction to the patented ...Operating System Friendly Microprocessor Architecture (OSFA). The software framework to support the hardware-level security features is currently patent ...Army is assignee. OS Friendly Microprocessor Architecture. United States Patent 9122610. 2015 Sep. 2. Jungwirth P, inventor; US Army is assignee

  11. “Is it me or should my friends take the credit?” The role of social networks and social identity in recovery from addiction

    OpenAIRE

    Bathish, Ramez; Best, David; Savic, Michael; Beckwith, Melinda; Mackenzie, Jock; Lubman, Dan I.

    2017-01-01

    This study explored the role of social network and social identity factors in recovery from addiction. The sample consisted of 537 individuals who completed a survey about their experiences of recovery. Results indicated that the transition from addiction to recovery was characterized by an increase in social connectedness and changes in social network composition coupled with the emergence of a “recovery” identity. These factors accounted for 14% of the variance in quality of life when contr...

  12. BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    HUSAIN SHAHNAWAZ

    2012-10-01

    Full Text Available Ad-hoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. Since there is no central controller to determine the reliable & secure communication paths in Mobile Adhoc Network, each node in the ad hoc network has to rely on each other in order to forward packets, thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. In a mobile ad hoc network (MANET where security is a crucial issue and they are forced to rely on the neighbor node, trust plays an important role that could improve the number of successful data transmission. Larger the number of trusted nodes, higher successful data communication process rates could be expected. In this paper, Black Hole attack is applied in the network, statistics are collected to design intrusion detection engine for MANET Intrusion Detection System (IDS. Feature extraction and rule inductions are applied to find out the accuracy of detection engine by using support vector machine. In this paper True Positive generated by the detection engine is very high and this is a novel approach in the area of Mobile Adhoc Intrusion detection system.

  13. Environmentally Friendly Machining

    CERN Document Server

    Dixit, U S; Davim, J Paulo

    2012-01-01

    Environment-Friendly Machining provides an in-depth overview of environmentally-friendly machining processes, covering numerous different types of machining in order to identify which practice is the most environmentally sustainable. The book discusses three systems at length: machining with minimal cutting fluid, air-cooled machining and dry machining. Also covered is a way to conserve energy during machining processes, along with useful data and detailed descriptions for developing and utilizing the most efficient modern machining tools. Researchers and engineers looking for sustainable machining solutions will find Environment-Friendly Machining to be a useful volume.

  14. The most common friend first immunization

    International Nuclear Information System (INIS)

    Nian Fu-Zhong; Hu Cha-Sheng

    2016-01-01

    In this paper, a standard susceptible-infected-recovered-susceptible(SIRS) epidemic model based on the Watts–Strogatz (WS) small-world network model and the Barabsi–Albert (BA) scale-free network model is established, and a new immunization scheme — “the most common friend first immunization” is proposed, in which the most common friend’s node is described as being the first immune on the second layer protection of complex networks. The propagation situations of three different immunization schemes — random immunization, high-risk immunization, and the most common friend first immunization are studied. At the same time, the dynamic behaviors are also studied on the WS small-world and the BA scale-free network. Moreover, the analytic and simulated results indicate that the immune effect of the most common friend first immunization is better than random immunization, but slightly worse than high-risk immunization. However, high-risk immunization still has some limitations. For example, it is difficult to accurately define who a direct neighbor in the life is. Compared with the traditional immunization strategies having some shortcomings, the most common friend first immunization is effective, and it is nicely consistent with the actual situation. (paper)

  15. Paramount Interest: Command Relationships in Amphibious Warfare

    National Research Council Canada - National Science Library

    Peabody, Hitch

    2004-01-01

    In 2001, U.S. amphibious forces abandoned sixty years of established command and control doctrine, replacing the traditional senior-subordinate relationship between Navy and Marine commanders with coequal command. Why did it change...

  16. Command in a field hospital.

    Science.gov (United States)

    Bricknell, M C M

    2003-03-01

    This paper examines the challenges involved in commanding a field hospital. There are frequent, dynamic tensions between the military culture that is based on a task-focussed, hierarchical structure and the clinical culture that is based on flat, process-focussed, multidisciplinary teams. The paper outlines the cultural environment of the field hospital and then examines the deployment sequence whereby a functioning clinical facility may be created from a group of disparate individuals. There are a number of tools that may assist with this including the personality of the Commanding Officer, individual skills, the creation of an organizational identity and the choice of command structure.

  17. Command and Control of Joint Air Operations through Mission Command

    Science.gov (United States)

    2016-06-01

    and outlines the C2 architecture systems, processes, and philosophy of com- mand required to enable mission command effectively. Mission Command...General Dempsey highlights the fact that “trust is the moral sinew that binds the distributed Joint Force 2020 together” and observes that “unless...con- fident about how their subordinates will make decisions and adapt to the dynamic battlespace environment. Processes, Systems, and Philosophy of

  18. Tools virtualization for command and control systems

    Science.gov (United States)

    Piszczek, Marek; Maciejewski, Marcin; Pomianek, Mateusz; Szustakowski, Mieczysław

    2017-10-01

    Information management is an inseparable part of the command process. The result is that the person making decisions at the command post interacts with data providing devices in various ways. Tools virtualization process can introduce a number of significant modifications in the design of solutions for management and command. The general idea involves replacing physical devices user interface with their digital representation (so-called Virtual instruments). A more advanced level of the systems "digitalization" is to use the mixed reality environments. In solutions using Augmented reality (AR) customized HMI is displayed to the operator when he approaches to each device. Identification of device is done by image recognition of photo codes. Visualization is achieved by (optical) see-through head mounted display (HMD). Control can be done for example by means of a handheld touch panel. Using the immersive virtual environment, the command center can be digitally reconstructed. Workstation requires only VR system (HMD) and access to information network. Operator can interact with devices in such a way as it would perform in real world (for example with the virtual hands). Because of their procedures (an analysis of central vision, eye tracking) MR systems offers another useful feature of reducing requirements for system data throughput. Due to the fact that at the moment we focus on the single device. Experiments carried out using Moverio BT-200 and SteamVR systems and the results of experimental application testing clearly indicate the ability to create a fully functional information system with the use of mixed reality technology.

  19. Global Command and Control Management Structure

    National Research Council Canada - National Science Library

    1995-01-01

    This instruction establishes: responsibilities for the Joint Staff, Services, Defense agencies, combatant and functional unified commands, and other activities regarding management of Global Command and Control (GCC...

  20. Ubuntu Linux Toolbox 1000 + Commands for Ubuntu and Debian Power Users

    CERN Document Server

    Negus, Christopher

    2008-01-01

    In this handy, compact guide, you'll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

  1. Command in the Objective Force

    National Research Council Canada - National Science Library

    Wilbeck, Christopher

    2003-01-01

    This paper seeks to answer what type of command will best serve the Army's Objective Force in gaining the initiative, building momentum, and exploiting success to achieve land dominance in the future...

  2. Combatant Commanders Informational Series: USPACOM

    National Research Council Canada - National Science Library

    Comnick, Michael

    1996-01-01

    ...) introducing potential joint staff officers to their specific command. Inbound staff officers, prepared by reviewing this product, arrive on station ready to receive specialized training without needing background indoctrination...

  3. Strategic Global Climate Command?

    Science.gov (United States)

    Long, J. C. S.

    2016-12-01

    Researchers have been exploring geoengineering because Anthropogenic GHG emissions could drive the globe towards unihabitability for people, wildlife and vegetation. Potential global deployment of these technologies is inherently strategic. For example, solar radiation management to reflect more sunlight might be strategically useful during a period of time where the population completes an effort to cease emissions and carbon removal technologies might then be strategically deployed to move the atmospheric concentrations back to a safer level. Consequently, deployment of these global technologies requires the ability to think and act strategically on the part of the planet's governments. Such capacity most definitely does not exist today but it behooves scientists and engineers to be involved in thinking through how global command might develop because the way they do the research could support the development of a capacity to deploy intervention rationally -- or irrationally. Internationalizing research would get countries used to working together. Organizing the research in a step-wise manner where at each step scientists become skilled at explaining what they have learned, the quality of the information they have, what they don't know and what more they can do to reduce or handle uncertainty, etc. Such a process can increase societal confidence in being able to make wise decisions about deployment. Global capacity will also be enhanced if the sceintific establishment reinvents misssion driven research so that the programs will identify the systemic issues invovled in any proposed technology and systematically address them with research while still encouraging individual creativity. Geoengineering will diverge from climate science in that geoengineering research needs to design interventions for some publically desirable goal and investigates whether a proposed intervention will acheive desired outcomes. The effort must be a systems-engineering design problem

  4. User friendly packaging

    DEFF Research Database (Denmark)

    Geert Jensen, Birgitte

    2010-01-01

    Most consumers have experienced occasional problems with opening packaging. Tomato sauce from the tinned mackerel splattered all over the kitchen counter, the unrelenting pickle jar lid, and the package of sliced ham that cannot be opened without a knife or a pair of scissors. The research project...... “User-friendly Packaging” aims to create a platform for developing more user-friendly packaging. One intended outcome of the project is a guideline that industry can use in development efforts. The project also points the way for more extended collaboration between companies and design researchers. How...... can design research help industry in packaging innovation?...

  5. Environmentally Friendly Procedure Based on Supercritical Fluid Chromatography and Tandem Mass Spectrometry Molecular Networking for the Discovery of Potent Antiviral Compounds from Euphorbia semiperfoliata.

    Science.gov (United States)

    Nothias, Louis-Félix; Boutet-Mercey, Stéphanie; Cachet, Xavier; De La Torre, Erick; Laboureur, Laurent; Gallard, Jean-François; Retailleau, Pascal; Brunelle, Alain; Dorrestein, Pieter C; Costa, Jean; Bedoya, Luis M; Roussi, Fanny; Leyssen, Pieter; Alcami, José; Paolini, Julien; Litaudon, Marc; Touboul, David

    2017-10-27

    A supercritical fluid chromatography-based targeted purification procedure using tandem mass spectrometry and molecular networking was developed to analyze, annotate, and isolate secondary metabolites from complex plant extract mixture. This approach was applied for the targeted isolation of new antiviral diterpene esters from Euphorbia semiperfoliata whole plant extract. The analysis of bioactive fractions revealed that unknown diterpene esters, including jatrophane esters and phorbol esters, were present in the samples. The purification procedure using semipreparative supercritical fluid chromatography led to the isolation and identification of two new jatrophane esters (13 and 14) and one known (15) and three new 4-deoxyphorbol esters (16-18). The structure and absolute configuration of compound 16 were confirmed by X-ray crystallography. This compound was found to display antiviral activity against Chikungunya virus (EC 50 = 0.45 μM), while compound 15 proved to be a potent and selective inhibitor of HIV-1 replication in a recombinant virus assay (EC 50 = 13 nM). This study showed that a supercritical fluid chromatography-based protocol and molecular networking can facilitate and accelerate the discovery of bioactive small molecules by targeting molecules of interest, while minimizing the use of toxic solvents.

  6. Trust: The Key to the Success of Mission Command in the Joint Force

    Science.gov (United States)

    2015-05-18

    Malaysia , Kuala Lumpur: International Conference on ISO9000. Schmidt, Todd A. “Design, Mission Command and the Network: Enabling Organization...trust.pdf. Steele , Dennis. “Setting the Azimuth for Joint Force 2020: Globally Integrated Operations and Mission Command.” Army Magazine, November

  7. User-Friendly Data-Sharing Practices for Fostering Collaboration within a Research Network: Roles of a Vanguard Center for a Community-Based Study

    Directory of Open Access Journals (Sweden)

    Jae Eun Lee

    2015-12-01

    Full Text Available Although various attempts have been made to build collaborative cultures for data sharing, their effectiveness is still questionable. The Jackson Heart Study (JHS Vanguard Center (JHSVC at the NIH-funded Research Centers in Minority Institutions (RCMI Translational Research Network (RTRN Data Coordinating Center (DCC may be a new concept in that the data are being shared with a research network where a plethora of scientists/researchers are working together to achieve their common goal. This study describes the current practices to share the JHS data through the mechanism of JHSVC. The JHS is the largest single-site cohort study to prospectively investigate the determinants of cardiovascular disease among African-Americans. It has adopted a formal screened access method through a formalized JHSVC mechanism, in which only a qualified scientist(s can access the data. The role of the DCC was to help RTRN researchers explore hypothesis-driven ideas to enhance the output and impact of JHS data through customized services, such as feasibility tests, data querying, manuscript proposal development and data analyses for publication. DCC has implemented these various programs to facilitate data utility. A total of 300 investigators attended workshops and/or received training booklets. DCC provided two online and five onsite workshops and developed/distributed more than 250 copies of the booklet to help potential data users understand the structure of and access to the data. Information on data use was also provided through the RTRN website. The DCC efforts led to the production of five active manuscript proposals, seven completed publications, 11 presentations and four NIH grant proposals. These outcomes resulted from activities during the first four years; over the last couple of years, there were few new requests. Our study suggested that DCC-customized services enhanced the accessibility of JHS data and their utility by RTRN researchers and helped to

  8. My Friends Right Next to Me: A Laboratory Investigation on Predictors and Consequences of Experiencing Social Closeness on Social Networking Sites.

    Science.gov (United States)

    Neubaum, German; Krämer, Nicole C

    2015-08-01

    In the last decade, research has provided a series of insights into how and why the use of social networking sites (SNSs) can be socially and psychologically beneficial for individuals. The present research extends this evidence by focusing on the concept of social closeness as a feeling experienced when using SNSs. In a laboratory setting, participants (N=60) spent 10 minutes on Facebook, and then reported their experiences during this session. Analyses of participants' usage behavior and their experiences revealed that the more time users spent interacting with other users (e.g., commenting on updates), the closer they felt to other people. Interacting with others also predicted users' positive emotional states after Facebook use; this effect may be explained by the perception of social closeness. This study is one of the first to employ momentary measures, offering a further theoretical link between active SNS use and well-being.

  9. "My friend who bought it for me, she has had an abortion before." The influence of Ghanaian women's social networks in determining the pathway to induced abortion.

    Science.gov (United States)

    Rominski, Sarah D; Lori, Jody R; Morhe, Emmanuel Sk

    2017-07-01

    Even given the liberal abortion law in Ghana, abortion complications are a large contributor to maternal morbidity and mortality. This study sought to understand why young women seeking an abortion in a legally enabling environment chose to do this outside the formal healthcare system. Women being treated for complications arising from a self-induced abortion as well as for elective abortions at three hospitals in Ghana were interviewed. Community-based focus groups were held with women as well as men, separately. Interviews and focus group discussions were conducted until saturation was reached. A total of 18 women seeking care for complications from a self-induced abortion and 11 seeking care for an elective abortion interviewed. The women ranged in age from 13 to 35 years. There were eight focus groups; two with men and six with women. The reasons women self-induce are: (1) abortion is illegal; (2) attitudes of the healthcare workers; (3) keeping the pregnancy a secret; and (4) social network influence. The meta-theme of normalisation of self-inducing' an abortion was identified. When women are faced with an unplanned and unwanted pregnancy, they consult individuals in their social network whom they know have dealt with a similar situation. Misoprostol is widely available in Ghanaian cities and is successful at inducing an abortion for many women. In this way, self-inducing abortions using medication procured from pharmacists and chemical sellers has become normalised for women in Kumasi, Ghana. © Faculty of Sexual and Reproductive Healthcare of the Royal College of Obstetricians and Gynaecologists (unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  10. The Puerto Rico Seismic Network Broadcast System: A user friendly GUI to broadcast earthquake messages, to generate shakemaps and to update catalogues

    Science.gov (United States)

    Velez, J.; Huerfano, V.; von Hillebrandt, C.

    2007-12-01

    The Puerto Rico Seismic Network (PRSN) has historically provided locations and magnitudes for earthquakes in the Puerto Rico and Virgin Islands (PRVI) region. PRSN is the reporting authority for the region bounded by latitudes 17.0N to 20.0N, and longitudes 63.5W to 69.0W. The main objective of the PRSN is to record, process, analyze, provide information and research local, regional and teleseismic earthquakes, providing high quality data and information to be able to respond to the needs of the emergency management, academic and research communities, and the general public. The PRSN runs Earthworm software (Johnson et al, 1995) to acquire and write waveforms to disk for permanent archival. Automatic locations and alerts are generated for events in Puerto Rico, the Intra America Seas, and the Atlantic by the EarlyBird system (Whitmore and Sokolowski, 2002), which monitors PRSN stations as well as some 40 additional stations run by networks operating in North, Central and South America and other sites in the Caribbean. PRDANIS (Puerto Rico Data Analysis and Information System) software, developed by PRSN, supports manual locations and analyst review of automatic locations of events within the PRSN area of responsibility (AOR), using all the broadband, strong-motion and short-period waveforms Rapidly available information regarding the geographic distribution of ground shaking in relation to the population and infrastructure at risk can assist emergency response communities in efficient and optimized allocation of resources following a large earthquake. The ShakeMap system developed by the USGS provides near real-time maps of instrumental ground motions and shaking intensity and has proven effective in rapid assessment of the extent of shaking and potential damage after significant earthquakes (Wald, 2004). In Northern and Southern California, the Pacific Northwest, and the states of Utah and Nevada, ShakeMaps are used for emergency planning and response, loss

  11. The ergonomics of command and control

    OpenAIRE

    Stanton, NA; Baber, C

    2006-01-01

    Since its inception, just after the Second World War, ergonomics research has paid special attention to the issues surrounding human control of systems. Command and Control environments continue to represent a challenging domain for Ergonomics research. We take a broad view of Command and Control research, to include C2 (Command and Control), C3 (Command, Control and Communication), and C4 (Command, Control, Communication and Computers) as well as human supervisory control paradigms. This spe...

  12. Filtering and Trust as Tools for the Operational Commander in the Information Age

    National Research Council Canada - National Science Library

    Davis, Alan D

    2006-01-01

    ... has. An analysis of this environment points to the impact of network centric warfare, information superiority, shared situational awareness, adaptability, and transparency on the commander's decision-making process...

  13. Finding Friends Online: Online Activities by Deaf Students and Their Well-Being

    NARCIS (Netherlands)

    Blom, H.C.; Marschark, M.; Vervloed, M.P.J.; Knoors, H.E.T.

    2014-01-01

    Generally, deaf and hard of hearing (D/HH) children have fewer friends than hearing peers and their friendships are of a lower quality. The research hypothesis was that using the computer to communicate with new online friends through social network sites or playing games with offline friends is

  14. Understanding and Appreciative Friends

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    During the Spring and Autumn Period(770-476B.C.).there was a man whose name was Yu Boya.Yu boya famous music master at that time,having a good command of the temperament and superb skills in playing the musical instrument.He was bright and eager to learn when he was young.He had formally acknowledged several experts as his teachers,and his skills in playing the musical instrument had already reached a fairly high level.But he still felt that he could not superbly express the various things which had deeply ...

  15. Lipedema: friend and foe.

    Science.gov (United States)

    Torre, Yanira Sanchez-De la; Wadeea, Rita; Rosas, Victoria; Herbst, Karen L

    2018-03-09

    Background Lipedema is a chronic disorder presenting in women during puberty or other times of hormonal change such as childbirth or menopause, characterized by symmetric enlargement of nodular, painful subcutaneous adipose tissue (fat) in the limbs, sparing the hands, feet and trunk. Healthcare providers underdiagnose or misdiagnose lipedema as obesity or lymphedema. Materials and methods The benefits (friend) and negative aspects (foe) of lipedema were collected from published literature, discussions with women with lipedema, and institutional review board approved evaluation of medical charts of 46 women with lipedema. Results Lipedema is a foe because lifestyle change does not reduce lipedema fat, the fat is painful, can become obese, causes gait and joint abnormalities, fatigue, lymphedema and psychosocial distress. Hypermobility associated with lipedema can exacerbate joint disease and aortic disease. In contrast, lipedema fat can be a friend as it is associated with relative reductions in obesity-related metabolic dysfunction. In new data collected, lipedema was associated with a low risk of diabetes (2%), dyslipidemia (11.7%) and hypertension (13%) despite an obese average body mass index (BMI) of 35.3 ± 1.7 kg/m2. Conclusion Lipedema is a painful psychologically distressing fat disorder, more foe than friend especially due to associated obesity and lymphedema. More controlled studies are needed to study the mechanisms and treatments for lipedema.

  16. 10 commandments of smile esthetics

    Science.gov (United States)

    Machado, Andre Wilson

    2014-01-01

    The search for esthetic treatment has persisted in the routine of dental professionals. Following this trend, dental patients have sought treatment with the primary aim of improving smile esthetics. The aim of this article is to present a protocol to assess patient's smile: The 10 Commandments of smile esthetics. PMID:25279532

  17. United States Southern Command * Home

    Science.gov (United States)

    or concerns please email or call us at 305-437-2287. Testing The USAG- Miami Joint Education Testing the Air Force | The Air University | US Air Force Academy Army: Army Continued Education System | Army Marine Corps Institute | US Marine Corps Training and Education Command | US Marine Corps University Navy

  18. Apollo 11 Command Service Module

    Science.gov (United States)

    1969-01-01

    A close-up view of the Apollo 11 command service module ready to be mated with the spacecraft LEM adapter of the third stage. The towering 363-foot Saturn V was a multi-stage, multi-engine launch vehicle standing taller than the Statue of Liberty. Altogether, the Saturn V engines produced as much power as 85 Hoover Dams.

  19. 32 CFR 700.1053 - Commander of a task force.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander of a task force. 700.1053 Section 700... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any other naval commander, may detail in command of a task force, or other task command, any eligible...

  20. Climate friendly dietary guidelines

    DEFF Research Database (Denmark)

    Trolle, Ellen; Mogensen, Lisbeth; Thorsen, Anne Vibeke

    2014-01-01

    The aim of this study was to investigate how the present Danish diet could be changed in a climate friendly direction that follows the recommendations of a healthy diet. The carbon footprint (CF) of an average Danish diet was calculated and compared to CF of a recommended healthy diet by 1......%, if the healthy diet was eaten instead of the average current diet. However, if the diet was climate optimized by choosing foods with a low CF within the food groups; meat, vegetables and fruit, CF of this diet may be reduced by 23 % compared to CF of the average diet....

  1. Ready...Set... Command! Rethinking Training for Squadron Commanders

    Science.gov (United States)

    2016-02-16

    commander faces many difficult challenges. When discussing the Air Force’s troubling trend in suicide rates, Airmen “blame being overworked ...Air Forces total suicides despite making up only 16 percent of the service.3 Three years later the Air Force Times reveals continued challenges in...23 challenges. They must address complex issues facing the Air Force, such as troubling suicide rates, manning shortfalls, decreasing resources

  2. 76 FR 19893 - Unified Command Plan 2011

    Science.gov (United States)

    2011-04-08

    ... Plan 2011 Memorandum for the Secretary of Defense Pursuant to my authority as Commander in Chief, I hereby approve and direct the implementation of the revised Unified Command Plan. Consistent with title...

  3. Issues and Solutions for Command Post Simulations

    National Research Council Canada - National Science Library

    Stytz, Martin R; Banks, Sheila B

    2006-01-01

    .... Unfortunately, the modeling of joint command post teams is still very much in its infancy and this lack of foundational research hinders our ability to assess the performance of command post teams...

  4. Command Decision-Making: Experience Counts

    National Research Council Canada - National Science Library

    Wolgast, Kelly A

    2005-01-01

    Decision-making is the mainstay of military leadership and command. Due to the changed nature of the current military environment, military commanders can no longer rely solely on the traditional Military Decision-making Process (MDMP...

  5. Three friendly walkers

    Science.gov (United States)

    Jensen, Iwan

    2017-01-01

    More than 15 years ago Guttmann and Vöge (2002 J. Stat. Plan. Inference 101 107), introduced a model of friendly walkers. Since then it has remained unsolved. In this paper we provide the exact solution to a closely allied model which essentially only differs in the boundary conditions. The exact solution is expressed in terms of the reciprocal of the generating function for vicious walkers which is a D-finite function. However, ratios of D-finite functions are inherently not D-finite and in this case we prove that the friendly walkers generating function is the solution to a non-linear differential equation with polynomial coefficients, it is in other words D-algebraic. We find using numerically exact calculations a conjectured expression for the generating function of the original model as a ratio of a D-finite function and the generating function for vicious walkers. We obtain an expression for this D-finite function in terms of a {{}2}{{F}1} hypergeometric function with a rational pullback and its first and second derivatives. Dedicated to Tony Guttmann on the occasion of his 70th birthday.

  6. On Preparing for Squadron Command

    Science.gov (United States)

    1988-04-01

    Gortler, Majur Gordon D. "Management Development---Could the Air Force Be Doing More?" Resear,;h Study, Air Command and Staff College. 1 07:3. 20...ABSTRACT (Continue on reverse If necessary and identify by block number) -This study addresses the broad issue of preparing Air Force officers for...are obsolete. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED - - PREFACE This study addresses the broad Issue of preparing Air Force officers to

  7. Command and Control : faster decisions

    CSIR Research Space (South Africa)

    Venter, C

    2012-10-01

    Full Text Available Decisions 4th Biennial Conference Presented by Cobus Venter 10 October 2012 ? CSIR 2012 Slide 2 Command and Control Planning TaskingControl Assessment Si tu at io n DPSS Objective Ends Increase the Defence Capability of South Africa Ways... Supported by SAAB THALES Global CommsDPSS DDSI ERGOTECH Cooperation to make it work Example 1: Future SA Army Strategy and Joint Operations Support Campus Experiment Example 1: Future SA Army Strategy and Joint Operations Support Campus Experiment...

