WorldWideScience

Sample records for networks friendly command

  1. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This paper summarizes the research results on the friendly network robotics in fiscal 1996. This research assumes an android robot as an ultimate robot and the future robot system utilizing computer network technology. The robot aiming at human daily work activities in factories or under extreme environments is required to work under usual human work environments. The human robot with similar size, shape and functions to human being is desirable. Such robot having a head with two eyes, two ears and mouth can hold a conversation with human being, can walk with two legs by autonomous adaptive control, and has a behavior intelligence. Remote operation of such robot is also possible through high-speed computer network. As a key technology to use this robot under coexistence with human being, establishment of human coexistent robotics was studied. As network based robotics, use of robots connected with computer networks was also studied. In addition, the R-cube (R{sup 3}) plan (realtime remote control robot technology) was proposed. 82 refs., 86 figs., 12 tabs.

  2. Network-Friendly Gossiping

    Science.gov (United States)

    Serbu, Sabina; Rivière, Étienne; Felber, Pascal

    The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on the underlying layers, notably the Internet routing infrastructure. To make an effective use of network resources, protocols should both limit the stress (amount of messages) on each infrastructure entity like routers and links, and balance as much as possible the load in the network. Most protocols use application-level metrics such as delays to improve efficiency of content dissemination or routing, but the extend to which such application-centric optimizations help reduce and balance the load imposed to the infrastructure is unclear. In this paper, we elaborate on the design of such network-friendly protocols and associated metrics. More specifically, we investigate random-based gossip dissemination. We propose and evaluate different ways of making this representative protocol network-friendly while keeping its desirable properties (robustness and low delays). Simulations of the proposed methods using synthetic and real network topologies convey and compare their abilities to reduce and balance the load while keeping good performance.

  3. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    A working group (WG) study was conducted aiming at realizing human type robots. The following six working groups in the basement field were organized to study in terms mostly of items of technical development and final technical targets: platform, and remote attendance control in the basement field, maintenance of plant, etc., home service, disaster/construction, and entertainment in the application field. In the platform WG, a robot of human like form is planning which walks with two legs and works with two arms, and the following were discussed: a length of 160cm, weight of 110kg, built-in LAN, actuator specifications, modulated structure, intelligent driver, etc. In the remote attendance control WG, remote control using working function, stabilized movement, stabilized control, and network is made possible. Studied were made on the decision on a remote control cockpit by open architecture added with function and reformable, problems on the development of the standard language, etc. 77 ref., 82 figs., 21 tabs.

  4. The Arecibo Remote Command Center Network

    Science.gov (United States)

    Crawford, Fronefield; Jenet, Fredrick; Christy, Brian; Dolch, Timothy; Guerreo-Miller, Alma; Quetschke, Volker; Siemens, Xavier; Smith, Tristan L.; Stovall, Kevin; Wade, Leslie; Wade, Madeline

    2017-01-01

    The Arecibo Remote Command Center (ARCC) network is an education, research, and training program for undergraduates, graduate students, and postdocs spanning multiple institutions. ARCC members use the Arecibo 305-m radio telescope to remotely conduct pulsar survey and timing observations, and they search the data collected to find new radio pulsars using a custom pulsar candidate viewer. Timing data are used in the ongoing NANOGrav search for gravitational waves using pulsar timing arrays. The ARCC program also serves as an effective introduction for students to radio pulsar research. Currently ARCC has seven institutional members and dozens of participants. Our poster provides some general background about the ARCC program at Franklin and Marshall College and serves as a catalyst for in-person conversations and discussions about ARCC, including the benefits of joining the ARCC network and some specifics on how to join.

  5. Friend suggestion in social network based on user log

    Science.gov (United States)

    Kaviya, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    Simple friend recommendation algorithms such as similarity, popularity and social aspects is the basic requirement to be explored to methodically form high-performance social friend recommendation. Suggestion of friends is followed. No tags of character were followed. In the proposed system, we use an algorithm for network correlation-based social friend recommendation (NC-based SFR).It includes user activities like where one lives and works. A new friend recommendation method, based on network correlation, by considering the effect of different social roles. To model the correlation between different networks, we develop a method that aligns these networks through important feature selection. We consider by preserving the network structure for a more better recommendations so that it significantly improves the accuracy for better friend-recommendation.

  6. Neighbor-friendly autonomous power control in wireless heterogeneous networks

    National Research Council Canada - National Science Library

    Torrea-Duran, Rodolfo; Tsiaflakis, Paschalis; Vandendorpe, Luc; Moonen, Marc

    2014-01-01

    .... To solve this problem, we propose a neighbor-friendly autonomous algorithm for power control in wireless heterogeneous networks that protects victim users from neighboring cells through a penalty...

  7. Characteristics of Family/Friend Care Networks of Frail Seniors

    Science.gov (United States)

    Fast, Janet; Keating, Norah Christine; Derksen, Linda; Otfinowski, Pam

    2004-01-01

    This paper tests assumptions often made by policy makers and practitioners that networks of family, friends, and neighbours are able to provide sustained care to frail elderly Canadians. Using national survey data, we examined characteristics of the care networks of 1,104 seniors living with a long-term health problem. Care networks were found to…

  8. Friending Adolescents on Social Networking Websites: A Feasible Research Tool.

    Science.gov (United States)

    Brockman, Libby N; Christakis, Dimitri A; Moreno, Megan A

    2014-01-01

    Social networking sites (SNSs) are increasingly used for research. This paper reports on two studies examining the feasibility of friending adolescents on SNSs for research purposes. Study 1 took place on www.MySpace.com where public profiles belonging to 18-year-old adolescents received a friend request from an unknown physician. Study 2 took place on www.Facebook.com where college freshmen from two US universities, enrolled in an ongoing research study, received a friend request from a known researcher's profile. Acceptance and retention rates of friend requests were calculated for both studies. Study 1: 127 participants received a friend request; participants were 18 years-old, 62.2% male and 51.8% Caucasian. 49.6% accepted the friend request. After 9 months, 76% maintained the online friendship, 12.7% defriended the study profile and 11% deactivated their profile. Study 2: 338 participants received a friend request; participants were 18 years-old, 56.5% female and 75.1% Caucasian. 99.7% accepted the friend request. Over 12 months, 3.3% defriended the study profile and 4.1% deactivated their profile. These actions were often temporary; the overall 12-month friendship retention rate was 96.1%. Friending adolescents on SNSs is feasible and friending adolescents from a familiar profile may be more effective for maintaining online friendship with research participants over time.

  9. Remotely Exploiting AT Command Attacks on ZigBee Networks

    Directory of Open Access Journals (Sweden)

    Ivan Vaccari

    2017-01-01

    Full Text Available Internet of Things networks represent an emerging phenomenon bringing connectivity to common sensors. Due to the limited capabilities and to the sensitive nature of the devices, security assumes a crucial and primary role. In this paper, we report an innovative and extremely dangerous threat targeting IoT networks. The attack is based on Remote AT Commands exploitation, providing a malicious user with the possibility of reconfiguring or disconnecting IoT sensors from the network. We present the proposed attack and evaluate its efficiency by executing tests on a real IoT network. Results demonstrate how the threat can be successfully executed and how it is able to focus on the targeted nodes, without affecting other nodes of the network.

  10. Network Enabled Operations: The Experiences of Senior Canadian Commanders

    Science.gov (United States)

    2006-03-31

    réseaux technologiques, et leur valeur les uns par rapport aux autres. Les commandants interrogés reconnaissent que les opérations actuelles nécessitent à...the best basis for CF transformation to build upon? • How does one go about creating an effective social network in joint and multinational...environments? • Is the presence or absence of an effective social network a factor in the success of an operation? • Was there any confusion evident

  11. Friends First? The Peer Network Origins of Adolescent Dating

    Science.gov (United States)

    Kreager, Derek A.; Molloy, Lauren E.; Moody, James; Feinberg, Mark E.

    2015-01-01

    The proximity of dating partners in peer friendship networks has important implications for the diffusion of health-risk behaviors and adolescent social development. We derive two competing hypotheses for the friendship-romance association. The first predicts that daters are proximally positioned in friendship networks prior to dating and that opposite-gender friends are likely to transition to dating. The second predicts that dating typically crosses group boundaries and opposite-gender friends are unlikely to later date. We test these hypotheses with longitudinal friendship data for 626 9th grade PROSPER heterosexual dating couples. Results primarily support the second hypothesis: romantic partners are unlikely to be friends in the previous year or share the same cohesive subgroup, and opposite-gender friends are unlikely to transition into dating. PMID:27134511

  12. User-friendly matching protocol for online social networks

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in user can match her profile with that of an off-line stranger, while both profiles are maximally protected. Our solution

  13. Towards Psychometrics-based Friend Recommendations in Social Networking Services

    OpenAIRE

    Beierle, Felix; Grunert, Kai; Göndör, Sebastian; Schlüter, Viktor

    2017-01-01

    Two of the defining elements of Social Networking Services are the social profile, containing information about the user, and the social graph, containing information about the connections between users. Social Networking Services are used to connect to known people as well as to discover new contacts. Current friend recommendation mechanisms typically utilize the social graph. In this paper, we argue that psychometrics, the field of measuring personality traits, can help make meaningful frie...

  14. A Generic Data Exchange System for Friend-to-Friend Networks

    OpenAIRE

    Soler, Cyril

    2017-01-01

    Decentralized private networks (a.k.a. darknets) guaranty privacy and concealment of information against global observers. Although a significant number of decentralized data distribution systems ex- ist, most of them target peer-to-peer architectures where any pair of nodes can exchange data using a temporary encrypted connection. Little has been done to achieve the same confidentiality in static darknet architectures, also known as “Friend-to-Friend” net- works, in which participants form a...

  15. Friends of friends: are indirect connections in social networks important to animal behaviour?

    Science.gov (United States)

    Brent, Lauren J N

    2015-05-01

    Friend of a friend relationships, or the indirect connections between people, influence our health, well-being, financial success and reproductive output. As with humans, social behaviours in other animals often occur within a broad interconnected network of social ties. Yet studies of animal social behaviour tend to focus on associations between pairs of individuals. With the increase in popularity of social network analysis, researchers have started to look beyond the dyad to examine the role of indirect connections in animal societies. Here, I provide an overview of the new knowledge that has been uncovered by these studies. I focus on research that has addressed both the causes of social behaviours, i.e. the cognitive and genetic basis of indirect connections, as well as their consequences, i.e. the impact of indirect connections on social cohesion, information transfer, cultural practices and fitness. From these studies, it is apparent that indirect connections play an important role in animal behaviour, although future research is needed to clarify their contribution.

  16. Network Centric Warfare, Command, and the Nature of War

    Science.gov (United States)

    2009-05-21

    80 Consequently, Frederick‘s army was the first into Silesia in 1740 and first into Saxony 1756.81 Preemption provided Frederick a great advantage in...refinement, of what is developing into a clearer picture of the essence of command. Eisenhower‘s circumstances are again unique; therefore, the analysis...differences, and construct a common picture ,‖ the advantages are unlikely to be that pronounced because understanding is not the same as developing a

  17. Using LTE Networks for UAV Command and Control Link: A Rural-Area Coverage Analysis

    DEFF Research Database (Denmark)

    Nguyen, Huan Cong; Amorim, Rafhael Medeiros de; Wigard, Jeroen

    2017-01-01

    In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss on the hei......In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss...

  18. Underage Use of Social Network Sites: It's About Friends.

    Science.gov (United States)

    Barbovschi, Monica; Macháčková, Hana; Ólafsson, Kjartan

    2015-06-01

    European self-regulation to ensure children's safety on social networking sites (SNS) stipulates that children should be old enough to use their services. However, a growing number of children are not. Drawing on data from the Net Children Go Mobile (NCGM) project (2012-2014), this study focuses on children aged 9-12 years, among whom 42% have a profile on Facebook, many with the explicit permission of their parents, despite the explicit policy allowing only children aged 13 years and older. Yet, such parental influence is not the only factor contributing to an underage child having a profile. Hierarchical logistic regressions were conducted in which the odds of having a profile on Facebook among children aged 9-12 years (N=1,723) were predicted. After controlling for demographic variables, Facebook use was connected to daily use of the Internet from home (bedroom and other places), looking for new friends online, and online disinhibition (e.g., being able to talk about different things on the Internet than when speaking to people face-to-face). In terms of parental mediation, restrictions lower the probabilities of an underage child having a SNS profile, while active parental mediation increases the odds. In addition to parental mediation, peer mediation increases the chances of underage Facebook use, indicating that children play a significant role in influencing each other in adoption of new technologies and applications. Finally, digital skills related to communication have a significant effect, suggesting an integrated adoption of communicative practices online. Daily use of mobile devices had no effect in the model.

  19. Friending adolescents on social networking websites: a feasible research tool

    National Research Council Canada - National Science Library

    Brockman, Libby N; Christakis, Dimitri A; Moreno, Megan A

    2014-01-01

    .... Study 2 took place on http://www.Facebook.com where college freshmen from two US universities, enrolled in an ongoing research study, received a friend request from a known researcher’s profile...

  20. Social Networking for the Older and Wiser Connect with Family, and Friends Old and New

    CERN Document Server

    McManus, Sean

    2010-01-01

    Social networks enable anyone with a computer and Internet connection to stay in touch with friends and family across the globe, and rediscover old acquaintances.  Social Networking for the Older and Wiser starts with the basics of social networks, before moving onto intermediate topics, all whilst highlighting ways to protect your privacy and keep your details secure. The book is packed with step-by-step instructions on how to use Facebook, Twitter, Friends Reunited, Saga Zone, and other social networks to:Create an account on your chosen social networkReconnect and stay-in-touch with old fr

  1. Information Superiority/Battle Command (Network Centric Warfare Environment)

    Science.gov (United States)

    2004-06-01

    on the Move (BCOTM). To this end a multiplicity of subtasks have been articulated to include: 1) Evaluate future data radio, wireless , personal...Multinational Communcations Systems. Requirement for Dedicated All Weather Communications Relay platforms. Requirement for Higher level of Networking

  2. Which friends are more popular than you? Contact strength and the friendship paradox in social networks

    OpenAIRE

    Bagrow, James P.; Christopher M. Danforth; Mitchell, Lewis

    2017-01-01

    The friendship paradox states that in a social network, egos tend to have lower degree than their alters, or, "your friends have more friends than you do". Most research has focused on the friendship paradox and its implications for information transmission, but treating the network as static and unweighted. Yet, people can dedicate only a finite fraction of their attention budget to each social interaction: a high-degree individual may have less time to dedicate to individual social links, f...

  3. MyGeneFriends: A Social Network Linking Genes, Genetic Diseases, and Researchers.

    Science.gov (United States)

    Allot, Alexis; Chennen, Kirsley; Nevers, Yannis; Poidevin, Laetitia; Kress, Arnaud; Ripp, Raymond; Thompson, Julie Dawn; Poch, Olivier; Lecompte, Odile

    2017-06-16

    The constant and massive increase of biological data offers unprecedented opportunities to decipher the function and evolution of genes and their roles in human diseases. However, the multiplicity of sources and flow of data mean that efficient access to useful information and knowledge production has become a major challenge. This challenge can be addressed by taking inspiration from Web 2.0 and particularly social networks, which are at the forefront of big data exploration and human-data interaction. MyGeneFriends is a Web platform inspired by social networks, devoted to genetic disease analysis, and organized around three types of proactive agents: genes, humans, and genetic diseases. The aim of this study was to improve exploration and exploitation of biological, postgenomic era big data. MyGeneFriends leverages conventions popularized by top social networks (Facebook, LinkedIn, etc), such as networks of friends, profile pages, friendship recommendations, affinity scores, news feeds, content recommendation, and data visualization. MyGeneFriends provides simple and intuitive interactions with data through evaluation and visualization of connections (friendships) between genes, humans, and diseases. The platform suggests new friends and publications and allows agents to follow the activity of their friends. It dynamically personalizes information depending on the user's specific interests and provides an efficient way to share information with collaborators. Furthermore, the user's behavior itself generates new information that constitutes an added value integrated in the network, which can be used to discover new connections between biological agents. We have developed MyGeneFriends, a Web platform leveraging conventions from popular social networks to redefine the relationship between humans and biological big data and improve human processing of biomedical data. MyGeneFriends is available at lbgi.fr/mygenefriends.

  4. Traffic Command Gesture Recognition for Virtual Urban Scenes Based on a Spatiotemporal Convolution Neural Network

    Directory of Open Access Journals (Sweden)

    Chunyong Ma

    2018-01-01

    Full Text Available Intelligent recognition of traffic police command gestures increases authenticity and interactivity in virtual urban scenes. To actualize real-time traffic gesture recognition, a novel spatiotemporal convolution neural network (ST-CNN model is presented. We utilized Kinect 2.0 to construct a traffic police command gesture skeleton (TPCGS dataset collected from 10 volunteers. Subsequently, convolution operations on the locational change of each skeletal point were performed to extract temporal features, analyze the relative positions of skeletal points, and extract spatial features. After temporal and spatial features based on the three-dimensional positional information of traffic police skeleton points were extracted, the ST-CNN model classified positional information into eight types of Chinese traffic police gestures. The test accuracy of the ST-CNN model was 96.67%. In addition, a virtual urban traffic scene in which real-time command tests were carried out was set up, and a real-time test accuracy rate of 93.0% was achieved. The proposed ST-CNN model ensured a high level of accuracy and robustness. The ST-CNN model recognized traffic command gestures, and such recognition was found to control vehicles in virtual traffic environments, which enriches the interactive mode of the virtual city scene. Traffic command gesture recognition contributes to smart city construction.

  5. Learning from Your Network of Friends: A Trajectory Representation Learning Model Based on Online Social Ties

    KAUST Repository

    Alharbi, Basma Mohammed

    2017-02-07

    Location-Based Social Networks (LBSNs) capture individuals whereabouts for a large portion of the population. To utilize this data for user (location)-similarity based tasks, one must map the raw data into a low-dimensional uniform feature space. However, due to the nature of LBSNs, many users have sparse and incomplete check-ins. In this work, we propose to overcome this issue by leveraging the network of friends, when learning the new feature space. We first analyze the impact of friends on individuals\\'s mobility, and show that individuals trajectories are correlated with thoseof their friends and friends of friends (2-hop friends) in an online setting. Based on our observation, we propose a mixed-membership model that infers global mobility patterns from users\\' check-ins and their network of friends, without impairing the model\\'s complexity. Our proposed model infers global patterns and learns new representations for both usersand locations simultaneously. We evaluate the inferred patterns and compare the quality of the new user representation against baseline methods on a social link prediction problem.

  6. Command Filtered Adaptive Fuzzy Neural Network Backstepping Control for Marine Power System

    Directory of Open Access Journals (Sweden)

    Xin Zhang

    2014-01-01

    Full Text Available In order to retrain chaotic oscillation of marine power system which is excited by periodic electromagnetism perturbation, a novel command-filtered adaptive fuzzy neural network backstepping control method is designed. First, the mathematical model of marine power system is established based on the two parallel nonlinear model. Then, main results of command-filtered adaptive fuzzy neural network backstepping control law are given. And the Lyapunov stability theory is applied to prove that the system can remain closed-loop asymptotically stable with this controller. Finally, simulation results indicate that the designed controller can suppress chaotic oscillation with fast convergence speed that makes the system return to the equilibrium point quickly; meanwhile, the parameter which induces chaotic oscillation can also be discriminated.

  7. Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks

    OpenAIRE

    Cetto, Alexandra; Netter, Michael; Pernul, Günther; Richthammer, Christian; Riesner, Moritz; Roth, Christian; Sänger, Johannes

    2014-01-01

    Currently, many users of Social Network Sites are insufficiently aware of who can see their shared personal items. Nonetheless, most approaches focus on enhancing privacy in Social Networks through improved privacy settings, neglecting the fact that privacy awareness is a prerequisite for privacy control. Social Network users first need to know about privacy issues before being able to make adjustments. In this paper, we introduce Friend Inspector, a serious game that allows its users to play...

  8. Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks (Best Paper Award)

    OpenAIRE

    Cetto, Alexandra; Netter, Michael; Pernul, Günther; Richthammer, Christian; Riesner, Moritz; Roth, Christian; Sänger, Johannes

    2014-01-01

    Currently, many users of Social Network Sites are insufficiently aware of who can see their shared personal items. Nonetheless, most approaches focus on enhancing privacy in Social Networks through improved privacy settings, neglecting the fact that privacy awareness is a prerequisite for privacy control. Social Network users first need to know about privacy issues before being able to make adjustments. In this paper, we introduce Friend Inspector, a serious game that allows its users to play...

  9. Friends, family, and foes: the influence of father's social networks.

    Science.gov (United States)

    Murphy, Alexandrea Danielle; Gordon, Derrick; Sherrod, Hans; Dancy, Victoria; Kershaw, Trace

    2013-05-01

    Fathers can play an important role in child development and family functioning. However, little is known about the influence of paternal perceptions of fatherhood involvement or the influence of fathers' peer networks. We explored the network characteristics (density, closeness, and degree centrality) and peer norms regarding sex, fatherhood, and other risk behaviors of 52 urban adult males in New Haven, Connecticut. Results identify that engagement in high-risk sexual behavior was associated with fatherhood involvement, with 88% of less involved fathers engaging in high-risk sexual behavior (p = .004). Denser networks were positively correlated with unfavorable peer norms such as cheating on a partner or drinking or using drugs (p networks are important to father's health and behavior and that father's behaviors may be affected by peer norms. Interventions designed for men may be strengthened by including peers in programming and by addressing norms and norm changing.

  10. Online social networking amongst teens: friend or foe?

    Science.gov (United States)

    O'Dea, Bridianne; Campbell, Andrew

    2011-01-01

    The impact of Internet communication on adolescent social development is of considerable importance to health professionals, parents and teachers. Online social networking and instant messaging programs are popular utilities amongst a generation of techno-savvy youth. Although these utilities provide varied methods of communication, their social benefits are still in question. This study examined the relationship between online social interaction, perceived social support, self-esteem and psychological distress amongst teens. A total of 400 participants (M(age) = 14.31 years) completed an online survey consisting of parametric and non-parametric measures. No significant relationship was found between online interaction and social support. Time spent interacting online was negatively correlated with self-esteem and psychological distress. While previous research has focused on young adults, this study examines the impact of online social networking on emerging teens. It highlights the need for continued caution in the acceptance of these utilities.

  11. Centrality in children's best friend networks: the role of social behaviour.

    Science.gov (United States)

    Betts, Lucy R; Stiller, James

    2014-03-01

    Centrality is an indicator of an individual's relative importance within a social group. Predictors of centrality in best friendship networks were examined in 146 children (70 boys and 76 girls, Mage  = 9.95). Children completed measures of social confidence, social desirability, friendship quality, school liking, and loneliness and nominated their best friends from within their class at two time points, 3 months apart. Multigroup path analysis revealed gender differences in the antecedents of centrality. Social confidence, social desirability, and friendship quality predicted changes in the indicators of centrality in best friend networks over time. Boys' social behaviour positively predicted changes in centrality, whereas girls' social behaviour negatively predicted changes in centrality. Together, these findings suggest that some aspects of social behaviour are influential for centrality in best friend groups. © 2013 The British Psychological Society.

  12. Family and Friends: Which Types of Personal Relationships Go Together in a Network?

    Science.gov (United States)

    Rözer, Jesper; Mollenhorst, Gerald; Poortman, Anne-Rigt

    We examine the link between family and personal networks. Using arguments about meeting opportunities, competition and social influence, we hypothesise how the presence of specific types of family members (i.e., a partner, children, parents and siblings) and non-family members (i.e., friends, neighbours and colleagues) in the network mutually affect one another. In addition, we propose that-beyond their mere presence-the active role of family members in the network strongly affects the presence of non-family members in the network. Data from the third wave of the Survey on the Social Networks of the Dutch, collected in 2012 and 2013, show that active involvement is of key importance; more than merely having family members present in one's personal network, the active involvement of specific types of family members in the personal network is associated with having disproportionally more other family members and having somewhat fewer non-family members in the network.

  13. Motives for online friending and following: The dark side of social network site connections

    NARCIS (Netherlands)

    Ouwerkerk, J.W.; Johnson, B.K.

    Motives for “friending,” following, or connecting with others on social network sites are often positive, but darker motives may also play an important role. A survey with a novel Following Motives Scale (FMS) demonstrates accordingly that positive, sociable motives (i.e., others providing a valued

  14. Family and Friends: Which Types of Personal Relationships Go Together in a Network?

    NARCIS (Netherlands)

    Rözer, J.; Mollenhorst, G.; Poortman, A.R.

    2015-01-01

    We examine the link between family and personal networks. Using arguments about meeting opportunities, competition and social influence, we hypothesise how the presence of specific types of family members (i.e., a partner, children, parents and siblings) and non-family members (i.e., friends,

  15. Family and Friends : Which Types of Personal Relationships Go Together in a Network?

    NARCIS (Netherlands)

    Rözer, Jesper; Mollenhorst, Gerald; Poortman, Anne Rigt

    We examine the link between family and personal networks. Using arguments about meeting opportunities, competition and social influence, we hypothesise how the presence of specific types of family members (i.e., a partner, children, parents and siblings) and non-family members (i.e., friends,

  16. An algorithm for identifying the best current friend in a social network

    Directory of Open Access Journals (Sweden)

    Francisco Javier Moreno

    2015-05-01

    Full Text Available A research field in the area of social networks (SNs is the identification of some types of users and groups. To facilitate this process, a SN is usually represented by a graph. The centrality measures, which identify the most important vertices in a graph according to some criterion, are usual tools to analyze a graph. One of these measures is the PageRank (a measure originally designed to classify web pages. Informally, in the context of a SN, the PageRank of a user i represents the probability that another user of the SN is seeing the page of i after a considerable time of navigation in the SN. In this paper, we define a new type of user in a SN: the best current friend. The idea is to identify, among the friends of a user i, who is the friend k that would generate the highest decrease in the PageRank of i if k stops being his/her friend. This may be useful to identify the users/customers whose friendship/relationship should be a priority to keep. We provide formal definitions, algorithms and some experiments for this subject. Our experiments showed that the best current friend of a user is not necessarily the one who has the highest PageRank in the SN nor the one who has more friends.

  17. Professionalism and social networking: can patients, physicians, nurses, and supervisors all be "friends?".

    Science.gov (United States)

    Peluchette, Joy; Karl, Katherine; Coustasse, Alberto; Emmett, Dennis

    2012-01-01

    The purpose of this study was to examine the use of social networking (Facebook) among nurse anesthetists. We examined whether they would have concerns about their supervisor, patients, or physicians seeing their Facebook profile. We also examined their attitudes related to maintaining professional boundaries with regard to the initiation or receipt of Facebook "friend" requests from their supervisor, patients, or physicians they work with. Our respondents consisted of 103 nurses currently enrolled in a graduate-level nurse anesthetist program. All respondents had a minimum of 2 years of work experience in critical care nursing. Most respondents were found to be neutral about physicians and supervisors viewing their Facebook profiles but expressed concerns about patients seeing such information. A vast majority indicated they would accept a friend request from their supervisor and a physician but not a patient. Surprisingly, about 40% had initiated a friend request to their supervisor or physician they work with. Implications for health care managers are discussed.

  18. Interactions with parents and friends among chronically ill children: examining social networks.

    Science.gov (United States)

    Herzer, Michele; Umfress, Kris; Aljadeff, Gabriel; Ghai, Kanika; Zakowski, Sandra G

    2009-12-01

    Children with medical conditions often experience a combination of positive and negative social interactions with parents and friends. Adult research examining cross-domain buffering effects has documented that supportive social ties can make up for shortcomings in other social relationships. This study examined whether negative effects of strained relationships with loved ones can be buffered when children feel supported by individuals in different support networks (i.e., cross-domain buffering effects). Children with Type I diabetes (n = 56), chronic asthma (n = 54), and cystic fibrosis (n = 17) completed questionnaires during an outpatient hospital visit that assessed perceptions of support and strain from parents and friends, quality of life, self-concept, and emotional/behavioral difficulties. Parental strain was conceptualized as parental overprotection and parental rejection. Hierarchical regression analyses showed that friend support buffered the adverse effects of parental strain on child quality of life, self-concept, and emotional/behavioral difficulties. Interestingly, parental support did not buffer the negative effects of experiencing strained relationships with friends; only main effects on outcome were found. These findings partially support our hypotheses of cross-domain buffering. In this study, friendships were a protective factor for children who experienced strained relationships with parents. In contrast, although parent support had a direct impact on child outcome, it did not make up for feeling rejected by friends. Because close relationships are often strained during medical stressors, findings underscore the importance of promoting social connectedness in chronically ill children to maximize opportunities for experiencing positive social relationships.

  19. Non-linear commands of DC to DC converters based on neural networks; Commandes non-lineaires des convertisseurs continu-continus a base de reseaux de neurones

    Energy Technology Data Exchange (ETDEWEB)

    Jammes, B. [Centre National de la Recherche Scientifique (CNRS), 31 - Toulouse (France). Laboratoire d`Analyse et d`Architecture des Systemes; Dragos, A. [Bucharest Univ. Politechnica (Romania)

    1998-11-01

    In this paper, artificial neural networks are used to elaborate non-linear control of the average output voltage of Buck and Boost converters. The training of the regulator is based on the adjustment technique used by indirect adaptative command structures. These techniques require a system model and performances of inputs/outputs and state models are compared. It is shown that this approach allows to generate non-linear regulators for the converters under study, but it is preferable to introduce some modifications in order to facilitate the training of the regulator. (J.S.) 4 refs.

  20. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    Science.gov (United States)

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In

  1. An Appraisal of Asia-Pacific Cities as Control and Command Centres Embedded in World City Network

    Directory of Open Access Journals (Sweden)

    Z. Li

    2017-08-01

    Full Text Available Since the globalization trend is proliferating at a staggering rate, world cities have emerged as the most dominant vanguard incorporated into global economy. Control and command function is one of the robust integral parts of world city formation, which is closely associated with the corporate headquarter status of some dominant multinational companies. Previous research works on this topic tend to concentrate on the Western Europe and North American arenas neglecting the Asia-Pacific region. Hence, the objective of this paper is to explore control and command functions of Asia-Pacific cities with reference to headquarters’ locations of multinational companies. The methodology will utilize the Forbes global 2000 dataset from the seminal study of GaWC research group, and apply the control and command center model and the interlocking city network model to discover the control and command index, as well as network connectivity of Asia-Pacific cities. Based upon the empirical study of this research, we could identify the hierarchical structure and spatial structure of Asia-Pacific world cities to emerge as some control and command centers embedded in world city network.