  8. Friends, Depressive Symptoms, and Life Satisfaction Among Older Korean Americans.

    Science.gov (United States)

    Roh, Soonhee; Lee, Yeon-Shim; Lee, Kyoung Hag; Shibusawa, Tazuko; Yoo, Grace J

    2015-08-01

    This study examined the interactive effects of social network support and depressive symptoms on life satisfaction among older Korean Americans (KAs). Using data from a sample of 200 elders in a large metropolitan area (M age = 72.50, SD = 5.15), hierarchical regression analysis was used to examine the interaction between social network support and depressive symptoms on life satisfaction among older KAs. After controlling for demographic variables, both social network support and depressive symptoms were identified as predictors for life satisfaction. Interaction effects indicated strong associations between higher social network support specifically from friends and lower depressive symptoms with higher levels of life satisfaction. Findings highlight the important role that friends play in terms of social network support for the mental health of older KAs, and the need for geriatric practitioners to monitor and assess the quality of social network support-including friendships-when working with older KAs.

  9. Caffeine: Friend or Foe?

    Science.gov (United States)

    Doepker, Candace; Lieberman, Harris R; Smith, Andrew Paul; Peck, Jennifer D; El-Sohemy, Ahmed; Welsh, Brian T

    2016-01-01

    The debate on the safety of and regulatory approaches for caffeine continues among various stakeholders and regulatory authorities. This decision-making process comes with significant challenges, particularly when considering the complexities of the available scientific data, making the formulation of clear science-based regulatory guidance more difficult. To allow for discussions of a number of key issues, the North American Branch of the International Life Sciences Institute (ILSI) convened a panel of subject matter experts for a caffeine-focused session entitled "Caffeine: Friend or Foe?," which was held during the 2015 ILSI Annual Meeting. The panelists' expertise covered topics ranging from the natural occurrence of caffeine in plants and interindividual metabolism of caffeine in humans to specific behavioral, reproductive, and cardiovascular effects related to caffeine consumption. Each presentation highlighted the potential risks, benefits, and challenges that inform whether caffeine exposure warrants concern. This paper aims to summarize the key topics discussed during the session.

  10. My Nepalese Friends

    Institute of Scientific and Technical Information of China (English)

    1996-01-01

    NEPAL and China are good neighbors. In the 1980s many Chinese technicians went to Nepal to help build roads and other projects. As an interpreter with a Chinese construction cooperative, I worked there from 1993 to 1994. During my stay in Nepal, I met many different Nepalese women who impressed me deeply. My landlady Sumiyala, was the first Nepalese woman to come into my life. She was over 40 years old, a healthy and good-humored housewife. Whenever Ⅰ had time, I liked to chat with her and gradually we became friends. I remember my landlady was busy in and out of her house all day long— cleaning, cooking and taking care of her grandchildren and her parents-in-laws.

  11. Thinking with friends

    DEFF Research Database (Denmark)

    Emmeche, Claus

    2017-01-01

    cognitive phenomenon, and bringing together observations and concepts from interdisciplinary studies of interpersonal relationships allows for a notion of relational attention to be developed. At least for some forms of friendships, the agents not merely attend to common interests; their perception...... is shared, mediated by the very relationship as an embodied activity of distributed cognition. An important example of this is collaboration in science and art, as when friends or colleagues work close together to solve problems or develop new forms of creative expression.......Can research in situated and embodied cognition inform the study of interpersonal relations like friendship? And conversely, can friendship studies from disciplinary and interdisciplinary perspectives inspire research in cognitive science? These are the guiding questions for this chapter. Compared...

  12. Supporting Members and Friends

    Science.gov (United States)

    2005-10-01

    Thank you! Over the past year, AGU has received 12,104 gifts, both large and small, from members and friends. The Union has also received corporate contributions, National Science Foundation grants, and support from the National Oceanographic Partnership Program and National Association of Geoscience Teachers. Together their generosity has benefited AGU non revenue producing programs that are critical to our science and the future health of the Union. The following list gratefully acknowledges annual gifts of $100 or more and cumulative giving of $5,000 or more. The 1919 Society ($100,000 or more) and Benefactors ($5,000-$99,999) recognize single major gifts and cumulative contributions. Three circles acknowledge annual giving: President's Circle ($1,000 or more), Leadership Circle ($200-$999), and Supporters Circle ($100-$199). Supporting Life Members, who contribute a one-time gift of $1,200 in addition to lifetime dues, are among our most loyal Supporters.

  13. Environmentally friendly road construction

    Directory of Open Access Journals (Sweden)

    A.I. Essawy

    2013-06-01

    Full Text Available Environmental pollution is a major problem in developing countries like Egypt. Reuse of waste polymers is considered an attractive solution for environmental white pollution and reducing of the costs of road pavement and maintenance. This research aims to prepare environmentally friendly hot mix asphalt (HMA for paving using some industrial wastes as polypropylene and polyester fibers. The solid materials in the mix include normal and highly porous aggregates. 5% and 10% of waste polymers by weight of the asphalt were used to prepare special binders. The samples were tested for their physical properties, chemical properties, aging, scanning electron microscopy (SEM and thermo-gravimetric analysis (TGA. The results revealed that the prepared HMA using 5% of waste polymer had high performance as compared to the ordinary one and the waste polymer could be used in road construction.

  14. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 2: Command, Control, Communications and Computer Architectures

    National Research Council Canada - National Science Library

    Cogan, Kevin J; De Lucio, Ray

    2003-01-01

    ...), which hypothesizes that a robustly networked force improves information sharing, collaboration, quality of information, and shared situational awareness resulting in significantly increased mission effectiveness...

  15. Commanders of the Great Victory

    Directory of Open Access Journals (Sweden)

    Anatoly Dmitriyevich Borshchov

    2015-01-01

    Full Text Available The honorary title of «commander» as well as the «admiral» is granted to a military or naval figure on the basis of public recognition of his personal contribution to the success of actions. Generals are usually individuals with creative thinking, the ability to foresee the development of military events. Generals usually have such personality traits as a strong will and determination, rich combat experience, credibility and high organizational skills. In an article dedicated to the 70th anniversary of the Soviet victory in the Great War examines the experience of formation and practice of the most talent-ed Soviet military leaders.

  16. Marketing animal-friendly products

    NARCIS (Netherlands)

    Riemsdijk, van Lenka; Ingenbleek, Paul T.M.; Trijp, van Hans C.M.; Veen, van der Gerrita

    2017-01-01

    This article presents a conceptual framework that aims to encourage consumer animal-friendly product choice by introducing positioning strategies for animal-friendly products. These strategies reinforce the animal welfare with different types of consumption values and can therefore reduce

  17. Advanced Environment Friendly Nanotechnologies

    Science.gov (United States)

    Figovsky, O.; Beilin, D.; Blank, N.

    The economic, security, military and environmental implications of molecular manufacturing are extreme. Unfortunately, conflicting definitions of nanotechnology and blurry distinctions between significantly different fields have complicated the effort to understand those differences and to develop sensible, effective policy for each. The risks of today's nanoscale technologies cannot be treated the same as the risks of longer-term molecular manufacturing. It is a mistake to put them together in one basket for policy consideration — each is important to address, but they offer different problems and will require far different solutions. As used today, the term nanotechnology usually refers to a broad collection of mostly disconnected fields. Essentially, anything sufficiently small and interesting can be called nanotechnology. Much of it is harmless. For the rest, much of the harm is of familiar and limited quality. Molecular manufacturing, by contrast, will bring unfamiliar risks and new classes of problems. The advanced environment friendly nanotechnologies elaborated by Israel Company Polymate Ltd. — International Research Center are illustrated.

  18. Command in Air War. Centralized Versus Decentralized Control of Combat Airpower

    Science.gov (United States)

    2007-06-01

    fears that Americans were the “Great Satan ” that its enemies claimed. Groups such as Ansar al-Islam incorporated these pictures into their recruit- ing...his steps. —Proverbs 16:9 —New American Standard Bible Air Force aircraft were not involved in the battle in Mogadishu, Somalia...Command and Control Research Pro- gram, Nov. 2002. http://www.dodccrp.org/publications/ pdf / Smith_EBO.PDF. Snook, Scott A. Friendly Fire: The Accidental

  19. Parental influences on memories of parents and friends.

    Science.gov (United States)

    Tani, Franca; Bonechi, Alice; Peterson, Carole; Smorti, Andrea

    2010-01-01

    The authors evaluated the role parent-child relationship quality has on two types of memories, those of parents and those of friends. Participants were 198 Italian university students who recalled memories during 4 separate timed memory-fluency tasks about their preschool, elementary school, middle school, high school and university years. Half were instructed to recall memories involving parents and the remainder memories involving friends. Moreover, parent-child relationships were assessed by the Network of Relationships Inventory (NRI; W. Furman & D. Buhrmester, 1985) and Adolescents' Report of Parental Monitoring (D. M. Capaldi & G. R. Patterson, 1989). Results showed that men with positive parent-son relationships had more memories of parents and more affectively positive memories of friends, supporting a consistency model positing similarity between parent-child relationships and memories of friends. Women with positive parental relationship quality had more affectively positive memories of parents but for friends, positive relationship quality only predicted positive memories when young. At older ages, especially middle school-aged children, negative parent-daughter relationships predicted more positive memories of friends, supporting a compensatory model. The gender of parent also mattered, with fathers having a more influential role on affect for memories of friends.

  20. Friending the Virgin

    Directory of Open Access Journals (Sweden)

    Larry Friedlander

    2011-07-01

    Full Text Available This article looks at how previous practice of portraiture prepared the way for self-presentation on social networking sites. A portrait is not simply an exercise in the skillful or “realistic” depiction of a subject. Rather, it is a rhetorical exercise in visual description and persuasion and a site of intricate communicative processes. A long evolution of visual culture, intimately intertwined with evolving notions of identity and society, was necessary to create the conditions for the particular forms of self-representation we encounter on Facebook. Many of these premodern strategies prefigure ones we encounter on Facebook. By delineating the ways current practices reflect earlier ones, we can set a baseline from which we can isolate the precise novelty of current practice in social networking sites.

  1. Decomposing the components of friendship and friends' influence on adolescent drinking and smoking.

    Science.gov (United States)

    Fujimoto, Kayo; Valente, Thomas W

    2012-08-01

    Friendship networks are an important source of peer influence. However, existing network studies vary in terms of how they operationalize friendship and friend's influence on adolescent substance use. This study uses social network analysis to characterize three types of friendship relations: (1) mutual or reciprocated, (2) directional, and (3) intimate friends. We then examine the relative effects of each friendship type on adolescent drinking and smoking behavior. Using a saturated sample from the Add Health data, a nationally representative sample of high school adolescents (N = 2,533 nested in 12 schools), we computed the level of exposure to drinking and smoking of friends using a network exposure model, and their association with individual drinking and smoking using fixed effect models. Results indicated that the influence from mutual or reciprocated type of friendship relations is stronger on adolescent substance use than directional, especially for smoking. Regarding the directionality of directional type of friendship relations, adolescents are equally influenced by both nominating and nominated friends on their drinking and smoking behavior. Results for intimate friends friendship relations indicated that the influence from "best friends" was weaker than the one from non-"best friends," which indicates that the order of friend nomination may not matter as much as nomination reciprocation. This study demonstrates that considering different features of friendship relationships is important in evaluating friends' influence on adolescent substance use. Related policy implications are discussed. Copyright © 2012 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  2. DolphinAtack: Inaudible Voice Commands

    OpenAIRE

    Zhang, Guoming; Yan, Chen; Ji, Xiaoyu; Zhang, Taimin; Zhang, Tianchen; Xu, Wenyuan

    2017-01-01

    Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems(VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though hidden, are nonetheless audible. In this work, we design a completely inaudible attack, DolphinAttack, that modulates voice commands on ultra...

  3. Scale-free Enterprise Command & Control

    National Research Council Canada - National Science Library

    Bayne, Jay; Paul, Raymond

    2005-01-01

    ...) services that provide allied teams of commanders, planners and operations personnel with collaborative, grid-based and realtime situation assessment, plan generation, and plan execution services...

  4. Blossom Point Satellite Tracking and Command Station

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The Blossom Point Satellite Command and Tracking Facility (BP) provides engineering and operational support to several complex space systems for the Navy...

  5. Structured multi-stream command language

    International Nuclear Information System (INIS)

    Glad, A.S.

    1982-12-01

    A multi-stream command language was implemented to provide the sequential and decision-making operations necessary to run the neutral-beam ion sources connected to the Doublet III tokamak fusion device. A multi-stream command language was implemented in Pascal on a Classic 7870 running under MAX IV. The purpose of this paper is threefold. First, to provide a brief description of the programs comprising the command language including the operating system interaction. Second, to give a description of the language syntax and commands necessary to develop a procedure stream. Third, to provide a description of the normal operating procedures for executing either the sequential or interactive streams

  6. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Analysis of the Toronto SARS Outbreak, Vertical Integration, Vertical Integration in a Military Command Hierarchy, Information flows for a domestic incident, C2 for Homeland Security will benefit...

  7. Mission Command: Elasticity, Equilibrium, Culture, and Intent

    National Research Council Canada - National Science Library

    Stewart, Keith G

    2006-01-01

    .... It is enabled by decentralization of authority and responsibility that allows subordinate commanders the latitude to plan and conduct operations based upon their understanding of the local situation...

  8. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  9. Analisa Eco-friendly Attitudes Dan Eco-friendly Behavior Terhadap Eco-friendly Intention Green Hotel Di Indonesia

    OpenAIRE

    Silvia, Lanny; Rudijanto, Diana Gabriela; Kristanti, Monika

    2017-01-01

    Kesadaran masyarakat akan lingkungan yang semakin meningkat membuat masyarakat gencar mencari hotel yang ramah lingkungan dibandingkan dengan hotel konvensional. Penelitian ini bertujuan untuk mengetahui perbedaan eco-friendly attitude, eco- friendly behavior, dan eco-friendly intention konsumen generasi x dan generasi y terhadap green hotel di Indonesia dan apakah eco-friendly attitudes dan eco-friendly behavior berpengaruh signifikan terhadap eco-friendly intention. Total responden dalam pe...

  10. Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

    OpenAIRE

    Kilcrease, Patrick N.

    2009-01-01

    Approved for public release, distribution unlimited GHOSTNet is a secure and anonymous Virtual Private Network (VPN) service. Coupling Ethernet tunneling and proxy services to provide users safe and anonymous Internet access, GHOSTNet utilizes TLS (SSL) protocol with AES-256 encryption to secure the network along with PKI certificates and HMAC protection from replay attacks and UDP flooding. This thesis will be a system level test and evaluation of the GHOSTNet infrastructure. The primary...

  11. Command and Service Module Communications

    Science.gov (United States)

    Interbartolo, Michael

    2009-01-01

    This viewgraph presentation examines Command and Service Module (CSM) Communications. The communication system's capabilities are defined, including CSM-Earth, CSM-Lunar Module and CSM-Extravehicular crewman communications. An overview is provided for S-band communications, including data transmission and receiving rates, operating frequencies and major system components (pre-modulation processors, unified S-band electronics, S-band power amplifier and S-band antennas). Additionally, data transmission rates, operating frequencies and the capabilities of VHF communications are described. Major VHF components, including transmitters and receivers, and the VHF multiplexer and antennas are also highlighted. Finally, communications during pre-launch, ascent, in-flight and entry are discussed. Overall, the CSM communication system was rated highly by flight controllers and crew. The system was mostly autonomous for both crew and flight controllers and no major issues were encountered during flight.

  12. Command and Control Software Development

    Science.gov (United States)

    Wallace, Michael

    2018-01-01

    The future of the National Aeronautics and Space Administration (NASA) depends on its innovation and efficiency in the coming years. With ambitious goals to reach Mars and explore the vast universe, correct steps must be taken to ensure our space program reaches its destination safely. The interns in the Exploration Systems and Operations Division at the Kennedy Space Center (KSC) have been tasked with building command line tools to ease the process of managing and testing the data being produced by the ground control systems while its recording system is not in use. While working alongside full-time engineers, we were able to create multiple programs that reduce the cost and time it takes to test the subsystems that launch rockets to outer space.

  13. Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers

    Directory of Open Access Journals (Sweden)

    Pieter Burghouwt

    2015-10-01

    Full Text Available Network-based detection of botnet Command and Control communication is a difficult task if the traffic has a relatively low volume and if popular protocols, such as HTTP, are used to resemble normal traffic. We present a new network-based detection approach that is capable of detecting this type of Command and Control traffic in an enterprise network by estimating the trustworthiness of the traffic destinations. If the destination identifier of a traffic flow origins directly from: human input, prior traffic from a trusted destination, or a defined set of legitimate applications, the destination is trusted and its associated traffic is classified as normal. Advantages of this approach are: the ability of zero day malicious traffic detection, low exposure to malware by passive host-external traffic monitoring, and the applicability for real-time filtering. Experimental evaluation demonstrates successful detection of diverse types of Command and Control Traffic.

  14. 32 CFR 215.7 - Command relationships.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Command relationships. 215.7 Section 215.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS EMPLOYMENT OF MILITARY RESOURCES IN THE EVENT OF CIVIL DISTURBANCES § 215.7 Command relationships...

  15. The Marihuana Dilemma: Challenge to Commanders.

    Science.gov (United States)

    The marihuana dilemma poses a major challenge to commanders in the US Army today. The problem was analyzed as to the characteristics of the drug...available to commanders to meet the challenge. The essay concludes that marihuana should not be legalized; drug users or former drug users should not be

  16. XTCE. XML Telemetry and Command Exchange Tutorial

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad; Simon, Jerry

    2010-01-01

    An XML Telemetry Command Exchange (XTCE) tutoral oriented towards packets or minor frames is shown. The contents include: 1) The Basics; 2) Describing Telemetry; 3) Describing the Telemetry Format; 4) Commanding; 5) Forgotten Elements; 6) Implementing XTCE; and 7) GovSat.

  17. Capturing a Commander's decision making style

    Science.gov (United States)

    Santos, Eugene; Nguyen, Hien; Russell, Jacob; Kim, Keumjoo; Veenhuis, Luke; Boparai, Ramnjit; Stautland, Thomas Kristoffer

    2017-05-01

    A Commander's decision making style represents how he weighs his choices and evaluates possible solutions with regards to his goals. Specifically, in the naval warfare domain, it relates the way he processes a large amount of information in dynamic, uncertain environments, allocates resources, and chooses appropriate actions to pursue. In this paper, we describe an approach to capture a Commander's decision style by creating a cognitive model that captures his decisionmaking process and evaluate this model using a set of scenarios using an online naval warfare simulation game. In this model, we use the Commander's past behaviors and generalize Commander's actions across multiple problems and multiple decision making sequences in order to recommend actions to a Commander in a manner that he may have taken. Our approach builds upon the Double Transition Model to represent the Commander's focus and beliefs to estimate his cognitive state. Each cognitive state reflects a stage in a Commander's decision making process, each action reflects the tasks that he has taken to move himself closer to a final decision, and the reward reflects how close he is to achieving his goal. We then use inverse reinforcement learning to compute a reward for each of the Commander's actions. These rewards and cognitive states are used to compare between different styles of decision making. We construct a set of scenarios in the game where rational, intuitive and spontaneous decision making styles will be evaluated.

  18. 32 CFR 552.65 - Command supervision.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Command supervision. 552.65 Section 552.65 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Solicitation on Military Reservations § 552.65 Command supervision. (a) All insurance...

  19. Support and Conflict in Ethnically Diverse Young Adults' Relationships with Parents and Friends

    Science.gov (United States)

    Moilanen, Kristin L.; Raffaelli, Marcela

    2010-01-01

    We examined support and conflict with parents and close friends in a sample of ethnically diverse young adults (European-, Asian-, Cuban-, Latin-, and Mexican Americans). College students (N = 495) completed six subscales from the Network of Relationships Inventory (NRI; Furman & Buhrmester, 1985). Friends were rated higher than parents on…

  20. Computer Network Attack Versus Operational Maneuver from the Sea

    National Research Council Canada - National Science Library

    Herdegen, Dale

    2000-01-01

    ...) vulnerable to computer network attack (CNA). Mission command and control can reduce the impact of the loss of command and control, but it can not overcome the vast and complex array of threats...

  1. Correlates of Objective Social Isolation from Family and Friends among Older Adults

    Science.gov (United States)

    Chatters, Linda M.; Taylor, Harry Owen; Taylor, Robert Joseph

    2018-01-01

    This study examined the correlates of objective social isolation from extended family members and friends among older adults. The analysis is based on the older adult sub-sample of the National Survey of American Life (n = 1321). Multinomial logistic regression analyses examined race/ethnicity, demographics, functional health and family and friend network factors as correlates of objective isolation from family and friends. Only 4.47% of respondents were objectively isolated from both their extended family and friends, 10.82% were isolated from their friends, and 7.43% were isolated from their family members. Men were more likely to be objectively isolated from both family and friends and older adults who live with others were significantly more likely to be objectively isolated from their friends. When controlling for subjective social isolation, the two measures of functional health were significantly associated with objective social isolation. In particular, higher levels of self-care impairment decreased the risk of being objectively isolated from friends only, whereas higher mobility impairment was associated with an increased likelihood of being objectively isolated from friends only. Subjective evaluations of social isolation from family and friends were consistently associated with being objectively isolated from family and friends. There were no significant differences between African-Americans, Black Caribbeans and non-Hispanic Whites in objective isolation. These and other findings are discussed in detail. PMID:29510504

  2. Correlates of Objective Social Isolation from Family and Friends among Older Adults.

    Science.gov (United States)

    Chatters, Linda M; Taylor, Harry Owen; Nicklett, Emily J; Taylor, Robert Joseph

    2018-03-03

    This study examined the correlates of objective social isolation from extended family members and friends among older adults. The analysis is based on the older adult sub-sample of the National Survey of American Life ( n = 1321). Multinomial logistic regression analyses examined race/ethnicity, demographics, functional health and family and friend network factors as correlates of objective isolation from family and friends. Only 4.47% of respondents were objectively isolated from both their extended family and friends, 10.82% were isolated from their friends, and 7.43% were isolated from their family members. Men were more likely to be objectively isolated from both family and friends and older adults who live with others were significantly more likely to be objectively isolated from their friends. When controlling for subjective social isolation, the two measures of functional health were significantly associated with objective social isolation. In particular, higher levels of self-care impairment decreased the risk of being objectively isolated from friends only, whereas higher mobility impairment was associated with an increased likelihood of being objectively isolated from friends only. Subjective evaluations of social isolation from family and friends were consistently associated with being objectively isolated from family and friends. There were no significant differences between African-Americans, Black Caribbeans and non-Hispanic Whites in objective isolation. These and other findings are discussed in detail.

  3. Message network simulation

    OpenAIRE

    Shih, Kuo-Tung

    1990-01-01

    Approved for public release, distribution is unlimited This thesis presents a computer simulation of a multinode data communication network using a virtual network model to determine the effects of various system parameters on overall network performance. Lieutenant Commander, Republic of China (Taiwan) Navy

  4. ASC Addresses Unit Commanders' Concerns through LBE and Reset Programs

    National Research Council Canada - National Science Library

    Young, Mark E

    2008-01-01

    .... Army Sustainment Command (ASC), part of the U.S. Army Materiel Command (AMC) team, is available to assist, identify, and resolve equipment and maintenance problems as well as materiel readiness issues for combatant commanders...

  5. Unity of Command in Afghanistan: A Forsaken Principle of War

    National Research Council Canada - National Science Library

    Hope, Ian

    2008-01-01

    ... in the evolution of military command for Afghanistan. It examines how there was an unprecedented departure from the principle of unity of command in Afghanistan in 2006, when Combined Forces Command-Afghanistan (CFC...

  6. Unity of Command in Afghanistan: A Forsaken Principle of War

    National Research Council Canada - National Science Library

    Hope, Ian

    2008-01-01

    ... of military command for Afghanistan. It examines the unprecedented departure from the principle of unity of command in Afghanistan in 2006, when Combined Forces Command-Afghanistan passed control of the ground fight to the International...

  7. Astronaut John Young in Command Module Simulator during Apollo Simulation

    Science.gov (United States)

    1968-01-01

    Astronaut John W. Young, command module pilot, inside the Command Module Simulator in bldg 5 during an Apollo Simulation. Astronauts Thomas P. Stafford, commander and Eugene A. Cernan, lunar module pilot are out of the view.

  8. Three astronauts inside Command Module Simulator during Apollo Simulation

    Science.gov (United States)

    1968-01-01

    Three astronauts inside the Command Module Simulator in bldg 5 during an Apollo Simulation. Left to right are Astronauts Thomas P. Stafford, commander; John W. Young, command module pilot; and Eugene A. Cernan, lunar module pilot.

  9. Literature review on medical incident command.

    Science.gov (United States)

    Rimstad, Rune; Braut, Geir Sverre

    2015-04-01

    It is not known what constitutes the optimal emergency management system, nor is there a consensus on how effectiveness and efficiency in emergency response should be measured or evaluated. Literature on the role and tasks of commanders in the prehospital emergency services in the setting of mass-casualty incidents has not been summarized and published. This comprehensive literature review addresses some of the needs for future research in emergency management through three research questions: (1) What are the basic assumptions underlying incident command systems (ICSs)? (2) What are the tasks of ambulance and medical commanders in the field? And (3) How can field commanders' performances be measured and assessed? A systematic literature search in MEDLINE, PubMed, PsycINFO, Embase, Cochrane Central Register of Controlled Trials, Cochrane Library, ISI Web of Science, Scopus, International Security & Counter Terrorism Reference Center, Current Controlled Trials, and PROSPERO covering January 1, 1990 through March 1, 2014 was conducted. Reference lists of included literature were hand searched. Included papers were analyzed using Framework synthesis. The literature search identified 6,049 unique records, of which, 76 articles and books where included in qualitative synthesis. Most ICSs are described commonly as hierarchical, bureaucratic, and based on military principles. These assumptions are contested strongly, as is the applicability of such systems. Linking of the chains of command in cooperating agencies is a basic difficulty. Incident command systems are flexible in the sense that the organization may be expanded as needed. Commanders may command by direction, by planning, or by influence. Commanders' tasks may be summarized as: conducting scene assessment, developing an action plan, distributing resources, monitoring operations, and making decisions. There is considerable variation between authors in nomenclature and what tasks are included or highlighted

  10. Linux Command Line and Shell Scripting Bible

    CERN Document Server

    Blum, Richard

    2011-01-01

    The authoritative guide to Linux command line and shell scripting?completely updated and revised [it's not a guide to Linux as a whole ? just to scripting] The Linux command line allows you to type specific Linux commands directly to the system so that you can easily manipulate files and query system resources, thereby permitting you to automate commonly used functions and even schedule those programs to run automatically. This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shel

  11. The Linux command line a complete introduction

    CERN Document Server

    Shotts, William E

    2012-01-01

    You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more.

  12. Critical friends and collaborative partnership

    Directory of Open Access Journals (Sweden)

    Katarina Jandér

    2013-12-01

    Full Text Available Critical friends: a method for peer feedback The Critical Friend-method has been used in various educational settings to facilitate the process of continuous improvement in teaching. The aim of this study was to implement Critical Friends, and to find out if this method could be used for feedback on teaching as part of a librarians' professional development. The project was carried out within the Library Unit of the Faculty of Medicine at Lund University, Sweden, in collaboration with the faculty's Centre for Teaching and Learning. Seven librarians and an educational consultant from the Centre for Teaching and Learning participated; the educational consultant played an essential role in supervising and structuring the project and the evaluation process, preparing readings as well as being an active participant. The participants worked in pairs; the performance of one teacher and the associated classroom activities were observed by the critical friend, and then evaluated and discussed. Evaluation and results After two preparatory group meetings, a final meeting was held where all pairs reported what they had done and how they perceived the critical friend process. The experiences of the participating librarians were explored using a questionnaire. The questionnaire was analyzed using content analysis by one librarian and the educational consultant independently. The results suggested that use of the critical friend method could have a positive impact by achieving the following: strengthening shared values concerning teaching issues; promoting self-reflection on teaching; facilitating communication with colleagues; and reducing the sense of 'loneliness‘ in teaching. The difficulties in the implementation were lack of time and competing duties. It was perceived as an advantage to work in close partnership with the faculty's educational consultants, who were familiar with the organization.

  13. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  14. Toward Unity of Command for Multinational Air Forces

    National Research Council Canada - National Science Library

    Asjes, David

    1998-01-01

    To assure unity of command in future multinational air operations, combatant commanders must embrace the necessity of multinational air forces, maximize the integration of allied officers within air...

  15. New Global Missions for Strategic Command

    National Research Council Canada - National Science Library

    Graham, David

    2002-01-01

    .... The focus of this White Paper is on the external decisions that will be needed to provide the Command with a clear mission, and the authority, resources and organizational support necessary to perform the mission...

  16. U.S. Pacific Command > Leadership

    Science.gov (United States)

    USPACOM U.S. Pacific Command Search USPACOM: Search Search Search USPACOM: Search Home Leadership Directory Media Inquiries Home : Leadership Admiral Harry B. Harris, Jr., U.S. Navy Read the full biography

  17. The Road to a New Unified Command

    Science.gov (United States)

    2008-01-01

    The Directorate of Command, Control, Communications, and Computers (C4) Systems is chartered with information architecture (including in Africa...Friday afternoon cinema presentations where a documentary or feature film covering an African historic event was played, followed by dialogue

  18. Spacecraft command and control using expert systems

    Science.gov (United States)

    Norcross, Scott; Grieser, William H.

    1994-01-01

    This paper describes a product called the Intelligent Mission Toolkit (IMT), which was created to meet the changing demands of the spacecraft command and control market. IMT is a command and control system built upon an expert system. Its primary functions are to send commands to the spacecraft and process telemetry data received from the spacecraft. It also controls the ground equipment used to support the system, such as encryption gear, and telemetry front-end equipment. Add-on modules allow IMT to control antennas and antenna interface equipment. The design philosophy for IMT is to utilize available commercial products wherever possible. IMT utilizes Gensym's G2 Real-time Expert System as the core of the system. G2 is responsible for overall system control, spacecraft commanding control, and spacecraft telemetry analysis and display. Other commercial products incorporated into IMT include the SYBASE relational database management system and Loral Test and Integration Systems' System 500 for telemetry front-end processing.

  19. Unit Testing for Command and Control Systems

    Science.gov (United States)

    Alexander, Joshua

    2018-01-01

    Unit tests were created to evaluate the functionality of a Data Generation and Publication tool for a command and control system. These unit tests are developed to constantly evaluate the tool and ensure it functions properly as the command and control system grows in size and scope. Unit tests are a crucial part of testing any software project and are especially instrumental in the development of a command and control system. They save resources, time and costs associated with testing, and catch issues before they become increasingly difficult and costly. The unit tests produced for the Data Generation and Publication tool to be used in a command and control system assure the users and stakeholders of its functionality and offer assurances which are vital in the launching of spacecraft safely.

  20. Basic interrupt and command structures and applications

    International Nuclear Information System (INIS)

    Davies, R.C.

    1974-01-01

    Interrupt and command structures of a real-time system are described through specific examples. References to applications of a real-time system and programing development references are supplied. (auth)

  1. An Operational Commander's Guide to the Media

    National Research Council Canada - National Science Library

    McCartney, Michael

    2005-01-01

    ... of the embedded reporter . The Operational Commander is wise to review media relations and the successes and pitfalls of past conflicts, and to examine closely the results of Operation Iraqi Freedom so as to...

  2. Focused Logistics: Time for Functional Command

    National Research Council Canada - National Science Library

    Mintzlaff, Jeffrey G

    2005-01-01

    .... Military's distribution system -- the parts of the Department of Defense (DoD) that manage and execute the storage and movement of supplies to military customers -- consists of multiple entities and agencies made up of separate Services and commands...

  3. Graph Theoretical Analysis of Network Centric Operations Using Multi-Layer Models

    National Research Council Canada - National Science Library

    Wong-Jiru, Ann

    2006-01-01

    .... The research incorporates the importance of understanding network topology for evaluating an environment for net-centricity and using network characteristics to help commanders assess the effects...

  4. Children's perceptions of relationships with siblings, friends, and mothers: compensatory processes and links with adjustment.

    Science.gov (United States)

    Stocker, C M

    1994-11-01

    Links between children's psychological adjustment and individual differences in their perceptions of relationships with siblings, mothers, and friends were studied in a sample of 85 second-graders. Results indicated that characteristics of these relationships were significantly correlated with children's loneliness, depressive mood, self-esteem, and behavioral conduct. There were some links among children's perceptions of their relationships with siblings, friends, and mothers. A compensatory model of associations among adjustment and warmth in children's relationships with friends and mothers was supported. Children who reported that their relationships with either mothers, friends, or mothers and friends were characterized by high levels of warmth had significantly better adjustment outcomes than children who reported low levels of warmth in relationships with both friends and mothers. The importance of the network of children's relationships for their mental health is discussed.

  5. Schema for Spacecraft-Command Dictionary

    Science.gov (United States)

    Laubach, Sharon; Garcia, Celina; Maxwell, Scott; Wright, Jesse

    2008-01-01

    An Extensible Markup Language (XML) schema was developed as a means of defining and describing a structure for capturing spacecraft command- definition and tracking information in a single location in a form readable by both engineers and software used to generate software for flight and ground systems. A structure defined within this schema is then used as the basis for creating an XML file that contains command definitions.

  6. Control of automated system with voice commands

    OpenAIRE

    Švara, Denis

    2012-01-01

    In smart houses contemporary achievements in the fields of automation, communications, security and artificial intelligence, increase comfort and improve the quality of user's lifes. For the purpose of this thesis we developed a system for managing a smart house with voice commands via smart phone. We focused at voice commands most. We want move from communication with fingers - touches, to a more natural, human relationship - speech. We developed the entire chain of communication, by which t...

  7. Defense or Diplomacy Geographic Combatant Commands

    Science.gov (United States)

    2011-06-01

    originally ruled by 1 Priest, Dana , The Mission: Waging War and Keeping Peace with America’s Military...events. US Central Command. Dana Priest describes General Zinni‟s experience as a GCC commander, wherein General Zinni found that in many ways...ignored altogether. Dr. James Forsyth and Lt Col Chance Saltzman make this argument in their Air and Space Power Journal article “Stay Out —Why

  8. An Advanced Commanding and Telemetry System

    Science.gov (United States)

    Hill, Maxwell G. G.

    The Loral Instrumentation System 500 configured as an Advanced Commanding and Telemetry System (ACTS) supports the acquisition of multiple telemetry downlink streams, and simultaneously supports multiple uplink command streams for today's satellite vehicles. By using industry and federal standards, the system is able to support, without relying on a host computer, a true distributed dataflow architecture that is complemented by state-of-the-art RISC-based workstations and file servers.

  9. Climate-friendly Default Rules

    DEFF Research Database (Denmark)

    Sunstein, Cass R.; Reisch, Lucia A.

    . The underlying reasons include the power of suggestion; inertia and procrastination; and loss aversion. If well-chosen, climate-friendly defaults are likely to have large effects in reducing the economic and environmental harms associated with various products and activities. In deciding whether to establish...

  10. Test Telemetry And Command System (TTACS)

    Science.gov (United States)

    Fogel, Alvin J.

    1994-01-01

    The Jet Propulsion Laboratory has developed a multimission Test Telemetry and Command System (TTACS) which provides a multimission telemetry and command data system in a spacecraft test environment. TTACS reuses, in the spacecraft test environment, components of the same data system used for flight operations; no new software is developed for the spacecraft test environment. Additionally, the TTACS is transportable to any spacecraft test site, including the launch site. The TTACS is currently operational in the Galileo spacecraft testbed; it is also being provided to support the Cassini and Mars Surveyor Program projects. Minimal personnel data system training is required in the transition from pre-launch spacecraft test to post-launch flight operations since test personnel are already familiar with the data system's operation. Additionally, data system components, e.g. data display, can be reused to support spacecraft software development; and the same data system components will again be reused during the spacecraft integration and system test phases. TTACS usage also results in early availability of spacecraft data to data system development and, as a result, early data system development feedback to spacecraft system developers. The TTACS consists of a multimission spacecraft support equipment interface and components of the multimission telemetry and command software adapted for a specific project. The TTACS interfaces to the spacecraft, e.g., Command Data System (CDS), support equipment. The TTACS telemetry interface to the CDS support equipment performs serial (RS-422)-to-ethernet conversion at rates between 1 bps and 1 mbps, telemetry data blocking and header generation, guaranteed data transmission to the telemetry data system, and graphical downlink routing summary and control. The TTACS command interface to the CDS support equipment is nominally a command file transferred in non-real-time via ethernet. The CDS support equipment is responsible for

  11. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; Fries, de; Skovlund, Louise

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social qualificati...

  12. Staying Safe on Social Network Sites

    Science.gov (United States)

    ... Tips Security Tip (ST06-003) Staying Safe on Social Networking Sites Original release date: January 26, 2011 | Last revised: ... so you should take certain precautions. What are social networking sites? Social networking sites, sometimes referred to as "friend- ...

  13. 32 CFR 700.1054 - Command of a naval base.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Command of a naval base. 700.1054 Section 700.1054 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... Command Detail to Duty § 700.1054 Command of a naval base. The officer detailed to command a naval base...

  14. The Battle Command Sustainment Support System: Initial Analysis Report

    Science.gov (United States)

    2016-09-01

    products including jet fuels, distillate fuels, residual fuels, automotive gasoline , specified bulk lubricating oils, aircraft engine oils, fuel...contained within this report. 15. SUBJECT TERMS Mission command Software Tactical applications (TacApps) Command post ...computing environment (CPCE) Command post client Battle command sustainment support System (BCS3) Logistics

  15. Towards Human-Friendly Efficient Control of Multi-Robot Teams

    Science.gov (United States)

    Stoica, Adrian; Theodoridis, Theodoros; Barrero, David F.; Hu, Huosheng; McDonald-Maiers, Klaus

    2013-01-01

    This paper explores means to increase efficiency in performing tasks with multi-robot teams, in the context of natural Human-Multi-Robot Interfaces (HMRI) for command and control. The motivating scenario is an emergency evacuation by a transport convoy of unmanned ground vehicles (UGVs) that have to traverse, in shortest time, an unknown terrain. In the experiments the operator commands, in minimal time, a group of rovers through a maze. The efficiency of performing such tasks depends on both, the levels of robots' autonomy, and the ability of the operator to command and control the team. The paper extends the classic framework of levels of autonomy (LOA), to levels/hierarchy of autonomy characteristic of Groups (G-LOA), and uses it to determine new strategies for control. An UGVoriented command language (UGVL) is defined, and a mapping is performed from the human-friendly gesture-based HMRI into the UGVL. The UGVL is used to control a team of 3 robots, exploring the efficiency of different G-LOA; specifically, by (a) controlling each robot individually through the maze, (b) controlling a leader and cloning its controls to followers, and (c) controlling the entire group. Not surprisingly, commands at increased G-LOA lead to a faster traverse, yet a number of aspects are worth discussing in this context.

  16. Digital intelligent booster for DCC miniature train networks

    Science.gov (United States)

    Ursu, M. P.; Condruz, D. A.

    2017-08-01

    Modern miniature trains are now driven by means of the DCC (Digital Command and Control) system, which allows the human operator or a personal computer to launch commands to each individual train or even to control different features of the same train. The digital command station encodes these commands and sends them to the trains by means of electrical pulses via the rails of the railway network. Due to the development of the miniature railway network, it may happen that the power requirement of the increasing number of digital locomotives, carriages and accessories exceeds the nominal output power of the digital command station. This digital intelligent booster relieves the digital command station from powering the entire railway network all by itself, and it automatically handles the multiple powered sections of the network. This electronic device is also able to detect and process short-circuits and overload conditions, without the intervention of the digital command station.

  17. STS-37 Commander Nagel in commanders seat on OV-104's flight deck

    Science.gov (United States)

    1991-01-01

    STS-37 Commander Steven R. Nagel, wearing launch and entry suit (LES), sits at commanders station on the forward flight deck of Atlantis, Orbiter Vehicle (OV) 104. Surrounding Nagel are the seat headrest, control panels, checklists, forward flight deck windows, and three drinking water containers with straws attached to forward panel F2.

  18. Illiquidity and All Its Friends

    OpenAIRE

    Tirole, Jean

    2009-01-01

    The recent crisis was characterized by massive illiquidity. This paper reviews what we know and don't know about illiquidity and all its friends: market freezes, fire sales, contagion, and ultimately insolvencies and bailouts. It first explains why liquidity cannot easily be apprehended through a single statistic, and asks whether liquidity should be regulated given that a capital adequacy requirement is already in place. The paper then analyzes market breakdowns due to either adverse selecti...

  19. French adolescents' environmental friendly behaviour

    OpenAIRE

    Schleyer-Lindenmann, Alexandra

    2012-01-01

    International audience; Environmental friendly behavior and attitudes have been studied in social sciences since the 1970 with the awakening of an « ecological consciousness ». Psychology has been actively taking part in these studies since then (Maloney & Ward, 1973, Oskamp, 2000, Schmuck & Schultz, 2002). Bronfenbrenner (1979) in his nested system approach, sees the person as seen as a developing entity, in constant interaction with different developing environments. We therefore propose to...

  20. Linux Networking Cookbook

    CERN Document Server

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  1. 75 FR 63851 - Draft Friends Organizations Policy

    Science.gov (United States)

    2010-10-18

    ...] Draft Friends Organizations Policy AGENCY: Fish and Wildlife Service, Department of the Interior. ACTION... Service's mission through partnerships with Friends organizations (volunteer/advocate). Today, Friends organizations play a vital role in helping to fulfill the Service's mission of ``working with others, to...

  2. Fermilab Friends for Science Education | Welcome

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Fermilab Friends for Science Education photo Fermilab Friends for Science Education supports innovative science education programs at Fermilab. Its mission is to: Enhance the quality of precollege science education in

  3. Reticulospinal Systems for Tuning Motor Commands

    Directory of Open Access Journals (Sweden)

    Robert M. Brownstone

    2018-04-01

    Full Text Available The pontomedullary reticular formation (RF is a key site responsible for integrating descending instructions to execute particular movements. The indiscrete nature of this region has led not only to some inconsistencies in nomenclature, but also to difficulties in understanding its role in the control of movement. In this review article, we first discuss nomenclature of the RF, and then examine the reticulospinal motor command system through evolution. These command neurons have direct monosynaptic connections with spinal interneurons and motoneurons. We next review their roles in postural adjustments, walking and sleep atonia, discussing their roles in movement activation or inhibition. We propose that knowledge of the internal organization of the RF is necessary to understand how the nervous system tunes motor commands, and that this knowledge will underlie strategies for motor functional recovery following neurological injuries or diseases.

  4. Opinion on the examination of the control-command general architecture of the Flamanville 3 EPR reactor and of its associated platforms

    International Nuclear Information System (INIS)

    2009-06-01

    This report first recalls the different technical and hardware elements and components discussed by the ISRN (Nuclear Radioprotection and Safety Institute) in front of the Expert Permanent Group for nuclear reactors. These elements and components are concerning the control-command architecture as a whole, and the technical ability of networks, computers, and robots. It outlines the main principles which the control-and-command must comply with: compliance of each component of the retained technological solution with the design requirements corresponding to the safety classification, robustness of the whole control-command architecture. Then, it comments and sometimes criticizes the status of the various components of the control-command platforms with respect to this compliance. Eight recommendations are given for the SPPA T2000 control-command platform and for the robustness of the control-command architecture

  5. Academic Achievement and Its Impact on Friend Dynamics.

    Science.gov (United States)

    Flashman, Jennifer

    2012-01-01

    Academic achievement in adolescence is a key determinant of future educational and occupational success. Friends play an important role in the educational process. They provide support and resources and can both encourage and discourage academic achievement. As a result, the friends adolescents make may help to maintain and exacerbate inequality if friends are sorted on the basis of academic achievement. These observations prompt the question: How does academic achievement affect the friendship ties made? Using data from the high schools in the Add Health saturated sample, the author models network change using a stochastic actor-based Markov model for the co-evolution of networks and behavior. This model is carried out at the school level for each of the high schools included in the saturated sample. Results show that in the most typical American schools, similarity in academic achievement is an important and consistent predictor of friendship ties in a dynamic context. High-achieving students are more likely to extend ties to other high-achieving students, net of other sociodemographic, network, and proximity characteristics, while low-achieving students are more likely to extend ties to other low-achieving students. Adolescents respond to changes in academic achievement by changing their friendship ties.

  6. Linux command line and shell scripting bible

    CERN Document Server

    Blum, Richard

    2014-01-01

    Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application

  7. Content-aware network storage system supporting metadata retrieval

    Science.gov (United States)

    Liu, Ke; Qin, Leihua; Zhou, Jingli; Nie, Xuejun

    2008-12-01

    Nowadays, content-based network storage has become the hot research spot of academy and corporation[1]. In order to solve the problem of hit rate decline causing by migration and achieve the content-based query, we exploit a new content-aware storage system which supports metadata retrieval to improve the query performance. Firstly, we extend the SCSI command descriptor block to enable system understand those self-defined query requests. Secondly, the extracted metadata is encoded by extensible markup language to improve the universality. Thirdly, according to the demand of information lifecycle management (ILM), we store those data in different storage level and use corresponding query strategy to retrieval them. Fourthly, as the file content identifier plays an important role in locating data and calculating block correlation, we use it to fetch files and sort query results through friendly user interface. Finally, the experiments indicate that the retrieval strategy and sort algorithm have enhanced the retrieval efficiency and precision.

  8. A fast algorithm for identifying friends-of-friends halos

    Science.gov (United States)

    Feng, Y.; Modi, C.

    2017-07-01

    We describe a simple and fast algorithm for identifying friends-of-friends features and prove its correctness. The algorithm avoids unnecessary expensive neighbor queries, uses minimal memory overhead, and rejects slowdown in high over-density regions. We define our algorithm formally based on pair enumeration, a problem that has been heavily studied in fast 2-point correlation codes and our reference implementation employs a dual KD-tree correlation function code. We construct features in a hierarchical tree structure, and use a splay operation to reduce the average cost of identifying the root of a feature from O [ log L ] to O [ 1 ] (L is the size of a feature) without additional memory costs. This reduces the overall time complexity of merging trees from O [ L log L ] to O [ L ] , reducing the number of operations per splay by orders of magnitude. We next introduce a pruning operation that skips merge operations between two fully self-connected KD-tree nodes. This improves the robustness of the algorithm, reducing the number of merge operations in high density peaks from O [δ2 ] to O [ δ ] . We show that for cosmological data set the algorithm eliminates more than half of merge operations for typically used linking lengths b ∼ 0 . 2 (relative to mean separation). Furthermore, our algorithm is extremely simple and easy to implement on top of an existing pair enumeration code, reusing the optimization effort that has been invested in fast correlation function codes.

  9. A Novel wave-form command shaper for overhead cranes

    Directory of Open Access Journals (Sweden)

    KHALED ALHAZZA

    2013-12-01

    Full Text Available In this work, a novel command shaping control strategy for oscillation reduction of simple harmonic oscillators is proposed, and validated experimentally. A wave-form acceleration command shaper is derived analytically. The performance of the proposed shaper is simulated numerically, and validated experimentally on a scaled model of an overhead crane. Amplitude modulation is used to enhance the shaper performance, which results in a modulated wave-form command shaper. It is determined that the proposed wave-form and modulated wave-form command shaper profiles are capable of eliminating travel and residual oscillations. Furthermore, unlike traditional impulse and step command shapers, the proposed command shaper has piecewise smoother acceleration, velocity, and displacement profiles. Experimental results using continuous and discrete commands are presented. Experiments with discrete commands involved embedding a saturation model-based feedback in the algorithm of the command shaper.

  10. Command and Data Handling Branch Internship

    Science.gov (United States)

    Billings, Rachel Mae

    2016-01-01

    planes, layer stacks, and other specified design rules such as plane clearance and hole size. Multiple consultation sessions were held with Hester Yim, the technical discipline lead for the Command and Data Handling Branch, and Christy Herring, the lead PCB layout designer in the Electronic Design and Manufacturing Branch in order to ensure proper configuration. At themoment, the PCB is awaiting revision by the latter-mentioned branch. Afterwards, the board will begin to undergo the manufacturing and testing process.Throughout the internship at Johnson Space Center, I gained several technical and professional skills. I gained proficiency in Altium Designer and experience using subversion clients, as well as knowledge in PSpice with OrCAD and battery design for spaceflight from on-site. I also gained networking, organization, and communication skills throughout meetings with coworkers and other interns. This internship at Johnson Space Center has impacted my future aspirations by further inspiring me to follow a career path into space rated engineering technology and human spaceflight applications. After graduation, I plan to attend graduate school for a master's or doctorate degree in electrical or computer engineering.

  11. Receiver Operator Characteristic Tools Graphic User Interface Extension for R Commander

    Directory of Open Access Journals (Sweden)

    Daniel Corneliu LEUCUŢA

    2015-12-01

    Full Text Available Background: Receiver Operator Characteristic (ROC curve, is a graphical plot which presents the performance of a binary classifier when the discrimination cutoff is varied. The aim of this work was to create an extension for R Commander that offers a graphical user interface for Receiver Operator Characteristic tools provided by several existing command line accessible packages like pROC and ROCR. Material and Methods: The extension was built and tested with R version 3.2.0 and R Commander 2.1-7. Results: We built an extension called RcmdrPlugin.ROC that we uploaded on the CRAN servers. The extension adds a new menu called ROC, along with two submenus pROC and ROCR that broadly corresponds to commands available to access the functions of these packages. The pROC menu offers several commands: to plot a ROC curve for a dataset or for a logistic regression model, to compare paired and unpaired ROC curves, each providing the following tabs: General (to select the variables for the analysis, and options for switching cases with controls; Smoothing (allowing the user to select different types of smoothing – binominal, density, distributions like normal, lognormal, ...; AUC (to specify the partial area under the curve (AUC options, CI (to select the options of confidence intervals (CI – the level, computing method: DeLong, bootstrap, ...; Plot (for the plotting options. The ROCR dialogue window offers more options in choosing the performance measures for the plot. Conclusion: The RcmdrPlugin.ROC extension helps less advanced users of R accessing ROC tools in a friendly graphical user interface.

  12. Enhancing network centric operations doctrine to support civil military cooperation in disaster management

    NARCIS (Netherlands)

    Wolbers, J.J.; Beeres, R.; Bakx, G.; de Waard, E.; Rietjens, S.

    2016-01-01

    Network Centric Operations is a promising command doctrine in both military operations and during civil disaster management. As both sectors started intensifying their joint operational capacity through civil-military collaboration, it becomes increasingly relevant to address the different command

  13. Command History. 1968. Volume 1. Sanitized.

    Science.gov (United States)

    1968-01-01

    battalions. Additionally, a diary captured on 19 December, Z1 kilometers southwest of Song Cau, revealed that on 19 November the author. a cadre member...the 306th and 312th ( AYA 308th) Bns. This reorga- nization was an apparent attempt by the headquarters of MR 3 to tighten its command and con- trol. (C

  14. Commandants' Managerial Capacity and Workers Productivity in ...

    African Journals Online (AJOL)

    The purpose of this study is to evaluate the commandant's managerial capacity as if relates to workers productivity with a view to determining whether their calling to the education terrain has been justified and to correct certain areas in need of improvement in the Nigeria Police Education set up. In doing this, the study took ...

  15. Command and Control in Littoral Operations

    Science.gov (United States)

    2016-05-13

    at the graphics on the wall displaying the position of the various forces under his command. Only a few of his 14 ships were in formation with him...Mainz, 2d MEB Lead Planner (November 11, 2014). Moskowitz, Michael, and Nolan Noble. Dawn Blitz 2015- Observations and Analysis. Exercise

  16. RELATIONSHIP BETWEEN LINGUISTIC UNITS AND MOTOR COMMANDS.

    Science.gov (United States)

    FROMKIN, VICTORIA A.