  2. Experimental and Theoretical Analysis of Storage Friendly TCP Performance in Distributed Storage Area Network

    Directory of Open Access Journals (Sweden)

    Suresh Muknahallipatna

    2007-08-01

    Full Text Available Fibre channel storage area networks (SAN are widely implemented in production data center environments. Recently the storage industry has moved towards deployment of distributed SANs (DSAN, geographically dispersed across large physical distances. In a DSAN, specialized gateway devices interconnect the individual Fibre Channel (FC fabrics over IP networks using TCP/IP based protocols (iFCP or FCIP or over metro to long distance optical networks such as Dense Wavelength Division Multiplexing (DWDM based networks that utilize native FC ports supporting large numbers of link credits. When using TCP/IP based storage networking protocols to interconnect local FC fabrics in a DSAN, the sustained throughput achievable depends upon the link characteristics and TCP/IP stack implementation. Sustaining maximum possible storage traffic throughput across the wide area network enables practical DSAN deployments by maintaining the required site to site service level agreements.This study explores the effects of several TCP/IP modifications on sustained traffic throughput for a DSAN interconnected via iFCP gateways across an impaired network. The TCP/IP stack modifications, known as storage friendly, include changes to the window scaling, congestion avoidance, and fast recovery algorithms. The theoretical background and experimental results are presented to explain and illustrate these modifications.

  3. MySpace and Facebook: applying the uses and gratifications theory to exploring friend-networking sites.

    Science.gov (United States)

    Raacke, John; Bonds-Raacke, Jennifer

    2008-04-01

    The increased use of the Internet as a new tool in communication has changed the way people interact. This fact is even more evident in the recent development and use of friend-networking sites. However, no research has evaluated these sites and their impact on college students. Therefore, the present study was conducted to evaluate: (a) why people use these friend-networking sites, (b) what the characteristics are of the typical college user, and (c) what uses and gratifications are met by using these sites. Results indicated that the vast majority of college students are using these friend-networking sites for a significant portion of their day for reasons such as making new friends and locating old friends. Additionally, both men and women of traditional college age are equally engaging in this form of online communication with this result holding true for nearly all ethnic groups. Finally, results showed that many uses and gratifications are met by users (e.g., "keeping in touch with friends"). Results are discussed in light of the impact that friend-networking sites have on communication and social needs of college students.

  4. TROVE: A User-friendly Tool for Visualizing and Analyzing Cancer Hallmarks in Signaling Networks.

    Science.gov (United States)

    Chua, Huey Eng; Bhowmick, Sourav S; Zheng, Jie

    2017-09-22

    Cancer hallmarks, a concept that seeks to explain the complexity of cancer initiation and development, provide a new perspective of studying cancer signaling which could lead to a greater understanding of this complex disease. However, to the best of our knowledge, there is currently a lack of tools that support such hallmark-based study of the cancer signaling network, thereby impeding the gain of knowledge in this area. We present TROVE, a user-friendly software that facilitates hallmark annotation, visualization and analysis in cancer signaling networks. In particular, TROVE facilitates hallmark analysis specific to particular cancer types. Available under the Eclipse Public License from: https://sites.google.com/site/cosbyntu/softwares/trove and https://github.com/trove2017/Trove. hechua@ntu.edu.sg or assourav@ntu.edu.sg.

  5. The role of gender and friends' gender on peer socialization of adolescent drinking: a prospective multilevel social network analysis.

    Science.gov (United States)

    Deutsch, Arielle R; Steinley, Douglas; Slutske, Wendy S

    2014-09-01

    Although socializing effects of friends' drinking on adolescent drinking behavior have been firmly established in previous literature, study results on the importance of gender, as well as the specific role that gender may play in peer socialization, are very mixed. Given the increasing importance of gender in friendships (particularly opposite-sex friendships) during adolescence, it is necessary to better understand the nuanced roles that gender can play in peer socialization effects on alcohol use. In addition, previous studies focusing on the interplay between individual gender and friends' gender have been largely dyadic; less is known about potential gendered effects of broader social networks. The current study sought to further investigate potential effects of gender on friends' influence on adolescent drinking behavior with particular emphasis on the number of same-sex and opposite-sex friends within one's friendship network, as well as closeness to these friends. Using Waves I and II of the saturated sample of the National Longitudinal Study of Adolescent Health (Add Health), adolescent friendship networks were used to calculate the mean drinking behaviors of adolescent friends. Multi-level models estimated the effects of individual drinking behaviors, friend drinking behaviors, and school-level drinking behaviors on adolescent drinking 1 year later, as well as moderating effects of gender composition of friendship groups and male and female friend closeness on the relationship between friends' drinking behaviors and adolescent drinking behavior. Results documented that gender composition of friendship groups did not influence the effect of friends' drinking on individual drinking 1 year later. However, closeness to friends did influence this relationship. As closeness to male friends decreased, the influence of their drinking behavior increased, for both boys and girls. A similar effect was found for female friends, but only for boys. Female friend

  6. From social network to safety net: Dementia-friendly communities in rural northern Ontario.

    Science.gov (United States)

    Wiersma, Elaine C; Denton, Alison

    2016-01-01

    Dementia-friendly communities, as communities that enable people with dementia to remain involved and active and have control over their lives for as long as possible, centrally involve social support and social networks for people living with dementia. The purpose of this research was to explore and understand the context of dementia in rural northern communities in Ontario with an emphasis on understanding how dementia friendly the communities were. Using qualitative methods, interviews were conducted with a total of 71 participants, including 37 health service providers, 15 care partners, 2 people living with dementia and 17 other community members such as local business owners, volunteers, local leaders, friends and neighbours. The strong social networks and informal social support that were available to people living with dementia, and the strong commitment by community members, families and health care providers to support people with dementia, were considered a significant asset to the community. A culture of care and looking out for each other contributed to the social support provided. In particular, the familiarity with others provided a supportive community environment. People with dementia were looked out for by community members, and continued to remain connected in their communities. The social support provided in these communities demonstrated that although fragile, this type of support offered somewhat of a safety net for individuals living with dementia. This work provides important insights into the landscape of dementia in rural northern Ontario communities, and the strong social supports that sustain people with dementia remaining in the communities. © The Author(s) 2013.

  7. Human-Systems Integration (HSI) and the Network Integration Evaluations (NIEs), Part 3: Mitigating Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2016-06-01

    in NIE CPs primarily involve ICTs . Levy and Murnane (2012) argue that the increasing use of ...require higher levels of mental ability as well as higher levels of education , training, and experience for effective use . In short, ICT insertions such...key aspects of cognitive load in mission command and network/S6 operations. ARL/HRED personnel also used this SME after the fact to assist in

  8. Consequences of family and friends (social network) influences on pupils’ interest in science careers: A Scottish Perspective

    OpenAIRE

    Rodrigues, Susan; Jindal-Snape, Divya

    2010-01-01

    The project reported in this article investigated the views of 546 pupils aged 14 - 15 years drawn from 5 schools in one Scottish city. This article reports on the influence of the family and friends element of Bourdieu’s, Coleman’s and Putnam’s social networks and civic norms, on pupils’ views about science careers. Coleman (1988) suggests that social networks and civic norms influence attainment and engagement. Buchmann and Dalton (2000) suggest that social networks and civic norms mediate ...

  9. Facebook friends with (health) benefits? Exploring social network site use and perceptions of social support, stress, and well-being.

    Science.gov (United States)

    Nabi, Robin L; Prestin, Abby; So, Jiyeon

    2013-10-01

    There is clear evidence that interpersonal social support impacts stress levels and, in turn, degree of physical illness and psychological well-being. This study examines whether mediated social networks serve the same palliative function. A survey of 401 undergraduate Facebook users revealed that, as predicted, number of Facebook friends associated with stronger perceptions of social support, which in turn associated with reduced stress, and in turn less physical illness and greater well-being. This effect was minimized when interpersonal network size was taken into consideration. However, for those who have experienced many objective life stressors, the number of Facebook friends emerged as the stronger predictor of perceived social support. The "more-friends-the-better" heuristic is proposed as the most likely explanation for these findings.

  10. Social Network Analysis Reveals the Negative Effects of Attention-Deficit/Hyperactivity Disorder (ADHD) Symptoms on Friend-Based Student Networks

    OpenAIRE

    Jun Won Kim; Bung-Nyun Kim; Johanna Inhyang Kim; Young Sik Lee; Kyung Joon Min; Hyun-Jin Kim; Jaewon Lee

    2015-01-01

    Introduction Social network analysis has emerged as a promising tool in modern social psychology. This method can be used to examine friend-based social relationships in terms of network theory, with nodes representing individual students and ties representing relationships between students (e.g., friendships and kinships). Using social network analysis, we investigated whether greater severity of ADHD symptoms is correlated with weaker peer relationships among elementary school students. Met...

  11. The Commanding Officer’s Perspective on Protecting Shipboard IT Networks

    Science.gov (United States)

    2014-09-01

    Position on WIFI for ships in port. ..................................................................31 Table 8. How/when to implement a cyber...States Cyber Command USN United States Navy VADM vice admiral WCS Weapons Control System WEPS weapons officer WIFI wireless fidelity XO...While the AWS is extremely critical and could prove the most dangerous if infiltrated by adversaries, other shipboard systems (e.g., navigation

  12. Show me your friends and I will tell you what type of person you are: how own profile, number of friends, and type of friends influence impression formation on social network sites

    NARCIS (Netherlands)

    Utz, S.

    2010-01-01

    This experiment examines how far extraversion of the target (self-generated information), extraversion of the target's friends (friends-generated information), and number of friends (system-generated information) influence the perceived popularity, communal orientation, and social attractiveness of

  13. Sensor Network-Based and User-Friendly User Location Discovery for Future Smart Homes.

    Science.gov (United States)

    Ahvar, Ehsan; Lee, Gyu Myoung; Han, Son N; Crespi, Noel; Khan, Imran

    2016-06-27

    User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD) will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i) users' privacy; (ii) device-/tag-free; and (iii) fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.

  14. Sensor Network-Based and User-Friendly User Location Discovery for Future Smart Homes

    Directory of Open Access Journals (Sweden)

    Ehsan Ahvar

    2016-06-01

    Full Text Available User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i users’ privacy; (ii device-/tag-free; and (iii fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.

  15. Motives for Online Friending and Following: The Dark Side of Social Network Site Connections

    Directory of Open Access Journals (Sweden)

    Jaap W. Ouwerkerk

    2016-08-01

    Full Text Available Motives for “friending,” following, or connecting with others on social network sites are often positive, but darker motives may also play an important role. A survey with a novel Following Motives Scale (FMS demonstrates accordingly that positive, sociable motives (i.e., others providing a valued source for humor and information, others sharing a common background, as well as relationship maintenance and inspirational motives (i.e., others providing a target for upward social comparison can be distinguished from darker motives related to insecurity (i.e., others providing reassurance, preference for online interaction, mediated voyeurism, as well as social obligation, and even darker antisocial motives related to self-enhancement (i.e., others providing a target for downward social comparison, competition, schadenfreude, gossip, as well as “hate-following”. Results show that lower self-esteem and higher levels of need for popularity, narcissism, and dispositional schadenfreude characterize users with stronger dark side motives, whereas users with more sociable motives report more satisfaction with life, thereby providing construct validity for the novel scale. Convergent validity is demonstrated by positive relations between following motives and both time spent and following counts on different social network sites. Moreover, an embedded experiment shows that antisocial motives predicted acceptance of a Facebook friendship request from a male or female high school acquaintance who suffered a setback in the domain of appearance or status (i.e., a convenient source for self-enhancement, thereby providing additional convergent validity for the Antisocial Motives subscale.

  16. Social Network Sites, Friends, and Celebrities: The Roles of Social Comparison and Celebrity Involvement in Adolescents’ Body Image Dissatisfaction

    OpenAIRE

    Ho, Shirley S.; Edmund W. J. Lee; Youqing Liao

    2016-01-01

    This study applies the social comparison theory to examine the effects of adolescents’ engagement in comparison with friends and celebrities on social network sites (SNSs) on (a) their body image dissatisfaction (BID) and (b) their drive to be thin (DT) or muscular (DM). The study also examines celebrity involvement as an antecedent of the outcome variables. Data were collected through a survey of 1,059 adolescents in Singapore. Regression analyses indicate that SNSs use was related to adoles...

  17. The Unspoken Consequence of Command, Control Communications Technology: Enhanced Micromanagement by Risk-Averse Commanders

    National Research Council Canada - National Science Library

    Carozza, John

    2004-01-01

    .... However, along with its benefits, this command, control and communications (C3) network includes the dangerous consequence of eroding the autonomy of tactical command through enhanced micromanagement by risk-averse operational commanders...

  18. Joint Networking Command and Control (C2) Communications Among Distributed Operations, JCAS, and Joint Fires

    Science.gov (United States)

    2007-06-01

    Law . Metcalfe’s Law observes that although the cost of deploying a network increases linearly with the number of nodes in the network, the potential...fasteners. Enviromental Spec Storage Temperature: -26 to 160 °F, Operating Temperature: -22 to 160 °F, Operating Humidity Range: 5% to 100% Non...Accessories Double 90° tongue and groove case design, with anti-tamper fasteners. Enviromental Spec Storage Temperature: -26 to 160 °F, Operating

  19. Building a Capabilities Network to Improve Disaster Preparation Efforts in the Southern Command (SOUTHCOM) Area of Responsibility (AOR)

    Science.gov (United States)

    2013-11-14

    SOUTHCOM, Pacific Command (PACOM), European Command (EUCOM), African Command (AFRICOM), and Central Command (CENTCOM). Two other projects, by Daniels...excellence, rooted in the utmost integrity and moral practice. Consistent with its spiritual foundation, Baptist Health is dedicated to providing high...potential for ethnic, tribal , religious, gang, and other conflict. Flexibility is at the core of our programming, and the conflict mitigation team employs

  20. Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns: e80682

    National Research Council Canada - National Science Library

    David A Siegel

    2013-01-01

      Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy...

  1. Will you accept the government's friend request? Social networks and privacy concerns

    National Research Council Canada - National Science Library

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy...

  2. Social Network Sites, Friends, and Celebrities: The Roles of Social Comparison and Celebrity Involvement in Adolescents’ Body Image Dissatisfaction

    Directory of Open Access Journals (Sweden)

    Shirley S. Ho

    2016-08-01

    Full Text Available This study applies the social comparison theory to examine the effects of adolescents’ engagement in comparison with friends and celebrities on social network sites (SNSs on (a their body image dissatisfaction (BID and (b their drive to be thin (DT or muscular (DM. The study also examines celebrity involvement as an antecedent of the outcome variables. Data were collected through a survey of 1,059 adolescents in Singapore. Regression analyses indicate that SNSs use was related to adolescents’ BID. Specifically, social comparison with friends on SNSs was significantly associated with adolescents’ BID, DT, and DM. Gender differences were also observed—social comparison with celebrities was significantly associated with BID and DT among female adolescents. Celebrity involvement was significantly associated with male BID. Theoretical and practical implications were discussed.

  3. ISP-Friendly Data Scheduling by Advanced Locality-Aware Network Coding for P2P Distribution Cloud

    Directory of Open Access Journals (Sweden)

    Yanjun Li

    2014-01-01

    Full Text Available Peer-to-peer (P2P file distribution imposes increasingly heavy traffic burden on the Internet service providers (ISPs. The vast volume of traffic pushes up ISPs’ costs in routing and investment and degrades their networks performance. Building ISP-friendly P2P is therefore of critical importance for ISPs and P2P services. So far most efforts in this area focused on improving the locality-awareness of P2P applications, for example, to construct overlay networks with better knowledge of the underlying network topology. There is, however, growing recognition that data scheduling algorithms also play an effective role in P2P traffic reduction. In this paper, we introduce the advanced locality-aware network coding (ALANC for P2P file distribution. This data scheduling algorithm completely avoids the transmission of linearly dependent data blocks, which is a notable problem of previous network coding algorithms. Our simulation results show that, in comparison to other algorithms, ALANC not only significantly reduces interdomain P2P traffic, but also remarkably improves both the application-level performance (for P2P services and the network-level performance (for ISP networks. For example, ALANC is 30% faster in distributing data blocks and it reduces the average traffic load on the underlying links by 40%. We show that ALANC holds the above gains when the tit-for-tat incentive mechanism is introduced or the overlay topology changes dynamically.

  4. A Legal Reasoning Component of a Network Security Command and Control System

    Science.gov (United States)

    2010-03-01

    systems for controlling the remote management of firewalls, intrusion detection systems (IDS), and other network components and subsystems cannot...regulatory team is also logged in to C3IOS either directly or indirectly via remote management software. The legal database is also available to all

  5. Friendship selection and friends' influence : Dynamics of networks and actor attributes in early adolescence

    NARCIS (Netherlands)

    Knecht, Andrea Beate

    2008-01-01

    Adolescent friends are often found to be similar. Similarity can be caused by selection and influence processes. This book examines selection and influence processes for delinquency, school attitudes, and alcohol use in early adolescence. For selection processes, we hypothesize that adolescents

  6. Friendship selection and friends' influence. Dynamics of networks and actor attributes in early adolescence

    NARCIS (Netherlands)

    Knecht, A.B.

    2008-01-01

    Adolescent friends are often found to be similar. Similarity can be caused by selection and influence processes. This book examines selection and influence processes for delinquency, school attitudes, and alcohol use in early adolescence. For selection processes, we hypothesize that adolescents

  7. Friending, IMing, and hanging out face-to-face: overlap in adolescents' online and offline social networks.

    Science.gov (United States)

    Reich, Stephanie M; Subrahmanyam, Kaveri; Espinoza, Guadalupe

    2012-03-01

    Many new and important developmental issues are encountered during adolescence, which is also a time when Internet use becomes increasingly popular. Studies have shown that adolescents are using these online spaces to address developmental issues, especially needs for intimacy and connection to others. Online communication with its potential for interacting with unknown others, may put teens at increased risk. Two hundred and fifty-one high school students completed an in-person survey, and 126 of these completed an additional online questionnaire about how and why they use the Internet, their activities on social networking sites (e.g., Facebook, MySpace) and their reasons for participation, and how they perceive these online spaces to impact their friendships. To examine the extent of overlap between online and offline friends, participants were asked to list the names of their top interaction partners offline and online (Facebook and instant messaging). Results reveal that adolescents mainly use social networking sites to connect with others, in particular with people known from offline contexts. While adolescents report little monitoring by their parents, there was no evidence that teens are putting themselves at risk by interacting with unknown others. Instead, adolescents seem to use the Internet, especially social networking sites, to connect with known others. While the study found moderate overlap between teens' closest online and offline friends, the patterns suggest that adolescents use online contexts to strengthen offline relationships. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  8. Social Network Analysis Reveals the Negative Effects of Attention-Deficit/Hyperactivity Disorder (ADHD Symptoms on Friend-Based Student Networks.

    Directory of Open Access Journals (Sweden)

    Jun Won Kim

    Full Text Available Social network analysis has emerged as a promising tool in modern social psychology. This method can be used to examine friend-based social relationships in terms of network theory, with nodes representing individual students and ties representing relationships between students (e.g., friendships and kinships. Using social network analysis, we investigated whether greater severity of ADHD symptoms is correlated with weaker peer relationships among elementary school students.A total of 562 sixth-graders from two elementary schools (300 males provided the names of their best friends (maximum 10 names. Their teachers rated each student's ADHD symptoms using an ADHD rating scale.The results showed that 10.2% of the students were at high risk for ADHD. Significant group differences were observed between the high-risk students and other students in two of the three network parameters (degree, centrality and closeness used to assess friendship quality, with the high-risk group showing significantly lower values of degree and closeness compared to the other students. Moreover, negative correlations were found between the ADHD rating and two social network analysis parameters.Our findings suggest that the severity of ADHD symptoms is strongly correlated with the quality of social and interpersonal relationships in students with ADHD symptoms.

  9. Social Network Analysis Reveals the Negative Effects of Attention-Deficit/Hyperactivity Disorder (ADHD) Symptoms on Friend-Based Student Networks.

    Science.gov (United States)

    Kim, Jun Won; Kim, Bung-Nyun; Kim, Johanna Inhyang; Lee, Young Sik; Min, Kyung Joon; Kim, Hyun-Jin; Lee, Jaewon

    2015-01-01

    Social network analysis has emerged as a promising tool in modern social psychology. This method can be used to examine friend-based social relationships in terms of network theory, with nodes representing individual students and ties representing relationships between students (e.g., friendships and kinships). Using social network analysis, we investigated whether greater severity of ADHD symptoms is correlated with weaker peer relationships among elementary school students. A total of 562 sixth-graders from two elementary schools (300 males) provided the names of their best friends (maximum 10 names). Their teachers rated each student's ADHD symptoms using an ADHD rating scale. The results showed that 10.2% of the students were at high risk for ADHD. Significant group differences were observed between the high-risk students and other students in two of the three network parameters (degree, centrality and closeness) used to assess friendship quality, with the high-risk group showing significantly lower values of degree and closeness compared to the other students. Moreover, negative correlations were found between the ADHD rating and two social network analysis parameters. Our findings suggest that the severity of ADHD symptoms is strongly correlated with the quality of social and interpersonal relationships in students with ADHD symptoms.

  10. Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2017-11-22

    system performance is often referred to as the “brittleness problem of automata” (Hollnagel and Woods 2005). These cautions from the flight management ... perspectives . IEEE Int Sys. 2006;21(4):70–73. Leistner F. Managing organizational knowledge flow: how to make knowledge sharing work. Hoboken (NJ...ARL-TN-0859 ● NOV 2017 US Army Research Laboratory Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled

  11. Distributed Agent-Based Networks in Support of Advanced Marine Corps Command and Control Concept

    Science.gov (United States)

    2012-09-01

    DRAMA Dynamic Re-addressing and Management for the Army DTCS Distributed Tactical Communications System ECA Event-Condition-Action ECO Enhanced...Company Operations EM Electro-Magnetic EMO Enhanced MAGTF Operations GPA Group Policy Agent GUI Graphic User Interface JIFX Joint Interagency...support monitoring of the network and automatically enforce appropriate actions. In general, policies are defined as Event-Condition-Action ( ECA ) clauses

  12. Interference Effects Redress over Power-Efficient Wireless-Friendly Mesh Networks for Ubiquitous Sensor Communications across Smart Cities

    Science.gov (United States)

    Marrero, Domingo; Macías, Elsa; Mena, Vicente

    2017-01-01

    Ubiquitous sensing allows smart cities to take control of many parameters (e.g., road traffic, air or noise pollution levels, etc.). An inexpensive Wireless Mesh Network can be used as an efficient way to transport sensed data. When that mesh is autonomously powered (e.g., solar powered), it constitutes an ideal portable network system which can be deployed when needed. Nevertheless, its power consumption must be restrained to extend its operational cycle and for preserving the environment. To this end, our strategy fosters wireless interface deactivation among nodes which do not participate in any route. As we show, this contributes to a significant power saving for the mesh. Furthermore, our strategy is wireless-friendly, meaning that it gives priority to deactivation of nodes receiving (and also causing) interferences from (to) the rest of the smart city. We also show that a routing protocol can adapt to this strategy in which certain nodes deactivate their own wireless interfaces. PMID:28754013

  13. Interference Effects Redress over Power-Efficient Wireless-Friendly Mesh Networks for Ubiquitous Sensor Communications across Smart Cities.

    Science.gov (United States)

    Santana, Jose; Marrero, Domingo; Macías, Elsa; Mena, Vicente; Suárez, Álvaro

    2017-07-21

    Ubiquitous sensing allows smart cities to take control of many parameters (e.g., road traffic, air or noise pollution levels, etc.). An inexpensive Wireless Mesh Network can be used as an efficient way to transport sensed data. When that mesh is autonomously powered (e.g., solar powered), it constitutes an ideal portable network system which can be deployed when needed. Nevertheless, its power consumption must be restrained to extend its operational cycle and for preserving the environment. To this end, our strategy fosters wireless interface deactivation among nodes which do not participate in any route. As we show, this contributes to a significant power saving for the mesh. Furthermore, our strategy is wireless-friendly, meaning that it gives priority to deactivation of nodes receiving (and also causing) interferences from (to) the rest of the smart city. We also show that a routing protocol can adapt to this strategy in which certain nodes deactivate their own wireless interfaces.

  14. Building a Capabilities Network to Improve Disaster Preparation Efforts in the Southern Command (SOUTHCOM) Area of Responsibility (AOR)

    OpenAIRE

    Harper, Terry D.; Koelkebeck, Lance; Fitz-Gerald, Timothy

    2013-01-01

    Approved for public release; distribution is unlimited. The U.S. Southern Command (SOUTHCOM) area of responsibility (AOR) encompasses 31 countries and 15 areas of special sovereignty, and represents about one-sixth of the landmass of the world assigned to regional unified commands. To provide rapid and effective disaster relief in an area this large, a commander requires identification of available resources and effective coordination with those who can provide these resources. This resear...

  15. A Net of Friends: Investigating Friendship by Integrating Attachment Theory and Social Network Analysis.

    Science.gov (United States)

    Gillath, Omri; Karantzas, Gery C; Selcuk, Emre

    2017-11-01

    The current article focuses on attachment style-an individual difference widely studied in the field of close relationships-and its application to the study of social networks. Specifically, we investigated whether attachment style predicts perception and management of social networks. In Study 1, we examined the associations of attachment style with perceptions of network tie strength and multiplexity. In Studies 2a and 2b, we investigated the association between attachment style and network management skills (initiating, maintaining, and dissolving ties) and whether network management skills mediated the associations of attachment style with network tie strength and multiplexity. In Study 3, experimentally enhancing attachment security made people more likely to initiate and less likely to dissolve social ties (for the latter, especially among those high on avoidance or anxiety). As for maintenance, security priming also increased maintenance; however, mainly among people high on attachment anxiety or low on attachment avoidance.

  16. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness

    Science.gov (United States)

    2016-06-22

    2012). Social Network Analysis. Los Angeles, CA: Sage. Snijders, C., Matzat, U., Reips, U. (2012). “ Big data ”: big gaps of knowledge in the field...ORIGINAL RESEARCH published: 22 June 2016 doi: 10.3389/fpsyg.2016.00937 Frontiers in Psychology | www.frontiersin.org 1 June 2016 | Volume 7...journal Frontiers in Psychology Received: 01 December 2015 Accepted: 07 June 2016 Published: 22 June 2016 Citation: Buchler N, Fitzhugh SM, Marusich LR

  17. How Many "Friends" Do You Need? Teaching Students How to Network Using Social Media

    Science.gov (United States)

    Sacks, Michael Alan; Graves, Nikki

    2012-01-01

    Student reliance on social media is undeniable. However, while we largely regard social media as a new phenomena, the concepts underlying it come directly from social network theory in sociology and organizational behavior. In this article, the authors examine how the social network concepts of size, quality, complexity, diffusion, and distance…

  18. Help from My "Friends": Social Capital in the Social Network Sites of Low-Income Students

    Science.gov (United States)

    Greenhow, Christine; Burton, Lisa

    2011-01-01

    The development of social capital in young people is positively associated with educational attainment, achievement, and psychosocial factors. Prior research has explored factors that contribute to social capital, such as offline social networks. To a lesser extent, studies have analyzed the relationship between online social networks and…

  19. EDENetworks: a user-friendly software to build and analyse networks in biogeography, ecology and population genetics.

    Science.gov (United States)

    Kivelä, Mikko; Arnaud-Haond, Sophie; Saramäki, Jari

    2015-01-01

    The recent application of graph-based network theory analysis to biogeography, community ecology and population genetics has created a need for user-friendly software, which would allow a wider accessibility to and adaptation of these methods. EDENetworks aims to fill this void by providing an easy-to-use interface for the whole analysis pipeline of ecological and evolutionary networks starting from matrices of species distributions, genotypes, bacterial OTUs or populations characterized genetically. The user can choose between several different ecological distance metrics, such as Bray-Curtis or Sorensen distance, or population genetic metrics such as FST or Goldstein distances, to turn the raw data into a distance/dissimilarity matrix. This matrix is then transformed into a network by manual or automatic thresholding based on percolation theory or by building the minimum spanning tree. The networks can be visualized along with auxiliary data and analysed with various metrics such as degree, clustering coefficient, assortativity and betweenness centrality. The statistical significance of the results can be estimated either by resampling the original biological data or by null models based on permutations of the data. © 2014 John Wiley & Sons Ltd.

  20. OPTIMIZING PEDESTRIAN-FRIENDLY WALKING PATH FOR THE FIRST AND LAST MILE TRANSIT JOURNEY BY USING THE ANALYTICAL NETWORK PROCESS (ANP DECISION MODEL AND GIS NETWORK ANALYSIS

    Directory of Open Access Journals (Sweden)

    N. Naharudin

    2017-10-01

    Full Text Available Every transit trip begins and ends with pedestrian travel. People need to walk to access the transit services. However, their choice to walk depends on many factors including the connectivity, level of comfort and safety. These factors can influence the pleasantness of riding the transit itself, especially during the first/last mile (FLM journey. This had triggered few studies attempting to measure the pedestrian-friendliness a walking environment can offer. There were studies that implement the pedestrian experience on walking to assess the pedestrian-friendliness of a walking environment. There were also studies that use spatial analysis to measure it based on the path connectivity and accessibility to public facilities and amenities. Though both are good, but the perception-based studies and spatial analysis can be combined to derive more holistic results. This paper proposes a framework for selecting a pedestrian-friendly path for the FLM transit journey by using the two techniques (perception-based and spatial analysis. First, the degree of importance for the factors influencing a good walking environment will be aggregated by using Analytical Network Process (ANP decision rules based on people’s preferences on those factors. The weight will then be used as attributes in the GIS network analysis. Next, the network analysis will be performed to find a pedestrian-friendly walking route based on the priorities aggregated by ANP. It will choose routes passing through the preferred attributes accordingly. The final output is a map showing pedestrian-friendly walking path for the FLM transit journey.

  1. Optimizing Pedestrian-Friendly Walking Path for the First and Last Mile Transit Journey by Using the Analytical Network Process (anp) Decision Model and GIS Network Analysis

    Science.gov (United States)

    Naharudin, N.; Ahamad, M. S. S.; Sadullah, A. F. M.

    2017-10-01

    Every transit trip begins and ends with pedestrian travel. People need to walk to access the transit services. However, their choice to walk depends on many factors including the connectivity, level of comfort and safety. These factors can influence the pleasantness of riding the transit itself, especially during the first/last mile (FLM) journey. This had triggered few studies attempting to measure the pedestrian-friendliness a walking environment can offer. There were studies that implement the pedestrian experience on walking to assess the pedestrian-friendliness of a walking environment. There were also studies that use spatial analysis to measure it based on the path connectivity and accessibility to public facilities and amenities. Though both are good, but the perception-based studies and spatial analysis can be combined to derive more holistic results. This paper proposes a framework for selecting a pedestrian-friendly path for the FLM transit journey by using the two techniques (perception-based and spatial analysis). First, the degree of importance for the factors influencing a good walking environment will be aggregated by using Analytical Network Process (ANP) decision rules based on people's preferences on those factors. The weight will then be used as attributes in the GIS network analysis. Next, the network analysis will be performed to find a pedestrian-friendly walking route based on the priorities aggregated by ANP. It will choose routes passing through the preferred attributes accordingly. The final output is a map showing pedestrian-friendly walking path for the FLM transit journey.