    ASSUMING THAT SPEECH IS THE RESULT OF A NUMBER OF DISCRETE NEUROMUSCULAR EVENTS AND THAT THE BRAIN CAN STORE ONLY A LIMITED NUMBER OF MOTOR COMMANDS WITH WHICH TO CONTROL THESE EVENTS, THE RESEARCH REPORTED IN THIS PAPER WAS DIRECTED TO A DETERMINATION OF THE SIZE AND NATURE OF THE STORED ITEMS AND AN EXPLANATION OF HOW SPEAKERS ENCODE A SEQUENCE…

  17. APOLLO 11 COMMANDER NEIL ARMSTRONG IN SIMULATOR

    Science.gov (United States)

    1969-01-01

    Apollo 11 commander Neil Armstrong is going through flight training in the lunar module simulator situated in the flight crew training building at KSC. Armstrong will pilot the lunar module to a moon landing on July 20, following launch from KSC on July 16.

  18. Command-And-Control or Taxation?

    DEFF Research Database (Denmark)

    Oh, Christina; Svendsen, Gert Tinggaard

    2015-01-01

    an ineffective command-and-control (CAC) tool, whereas Denmark has chosen the effective tool of taxation. One main explanation for this variation in policy choice is the variation in institutional setups, namely the corporatist route in Denmark versus the pluralistic route in California....

  19. How to Make Financial Aid "Freshman-Friendly"

    Science.gov (United States)

    Pugh, Susan L.; Johnson, David B.

    2011-01-01

    Ultimately, making financial aid "freshman friendly" also makes financial aid "sophomore friendly," "junior friendly," and "senior friendly." Indiana University has in place an Office of Enrollment Management (OEM) model that includes focused financial aid packaging strategies complemented by unique contact…

  20. Diverse Friendship Networks and Heterogeneous Peer Effects on Adolescent Misbehaviors

    Science.gov (United States)

    Xu, Yilan; Fan, Linlin

    2018-01-01

    This study estimates peer effects in diverse friendship networks by friend types. Evidence from friendship networks for 57,351 U.S. high school adolescents demonstrates that adolescents are more likely to make friends with someone of the same immigrant status or ethnicity ('similar friends') than those with different backgrounds ('dissimilar…

  1. Patch models and their applications to multivehicle command and control.

    Science.gov (United States)

    Rao, Venkatesh G; D'Andrea, Raffaello

    2007-06-01

    We introduce patch models, a computational modeling formalism for multivehicle combat domains, based on spatiotemporal abstraction methods developed in the computer science community. The framework yields models that are expressive enough to accommodate nontrivial controlled vehicle dynamics while being within the representational capabilities of common artificial intelligence techniques used in the construction of autonomous systems. The framework allows several key design requirements of next-generation network-centric command and control systems, such as maintenance of shared situation awareness, to be achieved. Major features include support for multiple situation models at each decision node and rapid mission plan adaptation. We describe the formal specification of patch models and our prototype implementation, i.e., Patchworks. The capabilities of patch models are validated through a combat mission simulation in Patchworks, which involves two defending teams protecting a camp from an enemy attacking team.

  2. Discrete Event Command & Control for Networked Teams with Multiple Missions

    Science.gov (United States)

    2009-03-16

    Architecture for Unmanned Ground Systems ( JAUGS )10, and is an efficient means to realize the high-level OODA loops (observe, orient, decide, act) of 4D...for Unmanned Ground systems ( JAUGS )10, and is an efficient means to realize the OODA loops (observe, orient, decide, act) of 4D/RCS11. DEC is able to

  3. Does it matter what friends think, say, or do? The role of friends' smoking attitudes and behavior for Dutch adolescents' smoking behavior.

    Science.gov (United States)

    Huisman, Chip

    2014-05-01

    Using stochastic actor-based models for longitudinal network analysis, this study examines the role of friends' smoking attitudes and behavior for Dutch adolescents' smoking behavior in four secondary schools (N = 875). The data were collected in two waves in two small suburban towns under second graders in 2008 to 2009 by means of a standardized questionnaire. Stochastic actor-based models for longitudinal network analysis can control for friendship selection while examining the effect of friends' attitudes and smoking behavior on the smoking behavior of a student. The findings suggest that friends tend to select each other on similar smoking behavior. Influence of friends' smoking behavior seems to play no role. In one school, an effect of friends' attitudes towards smoking on the smoking behavior is found. The implications for future research are to consider attitudes when examining the influence of friendship network on smoking behavior. The main limitation of this study lies in the limited sample, which makes generalizations to the general population difficult.

  4. The importance of perceived care and connectedness with friends and parents for adolescent social anxiety.

    Science.gov (United States)

    Van Zalk, Nejra; Van Zalk, Maarten

    2015-06-01

    Nonclinical social anxiety in adolescence can be highly problematic, as it likely affects current and especially new social interactions. Relationships with significant others, such as close friends, mothers, and fathers, could aid socially anxious adolescents' participation in social situations, thereby helping reduce feelings of social anxiety. We examined whether making friends as well as high friendship quality help reduce social anxiety over time, and whether friends', mothers', and fathers' care interact in reducing social anxiety. Using longitudinal data from 2,194 participants in a social network (48% girls; Mage  = 13.58) followed for 3 years, we estimated friendship selection and influence processes via a continuous time-modeling approach using SIENA. We controlled for the effects of depressive symptoms, self-esteem, gender, age, and family structure. Our findings suggest that perceived care by friends mediated the effect of making friends on social anxiety. Perceptions of mother and father, as well as friend care and connectedness, respectively, did not interact in decreasing social anxiety. Nonetheless, care and connectedness with mothers, fathers, and friends jointly predicted decreases in social anxiety. Caring relationships with friends and parents each play a role in mutually protecting early adolescents against increasing in social anxiety over time. © 2014 Wiley Periodicals, Inc.

  5. Intelligent Tutoring System for Teaching Battlefield Command Reasoning Skills

    National Research Council Canada - National Science Library

    Domeshek, Eric

    2002-01-01

    .... Achieving expert levels of proficiency in high-level command reasoning skills-whether for battlefield commanders or for executives in industry-requires extensive practice, coaching, and feedback...

  6. 'The Danger of Divided Command': British civil and military disputes ...

    African Journals Online (AJOL)

    Commander-in-Chief of the Indian Army, Lord Kitchener, which culminated in Curzon's ... and the officers commanding forces would have no doubt as to their .... but assuming financial responsibility for its own defence would have been ...

  7. Maritime Coalitions: When is Unity of Command Required

    National Research Council Canada - National Science Library

    Gahlinger, Gregory J

    2007-01-01

    .... The concepts of Unity of Command, Unity of Effort and Parallel, Lead Nation, or Integrated coalition command structures are viable across a broad spectrum of maritime coalition operations but do have...

  8. GPS and the Joint Force Commander: Critical Asset, Critical Vulnerability

    National Research Council Canada - National Science Library

    McPherson, Michael

    2001-01-01

    Joint Force Commanders (JFCs) have become over reliant on military and commercial satellite systems for intelligence gathering and dissemination, weather, command, control, communications, and navigation/guidance functions, to name a few...

  9. U.S. Africa Command: Shaping Africa for the Future

    National Research Council Canada - National Science Library

    Sholley, Hans

    2006-01-01

    .... It is argued the current Unified Command Plan is ill designed to address the complexities of the continent of Africa and that a proposed United States Africa Command would be better positioned...

  10. The Warfighting Capacity of Air Combat Command's Numbered Air Forces

    National Research Council Canada - National Science Library

    Hanser, Lawrence

    2000-01-01

    ...) of the Air Combat Command (ACC), General Richard E. Hawley, the ACC Commander, asked if RAND could offer an analysis of the number of NAFs that were needed by ACC to meet warfighting requirements...

  11. Incorrect Responses to Locative Commands: A Case Study.

    Science.gov (United States)

    Duchan, Judith; Siegel, Leo

    1979-01-01

    A six-year-old with a language problem responded consistently to 100 locative commands by putting objects in containers and on flat surfaces regardless of the preposition or order of the nouns in the commands. (Author/CL)

  12. Development of environmentally friendly briquettes

    International Nuclear Information System (INIS)

    Kleisa, K.; Lehmann, J.; Verfuss, F.; Simon, G.

    1994-01-01

    The DMT has developed an industrial briquette consisting of about 87% hardcoal, 7% molasses pulp and 6% hydration limestone which meets the requirements of the clean air authority as an environmentally friendly fuel for travelling grate boilers. In extensive tests in a 4.4 MW travelling grate boiler these briquettes with molasses and limestone additives proved to be particularly effective in terms of reducing sulphur dioxide emission in the flue gas. They exhibited good ignition and combustion behaviour as well as a considerable reduction in nitrogen oxide emission. In a large-scale test with 1000 t of briquettes in a 46.5 MW travelling grate furnace it proved possible to confirm the good combustion behaviour and the reduced emission of sulphur oxide and nitrogen oxide in the flue gas. (orig.) [de

  13. Environmental friendly energy transport media

    International Nuclear Information System (INIS)

    Wan Nik, W.B.

    2002-01-01

    Rational self-interest and good environmental citizenship are forcing the development of renewable and environmentally, acceptable working fluids. Fluids that are at least equivalent in performance plus biodegradable have been formulated in Europe and USA rising vegetable oils as base stocks and as innovative additive packages. While much of the research has been made in the field of alternative environmentally, friendly energy, transport media, the thermal stability of vegetable based stock is still a challenging area. This work concentrates more in improving the oxidation stability of the vegetable based stocks. Oven and oil bath test methods were employed in this study. This paper tabled mineral and vegetable oil physical test results and presents thermal stability of oil blends. (Author)

  14. Soviet command and control in a historical context

    OpenAIRE

    Kern, Jeffrey A.

    1981-01-01

    Approved for public release; distribution is unlimited An examination is made of the historical antecedents of present day command and control doctrine in the Soviet Union. The continuity of principal characteristics is demonstrated. The ideological determinants shaping the command and control system are first developed. These include centralism, collective decision-making, unity of command, and redundancy. Practical consequences of these are explored. The functioning of Soviet command...

  15. 32 CFR 700.1056 - Command of a ship.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Command of a ship. 700.1056 Section 700.1056 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS Precedence, Authority and Command Detail to Duty § 700.1056 Command of a...

  16. U.S. Pacific Command > About USPACOM > History

    Science.gov (United States)

    USPACOM U.S. Pacific Command Search USPACOM: Search Search Search USPACOM: Search Home Leadership People's Republic of China, the Democratic People's Republic of Korea, Mongolia, and the Republic of its surrounding waters under the leadership of one commander, providing a unity of command absent from

  17. Eco-friendly Development Of Industry

    International Nuclear Information System (INIS)

    An, Gi Cheol; Park, Hun; Lee, Dong Jin; Ryu, Sang Hui

    1998-02-01

    This book reports eco-friendly development of industry, which has summary on bring up the issue and research way and system of research. It deals with current state of affairs on eco-friendly development of industry and the case of developed countries such as necessity and meaning of eco-friendly development industry, prospect and change of the tendency, environmental issue by field in Korea like the steel industry, nonferrous metal industry, auto industry, and cement industry and general policy for eco-friendly development of industry.

  18. ARAC: A unique command and control resource

    International Nuclear Information System (INIS)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S.

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource

  19. ARAC: A unique command and control resource

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S. [and others

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource.

  20. Automated constraint checking of spacecraft command sequences

    Science.gov (United States)

    Horvath, Joan C.; Alkalaj, Leon J.; Schneider, Karl M.; Spitale, Joseph M.; Le, Dang

    1995-01-01

    Robotic spacecraft are controlled by onboard sets of commands called "sequences." Determining that sequences will have the desired effect on the spacecraft can be expensive in terms of both labor and computer coding time, with different particular costs for different types of spacecraft. Specification languages and appropriate user interface to the languages can be used to make the most effective use of engineering validation time. This paper describes one specification and verification environment ("SAVE") designed for validating that command sequences have not violated any flight rules. This SAVE system was subsequently adapted for flight use on the TOPEX/Poseidon spacecraft. The relationship of this work to rule-based artificial intelligence and to other specification techniques is discussed, as well as the issues that arise in the transfer of technology from a research prototype to a full flight system.

  1. Operational Maneuver from the Sea and Amphibious Command Relationships: Is It time for a Joint Force Amphibious Component Commander?

    National Research Council Canada - National Science Library

    Bennett, Michael

    2004-01-01

    .... In a joint community that is becoming increasingly dependant on the use of functional component commanders in the execution of major operations, the need for a Joint Force Amphibious Component Commander (JFAMCC...

  2. Local area networking handbook

    OpenAIRE

    O'Hara, Patricia A.

    1990-01-01

    Approved for public release; distribution is unlimited. This thesis provides Navy shore based commands with sufficient information on local area networking to (1) decide if they need a LAN, (2) determine what their networking requirements are, and (3) select a LAN that satisfies their requirements. LAN topologies, transmission media, and medium access methods are described. In addition, the OSI reference model for computer networking and the IEEE 802 LAN standards are explained in detail. ...

  3. Commanders’ Perception of Risk: Enabling Boldness

    Science.gov (United States)

    2008-04-01

    individual. Soldiers are trained over time to employ their weapon systems tinder a variety of conditions in, realistic simulations and scenarios, thus...from ground combat the specialty is, where th~ leader provides the same support in combat that he would in garrison with no direct relationship to an...34 safety paperwork and activities. 73 Senior commanders must aggressively search for means to communicate their intent and the relationship between

  4. Command and Control for Distributed Lethality

    Science.gov (United States)

    2017-06-01

    extended communications between the AFP CDR and the CCDR are required. As shown in Figure 20, the principle command relationships are between...frequency (RF) communications are limited by maximum antenna height of each surface platform without an airborne relay. LOS is estimated with an online ...documents the interconnections and relationship of information flow and the system requirements for maintaining the interconnection links during a

  5. Jimmy Doolittle: The Commander behind the Legend

    Science.gov (United States)

    2015-02-01

    was 35 percent and that, although luxury items were cheap, food and other necessities were expensive. He speculated that everyone in Germany...British Spitfire groups, one troop-carrier group, one light-bombardment group, and three medium-bombardment groups.123 He later observed, “I was a brand ...a very popular commander, Ira Eaker, was perhaps the first. Eaker had served in the Eighth since its incep- tion and led its first independent attack

  6. Auftragstaktik: The Basis for Modern Military Command?

    Science.gov (United States)

    2012-12-06

    Pauli’s Nachf, 1892. Showalter, Dennis. The Wars of German Unification. London: Hodder Education , 2004. Simpkin, Richard. Race to the Swift. London...to the bourgeois class again, making education , not social position, the deciding factor for obtaining a commission.15 The army created a system of...only reflected the increased education and capability of the new officer corps, but also the reality of commanding an army in the Napoleonic era

  7. Mission Command In A Communications Denied Environment

    Science.gov (United States)

    2017-02-16

    the mutual trust between the echelons.8 In the United States armed forces, the Joint Chiefs have understood the value of...without being over controlling or micromanaging.12 During the execution phase the commander is the free to choose his position on the battlefield to... the Air Force Association Convention, National Harbor, MD, September 16, 2009, accessed at http://www.defenselink.mil/ speeches

  8. Naval Meteorology and Oceanography Command exhibit entrance

    Science.gov (United States)

    2000-01-01

    StenniSphere at NASA's John C. Stennis Space Center in Hancock County, Miss., invites visitors to discover why America comes to Stennis Space Center before going into space. Designed to entertain while educating, StenniSphere includes informative displays and exhibits from NASA and other agencies located at Stennis, such as this one from the Naval Meteorology and Oceanography Command. Visitors can 'travel' three-dimensionally under the sea and check on the weather back home in the Weather Center.

  9. Naval Meteorology and Oceanography Command exhibit

    Science.gov (United States)

    2000-01-01

    Designed to entertain while educating, StenniSphere at the John C. Stennis Space Center in Hancock County, Miss., includes informative displays and exhibits from NASA and other agencies located at Stennis, such as this one from the Naval Meteorology and Oceanography Command. Visitors can 'travel' three-dimensionally under the sea and check on the weather back home in the Weather Center. StenniSphere is open free of charge from 9 a.m. to 5 p.m. daily.

  10. Network device interface for digitally interfacing data channels to a controller via a network

    Science.gov (United States)

    Ellerbrock, Philip J. (Inventor); Grant, Robert L. (Inventor); Konz, Daniel W. (Inventor); Winkelmann, Joseph P. (Inventor)

    2009-01-01

    A communications system and method are provided for digitally connecting a plurality of data channels, such as sensors, actuators, and subsystems, to a controller using a network bus. The network device interface interprets commands and data received from the controller and polls the data channels in accordance with these commands. Specifically, the network device interface receives digital commands and data from the controller, and based on these commands and data, communicates with the data channels to either retrieve data in the case of a sensor or send data to activate an actuator. Data retrieved from the sensor is converted into digital signals and transmitted to the controller. Network device interfaces associated with different data channels can coordinate communications with the other interfaces based on either a transition in a command message sent by the bus controller or a synchronous clock signal.

  11. Developing age-friendly cities: case studies from Brussels and Manchester and implications for policy and practice.

    Science.gov (United States)

    Buffel, Tine; McGarry, Paul; Phillipson, Chris; De Donder, Liesbeth; Dury, Sarah; De Witte, Nico; Smetcoren, An-Sofie; Verté, Dominique

    2014-01-01

    Developing environments responsive to the aspirations of older people has become a major concern for social and public policy. Policies and programs directed at achieving "age-friendly" communities are considered to require a wide range of interventions, including actions at the level of the social and physical environment. This article compares the age-friendly approaches of two European cities, Brussels and Manchester, with a particular focus on policies and initiatives that promote active aging in an urban context. The article examines, first, the demographic, social, and multicultural contexts of Brussels and Manchester; second, the way in which both cities became members of the World Health Organization Global Network of Age-Friendly Cities and Communities; third, similarities and differences in the age-friendly approaches and actions adopted by both cities; and fourth, opportunities and barriers to the implementation of age-friendly policies. The article concludes by discussing the key elements and resources needed to develop age-friendly cities.

  12. Designed to Win: An Agile Approach to Air Force Command and Control of Cyberspace

    Science.gov (United States)

    2010-06-01

    capabilities and limitations of technology with a level of control that synchronizes operations, yet allows independent action to take advantage of...was during the Roman Empire. With the exception of the semaphore telegraph and an improved road network, the same methods of communication used by...48 To provide information quickly to the ground commanders, the Aviation Section of the US Signal Corps installed primitive wireless radio sets in

  13. The Combat Cloud: Enabling Multi-Domain Command and Control Across the Range of Military Operations

    Science.gov (United States)

    2017-03-01

    fire support coordination measures , its potential to enhance the close air support and personnel recovery missions, interagency coordination...connectivity, such as that of a Long Term Evolution ( LTE ) network. As the user transitions out of the area of LTE coverage, the connectivity then...improving the flexibility and use of fire support coordination measures (FSCM). Joint doctrine defines a FSCM as, “A measure employed by commanders to

  14. Phil Friend julgustab riske võtma / Phil Friend ; interv. Harda Roosna

    Index Scriptorium Estoniae

    Friend, Phil

    2003-01-01

    Suurbritannia koolitus- ja konsultatsioonifirma Churchill & Friend juhataja Phil Friend vastab küsimustele oma firma missiooni kohta Hiiumaal, puuetega inimeste elu erinevuste kohta Hiiumaal ja Suurbritannias. Vt. samas: Phil Friend julgustas tööandjaid puuetega inimesi tööle võtma

  15. Fermilab Friends for Science Education | Programs

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Programs Donors Board of Directors Board Tools Calendar Join Us Donate Now Get FermiGear! Education Office Search photo Fermilab Friends for Science Education, in partnership with Fermilab and area educators, designs

  16. Fermilab Friends for Science Education | Contact Us

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Contact Us Science Education P.O Box 500, MS 777 Batavia, IL 60510-5011 (630) 840-3094 * fax: (630) 840-2500 E-mail : Membership Send all other communications to: Susan Dahl, President Fermilab Friends for Science Education Box

  17. Lactobacillus iners: Friend or Foe?

    Science.gov (United States)

    Petrova, Mariya I; Reid, Gregor; Vaneechoutte, Mario; Lebeer, Sarah

    2017-03-01

    The vaginal microbial community is typically characterized by abundant lactobacilli. Lactobacillus iners, a fairly recently detected species, is frequently present in the vaginal niche. However, the role of this species in vaginal health is unclear, since it can be detected in normal conditions as well as during vaginal dysbiosis, such as bacterial vaginosis, a condition characterized by an abnormal increase in bacterial diversity and lack of typical lactobacilli. Compared to other Lactobacillus species, L. iners has more complex nutritional requirements and a Gram-variable morphology. L. iners has an unusually small genome (ca. 1 Mbp), indicative of a symbiotic or parasitic lifestyle, in contrast to other lactobacilli that show niche flexibility and genomes of up to 3-4 Mbp. The presence of specific L. iners genes, such as those encoding iron-sulfur proteins and unique σ-factors, reflects a high degree of niche specification. The genome of L. iners strains also encodes inerolysin, a pore-forming toxin related to vaginolysin of Gardnerella vaginalis. Possibly, this organism may have clonal variants that in some cases promote a healthy vagina, and in other cases are associated with dysbiosis and disease. Future research should examine this friend or foe relationship with the host. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. IT Security Support for the Spaceport Command Control System Development

    Science.gov (United States)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  19. Apparatus and method for data communication in an energy distribution network

    Science.gov (United States)

    Hussain, Mohsin; LaPorte, Brock; Uebel, Udo; Zia, Aftab

    2014-07-08

    A system for communicating information on an energy distribution network is disclosed. In one embodiment, the system includes a local supervisor on a communication network, wherein the local supervisor can collect data from one or more energy generation/monitoring devices. The system also includes a command center on the communication network, wherein the command center can generate one or more commands for controlling the one or more energy generation devices. The local supervisor can periodically transmit a data signal indicative of the data to the command center via a first channel of the communication network at a first interval. The local supervisor can also periodically transmit a request for a command to the command center via a second channel of the communication network at a second interval shorter than the first interval. This channel configuration provides effective data communication without a significant increase in the use of network resources.

  20. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  1. Incident Command System - Environmental Unit responsibilities

    International Nuclear Information System (INIS)

    Hillman, S. O.

    1997-01-01

    The Incident Command System (ICS) for crisis management, used for response to oil spills by the Alyeska Pipeline Service Company throughout its facilities, including the Trans Alaska Pipeline and the Valdez Marine Terminal, was described. Special attention was given to the Environmental Unit within the ICS which functions as a primary support unit for the Incident Operations Section. Details of the Unit's function were provided. These include the collection, evaluation and dissemination of information on all environmental issues concerning the crisis, provision of advice and direction on environmental aspects, and up-front agency interaction. A checklist of tasks is included. 7 refs

  2. Spaceport Command and Control System Automation Testing

    Science.gov (United States)

    Hwang, Andrew

    2017-01-01

    The Spaceport Command and Control System (SCCS) is the National Aeronautics and Space Administrations (NASA) launch control system for the Orion capsule and Space Launch System, the next generation manned rocket currently in development. This large system requires high quality testing that will properly measure the capabilities of the system. Automating the test procedures would save the project time and money. Therefore, the Electrical Engineering Division at Kennedy Space Center (KSC) has recruited interns for the past two years to work alongside full-time engineers to develop these automated tests, as well as innovate upon the current automation process.

  3. 24 Command Fire Improvement Action Program Plan

    International Nuclear Information System (INIS)

    GRIFFIN, G.B.

    2000-01-01

    Fluor Hanford (FH) is responsible for providing support to the Department of Energy Richland Operations Office (RL) in the implementation of the Hanford Emergency Preparedness (EP) program. During fiscal year 2000, a number of program improvements were identified from various sources including a major range fire (24 Command Fire). Evaluations of the emergency preparedness program have confirmed that it currently meets all requirements and that performance of personnel involved is good, however the desire to effect continuous improvement resulted in the development of this improvement program plan. This program plan defines the activities that will be performed in order to achieve the desired performance improvements

  4. Spaceport Command and Control System Automation Testing

    Science.gov (United States)

    Plano, Tom

    2017-01-01

    The goal of automated testing is to create and maintain a cohesive infrastructure of robust tests that could be run independently on a software package in its entirety. To that end, the Spaceport Command and Control System (SCCS) project at the National Aeronautics and Space Administration's (NASA) Kennedy Space Center (KSC) has brought in a large group of interns to work side-by-side with full time employees to do just this work. Thus, our job is to implement the tests that will put SCCS through its paces.

  5. Spaceport Command and Control System Automated Testing

    Science.gov (United States)

    Stein, Meriel

    2017-01-01

    The Spaceport Command and Control System (SCCS) is the National Aeronautics and Space Administrations (NASA) launch control system for the Orion capsule and Space Launch System, the next generation manned rocket currently in development. This large system requires high quality testing that will properly measure the capabilities of the system. Automating the test procedures would save the project time and money. Therefore, the Electrical Engineering Division at Kennedy Space Center (KSC) has recruited interns for the past two years to work alongside full-time engineers to develop these automated tests, as well as innovate upon the current automation process.

  6. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  7. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  8. Nordic Analysis of Climate Friendly Buildings

    DEFF Research Database (Denmark)

    Andresen, Inger; Thomsen, Kirsten Engelund; Wahlstrøm, Åsa

    This report summarizes the findings of the work conducted within the project “Nordic Analysis of Climate Friendly Buildings”, financed by the Nordic Council of Ministers. The main goal of the project was to establish a knowledge and decision base for a Nordic innovation program that will promote...... the development and demonstration of low energy and climate friendly buildings. The innovation program should support a development that brings the Nordic countries to an international forefront with respect to business strongholds and market penetration of low energy and climate friendly buildings....

  9. Command Structure for Theater Warfare: The Quest for Unity of Command

    Science.gov (United States)

    1984-09-01

    that trryfari tail forth thr htst from iti—Btturki Major General« Pern M Smith. USAF. and Hark) A Hughe«. USAF. contributed more to the rndertaking...an air. ground, and sea component. These arc generic commands which control all combat operations in the media of the air. ground, and sea. There

  10. Environmentally-friendly animal litter

    Energy Technology Data Exchange (ETDEWEB)

    Boxley, Chett; McKelvie, Jessica

    2012-08-28

    An animal litter composition including geopolymerized ash particulates having a network of repeating aluminum-silicon units is described herein. Generally, the animal litter is made from a quantity of a pozzolanic ash mixed with a sufficient quantity of water and an alkaline activator to initiate a geopolymerization reaction that forms geopolymerized ash. After the geopolymerized ash is formed, it is dried, broken into particulates, and sieved to a desired size. These geopolymerized ash particulates are used to make a non-clumping or clumping animal litter. Odor control is accomplished with the addition of a urease inhibitor, pH buffer, an odor eliminating agent, and/or fragrance.

  11. Environmentally-friendly animal litter

    Science.gov (United States)

    Boxley, Chett; McKelvie, Jessica

    2013-09-03

    An animal litter composition that includes geopolymerized ash particulates having a network of repeating aluminum-silicon units is described herein. Generally, the animal litter is made from a quantity of a pozzolanic ash mixed with an alkaline activator to initiate a geopolymerization reaction that forms geopolymerized ash. This geopolymerization reaction may occur within a pelletizer. After the geopolymerized ash is formed, it may be dried and sieved to a desired size. These geopolymerized ash particulates may be used to make a non-clumping or clumping animal litter or other absorbing material. Aluminum sulfate, clinoptilolite, silica gel, sodium alginate and mineral oil may be added as additional ingredients.

  12. Romantic Partners, Friends, Friends with Benefits, and Casual Acquaintances As Sexual Partners

    Science.gov (United States)

    Furman, Wyndol; Shaffer, Laura

    2011-01-01

    The purpose of the present study was to provide a detailed examination of sexual behavior with different types of partners. A sample of 163 young adults reported on their light nongenital, heavy nongenital, and genital sexual activity with romantic partners, friends, and casual acquaintances. They described their sexual activity with “friends with benefits” as well as with friends in general. Young adults were most likely to engage in sexual behavior with romantic partners, but sexual behavior also often occurred with some type of nonromantic partner. More young adults engaged in some form of sexual behavior with casual acquaintances than with friends with benefits. The frequencies of sexual behavior, however, were greater with friends with benefits than with friends or casual acquaintances. Interview and questionnaire data revealed that friends with benefits were typically friends, but not necessarily. Nonsexual activities were also less common with friends with benefits than other friends. Taken together, the findings illustrate the value of differentiating among different types of nonromantic partners and different levels of sexual behavior. PMID:21128155

  13. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    Human Resource Development was the first and remains an important pillar in Japanese foreign aid. I will argue that Japan has access to a global network of alumni who will co-define Japanese foreign aid in the future, because Japan has encouraged alumni societies and networking since 1965. A total...... of more than a million people in more than 100 countries have attended courses in Japan funded fully or partly by Japanese ODA since the inception of the technical assistance programs in 1954 through the Colombo Plan and since 1959 through the Association of Overseas Technical Scholarships (AOTS from 2009...... HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of Friends...

  14. The network communication of BEPC control system

    International Nuclear Information System (INIS)

    Xu Jingwei

    1997-01-01

    The author introduces the application of network communication of BEPC control system. The authors use non-transparent communication to transfer the data and command information from node VAX750 to VAX4500

  15. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  16. Engagement Skills Trainer: The Commander’s Perspective

    Science.gov (United States)

    2017-06-09

    CBRN Chemical Biological Radiological and Nuclear CGSOC Command and General Staff Officers Course DMG Digital Master Gunner EST Engagement Skills...commanders always emphasized SHARP ( Sexual Harassment and Response Program) training, the battery commander may vividly recall those events but not the range...soldiers in the EST generally do worse at weapons safety and orientation .26 Indicators from research show that EST results predict live fire results. The

  17. Command vector memory systems: high performance at low cost

    OpenAIRE

    Corbal San Adrián, Jesús; Espasa Sans, Roger; Valero Cortés, Mateo

    1998-01-01

    The focus of this paper is on designing both a low cost and high performance, high bandwidth vector memory system that takes advantage of modern commodity SDRAM memory chips. To successfully extract the full bandwidth from SDRAM parts, we propose a new memory system organization based on sending commands to the memory system as opposed to sending individual addresses. A command specifies, in a few bytes, a request for multiple independent memory words. A command is similar to a burst found in...

  18. XTCE: XML Telemetry and Command Exchange Tutorial, XTCE Version 1

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad

    2008-01-01

    These presentation slides are a tutorial on XML Telemetry and Command Exchange (XTCE). The goal of XTCE is to provide an industry standard mechanism for describing telemetry and command streams (particularly from satellites.) it wiill lower cost and increase validation over traditional formats, and support exchange or native format.XCTE is designed to describe bit streams, that are typical of telemetry and command in the historic space domain.

  19. ECO-FRIENDLY SYNTHESIS OF SILVER NANOPARTICLES ...

    African Journals Online (AJOL)

    userpc

    Keywords: Silver nanoparticles; UV-Visible Spectrophotometry; Dynamic Light Scattering;. Transmission ... The eco- friendly protocol developed led to the synthesis ... lamp for. 5 minutes. (Omidiet al.,. 2014).Authentication of the formation of.

  20. Depression: Supporting a Family Member or Friend

    Science.gov (United States)

    ... Accessed July 9, 2015. Helping someone with a mood disorder. Depression and Bipolar Support Alliance. http://www.dbsalliance.org/site/PageServer?pagename=help_friends_family. Accessed July 9, 2015. Suicide warning signs. American Foundation for Suicide Prevention. https:// ...

  1. Environmentally friendly preparation of metal nanoparticles

    Science.gov (United States)

    The book chapter summarizes the “state of the art” in the exploitation of various environmentally-friendly synthesis approaches, reaction precursors and conditions to manufacture metal and metal oxide nanoparticles for a vast variety of purposes.

  2. Strengthening Youth Friendly Health Services through Expanding ...

    African Journals Online (AJOL)

    USER

    safety, LARC uptake among youth is low. We evaluated the effect on contraceptive uptake of training youth-friendly service providers to counsel and provide all .... approach - service delivery limited to LARCs training for the YFS providers and ...

  3. Eco friendly expectations and limitations in daycare

    DEFF Research Database (Denmark)

    Husted, Mia

    This presentation elaborates on expectations and limitations of eco-friendly pedagogical responses to the sustainability crisis. The pedagogical perspectives on eco-friendly responses originates from an action research project involving pedagogues in day care centers and teachers at a University ...... College in Denmark. As part of the project they were asked to explore, elaborate and develop new pedagogical actions and perspectives related to future relationships between human beings and our common nature......This presentation elaborates on expectations and limitations of eco-friendly pedagogical responses to the sustainability crisis. The pedagogical perspectives on eco-friendly responses originates from an action research project involving pedagogues in day care centers and teachers at a University...

  4. Pet Therapy: Man's Best Friend as Healer

    Science.gov (United States)

    ... psychological and physiological health of critically ill patients. Dimensions of Critical Care Nursing. 2010;29:211. Cangelosi PR, et al. Walking for therapy with man's best friend. Journal of Psychosocial Nursing and Mental ...

  5. Offering Spiritual Support for Family or Friends

    Science.gov (United States)

    ... help you understand your spirituality when facing life-changing situations. Even within families, among friends and in faith communities, people’s spiritual beliefs and experiences may be very different. Be clear ...

  6. Hispanic Labor Friends Initiative: supporting vulnerable women.

    Science.gov (United States)

    Hazard, Cambria Jones; Callister, Lynn Clark; Birkhead, Ana; Nichols, Lisa

    2009-01-01

    To evaluate the qualitative aspects of the Hispanic Labor Friends Initiative. "Hispanic Labor Friends," bilingual Hispanic community women who were themselves mothers, were recruited by clinic and hospital personnel. Women who agreed were educated, received translation certification, and were oriented to the initiative. Pregnant Hispanic immigrant women seen in the health center who met criteria set by the multidisciplinary health care team were assigned a Hispanic Labor Friend by 32 weeks' gestation. Hispanic Labor Friends assisted women with communication with healthcare providers and provided social support. Qualitative evaluation of the program consisted of interviews with several groups: (1) Hispanic immigrant women who had a Hispanic Labor Friend, (2) Hispanic immigrant women who were not in the Hispanic Labor Friends program, (3) Hispanic Labor Friends, (4) healthcare providers for Hispanic women. Data saturation was reached, and data were analyzed by the research team using descriptive qualitative inquiry. The Hispanic immigrant women described positive outcomes from being involved in the Hispanic Labor Friends program, including feeling supported and comforted. "I felt as though my family were at my side." One woman who had standard care said, "It is hard for me to communicate. When I gave birth, the nurses asked me things, and I didn't understand anything. I stayed quiet." One of the nurses who was interviewed said: "I think they [the HLF patients] get better care. Sometimes we think we can communicate with them with their little bit of English and our little bit of Spanish. But you get an HLF and it's a totally different story. We can more adequately tell what's going on with them...They end up getting better care." One Hispanic Labor Friend said, "The women are very appreciative that I was there to help them through a critical time." Women who participated in the study identified the need to have a continuing association with Hispanic Labor Friends in

  7. Nurses perceptions of a user friendly interface

    OpenAIRE

    Alshafai, Fatimah

    2017-01-01

    Introduction: The successful implementation of clinical information systems depends to a large extent on its usability. Usability can be achieved by a strong focus on interface quality. With a focus on improving the quality of patient care, growing numbers of clinical information systems have been advertised as being "user-friendly". However, the term "user-friendly" may not be quite accurate and in some circumstances could be misleading. Within a clinical setting, an interface designed as ea...

  8. Terrain Commander: Unattended Ground-Based Surveillance System

    National Research Council Canada - National Science Library

    Steadman, Bob

    2000-01-01

    .... Terrain Commander OASIS provides next generation target detection, classification, and tracking through smart sensor fusion of beamforming acoustic, seismic, passive infrared, and magnetic sensors...

  9. Deductive Sensemaking Principles Using Personal Constructs of the Field Commanders

    National Research Council Canada - National Science Library

    Ntuen, Celestine A; Leedom, Dennis

    2007-01-01

    .... It is assumed that the expert commander constructs diverse and asynchronous sensemaking models when confronted with asymmetric situations-evolving and changing dynamics of the battlefield information...

  10. Contractor Support on the Battlefield -- Increased Reliance Requires Commander's Attention

    National Research Council Canada - National Science Library

    Maloney, Kathy J

    2006-01-01

    .... Department of Defense initiatives to adopt a leaner business strategy, increase efficiency, and reduce expenditures have exposed the battlefield commander to additional operational risk centered...

  11. U.S. Special Operations Command Training and Education Program

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    .... Special Operations Command (USCINCSOC), to train assigned forces to meet special operations mission taskings and to ensure interoperability with conventional forces and other special operations forces (SOF...

  12. When Contractors Deploy: A Guide for the Operational Commander

    National Research Council Canada - National Science Library

    Buhler, Carl

    2000-01-01

    .... Furthermore, this paper also lists four recommendations for operational commanders and the military on how to better integrate contractors into the military effort, especially during hostile combat situations...

  13. Apollo 16 astronauts in Apollo Command Module Mission Simulator

    Science.gov (United States)

    1972-01-01

    Astronaut Thomas K. Mattingly II, command module pilot of the Apollo 16 lunar landing mission, participates in extravehicular activity (EVA) training in bldg 5 at the Manned Spacecraft Center (MSC). In the right background is Astronaut Charles M. Duke Jr., lunar module pilot. They are inside the Apollo Command Module Mission Simulator (31046); Mattingly (right foreground) and Duke (right backgroung) in the Apollo Command Module Mission Simulator for EVA simulation and training. Astronaut John W. Young, commander, can be seen in the left background (31047).

  14. Commande adaptive d'une machine asynchrone

    Science.gov (United States)

    Slama-Belkhodja, I.; de Fornel, B.

    1996-06-01

    The paper deals with an indirect self-tuning speed control for an induction motor supplied by a chopper-filter-inverter system. Input/Output models are identified with the recursive least squares algorithm and the controller adaptation is based on a pole assignement strategy. Emphasis is put on the evaluation of the parameter identification in order to avoid instabilities because of disturbances or insufficient excitations. This is especially of importance when the adaptive control is carried out in closed loop systems and without additional test signals. Simulation results show the improvement of the dynamic responses and the robustness against load variations or parameters variations (rotor resistance, inertia). Cat article décrit une stratégie de commande adaptive indirecte à Placement de Pôles (PP), appliquée à la commande en vitesse d'une machine asynchrone alimentée par un ensemble hacheur-filtre-onduleur de tension. L'algorithme des Moindres Carrés Récursifs (MCR) est utilisé pour l'identification des modèles de comportement type entrées/sorties. Un intérêt particulier est porté à la mise en oeuvre de cet algorithme et à la discussion de ses résultats, tenant compte des erreurs de modélisation et de la nature peu riche en excitations des entrées du processus. Différents régimes transitoires ont été simulés pour apprécier l'apport de cette association (MCR-PP) : démarrages et inversion des sens de rotation, à vide et en charges, applications d'échelons de couple résistant, variations paramétriques. Les résultats permettent d'illustrer, tant au niveau des performances que de la robustesse, l'apport d'une telle commande adaptive pour des entraînements électriques avec une machine asynchrone.

  15. A spacecraft computer repairable via command.

    Science.gov (United States)

    Fimmel, R. O.; Baker, T. E.

    1971-01-01

    The MULTIPAC is a central data system developed for deep-space probes with the distinctive feature that it may be repaired during flight via command and telemetry links by reprogramming around the failed unit. The computer organization uses pools of identical modules which the program organizes into one or more computers called processors. The interaction of these modules is dynamically controlled by the program rather than hardware. In the event of a failure, new programs are entered which reorganize the central data system with a somewhat reduced total processing capability aboard the spacecraft. Emphasis is placed on the evolution of the system architecture and the final overall system design rather than the specific logic design.

  16. Post-Soviet nuclear command and security

    International Nuclear Information System (INIS)

    Garwin, R.L.

    1992-01-01

    Traditionally, any nuclear command system must reckon with conflicting requirements. The system must ensure that weapons will be launched reliably when ordered, a goal known as positive control. But negative control, ensuring that the weapons will not be used without an authentic order, is also essential. These goals are often in tension; steps to make it more difficult to launch without authorization can make it less certain that weapons will be launched when desired, and vice versa. The balance struck between the two naturally shifts, with increased emphasis on negative control in peacetime, and on positive control in a major crisis. Under present circumstances, with virtually no threat of deliberate nuclear attack, both the US and Russia should be putting their emphasis overwhelmingly on ensuring negative control

  17. Millennials in Adulthood: Detached from Institutions, Networked with Friends

    Science.gov (United States)

    Pew Research Center, 2014

    2014-01-01

    The Millennial generation is forging a distinctive path into adulthood. Now ranging in age from 18 to 331, they are relatively unattached to organized politics and religion, linked by social media, burdened by debt, distrustful of people, in no rush to marry--and optimistic about the future. They are also America's most racially diverse…

  18. Is There a Need For a Joint Reserve Components Command?

    Science.gov (United States)

    2013-03-01

    Bravo Zulu ”. If these words were heard by a Soldier, it might be interpreted as poor performance. By having one organization as a single source for...Commander, Joint Reserve Components Command. Creation of the JRCC would, in time, strengthen partnerships between the reserve components of each

  19. COMMAND-AND-CONTROL AND MANAGEMENT DECISION MAKING,

    Science.gov (United States)

    Reports that the development of command-and-con trol systems in support of decision making and action taking has been accomplished by military...methods applicable to management systems. Concludes that the command-and-control type system for top management decision making is a man-machine system having as its core an on going, dynamic operation. (Author)

  20. The use of augmented reality in command and control situation ...

    African Journals Online (AJOL)

    This study identifies possible uses of augmented reality in command and control applications with specific attention to situation awareness in the South African context. Applications across the different command and control functions, as well as at the different levels of military operations are considered. The article concludes ...

  1. 32 CFR 809a.10 - Military commanders' responsibilities.

    Science.gov (United States)

    2010-07-01

    ... authorities as soon as possible. (c) Military forces will ordinarily exercise police powers previously... 32 National Defense 6 2010-07-01 2010-07-01 false Military commanders' responsibilities. 809a.10... Disturbance Intervention and Disaster Assistance § 809a.10 Military commanders' responsibilities. (a...

  2. Fit for Command: Military Leadership Attributes for Small Wars

    Science.gov (United States)

    2013-04-18

    Corps Command and StaffCollege Marine Corps University 2076 outh Street Marine Corps Combat Development Command Quantico, Virgin ia?? 134-5068...by the local imam to join him in the celebration of a religious Shi’a holiday .79 Just before departure to the mosque his translator informed him

  3. Development and Validation of Nigerian Army Commanding Officers ...

    African Journals Online (AJOL)

    The research adopted an ex-post-facto design based on a qualitative and quantitative analysis of data. Focus Group Discussions (FGDs) and In-Depth Interviews (IDIs) were conducted with commanding officers. The FGDs were conducted with officers purposively drawn from incumbent commanding officers in the Nigerian ...

  4. Doublet III neutral beam multi-stream command language system

    International Nuclear Information System (INIS)

    Campbell, L.; Garcia, J.R.

    1983-01-01

    A multi-stream command language system was developed to provide control of the dual source neutral beam injectors on the Doublet III experiment at GA Technologies Inc. The Neutral Beam command language system consists of three parts: compiler, sequencer, and interactive task. The command language, which was derived from the Doublet III tokamak command language, POPS, is compiled, using a recursive descent compiler, into reverse polish notation instructions which then can be executed by the sequencer task. The interactive task accepts operator commands via a keyboard. The interactive task directs the operation of three input streams, creating commands which are then executed by the sequencer. The streams correspond to the two sources within a Doublet III neutral beam, plus an interactive stream. The sequencer multiplexes the execution of instructions from these three streams. The instructions include reads and writes to an operator terminal, arithmetic computations, intrinsic functions such as CAMAC input and output, and logical instructions. The neutral beam command language system was implemented using Modular Computer Systems (ModComp) Pascal and consists of two tasks running on a ModComp Classic IV computer. The two tasks, the interactive and the sequencer, run independently and communicate using shared memory regions. The compiler runs as an overlay to the interactive task when so directed by operator commands. The system is succesfully being used to operate the three neutral beams on Doublet III

  5. 14 CFR 417.303 - Command control system requirements.

    Science.gov (United States)

    2010-01-01

    ... system must transmit a command signal that has the radio frequency characteristics and power needed for.... (c) Reliability prediction. A command control system must have a predicted reliability of 0.999 at... for each launch. Any demonstration of the system's predicted reliability must satisfy § 417.309(b). (d...

  6. Warfighter Associate: Decision Aiding and Metrics for Mission Command

    Science.gov (United States)

    2012-01-23

    Distributions: highlights the Pareto Principle -- the top 20% of the mission-command staff is heavily involved in collaborations. • Our...developing “Command Web”, a web service to support thin- client functionality (Intelligent Presentation Services enables this) Thank you

  7. Turn-based gaming for convoy commander training

    NARCIS (Netherlands)

    Boonekamp, R.C.; Muller, T.J.; Vrijer, J.C. de

    2015-01-01

    With the increasing complexity of current-day military operations, effective education and training of military commanders is of vital importance. Commanders need to perform within a broader range of conflicts; unpredictable threats and civil-military interaction place a great demand on their

  8. Environmentally-friendly practices in hotels

    Directory of Open Access Journals (Sweden)

    Miriam Mbasera

    2016-06-01

    Research purpose: To determine the environmentally-friendly practices in hotels in Zimbabwe and South Africa and establish the contribution that hotels are making towards mitigation of the negative environmental effects. Motivation for the study: Currently, the world is facing environmental issues, which include global climate change, ozone depletion, pollution, high consumption of resources and increasing amounts of solid waste. Hotels, as part of the tourism industry, exert a significant impact on the environment. While the extent and range of the impact that hotels exert on the environment suggest an urgent need to address this problem, the question that arises is whether hoteliers appreciate the need for environmentally-friendly initiatives in their establishments. Research design, approach and method: A qualitative research was carried out in eight hotels that employ the strategy of the case study in the aforementioned countries. Main findings: Currently, no policies for green management exist, although some hotels do engage in some environmentally-friendly practices. Some hotel managers do not implement green management initiatives to mitigate the environmental problems emanating from their hotel operations. Practical and/or managerial implications: This indicates that a gap exists between managers’ awareness of appropriate environmentally-friendly practices for hotels, implying a need for training and increased awareness of green management. Contribution and/or value-add: The results could guide managers in the implementation of environmentally-friendly practices in an effort to mitigate environmental problems facing the present generation.

  9. Friends Like Me: Associations in Overweight/Obese Status among Adolescent Friends by Race/Ethnicity, Sex, and Friendship Type.

    Science.gov (United States)

    Bruening, Meg; MacLehose, Richard; Eisenberg, Marla E; Kim, Sunkyung; Story, Mary; Neumark-Sztainer, Dianne

    2015-12-01

    Little is known about how interpersonal friend relationships are associated with obesity in young people, particularly with regard to how race/ethnicity, type of friendship, and sex affect the association between friends' and adolescents' weight status. This study examined associations in weight status among adolescents and their friends, exploring magnitudes of associations across friendship type, sex, and race/ethnicity. As part of EAT-2010 (Eating and Activity in Teens), friend nominations and anthropometrics were obtained from adolescents (n = 2099: 54% female; 80% nonwhite; mean age: 14.2 ± 1.9 years). Generalized estimating equation logistic regression models were used to test associations between adolescents' overweight/obese status and friends' (i.e., friend group, female friends, male friends, female best friends, and male best friends) overweight/obese status. Interactions by adolescent race/ethnicity were examined. The majority of significant associations were observed among white female adolescents' who had a 22-40% higher prevalence of overweight/obesity if their friends were overweight compared to white females whose friends were not overweight. In contrast, there were few significant differences for other adolescent female and male racial/ethnic groups for girls and boys. Results for friend groups and best friends were generally similar to one another. The association between friend and adolescent overweight/obese status depended on adolescents' sex, race/ethnicity, and friendship type. Given the similarities among friends, obesity interventions targeting youth, especially white females, should consider involving friends.

  10. Irrigation and crop management in Gandak Canal command of India

    International Nuclear Information System (INIS)

    Singh, S.S.; Khan, A.R.

    2002-05-01

    The Gandak Project is one of the biggest irrigation projects in India, covering a culturable command area (CCA) of 4.44 lakh ha in U.P., 9.6 lakh ha CCA in Bihar and 0.44 lakh ha in Nepal (Singh and Khan, 2002). The total culturable command areas are 14.44 lakh hectares. The command area is located in between latitude 25 deg 40' to 27 deg 25' and longitude between 83 deg 15' to 85 deg 15'. It is a diversion project through construction of a barrage on the river Gandak. This project area covers up to five districts in the Command of Tirhut Main Canal (TMC) and 3 districts in the Saran Main Canal (SMC) command. The length of main canal is usually long (990 and 650 R.D.'s in eastern and western side, respectively) and the channels are unlined and seepage loss is quite high. (author)

  11. "Friends" of Anglican Cathedrals: Norms and Values. Befriending, Friending or Misnomer?

    Science.gov (United States)

    Muskett, Judith A.

    2013-01-01

    Loyal supporters of Anglican cathedrals first subscribed to "Friends" associations in the late 1920s. Yet, in 1937, a journalist in "The Times" portrayed cathedrals as a "queer thing to be a friend of." Drawing on theories of friendship from a range of disciplines, and surveys of what has been proclaimed in the public…

  12. Gender Norms and Institutional Culture: The Family-Friendly versus the Father-Friendly University

    Science.gov (United States)

    Sallee, Margaret W.

    2013-01-01

    This article investigates the role that gender norms and expectations about parenting play in establishing the family-friendly versus the father-friendly university. Using interviews with 51 male faculty at three research universities, the article considers how faculty and administrators' actions perpetuate cultures that promote or hinder…

  13. Young friendship in HFASD and typical development: friend versus non-friend comparisons.

    Science.gov (United States)

    Bauminger-Zviely, Nirit; Agam-Ben-Artzi, Galit

    2014-07-01

    This study conducted comparative assessment of friendship in preschoolers with high-functioning autism spectrum disorder (HFASD, n = 29) versus preschoolers with typical development (n = 30), focusing on interactions with friends versus acquaintances. Groups were matched on SES, verbal/nonverbal MA, IQ, and CA. Multidimensional assessments included: mothers' and teachers' reports about friends' and friendship characteristics and observed individual and dyadic behaviors throughout interactions with friends versus non-friends during construction, drawing, and free-play situations. Findings revealed group differences in peer interaction favoring the typical development group, thus supporting the neuropsychological profile of HFASD. However, both groups' interactions with friends surpassed interactions with acquaintances on several key socio-communicative and intersubjective capabilities, thus suggesting that friendship may contribute to enhancement and practice of social interaction in HFASD.

  14. Spillover of environment-friendly consumer behaviour

    DEFF Research Database (Denmark)

    Thøgersen, John; Ølander, Carl Folke

    2003-01-01

    This paper contributes empirical input to current reasoning about consumers' propensity to behave in an environmentally friendly way in different domains. Spe-cifically, we investigate whether environmentally friendly behaviours spread to more and more areas of the consumption pattern in a virtuous...... circle and whether it is a necessary prerequisite for a virtuous circle to emerge and to continue to work that the individual possesses certain general values or ethical norms. The data material is a three-wave panel study with a large random sample of Danish consumers. The data were analysed by means...... of structural equation modelling and other techniques. Cases of transfer of environment-friendly conduct between behavioural categories are found, but only in a few of the possible instances and only of a modest size. The panel analysis also identifies a few negative cross-lagged effects. Such effects may...