  2. Privacy‐Preserving Friend Matching Protocol approach for Pre‐match in Social Networks

    DEFF Research Database (Denmark)

    Ople, Shubhangi S.; Deshmukh, Aaradhana A.; Mihovska, Albena Dimitrova

    2016-01-01

    that a secure match can achieve at least one order of accuracy and better computational performance than the techniques that use homomorphic encryption.It can handle and tackle new characteristics and an environment for a particular application in a mobile social network....... for use in social networks due to its data sharing problems and information leakage. In this paper, we propose a novel framework for privacy–preserving profile matching. We implement both the client and server portion of the secure match and evaluate its performance network dataset. The results show...

  3. With a little help from my friends : music consumption and networks

    Directory of Open Access Journals (Sweden)

    Paul Widdop

    2015-01-01

    Full Text Available It is widely accepted that a shift has occurred in the cultural consumption patterns of those higher in the social strata. Where tastes were based around rules of exclusion, they are now based on openness to a variety of cultures, both esoteric and popular. What is less understood is how an individual’s social networks affect their cultural tastes. Using social survey data on cultural participation, we find that musical consumption is mediated and construed through networks, and these networks play a much more significant role in cultural behaviour than current theoretical frameworks suggest.

  4. Friends' Alcohol-Related Social Networking Site Activity Predicts Escalations in Adolescent Drinking: Mediation by Peer Norms.

    Science.gov (United States)

    Nesi, Jacqueline; Rothenberg, W Andrew; Hussong, Andrea M; Jackson, Kristina M

    2017-06-01

    Adolescents' increased use of social networking sites (SNS) coincides with a developmental period of heightened risk for alcohol use initiation. However, little is known regarding associations between adolescents' SNS use and drinking initiation nor the mechanisms of this association. This study examined longitudinal associations among adolescents' exposure to friends' alcohol-related SNS postings, alcohol-favorable peer injunctive norms, and initiation of drinking behaviors. Participants were 658 high-school students who reported on posting of alcohol-related SNS content by self and friends, alcohol-related injunctive norms, and other developmental risk factors for alcohol use at two time points, 1 year apart. Participants also reported on initiation of three drinking behaviors: consuming a full drink, becoming drunk, and heavy episodic drinking (three or more drinks per occasion). Probit regression analyses were used to predict initiation of drinking behaviors from exposure to alcohol-related SNS content. Path analyses examined mediation of this association by peer injunctive norms. Exposure to friends' alcohol-related SNS content predicted adolescents' initiation of drinking and heavy episodic drinking 1 year later, controlling for demographic and known developmental risk factors for alcohol use (i.e., parental monitoring and peer orientation). In addition, alcohol-favorable peer injunctive norms statistically mediated the relationship between alcohol-related SNS exposure and each drinking milestone. Results suggest that social media plays a unique role in contributing to peer influence processes surrounding alcohol use and highlight the need for future investigative and preventive efforts to account for adolescents' changing social environments. Copyright © 2017 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  5. Getting by with a little help from friends and colleagues: Testing how residents' social support networks affect loneliness and burnout.

    Science.gov (United States)

    Rogers, Eamonn; Polonijo, Andrea N; Carpiano, Richard M

    2016-11-01

    To determine how residents' relationships with their sources of social support (ie, family, friends, and colleagues) affect levels of burnout and loneliness. Cross-sectional survey. Faculty of Medicine at the University of British Columbia in Vancouver. A total of 198 physician-trainees in the university's postgraduate medical education program. Residents' personal and work-related burnout scores (measured using items from the Copenhagen Burnout Inventory); loneliness (measured using a 3-item loneliness scale); and social support (assessed with the Lubben Social Network Scale, version 6). Of the 234 respondents who completed the Internet-based survey (a 22% response rate), 198 provided complete information on all study variables and thus constituted the analytic sample. Seemingly unrelated regression analyses indicated that loneliness was significantly (P burnout scores. Greater friend-based and colleague-based social support were both indirectly associated with lower personal and work-related burnout scores through their negative associations with loneliness. Social relationships might help residents mitigate the deleterious effects of burnout. By promoting interventions that stabilize and nurture social relationships, hospitals and universities can potentially help promote resident resilience and well-being and, in turn, improve patient care. Copyright© the College of Family Physicians of Canada.

  6. An Environment-Friendly Multipath Routing Protocol for Underwater Acoustic Sensor Network

    Directory of Open Access Journals (Sweden)

    Yun Li

    2017-01-01

    Full Text Available Underwater Acoustic Sensor Network (UASN is a promising technique by facilitating a wide range of aquatic applications. However, routing scheme in UASN is a challenging task because of the characteristics of the nodes mobility, interruption of link, and interference caused by other underwater acoustic systems such as marine mammals. In order to achieve reliable data delivery in UASN, in this work, we present a disjoint multipath disruption-tolerant routing protocol for UASN (ENMR, which incorporates the Hue, Saturation, and Value color space (HSV model to establish routing paths to greedily forward data packets to sink nodes. ENMR applies the mechanism to maintain the network topology. Simulation results show that, compared with the classic underwater routing protocols named PVBF, ENMR can improve packet delivery ratio and reduce network latency while avoiding introducing additional energy consumption.

  7. Will you accept the government's friend request? Social networks and privacy concerns.

    Science.gov (United States)

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  8. Motives for online friending and following: The dark side of social network site connections

    NARCIS (Netherlands)

    Ouwerkerk, J.W.; Johnson, B.K.

    Motives for “friending” others on social network sites are often positive, but darker motives may also play an important role. A survey with a novel Following Motives Scale (FMS) shows that antisocial motives (i.e., others providing a target for downward comparison, competition, schadenfreude,

  9. Friends in the classroom : a comparison between two methods for the assessment of students' friendship networks

    NARCIS (Netherlands)

    Pijl, Sip Jan; Koster, Marloes; Hannink, Anne; Stratingh, Anna

    2011-01-01

    One of the methods used most often to assess students' friendships and friendship networks is the reciprocal nomination method. However, an often heard complaint is that this technique produces rather negative outcomes. This study compares the reciprocal nomination method with another method to

  10. Cohort differences in having and retaining friends in personal networks in later life

    NARCIS (Netherlands)

    Stevens, N.L.; Tilburg, van T.G.

    2011-01-01

    Friendship has increased in importance during the last few decades. The study examines whether friendship has become more prevalent in personal networks of older adults. Three cohorts of older persons have been followed since 1992 for 17 years in the Longitudinal Aging Study Amsterdam. The younger

  11. Colleges and Universities Want to Be Your Friend: Communicating via Online Social Networking

    Science.gov (United States)

    Wandel, Tamara L.

    2008-01-01

    This article presents a compilation of data regarding the role of online social networks within campus communities, specifically for nonacademic purposes. Both qualitative and quantitative data methodologies are used to provide a unique perspective on a constantly evolving topic. Interviews of students and administrators allow for candid…

  12. Friend me: which factors influence top global brands participation in social network sites

    NARCIS (Netherlands)

    Araujo, T.; Neijens, P.

    2012-01-01

    Purpose - This study focuses on how brands participate in social network sites (SNSs) and investigates both the different strategies they adopt and the factors that influence these strategies. Design/methodology/approach - The activities of top brands in SNSs were investigated through a content

  13. The right friends in the right places: Understanding network structure as a predictor of voluntary turnover.

    Science.gov (United States)

    Ballinger, Gary A; Cross, Rob; Holtom, Brooks C

    2016-04-01

    Research examining the relationship between social networks and employee retention has focused almost exclusively on the number of direct links and generally found that having more ties decreases the likelihood of turnover. The present research moves beyond simple measures of network centrality to investigate the relationship between 2 additional, and theoretically distinct, facets of social capital and voluntary turnover. In 2 organizations, we found consistent evidence of a negative relationship between reputation, as measured by relationships with highly sought-out others (incoming eigenvector centrality) and voluntary turnover. Further, we found that the negative relationship between brokerage (structural holes) and turnover is significant, but only for higher-level employees. The theoretical and practical implications of expanding the suite of social capital measures to understand voluntary turnover are discussed. (c) 2016 APA, all rights reserved).

  14. User-friendly Establishment of Trust in Distributed Home Automation Networks

    DEFF Research Database (Denmark)

    Solberg Hjorth, Theis; Torbensen, Rune; Madsen, Per Printz

    2014-01-01

    these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented......Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup...... in a simple and meaningful way that allows non-expert users to make the correct security decisions when enrolling new devices. We propose a social remote mutual authentication method called the PictogramDB Hash designed to easily and accurately verify certificate hash values by visualizing them with sequences...

  15. User-friendly establishment of trust in distributed home automation networks

    DEFF Research Database (Denmark)

    Solberg Hjorth, Theis; Madsen, Per Printz; Torbensen, Rune Sonnich

    2012-01-01

    Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup...... these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented...... of predefined pictograms. This method is designed to scale from smart-phones and tablets down to low-resource embedded systems. The presented approach is supported by an extensive literature study, and the ease of use and feasibility of the method has been indicated through a preliminary user study...

  16. A game theoretical approach for cooperative environmentally friendly cellular networks powered by the smart grid

    KAUST Repository

    Ghazzai, Hakim

    2014-11-01

    This paper investigates the collaboration between multiple mobile operators to optimize the energy efficiency of cellular networks, maximize their profits or achieve or tradeoff between both objectives. Mobile operators cooperate together by eliminating redundant base stations (BSs) using a low complexity algorithm that aims to maximize their objective functions subject to a quality of service constraint. The problem is modeled as a two-level Stackelberg game: a mobile operator level and a smart grid level. Indeed, in our framework, we assume that cellular networks are powered by multiple energy providers existing in the smart grid characterized by different pollutant levels in addition to renewable energy source deployed in BS sites. The objective is to find the best active BS combination and the optimal procurement decision needed to the network operation during collaboration by considering electricity real-time pricing. Our study includes the daily traffic variation in addition to the daily green energy availability. Our simulation results show a significant saving in terms of CO2 emissions compared to the non-collaboration case and that cooperative mobile operators exploiting renewables are more awarded than traditional operators. © 2014 IEEE.

  17. User-friendly Tool for Power Flow Analysis and Distributed Generation Optimisation in Radial Distribution Networks

    Directory of Open Access Journals (Sweden)

    M. F. Akorede

    2017-06-01

    Full Text Available The intent of power distribution companies (DISCOs is to deliver electric power to their customers in an efficient and reliable manner – with minimal energy loss cost. One major way to minimise power loss on a given power system is to install distributed generation (DG units on the distribution networks. However, to maximise benefits, it is highly crucial for a DISCO to ensure that these DG units are of optimal size and sited in the best locations on the network. This paper gives an overview of a software package developed in this study, called Power System Analysis and DG Optimisation Tool (PFADOT. The main purpose of the graphical user interface-based package is to guide a DISCO in finding the optimal size and location for DG placement in radial distribution networks. The package, which is also suitable for load flow analysis, employs the GUI feature of MATLAB. Three objective functions are formulated into a single optimisation problem and solved with fuzzy genetic algorithm to simultaneously obtain DG optimal size and location. The accuracy and reliability of the developed tool was validated using several radial test systems, and the results obtained are evaluated against the existing similar package cited in the literature, which are impressive and computationally efficient.

  18. Do friends share similar body image and eating problems? The role of social networks and peer influences in early adolescence.

    Science.gov (United States)

    Hutchinson, Delyse M; Rapee, Ronald M

    2007-07-01

    This study examined the role of friendship networks and peer influences in body image concern, dietary restraint, extreme weight loss behaviours (EWLBs) and binge eating in a large community sample of young adolescent females. Based on girls' self-reported friendship groups, social network analysis was used to identify 173 friendship cliques. Results indicated that clique members shared similar scores on measures of dieting, EWLB and binge eating, but not body image concern. Average clique scores for dieting, EWLB and binge eating, were also correlated significantly with clique averages on measures of perceived peer influence, body mass index and psychological variables. Multiple regression analyses indicated that perceived peer influences in weight-related attitudes and behaviours were predictive of individual girls' level of body image concern, dieting, EWLB use and binge eating. Notably, an individual girl's dieting and EWLB use could be predicted from her friends' respective dieting and EWLB scores. Findings highlight the significance of the peer environment in body image and eating problems during early adolescence.

  19. Suicidal Disclosures among Friends: Using Social Network Data to Understand Suicide Contagion*

    Science.gov (United States)

    Mueller, Anna S.; Abrutyn, Seth

    2015-01-01

    A robust literature suggests that suicide is socially contagious; however, we know little about how and why suicide spreads. Using network data from the National Longitudinal Study of Adolescent to Adult Health, we examine the effects of alter’s (1) disclosed and (2) undisclosed suicide attempts, (3) suicide ideation and (4) emotional distress on ego’s mental health one year later to gain insights into the emotional and cultural mechanisms that underlie suicide contagion. We find that when egos know about alter’s suicide attempt, they report significantly higher levels of emotional distress and are more likely to report suicidality, net of extensive controls; however, alter’s undisclosed suicide attempts and ideation have no significant effect on ego’s mental health. Finally, we find evidence that emotional distress is contagious in adolescence, though it does not seem to promote suicidality. We discuss the implications of our findings for suicide contagion specifically and sociology more generally. PMID:25722129

  20. Suicidal disclosures among friends: using social network data to understand suicide contagion.

    Science.gov (United States)

    Mueller, Anna S; Abrutyn, Seth

    2015-03-01

    A robust literature suggests that suicide is socially contagious; however, we know little about how and why suicide spreads. Using network data from the National Longitudinal Study of Adolescent to Adult Health, we examine the effects of alter's (1) disclosed and (2) undisclosed suicide attempts, (3) suicide ideation, and (4) emotional distress on ego's mental health one year later to gain insights into the emotional and cultural mechanisms that underlie suicide contagion. We find that when egos know about alter's suicide attempt, they report significantly higher levels of emotional distress and are more likely to report suicidality, net of extensive controls; however, alter's undisclosed suicide attempts and ideation have no significant effect on ego's mental health. Finally, we find evidence that emotional distress is contagious in adolescence, though it does not seem to promote suicidality. We discuss the implications of our findings for suicide contagion specifically and sociology more generally. © American Sociological Association 2015.

  1. Is agritourism eco-friendly? A comparison between agritourisms and other farms in Italy using farm accountancy data network dataset.

    Science.gov (United States)

    Mastronardi, Luigi; Giaccio, Vincenzo; Giannelli, Agostino; Scardera, Alfonso

    2015-01-01

    This paper presents the results of research regarding the environmental performances of Italian farms with agritourism compared with farms without agritourism. In Italy, agritourism is considered an agricultural activity and can only be performed by a farmer. Moreover, Italian national legislation forces the farmer to dedicate himself mainly to traditional farming, rather than to tourism activities. For this reason, environmental performances have been highlighted by analyzing only features and production systems of the farms. By utilizing the most frequent indicators used in studies regarding sustainability, the authors show how Italian agritourisms tend to develop more environmentally friendly agricultural methods, which have a positive impact on biodiversity, landscape and natural resources. The empirical analysis is based on the Italian FADN (Farm Accountancy Data Network) dataset. The European FADN was created to represent farms' technical and economic operation in the European Union and on which it drafts the agricultural and rural policies. The dichotomous structure of the dependent variable (presence or absence of agritourism at the farm) has a propensity for an assessment method based on Binary Response Model Regression.

  2. Intermediate peer contexts and educational outcomes: Do the friends of students' friends matter?

    Science.gov (United States)

    Carbonaro, William; Workman, Joseph

    2016-07-01

    Sociologists of education have long been interested in the effects of peer relations on educational outcomes. Recent theory and research on adolescence suggest that peers on the boundaries of students' friendship networks may play an important role in shaping behaviors and educational outcomes. In this study, we examine the importance of a key "intermediate peer context" for students' outcomes: the friends of a student's friends. Our findings indicate both friends' and friends' friends' characteristics independently predict students' college expectations and their risk of dropping out of high school (although only friends' characteristics predict GPA). Our models suggest the magnitude of students' friends-of-friends' characteristics are at least as large their friends' characteristics. Together, the association between the peer context and students outcomes is considerably larger when accounting for both the characteristics of students' friends and the friends of their friends. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. "You've got a friend in me": can social networks mediate the relationship between mood and MCI?

    Science.gov (United States)

    Yates, Jennifer A; Clare, Linda; Woods, Robert T

    2017-07-13

    Social networks can change with age, for reasons that are adaptive or unwanted. Social engagement is beneficial to both mental health and cognition, and represents a potentially modifiable factor. Consequently this study explored this association and assessed whether the relationship between mild cognitive impairment (MCI) and mood problems was mediated by social networks. This study includes an analysis of data from the Cognitive Function and Ageing Study Wales (CFAS Wales). CFAS Wales Phase 1 data were collected from 2010 to 2013 by conducting structured interviews with older people aged over 65 years of age living in urban and rural areas of Wales, and included questions that assessed cognitive functioning, mood, and social networks. Regression analyses were used to investigate the associations between individual variables and the mediating role of social networks. Having richer social networks was beneficial to both mood and cognition. Participants in the MCI category had weaker social networks than participants without cognitive impairment, whereas stronger social networks were associated with a decrease in the odds of experiencing mood problems, suggesting that they may offer a protective effect against anxiety and depression. Regression analyses revealed that social networks are a significant mediator of the relationship between MCI and mood problems. These findings are important, as mood problems are a risk factor for progression from MCI to dementia, so interventions that increase and strengthen social networks may have beneficial effects on slowing the progression of cognitive decline.

  4. Designing A Robust Command, Communications and Data Acquisition System For Autonomous Sensor Platforms Using The Data Transport Network

    Science.gov (United States)

    Valentic, T. A.

    2012-12-01

    The Data Transport Network is designed for the delivery of data from scientific instruments located at remote field sites with limited or unreliable communications. Originally deployed at the Sondrestrom Research Facility in Greenland over a decade ago, the system supports the real-time collection and processing of data from large instruments such as incoherent scatter radars and lidars. In recent years, the Data Transport Network has been adapted to small, low-power embedded systems controlling remote instrumentation platforms deployed throughout the Arctic. These projects include multiple buoys from the O-Buoy, IceLander and IceGoat programs, renewable energy monitoring at the Imnavait Creek and Ivotuk field sites in Alaska and remote weather observation stations in Alaska and Greenland. This presentation will discuss the common communications controller developed for these projects. Although varied in their application, each of these systems share a number of common features. Multiple instruments are attached, each of which needs to be power controlled, data sampled and files transmitted offsite. In addition, the power usage of the overall system must be minimized to handle the limited energy available from sources such as solar, wind and fuel cells. The communications links are satellite based. The buoys and weather stations utilize Iridium, necessitating the need to handle the common drop outs and high-latency, low-bandwidth nature of the link. The communications controller is an off-the-shelf, low-power, single board computer running a customized version of the Linux operating system. The Data Transport Network provides a Python-based software framework for writing individual data collection programs and supplies a number of common services for configuration, scheduling, logging, data transmission and resource management. Adding a new instrument involves writing only the necessary code for interfacing to the hardware. Individual programs communicate with the

  5. True Friends and False Friends.

    Science.gov (United States)

    Lengeling, M. Martha

    A discussion of cognates in second language teaching, particularly in English as a Second Language (ESL), looks at reasons and methods for teaching both true and false cognates ("friends"). A definition of cognates is offered, and a distinction is made between a cognate and a borrowed word, with examples from several languages.…

  6. Tail-scope: Using friends to estimate heavy tails of degree distributions in large-scale complex networks.

    Science.gov (United States)

    Eom, Young-Ho; Jo, Hang-Hyun

    2015-05-11

    Many complex networks in natural and social phenomena have often been characterized by heavy-tailed degree distributions. However, due to rapidly growing size of network data and concerns on privacy issues about using these data, it becomes more difficult to analyze complete data sets. Thus, it is crucial to devise effective and efficient estimation methods for heavy tails of degree distributions in large-scale networks only using local information of a small fraction of sampled nodes. Here we propose a tail-scope method based on local observational bias of the friendship paradox. We show that the tail-scope method outperforms the uniform node sampling for estimating heavy tails of degree distributions, while the opposite tendency is observed in the range of small degrees. In order to take advantages of both sampling methods, we devise the hybrid method that successfully recovers the whole range of degree distributions. Our tail-scope method shows how structural heterogeneities of large-scale complex networks can be used to effectively reveal the network structure only with limited local information.

  7. Tail-scope: Using friends to estimate heavy tails of degree distributions in large-scale complex networks

    Science.gov (United States)

    Eom, Young-Ho; Jo, Hang-Hyun

    2015-05-01

    Many complex networks in natural and social phenomena have often been characterized by heavy-tailed degree distributions. However, due to rapidly growing size of network data and concerns on privacy issues about using these data, it becomes more difficult to analyze complete data sets. Thus, it is crucial to devise effective and efficient estimation methods for heavy tails of degree distributions in large-scale networks only using local information of a small fraction of sampled nodes. Here we propose a tail-scope method based on local observational bias of the friendship paradox. We show that the tail-scope method outperforms the uniform node sampling for estimating heavy tails of degree distributions, while the opposite tendency is observed in the range of small degrees. In order to take advantages of both sampling methods, we devise the hybrid method that successfully recovers the whole range of degree distributions. Our tail-scope method shows how structural heterogeneities of large-scale complex networks can be used to effectively reveal the network structure only with limited local information.

  8. ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation

    NARCIS (Netherlands)

    Biedermann, Sebastian; Karvelas, Nikolaos P.; Katzenbeisser, Stefan; Strufe, Thorsten; Peter, Andreas

    2014-01-01

    Online Social Networks (OSNs) enjoy high popularity, but their centralized architectures lead to intransparency and mistrust in the providers who can be the single point of failure. A solution is to adapt the OSN functionality to an underlying and fully distributed peer-to-peer (P2P) substrate.

  9. Comigrants and friends: informal networks and the transmission of traditional ecological knowledge among seminomadic pastoralists of Gujarat, India

    Directory of Open Access Journals (Sweden)

    Matthieu Salpeteur

    2016-06-01

    Full Text Available Previous research has shown that social organization may affect the distribution of traditional ecological knowledge (TEK within local communities of natural resource users in multiple ways. However, in this line of research the potential role of informal relationships has mostly been overlooked. In this article, we contribute toward filling this research gap by studying how two types of informal relationships, namely migration partnership and friendship, affect the distribution of TEK within a community of seminomadic pastoralists from the Kutch area, Gujarat, India. Using social network analysis, we map three networks, migration, men friendship, and women friendship, and compare with similarity-based quantitative approaches the clusters extracted from these networks in relation to four domains of TEK: knowledge about soils, about ethnoveterinary practices, about sheep breeds, and in ethnobotany. Our results show that (1 migration clusters are associated to significant variations in three TEK domains, while (2 friendship clusters are associated to minor variations. We relate these results to the importance of common practical experiences involved by joint migration. Moreover, kin relations are shown to strongly underlie friendship and migration relations, and as such appear as a potential driver of the dynamics of the local TEK system. We conclude by advocating for a better inclusion of such informal relationships in future research on local TEK dynamics, following recent developments in studies on natural resource governance.

  10. What's Love Got to Do with It? Exploring the Impact of Maintenance Rules, Love Attitudes, and Network Support on Friends with Benefits Relationships

    Science.gov (United States)

    Hughes, Mikayla; Morrison, Kelly; Asada, Kelli Jean K.

    2005-01-01

    Friends with benefits relationships (FWBRs) are defined as relationships between cross-sex friends in which the friends engage in sexual activity but do not define their relationship as romantic. Relationship scholars have only recently begun to examine these relationships, despite their mention in the popular media (e.g., HBO's 'Sex in the City,'…

  11. When Sharing Is a Bad Idea: The Effects of Online Social Network Engagement and Sharing Passwords with Friends on Cyberbullying Involvement.

    Science.gov (United States)

    Meter, Diana J; Bauman, Sheri

    2015-08-01

    Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior.

  12. Social networking and understanding alcohol-associated risk for people with type 1 diabetes: friend or foe?

    Science.gov (United States)

    Jones, Emma; Sinclair, Julia M A; Holt, Richard I G; Barnard, Katharine D

    2013-04-01

    Online communication has become popular in recent years, especially for young people. Limited research exists into how people with type 1 diabetes mellitus (T1DM) discuss risks about diabetes. Alcohol use by people with T1DM, as in the rest of society, is common and may adversely affect diabetes management. This study reviewed the literature on social networking as a communication tool and conducted a systematic search of social networking sites to determine whether people with T1DM use them to discuss risks associated with diabetes and alcohol consumption. Systematic literature review was performed followed by an Internet search and forum identification relating to T1DM and alcohol. Qualitative coding and thematic analysis of publicly available data retrieved from social networking sites were undertaken. In the literature review, 292 articles were identified, of which six met the inclusion criteria. Widespread use of social media for medical advice pertaining to diabetes was reported. The quality and safety of online advice were reported as variable. Ten Web sites with 247 individual postings about alcohol and diabetes were selected for analysis, which revealed six themes ranging from safety and seeking and provision of advice to wider views about behaviors, opinions, and experiences of people with T1DM and alcohol. No specific professional health information was identified on any sites, and inaccurate information was common. Online resources are used by people with T1DM to find information about diabetes and alcohol consumption. Easily signposted and accessible professional online resources would ensure people can access appropriate advice to minimize risks of alcohol use.

  13. The Effects of Profile Pictures and Friends' Comments on Social Network Site Users' Body Image and Adherence to the Norm.

    Science.gov (United States)

    Flynn, Mark A

    2016-04-01

    This study sought to explore the effects of exposure to Facebook body ideal profile pictures and norm conforming comments on users' body image. In addition, the social identity and self-categorization theoretical frameworks were used to explore users' endorsement of a body ideal norm. A mock Facebook page was used to conduct a pretest posttest 2 × 2 between-group web-based experiment that featured body ideal profile pictures (body ideal vs. no body) and body ideal comments (conforming vs. nonconforming). Five hundred and one participants completed the experiment and passed all manipulation checks. Participants viewed pictures and comments on the status page and were able to leave their own comment before exiting. Results demonstrated no significant main effects. However, predispositional body satisfaction significantly moderated the relationship between body ideal pictures and body satisfaction. Most comments supported the body ideal norm. However, in support of self-categorization theory, participants exposed to nonconforming comments made nonconforming comments themselves significantly more than those exposed to conforming comments. The findings demonstrated the importance of continued body image research in social network sites, as well as the potential for self-categorization theory to guide such research.

  14. Up to what point is loss reduction environmentally friendly?: The LCA of loss reduction scenarios in drinking water networks.

    Science.gov (United States)

    Pillot, Julie; Catel, Laureline; Renaud, Eddy; Augeard, Bénédicte; Roux, Philippe

    2016-11-01

    In a context of increasing water shortage all over the world, water utilities must minimise losses in their distribution networks and draw up water loss reduction action plans. While leak reduction is clearly an important part of sustainable water management, its impacts have to be reconsidered in a broader objective of environmental protection than strictly the avoided losses in cubic metres of water. Reducing the volume of water abstracted reduces also environmental impacts associated to water production (the operation and infrastructure needed for abstraction, treatment, supply). In the mean time, activities for reducing water losses generate their own environmental impacts, notably as a result of the work, equipment, and infrastructures used for this purpose. In this study, Life Cycle Assessment (LCA) was used to assess and compare two sets of environmental impacts: those resulting from the production and supply of water which will never reach subscribers, and those caused by water loss reduction activities. This information can then be used to establish whether or not there is a point beyond which loss reduction is no longer effective in reducing the environmental impacts of drinking water supply. Results show that the improvement actions that start from a low water supply efficiency are clearly beneficial for ecosystems, human health and preservation of resources. When seeking to improve the efficiency beyond certain values (about 65%), the uncertainty makes it impossible to conclude for an environmental benefit on all impact categories. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Detonation command and control

    Science.gov (United States)

    Mace, Jonathan L.; Seitz, Gerald J.; Echave, John A.; Le Bas, Pierre-Yves

    2016-05-31

    The detonation of one or more explosive charges and propellant charges by a detonator in response to a fire control signal from a command and control system comprised of a command center and instrumentation center with a communications link there between. The fire control signal is selectively provided to the detonator from the instrumentation center if plural detonation control switches at the command center are in a fire authorization status, and instruments, and one or more interlocks, if included, are in a ready for firing status. The instrumentation and command centers are desirably mobile, such as being respective vehicles.

  16. Detonation command and control

    Energy Technology Data Exchange (ETDEWEB)

    Mace, Jonathan L.; Seitz, Gerald J.; Echave, John A.; Le Bas, Pierre-Yves

    2015-11-10

    The detonation of one or more explosive charges and propellant charges by a detonator in response to a fire control signal from a command and control system comprised of a command center and instrumentation center with a communications link therebetween. The fire control signal is selectively provided to the detonator from the instrumentation center if plural detonation control switches at the command center are in a fire authorization status, and instruments, and one or more interlocks, if included, are in a ready for firing status. The instrumentation and command centers are desirably mobile, such as being respective vehicles.

  17. Detonation command and control

    Energy Technology Data Exchange (ETDEWEB)

    Mace, Jonathan Lee; Seitz, Gerald J.; Echave, John A.; Le Bas, Pierre-Yves

    2017-12-05

    The detonation of one or more explosive charges and propellant charges by a detonator in response to a fire control signal from a command and control system comprised of a command center and instrumentation center with a communications link therebetween. The fire control signal is selectively provided to the detonator from the instrumentation center if plural detonation control switches at the command center are in a fire authorization status, and instruments, and one or more interlocks, if included, are in a ready for firing status. The instrumentation and command centers are desirably mobile, such as being respective vehicles.

  18. Cyber Friendly Fire

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2011-09-01

    Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public

  19. The Role of Friendship within Social Networks of Divisions at Recruit Training Command and its Effect on the Resilience of Naval Recruits

    Science.gov (United States)

    2017-06-01

    37  viii 5.  QAP Correlation between Friendship and Venting Networks...38  Figure 8.  Friendship and Venting Network QAP Correlation Scores. ......................40  Figure 9.  Division 1...Venting Network Reciprocity Values and Ranking ...................................37  Table 9.  Friendship and Venting Network QAP Correlation Scores

  20. Robot Task Commander with Extensible Programming Environment

    Science.gov (United States)

    Hart, Stephen W (Inventor); Yamokoski, John D. (Inventor); Wightman, Brian J (Inventor); Dinh, Duy Paul (Inventor); Gooding, Dustin R (Inventor)

    2014-01-01

    A system for developing distributed robot application-level software includes a robot having an associated control module which controls motion of the robot in response to a commanded task, and a robot task commander (RTC) in networked communication with the control module over a network transport layer (NTL). The RTC includes a script engine(s) and a GUI, with a processor and a centralized library of library blocks constructed from an interpretive computer programming code and having input and output connections. The GUI provides access to a Visual Programming Language (VPL) environment and a text editor. In executing a method, the VPL is opened, a task for the robot is built from the code library blocks, and data is assigned to input and output connections identifying input and output data for each block. A task sequence(s) is sent to the control module(s) over the NTL to command execution of the task.

  1. Joint Mission Command Implementation

    Science.gov (United States)

    2016-01-22

    1 AIR WAR COLLEGE AIR UNIVERSITY JOINT MISSION COMMAND IMPLEMENTATION by Michael Dane Acord, COL, US Army A Research Report Submitted to...assigned to the Air War College, Air University, Maxwell Air Force Base (AFB), AL. Following the Army Command and General Staff College and School...holds a Bachelor’s Degree in Biology and two Masters Degrees, a Masters in Management from Troy University and a Master of Military Arts and Sciences

  2. Understanding Command and Control

    Science.gov (United States)

    2006-01-01

    UNDERSTANDING COMMAND AND CONTROL David S. Alberts Richard E. Hayes THE FUTURE OF COMMAND AND CONTROL Report Documentation Page Form ApprovedOMB No...comprehensive C2 Conceptual Reference Model. We benefited greatly from participating in that activity. 1 The members of SAS-050 included: Dr. David Alberts...Sinclair (US), M.Sc. Mink Spaans (NL), Ms. Kristi Sugarman (US), LTC (Ret) Klaus Titze (GE), Mr. Rick van der Kleij (NL) W vi We were also fortunate to

  3. On Cyber Warfare Command and Control Systems

    Science.gov (United States)

    2004-06-01

    network defense management system are sometimes used to describe systems that are used for the remote management of firewalls, intrusion detection...different. Certainly, the remote management of firewalls and intrusion detection systems, etc. should be part of a cyber warfare command and control

  4. Communication for command and control systems

    CERN Document Server

    Morris, D J

    1983-01-01

    Communication for Command and Control Systems provides a thorough exposition of the basic theoretical and practical features involved in the design of communication networks for command and control systems. This book focuses primarily on the practical side of computer-controlled communication. This text concentrates on the communication sides of the subject by surveying the means of transferring data between the various processing points and by appraising their potential advantages and possible defects in implementation. In this respect, this book should prove useful for the practicing enginee

  5. Cost efficient command management

    Science.gov (United States)

    Brandt, Theresa; Murphy, C. W.; Kuntz, Jon; Barlett, Tom

    1996-01-01

    The design and implementation of a command management system (CMS) for a NASA control center, is described. The technology innovations implemented in the CMS provide the infrastructure required for operations cost reduction and future development cost reduction through increased operational efficiency and reuse in future missions. The command management design facilitates error-free operations which enables the automation of the routine control center functions and allows for the distribution of scheduling responsibility to the instrument teams. The reusable system was developed using object oriented methodologies.

  6. MILITARY COMMANDERS OF

    African Journals Online (AJOL)

    who first saw active service in the Ashanti. Campaign. (1873-74), was employed as an instructor of musketry prior to his promotion to. Captain in October 1878. In the following year he was present at the Battle of Ulundi and took part in the expedition against Sekukuni (1879). During the First Anglo-Boer War he commanded.

  7. SOA approach to battle command: simulation interoperability

    Science.gov (United States)

    Mayott, Gregory; Self, Mid; Miller, Gordon J.; McDonnell, Joseph S.

    2010-04-01

    NVESD is developing a Sensor Data and Management Services (SDMS) Service Oriented Architecture (SOA) that provides an innovative approach to achieve seamless application functionality across simulation and battle command systems. In 2010, CERDEC will conduct a SDMS Battle Command demonstration that will highlight the SDMS SOA capability to couple simulation applications to existing Battle Command systems. The demonstration will leverage RDECOM MATREX simulation tools and TRADOC Maneuver Support Battle Laboratory Virtual Base Defense Operations Center facilities. The battle command systems are those specific to the operation of a base defense operations center in support of force protection missions. The SDMS SOA consists of four components that will be discussed. An Asset Management Service (AMS) will automatically discover the existence, state, and interface definition required to interact with a named asset (sensor or a sensor platform, a process such as level-1 fusion, or an interface to a sensor or other network endpoint). A Streaming Video Service (SVS) will automatically discover the existence, state, and interfaces required to interact with a named video stream, and abstract the consumers of the video stream from the originating device. A Task Manager Service (TMS) will be used to automatically discover the existence of a named mission task, and will interpret, translate and transmit a mission command for the blue force unit(s) described in a mission order. JC3IEDM data objects, and software development kit (SDK), will be utilized as the basic data object definition for implemented web services.

  8. Ada (Trade Name) Foundation Technology. Volume 9. Software Requirements for WIS (WWMCCS (World Wide Military Command and Control System) Information System) Network Protocol Prototypes.

    Science.gov (United States)

    1986-12-01

    Communications, January 1977. [ GAVI 83] Gavish, B., and S. L. Hantler, "An Algorithm for Optimal Route Selection in SNA Networks," IEEE Transactons on...can be found in [SCHW 80.1 Two works that deal with non-bifurcated flows are [COUR 8 11 and [ GAVI 83]. 4.3 Description of the Algorithm Problem 4.3.1

  9. Command and motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher; Hvidtved, Johan; Andersen, Lotte Bøgh

    2014-01-01

    Motivated employees are crucial to organizations, but external interventions such as command systems and financial incentives may decrease motivation. If these external interventions are perceived to be controlling, they are expected to crowd out intrinsic motivation, and this may also apply...... to other types of autonomous motivation such as public service motivation. The perception of external interventions is thus expected to be vital. This article investigates how the perception of a specific command system (obligatory student plans) is associated with intrinsic motivation and public service...... motivation. Using a dataset with 3,230 school teachers in Denmark, a structural equation model shows that the perception of obligatory student plans as controlling is negatively associated with all of the investigated types of employee motivation, supporting that motivation crowding can occur....

  10. Friends' Discovery Camp

    Science.gov (United States)

    Seymour, Seth

    2008-01-01

    This article features Friends' Discovery Camp, a program that allows children with and without autism spectrum disorder to learn and play together. In Friends' Discovery Camp, campers take part in sensory-rich experiences, ranging from hands-on activities and performing arts to science experiments and stories teaching social skills. Now in its 7th…

  11. User friendly packaging

    DEFF Research Database (Denmark)

    Geert Jensen, Birgitte

    2010-01-01

    “User-friendly Packaging” aims to create a platform for developing more user-friendly packaging. One intended outcome of the project is a guideline that industry can use in development efforts. The project also points the way for more extended collaboration between companies and design researchers. How...... can design research help industry in packaging innovation?...

  12. Helping Friends and Family

    Science.gov (United States)

    ... chapter Join our online community Helping Friends and Family Part of living well with Alzheimer’s is adjusting to your “new normal” and helping family and friends do the same. Knowing what to ...

  13. Environmentally Friendly Machining

    CERN Document Server

    Dixit, U S; Davim, J Paulo

    2012-01-01

    Environment-Friendly Machining provides an in-depth overview of environmentally-friendly machining processes, covering numerous different types of machining in order to identify which practice is the most environmentally sustainable. The book discusses three systems at length: machining with minimal cutting fluid, air-cooled machining and dry machining. Also covered is a way to conserve energy during machining processes, along with useful data and detailed descriptions for developing and utilizing the most efficient modern machining tools. Researchers and engineers looking for sustainable machining solutions will find Environment-Friendly Machining to be a useful volume.

  14. The Company They Keep: Relation of Adolescents' Adjustment and Behavior to Their Friends' Perceptions of Authoritative Parenting in the Social Network.

    Science.gov (United States)

    Fletcher, Anne C.; And Others

    1995-01-01

    High school students completed achievement, psychosocial competence, behavior problems, and internalized stress. Results showed that the level of parent authoritativeness in adolescents' peer network benefits adolescents above and beyond the positive impact of parenting in their home. (ET)

  15. Getting by with a little help from your friends: the impact of peer networks on criminality in a cohort of treatment-seeking drug users.

    Science.gov (United States)

    Best, David; Hernando, Rosa; Gossop, Michael; Sidwell, Clare; Strang, John

    2003-04-01

    This study investigates the links between social networks of drug users and criminal activity. Opiate misusers (n=128) receiving in-patient treatment were interviewed about substance use, social networks, and crime in the month before treatment. Almost 60% of participants reported an average of more than 70 crimes each. Less than one-fifth of the subjects spent no time with other users, while just over half spent either "quite a lot" or "a lot" of time with drug users. Time with users increased the risk of crime. Spending no time with users provided a protective effect. Time with criminally involved drug users was associated with greater levels of crime. Social networks represent an important marker for integration in criminal networks in treatment-seeking drug users and a long-term barrier to rehabilitation.

  16. BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    HUSAIN SHAHNAWAZ

    2012-10-01

    Full Text Available Ad-hoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. Since there is no central controller to determine the reliable & secure communication paths in Mobile Adhoc Network, each node in the ad hoc network has to rely on each other in order to forward packets, thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. In a mobile ad hoc network (MANET where security is a crucial issue and they are forced to rely on the neighbor node, trust plays an important role that could improve the number of successful data transmission. Larger the number of trusted nodes, higher successful data communication process rates could be expected. In this paper, Black Hole attack is applied in the network, statistics are collected to design intrusion detection engine for MANET Intrusion Detection System (IDS. Feature extraction and rule inductions are applied to find out the accuracy of detection engine by using support vector machine. In this paper True Positive generated by the detection engine is very high and this is a novel approach in the area of Mobile Adhoc Intrusion detection system.

  17. Friend Finder (Game)

    Science.gov (United States)

    ... Credit Homes & Mortgages Health & Fitness Jobs & Making Money Privacy, Identity & Online Security Blog Video & Media Friend Finder Scam Alerts Looking for Business Guidance? Get Email Updates Blog ... Privacy Policy About Us Contact Us Share Our Resources. ...

  18. Expanding the Lessons Learned Program to Include Corps Support Command Commanders and Theater Army Area Command Commanders

    Science.gov (United States)

    1989-03-10

    INTRODUCTION The Oral History Program’s purpose is to supplement oFficial histories , to isolate successful command, leadership and managerial...of -the program is to capture the experience of senior leaders in the areas of command, leadership , and management . The individual is interviewed...used to gain insight into command and management techniques and to further research in military history . In June of 1984, the Chief of Staff, General

  19. Innovation for integrated command environments

    Science.gov (United States)

    Perry, Amie A.; McKneely, Jennifer A.

    2000-11-01

    Command environments have rarely been able to easily accommodate rapid changes in technology and mission. Yet, command personnel, by their selection criteria, experience, and very nature, tend to be extremely adaptive and flexible, and able to learn new missions and address new challenges fairly easily. Instead, the hardware and software components of the systems do no provide the needed flexibility and scalability for command personnel. How do we solve this problem? In order to even dream of keeping pace with a rapidly changing world, we must begin to think differently about the command environment and its systems. What is the correct definition of the integrated command environment system? What types of tasks must be performed in this environment, and how might they change in the next five to twenty-five years? How should the command environment be developed, maintained, and evolved to provide needed flexibility and scalability? The issues and concepts to be considered as new Integrated Command/Control Environments (ICEs) are designed following a human-centered process. A futuristic model, the Dream Integrated Command Environment (DICE) will be described which demonstrates specific ICE innovations. The major paradigm shift required to be able to think differently about this problem is to center the DICE around the command personnel from its inception. Conference participants may not agree with every concept or idea presented, but will hopefully come away with a clear understanding that to radically improve future systems, designers must focus on the end users.

  20. Finding Friends Online: Online Activities by Deaf Students and Their Well-Being: e88351

    National Research Council Canada - National Science Library

    Helen Blom; Marc Marschark; Mathijs P J Vervloed; Harry Knoors

    2014-01-01

    .... The research hypothesis was that using the computer to communicate with new online friends through social network sites or playing games with offline friends is associated with D/HH friendship...

  1. Finding Friends Online: Online Activities by Deaf Students and Their Well-Being

    National Research Council Canada - National Science Library

    Blom, H.C; Marschark, M; Vervloed, M.P.J; Knoors, H.E.T

    2014-01-01

    .... The research hypothesis was that using the computer to communicate with new online friends through social network sites or playing games with offline friends is associated with D/HH friendship...

  2. Identification of Brigade Command Competencies

    Science.gov (United States)

    2011-06-01

    that may exist. 15. SUBJECT TERMS Brigade Command, competency model , army leadership , leadership development, leadership training, command...that focused on leadership , commandership, competency modeling , and training was completed. To support this research base with experiential...climate, creating an ethical climate, modeling the Army Values and Warrior Ethos, decision making ability, managing risk, critical thinking skills

  3. Extension to distributed annotation system: Summary and summaryplot commands.

    Science.gov (United States)

    Chrysostomou, Charalambos; Brookes, Anthony J

    2015-01-01

    In recent years, the development of high-throughput sequencing technologies provided an effective way to generate data from entire genomes and test variants from thousands of individuals. The information acquired from analysing the data generated from high-throughput sequencing technologies provided useful insights into applications like whole-exome sequencing and targeted sequencing to discover the genetic cause of complex diseases and drug responses. The Distributed Annotation System (DAS) is one of the proposed solution developed to share and unify biological data from multiple local and remote DAS annotation servers. The researchers can use DAS to request data from federated or centralised databases and integrate them into a unified view. Furthermore, with the use of Reference DAS servers, structural and sequence data can be used to accompany annotation data, for the pursue of new knowledge for a particular feature or region. In this paper, two additional commands, summary and summary-plot commands, to the existing DAS protocol are proposed and implemented. The proposed commands were created in order to give the users the capabilities to request a summary of features for a particular region of interest. The summary command was created in order to extend the capabilities of the current DAS protocol, while the summaryplot command was created to provide a more user-friendly alternative to standard XML DAS responses. Finally, three examples are presented based on the GENCODE annotation data.

  4. A Little Help from My Friends: Creating Socially Supportive Schools

    Science.gov (United States)

    Sulkowski, Michael L.; Demaray, Michelle K.; Lazarus, Philip J.

    2012-01-01

    Students get by with a little help from their friends; students try with a little help from their friends. When their social needs are met, students tend to be better adjusted and perform more effectively in school. A strong social network serves to protect students and mitigates the effects of a variety of risk factors. Due to the rich empirical…

  5. Implementing Network-Centric Command and Control

    National Research Council Canada - National Science Library

    Curtis, Raymond J; Frizzell, Joseph P

    2005-01-01

    ..., processes, and products remain to be addressed. We begin by examining current developments in net-centric, service oriented and effects based operations as part of the changing nature of the U.S...

  6. Adolescents and Their Friends.

    Science.gov (United States)

    Hartup, Willard W.

    1993-01-01

    Presents an overview of the research literature concerning the significance of adolescent friendship. Topics addressed are (1) the ubiquity of friendships; (2) friendship stability; (3) conditions of friendship, such as reciprocity, commitment, and equality; (4) similarities among friends; and (5) social and emotional development fostered by…

  7. Tools virtualization for command and control systems

    Science.gov (United States)

    Piszczek, Marek; Maciejewski, Marcin; Pomianek, Mateusz; Szustakowski, Mieczysław

    2017-10-01

    Information management is an inseparable part of the command process. The result is that the person making decisions at the command post interacts with data providing devices in various ways. Tools virtualization process can introduce a number of significant modifications in the design of solutions for management and command. The general idea involves replacing physical devices user interface with their digital representation (so-called Virtual instruments). A more advanced level of the systems "digitalization" is to use the mixed reality environments. In solutions using Augmented reality (AR) customized HMI is displayed to the operator when he approaches to each device. Identification of device is done by image recognition of photo codes. Visualization is achieved by (optical) see-through head mounted display (HMD). Control can be done for example by means of a handheld touch panel. Using the immersive virtual environment, the command center can be digitally reconstructed. Workstation requires only VR system (HMD) and access to information network. Operator can interact with devices in such a way as it would perform in real world (for example with the virtual hands). Because of their procedures (an analysis of central vision, eye tracking) MR systems offers another useful feature of reducing requirements for system data throughput. Due to the fact that at the moment we focus on the single device. Experiments carried out using Moverio BT-200 and SteamVR systems and the results of experimental application testing clearly indicate the ability to create a fully functional information system with the use of mixed reality technology.

  8. User-Friendly Data-Sharing Practices for Fostering Collaboration within a Research Network: Roles of a Vanguard Center for a Community-Based Study.

    Science.gov (United States)

    Lee, Jae Eun; Sung, Jung Hye; Barnett, M Edwina; Norris, Keith

    2015-12-22

    Although various attempts have been made to build collaborative cultures for data sharing, their effectiveness is still questionable. The Jackson Heart Study (JHS) Vanguard Center (JHSVC) at the NIH-funded Research Centers in Minority Institutions (RCMI) Translational Research Network (RTRN) Data Coordinating Center (DCC) may be a new concept in that the data are being shared with a research network where a plethora of scientists/researchers are working together to achieve their common goal. This study describes the current practices to share the JHS data through the mechanism of JHSVC. The JHS is the largest single-site cohort study to prospectively investigate the determinants of cardiovascular disease among African-Americans. It has adopted a formal screened access method through a formalized JHSVC mechanism, in which only a qualified scientist(s) can access the data. The role of the DCC was to help RTRN researchers explore hypothesis-driven ideas to enhance the output and impact of JHS data through customized services, such as feasibility tests, data querying, manuscript proposal development and data analyses for publication. DCC has implemented these various programs to facilitate data utility. A total of 300 investigators attended workshops and/or received training booklets. DCC provided two online and five onsite workshops and developed/distributed more than 250 copies of the booklet to help potential data users understand the structure of and access to the data. Information on data use was also provided through the RTRN website. The DCC efforts led to the production of five active manuscript proposals, seven completed publications, 11 presentations and four NIH grant proposals. These outcomes resulted from activities during the first four years; over the last couple of years, there were few new requests. Our study suggested that DCC-customized services enhanced the accessibility of JHS data and their utility by RTRN researchers and helped to achieve the

  9. User-Friendly Data-Sharing Practices for Fostering Collaboration within a Research Network: Roles of a Vanguard Center for a Community-Based Study

    Directory of Open Access Journals (Sweden)

    Jae Eun Lee

    2015-12-01

    Full Text Available Although various attempts have been made to build collaborative cultures for data sharing, their effectiveness is still questionable. The Jackson Heart Study (JHS Vanguard Center (JHSVC at the NIH-funded Research Centers in Minority Institutions (RCMI Translational Research Network (RTRN Data Coordinating Center (DCC may be a new concept in that the data are being shared with a research network where a plethora of scientists/researchers are working together to achieve their common goal. This study describes the current practices to share the JHS data through the mechanism of JHSVC. The JHS is the largest single-site cohort study to prospectively investigate the determinants of cardiovascular disease among African-Americans. It has adopted a formal screened access method through a formalized JHSVC mechanism, in which only a qualified scientist(s can access the data. The role of the DCC was to help RTRN researchers explore hypothesis-driven ideas to enhance the output and impact of JHS data through customized services, such as feasibility tests, data querying, manuscript proposal development and data analyses for publication. DCC has implemented these various programs to facilitate data utility. A total of 300 investigators attended workshops and/or received training booklets. DCC provided two online and five onsite workshops and developed/distributed more than 250 copies of the booklet to help potential data users understand the structure of and access to the data. Information on data use was also provided through the RTRN website. The DCC efforts led to the production of five active manuscript proposals, seven completed publications, 11 presentations and four NIH grant proposals. These outcomes resulted from activities during the first four years; over the last couple of years, there were few new requests. Our study suggested that DCC-customized services enhanced the accessibility of JHS data and their utility by RTRN researchers and helped to

  10. User-Friendly Data-Sharing Practices for Fostering Collaboration within a Research Network: Roles of a Vanguard Center for a Community-Based Study

    Science.gov (United States)

    Lee, Jae Eun; Sung, Jung Hye; Barnett, M. Edwina; Norris, Keith

    2015-01-01

    Although various attempts have been made to build collaborative cultures for data sharing, their effectiveness is still questionable. The Jackson Heart Study (JHS) Vanguard Center (JHSVC) at the NIH-funded Research Centers in Minority Institutions (RCMI) Translational Research Network (RTRN) Data Coordinating Center (DCC) may be a new concept in that the data are being shared with a research network where a plethora of scientists/researchers are working together to achieve their common goal. This study describes the current practices to share the JHS data through the mechanism of JHSVC. The JHS is the largest single-site cohort study to prospectively investigate the determinants of cardiovascular disease among African-Americans. It has adopted a formal screened access method through a formalized JHSVC mechanism, in which only a qualified scientist(s) can access the data. The role of the DCC was to help RTRN researchers explore hypothesis-driven ideas to enhance the output and impact of JHS data through customized services, such as feasibility tests, data querying, manuscript proposal development and data analyses for publication. DCC has implemented these various programs to facilitate data utility. A total of 300 investigators attended workshops and/or received training booklets. DCC provided two online and five onsite workshops and developed/distributed more than 250 copies of the booklet to help potential data users understand the structure of and access to the data. Information on data use was also provided through the RTRN website. The DCC efforts led to the production of five active manuscript proposals, seven completed publications, 11 presentations and four NIH grant proposals. These outcomes resulted from activities during the first four years; over the last couple of years, there were few new requests. Our study suggested that DCC-customized services enhanced the accessibility of JHS data and their utility by RTRN researchers and helped to achieve the

  11. My Friends Right Next to Me: A Laboratory Investigation on Predictors and Consequences of Experiencing Social Closeness on Social Networking Sites.

    Science.gov (United States)

    Neubaum, German; Krämer, Nicole C

    2015-08-01

    In the last decade, research has provided a series of insights into how and why the use of social networking sites (SNSs) can be socially and psychologically beneficial for individuals. The present research extends this evidence by focusing on the concept of social closeness as a feeling experienced when using SNSs. In a laboratory setting, participants (N=60) spent 10 minutes on Facebook, and then reported their experiences during this session. Analyses of participants' usage behavior and their experiences revealed that the more time users spent interacting with other users (e.g., commenting on updates), the closer they felt to other people. Interacting with others also predicted users' positive emotional states after Facebook use; this effect may be explained by the perception of social closeness. This study is one of the first to employ momentary measures, offering a further theoretical link between active SNS use and well-being.

  12. Ubuntu Linux Toolbox 1000 + Commands for Ubuntu and Debian Power Users

    CERN Document Server

    Negus, Christopher

    2008-01-01

    In this handy, compact guide, you'll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

  13. "My friend who bought it for me, she has had an abortion before." The influence of Ghanaian women's social networks in determining the pathway to induced abortion.

    Science.gov (United States)

    Rominski, Sarah D; Lori, Jody R; Morhe, Emmanuel Sk

    2017-07-01

    Even given the liberal abortion law in Ghana, abortion complications are a large contributor to maternal morbidity and mortality. This study sought to understand why young women seeking an abortion in a legally enabling environment chose to do this outside the formal healthcare system. Women being treated for complications arising from a self-induced abortion as well as for elective abortions at three hospitals in Ghana were interviewed. Community-based focus groups were held with women as well as men, separately. Interviews and focus group discussions were conducted until saturation was reached. A total of 18 women seeking care for complications from a self-induced abortion and 11 seeking care for an elective abortion interviewed. The women ranged in age from 13 to 35 years. There were eight focus groups; two with men and six with women. The reasons women self-induce are: (1) abortion is illegal; (2) attitudes of the healthcare workers; (3) keeping the pregnancy a secret; and (4) social network influence. The meta-theme of normalisation of self-inducing' an abortion was identified. When women are faced with an unplanned and unwanted pregnancy, they consult individuals in their social network whom they know have dealt with a similar situation. Misoprostol is widely available in Ghanaian cities and is successful at inducing an abortion for many women. In this way, self-inducing abortions using medication procured from pharmacists and chemical sellers has become normalised for women in Kumasi, Ghana. © Faculty of Sexual and Reproductive Healthcare of the Royal College of Obstetricians and Gynaecologists (unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  14. Simulating the Commander's Decision Process

    National Research Council Canada - National Science Library

    Kovalchik, Joseph G; Labin, Jonathan W; Rosenlof, Eric R

    2007-01-01

    ... * Commander Federate simulates the human decision process by employing -- A fuzzy expert system to set warfare priorities either by time or event and provides inter-warfare area conflict resolution...

  15. Garrison Command Skills for Success

    Science.gov (United States)

    2008-01-01

    Leadership” in Leadership: Theory and Practice, third edition, by Peter G. Northouse (Thousand Oaks, CA.: Sage) 2006, pp. 206-210 11. From Garrison Commander briefing received via personal e-mail, Oct. 3, 2007.

  16. Identification of Company Command Competencies

    Science.gov (United States)

    2013-06-01

    45 Virtual role plays ( VRPs ) could be used to measure many of the company command competencies identified in this project. In a VRP , the user...could play the role of a Company Commander who must deal with myriad crises, challenges, and potential opportunities. In a web- enabled VRP , the user...to be concerned about. Future research should create VRPs or other engaging assessments to determine proficiency levels on the identified company

  17. Company Command: The Bottom Line

    Science.gov (United States)

    1990-11-20

    34 Separation from the Militar. -Alcohol and Drug Abuse -Unsatisfactory Performance -Overweight Problem - Homosexuality -Civil Conviction -Acts or Patterns of...cases-such as drug abusers, homosexuals , and thieves. New company commanders often choose administra- tive elimination proceedings over court-martial...opportunity goal is to create a command cli- mate that nurtures fair treatment for all soldiers. 98 Personnel and Administration Shortly after you

  18. Command Process Modeling & Risk Analysis

    Science.gov (United States)

    Meshkat, Leila

    2011-01-01

    Commanding Errors may be caused by a variety of root causes. It's important to understand the relative significance of each of these causes for making institutional investment decisions. One of these causes is the lack of standardized processes and procedures for command and control. We mitigate this problem by building periodic tables and models corresponding to key functions within it. These models include simulation analysis and probabilistic risk assessment models.

  19. The Puerto Rico Seismic Network Broadcast System: A user friendly GUI to broadcast earthquake messages, to generate shakemaps and to update catalogues

    Science.gov (United States)

    Velez, J.; Huerfano, V.; von Hillebrandt, C.

    2007-12-01

    The Puerto Rico Seismic Network (PRSN) has historically provided locations and magnitudes for earthquakes in the Puerto Rico and Virgin Islands (PRVI) region. PRSN is the reporting authority for the region bounded by latitudes 17.0N to 20.0N, and longitudes 63.5W to 69.0W. The main objective of the PRSN is to record, process, analyze, provide information and research local, regional and teleseismic earthquakes, providing high quality data and information to be able to respond to the needs of the emergency management, academic and research communities, and the general public. The PRSN runs Earthworm software (Johnson et al, 1995) to acquire and write waveforms to disk for permanent archival. Automatic locations and alerts are generated for events in Puerto Rico, the Intra America Seas, and the Atlantic by the EarlyBird system (Whitmore and Sokolowski, 2002), which monitors PRSN stations as well as some 40 additional stations run by networks operating in North, Central and South America and other sites in the Caribbean. PRDANIS (Puerto Rico Data Analysis and Information System) software, developed by PRSN, supports manual locations and analyst review of automatic locations of events within the PRSN area of responsibility (AOR), using all the broadband, strong-motion and short-period waveforms Rapidly available information regarding the geographic distribution of ground shaking in relation to the population and infrastructure at risk can assist emergency response communities in efficient and optimized allocation of resources following a large earthquake. The ShakeMap system developed by the USGS provides near real-time maps of instrumental ground motions and shaking intensity and has proven effective in rapid assessment of the extent of shaking and potential damage after significant earthquakes (Wald, 2004). In Northern and Southern California, the Pacific Northwest, and the states of Utah and Nevada, ShakeMaps are used for emergency planning and response, loss

  20. The Double Love Commandment

    Directory of Open Access Journals (Sweden)

    Francois P. Viljoen

    2015-03-01

    Full Text Available The Gospel of Matthew was written during a period of dispute between the Matthean community and their fellow Jews, with the Pharisees playing a leading role. The Matthean community was heir to the same scriptures as its opponents. They continued to have a firm commitment to the Torah, but they developed a distinctive understanding of it based on Jesus’ teaching. The formation of this community is investigated in this article, considering the Mediterranean perspectives of group-oriented societies prevalent in the first century. Such a group provided a sense of self and an interactive support system, where love functioned to bind the group together. The subordinates showed their undivided loyalty towards their superiors because of the favours they received from them, whilst they supported and cared for other members within the group as they care for themselves. Reading the double love commandment of Matthew 22:34−40 from this perspective reveals significant aspects of the community’s identity with regard to their commitment to God and their view of their neighbours. Die Dubbele Liefdesgebod. Die Matteusevangelie is gedurende ’n periode van konfliktussen die Matteusgemeenskap en mede-Jode geskryf met die Fariseërs in ’n leidende rol. Die Matteusgemeenskap het van dieselfde geskrifte as hulle opponente gebruik gemaak. Hulle was steeds aan die Torah lojaal, maar het ’n unieke interpretasie daarvan gehuldig, gebaseer op die onderrig van Jesus. In hierdie artikel word die vorming van die Matteusgemeenskap ondersoek met inagneming van die Mediterreense beskouing van die groepgeoriënteerde gemeenskappe wat tipies van die eerste eeu was. So ’n groep het aan individue ’n bewustheid van eie waarde verskaf te midde van ’n interaktiewe ondersteuningsisteem waarin liefde as samebindende faktor gefunksioneer het. Ondergeskiktes het onverdeelde lojaliteit teenoor hulle meerderes betoon vanweë die gunste wat hulle van die meerderes geniet het

  1. The Double Love Commandment

    Directory of Open Access Journals (Sweden)

    Francois P. Viljoen

    2015-03-01

    Full Text Available The Gospel of Matthew was written during a period of dispute between the Matthean community and their fellow Jews, with the Pharisees playing a leading role. The Matthean community was heir to the same scriptures as its opponents. They continued to have a firm commitment to the Torah, but they developed a distinctive understanding of it based on Jesus’ teaching. The formation of this community is investigated in this article, considering the Mediterranean perspectives of group-oriented societies prevalent in the first century. Such a group provided a sense of self and an interactive support system, where love functioned to bind the group together. The subordinates showed their undivided loyalty towards their superiors because of the favours they received from them, whilst they supported and cared for other members within the group as they care for themselves. Reading the double love commandment of Matthew 22:34−40 from this perspective reveals significant aspects of the community’s identity with regard to their commitment to God and their view of their neighbours.Die Dubbele Liefdesgebod. Die Matteusevangelie is gedurende ’n periode van konfliktussen die Matteusgemeenskap en mede-Jode geskryf met die Fariseërs in ’n leidende rol. Die Matteusgemeenskap het van dieselfde geskrifte as hulle opponente gebruik gemaak. Hulle was steeds aan die Torah lojaal, maar het ’n unieke interpretasie daarvan gehuldig, gebaseer op die onderrig van Jesus. In hierdie artikel word die vorming van die Matteusgemeenskap ondersoek met inagneming van die Mediterreense beskouing van die groepgeoriënteerde gemeenskappe wat tipies van die eerste eeu was. So ’n groep het aan individue ’n bewustheid van eie waarde verskaf te midde van ’n interaktiewe ondersteuningsisteem waarin liefde as samebindende faktor gefunksioneer het. Ondergeskiktes het onverdeelde lojaliteit teenoor hulle meerderes betoon vanweë die gunste wat hulle van die meerderes geniet het

  2. Strategic Global Climate Command?

    Science.gov (United States)

    Long, J. C. S.