  15. The Importance of Friends in Autobiographical Memory

    DEFF Research Database (Denmark)

    Antalikova, Radka; Hansen, Tia G. B.; Gulbrandsen, Knut Arild

    often rehearsed, family memories that were old and rarely rehearsed, and school memories that were in between on both variables. This supports theories of friendship as the primary social context for adolescent development. Moreover, content analysis found friend memories to mention others more often......Relatedness is a complex issue and it has been argued that developmental perspectives should complement cross-cultural comparisons. We noticed that cross-cultural studies of autobiographical memories tend to focus on early childhood and thus family, leaving the role of friends and school less...... explored. Thus, we asked adolescent school-goers who still lived with their parents for a meaningful memory from each of the settings family, school, and friendship. In both samples analyzed so far (Norwegians, N=22, and Slovaks, N=40) participants chose friend memories that were recent and reportedly...

  16. [Fostering LGBT-friendly healthcare services].

    Science.gov (United States)

    Wei, Han-Ting; Chen, Mu-Hong; Ku, Wen-Wei

    2015-02-01

    LGBT (lesbian, gay, bisexual, transgender) patients suffer from stigma and discrimination when seeking healthcare. A large LGBT healthcare survey revealed that 56% of gay patients and 70% of transgender patients suffered some type of discrimination while seeking healthcare in 2014. The fostering of LGBT-friendly healthcare services is not just an advanced step of gender mainstreaming but also a fulfillment of health equality and equity. Additionally, LGBT-friendly healthcare services are expected to provide new opportunities for healthcare workers. Therefore, proactive government policies, education, research, and clinical practice should all encourage the development of these healthcare services. We look forward to a well-developed LGBT-friendly healthcare system in Taiwan.

  17. On the Impacts and Benefits of Implementing Full-Duplex Communications Links in an Underwater Acoustic Network

    National Research Council Canada - National Science Library

    Gibson, J; Larraza, A; Rice, J; Smith, K; Xie, G

    2002-01-01

    .... These networks may provide command and control for autonomous underwater vehicles, forward reporting by arrays of sensor grids, ad hoc communications links to covert forces, or positive control...

  18. GLINT: a user-friendly toolset for the analysis of high-throughput DNA-methylation array data.

    Science.gov (United States)

    Rahmani, Elior; Yedidim, Reut; Shenhav, Liat; Schweiger, Regev; Weissbrod, Omer; Zaitlen, Noah; Halperin, Eran

    2017-06-15

    GLINT is a user-friendly command-line toolset for fast analysis of genome-wide DNA methylation data generated using the Illumina human methylation arrays. GLINT, which does not require any programming proficiency, allows an easy execution of Epigenome-Wide Association Study analysis pipeline under different models while accounting for known confounders in methylation data. GLINT is a command-line software, freely available at https://github.com/cozygene/glint/releases . It requires Python 2.7 and several freely available Python packages. Further information and documentation as well as a quick start tutorial are available at http://glint-epigenetics.readthedocs.io . elior.rahmani@gmail.com or ehalperin@cs.ucla.edu. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  19. Conceptualizing of Social Networking Sites

    OpenAIRE

    J. S. Sodhi; Shilpi Sharma

    2012-01-01

    People often move to their friends, families and colleagues when they feel urge and having doubts or queries to solve. Participation in social networking site has dramatically increased in recent years. Many social networking sites boost with million of members using their network on regular basis to communicate, share , create and collaborate with others. In this paper we explore the phenomenon of using social networking site to trace a link of the search from the community of users for bett...

  20. Gender, Friendship Networks, and Delinquency: A Dynamic Network Approach.

    Science.gov (United States)

    Haynie, Dana L; Doogan, Nathan J; Soller, Brian

    2014-11-01

    Researchers have examined selection and influence processes in shaping delinquency similarity among friends, but little is known about the role of gender in moderating these relationships. Our objective is to examine differences between adolescent boys and girls regarding delinquency-based selection and influence processes. Using longitudinal network data from adolescents attending two large schools in AddHealth ( N = 1,857) and stochastic actor-oriented models, we evaluate whether girls are influenced to a greater degree by friends' violence or delinquency than boys (influence hypothesis) and whether girls are more likely to select friends based on violent or delinquent behavior than boys (selection hypothesis). The results indicate that girls are more likely than boys to be influenced by their friends' involvement in violence. Although a similar pattern emerges for nonviolent delinquency, the gender differences are not significant. Some evidence shows that boys are influenced toward increasing their violence or delinquency when exposed to more delinquent or violent friends but are immune to reducing their violence or delinquency when associating with less violent or delinquent friends. In terms of selection dynamics, although both boys and girls have a tendency to select friends based on friends' behavior, girls have a stronger tendency to do so, suggesting that among girls, friends' involvement in violence or delinquency is an especially decisive factor for determining friendship ties.

  1. Gender, Friendship Networks, and Delinquency: A Dynamic Network Approach**

    Science.gov (United States)

    Haynie, Dana L.; Doogan, Nathan J.; Soller, Brian

    2014-01-01

    Researchers have examined selection and influence processes in shaping delinquency similarity among friends, but little is known about the role of gender in moderating these relationships. Our objective is to examine differences between adolescent boys and girls regarding delinquency-based selection and influence processes. Using longitudinal network data from adolescents attending two large schools in AddHealth (N = 1,857) and stochastic actor-oriented models, we evaluate whether girls are influenced to a greater degree by friends' violence or delinquency than boys (influence hypothesis) and whether girls are more likely to select friends based on violent or delinquent behavior than boys (selection hypothesis). The results indicate that girls are more likely than boys to be influenced by their friends' involvement in violence. Although a similar pattern emerges for nonviolent delinquency, the gender differences are not significant. Some evidence shows that boys are influenced toward increasing their violence or delinquency when exposed to more delinquent or violent friends but are immune to reducing their violence or delinquency when associating with less violent or delinquent friends. In terms of selection dynamics, although both boys and girls have a tendency to select friends based on friends' behavior, girls have a stronger tendency to do so, suggesting that among girls, friends' involvement in violence or delinquency is an especially decisive factor for determining friendship ties. PMID:26097241

  2. Function Activation on Intelligent Buildings Using Mobile Devices through Voice Commands

    Directory of Open Access Journals (Sweden)

    Moumtadi Fatima

    2014-04-01

    Full Text Available Development of information and communication technologies has allowed the incorporation into different areas of human activity of apps that control electrical and electronic devices through voice commands. With these apps, in telemedicine people affected by some temporary decrease in their physical capacities have improved their level of autonomy; utilities have been added to educational environments to facilitate the use of IT applications to users with physical disability; finally, home automated solutions have made possible to any person with permanent limited mobility to take control over home devices using voice commands. In this article a home automated solution, developed over a client-server principle is presented. As the client device a MIDP 2.0 cell phone with a Java MicroEdition application loaded was used; as server a web server PC was used serving also as gateway towards a Konnex network, added with a speech recognizer engine. Fully functional prototype developed allowed take control over 3 devices with 87% success of the speech recognizer reliability, this percentage improved after the use of a drop-down menu of commands displayed over the monitor.

  3. Building Child Friendly Cities in the MENA region

    Science.gov (United States)

    Nour, Osman El Hassan M.

    2013-09-01

    The notion of Child Friendly Cities (CFCs) was first developed during the Second United Nations Conference on Human Settlements (HABITAT II), held in Istanbul in 1996. The concept is based on four general principles of the United Nations Convention on the rights of the child: (1) fair treatment of every child, regardless of ethnicity, gender, religion, socioeconomic background etc.; (2) top priority of the best interests of the child; (3) the child's right to a better life and development; and (4) respect of children's views. In a CFC, children are encouraged to take part in the decision making processes that affect their lives. Instead of starting yet another programme for children, the development of a CFC mobilises and connects existing agencies and actors. Giving examples of some cities in the Middle East and North Africa (MENA) region, this paper demonstrates that building CFCs has induced the development of mechanisms and structures which have enabled cities to address children's issues in a systematic manner. These mechanisms and structures include: a municipal child-friendly legal framework, local development councils and NGO networks and local municipal development offices. The author argues that in building CFCs, the role of municipal authorities is indispensable in responding to the needs of children and young people within the municipalities' mandates.

  4. [The detector, the command neuron and plastic convergence].

    Science.gov (United States)

    Sokolov, E N

    1977-01-01

    The paper deals with the structure of detectors, the function of commanding neurones and the problem of relationship between detectors and commanding neurons. An example of hierarchial organization of detectors is provided by the colour analyser in which a layer of receptors, a layer of opponent neurones and a layer of colour-selective detectors are singled out. The colour detector is selectively sensitive to a certain combination of excitations at the input. If the detector is selectively activated by a certain combination of excitations at the input, the selective activation of the commanding neurone through a pool of motoneurones brings about a reaction at the output, specific in its organization. The reflexogenic zone of the reaction is determined by the detectors which converge on the commanding neurone controlling the given reaction. The plasticity of the reaction results from a plastic convergence of the detectors on the commanding neurone which controls the reaction. This comprises selective switching off the detectors from the commanding neurone (habituation) and connecting the detectors to the commanding neurone (facilitation).

  5. Doublet III neutral beam multi-stream command language system

    International Nuclear Information System (INIS)

    Campbell, L.; Garcia, J.R.

    1983-12-01

    A multi-stream command language system was developed to provide control of the dual source neutral beam injectors on the Doublet III experiment at GA Technologies Inc. The Neutral Beam command language system consists of three parts: compiler, sequencer, and interactive task. The command language, which was derived from the Doublet III tokamak command language, POPS, is compiled, using a recursive descent compiler, into reverse polish notation instructions which then can be executed by the sequencer task. The interactive task accepts operator commands via a keyboard. The interactive task directs the operation of three input streams, creating commands which are then executed by the sequencer. The streams correspond to the two sources within a Doublet III neutral beam, plus an interactive stream. The sequencer multiplexes the execution of instructions from these three streams. The instructions include reads and writes to an operator terminal, arithmetic computations, intrinsic functions such as CAMAC input and output, and logical instructions. The neutral beam command language system was implemented using Modular Computer Systems (ModComp) Pascal and consists of two tasks running on a ModComp Classic IV computer

  6. Centralized Command and Control of Theater Missile Defense: The Joint Force Missile Defense Component Coordinator

    National Research Council Canada - National Science Library

    Bucey, William H

    2006-01-01

    .... The numerous commands, decentralized command and control, and limited and expensive resources involved in TMD require changes to the joint doctrine in order to provide unity of command and economy of force...

  7. Fermilab Friends for Science Education | Board Tools

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Board Tools Testimonials Our Donors Board of Directors Board Tools Calendar Join Us Donate Now Get FermiGear! Education FFSE Scholarship Tools Google Drive Join Us/Renew Membership Forms: Online - Print Support Us Donation

  8. Fermilab Friends for Science Education | About Us

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us About Us national leader in precollege science education. From the first Summer Institute for Science Teachers held year over 37,000 students, and 2,500 teachers participated in programs through the Education Office

  9. Fermilab Friends for Science Education | Support Us

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Support Us improving science (science, technology, engineering and mathematics) education. Your donation allows us to Testimonials Our Donors Board of Directors Board Tools Calendar Join Us Donate Now Get FermiGear! Education

  10. Fermilab Friends for Science Education | Calendar

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Calendar Directors Board Tools Calendar Join Us Donate Now Get FermiGear! Education Office Search Programs Calendar Join Us/Renew Membership Forms: Online - Print Support Us Donation Forms: Online - Print Tree of

  11. Fermilab Friends for Science Education | Join Us

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Join Us improving science (science, technology, engineering and mathematics) education. Your donation allows us to membership dues allow us to create new, innovative science education programs, making the best use of unique

  12. Fermilab Friends for Science Education | Mission

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Mission Directors Board Tools Calendar Join Us Donate Now Get FermiGear! Education Office Search Programs Calendar Join Us/Renew Membership Forms: Online - Print Support Us Donation Forms: Online - Print Tree of

  13. Political discussions with family and friends

    DEFF Research Database (Denmark)

    Levinsen, Klaus; Yndigegn, Carsten

    2015-01-01

    Young people's engagement in political discussions with parents and friends represents a significant component of the political socialization process and can be seen as an activity where they learn some very basic democratic skills. Based on data from qualitative interviews and a questionnaire su...

  14. Higgs friends and counterfeits at hadron colliders

    International Nuclear Information System (INIS)

    Fox, Patrick J.; Tucker-Smith, David; Weiner, Neal

    2011-01-01

    We consider the possibility of 'Higgs counterfeits' - scalars that can be produced with cross sections comparable to the SM Higgs, and which decay with identical relative observable branching ratios, but which are nonetheless not responsible for electroweak symmetry breaking. We also consider a related scenario involving 'Higgs friends,' fields similarly produced through gg fusion processes, which would be discovered through diboson channels WW,ZZ,γγ, or even γZ, potentially with larger cross sections times branching ratios than for the Higgs. The discovery of either a Higgs friend or a Higgs counterfeit, rather than directly pointing towards the origin of the weak scale, would indicate the presence of new colored fields necessary for the sizable production cross section (and possibly new colorless but electroweakly charged states as well, in the case of the diboson decays of a Higgs friend). These particles could easily be confused for an ordinary Higgs, perhaps with an additional generation to explain the different cross section, and we emphasize the importance of vector boson fusion as a channel to distinguish a Higgs counterfeit from a true Higgs. Such fields would naturally be expected in scenarios with 'effective Z's,' where heavy states charged under the SM produce effective charges for SM fields under a new gauge force. We discuss the prospects for discovery of Higgs counterfeits, Higgs friends, and associated charged fields at the LHC.

  15. Environment friendly chemoselective deprotection of acetonides and ...

    Indian Academy of Sciences (India)

    lective deprotection of functional groups is still a chal- lenge in synthetic organic chemistry especially in aque- ous medium. We report here an environment friendly efficient method for chemoselective deprotection of. ∗. For correspondence acetonides by simply heating in pure water at 90. ◦. C without using any catalyst and ...

  16. Electrochemical Behaviour of Environmentally Friendly Inhibitor of ...

    African Journals Online (AJOL)

    Electrochemical Behaviour of Environmentally Friendly Inhibitor of Aloe Secundiflora Extract in Corrosion Control of Carbon Steel in Soft Water Media. ... The investigation was performed at different inhibitor concentrations under static and dynamic conditions using a Rotating Disk Electrode (RDE). The impedance and ...

  17. Eco-Friendly Alternative Refrigeration Systems

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 10. Eco-Friendly Alternative Refrigeration Systems - Magnetic and ... Author Affiliations. S S Verma1. Deptartment of Physics, Sant Longowal Institute of Engineering and Technology Longowal, District Sangrur, Punjab 148 106, India.

  18. Dyslexia Friendly Schools in the UK

    Science.gov (United States)

    Riddick, Barbara

    2006-01-01

    This article starts by examining the background to dyslexia support within the context of the National Literacy Strategy in the United Kingdom. It then critically discusses some of the perceived shortcomings of current support for children with dyslexia, and how this has led to the development of a "dyslexia friendly" schools movement in…

  19. Best friends' discussions of social dilemmas.

    Science.gov (United States)

    McDonald, Kristina L; Malti, Tina; Killen, Melanie; Rubin, Kenneth H

    2014-02-01

    Peer relationships, particularly friendships, have been theorized to contribute to how children and adolescents think about social and moral issues. The current study examined how young adolescent best friends (191 dyads; 53.4% female) reason together about multifaceted social dilemmas and how their reasoning is related to friendship quality. Mutually-recognized friendship dyads were videotaped discussing dilemmas entailing moral, social-conventional and prudential/pragmatic issues. Both dyad members completed a self-report measure of friendship quality. Dyadic data analyses guided by the Actor-Partner Interdependence Model indicated that adolescent and friend reports of friendship qualities were related to the forms of reasoning used during discussion. Friends who both reported that they could resolve conflicts in a constructive way were more likely to use moral reasoning than friends who reported that their conflict resolution was poor or disagreed on the quality of their conflict resolution. The findings provide evidence for the important role that friendship interaction may play in adolescents' social and moral development.

  20. A Location Privacy Aware Friend Locator

    DEFF Research Database (Denmark)

    Siksnys, Laurynas; Thomsen, Jeppe Rishede; Saltenis, Simonas

    2009-01-01

    to trade their location privacy for quality of service, limiting the attractiveness of the services. The challenge is to develop a communication-efficient solution such that (i) it detects proximity between a user and the user’s friends, (ii) any other party is not allowed to infer the location of the user...

  1. My Friend Is Talking about Suicide

    Science.gov (United States)

    ... Search English Español My Friend Is Talking About Suicide. What Should I Do? KidsHealth / For Teens / My ... sobre suicidio. ¿Qué debo hacer? Warning Signs of Suicide Everyone feels sad, depressed, or angry sometimes — especially ...

  2. Commander manipulator scoops prestigious mulit-million pound BNFL contract

    International Nuclear Information System (INIS)

    Bailey, Andrew.

    1997-01-01

    Twenty-one Commander robotic arms are on order from INBIS (formerly Ricardo Hitec) and BNFL Engineering Limited (''BEL'', the engineering arm of parent company BNFL). The multi-million pound contract was won amid fierce competition from other well-known names in robotic engineering. The specially designed Commander manipulators will be engaged in remotely handling Intermediate Level Waste (ILW) in a suite of four BNFL ILW plants, which are currently either under construction or planned at Sellafield. The first Commander will delivered to BNFL's Sellafield Silo Emptying Project in January 1998. (Author)

  3. Remodeling Air Force Cyber Command and Control

    Science.gov (United States)

    2017-10-10

    Internet, telecommunications networks, computer systems , and embedded processors and controllers .” That last phrase includes processors and controllers ...embedded” into weapons systems , including aircraft and spacecraft. Many weapon systems were built and connected before cyberspace became a...problems for systemic improvement of mission assurance. The benefit of a centralized environment could also extend to improving enterprise-level patch

  4. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  5. Spaceport Command and Control System Software Development

    Science.gov (United States)

    Mahlin, Jonathan Nicholas

    2017-01-01

    There is an immense challenge in organizing personnel across a large agency such as NASA, or even over a subset of that, like a center's Engineering directorate. Workforce inefficiencies and challenges are bound to grow over time without oversight and management. It is also not always possible to hire new employees to fill workforce gaps, therefore available resources must be utilized more efficiently. The goal of this internship was to develop software that improves organizational efficiency by aiding managers, making employee information viewable and editable in an intuitive manner. This semester I created an application for managers that aids in optimizing allocation of employee resources for a single division with the possibility of scaling upwards. My duties this semester consisted of developing frontend and backend software to complete this task. The application provides user-friendly information displays and documentation of the workforce to allow NASA to track diligently track the status and skills of its workforce. This tool should be able to prove that current employees are being effectively utilized and if new hires are necessary to fulfill skill gaps.

  6. Full Spectrum Operations: An Analysis of Course Content at the Command and General Staff College

    National Research Council Canada - National Science Library

    Turner, II, Frank L

    2008-01-01

    .... This monograph examined the Intermediate Level Education, the Advanced Military Studies Program, and the Tactical Commanders Development Program curricula at the Command and General Staff College...

  7. Diffusion of Intervention Effects: The Impact of a Family-Based Substance Use Prevention Program on Friends of Participants.

    Science.gov (United States)

    Rulison, Kelly L; Feinberg, Mark; Gest, Scott D; Osgood, D Wayne

    2015-10-01

    We tested whether effects of the Strengthening Families Program for Youth 10-14 (SFP10-14) diffused from intervention participants to their friends. We also tested which program effects on participants accounted for diffusion. Data are from 5,449 students (51% female; mean initial age = 12.3 years) in the PROmoting School-community-university Partnerships to Enhance Resilience community intervention trial (2001-2006) who did not participate in SFP10-14 (i.e., nonparticipants). At each of five waves, students identified up to seven friends and self-reported past month drunkenness and cigarette use, substance use attitudes, parenting practices, and unsupervised time spent with friends. We computed two measures of indirect exposure to SFP10-14: total number of SFP-attending friends at each wave and cumulative proportion of SFP-attending friends averaged across the current and all previous post-intervention waves. Three years post-intervention, the odds of getting drunk (odds ratio = 1.4) and using cigarettes (odds ratio = 2.7) were higher among nonparticipants with zero SFP-attending friends compared with nonparticipants with three or more SFP-attending friends. Multilevel analyses also provided evidence of diffusion: nonparticipants with a higher cumulative proportion of SFP-attending friends at a given wave were less likely than their peers to use drugs at that wave. Effects from SFP10-14 primarily diffused through friendship networks by reducing the amount of unstructured socializing (unsupervised time that nonparticipants spent with friends), changing friends' substance use attitudes, and then changing nonparticipants' own substance use attitudes. Program developers should consider and test how interventions may facilitate diffusion to extend program reach and promote program sustainability. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  8. Command and Control of Space Assets Through Internet-Based Technologies Demonstrated

    Science.gov (United States)

    Foltz, David A.

    2002-01-01

    The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space

  9. Comparing the happiness effects of real and on-line friends.

    Directory of Open Access Journals (Sweden)

    John F Helliwell

    Full Text Available A recent large Canadian survey permits us to compare face-to-face ('real-life' and on-line social networks as sources of subjective well-being. The sample of 5,000 is drawn randomly from an on-line pool of respondents, a group well placed to have and value on-line friendships. We find three key results. First, the number of real-life friends is positively correlated with subjective well-being (SWB even after controlling for income, demographic variables and personality differences. Doubling the number of friends in real life has an equivalent effect on well-being as a 50% increase in income. Second, the size of online networks is largely uncorrelated with subjective well-being. Third, we find that real-life friends are much more important for people who are single, divorced, separated or widowed than they are for people who are married or living with a partner. Findings from large international surveys (the European Social Surveys 2002-2008 are used to confirm the importance of real-life social networks to SWB; they also indicate a significantly smaller value of social networks to married or partnered couples.

  10. IT Security Support for Spaceport Command and Control System

    Science.gov (United States)

    McLain, Jeffrey

    2013-01-01

    During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.

  11. How Friendship Network Characteristics Influence Subjective Well-Being

    NARCIS (Netherlands)

    van der Horst, Mariska; Coffé, Hilde

    2012-01-01

    This article explores how friendship network characteristics influence subjective well-being (SWB). Using data from the 2003 General Social Survey of Canada, three components of the friendship network are differentiated: number of friends, frequency of contact, and heterogeneity of friends. We argue

  12. Supporting a friend, housemate or partner with mental health difficulties: The student experience.

    Science.gov (United States)

    Byrom, Nicola C

    2017-07-14

    When experiencing mental health difficulties, university students turn to their friends for support. This study assessed the consequences of caregiving among a university sample, identifying predictors of caregiving burden among students. A total of 79 students with experience of supporting a friend with mental health difficulties were recruited through a UK student mental health charity to complete an online survey. Alongside qualitative data, the online survey used the Experience of Caregiving Inventory and the Involvement Evaluation Questionnaire as measures of the consequences of caregiving. Students supporting friends, housemates or partners were found to experience significant consequences of caregiving. Frequency of face-to-face contact and duration of illness predicted more negative consequences of caregiving, but these relationships were not straightforward. The presence and intensity of professional support did not influence the experience of caregiving. The study suggests that the impact of supporting friends with mental health difficulties is not insubstantial for students. Broadening the network of informal social support may help improve the experience for students supporting a friend, but currently, contact with professional services appears to have a limited effect. © 2017 John Wiley & Sons Australia, Ltd.

  13. Finding friends online: online activities by deaf students and their well-being.

    Directory of Open Access Journals (Sweden)

    Helen Blom

    Full Text Available Generally, deaf and hard of hearing (D/HH children have fewer friends than hearing peers and their friendships are of a lower quality. The research hypothesis was that using the computer to communicate with new online friends through social network sites or playing games with offline friends is associated with D/HH friendship qualities, because it removes certain communication barriers D/HH face in offline communication settings. With online questionnaires the relation between computer use and online, mixed (offline friend who you also speak in online settings, and offline friendship quality of D/HH and hearing students (18-25 years was compared in both the Netherlands (n = 100 and the United States (n = 122. In addition, the study examined whether the different friendship qualities were related to the participants' well-being. Results showed that, in general, D/HH students' friendship qualities and levels of well-being were similar to their hearing peers. The quality of the mixed friendships was positively related to well-being. Furthermore, the frequency of pc use with both online and offline friends was positively related to friendships qualities in both hearing and D/HH students. A combination of the online and offline friendship seems to be the most important friendship type for both hearing and D/HH students and it is worthwhile to encourage this friendship type.

  14. Finding friends online: online activities by deaf students and their well-being.

    Science.gov (United States)

    Blom, Helen; Marschark, Marc; Vervloed, Mathijs P J; Knoors, Harry

    2014-01-01

    Generally, deaf and hard of hearing (D/HH) children have fewer friends than hearing peers and their friendships are of a lower quality. The research hypothesis was that using the computer to communicate with new online friends through social network sites or playing games with offline friends is associated with D/HH friendship qualities, because it removes certain communication barriers D/HH face in offline communication settings. With online questionnaires the relation between computer use and online, mixed (offline friend who you also speak in online settings), and offline friendship quality of D/HH and hearing students (18-25 years) was compared in both the Netherlands (n = 100) and the United States (n = 122). In addition, the study examined whether the different friendship qualities were related to the participants' well-being. Results showed that, in general, D/HH students' friendship qualities and levels of well-being were similar to their hearing peers. The quality of the mixed friendships was positively related to well-being. Furthermore, the frequency of pc use with both online and offline friends was positively related to friendships qualities in both hearing and D/HH students. A combination of the online and offline friendship seems to be the most important friendship type for both hearing and D/HH students and it is worthwhile to encourage this friendship type.

  15. Risk aversion and social networks

    NARCIS (Netherlands)

    Kovářík, J.; van der Leij, M.J.

    2014-01-01

    This paper first investigates empirically the relationship between risk aversion and social network structure in a large group of undergraduate students. We find that risk aversion is strongly correlated to local network clustering, that is, the probability that one has a social tie to friends of

  16. [Social networks in drinking behaviors among Japanese: support network, drinking network, and intervening network].