    2016-12-01

    Researchers have been exploring geoengineering because Anthropogenic GHG emissions could drive the globe towards unihabitability for people, wildlife and vegetation. Potential global deployment of these technologies is inherently strategic. For example, solar radiation management to reflect more sunlight might be strategically useful during a period of time where the population completes an effort to cease emissions and carbon removal technologies might then be strategically deployed to move the atmospheric concentrations back to a safer level. Consequently, deployment of these global technologies requires the ability to think and act strategically on the part of the planet's governments. Such capacity most definitely does not exist today but it behooves scientists and engineers to be involved in thinking through how global command might develop because the way they do the research could support the development of a capacity to deploy intervention rationally -- or irrationally. Internationalizing research would get countries used to working together. Organizing the research in a step-wise manner where at each step scientists become skilled at explaining what they have learned, the quality of the information they have, what they don't know and what more they can do to reduce or handle uncertainty, etc. Such a process can increase societal confidence in being able to make wise decisions about deployment. Global capacity will also be enhanced if the sceintific establishment reinvents misssion driven research so that the programs will identify the systemic issues invovled in any proposed technology and systematically address them with research while still encouraging individual creativity. Geoengineering will diverge from climate science in that geoengineering research needs to design interventions for some publically desirable goal and investigates whether a proposed intervention will acheive desired outcomes. The effort must be a systems-engineering design problem

  3. Distributed geolocation algorithm in mobile ad hoc networks using received signal strength differences

    Science.gov (United States)

    Guo, Shanzeng; Tang, Helen

    2012-05-01

    Future military wireless communication in a battlefield will be mobile ad hoc in nature. The ability to geolocate and track both friendly forces and enemies is very important in military command and control operations. However, current mobile ad hoc networks (MANET) have no capabilities to geolocate radio emitters that belong to enemy mobile ad hoc networks. This paper presents a distributed geolocation algorithm using received signal strength differences to geolocate enemy radio emitters by leveraging friendly force MANET infrastructure, and proposes a communication protocol for radio emitter geolocation applications. An enemy's radio emitter signal is detected, and its signal strength is measured by the nodes in a friendly mobile ad hoc network. The identity of the enemy radio emitter is extracted from the decoded message header of the medium access control layer. By correlating and associating the enemy's radio emitter identity with its received signal strength, the enemy radio emitter is identified. The enemy's radio emitter identity and its received signal strength are distributed and shared among friendly mobile ad hoc nodes. Using received signal strength differences, a master friendly node can calculate the enemy's radio emitter geolocation, and build a recognized MANET picture (RMP). This MANET picture is then distributed to all friendly nodes for effective command and control operations. An advantage of this method is that mobile ad hoc nodes do not need special RF antennas to geolocate the enemy radio emitter as conventional electronic warfare techniques do. MATLAB-based simulations are presented to evaluate the accuracy and reliability of the proposed distributed geolocation algorithm under different MANET placements.

  4. Operational Command and Control of Joint Task Force Cyberspace Operations

    Science.gov (United States)

    2008-05-27

    is the “coordination and cooperation towar objectives”55 which “can be achieved either through Unity of Command ( UoC ) or through cooperation.”56...According to Dr. Vego, “the highest degree of effectiveness is ensured by having UoE though UoC ” and “failure to establish UoC results in a state of...offers an adversary the ability to do the same to friendly forces. According to Dr. Vego, “without [ UoC ] the [JTF] cannot bring all available forces to

  5. The ergonomics of command and control

    OpenAIRE

    Stanton, NA; Baber, C

    2006-01-01

    Since its inception, just after the Second World War, ergonomics research has paid special attention to the issues surrounding human control of systems. Command and Control environments continue to represent a challenging domain for Ergonomics research. We take a broad view of Command and Control research, to include C2 (Command and Control), C3 (Command, Control and Communication), and C4 (Command, Control, Communication and Computers) as well as human supervisory control paradigms. This spe...

  6. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 2: Command, Control, Communications and Computer Architectures

    Science.gov (United States)

    2003-01-01

    such as the Multi-Channel (MC) and Single Channel (SC) Tactical Satelite TACSAT) systems. Even with supporting the 270 separate command posts, MSE and...IMACTS/IPL DISN LES/disk/ tape Binary SECRET Imagery Other Govt. LANDSAT LANDSAT Disk Binary SECRET SPOT SPOT Disk Binary SECRET Imagery Allied French

  7. New command centre of the Lech Power Works. Planning and execution of command and control technology

    Energy Technology Data Exchange (ETDEWEB)

    Marschall, J.

    1985-10-28

    On February 25, 1985 the Lech Electricity Works in Augsburg took into service their new control centre for the operational control of the entire maximum, high and low voltage networks. As the replacement for the now outpaced old control centre it was installed along the most modern lines under retention of the remote control substations. The total of eight combined operation process computer AEG 80-30 charaterise the scope of the network command technology, whereby in several subsectors completely new paths were trodden for the first time. So for example the design of light technology, the monitor display illumination and the graphical system Gradas which controls the medium voltage network, operation using digitizer and the operation telecommunications system. (orig.).

  8. One pot environmental friendly

    Directory of Open Access Journals (Sweden)

    Heba H. El-Maghrabi

    2016-12-01

    Full Text Available A nanocomposite synthesis of TiO2NT-graphene was prepared from titanium dioxide nanotubes and graphene oxide (GO by a simple environmental friendly method (green method. The structure, surface morphology and chemical composition were characterized by Fourier-transform infrared spectroscopy (FT-IR, X-ray diffract meter (XRD, Raman, energy dispersive X-ray spectrometer (EDS, transmission electron microscopy (TEM, and selected area electron diffraction(SAED. XRD results confirm the interaction of TiO2-NT with graphene. A fast decomposition of the phenol was observed with a degradation efficiency of 70.6% within 180 min.

  9. Climate friendly dietary guidelines

    DEFF Research Database (Denmark)

    Trolle, Ellen; Mogensen, Lisbeth; Thorsen, Anne Vibeke

    2014-01-01

    The aim of this study was to investigate how the present Danish diet could be changed in a climate friendly direction that follows the recommendations of a healthy diet. The carbon footprint (CF) of an average Danish diet was calculated and compared to CF of a recommended healthy diet by 1......%, if the healthy diet was eaten instead of the average current diet. However, if the diet was climate optimized by choosing foods with a low CF within the food groups; meat, vegetables and fruit, CF of this diet may be reduced by 23 % compared to CF of the average diet....

  10. The happiness paradox: your friends are happier than you

    NARCIS (Netherlands)

    Bollen, J.; Leemput, van de I.A.; Goncalves Souza, M.B.; Ruan, G.

    2016-01-01

    Most individuals in social networks experience a so-called Friendship Paradox: they are less popular than their friends on average. This effect may explain recent findings that widespread social network media use leads to reduced happiness. However the relation between popularity and happiness is

  11. Issues in Afloat Command Control: The Computer-Commander Interface

    Science.gov (United States)

    1979-03-01

    Officer on watch, who all along had been more than a little worried, was becoming gravely uneasy. The lights of that distant steamer were looking " queer ...T.T.T., p. 3-4, 21-36, Houghton Mifflin Company, 1927. 10. Lawson, J.S., A Unified Theory of Command Control, paper presented at Military operations

  12. Ready...Set... Command! Rethinking Training for Squadron Commanders

    Science.gov (United States)

    2016-02-16

    current environment and develop future outcomes.53 Squadron commanders must learn how to harness critical thinking and promote its benefits through the...building a culture of innovation, critical thinking , and strategic alignment. 40 Gen Stephen R... critical . Critical Thinking 44 David Magellan Horth and Jonathan Vehar, “Innovation

  13. Apollo 11 Command Service Module

    Science.gov (United States)

    1969-01-01

    A close-up view of the Apollo 11 command service module ready to be mated with the spacecraft LEM adapter of the third stage. The towering 363-foot Saturn V was a multi-stage, multi-engine launch vehicle standing taller than the Statue of Liberty. Altogether, the Saturn V engines produced as much power as 85 Hoover Dams.

  14. Experiences as Deputy Commander Air

    NARCIS (Netherlands)

    Freek Meulman

    2009-01-01

    In the period January 2007-February 2008 I was sent out to Afghanistan as Deputy Commander Air/Director Air Coordination Element. I worked at the International Security Assistance Force (ISAF) X Headquarters in Kabul. ISAF is a United Nations (UN) mandated mission led by the North Atlantic Treaty

  15. Environmentally friendly road construction

    Directory of Open Access Journals (Sweden)

    A.I. Essawy

    2013-06-01

    Full Text Available Environmental pollution is a major problem in developing countries like Egypt. Reuse of waste polymers is considered an attractive solution for environmental white pollution and reducing of the costs of road pavement and maintenance. This research aims to prepare environmentally friendly hot mix asphalt (HMA for paving using some industrial wastes as polypropylene and polyester fibers. The solid materials in the mix include normal and highly porous aggregates. 5% and 10% of waste polymers by weight of the asphalt were used to prepare special binders. The samples were tested for their physical properties, chemical properties, aging, scanning electron microscopy (SEM and thermo-gravimetric analysis (TGA. The results revealed that the prepared HMA using 5% of waste polymer had high performance as compared to the ordinary one and the waste polymer could be used in road construction.

  16. Caffeine: Friend or Foe?

    Science.gov (United States)

    Doepker, Candace; Lieberman, Harris R; Smith, Andrew Paul; Peck, Jennifer D; El-Sohemy, Ahmed; Welsh, Brian T

    2016-01-01

    The debate on the safety of and regulatory approaches for caffeine continues among various stakeholders and regulatory authorities. This decision-making process comes with significant challenges, particularly when considering the complexities of the available scientific data, making the formulation of clear science-based regulatory guidance more difficult. To allow for discussions of a number of key issues, the North American Branch of the International Life Sciences Institute (ILSI) convened a panel of subject matter experts for a caffeine-focused session entitled "Caffeine: Friend or Foe?," which was held during the 2015 ILSI Annual Meeting. The panelists' expertise covered topics ranging from the natural occurrence of caffeine in plants and interindividual metabolism of caffeine in humans to specific behavioral, reproductive, and cardiovascular effects related to caffeine consumption. Each presentation highlighted the potential risks, benefits, and challenges that inform whether caffeine exposure warrants concern. This paper aims to summarize the key topics discussed during the session.

  17. Friends, Depressive Symptoms, and Life Satisfaction Among Older Korean Americans.

    Science.gov (United States)

    Roh, Soonhee; Lee, Yeon-Shim; Lee, Kyoung Hag; Shibusawa, Tazuko; Yoo, Grace J

    2015-08-01

    This study examined the interactive effects of social network support and depressive symptoms on life satisfaction among older Korean Americans (KAs). Using data from a sample of 200 elders in a large metropolitan area (M age = 72.50, SD = 5.15), hierarchical regression analysis was used to examine the interaction between social network support and depressive symptoms on life satisfaction among older KAs. After controlling for demographic variables, both social network support and depressive symptoms were identified as predictors for life satisfaction. Interaction effects indicated strong associations between higher social network support specifically from friends and lower depressive symptoms with higher levels of life satisfaction. Findings highlight the important role that friends play in terms of social network support for the mental health of older KAs, and the need for geriatric practitioners to monitor and assess the quality of social network support-including friendships-when working with older KAs.

  18. 32 CFR 724.405 - Commandant of the Marine Corps or the Commander, Naval Military Personnel Command.

    Science.gov (United States)

    2010-07-01

    ..., Naval Military Personnel Command. 724.405 Section 724.405 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Principal Elements of the Navy Department Discharge Review System § 724.405 Commandant of the Marine Corps or the Commander, Naval Military...

  19. Applying the Combatant Command Construct to the DHS Command Structure

    Science.gov (United States)

    2012-06-17

    Furthermore, this type of cooperation does nothing to cure the organizational myopathy or component protectionism that exists within DHS. The...organizations and their past and present challenges in the joint effort. These shared challenges include unity of command, service protectionism , mission...DRO). Even industry is not immune from this confusion. If a shipping company has questions regarding import, export , or tariffs, they would have

  20. Friends with Benefits: Women Want "Friends", Men Want "Benefits"

    Science.gov (United States)

    McGinty, Kristen; Knox, David; Zusman, Marty E.

    2007-01-01

    One-hundred-and-seventy undergraduates at a large southeastern university completed a confidential anonymous 23 item questionnaire designed to assess the prevalence, attitudes, and sex differences of involvement in a "friends with benefits" (FWB) relationship (non romantic friends who also have a sexual relationship). Almost sixty percent of both…

  1. Command Decision-Making: Experience Counts

    National Research Council Canada - National Science Library

    Wolgast, Kelly A

    2005-01-01

    Decision-making is the mainstay of military leadership and command. Due to the changed nature of the current military environment, military commanders can no longer rely solely on the traditional Military Decision-making Process (MDMP...

  2. Command and Control in Littoral Operations

    Science.gov (United States)

    2016-05-13

    littoral environment, a co-equal command model is likely to fail as the interests of the CATF and CLF diverge. A capable commander leading an...headquarters with the JFMCC or JTF commander would also reduce turnaround time. Finally, the integrated staff model enhances cooperation and...successful accomplishment of his mission.” 25 Giving overall command of the Amphibious Force to an officer who is physically present and leading

  3. Let's Just Be Friends

    Science.gov (United States)

    Goode, Julia

    2008-01-01

    The author discusses her experiences using the "Facebook" social networking website, and the evolution of its use from a window on students' opinions and activities, to an uncomfortable forum where response to grades were visible in real time, and because of the instructor's known potential presence, students may have been intimidated from sharing…

  4. Company Command: The Bottom Line

    Science.gov (United States)

    1990-01-01

    PHILOSOPHY-After you publish your command philosophy (your overall modus operandi ), publish your training philosophy. It will estab- lish your guidelines... killer for the soldier and damages unit mo- rale. A good first sergeant will handle PLDC preparation for Vou. 126 Trraii ig Develop, where necessary. an...by serial numbers. Sub-hand receipt all weapons to your unit armorer. En- sure no soldier in your unit can draw a weapon from the arms room unless he

  5. On Preparing for Squadron Command

    Science.gov (United States)

    1988-04-01

    Management Control System (AINCS) Briefing 19, Records Management Briefing 20. PCS Funding e.nd PCS Policy Changes Briefing 21. Channels for Assignment...Parsonnel (Dr) S.1 A3signment Policy Changes 2. Civilian Performance Appraisals and Awards 3, Enllisted Retention and Recruitment Programs 4, Family...3. Officer Force Manangement 14. Quality Control (QC) for Enlisted Personnel on Assignment 10. Rated Officer Retention 11. Squadron Commander

  6. Marketing animal-friendly products

    NARCIS (Netherlands)

    Riemsdijk, van Lenka; Ingenbleek, Paul T.M.; Trijp, van Hans C.M.; Veen, van der Gerrita

    2017-01-01

    This article presents a conceptual framework that aims to encourage consumer animal-friendly product choice by introducing positioning strategies for animal-friendly products. These strategies reinforce the animal welfare with different types of consumption values and can therefore reduce

  7. Environmental friendly nitrogen fertilization.

    Science.gov (United States)

    Shaviv, Avi

    2005-09-01

    With the huge intensification of agriculture and the increasing awareness to human health and natural resources sustainability, there was a shift towards the development of environmental friendly N application approaches that support sustainable use of land and sustain food production. The effectiveness of such approaches depends on their ability to synchronize plant nitrogen demand with its supply and the ability to apply favored compositions and dosages of N-species. They are also influenced by farming scale and its sophistication, and include the following key concepts: (i) Improved application modes such as split or localized ("depot") application; (ii) use of bio-amendments like nitrification and urease inhibitors and combinations of (i) and (ii); (iii) use of controlled and slow release fertilizers; (iv) Fertigation-fertilization via irrigation systems including fully automated and controlled systems; and (v) precision fertilization in large scale farming systems. The paper describes the approaches and their action mechanisms and examines their agronomic and environmental significance. The relevance of the approaches for different farming scales, levels of agronomic intensification and agro-technical sophistication is examined as well.

  8. Windows Command Line Administration Instant Reference

    CERN Document Server

    Mueller, John Paul

    2010-01-01

    The perfect companion to any book on Windows Server 2008 or Windows 7, and the quickest way to access critical information. Focusing just on the essentials of command-line interface (CLI), Windows Command-Line Administration Instant Reference easily shows how to quickly perform day-to-day tasks of Windows administration without ever touching the graphical user interface (GUI). Specifically designed for busy administrators, Windows Command-Line Administration Instant Reference replaces many tedious GUI steps with just one command at the command-line, while concise, easy to access answers provid

  9. Friending the Virgin

    Directory of Open Access Journals (Sweden)

    Larry Friedlander

    2011-07-01

    Full Text Available This article looks at how previous practice of portraiture prepared the way for self-presentation on social networking sites. A portrait is not simply an exercise in the skillful or “realistic” depiction of a subject. Rather, it is a rhetorical exercise in visual description and persuasion and a site of intricate communicative processes. A long evolution of visual culture, intimately intertwined with evolving notions of identity and society, was necessary to create the conditions for the particular forms of self-representation we encounter on Facebook. Many of these premodern strategies prefigure ones we encounter on Facebook. By delineating the ways current practices reflect earlier ones, we can set a baseline from which we can isolate the precise novelty of current practice in social networking sites.

  10. Friending the Virgin

    OpenAIRE

    Larry Friedlander

    2011-01-01

    This article looks at how previous practice of portraiture prepared the way for self-presentation on social networking sites. A portrait is not simply an exercise in the skillful or “realistic” depiction of a subject. Rather, it is a rhetorical exercise in visual description and persuasion and a site of intricate communicative processes. A long evolution of visual culture, intimately intertwined with evolving notions o...

  11. Parental influences on memories of parents and friends.

    Science.gov (United States)

    Tani, Franca; Bonechi, Alice; Peterson, Carole; Smorti, Andrea

    2010-01-01

    The authors evaluated the role parent-child relationship quality has on two types of memories, those of parents and those of friends. Participants were 198 Italian university students who recalled memories during 4 separate timed memory-fluency tasks about their preschool, elementary school, middle school, high school and university years. Half were instructed to recall memories involving parents and the remainder memories involving friends. Moreover, parent-child relationships were assessed by the Network of Relationships Inventory (NRI; W. Furman & D. Buhrmester, 1985) and Adolescents' Report of Parental Monitoring (D. M. Capaldi & G. R. Patterson, 1989). Results showed that men with positive parent-son relationships had more memories of parents and more affectively positive memories of friends, supporting a consistency model positing similarity between parent-child relationships and memories of friends. Women with positive parental relationship quality had more affectively positive memories of parents but for friends, positive relationship quality only predicted positive memories when young. At older ages, especially middle school-aged children, negative parent-daughter relationships predicted more positive memories of friends, supporting a compensatory model. The gender of parent also mattered, with fathers having a more influential role on affect for memories of friends.

  12. 10 commandments of smile esthetics

    OpenAIRE

    Andre Wilson Machado

    2014-01-01

    The search for esthetic treatment has persisted in the routine of dental professionals. Following this trend, dental patients have sought treatment with the primary aim of improving smile esthetics. The aim of this article is to present a protocol to assess patient's smile: The 10 Commandments of smile esthetics. Pacientes em busca de tratamentos estéticos são uma constante na rotina de todos os profissionais que oferecem este tipo de serviço. Seguindo esta tendência, os pacientes odontoló...

  13. A smarter common operational picture: The application of abstraction hierarchies to naval command and control

    OpenAIRE

    Arciszewski, H.F.R.; De Greef, T.E.

    2011-01-01

    The last decade shows significant steps in connecting military command and control systems from different defense forces optimizing joint and combined operations. However, a Common Operational Picture (COP) that provides all actors with sufficient, accurate, and timely information is still an elusive target. Additional and more abstract information is required to comprehend the situation better, including a representation of the friendly, neutral and hostile courses of action and the roles of...

  14. ART OF THE POSSIBLE: SECURING AIR FORCE SPACE COMMAND MISSION SYSTEMS FOR THE WARFIGHTER

    Science.gov (United States)

    2016-10-23

    AU/ACSC/2016 AIR COMMAND STAFF COLLEGE AIR UNIVERSITY ART OF THE POSSIBLE: SECURING AIR FORCE SPACE COMMAND MISSION SYSTEMS FOR THE...24th Air Force provides Tier II CSSP support for both non-secure and secret network but not for any of the nearly 250 spaced based mission systems...objectives that specifically map to the four primary concerns and issues. Therefore the 250 AFSPC mission systems supporting DOD warfighters from a space

  15. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  16. The Food Friends: Encouraging Preschoolers to Try New Foods

    Science.gov (United States)

    Bellows, Laura; Anderson, Jennifer

    2006-01-01

    In response to concerns about children's eating behaviors, the Colorado Nutrition Network developed and tested Food Friends--Making New Foods Fun for Kids. The program was designed as a 12-week social marketing campaign aimed at encouraging preschool-age children to try new foods, such as Ugli Fruit, couscous, and daikon radish. Tasting novel…

  17. Blossom Point Satellite Tracking and Command Station

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The Blossom Point Satellite Command and Tracking Facility (BP) provides engineering and operational support to several complex space systems for the Navy...

  18. Age-Friendly Portland: a university-city-community partnership.

    Science.gov (United States)

    Neal, Margaret B; DeLaTorre, Alan K; Carder, Paula C

    2014-01-01

    This article addresses the question of how creating an age-friendly city has come to be an important policy and planning issue in Portland, Oregon. In 2006, researchers from Portland State University's Institute on Aging examined the meanings of age friendliness among a broad range of participants in Portland, Oregon. The research was conducted in conjunction with the World Health Organization's (WHO) Age-Friendly Cities project and followed the completion of two earlier non-WHO-related projects. The city of Portland, through the Institute on Aging, was one of nine original members to apply for and be accepted into the WHO Global Network of Age-Friendly Cities and Communities. An Age-Friendly Portland Advisory Council was formed to guide the development of an action plan, monitor progress over time, and suggest additional research. To understand how Portland's age-friendly policy effort has developed over time, we use Kingdon's (1984) agenda-setting framework to explain how the policy problem was formulated, how solutions were developed, and the influence of local politics. The policy actors, including individuals and organizations working within and outside of government, are described. The Portland experience provides a case study that other cities, especially those with a strong commitment to community-engaged urban planning, may find useful as they develop age-friendly initiatives.

  19. Command and Control of Special Operations Forces Missions in the US Northern Command Area of Responsibility

    National Research Council Canada - National Science Library

    McGregor, Ottis W., III

    2005-01-01

    The need for a well thought out, planned, and rehearsed command and control organization to conduct special operations in the US Northern Command Area of Responsibility is vital to success in defending the Homeland...

  20. Capturing a Commander's decision making style

    Science.gov (United States)

    Santos, Eugene; Nguyen, Hien; Russell, Jacob; Kim, Keumjoo; Veenhuis, Luke; Boparai, Ramnjit; Stautland, Thomas Kristoffer

    2017-05-01

    A Commander's decision making style represents how he weighs his choices and evaluates possible solutions with regards to his goals. Specifically, in the naval warfare domain, it relates the way he processes a large amount of information in dynamic, uncertain environments, allocates resources, and chooses appropriate actions to pursue. In this paper, we describe an approach to capture a Commander's decision style by creating a cognitive model that captures his decisionmaking process and evaluate this model using a set of scenarios using an online naval warfare simulation game. In this model, we use the Commander's past behaviors and generalize Commander's actions across multiple problems and multiple decision making sequences in order to recommend actions to a Commander in a manner that he may have taken. Our approach builds upon the Double Transition Model to represent the Commander's focus and beliefs to estimate his cognitive state. Each cognitive state reflects a stage in a Commander's decision making process, each action reflects the tasks that he has taken to move himself closer to a final decision, and the reward reflects how close he is to achieving his goal. We then use inverse reinforcement learning to compute a reward for each of the Commander's actions. These rewards and cognitive states are used to compare between different styles of decision making. We construct a set of scenarios in the game where rational, intuitive and spontaneous decision making styles will be evaluated.

  1. XTCE. XML Telemetry and Command Exchange Tutorial

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad; Simon, Jerry

    2010-01-01

    An XML Telemetry Command Exchange (XTCE) tutoral oriented towards packets or minor frames is shown. The contents include: 1) The Basics; 2) Describing Telemetry; 3) Describing the Telemetry Format; 4) Commanding; 5) Forgotten Elements; 6) Implementing XTCE; and 7) GovSat.

  2. Precede-and-command revisited revisited

    NARCIS (Netherlands)

    Zwart, Cornelius

    2015-01-01

    Basing his argumentation on an analysis of condition C effects, Bruening (2014) proposes to replace the familiar notion of c-command underlying dependency relations with a precede-and-command condition, which defines dependency relations as precedence relations within a local domain (phase). In this

  3. Critical friends and collaborative partnership

    Directory of Open Access Journals (Sweden)

    Katarina Jandér

    2013-12-01

    Full Text Available Critical friends: a method for peer feedback The Critical Friend-method has been used in various educational settings to facilitate the process of continuous improvement in teaching. The aim of this study was to implement Critical Friends, and to find out if this method could be used for feedback on teaching as part of a librarians' professional development. The project was carried out within the Library Unit of the Faculty of Medicine at Lund University, Sweden, in collaboration with the faculty's Centre for Teaching and Learning. Seven librarians and an educational consultant from the Centre for Teaching and Learning participated; the educational consultant played an essential role in supervising and structuring the project and the evaluation process, preparing readings as well as being an active participant. The participants worked in pairs; the performance of one teacher and the associated classroom activities were observed by the critical friend, and then evaluated and discussed. Evaluation and results After two preparatory group meetings, a final meeting was held where all pairs reported what they had done and how they perceived the critical friend process. The experiences of the participating librarians were explored using a questionnaire. The questionnaire was analyzed using content analysis by one librarian and the educational consultant independently. The results suggested that use of the critical friend method could have a positive impact by achieving the following: strengthening shared values concerning teaching issues; promoting self-reflection on teaching; facilitating communication with colleagues; and reducing the sense of 'loneliness‘ in teaching. The difficulties in the implementation were lack of time and competing duties. It was perceived as an advantage to work in close partnership with the faculty's educational consultants, who were familiar with the organization.

  4. 32 CFR 700.702 - Responsibility and authority of commanders.

    Science.gov (United States)

    2010-07-01

    ... responsibility throughout their commands. (c) Subject to orders of higher authority, and subject to the... 32 National Defense 5 2010-07-01 2010-07-01 false Responsibility and authority of commanders. 700... Commanders In Chief and Other Commanders Titles and Duties of Commanders § 700.702 Responsibility and...

  5. Social Networks and Network Structures

    Science.gov (United States)

    2006-11-01

    Research in Command & Control • Latent Semantic Analysis – Team communication – Emergent team dynamics – Shared situation awareness • Dynamic Network...requirements – Information technology requirements 28 LSA Essentials of Latent Semantic Analysis 29 Communication Analysis • Goal: Automatically monitor and

  6. Implementing the Hospital Emergency Incident Command System: an integrated delivery system's experience.

    Science.gov (United States)

    Zane, Richard D; Prestipino, Ann L

    2004-01-01

    Hospital disaster manuals and response plans often lack formal command structure; instead, they rely on the presence of key individuals who are familiar with hospital operations, or who are in leadership positions during routine, day-to-day operations. Although this structure occasionally may prove to be successful, it is unreliable, as this leadership may be unavailable at the time of the crisis, and may not be sustainable during a prolonged event. The Hospital Emergency Incident Command System (HEICS) provides a command structure that does not rely on specific individuals, is flexible and expandable, and is ubiquitous in the fire service, emergency medical services, military, and police agencies, thus allowing for ease of communication during event management. A descriptive report of the implementation of the HEICS throughout a large healthcare network is reviewed. Implementation of the HEICS provides a consistent command structure for hospitals that enables consistency and commonality with other hospitals and disaster response entities.

  7. Kids and Elders: Forever Friends.

    Science.gov (United States)

    Dallman, Mary Ellen; Power, Sharon

    1996-01-01

    Describes "Forever Friends," an intergenerational program linking second graders with elderly residents of an independent living facility. Describes monthly sessions involving group and partnership activities; how elders participate in classroom activities, musical programs, creative writing projects, and school field trips; and how…

  8. Climate-friendly Default Rules

    DEFF Research Database (Denmark)

    Sunstein, Cass R.; Reisch, Lucia A.

    . The underlying reasons include the power of suggestion; inertia and procrastination; and loss aversion. If well-chosen, climate-friendly defaults are likely to have large effects in reducing the economic and environmental harms associated with various products and activities. In deciding whether to establish...

  9. Classical command of quantum systems.

    Science.gov (United States)

    Reichardt, Ben W; Unger, Falk; Vazirani, Umesh

    2013-04-25

    Quantum computation and cryptography both involve scenarios in which a user interacts with an imperfectly modelled or 'untrusted' system. It is therefore of fundamental and practical interest to devise tests that reveal whether the system is behaving as instructed. In 1969, Clauser, Horne, Shimony and Holt proposed an experimental test that can be passed by a quantum-mechanical system but not by a system restricted to classical physics. Here we extend this test to enable the characterization of a large quantum system. We describe a scheme that can be used to determine the initial state and to classically command the system to evolve according to desired dynamics. The bipartite system is treated as two black boxes, with no assumptions about their inner workings except that they obey quantum physics. The scheme works even if the system is explicitly designed to undermine it; any misbehaviour is detected. Among its applications, our scheme makes it possible to test whether a claimed quantum computer is truly quantum. It also advances towards a goal of quantum cryptography: namely, the use of 'untrusted' devices to establish a shared random key, with security based on the validity of quantum physics.

  10. Development and Validation of Nigerian Army Commanding Officers ...

    African Journals Online (AJOL)

    The factors depicted eight core functions of the commanding officer namely: general, command and training, administration, welfare, security, communication, liaison, and miscellaneous. The commanding officers' job description index constituted psychological constructs, which had implications for appointment, training and ...

  11. Disruptive Effects of Net-Centricity on Command and Control

    National Research Council Canada - National Science Library

    Bay, John S

    2008-01-01

    .... The military command hierarchy must therefore get accustomed to issuing orders to "nobody in particular," and commanders will lack an individual subordinate with whom to attribute the responsibility...

  12. Using an integrated methods approach to analyse the emergent properties of military command and control.

    Science.gov (United States)

    Walker, Guy H; Stanton, Neville A; Stewart, Rebecca; Jenkins, Daniel; Wells, Linda; Salmon, Paul; Baber, Chris

    2009-07-01

    This paper applies the event analysis for systemic teamwork (EAST) method to an example of military command and control. EAST offers a way to describe system level emergent properties that arise from the complex interactions of system components (human and technical). These are described using an integrated methods approach and modelled using Task, Social and Propositional networks. The current article is divided into three parts: a brief description of the military command and control context, a brief description of the EAST method, and a more in depth presentation of the analysis outcomes. The emergent properties of the military scenario relate to the degree of system reconfigurability, systems level situational awareness and the role of mediating technology. The findings are compared with similar analyses undertaken in civilian domains, in which the latest developments in command and control, under the aegis of Network Enabled Capability (NEC), are already in place.

  13. Why Your Friends Are More Important and Special Than You Think

    Directory of Open Access Journals (Sweden)

    Thomas U. Grund

    2014-04-01

    Full Text Available A large amount of research finds associations between individuals’ attributes and the position of individuals in network structures. In this article, I illustrate how such associations systematically affect the assessment of attributes through network neighbors. The friendship paradox—a general regularity in network contexts, which states that your friends are likely to have more friends than you—becomes relevant and extends to individuals’ attributes as well. First, I show that your friends are likely to be better informed (closeness, better intermediaries (betweenness and more powerful (eigenvector than you. Second, I suggest more generally that your friends are likely to be more special in their attributes than the population at large. Finally, I investigate the implications of this phenomenon in a dynamic setting. Applying calibrated agent-based simulations, I use a model of attribute adoption to emphasize how structurally introduced experiences penetrate the trajectory of social processes. Existing research does not yet adequately acknowledge this phenomenon.

  14. Introduction to the Bash Command Line

    Directory of Open Access Journals (Sweden)

    Ian Milligan

    2014-09-01

    Full Text Available This lesson uses a Unix shell, which is a command-line interpreter that provides a user interface for the Unix operating system and for Unix-like systems. This lesson will cover a small number of basic commands. By the end of this tutorial you will be able to navigate through your file system and find files, open them, perform basic data manipulation tasks such as combining and copying files, as well as both reading them and making relatively simple edits. These commands constitute the building blocks upon which more complex commands can be constructed to fit your research data or project. Readers wanting a reference guide that goes beyond this lesson are recommended to read Deborah S. Ray and Eric J. Ray, Unix and Linux: Visual Quickstart Guide, 4th edition (2009.

  15. Spacecraft command and control using expert systems

    Science.gov (United States)

    Norcross, Scott; Grieser, William H.

    1994-11-01

    This paper describes a product called the Intelligent Mission Toolkit (IMT), which was created to meet the changing demands of the spacecraft command and control market. IMT is a command and control system built upon an expert system. Its primary functions are to send commands to the spacecraft and process telemetry data received from the spacecraft. It also controls the ground equipment used to support the system, such as encryption gear, and telemetry front-end equipment. Add-on modules allow IMT to control antennas and antenna interface equipment. The design philosophy for IMT is to utilize available commercial products wherever possible. IMT utilizes Gensym's G2 Real-time Expert System as the core of the system. G2 is responsible for overall system control, spacecraft commanding control, and spacecraft telemetry analysis and display. Other commercial products incorporated into IMT include the SYBASE relational database management system and Loral Test and Integration Systems' System 500 for telemetry front-end processing.

  16. The friendly art of persuasion.

    Science.gov (United States)

    Davidhizar, R; Eshleman, J

    1999-12-01

    The ability to persuade is a critical skill for the health care professional in relating to employees, colleagues, and groups of individuals if health care objectives are to be promoted. However, persuasion is an art, which requires careful preplanning and deliberative actions if it is to be carried out successfully. Persuasion done in a friendly manner is more likely to be effective. This article provides techniques that will enable the health care professional to use persuasive methods most advantageously.

  17. Schema for Spacecraft-Command Dictionary

    Science.gov (United States)

    Laubach, Sharon; Garcia, Celina; Maxwell, Scott; Wright, Jesse

    2008-01-01

    An Extensible Markup Language (XML) schema was developed as a means of defining and describing a structure for capturing spacecraft command- definition and tracking information in a single location in a form readable by both engineers and software used to generate software for flight and ground systems. A structure defined within this schema is then used as the basis for creating an XML file that contains command definitions.

  18. Functions within the Naval Air Training Command

    Science.gov (United States)

    1984-02-15

    number. For X = N: Chief of Naval Air Training (CNATRA) Staff W: Training Air Wing ( TRAWING ) A: Naval Air Station (NAS) 3; Training Squadron...Provide assistance as required to TRAWING commands in preparation and execution of budget within the framework of guidance provided by CNATRA and...higher authority, WOO-69 Establish monetary controls as required to effectively monitor budget execution for TRAWING commands. WOO-70 Maintain

  19. Depression: Supporting a Family Member or Friend

    Science.gov (United States)

    Depression: Supporting a family member or friend Help a family member or friend dealing with depression get treatment and find resources. By Mayo Clinic Staff Helping someone with depression can be a challenge. If someone in your ...

  20. The Combat Cloud: Enabling Multi-Domain Command and Control Across the Range of Military Operations

    Science.gov (United States)

    2017-03-01

    connectivity, such as that of a Long Term Evolution ( LTE ) network. As the user transitions out of the area of LTE coverage, the connectivity then...detection LTE : Long Term Evolution MADL: Multifunctional Advanced Data Link MDC2: Multi-Domain Command and Control MEF: Marine Expeditionary Force

  1. Towards Human-Friendly Efficient Control of Multi-Robot Teams

    Science.gov (United States)

    Stoica, Adrian; Theodoridis, Theodoros; Barrero, David F.; Hu, Huosheng; McDonald-Maiers, Klaus

    2013-01-01

    This paper explores means to increase efficiency in performing tasks with multi-robot teams, in the context of natural Human-Multi-Robot Interfaces (HMRI) for command and control. The motivating scenario is an emergency evacuation by a transport convoy of unmanned ground vehicles (UGVs) that have to traverse, in shortest time, an unknown terrain. In the experiments the operator commands, in minimal time, a group of rovers through a maze. The efficiency of performing such tasks depends on both, the levels of robots' autonomy, and the ability of the operator to command and control the team. The paper extends the classic framework of levels of autonomy (LOA), to levels/hierarchy of autonomy characteristic of Groups (G-LOA), and uses it to determine new strategies for control. An UGVoriented command language (UGVL) is defined, and a mapping is performed from the human-friendly gesture-based HMRI into the UGVL. The UGVL is used to control a team of 3 robots, exploring the efficiency of different G-LOA; specifically, by (a) controlling each robot individually through the maze, (b) controlling a leader and cloning its controls to followers, and (c) controlling the entire group. Not surprisingly, commands at increased G-LOA lead to a faster traverse, yet a number of aspects are worth discussing in this context.

  2. My Friend Is Talking about Suicide

    Science.gov (United States)

    ... Facts Arrhythmias Abuse My Friend Is Talking About Suicide. What Should I Do? KidsHealth > For Teens > My Friend Is Talking About Suicide. What Should ... friend or classmate may attempt or die by suicide. When this happens, it's common ... emotions. Some teens say they feel guilty — especially if they felt ...

  3. Academic Achievement and Its Impact on Friend Dynamics.

    Science.gov (United States)

    Flashman, Jennifer

    2012-01-01

    Academic achievement in adolescence is a key determinant of future educational and occupational success. Friends play an important role in the educational process. They provide support and resources and can both encourage and discourage academic achievement. As a result, the friends adolescents make may help to maintain and exacerbate inequality if friends are sorted on the basis of academic achievement. These observations prompt the question: How does academic achievement affect the friendship ties made? Using data from the high schools in the Add Health saturated sample, the author models network change using a stochastic actor-based Markov model for the co-evolution of networks and behavior. This model is carried out at the school level for each of the high schools included in the saturated sample. Results show that in the most typical American schools, similarity in academic achievement is an important and consistent predictor of friendship ties in a dynamic context. High-achieving students are more likely to extend ties to other high-achieving students, net of other sociodemographic, network, and proximity characteristics, while low-achieving students are more likely to extend ties to other low-achieving students. Adolescents respond to changes in academic achievement by changing their friendship ties.

  4. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of Friends...... (WNF). Through the alumni network, Japan continues to infuse ideas to participants and alumni, who interpret and disseminate these ideas through alumni society networks and activities, but their discussions nationally and regionally also get reported back to Japan and affect future policies...

  5. Classroom Friends and Very Best Friends: A Short-Term Longitudinal Analysis of Relationship Quality

    Science.gov (United States)

    McChristian, Chrystal L.; Ray, Glen E.; Tidwell, Pamela S.; LoBello, Steven G.

    2012-01-01

    Second-, third-, fifth-, and sixth-grade children evaluated relationship qualities of a self-nominated friend and a self-nominated very best friend over a 6-month school year period. Results demonstrated that 76% of the friend relationships and 50% of the very best friend relationships were maintained over the course of the study. Children in…

  6. 32 CFR 536.3 - Command and organizational relationships.

    Science.gov (United States)

    2010-07-01

    ... potentially compensable events (PCEs) occurring within the command's geographic area of responsibility, in other areas for which the command is assigned claims responsibility, and during the course of the... supervision of the senior JA of each command in the area of responsibility of a command claims service so...

  7. Digital intelligent booster for DCC miniature train networks

    Science.gov (United States)

    Ursu, M. P.; Condruz, D. A.

    2017-08-01

    Modern miniature trains are now driven by means of the DCC (Digital Command and Control) system, which allows the human operator or a personal computer to launch commands to each individual train or even to control different features of the same train. The digital command station encodes these commands and sends them to the trains by means of electrical pulses via the rails of the railway network. Due to the development of the miniature railway network, it may happen that the power requirement of the increasing number of digital locomotives, carriages and accessories exceeds the nominal output power of the digital command station. This digital intelligent booster relieves the digital command station from powering the entire railway network all by itself, and it automatically handles the multiple powered sections of the network. This electronic device is also able to detect and process short-circuits and overload conditions, without the intervention of the digital command station.

  8. Linux Networking Cookbook

    CERN Document Server

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  9. Family and Friend Influence on Urban-Dwelling American Indian Adolescent Girl's Sexual Risk Behavior.

    Science.gov (United States)

    Saftner, Melissa A

    2016-09-01

    Previous research with American Indian (AI) adolescent sexual risk behavior primarily focused on reservation-dwelling youth despite 70% of AIs living off Native lands. Using grounded theory methodology, I sampled 20 adolescent AI girls via talking circles and interviews to explore the perceptions of AI adolescent girls living in an urban, Midwest area about the influence of family and friends on their sexual behavior. Similar to research with other racial groups, participants cited their family and friends as a major influence. Five unique themes emerged related to family and friend influence. Urban-dwelling AI girls rely on their female family members and peers for information related to sex and receive varying messages from their networks of family and friends, which often overlap. AI youth have unique family groups yet have some similarities to other ethnic groups with regard to family and friend relationships that may allow for enhanced intervention development. © The Author(s) 2015.

  10. Finding Galaxy Groups in Photometric-Redshift Space: The Probability Friends-of-Friends Algorithm

    Science.gov (United States)

    Li, I. H.; Yee, H. K. C.

    2008-03-01

    We present a structure-finding algorithm designed to identify galaxy groups in photometric-redshift data sets: the probability friends-of-friends (pFoF) algorithm. This algorithm is derived by combining the FoF algorithm in the transverse direction and the photometric-redshift probability densities in the radial dimension. The innovative characteristic of our group-finding algorithm is the improvement of redshift estimation via the constraints given by the transversely connected galaxies in a group, based on the assumption that all galaxies in a group have the same redshift. Tests using the Virgo Consortium Millennium Simulation mock catalogs allow us to show that the recovery rate of the pFoF algorithm is larger than 80% for mock groups of at least 2 × 1013 Msun, while the false detection rate is about 10% for pFoF groups containing around at least eight net members. Applying the algorithm to the Canadian Network for Observational Cosmology Survey group catalogs gives results which are consistent with the mock catalog tests. From all these results, we conclude that our group-finding algorithm offers an effective yet simple way to identify galaxy groups in photometric-redshift catalogs.

  11. Identifying and explicating variation among friends with benefits relationships.

    Science.gov (United States)

    Mongeau, Paul A; Knight, Kendra; Williams, Jade; Eden, Jennifer; Shaw, Christina

    2013-01-01

    This two-study report identifies and validates a typology containing seven types of "friends with benefits relationships" (FWBRs). Study 1 asked heterosexual students to define the term FWBR and to describe their experience with the relationship type. Qualitative analysis of these data identified seven types of FWBRs (true friends, network opportunism, just sex, three types of transition in [successful, failed, and unintentional], and transition out). Study 2 quantitatively differentiates these relationship types in the amount of nonsexual interaction, strength of the friendship at the first sexual interaction, and history of romantic relationships with the FWBR partner (before the FWBR, after it, or both). Results from both studies clearly suggest that FWBRs represent a diverse set of relationship formulations where both the benefits (i.e., repeated sexual contact) and the friends (i.e., relationship between partners) vary widely. In many cases, FWBRs represent a desire for, or an attempt at, shifting the relationship from friends to a romantic partnership. Other implications are discussed, as are limitations and directions for future research. The diverse nature of FWBRs provides challenges for researchers that likely require multiple methods and theoretical frames.

  12. Peers and Academic Achievement: A Longitudinal Study on Selection and Socialization Effects of In-Class Friends

    Science.gov (United States)

    Fortuin, Janna; van Geel, Mitch; Vedder, Paul

    2016-01-01

    The present study was conducted to analyze whether in-class friends influence each other's grades, and whether adolescents tend to select friends that are similar to them in terms of academic achievement. During 1 academic year, 542 eighth-grade students (M age = 13.3 years) reported on 3 different occasions on their in-class friendship networks.…

  13. Linux command line and shell scripting bible

    CERN Document Server

    Blum, Richard

    2014-01-01

    Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application

  14. Command and Data Handling Branch Internship

    Science.gov (United States)

    Billings, Rachel Mae

    2016-01-01

    planes, layer stacks, and other specified design rules such as plane clearance and hole size. Multiple consultation sessions were held with Hester Yim, the technical discipline lead for the Command and Data Handling Branch, and Christy Herring, the lead PCB layout designer in the Electronic Design and Manufacturing Branch in order to ensure proper configuration. At themoment, the PCB is awaiting revision by the latter-mentioned branch. Afterwards, the board will begin to undergo the manufacturing and testing process.Throughout the internship at Johnson Space Center, I gained several technical and professional skills. I gained proficiency in Altium Designer and experience using subversion clients, as well as knowledge in PSpice with OrCAD and battery design for spaceflight from on-site. I also gained networking, organization, and communication skills throughout meetings with coworkers and other interns. This internship at Johnson Space Center has impacted my future aspirations by further inspiring me to follow a career path into space rated engineering technology and human spaceflight applications. After graduation, I plan to attend graduate school for a master's or doctorate degree in electrical or computer engineering.

  15. The importance of perceived care and connectedness with friends and parents for adolescent social anxiety.

    Science.gov (United States)

    Van Zalk, Nejra; Van Zalk, Maarten

    2015-06-01

    Nonclinical social anxiety in adolescence can be highly problematic, as it likely affects current and especially new social interactions. Relationships with significant others, such as close friends, mothers, and fathers, could aid socially anxious adolescents' participation in social situations, thereby helping reduce feelings of social anxiety. We examined whether making friends as well as high friendship quality help reduce social anxiety over time, and whether friends', mothers', and fathers' care interact in reducing social anxiety. Using longitudinal data from 2,194 participants in a social network (48% girls; Mage  = 13.58) followed for 3 years, we estimated friendship selection and influence processes via a continuous time-modeling approach using SIENA. We controlled for the effects of depressive symptoms, self-esteem, gender, age, and family structure. Our findings suggest that perceived care by friends mediated the effect of making friends on social anxiety. Perceptions of mother and father, as well as friend care and connectedness, respectively, did not interact in decreasing social anxiety. Nonetheless, care and connectedness with mothers, fathers, and friends jointly predicted decreases in social anxiety. Caring relationships with friends and parents each play a role in mutually protecting early adolescents against increasing in social anxiety over time. © 2014 Wiley Periodicals, Inc.

  16. Joint Force Cyberspace Component Command: Establishing Cyberspace Operations Unity of Effort for the Joint Force Commander

    Science.gov (United States)

    2015-05-01

    strengths, the United States and DoD knowledge of cyberspace combined with the United States technical prowess and spirit of entrepreneurship provide us...similar to “command of the sea,” translating it to “command of the air.”45 The first to utter this concept, according to David MacIsaac, was British...called for his commanders to “inflict maximum damage on [the] enemy by employing strong attrition tactics,” which, as Morison notes, translated to

  17. Smart command recognizer (SCR) - For development, test, and implementation of speech commands

    Science.gov (United States)

    Simpson, Carol A.; Bunnell, John W.; Krones, Robert R.

    1988-01-01

    The SCR, a rapid prototyping system for the development, testing, and implementation of speech commands in a flight simulator or test aircraft, is described. A single unit performs all functions needed during these three phases of system development, while the use of common software and speech command data structure files greatly reduces the preparation time for successive development phases. As a smart peripheral to a simulation or flight host computer, the SCR interprets the pilot's spoken input and passes command codes to the simulation or flight computer.

  18. Spillover of environment-friendly consumer behaviour

    DEFF Research Database (Denmark)

    Thøgersen, John; Ølander, Carl Folke

    2003-01-01

    This paper contributes empirical input to current reasoning about consumers' propensity to behave in an environmentally friendly way in different domains. Spe-cifically, we investigate whether environmentally friendly behaviours spread to more and more areas of the consumption pattern in a virtuo...... of spillover is marginally but significantly higher when respondents give high priority to the value domain that Schwartz (1994) termed universalism or hold strong personal norms for envi-ronmentally friendly behaviour. Udgivelsesdato: SEP...

  19. iTOUGH2 Command Reference

    Energy Technology Data Exchange (ETDEWEB)

    Finsterle, Stefan

    2002-06-18

    iTOUGH2 is a program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis. It is based on the TOUGH2 simulator for non-isothermal multiphase flow in fractured and porous media. This report contains a detailed description of all iTOUGH2 commands.

  20. Commandants' Managerial Capacity and Workers Productivity in ...

    African Journals Online (AJOL)

    The purpose of this study is to evaluate the commandant's managerial capacity as if relates to workers productivity with a view to determining whether their calling to the education terrain has been justified and to correct certain areas in need of improvement in the Nigeria Police Education set up. In doing this, the study took ...

  1. Air Command and Control in Small Wars

    Science.gov (United States)

    2011-12-01

    doctrinally established for all types of operations. The Air Force doctrine of centralized control and decentralized execution drives the makeup of C2...organizations were able to provide “continuous combined control of operations” within the operational command posts.77 The beauty of this organizational

  2. Interface Concepts for Command & Control Tasks

    NARCIS (Netherlands)

    Delft, J.H. van; Passenier, P.O.

    2000-01-01

    This paper addresses new interface concepts for information visualisation and manipulation in Command and Control. These concepts focus on the use of multiple views on the tactical situation to enhance situational awareness and to improve situation assessment. Topics covered include the application

  3. Command, control and communications | Shaw | Scientia Militaria ...

    African Journals Online (AJOL)

    Scientia Militaria: South African Journal of Military Studies. Journal Home · ABOUT · Advanced Search · Current Issue · Archives · Journal Home > Vol 10, No 3 (1980) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Command, control and communications.

  4. Command-And-Control or Taxation?

    DEFF Research Database (Denmark)

    Oh, Christina; Svendsen, Gert Tinggaard

    2015-01-01

    an ineffective command-and-control (CAC) tool, whereas Denmark has chosen the effective tool of taxation. One main explanation for this variation in policy choice is the variation in institutional setups, namely the corporatist route in Denmark versus the pluralistic route in California....

  5. APOLLO 11 COMMANDER NEIL ARMSTRONG IN SIMULATOR

    Science.gov (United States)

    1969-01-01

    Apollo 11 commander Neil Armstrong is going through flight training in the lunar module simulator situated in the flight crew training building at KSC. Armstrong will pilot the lunar module to a moon landing on July 20, following launch from KSC on July 16.

  6. CSS Teams -- Effective Practice of Mission Command

    Science.gov (United States)

    2013-04-01

    their supporting Standard Army Information Management System and further enhance the practice of mission command. As one Soldier commented, “ VSAT is...communications up and running] and get combat ready faster. During lulls, they can order what they’ll need during the fight. 17 We’re using VSAT

  7. Intelligence: A Personal, Inherent, Function of Command

    Science.gov (United States)

    1992-06-01

    intelligence in general, and DSE !RT STORN in particular-" If one measure6 tbe. ’gap t .r ren comm~anders and intelligence ofticers by what is ~un ii p...intelligence process, or "cycle," is not a rigid procedural checklist , blindly adhered to under all circum- stances; it is simply a description of sequential

  8. Leadership in Command Under the Sea

    Science.gov (United States)

    2009-04-01

    America,” 133 70 Heifetz , Leadership without easy answers, 14 71 Navy Personnel Command, “Community Status Brief,” http://www.npc.navy.mil/Officer...Studies, 1973. Heifetz , R. A. Leadership without easy answers. Cambridge, MA: Belknap Press, 1994. Hinkle, David Randall, Harry Harrison Caldwell

  9. Human Systems Integration Assessment of Network Centric Command and Control

    National Research Council Canada - National Science Library

    Quashnock, Dee; Kelly, Richard T; Dunaway, John; Smillie, Robert J

    2004-01-01

    .... The Chat system was limited by the synchronous nature of the system that required constant attention to monitor communications, by the number of participants that could be accommodated and recognized...

  10. Defense Headquarters: Geographic Combatant Commands Rely on Subordinate Commands for Mission Management and Execution

    Science.gov (United States)

    2016-06-30

    its mission to manage the detention facility at Guantanamo Bay , Cuba to Joint Task Force Guantanamo (JTF-GTMO). However, the extent to which each...unified commands, and joint task forces. For example, U.S. Southern Command has delegated its mission to manage the detention facility at Guantanamo Bay ...facility located at Naval Station Guantanamo Bay , Cuba. • Joint Task Force Bravo, located at Soto Cano Air Base in Honduras, supports regional security

  11. Collaborative air/ground command and control for responsive persistent ISR operations using unmanned systems

    Science.gov (United States)

    Ordower, Rick; Dixon, Lee; Lynch, Nick

    2010-04-01

    "The foundation for integrating ISR planning and direction is the information network, including the appropriate ISR services and applications oriented toward the [commanders] needs. By combining global visibility of available information and intelligence needs with the tools to maximize platform/sensor/target management, the network will improve efficiency and maximize persistence. Inherent within this concept is the idea of integrating and synchronizing a mix of sensing systems and platforms rather than relying on a single system. The second concept embedded within this concept is the ability to capture the activity/information as it occurs rather than forensically reconstructing after the fact. This requires the ability for the [commander] to adjust collection priorities of the entire collection suite to a level appropriate to the activity of interest. Individual sensors, platforms and exploitation nodes will become more efficient as part of an integrated system. Implementing this fully integrated ISR Enterprise will result in improved persistence, and ultimately better ISR for the warfighter."[3] Over the last 6 years, SAIC has been working with CERDEC and AMRDEC to introduce Battle Command aids supporting (semi) autonomous execution and collaboration of unmanned assets. This paper presents an operational context and a distributed command and control architecture aiming to reduce workload and increase Persistent ISR effectiveness. This architecture has been implemented and demonstrated in field tests and as part of FY'09 C4ISR OTM testbed.

  12. Phil Friend julgustab riske võtma / Phil Friend ; interv. Harda Roosna

    Index Scriptorium Estoniae

    Friend, Phil

    2003-01-01

    Suurbritannia koolitus- ja konsultatsioonifirma Churchill & Friend juhataja Phil Friend vastab küsimustele oma firma missiooni kohta Hiiumaal, puuetega inimeste elu erinevuste kohta Hiiumaal ja Suurbritannias. Vt. samas: Phil Friend julgustas tööandjaid puuetega inimesi tööle võtma

  13. Intelligent Tutoring System for Teaching Battlefield Command Reasoning Skills

    National Research Council Canada - National Science Library

    Domeshek, Eric

    2002-01-01

    .... Achieving expert levels of proficiency in high-level command reasoning skills-whether for battlefield commanders or for executives in industry-requires extensive practice, coaching, and feedback...

  14. U.S. Africa Command: Shaping Africa for the Future

    National Research Council Canada - National Science Library

    Sholley, Hans

    2006-01-01

    .... It is argued the current Unified Command Plan is ill designed to address the complexities of the continent of Africa and that a proposed United States Africa Command would be better positioned...

  15. Friends of the National Library of Medicine

    Science.gov (United States)

    ... Home Current Issue Past Issues Friends of the National Library of Medicine Past Issues / Summer 2006 Table of Contents For ... Hon. Paul G. Rogers Chairman, Friends of the National Library of Medicine and former member of the U.S. Congress from ...

  16. Airborne Network Camera Standard

    Science.gov (United States)

    2015-06-01

    Optical Systems Group Document 466-15 AIRBORNE NETWORK CAMERA STANDARD DISTRIBUTION A: APPROVED FOR PUBLIC RELEASE...Airborne Network Camera Standard 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER...without the focus of standardization for interoperable command and control, storage, and data streaming has been the airborne network camera systems used

  17. Development of a generic activities model of command and control

    OpenAIRE

    Stanton, NA; Baber, C; Walker, GH; Houghton, RJ; McMaster, R; Stewart, R.; D.; Harris; Jenkins, DP; Young, MS; Salmon, PM

    2008-01-01

    This paper reports on five different models of command and control. Four different models are reviewed: a process model, a contextual control model, a decision ladder model and a functional model. Further to this, command and control activities are analysed in three distinct domains: armed forces, emergency services and civilian services. From this analysis, taxonomies of command and control activities are developed that give rise to an activities model of command and control. This model w...

  18. Social Networking and Health

    OpenAIRE

    Kevin Curran; Michael Mc Hugh

    2013-01-01

    The rise of social networking has revolutionised how people communicate on a daily basis. In a world where more people are connecting to the internet, social networking services create an immediate communication link between users. Social networking sites provide multiple services which include emailing, instant messaging, uploading files, gaming and finding friends. Just as social networking has become a more popular method of communication in recent years, the ways in which people look afte...

  19. 76 FR 1975 - Disestablishment of United States Joint Forces Command

    Science.gov (United States)

    2011-01-11

    ... Memorandum of January 6, 2011--Disestablishment of United States Joint Forces Command #0; #0; #0... of United States Joint Forces Command Memorandum for the Secretary of Defense Pursuant to my... States Joint Forces Command, effective on a date to be determined by the Secretary of Defense. I direct...

  20. Commande adaptive d'une machine asynchrone

    OpenAIRE

    Slama-Belkhodja, I.; De Fornel, B.

    1996-01-01

    Cat article décrit une stratégie de commande adaptive indirecte à Placement de Pôles (PP), appliquée à la commande en vitesse d'une machine asynchrone alimentée par un ensemble hacheur-filtre-onduleur de tension. L'algorithme des Moindres Carrés Récursifs (MCR) est utilisé pour l'identification des modèles de comportement type entrées/sorties. Un intérêt particulier est porté à la mise en oeuvre de cet algorithme et à la discussion de ses résultats, tenant compte des erreurs de modélisation e...

  1. Metadata Analysis at the Command-Line

    Directory of Open Access Journals (Sweden)

    Mark Phillips

    2013-01-01

    Full Text Available Over the past few years the University of North Texas Libraries' Digital Projects Unit (DPU has developed a set of metadata analysis tools, processes, and methodologies aimed at helping to focus limited quality control resources on the areas of the collection where they might have the most benefit. The key to this work lies in its simplicity: records harvested from OAI-PMH-enabled digital repositories are transformed into a format that makes them easily parsable using traditional Unix/Linux-based command-line tools. This article describes the overall methodology, introduces two simple open-source tools developed to help with the aforementioned harvesting and breaking, and provides example commands to demonstrate some common metadata analysis requests. All software tools described in the article are available with an open-source license via the author's GitHub account.

  2. Coalitions: Organizational, Political, Command & Control Challenges

    Science.gov (United States)

    2009-05-01

    assessment of their evolution with regard to advances in technology. The Command & Control (C2) structure of coalitions is detailed, including decision...assessment of the effects of technology on their evolution . Coalitions with equal and unequal partners are distinguished and their functioning...Gaulle is said to have remarked, “Dans toute association de deux hommes , il y en a toujours un qui se fait porter par l’autre.2” Throughout history

  3. Command and Control for War and Peace

    Science.gov (United States)

    1992-01-01

    losing some of their autonomy -the time when advances in communications technology 17 Li _I COMMAND AND CONTROL FOR WAR AND PF.ACE were strengthening the...balances; Information and action, another, One of the most important-and most sen- sitive-is the balance between control and the com- mander’s autonomy ...89, 9, Cajus Bekker , Angriffshohe 4000 (1964); republished as The Ltuf•wffe War Diaries, trans, Frank Ziegler (New York: Bal- lantine Books, 1966

  4. Command Philosophy: Is It Transportable and Universal?

    Science.gov (United States)

    1992-03-20

    Burt Nanus book, Leaders: The Strategies for Taking Charge. Of particular note is what Bennis and Nanus have to say about vision, even though they...16. Colonel Michael T. Plummer, "Winning in Command," Military Review, March 1987, p. 80. 17. Warren Bennis and Burt Nanus , Leaders: Strategies for...Garden City Park, NY, 1988, pp. 18-19, 173-174. BIBLIOGRAPHY Bennis , Warren; and Nanus , Burt. Leaders: The Strategies for Taking Charge. New York: Harper

  5. The Impact of Command Likelihood on Commitment

    Science.gov (United States)

    1994-06-03

    Cincinnati, OH: South-Western, 1979), Appendix Table N. 4 Richard A. Lippa , Introduction to Social PsvcholoQy, (Belmont, CA: Wadsworth, 1990), 243. 5...Huston, New York: Academic Press, 1979. Lippa , Richard A. Introdugcion To Social Psycholocrv. Belmont, CA: Wadsworth, 1990. McNally, Jeffery A. The...command opportunities. 41 Endnotes iLeonard Wong and Richard Bullis, "Downsizing the Army: Two Types of Commitment in the Survivors," Unpub- lished

  6. Command History, 1969. Volume 2. Sanitized

    Science.gov (United States)

    1969-01-01

    performed third and fourth echelon main- tenance. Evacuation of equipment requiring higher echelon maintenance was the reverse of supply distribution...strengths of both systems adopted (See Chapter IV). (C) The VNN Logistcal Support Command was established on 1 Oct. Although key person- rnel had been...was to be reversed . The authorization was passed down to province level againfor the drafting of titles and arranging of transfer ceremonies. (U) As

  7. Naval command and control for future UAVs

    OpenAIRE

    Majewski, Stephen E.

    1999-01-01

    Approved for public release; distribution is unlimited The primary purpose of this thesis is to examine the requirements of naval command and control for future Unmanned Aerial Vehicles (UAV) and to propose solutions for current limitations. Currently, UAVs co-exist as a collection of independent systems that have poor interoperability and limited functionality beyond strategic reconnaissance. As UAVs mature, they will increasingly be deployed at the unit level and employed tactically, inc...

  8. Naval Meteorology and Oceanography Command exhibit entrance

    Science.gov (United States)

    2000-01-01

    StenniSphere at NASA's John C. Stennis Space Center in Hancock County, Miss., invites visitors to discover why America comes to Stennis Space Center before going into space. Designed to entertain while educating, StenniSphere includes informative displays and exhibits from NASA and other agencies located at Stennis, such as this one from the Naval Meteorology and Oceanography Command. Visitors can 'travel' three-dimensionally under the sea and check on the weather back home in the Weather Center.