    Science.gov (United States)

    Yoshihara, Chika; Shimizu, Shinji

    2005-10-01

    The national representative sample was analyzed to examine the relationship between respondents' drinking practice and the social network which was constructed of three different types of network: support network, drinking network, and intervening network. Non-parametric statistical analysis was conducted with chi square method and ANOVA analysis, due to the risk of small samples in some basic tabulation cells. The main results are as follows: (1) In the support network of workplace associates, moderate drinkers enjoyed much more sociable support care than both nondrinkers and hard drinkers, which might suggest a similar effect as the French paradox. Meanwhile in the familial and kinship network, the more intervening care support was provided, the harder respondents' drinking practice. (2) The drinking network among Japanese people for both sexes is likely to be convergent upon certain types of network categories and not decentralized in various categories. This might reflect of the drinking culture of Japan, which permits people to drink everyday as a practice, especially male drinkers. Subsequently, solitary drinking is not optional for female drinkers. (3) Intervening network analysis showed that the harder the respondents' drinking practices, the more frequently their drinking behaviors were checked in almost all the categories of network. A rather complicated gender double-standard was found in the network of hard drinkers with their friends, particularly for female drinkers. Medical professionals played a similar intervening role for men as family and kinship networks but to a less degree than friends for females. The social network is considerably associated with respondents' drinking, providing both sociability for moderate drinkers and intervention for hard drinkers, depending on network categories. To minimize the risk of hard drinking and advance self-healthy drinking there should be more research development on drinking practice and the social network.

  17. Architecting Joint Command and Control System of System Capability Certifications

    National Research Council Canada - National Science Library

    Acosta, Jacob; Hoesly, Scot; Huseth, Scott; Krider, Steven; Lamb, Jeremy; Martin, Calvin; Medina, Vince; Medina, Jorge; Nguyen, Michael; Patel, Jaykant

    2007-01-01

    Command, Control, Communications, Computers, and Intelligence (C4I) systems, each originally designed to address a single warfighting function, have been assembled into an interdependent C4I System of Systems (SoS...

  18. Acquisition and Development of System Command (SYSCOM) Technical Manuals

    National Research Council Canada - National Science Library

    2003-01-01

    ... (NAVSEA) and Space and Naval Warfare Systems Command (SPAWAR). TMs are the primary information source for technical training, installation, operation, testing, maintenance, and repair associated with NAVSEA/SPAWAR systems or equipment...

  19. The Big Issue: Command and Combat in the Information Age

    National Research Council Canada - National Science Library

    Potts, David

    2003-01-01

    This Occasional Paper considers command and combat in the information age. A small team in the British Army's conceptual "think tank," the Directorate General Development and Doctrine, worked together on this issue for 18 months...

  20. Implementing UPDM to develop command and control systems

    CSIR Research Space (South Africa)

    Oosthuizen, R

    2016-09-01

    Full Text Available Systems engineering is an established approach to develop systems, including complex sociotechnical systems such as Command and Control (C2) Systems. These systems often occur through introduction of a new technology into an existing system...

  1. U.S. Pacific Command > Organization > Organization Chart

    Science.gov (United States)

    Responsibility USPACOM Previous Commanders Organization Organization Chart Media News Flickr Photos Video Directory Media Inquiries Home : Organization : Organization Chart About DoD DoD Careers Join the Military

  2. Contract Claims Experience at the Naval Air Systems Command

    National Research Council Canada - National Science Library

    Carty, John

    1999-01-01

    ...) experienced at the Naval Air Systems Command (NAVAIR) between January 1997 and December 1998 as a means to identify areas of potential improvement in management practices which could result in reduced numbers of claims being submitted...

  3. Measuring, Monitoring, and Managing Knowledge in Command and Control Organizations

    National Research Council Canada - National Science Library

    Freeman, Jared; Weil, Shawn A; Hess, Kathleen P

    2006-01-01

    .... Iconography and interaction standards for such displays are well defined. Less attention has been paid to representing non-geographical information, such as information about the state of knowledge and decision making in a command staff...

  4. Intelligent Tutoring System for Teaching Battlefield Command Reasoning Skills

    National Research Council Canada - National Science Library

    Domeshek, Eric

    2002-01-01

    ... (ITS) for high-level battlefield command reasoning skills. The ultimate goal of this research is to develop new ITS techniques and technology for teaching skills that cannot he taught as simple methods and procedures to he followed...

  5. From Sensory Space to Motor Commands: Lessons from Saccades

    National Research Council Canada - National Science Library

    Optican, L

    2001-01-01

    .... We conclude that intrinsic brain signals might represent non-physical signals, such as desired sensory states, approximate motor drives, and distributed motor commands, rather than physical signals (e.g...

  6. Command and Control Planning and Teamwork: Exploring the Future

    National Research Council Canada - National Science Library

    Sterling, Bruce S; Lickteig, Carl W

    2000-01-01

    .... This paper examines how participant ratings of command and control planning and observer assessments of teamwork were related in a series of futuristic missions conducted by the Mounted Maneuver...

  7. Opening the Aperture... Ending Service "Branding" of US Unified Commands

    National Research Council Canada - National Science Library

    Handy, Russell

    2003-01-01

    .... It asserts that over tine, the defense establishment runs the risk of establishing a cultural identity in the command that limits perspectives to aground-, sea-, or air and space-centric viewpoint...

  8. The International Criminal Court: Considerations for the Joint Force Commander

    National Research Council Canada - National Science Library

    Sutton, Michael

    2003-01-01

    An analysis of the issues and remedies a Joint Force Commander should be concerned about because of the relationship between the United States and the newly-created International Criminal Court (ICC...

  9. Gesture Commanding of a Robot with EVA Gloves

    Data.gov (United States)

    National Aeronautics and Space Administration — Gestures commands allow a human operator to directly interact with a robot without the use of intermediary hand controllers. There are two main types of hand gesture...

  10. Should the Department of Defense Establish a Joint Corrections Command

    National Research Council Canada - National Science Library

    Evans, Thomas P

    2008-01-01

    ... and control element at the combatant command level. The military and the Coalition Provisional Authority's ability to establish a national penal system, conduct standardized training and effective prison operations to rebuild the Iraqi penal system...

  11. Joint Forward Operating Base Elements of Command and Control

    National Research Council Canada - National Science Library

    Summers, William

    2002-01-01

    ... and its associated leadership, command of air assets at a joint forward operating base lacks guidance. Today, the United States prosecutes an air war over Afghanistan from bases in Uzbekistan, Pakistan, and Afghanistan...

  12. Software and commands on VAX CERN. User's guide

    International Nuclear Information System (INIS)

    Balashov, V.K.; Trofimov, V.V.

    1990-01-01

    This guide describes a structure of applications software, which is available at VAX-type computers in JINR. The software includes program libraries, scientific programs and commands developed at CERN. 20 refs

  13. Systems Engineering Management Training at Naval Air Systems Command

    National Research Council Canada - National Science Library

    Rebel, James

    2000-01-01

    Within the past few years, the Naval Air Systems Command (NAVAIR) has undergone several major changes including an engineering reorganization from a matrix organization to an Integrated Program Team/Competency Aligned Organization (IPT/CAO...

  14. Public Affairs Capacity Building: A Soft Tool for Combatant Commanders

    National Research Council Canada - National Science Library

    Salata, Jason P

    2008-01-01

    Public affairs capacity building is a valuable soft component of the Combatant Commander's Theater Campaign Plan that builds habitual relationships, fosters transparency, and enhances the ability to shape the AOR...

  15. Diversity Networking Reception

    Science.gov (United States)

    2014-03-01

    Join us at the APS Diversity Reception to relax, network with colleagues, and learn about programs and initiatives for women, underrepresented minorities, and LGBT physicists. You'll have a great time meeting friends in a supportive environment and making connections.

  16. Comparative Research of Navy Voluntary Education at Operational Commands

    Science.gov (United States)

    2017-03-01

    into a national and international market. This is especially effects land-grant institutions who can educate the citizens within their state by...RESEARCH OF NAVY VOLUNTARY EDUCATION AT OPERATIONAL COMMANDS by Christopher B. Veenhuis March 2017 Thesis Co-Advisors: William Hatch Chad...COVERED Master’s thesis 4. TITLE AND SUBTITLE COMPARATIVE RESEARCH OF NAVY VOLUNTARY EDUCATION AT OPERATIONAL COMMANDS 5. FUNDING NUMBERS 6. AUTHOR(S

  17. The Role of the NCO Inside the BCT Command Post

    Science.gov (United States)

    2016-11-22

    formation. Doctrine 2015 introduced the importance of mission command doctrine into operations at all levels of leadership, and in the last five...utilizing tents is crucial to support the combined arms maneuver of the brigade. Physical layout of the command post can promote or hinder the ability to...equipment when a printer starting printing or a coffee maker was turned on? Understanding how PDISE configurations distribute loads in order to maintain

  18. Command Leadership DEOCS 4.1 Construct Validity Summary

    Science.gov (United States)

    2017-08-01

    Command Leadership DEOCS 4.1 Construct Validity Summary DEFENSE EQUAL OPPORTUNITY MANAGEMENT INSTITUTE...Report #15-18 1 Command Leadership DEOCS 4.1 Construct Validity Summary Background In 2014, DEOMI released DEOCS 4.0 for Department of Defense...individual items on the DEOCS. The following paper details the work conducted to modify the factor of Leadership Cohesion so that it focuses more

  19. Environmental Licensing: an Instrument of Command and Control by Exception?

    OpenAIRE

    Sleman Chams, Juliette; Gestión Ambiental de la Corporación Autónoma Regional del Atlántico-CRA, autoridad ambiental del Departamento del Atlántico,; Velásquez Muñoz, Carlos Javier; Universidad del Norte (Barranquilla)

    2016-01-01

    This article analyzes the situation of the most important instrument of command and control existing in the Colombian environmental legislation: the environmental license. Since its first formal regulation, on behalf of Decree 1753 of August 3, 1994, has received several modifications which, apparently, have made, in spite of its importance, in an instrument of command and control by exception. The article revises on the scope of each of the modifications and the justifications put forward by...

  20. Scenario design : adaptive architecture for command and control experiment eight

    OpenAIRE

    Clark, Frankie J.

    2002-01-01

    Approved for public release; distribution is unlimited. The Adaptive Architectures for Command and Control (A2C2) project is an ongoing research effort sponsored by the Office of Naval Research to explore adaptation in joint command and control. The objective of the project's eighth experiment is to study the adjustments that organizations make when they are confronted with a scenario for which their organizational is ill-suited. To accomplish this, teams will each be in one of two fundame...

  1. An analysis of Navy Recruiting Command's officer goaling models

    OpenAIRE

    Senter, Robert R.

    1990-01-01

    Approved for public release; distribution unlimited. This study examines the goaling models used by the Navy Recruiting Command for the Nurse Corps and Nuclear Propulsion Officer Candidate (NUPOC) programs. These two programs serve as representative samples for the numerous officer recruitment programs administered by the Navy Recruiting Command. The intent of the study is to analyze and validate the accuracy of the current goaling models, to ascertain factors which could improve the accur...

  2. Commands for financial data management and portfolio optimization

    OpenAIRE

    C. Alberto Dorantes

    2013-01-01

    Several econometric software offer portfolio management tools for practitioners and researchers. For example, MatLab and R offer a great variety of tools for the simulation, optimization, and analysis of financial time series. Stata, together with Mata, offers powerful programming tools for the simulation, optimization, and analysis of financial data. However, related user commands are scarce. In this presentation, commands for online market data collection, data manipulation, and financial a...

  3. Automatic-Control Challenges in Future Urban Vehicles: A Blend of Chassis, Energy and Networking Management Les défis de la commande automatique dans les futurs véhicules urbains : un mélange de gestion de châssis, d’énergie et du réseau

    Directory of Open Access Journals (Sweden)

    Savaresi S.M.

    2012-10-01

    Full Text Available The topic of this paper is the discussion of new challenges that the scientific field of automatic-control will face in the next decades, in the area of vehicles control. The focus is on urban vehicles for personal mobility, since this type of vehicles will be subject to the biggest changes in the next decades. The paper is articulated in three sections – in a top-down framework – briefly addressing and discussing the following items: the main drivers, which will force a change in urban personal mobility; the main types of vehicles, which are expected to address at best such drivers; the main automatic-control challenges on such type of vehicles. The scope of this paper is purposely non-technical. Its aim is mainly to discuss the emerging new challenges from the perspective of the automatic-control scientists and practitioners. The goal of the paper is to establish a discussion framework on the problems and opportunities, which will arise in this field, in the near future. Le sujet du présent article est une discussion sur les nouveaux défis auxquels le domaine scientifique de la commande automatique des véhicules va faire face dans les prochaines décennies. L’accent est mis sur les véhicules urbains destinés à une mobilité individuelle, puisque c’est ce type de véhicules qui va faire l’objet des plus grands changements dans les prochaines décennies. Le présent article s’articule, selon une démarche descendante, en trois sections abordant et discutant brièvement les éléments suivants : les principaux moteurs qui vont imposer un changement en matière de mobilité individuelle; les principaux types de véhicules qui sont attendus pour répondre au mieux à de tels moteurs et les principaux défis de la commande automatique sur un tel type de véhicules. À dessein, la portée du présent article est non technique. Son but est principalement de discuter les nouveaux défis émergeants, à partir de perspectives des

  4. Report on the development of the environmentally friendly type high efficiency energy utilization system - Study of the optimum system design technology. Case study of the wide area energy supply network in the Osaka prefectural region; Kankyo chowagata kokoritsu energy riyo system kaihatsu - saiteki system sekkei gijutsu no kenkyu hokokusho. Osakafuiki ni okeru koiki energy kyokyu network no case study

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    The paper worked out a model of the wide area supply network which combines the element technology being developed in the eco/energy urban project and the existing technology to apply it to the actually existing city, and the evaluation study was made of energy conservation effects, environmental preservation effects, economical efficiency, etc. The FY 2000 results were reported. In this fiscal year, a case was studied of using the exhaust heat from waste incineration plant by wide area network in the region having a plan of redevelopment/rezoning of the city of Osaka where heat is in great demand. The results of the study were as follows: The total primary energy consumption amount is reduced by 16.3-19.7% in the conventional heat insulation pipe method and by 19.2-20.6% in the vacuum heat insulation method. As to the environmental preservation, the CO2 reduction amount is 36.9-40.0%, and the NOx reduction amount is 43.7-45.5%, which indicated much more improvement than in the present situation. In the aspect of economical efficiency, the result indicated that in the case of the shortest piping, much economical efficiency is expected even without subsidies if considered of the carbon tax. (NEDO)

  5. Going green with eco-friendly dentistry.

    Science.gov (United States)

    Avinash, Bhagyalakshmi; Avinash, B S; Shivalinga, B M; Jyothikiran, S; Padmini, M N

    2013-07-01

    Eco-friendly dentistry is currently transforming the medical and dental field to decrease its affect on our natural environment and reduce the amount of waste being produced. Eco-friendly dentistry uses a sustainable approach to encourage dentists to implement new strategies to try and reduce the energy being consumed and the large amount of waste being produced by the industry. Many reasonable, practical and easy alternatives do exist which would reduce the environmental footprint of a dental office were it to follow the 'green' recommendations. Dentist should take a leading role in the society by implementing 'green' initiatives to lessen their impact on the environment. This article provides a series of 'green' recommendations that dentists around the world can implement to become a leading Stewards of the environment.

  6. Environment-friendly drilling operation technology

    Science.gov (United States)

    Luo, Huaidong; Jing, Ning; Zhang, Yanna; Huang, Hongjun; Wei, Jun

    2017-01-01

    Under the circumstance that international safety and environmental standards being more and more stringent, drilling engineering is facing unprecedented challenges, the extensive traditional process flow is no longer accepted, the new safe and environment-friendly process is more suitable to the healthy development of the industry. In 2015, CNPCIC adopted environment-friendly drilling technology for the first time in the Chad region, ensured the safety of well control, at the same time increased the environmental protection measure, reduced the risk of environmental pollution what obtain the ratification from local government. This technology carries out recovery and disposal of crude oil, cuttings and mud without falling on the ground. The final products are used in road and well site construction, which realizes the reutilization of drilling waste, reduces the operating cost, and provides a strong technical support for cost-cutting and performance-increase of drilling engineering under low oil price.

  7. PRUB: A Privacy Protection Friend Recommendation System Based on User Behavior

    Directory of Open Access Journals (Sweden)

    Wei Jiang

    2016-01-01

    Full Text Available The fast developing social network is a double-edged sword. It remains a serious problem to provide users with excellent mobile social network services as well as protecting privacy data. Most popular social applications utilize behavior of users to build connection with people having similar behavior, thus improving user experience. However, many users do not want to share their certain behavioral information to the recommendation system. In this paper, we aim to design a secure friend recommendation system based on the user behavior, called PRUB. The system proposed aims at achieving fine-grained recommendation to friends who share some same characteristics without exposing the actual user behavior. We utilized the anonymous data from a Chinese ISP, which records the user browsing behavior, for 3 months to test our system. The experiment result shows that our system can achieve a remarkable recommendation goal and, at the same time, protect the privacy of the user behavior information.

  8. Rapid Response Command and Control (R2C2): a systems engineering analysis of scaleable communications for Regional Combatant Commanders

    OpenAIRE

    Sullivan, Lisa; Cannon, Lennard; Reyes, Ronel; Bae, Kitan; Colgary, James; Minerowicz, Nick; Leong, Chris; Lim, Harry; Lim, Hang Sheng; Ng, Chin Chin; Neo, Tiong Tien; Tan, Guan Chye; Ng, Yu Loon; Wong, Eric; Wong, Heng Yue

    2006-01-01

    Includes supplementary material. Disaster relief operations, such as the 2005 Tsunami and Hurricane Katrina, and wartime operations, such as Operation Enduring Freedom and Operation Iraqi Freedom, have identified the need for a standardized command and control system interoperable among Joint, Coalition, and Interagency entities. The Systems Engineering Analysis Cohort 9 (SEA-9) Rapid Response Command and Control (R2C2) integrated project team completed a systems engineering (SE) ...

  9. Creating an Asthma-Friendly School

    Centers for Disease Control (CDC) Podcasts

    2007-11-08

    This podcast features real-life success stories of students with asthma who, thanks to their schools' implementation of asthma-friendly policies and programs, now have their asthma under control.  Created: 11/8/2007 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP), Division of Adolescent and School Health (DASH).   Date Released: 5/20/2008.

  10. CAD Instructor Designs Eco-Friendly Shed

    Science.gov (United States)

    Schwendau, Mark

    2013-01-01

    Dissatisfied with the options offered by big box stores--and wanting to save some money and go as green as possible--the author puts his design and construction skills to good use. In this article, he shares how he designed and built an eco-friendly shed. He says he is very pleased with the results of working with his own design, reducing waste,…

  11. Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player

    Directory of Open Access Journals (Sweden)

    Vivien Arief Wardhany

    2014-12-01

    Full Text Available The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male & 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word “Kanan” had the most recognize with percentage 83% while “pilih” is the lowest one. The word which had the most wrong clarification is “kembali” with percentagee 67%, while the word “kanan” is the lowest one. From the result of Recognition Rate by male there are several command such as “Kembali”, “Utama”, “Atas “ and “Bawah” has the low Recognition Rate. Especially for “kembali” cannot be recognized as the command in the female voices but in male voice that command has 4% of RR this is because the command doesn’t have similar word in english near to “kembali” so the system unrecognize the command. Also for the command “Pilih” using the female voice has 80% of RR but for the male voice has only 4% of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz than woman (165 to 255 Hz.The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system

  12. Command History. 1967. Volume 2. Sanitized

    Science.gov (United States)

    1967-01-01

    PAGE 636 OF 1340 PAGES 4" R. E-T- th• US Mission agencies engaged in PSYOP. Soni ot thesv A’ýr,. in- cwude’ in the orijinal terms of reference, and...GVN radio and television network, which was supported jointly by MACV and USAID, was used for entertain - ment and education, and for PSYWAR as well...programs and a variety of music features (jazz, popular, country and western, and classical). 120 Television (U) In December 1965 SECDEF had approved

  13. From Family to Friends: Does Witnessing Interparental Violence Affect Young Adults’ Relationships with Friends?

    Science.gov (United States)

    Mandal, Mahua; Hindin, Michelle J.

    2013-01-01

    Purpose Childhood exposure to violence in one’s family of origin has been closely linked to subsequent perpetration and victimization of intimate partner violence. There is, however, little research on the relationship between witnessing violence and subsequent peer violence. This study investigates the effects of witnessing interparental violence among Filipino young adults on their use and experience of psychological aggression with friends. Methods The data source for this study was the Cebu Longitudinal Health and Nutrition Survey. Recent perpetration and victimization of friend psychological aggression among young adults ages 21–22 years was assessed through self-reports from the 2005 survey, and witnessing interparental violence during childhood was assessed through self-reports from the 2002 survey. Multinomial logistic regression was used to examine the effects of witnessing interparental violence on subsequent use and experience of friend psychological aggression. Analyses were stratified by gender. Results About 13% of females and 4% of males perpetrated psychological aggression towards close friends, and about 4% of females and males were victims. Fourteen percent of females and 3% of males experienced bidirectional psychological aggression. About 44% of females and 47% of males had, during childhood, witnessed their parents physically hurt one another. Witnessing maternal and reciprocal interparental violence during childhood significantly predicted bidirectional friend psychological aggression among males. Among females, witnessing interparental violence did not significantly predict involvement with friend psychological aggression. Conclusions Violence prevention programs should consider using family-centered interventions, and apply a gendered lens to their application. Further research on gender differences in friend aggression is recommended. PMID:23697789

  14. Effective Response to Attacks On Department of Defense Computer Networks

    National Research Council Canada - National Science Library

    Shaha, Patrick

    2001-01-01

    .... For the Commanders-in-Chief (CINCs), computer networking has proven especially useful in maintaining contact and sharing data with elements forward deployed as well as with host nation governments and agencies...

  15. Managing resources through stakeholder networks

    NARCIS (Netherlands)

    Ogada, Job Ochieng; Krhoda, George Okoye; Veen, Van Der Anne; Marani, Martin; Oel, van Pieter Richards

    2017-01-01

    Stakeholder analysis and social network analysis were used to analyze stakeholders’ social and structural characteristics based on their interests, influence and interactions in Lake Naivasha basin, Kenya. Even though the Kenyan government and its agencies seem to command higher influence and

  16. Constraints in the Adoption of Eco Friendly Conservation Practices

    Directory of Open Access Journals (Sweden)

    L. Murali Krishnan

    2016-05-01

    Insect pest and diseases management, Lack of awareness of agro environmental problems and farmer’s attitude towards the Eco Friendly Conservation Practices are the major constraints in the adoption of Eco Friendly Conservation Practices.The study suggests educational, extension & training strategies for fostering the adopted of ECO friendly Conservation Practices.

  17. How Can I Help a Friend Who Cuts?

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español How Can I Help a Friend Who Cuts? KidsHealth / For Teens / How Can I Help a Friend Who Cuts? What's in ... them? If so, what should you do? It can be hard to understand why a friend might ...

  18. More Colleges Are Adding Family-Friendly Benefits

    Science.gov (United States)

    Wilson, Robin

    2008-01-01

    Results of a new survey of family-friendly benefits by the Center for the Education of Women at the University of Michigan at Ann Arbor show that stopping the tenure clock has become the most common family-friendly benefit in higher education, following paid maternity leave. Other family-friendly policies that top the list in academe allow…

  19. Maternal Affection Moderates Friend Influence on Schoolwork Engagement

    Science.gov (United States)

    Marion, Donna; Laursen, Brett; Kiuru, Noona; Nurmi, Jari-Erik; Salmela-Aro, Katariina

    2014-01-01

    This study investigated friend influence over adolescent schoolwork engagement in 160 same-sex friend dyads (94 female dyads and 66 male dyads). Participants were approximately 16 years of age at the outset. Each friend described his or her own schoolwork engagement, school burnout, and perceptions of maternal affection. The results revealed that…

  20. Diffusion of Intervention Effects: The Impact of a Family-based Substance Use Prevention Program on Friends of Participants

    Science.gov (United States)

    Rulison, Kelly L.; Feinberg, Mark; Gest, Scott D.; Osgood, D. Wayne

    2015-01-01

    Purpose We tested whether effects of the Strengthening Families Program for Youth 10–14 (SFP10–14) diffused from intervention participants to their friends. We also tested which program effects on participants accounted for diffusion. Methods Data are from 5,449 students (51% female; mean initial age=12.3 years) in the PROSPER community intervention trial (2001–2006) who did not participate in SFP10–14 (i.e., non-participants). At each of 5 waves, students identified up to 7 friends and self-reported past month drunkenness and cigarette use, substance use attitudes, parenting practices, and unsupervised time spent with friends. We computed two measures of indirect exposure to SFP10–14: total number of SFP-attending friends at each wave and cumulative proportion of SFP-attending friends averaged across the current and all previous post-intervention waves. Results Three years post-intervention, the odds of getting drunk (OR=1.4) and using cigarettes (OR=2.7) were higher among non-participants with 0 SFP-attending friends compared to non-participants with 3 or more SFP-attending friends. Multilevel analyses also provided evidence of diffusion: non-participants with a higher cumulative proportion of SFP-attending friends at a given wave were less likely than their peers to use drugs at that wave. Effects from SFP10–14 primarily diffused through friendship networks by reducing the amount of unstructured socializing (unsupervised time that non-participants spent with friends), changing friends’ substance use attitudes, and then changing non-participants’ own substance use attitudes. Conclusions Program developers should consider and test how interventions may facilitate diffusion to extend program reach and promote program sustainability. PMID:26210856

  1. Best friends' interactions and substance use: The role of friend pressure and unsupervised co-deviancy.

    Science.gov (United States)

    Tsakpinoglou, Florence; Poulin, François

    2017-10-01

    Best friends exert a substantial influence on rising alcohol and marijuana use during adolescence. Two mechanisms occurring within friendship - friend pressure and unsupervised co-deviancy - may partially capture the way friends influence one another. The current study aims to: (1) examine the psychometric properties of a new instrument designed to assess pressure from a youth's best friend and unsupervised co-deviancy; (2) investigate the relative contribution of these processes to alcohol and marijuana use; and (3) determine whether gender moderates these associations. Data were collected through self-report questionnaires completed by 294 Canadian youths (62% female) across two time points (ages 15-16). Principal component analysis yielded a two-factor solution corresponding to friend pressure and unsupervised co-deviancy. Logistic regressions subsequently showed that unsupervised co-deviancy was predictive of an increase in marijuana use one year later. Neither process predicted an increase in alcohol use. Results did not differ as a function of gender. Copyright © 2017 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  2. Signed Networks in Social Media

    OpenAIRE

    Leskovec, Jure; Huttenlocher, Daniel; Kleinberg, Jon

    2010-01-01

    Relations between users on social media sites often reflect a mixture of positive (friendly) and negative (antagonistic) interactions. In contrast to the bulk of research on social networks that has focused almost exclusively on positive interpretations of links between people, we study how the interplay between positive and negative relationships affects the structure of on-line social networks. We connect our analyses to theories of signed networks from social psychology. We find that the c...