  9. Naval Meteorology and Oceanography Command exhibit

    Science.gov (United States)

    2000-01-01

    Designed to entertain while educating, StenniSphere at the John C. Stennis Space Center in Hancock County, Miss., includes informative displays and exhibits from NASA and other agencies located at Stennis, such as this one from the Naval Meteorology and Oceanography Command. Visitors can 'travel' three-dimensionally under the sea and check on the weather back home in the Weather Center. StenniSphere is open free of charge from 9 a.m. to 5 p.m. daily.

  10. How Technology and Data Affect Mission Command

    Science.gov (United States)

    2016-05-17

    simply transition stand- alone legacy systems to web-based platforms and integrate those pro - grams as applications on common How Technology and Data...initiative within the commander’s intent to empower ag- ile and adaptive leaders in the con - duct of unified land operations.” This first part is...synchronize actions across all war- fighting functions in time and space to support the decision cycle of the commander. Technology supports and

  11. Commanders’ Perception of Risk: Enabling Boldness

    Science.gov (United States)

    2008-04-01

    Concerning temperament, even in the epic wars of our past, commanders who were well known to countenance high losses to accomplish the mission were...constantly recalls epic battles won at hard cost is less likely to balk at present hardships. However, this association with the past also 12 engenders...go home and write poetry . He learned the art of glass blowing because it seemed interesting and built a computer with only a magazine as his guide

  12. The Concept of Environmentally Friendly Individual Mobility in the Future

    Directory of Open Access Journals (Sweden)

    Jasna Golubić

    2012-10-01

    Full Text Available The European cities are faced today by the phenomenon ofexpanding everyday activities, affecting directly the traffic development.Physical expansion, the growing number of cars androad networks explain the increase in car utilisation in all typesof travelling in the range of 75 to 90%.Due to the adverse effects on the environment caused bysuch growing motorisation, the efforts are made in order to establishenvironmentally friendlier traffic. The paper considersthe concept of environmentally friendly individual trafficthrough MCC (Micro Compact Car and MCC- mobility .systemwhich will provide its linking with other traffic participants,which may have a long-term positive influence on the quality ofurban life.

  13. Practical approaches to family-friendly medical studies.

    Science.gov (United States)

    Liebhardt, Hubert; Niehues, Johanna; Fegert, Jörg M

    2012-01-01

    Based on the pilot study carried out by the Office of the Dean of the Medical University of Ulm on the family-friendliness of the organisation of medical education in Ulm, this paper describes concrete measures that were designed at the university or have been partly implemented already. More flexibility and customization are essential characteristics and prerequisites of a family-friendly medical school as part of university education structures. Flexibility and customization can be achieved by designing lesson plans and study regulations so that both childcare is assured and that in emergencies, help can be quickly offered with a minimum of bureaucracy. More flexibility includes, amongst other things, adequate means for the individual to compensate for missed compulsory attendances and examination dates. The necessary shift in thinking and the willingness to cooperate on behalf of the management and teaching staff can be supported through the audit for family-friendliness "berufundfamilie" (job and family) or "familiengerechte hochschule" (family-friendly university), as well as strategic management tools of family-friendly corporate policies. Supporting mechanisms such as effectively networked advice services, course progression monitoring based on data, providing a parents' passport with a cross-semester training contract, creating more interaction between student-parents or other students through a parent community or by study pairings and finally, reliable information on and compliance with the maternity leave rules for pregnant and breastfeeding medical students can help safeguard successful studying with children.

  14. A smooth multimode waveform command shaping control with selectable command length

    Science.gov (United States)

    Masoud, Ziyad N.; Alhazza, Khaled A.

    2017-06-01

    Input and command shapers are great open-loop control strategies in reducing residual vibration in rest-to-rest maneuvers. The generation of such command usually contains multiple impulses and jerks. Multiple impulses usually degrade the performance due to actuation delay and mismatch timing while jerks reduce the life expectancy of actuator and increase maintenance. In this work, a smooth single multimode command shaping control is proposed and tested numerically and experimentally to eliminate residual vibration in rest-to-rest maneuvers. The advantages of the technique are summarized as, the proposed technique has an adjustable maneuvering time, can eliminate all vibration modes regardless of the number, the required parameters are found analytically which eliminate the need of complex or lengthy calculation needed for most multimode shaper, smooth command profile to eliminate jerks i.e. inrush current, and it is continuous with single actuation to eliminate inaccurate timing and delay. The technique performance is validated numerically and experimentally. Numerical simulations prove that the shaped commands are capable of completely eliminating residual vibrations of multimode systems. Furthermore, the proposed technique is utilized to reduce the sensitivity of the shaper to modeling errors. Unlike other shaper the proposed reduction in the sensitivity can be implemented for all modes with no added complexity.

  15. Nordic Analysis of Climate Friendly Buildings

    DEFF Research Database (Denmark)

    Andresen, Inger; Thomsen, Kirsten Engelund; Wahlstrøm, Åsa

    This report summarizes the findings of the work conducted within the project “Nordic Analysis of Climate Friendly Buildings”, financed by the Nordic Council of Ministers. The main goal of the project was to establish a knowledge and decision base for a Nordic innovation program that will promote...... the development and demonstration of low energy and climate friendly buildings. The innovation program should support a development that brings the Nordic countries to an international forefront with respect to business strongholds and market penetration of low energy and climate friendly buildings....

  16. Environmentally-friendly animal litter

    Science.gov (United States)

    Boxley, Chett; McKelvie, Jessica

    2013-09-03

    An animal litter composition that includes geopolymerized ash particulates having a network of repeating aluminum-silicon units is described herein. Generally, the animal litter is made from a quantity of a pozzolanic ash mixed with an alkaline activator to initiate a geopolymerization reaction that forms geopolymerized ash. This geopolymerization reaction may occur within a pelletizer. After the geopolymerized ash is formed, it may be dried and sieved to a desired size. These geopolymerized ash particulates may be used to make a non-clumping or clumping animal litter or other absorbing material. Aluminum sulfate, clinoptilolite, silica gel, sodium alginate and mineral oil may be added as additional ingredients.

  17. IT Security Support for the Spaceport Command Control System Development

    Science.gov (United States)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  18. Electrochemical Behaviour of Environmentally Friendly Inhibitor of ...

    African Journals Online (AJOL)

    Electrochemical Behaviour of Environmentally Friendly Inhibitor of Aloe Secundiflora Extract in Corrosion Control of Carbon Steel in Soft Water Media. ... corrosion control in neutral and aerated soft water solutions have been investigated using electrochemical impedance spectroscopy and Tafel polarization techniques.

  19. Environment friendly chemoselective deprotection of acetonides and ...

    Indian Academy of Sciences (India)

    Abstract. Highly chemoselective environment friendly deprotection of acetonides and cleavage of acetals and ketones has been achieved by heating in aqueous medium without using any catalyst and organic solvent.

  20. Command Information Requirements on the Airland Battlefield

    Science.gov (United States)

    1985-06-07

    categories, as shown at Figure 3-1, and includes the human and sociepolitical aspects of the battlefield. The U.S. list has only four categories -- Enemy...the Soviet’& apparent focus on the human aspect of their enemy on the battlefield. - Within the category of friendly troops -- political - morale...shows the values produced by the weighting process. 80 /// TABLE 4-10 WEIGNTING APPLICATION CATEGORY CCIR SURVEY ITEM CONAT ARNx CS C 1. ADJACENT

  1. Leadership and Command on the Battlefield. Operation JUST CAUSE and DESERT STORM

    Science.gov (United States)

    1992-01-01

    Ladership and Command on the Bautlkfield The command sergeant major was a key player in assisting the commander on the battlefield. Most commanders had... Ladership and Command on the Battlfield Battlefield leadership incorporates more than rehearsals, commander’s intent, briefbacks, position on the

  2. 24 Command Fire Improvement Action Program Plan

    Energy Technology Data Exchange (ETDEWEB)

    GRIFFIN, G.B.

    2000-12-01

    Fluor Hanford (FH) is responsible for providing support to the Department of Energy Richland Operations Office (RL) in the implementation of the Hanford Emergency Preparedness (EP) program. During fiscal year 2000, a number of program improvements were identified from various sources including a major range fire (24 Command Fire). Evaluations of the emergency preparedness program have confirmed that it currently meets all requirements and that performance of personnel involved is good, however the desire to effect continuous improvement resulted in the development of this improvement program plan. This program plan defines the activities that will be performed in order to achieve the desired performance improvements.

  3. Spaceport Command and Control System Automated Testing

    Science.gov (United States)

    Stein, Meriel

    2017-01-01

    The Spaceport Command and Control System (SCCS) is the National Aeronautics and Space Administrations (NASA) launch control system for the Orion capsule and Space Launch System, the next generation manned rocket currently in development. This large system requires high quality testing that will properly measure the capabilities of the system. Automating the test procedures would save the project time and money. Therefore, the Electrical Engineering Division at Kennedy Space Center (KSC) has recruited interns for the past two years to work alongside full-time engineers to develop these automated tests, as well as innovate upon the current automation process.

  4. Spaceport Command and Control System Automation Testing

    Science.gov (United States)

    Plano, Tom

    2017-01-01

    The goal of automated testing is to create and maintain a cohesive infrastructure of robust tests that could be run independently on a software package in its entirety. To that end, the Spaceport Command and Control System (SCCS) project at the National Aeronautics and Space Administration's (NASA) Kennedy Space Center (KSC) has brought in a large group of interns to work side-by-side with full time employees to do just this work. Thus, our job is to implement the tests that will put SCCS through its paces.

  5. Apollo command module land impact tests

    Science.gov (United States)

    Mccullough, J. E.; Lands, J. F., Jr.

    1972-01-01

    Full-scale-model and actual spacecraft were impact tested to define the emergency land-landing capability of the Apollo command module. Structural accelerations and strains were recorded on analog instrumentation, and a summary to these data is included. The landing kinematics were obtained from high-speed photography. Photographs of the structural damage caused during the tests are included. Even though extensive damage can be expected, the crew will receive nothing more than minor injuries during the majority of the probable landing conditions.

  6. Command and Control: The Literature and Commentaries

    Science.gov (United States)

    1993-09-01

    to apply them efficiently and eftcclivoly, or to prevent then) fronm firing on each other, At the strategic level, failure in command and control may...Collinwid (i/id Mir V21 VOper’ational decisions, about how to act. The three C Sess ions5 thatI flol lowv this one I will explot re each of HIC ies three...the career of a British Army officer, including duty as a general officer during tale First World War.] Marshall, Samuel Lyman Atweed. Men Against Fire

  7. In Search of Command and Staff Doctrine.

    Science.gov (United States)

    1987-05-01

    something else. % R0 .6 42 In a short but ccnpelling ccmpanion dissenting opinion, Judge Lewis asked in the Socratic fashion what was A’s job after he...main theme of Nye’s superb book is that good commanders are good readers.) 15. Query whether Socrates ’ question applies: "How can a man understand the...name of anything, when he does not know the nature of it?" Plato , "Theaetetus," The Dialogues of Plato , in 7 Great Books of the Western World 515

  8. The Battalion Commander’s Handbook 1984

    Science.gov (United States)

    1984-06-01

    I want my men to* *talk to their counterparts frequently even if only to chat about the weather. That way, when a problem needs to be ironed out, a...should I fail. I have seen the face of terror, felt the stinging • cold of fear; and enjoyed the sweet taste of a moment’s love. I have cried , pained...them and the company commanders. Quickly stamp out any "we-they" syndrome . * Make them pull their fair share of the load in headquarters company

  9. Command/response protocols and concurrent software

    Science.gov (United States)

    Bynum, W. L.

    1987-01-01

    A version of the program to control the parallel jaw gripper is documented. The parallel jaw end-effector hardware and the Intel 8031 processor that is used to control the end-effector are briefly described. A general overview of the controller program is given and a complete description of the program's structure and design are contained. There are three appendices: a memory map of the on-chip RAM, a cross-reference listing of the self-scheduling routines, and a summary of the top-level and monitor commands.

  10. Data compression for command and control

    Science.gov (United States)

    Litow, Bruce

    1993-08-01

    Software, both source and executable versions, designed using LR parser generator technology offers superior data compression characteristics both with respect to the compression ratio, which is essentially optimal, and computational resources efficiency. Ten-fold compression should make possible highly sophisticated command and control systems for use during a space mission, on route and at the target. Carrying source in compressed form on manned missions will mean that significant modifications and even redesign of large systems can be accomplished. Basic aspects of this compression scheme are described in the paper.

  11. Are Friends Overrated? : A Study for the Social Aggregator Digg.com

    NARCIS (Netherlands)

    Doerr, C.; Tang, S.; Blenn, N.; Van Mieghem, P.

    2011-01-01

    The key feature of online social networks is the ability of users to become active, make friends and interact with those around them. Such interaction is typically perceived as critical to these platforms; therefore, a significant share of research has investigated the characteristics of social

  12. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  13. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  14. An Analysis of Special Operations Command - South’s Distributive Command and Control Concept

    Science.gov (United States)

    2007-12-01

    Special Ops aviation unit traverses Bermuda Triangle en route to new home”, News Service Release Number 03082525 (August 2003), http://news.soc.mil...7, 2007). U.S. Army Special Operations Command. “Special Ops Aviation Unit Traverses Bermuda Triangle En Route to New Home.” News Service Release

  15. On Command: An Illustrative Study of Command and Control in the Army of Northern Virginia, 1863.

    Science.gov (United States)

    1991-05-20

    flowing behind him, came jangling up and vaulted quickly off his horse to join Lee and Jackson. He brought electrifying news. "Fitz" Lee, one of his...in intellectual gymnastics . It is, rather, at the heart of the question of Lee’s poor command and control, for if he was, as it seems, unsure of what

  16. Mission Command in an Age of Persistent Conflict: Historical And Theoretical Approaches to Developing Mission Command

    Science.gov (United States)

    2014-04-01

    Egyptians, Yigal Allon, was the archetypical IDF commander who embodied the approach to operations that the Haganah and Palmach trained so expertly...2011): 288. 31 Ibid., 288. 32 Littlejohn, Theories of Human Communication, 3. 33 Franklin Fearing, “Toward a Psychological Theory of Human

  17. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  18. Millennials in Adulthood: Detached from Institutions, Networked with Friends

    Science.gov (United States)

    Pew Research Center, 2014

    2014-01-01

    The Millennial generation is forging a distinctive path into adulthood. Now ranging in age from 18 to 331, they are relatively unattached to organized politics and religion, linked by social media, burdened by debt, distrustful of people, in no rush to marry--and optimistic about the future. They are also America's most racially diverse…

  19. Homophily and contagion as explanations for weight similarities among adolescent friends.

    Science.gov (United States)

    de la Haye, Kayla; Robins, Garry; Mohr, Philip; Wilson, Carlene

    2011-10-01

    To determine whether weight-based similarities among adolescent friends result from social influence processes, after controlling for the role of weight on friendship selection and other confounding influences. Four waves of data were collected from a grade 8 cohort of adolescents (N = 156, mean age = 13.6 years) over their initial 2 years of high school. At each wave, participants reported on their friendship relations with grade-mates and had their height and weight measured by researchers to calculate their body mass index (BMI). Newly developed stochastic actor-oriented models for social networks were used to simultaneously assess the role of weight on adolescents' friendship choices, and the effect of friends' BMIs on changes in adolescent BMI. Adolescents' BMIs were not significantly predicted by the BMI of their friends over the 16 months of this study. Similarities in the weights of friends were found to be driven predominantly by friendship selection, whereby adolescents, particularly those who were not overweight, preferred to initiate friendships with peers whose weight status (overweight/nonoverweight) was the same as their own. Weight-based similarities among friends were largely explained by the marginalization of overweight adolescents by their peers, rather than by the "contagion" of excess weight among friends. These findings highlight the importance of adequately modeling friendship selection processes when estimating social influence effects on adiposity. Copyright © 2011 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  20. Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa

    National Research Council Canada - National Science Library

    Ploch, Lauren

    2008-01-01

    .... military involvement on the continent has been divided among three commands: U.S. European Command (EUCOM), U.S. Central Command (CENTCOM), and U.S. Pacific Command (PACOM). The new command's area of responsibility...

  1. Perceptions of Emotional Support from Mother and Friend in Middle Childhood: Links with Social-Emotional Adaptation and Preschool Attachment Security.

    Science.gov (United States)

    Booth, Cathryn L.; Rubin, Kenneth H.; Rose-Krasnor, Linda

    1998-01-01

    Assessed 8-year-olds' perceptions of emotional support from mother and best friend. Found that preschool attachment security predicted age-8 maternal-support perceptions better than did mother's behavior. Identification of best friends as part of the support network related positively to social competence. The more insecurely attached children…

  2. The Anthrax Vaccine Debate: A Medical Review for Commanders

    Science.gov (United States)

    2001-04-01

    confidence at all levels of the chain of command. The anthrax vaccine debate should not be used as a test of leadership . 5 - DoD should continue...THE ANTHRAX VACCINE DEBATE : A MEDICAL REVIEW FOR COMMANDERS by Richard A. Hersack, Col, USAF, MC, CFS The Counterproliferation Papers Future...Report Date 01APR2001 Report Type N/A Dates Covered (from... to) - Title and Subtitle The Anthrax Vaccine Debate : A Medical Review for Commanders

  3. Command and Control Across Space and Cyberspace Domains

    Science.gov (United States)

    2016-02-16

    control, communications, computers, and intelligence (C4I) on the Expeditionary Strike Group SEVEN ( ESG 7) staff. Ashore, Parish served as...groups ( ESGs ) operate in all five domains. The strike group commander has command and control at the operational level and delegates command and...the plug” on space or cyberspace services. The ESG example is just one of many. Maj Gen Zabel used the ICBM example to highlight C2 challenges and

  4. XTCE: XML Telemetry and Command Exchange Tutorial, XTCE Version 1

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad

    2008-01-01

    These presentation slides are a tutorial on XML Telemetry and Command Exchange (XTCE). The goal of XTCE is to provide an industry standard mechanism for describing telemetry and command streams (particularly from satellites.) it wiill lower cost and increase validation over traditional formats, and support exchange or native format.XCTE is designed to describe bit streams, that are typical of telemetry and command in the historic space domain.

  5. A Command Language Processor for Flexible Interface Design

    Science.gov (United States)

    1974-09-01

    33 Service Description 34 Introduction to Multiple Langauge Forms Service Functional Module Specification Contexts 35 34 35 v...framework for expressing the syntactic and semantic structure of a computer language. The CLP’s dialogue grammar has as its domain an entire terminal...collection of commands. The domain of the command language designer includes only the design of individual commands. The language designer has no

  6. Defining Command, Leadership, and Management Success Factors Within Stability Operations

    Science.gov (United States)

    2011-06-01

    OPERATIONS So far, pure definitions of command, leadership , and management have been presented, but we have not explored at what levels these ways of getting...PKSOI Papers DEFINING COMMAND, LEADERSHIP , AND MANAGEMENT SUCCESS FACTORS WITHIN STABILITY OPERATIONS Dave Fielder Visit our website for other...00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Defining Command, Leadership , and Management Success Factors Within Stability Operations 5a

  7. Commander's Decision Aid for Predictive Battlespace Awareness (CDA4PBA)

    National Research Council Canada - National Science Library

    Calhoun, Christopher S; Fitzhugh, Elisabeth W; Klinger, David W

    2006-01-01

    ...), was to develop and demonstrate human-centered decision-making technologies to improve processes, performance, tools, and training to support a commander's predictive battlespace awareness ability...

  8. Contractor Support on the Battlefield -- Increased Reliance Requires Commander's Attention

    National Research Council Canada - National Science Library

    Maloney, Kathy J

    2006-01-01

    .... Department of Defense initiatives to adopt a leaner business strategy, increase efficiency, and reduce expenditures have exposed the battlefield commander to additional operational risk centered...

  9. Distress, omnipotence, and responsibility beliefs in command hallucinations.

    Science.gov (United States)

    Ellett, Lyn; Luzon, Olga; Birchwood, Max; Abbas, Zarina; Harris, Abi; Chadwick, Paul

    2017-09-01

    Command hallucinations are considered to be one of the most distressing and disturbing symptoms of schizophrenia. Building on earlier studies, we compare key attributes in the symptomatic, affective, and cognitive profiles of people diagnosed with schizophrenia and hearing voices that do (n = 77) or do not (n = 74) give commands. The study employed a cross-sectional design, in which we assessed voice severity, distress and control (PSYRATs), anxiety and depression (HADS), beliefs about voices (BAVQ-R), and responsibility beliefs (RIQ). Clinical and demographic variables were also collected. Command hallucinations were found to be more distressing and controlling, perceived as more omnipotent and malevolent, linked to higher anxiety and depression, and resisted more than hallucinations without commands. Commanding voices were also associated with higher conviction ratings for being personally responsible for preventing harm. The findings suggest key differences in the affective and cognitive profiles of people who hear commanding voices, which have important implications for theory and psychological interventions. Command hallucinations are associated with higher distress, malevolence, and omnipotence. Command hallucinations are associated with higher responsibility beliefs for preventing harm. Responsibility beliefs are associated with voice-related distress. Future psychological interventions for command hallucinations might benefit from focussing not only on omnipotence, but also on responsibility beliefs, as is done in psychological therapies for obsessive compulsive disorder. Limitations The cross-sectional design does not assess issues of causality. We did not measure the presence or severity of delusions. © 2017 The British Psychological Society.

  10. EvoCommander: A Novel Game Based on Evolving and Switching Between Artificial Brains

    DEFF Research Database (Denmark)

    Jallov, D.; Risi, S.; Togelius, J.

    2016-01-01

    Neuroevolution (i.e. evolving artificial neural networks (ANNs) through evolutionary algorithms) has shown promise in evolving agents and robot controllers, which display complex behaviours and can adapt to their environments. These properties are also relevant to video games, since they can...... increase their longevity and replayability. However, the design of most current games precludes the use of any techniques which might yield unpredictable or even open-ended results. This article describes the game EvoCommander, with the goal to further demonstrate the potential of neuroevolution in games....... In EvoCommander the player incrementally evolves an arsenal of ANN-controlled behaviors (e.g. ranged attack, flee, etc.) for a simple robot that has to battle other player and computer controlled robots. The game introduces the novel game mechanic of “brain switching”, selecting which evolved neural...

  11. Rural Family Friends: A New Tradition of Caring.

    Science.gov (United States)

    National Council on the Aging, Inc., Washington, DC.

    Family Friends is a program that matches senior volunteers with families of chronically ill or disabled children. Rural Family Friends, which is an outgrowth of Family Friends, focuses on rural families in distress. Rural Family Friends has established pilot programs in Arkansas, Georgia, New Hampshire, North Carolina, and West Virginia. The…

  12. [Fostering LGBT-friendly healthcare services].

    Science.gov (United States)

    Wei, Han-Ting; Chen, Mu-Hong; Ku, Wen-Wei

    2015-02-01

    LGBT (lesbian, gay, bisexual, transgender) patients suffer from stigma and discrimination when seeking healthcare. A large LGBT healthcare survey revealed that 56% of gay patients and 70% of transgender patients suffered some type of discrimination while seeking healthcare in 2014. The fostering of LGBT-friendly healthcare services is not just an advanced step of gender mainstreaming but also a fulfillment of health equality and equity. Additionally, LGBT-friendly healthcare services are expected to provide new opportunities for healthcare workers. Therefore, proactive government policies, education, research, and clinical practice should all encourage the development of these healthcare services. We look forward to a well-developed LGBT-friendly healthcare system in Taiwan.

  13. [Mother-friendly childbirth practices and breastfeeding].

    Science.gov (United States)

    Lin, Ya-Wen; Tzeng, Ya-Ling; Yang, Ya-Ling

    2013-02-01

    Childbirth, connecting the stages of pregnancy and postpartum, deeply affects maternal motivation with regard to initiating and continuing postnatal breastfeeding and ultimate breastfeeding success. Although promoting breastfeeding is a strategy critical to achieving wellbeing in both mothers and infants, there remains a lack of professional attention and related research into the effect of childbirth on breastfeeding. Promoting successful breastfeeding is a central component of childbirth-friendly nursing care. Therefore, this paper introduces the origin and concepts of mother-and-infant-friendly childbirth, then analyzes the influences on breastfeeding of medicalized birth practices and suggests how to implement childbirth-friendly interventions. This paper was written to help nurses better understand how the childbirth process affects breastfeeding and provide a reference for creating conditions during childbirth that encourage successful breastfeeding practices.

  14. The Importance of Friends in Autobiographical Memory

    DEFF Research Database (Denmark)

    Antalikova, Radka; Hansen, Tia G. B.; Gulbrandsen, Knut Arild

    Relatedness is a complex issue and it has been argued that developmental perspectives should complement cross-cultural comparisons. We noticed that cross-cultural studies of autobiographical memories tend to focus on early childhood and thus family, leaving the role of friends and school less...... explored. Thus, we asked adolescent school-goers who still lived with their parents for a meaningful memory from each of the settings family, school, and friendship. In both samples analyzed so far (Norwegians, N=22, and Slovaks, N=40) participants chose friend memories that were recent and reportedly...... often rehearsed, family memories that were old and rarely rehearsed, and school memories that were in between on both variables. This supports theories of friendship as the primary social context for adolescent development. Moreover, content analysis found friend memories to mention others more often...

  15. Collins named First Woman Shuttle Commander

    Science.gov (United States)

    Showstack, Randy

    Just a few hours after NASA revealed that there is water ice on the Moon, U.S. First Lady Hillary Rodham Clinton introduced Air Force Lieutenant Colonel Eileen Collins to a packed auditorium at Dunbar Senior High School in Washington, D.C., as the first woman who will command a NASA space shuttle mission. With students at this school, which is noted for its pre-engineering program, cheering, Clinton said that Collins' selection “is one big step forward for women and one giant step for humanity.” Clinton added, “It doesn't matter if you are a boy or a girl, you can be an astronaut or a pilot, if you get a first-rate education in math and science.”

  16. The Arecibo Remote Command Center Program

    Science.gov (United States)

    Crawford, Fronefield; Jenet, Fredrick; Siemens, Xavier; Dolch, Timothy; Stovall, Kevin

    2016-07-01

    The Arecibo Remote Command Center (ARCC) is a multi-institution research and education program that introduces undergraduates to the field of pulsar research. Specifically, the program trains students to work in small teams to operate several of the world's largest radio telescopes (both Arecibo and the Green Bank Telescope). Students conduct survey observations for the PALFA Galactic plane pulsar survey and conduct timing observations of millisecond pulsars (MSPs) for the NANOGrav search for gravitational waves using these telescopes. In addition, ARCC students search pulsar candidates generated from processed survey data in order to find both new radio MSPs and non-recycled pulsars. The ARCC program currently operates at four U.S. institutions and involves more than 50 undergraduate students each year. To date, ARCC students have discovered 64 new pulsars in this program.

  17. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  18. Command Structure for Theater Warfare: The Quest for Unity of Command

    Science.gov (United States)

    1984-09-01

    managership ot airpowet under the an component commander isdcnm! liom pi.icl-c.il experience and history In North Attica m 1442 to I’M*. American airmen...easy decision. The Navy and Marine Corps viewed single managership of air assets difterently than the Army and the Air Force. We made some false starts...The Marine Corps contended that the ground war should determine the airstrikes and that single managership would force them to increase their staff

  19. Mission Command and Antiaccess/Area-Denial: Implications for Joint Command and Control

    Science.gov (United States)

    2013-05-20

    ballistic missile are contributing to this perception. 5 This deployment however, still does not answer basic questions of whether the technology in...intensity AA/AD problem a centralized national priority. Mission Command is not Enough Van Creveld argues that "from Plato to NATO, the history of...such as who has the best information, who has the most robust communication capability, and at what level risk decisions are made all contribute to

  20. The Unified Command Plan and Combatant Commands: Background and Issues for Congress

    Science.gov (United States)

    2013-01-03

    along with the Indian Ocean islands of Comoros, Madagascar , Mauritius, and Seychelles. U.S. Central Command maintains its traditional relationship...Ocean, the Caribbean Sea, and the waters around Central and South America extending into the Pacific to the Galapagos Island . Marine Corps Forces U.S...responsible for U.S. military relations with 54 African countries including the islands of Cape Verde, Equatorial Guinea, and Sao Tome and Principe

  1. Scalable TCP-friendly Video Distribution for Heterogeneous Clients

    Science.gov (United States)

    Zink, Michael; Griwodz, Carsten; Schmitt, Jens; Steinmetz, Ralf

    2003-01-01

    This paper investigates an architecture and implementation for the use of a TCP-friendly protocol in a scalable video distribution system for hierarchically encoded layered video. The design supports a variety of heterogeneous clients, because recent developments have shown that access network and client capabilities differ widely in today's Internet. The distribution system presented here consists of videos servers, proxy caches and clients that make use of a TCP-friendly rate control (TFRC) to perform congestion controlled streaming of layer encoded video. The data transfer protocol of the system is RTP compliant, yet it integrates protocol elements for congestion control with protocols elements for retransmission that is necessary for lossless transfer of contents into proxy caches. The control protocol RTSP is used to negotiate capabilities, such as support for congestion control or retransmission. By tests performed with our experimental platform in a lab test and over the Internet, we show that congestion controlled streaming of layer encoded video through proxy caches is a valid means of supporting heterogeneous clients. We show that filtering of layers depending on a TFRC-controlled permissible bandwidth allows the preferred delivery of the most relevant layers to end-systems while additional layers can be delivered to the cache server. We experiment with uncontrolled delivery from the proxy cache to the client as well, which may result in random loss and bandwidth waste but also a higher goodput, and compare these two approaches.

  2. 14 CFR 91.531 - Second in command requirements.

    Science.gov (United States)

    2010-01-01

    ...-Powered Multiengine Airplanes and Fractional Ownership Program Aircraft § 91.531 Second in command...-powered multiengine airplane for which two pilots are required under the type certification requirements... the qualifications for second in command prescribed in § 61.55 of this chapter. (d) No person may...

  3. U.S. Northern Command Counterterrorism Response Force Requirement

    Science.gov (United States)

    2016-06-10

    Response ......................................................................................................... 48 Dedicated Air and Sustainment ...bombers struck near the Stade de France in Saint-Denis, followed by suicide bombings and mass shootings at cafes, restaurants , and the Bataclan Concert...deploying within the United Sates with organic command and control, air, and sustainment for a catastrophic event. Serving as the combatant command

  4. Turn-based gaming for convoy commander training

    NARCIS (Netherlands)

    Boonekamp, R.C.; Muller, T.J.; Vrijer, J.C. de

    2015-01-01

    With the increasing complexity of current-day military operations, effective education and training of military commanders is of vital importance. Commanders need to perform within a broader range of conflicts; unpredictable threats and civil-military interaction place a great demand on their

  5. The impact of new technologies on shipboard command and control

    OpenAIRE

    Oats, Trey D.; Erickson, Matthew C.

    2003-01-01

    Approved for public release, distribution is unlimited An investigation of how fuel cells, an integrated power system, and directed energy weapons will affect the shipboard command and control process. The focus is on the implementation of the new technologies onboard near-term and far-term destroyer variants and the resulting changes to the command and control process. Ensign, United States Naval Reserve

  6. Land impact test of the Apollo Command Module at MSC

    Science.gov (United States)

    1968-01-01

    Technicians and engineers gather to monitor a land impact test of the Apollo Command Module (Airframe 009) in a test area at Manned Spacecraft Center (MSC). In this view, the Command Module test vehicle is released from the tower to fall to the ground.