  3. Development of environmentally-friendly high-efficiency energy utilization system. Research on optimum system design technology (Case study report on wide-area energy supply network system in Osaka Prefecture); Osakafu ni okeru koiki energy kyokyu network system no case study hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    A wide-area energy supply network model is fabricated for a region to be re-developed, and the model is assessed from the viewpoints of economy, environmental preservation, and energy conservation. The model is a combination of element technologies being developed under an Eco-Energy City project and some existing technologies. Although a wide-area heat supply system using high-temperature water is superior to district heating systems in energy conservation and environmental friendliness, yet it contains some unsolved problems relating to cost efficiency. The use of a vacuum-insulated tube as the heat supply main is better than the use of a double tube from every point of view. It is noted here that in the study of the Sakai district, the neighborhood of the old Sakai Port, an area in front of Sakai-shi Station of the Nankai Main Line, Nakamozu-Minami district, and Nakamozu-Kita district are defined to be the areas to be supplied with heat. Petroleum company C, glass mill C, and the Sakai Municipal Incineration Plant situated in the bay area are assumed to be the sources of waste heat. It is so set that the high-temperature water is to be transported at 170 degrees C and is to return at 140 degrees C. (NEDO)

  4. ITOUGH2 command reference. Version 3.1

    International Nuclear Information System (INIS)

    Finsterle, S.

    1997-04-01

    This report contains a detailed description of all ITOUGH2 commands. It complements the ITOUGH2 User's Guide and the collection of ITOUGH2 sample problems. ITOUGH2 is a program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis. It is based on the TOUGH2 simulator for non-isothermal multiphase flow in fractured and porous media. Extensive experience in using TOUGH2 is a prerequisite for using ITOUGH2. The preparation of an input file for TOUGH2 or its derivatives is described in separate manuals and is not part of this report. The ITOUGH2 user's guide summarizes the inverse modeling theory pertaining to ITOUGH2, and describes the program output. Furthermore, information about code architecture and installation are given. In Chapter 2 of this report, a brief summary of inverse modeling theory is given to restate the main concepts implemented in ITOUGH2 and to introduce certain definitions. Chapter 3 introduces the basic concepts of the ITHOUGH2 input language and the main structure of an ITOUGH2 input file. Chapter 4, the main part of this report, provides detailed descriptions of each ITOUGH2 command in alphabetical order. It is complemented by a command index in Appendix B in which the commands are given in logical order. The content of Chapter 4 is also available on-line using command it2help. Chapter 5 describes the usage of the UNIX script files for executing, checking, and terminating ITOUGH2 simulations

  5. 106-17 Telemetry Standards Recorder and Reproducer Command and Control Chapter 6

    Science.gov (United States)

    2017-07-01

    block identifiers (any ASCII text , one identifier per line) from the drive. A .BBLIST command is only valid following a declassify command. The type ... Processor Device Using IEEE 1394b ..... 6-49 6.5.6 Additional Mandatory Commands When Using Ethernet ........................... 6-54 6.5.7 Additional Non...state or magnetic disk). Not all commands (CLI or discrete) may be applicable to all types of R/R implementations. Commands are used to a) control the

  6. Influence of friends on children's physical activity: a review.

    Science.gov (United States)

    Maturo, Claire C; Cunningham, Solveig A

    2013-07-01

    We examined evidence for friendship influences on children's physical activity (PA) through systematic searches of online databases in May 2012. We identified 106 studies (25 qualitative) published in English since 2000 that analyzed indicators of friendship influences (e.g., communication about PA, friends' PA, and PA with friends) among persons younger than 19 years. Children's PA was positively associated with encouragement from friends (43 of 55 studies indicating a positive relationship), friends' own PA (30/35), and engagement with friends in PA (9/10). These findings are consistent with friends influencing PA, but most studies did not isolate influence from other factors that could explain similarity. Understanding friendship influences in childhood can facilitate the promotion of lifelong healthy habits. PA with friends should be considered in health promotion programs.

  7. Friend Effects and Racial Disparities in Academic Achievement

    Directory of Open Access Journals (Sweden)

    Jennifer Flashman

    2014-07-01

    Full Text Available Racial disparities in achievement are a persistent fact of the US educational system. An often cited but rarely directly studied explanation for these disparities is that adolescents from different racial and ethnic backgrounds are exposed to different peers and have different friends. In this article I identify the impact of friends on racial and ethnic achievement disparities. Using data from Add Health and an instrumental variable approach, I show that the achievement characteristics of youths’ friends drive friend effects; adolescents with friends with higher grades are more likely to increase their grades compared to those with lower-achieving friends. Although these effects do not differ across race/ethnicity, given differences in friendship patterns, if black and Latino adolescents had friends with the achievement characteristics of white students, the GPA gap would be 17 to 19 percent smaller. Although modest, this effect represents an important and often overlooked source of difference among black and Latino youth.

  8. Dermatology Depictions in Friends/ Descripciones dermatológicas en Friends

    Directory of Open Access Journals (Sweden)

    Skyler M White

    2017-03-01

    Full Text Available Health?related topics are frequently referenced on screen in movies and television. Friends was on?air for 10 seasonsand is one of the most watched television shows of all time. Dermatology was referenced more than any otherhealth?related topic throughout the series. Beliefs about attractiveness and the stigma of skin conditions are furtherpropagated in this program. Reviewing the depictions of dermatology in Friends will aid in understanding the public’sideas and stereotypes regarding skin and dermatologic diseases.

  9. How to win friends and influence people

    CERN Document Server

    Carnegie, Dale

    2010-01-01

    For more than sixty years the rock-solid, time-tested advice in this book has carried thousands of now famous people up the ladder of success in their business and personal lives. With more than fifteen million copies sold, How to Win Friends and Influence People is one of the best known motivational books in history, with proven advice for achieving success in life. You’ll learn: three fundamental techniques in handling people; six ways to make people like you; twelve ways to win people to you way of thinking; nine ways to change people without arousing resentment; and much, much more!

  10. A customer-friendly Space Station

    Science.gov (United States)

    Pivirotto, D. S.

    1984-01-01

    This paper discusses the relationship of customers to the Space Station Program currently being defined by NASA. Emphasis is on definition of the Program such that the Space Station will be conducive to use by customers, that is by people who utilize the services provided by the Space Station and its associated platforms and vehicles. Potential types of customers are identified. Scenarios are developed for ways in which different types of customers can utilize the Space Station. Both management and technical issues involved in making the Station 'customer friendly' are discussed.

  11. Airline network development in Europe and its implications for airport planning

    NARCIS (Netherlands)

    Burghouwt, G.

    2007-01-01

    Order by Fax Printer Friendly PDF Brochure Send to Friend Enquire before Buying Hard Copy Airline Network Development in Europe and its Implications for Airport Planning Ashgate Publishing, March 2007, Pages: 300 Description Table of Contents Enquire before Buying Send to a Friend The ongoing

  12. STS-93 Commander Collins suits up for launch

    Science.gov (United States)

    1999-01-01

    During the third launch preparations in the Operations and Checkout Building, STS-93 Commander Eileen M. Collins waves while having her launch and entry suit checked. After Space Shuttle Columbia's July 20 and 22 launch attempts were scrubbed, the launch was again rescheduled for Friday, July 23, at 12:24 a.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  13. STS-93 Commander Eileen Collins waves to her family

    Science.gov (United States)

    1999-01-01

    STS-93 Commander Eileen M. Collins waves to her family nearby, a last meeting before launch of mission STS-93 on July 20. Liftoff is scheduled for 12:36 a.m. EDT. The primary mission of STS-93 is the release of the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X- ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Steven A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  14. STS-93 Commander Eileen Collins suits up for launch

    Science.gov (United States)

    1999-01-01

    For the third time, in the Operations and Checkout Building, STS- 93 Commander Eileen M. Collins tries on her helmet with her launch and entry suit. After Space Shuttle Columbia's July 20 and 22 launch attempts were scrubbed, the launch was again rescheduled for Friday, July 23, at 12:24 a.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  15. Modular code supervisor. Automatic generation of command language

    International Nuclear Information System (INIS)

    Dumas, M.; Thomas, J.B.

    1988-01-01

    It is shown how, starting from a problem formulated by the user, to generate the adequate calculation procedure in the command code, and acquire the data necessary for the calculation while verifying their validity. Modular codes are used, because of their flexibility and wide utilisation. Modules are written in Fortran, and calculations are done in batches according to an algorithm written in the GIBIANE command language. The action plans are based on the STRIPS and WARPLAN families. Elementary representation of a module and special instructions are illustrated. Dynamic construction macro-actions, and acquisition of the specification (which allows users to express the goal of a program without indicating which algorithm is used to reach the goal) are illustrated. The final phase consists in translating the algorithm into the command language [fr

  16. Research into command, control, and communications in space construction

    Science.gov (United States)

    Davis, Randal

    1990-01-01

    Coordinating and controlling large numbers of autonomous or semi-autonomous robot elements in a space construction activity will present problems that are very different from most command and control problems encountered in the space business. As part of our research into the feasibility of robot constructors in space, the CSC Operations Group is examining a variety of command, control, and communications (C3) issues. Two major questions being asked are: can we apply C3 techniques and technologies already developed for use in space; and are there suitable terrestrial solutions for extraterrestrial C3 problems? An overview of the control architectures, command strategies, and communications technologies that we are examining is provided and plans for simulations and demonstrations of our concepts are described.

  17. Comparison between a classical command law and a new advanced recovery command law in a MCB-ARS boost

    Science.gov (United States)

    Petit, Pierre; Saint-Eve, Frédéric; Sawicki, Jean-Paul; Aillerie, Michel

    2017-02-01

    This paper focuses on an original performed command on DC-DC boosts developed for applications in the LMOPS lab for the photovoltaic energy conversion and more specifically the Photovoltaic panels connected to HVDC smart grids. This boost, commonly named MCB-ARS (Magnetically Coupled Boost with Active Recovery Switch) presents great advantages concerning the simplicity of the command on the single constitutive switch, the global efficiency and the voltage conversion ratio. A fine analysis of the losses all over the entire converter shows that losses are not distributed uniformly in the constituting components. So a previous modification described in a previous paper consisting in the conducting assistance on the power flowing intermediate diode, performed advantageously the global efficiency. The present analysis takes into account the fact that the new configuration obtained after this important improvement looks like a classical half-bridge push-pull stage and may be controlled by a twice complementary command. In that way, a comparison has been done between a natural commutation recovery diode and an assisted switch commutation driven in a push-pull mode. As attempted, the switching command laws in charge to assume the energy transfer has been compared to the classical previous system described in anterior papers, and we demonstrate in this publication that a commutation based on a push-pull command mode within the two switches of the MCB-ARS converter is possible and increases the power transfer.

  18. Circuit of synchronous logic for the transmission of safety commands

    International Nuclear Information System (INIS)

    Uberschlag, J.

    1969-01-01

    The author reports the development of a control-command circuit for the transmission of binary commands related to the safety of nuclear reactors. He presents the main design criteria (operation safety, provided safety level, flexibility, technical adaptation), the definition of the operation principle (inputs, logical outputs), the properties of a logic system. He evokes redundancy issues, and presents the system structure, proposes a possible sketch of the logic circuit. He describes the possible options for intermediate circuits and logic outputs, and tests to be performed

  19. Incident command linkup: the vital key for CBRN response

    International Nuclear Information System (INIS)

    Smith, D.

    2009-01-01

    The most vital element for responding emergency personnel to a CBRN attack is the incident command linkup and dissemination of information. Incident Command, the basic foundation of the National Incident Management System (NIMS), is the first thing that must be effectively established when a response is required in any emergency. When initial evaluation of the scene determines that the incident involves CBRN, specialized resources from a wide array of assets must be activated quickly to mitigate the hazards. In this paper, we examine the information that the Incident Commander must be prepared to convey to those specialized assets responding. We will also look at what questions those specialized resources may ask while en route and upon arrival. Another key element that will be discussed is the placement of those resources in the hierarchy of the National Incident Management System. The information that the Incident Commander (IC) must be prepared to convey to those specialized assets responding is crucial for an efficient response and effective deployment. What questions might those specialized CBRN resources ask while en route and upon arrival? At a bare minimum, the four basic questions of who is in charge of the incident, where is the incident located, what transpired to trigger a response, and when did the incident occur must be answered. These questions should be answered while en route to the scene so that the Commander of the responding CBRN unit can formulate a plan on the move and prepare his response accordingly. While in transit, the CBRN responders should maintain contact with a representative of the Incident Command at the scene so that the latest information is available. Discussions should include anticipated logistical requirements such as personal protective equipment (PPE), decon requirements, communications protocols, and medical care issues. The CBRN Commander will need to know if the site is secure, has it been cleared of explosive hazards

  20. Three dimensional visualization to support command and control

    International Nuclear Information System (INIS)

    Van Slambrook, G.A.

    1997-04-01

    Virtual reality concepts are changing the way one thinks about and with computers. The concepts have already proven their potential usefulness in a broad range of applications. This research was concerned with exploring and demonstrating the utility of virtual reality in robotics and satellite command and control applications. The robotics work addressed the need to quickly build accurate graphical models of physical environments by allowing a user to interactively build a model of a remote environment by superimposing stereo graphics onto live stereo video. The satellite work addressed the fusion of multiple data sets or models into one synergistic display for more effective training, design, and command and control of satellite systems

  1. Command injection attacks, continuations, and the Lambek calculus

    Directory of Open Access Journals (Sweden)

    Hayo Thielecke

    2016-06-01

    Full Text Available This paper shows connections between command injection attacks, continuations, and the Lambek calculus: certain command injections, such as the tautology attack on SQL, are shown to be a form of control effect that can be typed using the Lambek calculus, generalizing the double-negation typing of continuations. Lambek's syntactic calculus is a logic with two implicational connectives taking their arguments from the left and right, respectively. These connectives describe how strings interact with their left and right contexts when building up syntactic structures. The calculus is a form of propositional logic without structural rules, and so a forerunner of substructural logics like Linear Logic and Separation Logic.

  2. APOLLO 16 COMMANDER JOHN YOUNG ENTERS ALTITUDE CHAMBER FOR TESTS

    Science.gov (United States)

    1971-01-01

    Apollo 16 commander John W. Young prepares to enter the lunar module in an altitude chamber in the Manned Spacecraft Operations Building at the spaceport prior to an altitude run. During the altitude run, in which Apollo 16 lunar module pilot Charles M. Duke also participated, the chamber was pumped down to simulate pressure at an altitude in excess of 200,000 feet. Young, Duke and command module pilot Thomas K. Mattingly II, are training at the Kennedy Space Center for the Apollo 16 mission. Launch is scheduled from Pad 39A, March 17, 1972.

  3. Oracle Enterprise Manager 12c command-line interface

    CERN Document Server

    Pot'Vin, Kellyn; Smith, Ray

    2014-01-01

    Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager's powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock full of ready-made scripting examples contributed by the authors and leading members of the community. For example, you'll find scripts and examples of commands to: Remove an Enterprise Manager agent and its related targetsQuickly create administrator accounts that are ful

  4. Online and Offline Social Networks: Use of Social Networking Sites by Emerging Adults

    Science.gov (United States)

    Subrahmanyam, Kaveri; Reich, Stephanie M.; Waechter, Natalia; Espinoza, Guadalupe

    2008-01-01

    Social networking sites (e.g., MySpace and Facebook) are popular online communication forms among adolescents and emerging adults. Yet little is known about young people's activities on these sites and how their networks of "friends" relate to their other online (e.g., instant messaging) and offline networks. In this study, college students…

  5. Roll forming of eco-friendly stud

    Science.gov (United States)

    Keum, Y. T.; Lee, S. Y.; Lee, T. H.; Sim, J. K.

    2013-12-01

    In order to manufacture an eco-friendly stud, the sheared pattern is designed by the Taguchi method and expanded by the side rolls. The seven geometrical shape of sheared pattern are considered in the structural and thermal analyses to select the best functional one in terms of the durability and fire resistance of dry wall. For optimizing the size of the sheared pattern chosen, the L9 orthogonal array and smaller-the-better characteristics of the Taguchi method are used. As the roll gap causes forming defects when the upper-and-lower roll type is adopted for expanding the sheared pattern, the side roll type is introduced. The stress and strain distributions obtained by the FEM simulation of roll-forming processes are utilized for the design of expanding process. The expanding process by side rolls shortens the length of expanding process and minimizes the cost of dies. Furthermore, the stud manufactured by expanding the sheared pattern of the web is an eco-friend because of the scrapless roll-forming process. In addition, compared to the conventionally roll-formed stud, the material cost is lessened about 13.6% and the weight is lightened about 15.5%.

  6. Creation of an Innovation-Friendly Environment

    Directory of Open Access Journals (Sweden)

    Augustinas Maceika

    2014-06-01

    Full Text Available The paper focuses on identifying the methods useful for improving the process of creating an innovation ­friendly environment. For this purpose, conditions for innovation activity in industry were investigated, and the expert evaluation of the selected knowledge and the assessment of the importance of skills for the successful development of innovations were car­ ried out. The work referred to the analysis of the sources of scientific information, a sociological inquiry of the personnel of industrial enterprises, correlation analysis and expert evaluation. The study has found that for building the innovation ­friendly environment, knowledge of the psychology of creativity, personnel management, formation and implementation of the innova­ tion strategy, risk management, business development and sales organization are of a particular importance. Expert assessment has showed that abilities to work in a team, be an entrepreneur, use marketing tools, generate ideas and create new products play a crucial role in innovation development. A situation in industry companies has shown the currently existing various groups of employees with a different point of view on the surveyed parameter. Managers, workers, engineers and other staff have different opinions and knowledge, and therefore a well thought­out policy is required for wider innovative activities. The directives of such a policy must be available for everyone.

  7. Societal embedding of climate-friendly innovations

    International Nuclear Information System (INIS)

    Vaeyrynen, E.; Kivisaari, Sirkku; Lovio, R.

    2002-01-01

    This project assesses the possibilities of constructing a market for climate-friendly energy technologies by applying the process of 'societal embedding of innovations'. The term refers to an interactive learning process amongst three groups of key actors: producers, users and societal actors. Their co-operation shapes the innovation to fit the needs of the market and contributes to creation of conditions in which the innovation can be adopted. The project consists of two case studies: (1) Shaping of the ESCO energy service concept in Finnish municipalities and (2) Increasing the use of wood pellets in single-family houses. The case studies have illustrated the possibilities and limitations concerning the application of societal embedding in the energy sector. The project indicates that societal embedding may promote the implementation of climate-friendly energy technologies in at least three ways. Firstly, the process mobilises key actors to cooperation. This generates interactive learning on the problem and its solving. Market construction is forged ahead by mutual adaptation of the innovation and its environment. Secondly, this approach offers a tool to examine the societal quality of the innovation, a question related vitally to climate change. Thirdly, by producing new knowledge of the needs on the market this approach supports the societal actors in choosing different instruments to induce the intended transition to sustainability. (orig.)

  8. Implementing Internet of Things in a military command and control environment

    Science.gov (United States)

    Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter

    2017-05-01

    While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.

  9. Organic Foods: Do Eco-Friendly Attitudes Predict Eco-Friendly Behaviors?

    Science.gov (United States)

    Dahm, Molly J.; Samonte, Aurelia V.; Shows, Amy R.

    2009-01-01

    Objective: The purpose of this study was to determine whether student awareness and attitudes about organic foods would predict their behaviors with regard to organic food consumption and other healthy lifestyle practices. A secondary purpose was to determine whether attitudes about similar eco-friendly practices would result in socially conscious…

  10. Friends interventions in psychosis: a narrative review and call to action.

    Science.gov (United States)

    Harrop, Chris; Ellett, Lyn; Brand, Rachel; Lobban, Fiona

    2015-08-01

    To highlight the importance of friendships to young people with psychosis, and the need for clinical interventions to help maintain peer relationships during illness. To structure a research agenda for developing evidence-based interventions with friends. An argument is developed through a narrative review of (i) the proven efficacy of family interventions, and (by comparison) a relative absence of friend-based interventions; (ii) the particular primacy of friendships and dating for young people, and typical effects of exclusion; and (iii) reduced friendship networks and dating experiences in psychosis, in pre-, during and post-psychosis phases, also links between exclusion and psychosis. We put forward a model of how poor friendships can potentially be a causal and/or maintenance factor for psychotic symptoms. Given this model, our thesis is that interventions aiming to maintain social networks can be hugely beneficial clinically for young people with psychosis. We give a case study to show how such an intervention can work. We call for 'friends interventions' for young people with psychosis to be developed, where professionals directly work with a young person's authentic social group to support key friendships and maintain social continuity. An agenda for future research is presented that will develop and test theoretically driven interventions. © 2014 Wiley Publishing Asia Pty Ltd.

  11. US Africa Command (AFRICOM) and Nigeria's National Security ...

    African Journals Online (AJOL)

    The US decision to establish a unified combatant command (AFRICOM) in African has raised numerous questions, particularly in Africa, regarding its possible security implications for the continent. The article narrows itself to the concern for unraveling the national security implications of Nigeria's opposition to the location of

  12. Commander in chief : FDR's battle with Churchill, 1943

    NARCIS (Netherlands)

    Hamilton, Charles Nigel

    2016-01-01

    Commander in Chief is een deelbiografie van president Franklin Delano Roosevelt waarin Roosevelts rol als opperbevelhebber van de gewapende strijdkrachten van de Verenigde Staten in de Tweede Wereldoorlog het hoofdthema is. Het boek concentreert zich op het jaar 1943: een jaar waaraan biografen van

  13. Interagency Cooperation for Irregular Warfare at the Combatant Command

    Science.gov (United States)

    2009-01-01

    enemy’s command capability.16 Salamoni argued that the term “irregular warfare” belies an ethnocentric perspective of conflict that will limit military...duty military staffing to form the nucleus of the organization, which would receive augmentation from additional assigned reservists and interagency

  14. NET: an inter-computer file transfer command

    International Nuclear Information System (INIS)

    Burris, R.D.

    1978-05-01

    The NET command was defined and supported in order to facilitate file transfer between computers. Among the goals of the implementation were greatest possible ease of use, maximum power (i.e., support of a diversity of equipment and operations), and protection of the operating system

  15. Commander’s Handbook on Military and Civilian Law. Revision

    Science.gov (United States)

    1992-01-01

    Cuminal Law Divio 23-8 Commander’s Handbook The accused’s possession must be knowing and conscious. Therefore, if the accused didn’t know he or she...of violence and neglect in families, for example, experiencing or witnessing abuse as a child or the stress a family experiences due to the member’s

  16. Principles of Mission Command Applied to Civil Military Relationships

    Science.gov (United States)

    2017-05-25

    to prevent tension and promote cohesive teams. While historians trace civil-military theory to Sun Tzu and Carl von Clausewitz, the beginning of...Conclusion – A Mission Command Approach .............................................................................. 34 Bibliography ...Civil-Military Relations,” Monograph, (School of Advanced Military Studies, Fort Leavenworth, KS, 2010): 3. 64 Bennett, 3. 36 Bibliography

  17. Satellite Telemetry and Command using Big LEO Mobile Telecommunications Systems

    Science.gov (United States)

    Huegel, Fred

    1998-01-01

    Various issues associated with satellite telemetry and command using Big LEO mobile telecommunications systems are presented in viewgraph form. Specific topics include: 1) Commercial Satellite system overviews: Globalstar, ICO, and Iridium; 2) System capabilities and cost reduction; 3) Satellite constellations and contact limitations; 4) Capabilities of Globalstar, ICO and Iridium with emphasis on Globalstar; and 5) Flight transceiver issues and security.

  18. Command and Control Across Space and Cyberspace Domains

    Science.gov (United States)

    2016-02-16

    debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”16).17 From Joint...Third, push control (if not command) to the theater or operational level. Returning to the inbound ICBM scenario proposed by Maj Gen Zabel and detailed

  19. TGIN language reference manual: NAMMU and MATDIF commands

    International Nuclear Information System (INIS)

    Cliffe, K.A.; Herbert, A.W.

    1992-03-01

    NAMMU is a finite-element program for modelling groundwater flow and transport. The matrix diffusion option models the transport of radionuclides including the effects of rock-matrix diffusion. It uses the free-format structured-input TGIN. This report describes the commands in the TGIN language for running the NAMMU and MATDIF package. (author)

  20. Teaching Bibliometric Analysis and MS/DOS Commands.

    Science.gov (United States)

    Dou, Henri; And Others

    1988-01-01

    Outlines the steps involved in bibliometric studies, and demonstrates the ability to execute simple studies on microcomputers by downloading files using only the capability of MS/DOS. Detailed illustrations of the MS/DOS commands used are provided. (eight references) (CLB)