  7. Program Funding Guide for Air Force Systems Command Space Programs

    Science.gov (United States)

    1975-11-01

    Robert O’Shaughnessy, USN. My special thanks are also due Major Lawrence J. Hildebrand, Headquarters, Air Force Systems Command/ SDSD , for providing in...and Engineering. Washington, D.C., May 1974. 14. Hildebrand, Lawrence J., MAJ USAF., Interview conducted at Air Force Systems Command, AFSC/ SDSD . 12 August 1975. C-2 I

  8. 32 CFR 761.9 - Entry Control Commanders.

    Science.gov (United States)

    2010-07-01

    ... Guantanamo Bay Naval Defensive Sea Area and the Guantanamo Naval Airspace Reservation. (This authority delegated to Commander U.S. Naval Base, Guantanamo Bay.) (e) Commander U.S. Naval Base, Guantanamo Bay. Authorization for all persons, ships, and aircraft to enter the Guantanamo Bay Naval Defensive Sea Area and the...

  9. Apollo 9 Command/Service Modules photographed from Lunar Module

    Science.gov (United States)

    1969-01-01

    The Apollo 9 Command/Service Modules photographed from the Lunar Module, 'Spider', on the fifth day of the Apollo 9 earth-orbital mission. Docking mechanism is visible in nose of the Command Module, 'Gumdrop'. Object jutting out from the Service Module aft bulkhead is the high-gain S-Band antenna.

  10. Benefits Of Mission Command: Balance Of Philosophy And System

    Science.gov (United States)

    2016-05-26

    entered the US Army vocabulary in Field Manual (FM) 6-0 in August 2003 under “the premise that commanders exercise C2 (command and control) over...of its kind since World War II. On September 11, 2001, terrorists used commercial airliners as bombs to attack the World Trade Center in New York

  11. 32 CFR 536.7 - Responsibilities of the Commander USARCS.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Responsibilities of the Commander USARCS. 536.7... ACCOUNTS CLAIMS AGAINST THE UNITED STATES The Army Claims System § 536.7 Responsibilities of the Commander...) geographic areas of claims responsibility. (g) Recommend action to be taken by the SA, TJAG or the U.S...

  12. Friendly Combat Casualties and Operational Narratives

    Science.gov (United States)

    2015-06-21

    Francis J. West, No True Glory (New York: Bantam Books , 2005), 59. 19 Lieutenant General Ricardo Sanchez, Commander Coalition Joint Task Force...minority Conservative government carrying out a mission originally authorized by a minority Liberal government, further confused the narrative.83 This is a...strategic goals are blurry, and as a result an operational artist must comprehend an ever-widening set of influences on his or her operational setting. In

  13. Political discussions with family and friends

    DEFF Research Database (Denmark)

    Levinsen, Klaus; Yndigegn, Carsten

    2015-01-01

    Young people's engagement in political discussions with parents and friends represents a significant component of the political socialization process and can be seen as an activity where they learn some very basic democratic skills. Based on data from qualitative interviews and a questionnaire su...

  14. Metacommunication Behaviors Used by Adult Best Friends.

    Science.gov (United States)

    Shafer, Karen

    A study examined what type of communication behaviors best friends use when they talk about their relationship (meta-relate), or discuss the nature of talk within the friendship (meta-talk). Questionnaire data collected from middle-aged adults and young college students indicated that the respondents discussed their friendships more than their…

  15. Best friends' discussions of social dilemmas.

    Science.gov (United States)

    McDonald, Kristina L; Malti, Tina; Killen, Melanie; Rubin, Kenneth H

    2014-02-01

    Peer relationships, particularly friendships, have been theorized to contribute to how children and adolescents think about social and moral issues. The current study examined how young adolescent best friends (191 dyads; 53.4% female) reason together about multifaceted social dilemmas and how their reasoning is related to friendship quality. Mutually-recognized friendship dyads were videotaped discussing dilemmas entailing moral, social-conventional and prudential/pragmatic issues. Both dyad members completed a self-report measure of friendship quality. Dyadic data analyses guided by the Actor-Partner Interdependence Model indicated that adolescent and friend reports of friendship qualities were related to the forms of reasoning used during discussion. Friends who both reported that they could resolve conflicts in a constructive way were more likely to use moral reasoning than friends who reported that their conflict resolution was poor or disagreed on the quality of their conflict resolution. The findings provide evidence for the important role that friendship interaction may play in adolescents' social and moral development.

  16. ECO-FRIENDLY SYNTHESIS OF SILVER NANOPARTICLES ...

    African Journals Online (AJOL)

    userpc

    as medical diagnosis/therapy, solar cell development, water treatment, surface coating and cosmetic production. Bacterial synthesis of silver nanoparticles is regarded as eco-friendly due to minimal waste generated while being energy efficient. This study was aimed at synthesizing silver nanoparticles using Lactobacillus ...

  17. Environment friendly chemoselective deprotection of acetonides and ...

    Indian Academy of Sciences (India)

    Environment friendly chemoselective deprotection of acetonides and cleavage of acetals and ketals in aqueous medium without using any catalyst or organic solvent. S MUKHERJEE, A SENGUPTA and S C ROY. ∗. Department of Organic Chemistry, Indian Association for the Cultivation of Science, Jadavpur,. Kolkata 700 ...

  18. Strengthening Youth Friendly Health Services through Expanding ...

    African Journals Online (AJOL)

    USER

    providers to counsel and provide all contraceptive methods including LARCs in the same unit. A convenience purposive sampling technique was used to select 20 youth friendly health units; ten each in Amhara and Tigray regions, Ethiopia; randomly allocated to ... rates reflecting incorrect or inconsistent use (9% -. 30%) of ...

  19. A Location Privacy Aware Friend Locator

    DEFF Research Database (Denmark)

    Siksnys, Laurynas; Thomsen, Jeppe Rishede; Saltenis, Simonas

    2009-01-01

    to trade their location privacy for quality of service, limiting the attractiveness of the services. The challenge is to develop a communication-efficient solution such that (i) it detects proximity between a user and the user’s friends, (ii) any other party is not allowed to infer the location of the user...

  20. User-Friendly Materials and Alternate Formats.

    Science.gov (United States)

    Southwest Educational Development Laboratory, Austin, TX. National Center for the Dissemination of Disability Research.

    This booklet offers guidance for increasing the dissemination and utilization of information (especially federally funded disability research) through development of user-friendly materials and alternate formats. Individual sections address: the distinction between alternate formats and accessibility, suggested policies to help define approaches…

  1. Friends - In the Business of Fun

    OpenAIRE

    MacNiel, Jocelyn

    2010-01-01

    This session showed how Friends of the Library can enhance innovative library programs and collections through proceeds from FUNdraising events, and how special events bring the community to the library. Make the most of the energy and enthusiasm of your library’s volunteer base!

  2. GLINT: a user-friendly toolset for the analysis of high-throughput DNA-methylation array data.

    Science.gov (United States)

    Rahmani, Elior; Yedidim, Reut; Shenhav, Liat; Schweiger, Regev; Weissbrod, Omer; Zaitlen, Noah; Halperin, Eran

    2017-06-15

    GLINT is a user-friendly command-line toolset for fast analysis of genome-wide DNA methylation data generated using the Illumina human methylation arrays. GLINT, which does not require any programming proficiency, allows an easy execution of Epigenome-Wide Association Study analysis pipeline under different models while accounting for known confounders in methylation data. GLINT is a command-line software, freely available at https://github.com/cozygene/glint/releases . It requires Python 2.7 and several freely available Python packages. Further information and documentation as well as a quick start tutorial are available at http://glint-epigenetics.readthedocs.io . elior.rahmani@gmail.com or ehalperin@cs.ucla.edu.

  3. Longitudinal Changes in Social Brain Development: Processing Outcomes for Friend and Self.

    Science.gov (United States)

    Braams, Barbara R; Crone, Eveline A

    2016-11-11

    Adolescence is an important time for social development during which friendships become more intimate and complex. In this functional magnetic resonance imaging (fMRI) study we tested how outcomes for friends are processed on the neural level across adolescence. Participants between 8 and 27 years of age were tested twice with a 2-year difference between the first (N = 299) and second (N = 254) time points. Participants performed a task in which they could win and lose money for themselves and their best friend. Mixed linear models revealed a linear decrease in activity in social brain regions for friend > self over development. These results confirm changes in the social brain network across adolescent development, we further show that individual differences are related to these neural changes. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.

  4. Environmentally-friendly practices in hotels

    Directory of Open Access Journals (Sweden)

    Miriam Mbasera

    2016-03-01

    Full Text Available Orientation: There has been a growing concern for a ‘green’ hotel in the view of customers as they experience an increased awareness of environmental damage and excessive consumption of goods, energy and water.Research purpose: To determine the environmentally-friendly practices in hotels in Zimbabwe and South Africa and establish the contribution that hotels are making towards mitigation of the negative environmental effects.Motivation for the study: Currently, the world is facing environmental issues, which include global climate change, ozone depletion, pollution, high consumption of resources and increasing amounts of solid waste. Hotels, as part of the tourism industry, exert a significant impact on the environment. While the extent and range of the impact that hotels exert on the environment suggest an urgent need to address this problem, the question that arises is whether hoteliers appreciate the need for environmentally-friendly initiatives in their establishments.Research design, approach and method: A qualitative research was carried out in eight hotels that employ the strategy of the case study in the aforementioned countries. Main findings: Currently, no policies for green management exist, although some hotels do engage in some environmentally-friendly practices. Some hotel managers do not implement green management initiatives to mitigate the environmental problems emanating from their hotel operations.Practical and/or managerial implications: This indicates that a gap exists between managers’ awareness of appropriate environmentally-friendly practices for hotels, implying a need for training and increased awareness of green management.Contribution and/or value-add: The results could guide managers in the implementation of environmentally-friendly practices in an effort to mitigate environmental problems facing the present generation.

  5. Strategies for Transporting Data Between Classified and Unclassified Networks

    Science.gov (United States)

    2016-03-01

    Sustainment Logistics CPC System mission command (S2MC) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18...analyze the national enterprise data portal (NEDP), a foundational component of the sustainment system mission command. The analysis focused on...Taps,” Network Performance Channel GmbH, Langen, Germany , July 2011. 7. United States Navy, “Tactical Command System – MIP,” Defense Technical

  6. Gender, Friendship Networks, and Delinquency: A Dynamic Network Approach**

    Science.gov (United States)

    Haynie, Dana L.; Doogan, Nathan J.; Soller, Brian

    2014-01-01

    Researchers have examined selection and influence processes in shaping delinquency similarity among friends, but little is known about the role of gender in moderating these relationships. Our objective is to examine differences between adolescent boys and girls regarding delinquency-based selection and influence processes. Using longitudinal network data from adolescents attending two large schools in AddHealth (N = 1,857) and stochastic actor-oriented models, we evaluate whether girls are influenced to a greater degree by friends' violence or delinquency than boys (influence hypothesis) and whether girls are more likely to select friends based on violent or delinquent behavior than boys (selection hypothesis). The results indicate that girls are more likely than boys to be influenced by their friends' involvement in violence. Although a similar pattern emerges for nonviolent delinquency, the gender differences are not significant. Some evidence shows that boys are influenced toward increasing their violence or delinquency when exposed to more delinquent or violent friends but are immune to reducing their violence or delinquency when associating with less violent or delinquent friends. In terms of selection dynamics, although both boys and girls have a tendency to select friends based on friends' behavior, girls have a stronger tendency to do so, suggesting that among girls, friends' involvement in violence or delinquency is an especially decisive factor for determining friendship ties. PMID:26097241

  7. Gender, Friendship Networks, and Delinquency: A Dynamic Network Approach.

    Science.gov (United States)

    Haynie, Dana L; Doogan, Nathan J; Soller, Brian

    2014-11-01

    Researchers have examined selection and influence processes in shaping delinquency similarity among friends, but little is known about the role of gender in moderating these relationships. Our objective is to examine differences between adolescent boys and girls regarding delinquency-based selection and influence processes. Using longitudinal network data from adolescents attending two large schools in AddHealth (N = 1,857) and stochastic actor-oriented models, we evaluate whether girls are influenced to a greater degree by friends' violence or delinquency than boys (influence hypothesis) and whether girls are more likely to select friends based on violent or delinquent behavior than boys (selection hypothesis). The results indicate that girls are more likely than boys to be influenced by their friends' involvement in violence. Although a similar pattern emerges for nonviolent delinquency, the gender differences are not significant. Some evidence shows that boys are influenced toward increasing their violence or delinquency when exposed to more delinquent or violent friends but are immune to reducing their violence or delinquency when associating with less violent or delinquent friends. In terms of selection dynamics, although both boys and girls have a tendency to select friends based on friends' behavior, girls have a stronger tendency to do so, suggesting that among girls, friends' involvement in violence or delinquency is an especially decisive factor for determining friendship ties.

  8. On the Impacts and Benefits of Implementing Full-Duplex Communications Links in an Underwater Acoustic Network

    National Research Council Canada - National Science Library

    Gibson, J; Larraza, A; Rice, J; Smith, K; Xie, G

    2002-01-01

    .... These networks may provide command and control for autonomous underwater vehicles, forward reporting by arrays of sensor grids, ad hoc communications links to covert forces, or positive control...

  9. Comparing the happiness effects of real and on-line friends.

    Directory of Open Access Journals (Sweden)

    John F Helliwell

    Full Text Available A recent large Canadian survey permits us to compare face-to-face ('real-life' and on-line social networks as sources of subjective well-being. The sample of 5,000 is drawn randomly from an on-line pool of respondents, a group well placed to have and value on-line friendships. We find three key results. First, the number of real-life friends is positively correlated with subjective well-being (SWB even after controlling for income, demographic variables and personality differences. Doubling the number of friends in real life has an equivalent effect on well-being as a 50% increase in income. Second, the size of online networks is largely uncorrelated with subjective well-being. Third, we find that real-life friends are much more important for people who are single, divorced, separated or widowed than they are for people who are married or living with a partner. Findings from large international surveys (the European Social Surveys 2002-2008 are used to confirm the importance of real-life social networks to SWB; they also indicate a significantly smaller value of social networks to married or partnered couples.

  10. Comparing the happiness effects of real and on-line friends.

    Science.gov (United States)

    Helliwell, John F; Huang, Haifang

    2013-01-01

    A recent large Canadian survey permits us to compare face-to-face ('real-life') and on-line social networks as sources of subjective well-being. The sample of 5,000 is drawn randomly from an on-line pool of respondents, a group well placed to have and value on-line friendships. We find three key results. First, the number of real-life friends is positively correlated with subjective well-being (SWB) even after controlling for income, demographic variables and personality differences. Doubling the number of friends in real life has an equivalent effect on well-being as a 50% increase in income. Second, the size of online networks is largely uncorrelated with subjective well-being. Third, we find that real-life friends are much more important for people who are single, divorced, separated or widowed than they are for people who are married or living with a partner. Findings from large international surveys (the European Social Surveys 2002-2008) are used to confirm the importance of real-life social networks to SWB; they also indicate a significantly smaller value of social networks to married or partnered couples.

  11. Diffusion of Intervention Effects: The Impact of a Family-Based Substance Use Prevention Program on Friends of Participants.

    Science.gov (United States)

    Rulison, Kelly L; Feinberg, Mark; Gest, Scott D; Osgood, D Wayne

    2015-10-01

    We tested whether effects of the Strengthening Families Program for Youth 10-14 (SFP10-14) diffused from intervention participants to their friends. We also tested which program effects on participants accounted for diffusion. Data are from 5,449 students (51% female; mean initial age = 12.3 years) in the PROmoting School-community-university Partnerships to Enhance Resilience community intervention trial (2001-2006) who did not participate in SFP10-14 (i.e., nonparticipants). At each of five waves, students identified up to seven friends and self-reported past month drunkenness and cigarette use, substance use attitudes, parenting practices, and unsupervised time spent with friends. We computed two measures of indirect exposure to SFP10-14: total number of SFP-attending friends at each wave and cumulative proportion of SFP-attending friends averaged across the current and all previous post-intervention waves. Three years post-intervention, the odds of getting drunk (odds ratio = 1.4) and using cigarettes (odds ratio = 2.7) were higher among nonparticipants with zero SFP-attending friends compared with nonparticipants with three or more SFP-attending friends. Multilevel analyses also provided evidence of diffusion: nonparticipants with a higher cumulative proportion of SFP-attending friends at a given wave were less likely than their peers to use drugs at that wave. Effects from SFP10-14 primarily diffused through friendship networks by reducing the amount of unstructured socializing (unsupervised time that nonparticipants spent with friends), changing friends' substance use attitudes, and then changing nonparticipants' own substance use attitudes. Program developers should consider and test how interventions may facilitate diffusion to extend program reach and promote program sustainability. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  12. Coalition command and control: a Canadian perspective

    Science.gov (United States)

    Charpentier, Robert; Demers, David; Gouin, Denis; McCann, Carol; Nourry, Gerard; Pigeau, Ross; Smith, Donald L.; Vezina, Guy; Walker, Robert S.

    1998-08-01

    Canada has been, and remains, committed to participating in coalition operations to promote peace and stability in the post-Cold War world. However, coalition operations challenge traditional command and control concepts, from both the technological and the human perspectives. In the short term, Canada is working closely with traditional NATO and ABCA allies to ensure that the next generation of automated C2 information systems are able to exchange information effectively through structured messages, gateways and standardized data models. Canada is also conducting R&D, and participating in collaborative experiments, to evolve the next generation of systems to permit richer, more dynamic information sharing, along the lines of the Internet and World Wide Web. However, information technology alone will not solve the problems of coalition operations. Research needs to be undertaken to understand task assignment and information flow among coalition partners at the process or operational level. Research is also required at the human level, where differences between coalition partners in culture, personal values, military expectations, religions, and societal values are proving to be less tractable than differences in message formats and communication protocols.

  13. Finding Friends Online: Online Activities by Deaf Students and Their Well-Being

    Science.gov (United States)

    Blom, Helen; Marschark, Marc; Vervloed, Mathijs P. J.; Knoors, Harry

    2014-01-01

    Generally, deaf and hard of hearing (D/HH) children have fewer friends than hearing peers and their friendships are of a lower quality. The research hypothesis was that using the computer to communicate with new online friends through social network sites or playing games with offline friends is associated with D/HH friendship qualities, because it removes certain communication barriers D/HH face in offline communication settings. With online questionnaires the relation between computer use and online, mixed (offline friend who you also speak in online settings), and offline friendship quality of D/HH and hearing students (18–25 years) was compared in both the Netherlands (n = 100) and the United States (n = 122). In addition, the study examined whether the different friendship qualities were related to the participants' well-being. Results showed that, in general, D/HH students' friendship qualities and levels of well-being were similar to their hearing peers. The quality of the mixed friendships was positively related to well-being. Furthermore, the frequency of pc use with both online and offline friends was positively related to friendships qualities in both hearing and D/HH students. A combination of the online and offline friendship seems to be the most important friendship type for both hearing and D/HH students and it is worthwhile to encourage this friendship type. PMID:24520373

  14. Finding friends online: online activities by deaf students and their well-being.

    Directory of Open Access Journals (Sweden)

    Helen Blom

    Full Text Available Generally, deaf and hard of hearing (D/HH children have fewer friends than hearing peers and their friendships are of a lower quality. The research hypothesis was that using the computer to communicate with new online friends through social network sites or playing games with offline friends is associated with D/HH friendship qualities, because it removes certain communication barriers D/HH face in offline communication settings. With online questionnaires the relation between computer use and online, mixed (offline friend who you also speak in online settings, and offline friendship quality of D/HH and hearing students (18-25 years was compared in both the Netherlands (n = 100 and the United States (n = 122. In addition, the study examined whether the different friendship qualities were related to the participants' well-being. Results showed that, in general, D/HH students' friendship qualities and levels of well-being were similar to their hearing peers. The quality of the mixed friendships was positively related to well-being. Furthermore, the frequency of pc use with both online and offline friends was positively related to friendships qualities in both hearing and D/HH students. A combination of the online and offline friendship seems to be the most important friendship type for both hearing and D/HH students and it is worthwhile to encourage this friendship type.

  15. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  16. Function Activation on Intelligent Buildings Using Mobile Devices through Voice Commands

    Directory of Open Access Journals (Sweden)

    Moumtadi Fatima

    2014-04-01

    Full Text Available Development of information and communication technologies has allowed the incorporation into different areas of human activity of apps that control electrical and electronic devices through voice commands. With these apps, in telemedicine people affected by some temporary decrease in their physical capacities have improved their level of autonomy; utilities have been added to educational environments to facilitate the use of IT applications to users with physical disability; finally, home automated solutions have made possible to any person with permanent limited mobility to take control over home devices using voice commands. In this article a home automated solution, developed over a client-server principle is presented. As the client device a MIDP 2.0 cell phone with a Java MicroEdition application loaded was used; as server a web server PC was used serving also as gateway towards a Konnex network, added with a speech recognizer engine. Fully functional prototype developed allowed take control over 3 devices with 87% success of the speech recognizer reliability, this percentage improved after the use of a drop-down menu of commands displayed over the monitor.

  17. A Combined Arms Approach to Defending Army Networks

    Science.gov (United States)

    2012-01-01

    GIG operates, through cyberspace, as a globally interconnected, end...operations from the friendly to adversary box increases the situational awareness and unity of effort the Army lacks, and creates an economy of force that...Spectrum Management Operations EW – Electronic Warfare GIG – Global Information Grid MCCoE – Mission Command Center of Excellence NIE –

  18. How Friendship Network Characteristics Influence Subjective Well-Being

    Science.gov (United States)

    van der Horst, Mariska; Coffe, Hilde

    2012-01-01

    This article explores how friendship network characteristics influence subjective well-being (SWB). Using data from the 2003 General Social Survey of Canada, three components of the friendship network are differentiated: number of friends, frequency of contact, and heterogeneity of friends. We argue that these characteristics shape SWB through the…

  19. Reviewing Command and Control for a Heavy Brigade: Tweaking the Design of the Forward Command Posts

    Science.gov (United States)

    1992-12-19

    Armored Division then became the spearhead for General George Patton’s Third Army. 1 2 4 At 0500 hours on August 1st, Colonel Clarke received orders from...116Ibid. 1 1 7 1bid. 1 1 8 ibid. 1 1 9 John L. Romjue, "From Active Defense to AirLand Battle: The Development of Army Doctrine 1973-1982," Tradoc...Key to Winning," Military Review, (July 1990), 65. 162Richard P. Geier , "Battalion Command and Control", Armor 94, no.2 (September-October 1985), 9

  20. On Social and Economic Networks

    NARCIS (Netherlands)

    A. Galeotti

    2005-01-01

    textabstractYou can call it a clan, or a network, or a family, or a group of friends. The way you call it is not relevant. What matters is that it exists and often you will need one. A large body of empirical work shows that networks are pervasive in social and economic interactions. This book

  1. Is agro-tourism eco-friendly?

    Directory of Open Access Journals (Sweden)

    Giurea Ramona

    2017-01-01

    Full Text Available The paper will highlight the impact of agro-tourism on environment in Romania, focusing on the Sibiu County. Thanks to the results obtained from this analysis, research and information collection, the paper will give some answers regarding the question: are agro-tourisms environmentally friendly? The authors identify potential causes of environmental pollution from agro-tourism and some resources that could be economically used. The negative and positive aspects on the increase of agro-tourism activities in the proposed region will be also discussed taking into account there impact on the environment. Based on the obtained results, the authors will propose a method for the management of resources in order to arrive to an eco-friendly system for the proposed case-study. Future developments and applications on other EU case-study will be also discussed in this paper.

  2. Development of eco-friendly washing machine

    Directory of Open Access Journals (Sweden)

    Sakidin Hamzah

    2017-01-01

    Full Text Available A portable, non-electric washing machine powered by human leg identical to cycling is produced in order to fulfil the need of varsity students to wash their clothes in a cheap, eco-friendly and time saving and also to do physical body exercises. A black plastic bin has been used as the main body. At the bottom lies the rotating disk to provide agitation to the water and also cleaning the clothes. Shaft and gears are also been used in the rotating and moving mechanism that is connected to the pedal. This eco-friendly washing machine with an affordable price will benefit the lower income family and also for the college students.

  3. Negotiating a friends with benefits relationship.

    Science.gov (United States)

    Bisson, Melissa A; Levine, Timothy R

    2009-02-01

    Friends with benefits (FWB) refers to "friends" who have sex. Study 1 (N = 125) investigated the prevalence of these relationships and why individuals engaged in this relationship. Results indicated that 60% of the individuals surveyed have had this type of relationship, that a common concern was that sex might complicate friendships by bringing forth unreciprocated desires for romantic commitment, and ironically that these relationships were desirable because they incorporated trust and comfort while avoiding romantic commitment. Study 2 (N = 90) assessed the relational negotiation strategies used by participants in these relationships. The results indicated that people in FWB relationships most often avoided explicit relational negotiation. Thus, although common, FWB relationships are often problematic for the same reasons that they are attractive.

  4. Environment-friendly drilling operation technology

    Science.gov (United States)

    Luo, Huaidong; Jing, Ning; Zhang, Yanna; Huang, Hongjun; Wei, Jun

    2017-01-01

    Under the circumstance that international safety and environmental standards being more and more stringent, drilling engineering is facing unprecedented challenges, the extensive traditional process flow is no longer accepted, the new safe and environment-friendly process is more suitable to the healthy development of the industry. In 2015, CNPCIC adopted environment-friendly drilling technology for the first time in the Chad region, ensured the safety of well control, at the same time increased the environmental protection measure, reduced the risk of environmental pollution what obtain the ratification from local government. This technology carries out recovery and disposal of crude oil, cuttings and mud without falling on the ground. The final products are used in road and well site construction, which realizes the reutilization of drilling waste, reduces the operating cost, and provides a strong technical support for cost-cutting and performance-increase of drilling engineering under low oil price.

  5. Simulating Mission Command for Planning and Analysis

    Science.gov (United States)

    2015-06-01

    Path on Task Network Box Diagram ...................................... 18 Figure 15. Slack Time on a Gantt Chart...slack time is illustrated on a Gantt chart for an example. Figure 15. Slack Time on a Gantt Chart There are two effective scheduling and

  6. CAD Instructor Designs Eco-Friendly Shed

    Science.gov (United States)

    Schwendau, Mark

    2013-01-01

    Dissatisfied with the options offered by big box stores--and wanting to save some money and go as green as possible--the author puts his design and construction skills to good use. In this article, he shares how he designed and built an eco-friendly shed. He says he is very pleased with the results of working with his own design, reducing waste,…

  7. Creating an Asthma-Friendly School

    Centers for Disease Control (CDC) Podcasts

    2007-11-08

    This podcast features real-life success stories of students with asthma who, thanks to their schools' implementation of asthma-friendly policies and programs, now have their asthma under control.  Created: 11/8/2007 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP), Division of Adolescent and School Health (DASH).   Date Released: 5/20/2008.

  8. Environment Friendly Biodiesel Fuel in Latvia

    OpenAIRE

    Gudriniece, E.; Strēle, M.; Skujiņš, V.

    2006-01-01

    Biodiesel fuel (RME and REE) are alternative, environment friendly fuels for diesel engines, obtained from rapeseed oil and methanol or ethanol. RME are produced with capacity 2500 t/year at SIA “Delta Riga” experimental factory Naukseni in Latvia. The laboratory method of production biodiesel fuel (REE) from rapeseed oil and ethanol has been worked out at RTU. Blends RME and REE with fossil diesel fuel are applied, as well.

  9. Elettronika Virtual Network Management

    OpenAIRE

    Marco Fiore; Giuseppe Modugnio; Doru Ursutiu; Alexandra Teodor; Atilla Valadi

    2009-01-01

    This article introduces a simple and efficient implementation of a remote control system for the telecommunication networks. The paper deals with the automatization of transmission sites, the unattended monitoring and the ease of management of those. For the hardware’s remote control we introduce a user friendly software interface between the user and the stations.

  10. Spaceport Command and Control System Software Development

    Science.gov (United States)

    Mahlin, Jonathan Nicholas

    2017-01-01

    There is an immense challenge in organizing personnel across a large agency such as NASA, or even over a subset of that, like a center's Engineering directorate. Workforce inefficiencies and challenges are bound to grow over time without oversight and management. It is also not always possible to hire new employees to fill workforce gaps, therefore available resources must be utilized more efficiently. The goal of this internship was to develop software that improves organizational efficiency by aiding managers, making employee information viewable and editable in an intuitive manner. This semester I created an application for managers that aids in optimizing allocation of employee resources for a single division with the possibility of scaling upwards. My duties this semester consisted of developing frontend and backend software to complete this task. The application provides user-friendly information displays and documentation of the workforce to allow NASA to track diligently track the status and skills of its workforce. This tool should be able to prove that current employees are being effectively utilized and if new hires are necessary to fulfill skill gaps.

  11. PRUB: A Privacy Protection Friend Recommendation System Based on User Behavior

    Directory of Open Access Journals (Sweden)

    Wei Jiang

    2016-01-01

    Full Text Available The fast developing social network is a double-edged sword. It remains a serious problem to provide users with excellent mobile social network services as well as protecting privacy data. Most popular social applications utilize behavior of users to build connection with people having similar behavior, thus improving user experience. However, many users do not want to share their certain behavioral information to the recommendation system. In this paper, we aim to design a secure friend recommendation system based on the user behavior, called PRUB. The system proposed aims at achieving fine-grained recommendation to friends who share some same characteristics without exposing the actual user behavior. We utilized the anonymous data from a Chinese ISP, which records the user browsing behavior, for 3 months to test our system. The experiment result shows that our system can achieve a remarkable recommendation goal and, at the same time, protect the privacy of the user behavior information.

  12. Command and Control of Space Assets Through Internet-Based Technologies Demonstrated

    Science.gov (United States)

    Foltz, David A.

    2002-01-01

    The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space

  13. Friends Like Me: Associations in Overweight/Obese Status among Adolescent Friends by Race/Ethnicity, Sex, and Friendship Type

    Science.gov (United States)

    MacLehose, Richard; Eisenberg, Marla E.; Kim, Sunkyung; Story, Mary; Neumark-Sztainer, Dianne

    2015-01-01

    Abstract Background: Little is known about how interpersonal friend relationships are associated with obesity in young people, particularly with regard to how race/ethnicity, type of friendship, and sex affect the association between friends' and adolescents' weight status. This study examined associations in weight status among adolescents and their friends, exploring magnitudes of associations across friendship type, sex, and race/ethnicity. Methods: As part of EAT-2010 (Eating and Activity in Teens), friend nominations and anthropometrics were obtained from adolescents (n = 2099: 54% female; 80% nonwhite; mean age: 14.2 ± 1.9 years). Generalized estimating equation logistic regression models were used to test associations between adolescents' overweight/obese status and friends' (i.e., friend group, female friends, male friends, female best friends, and male best friends) overweight/obese status. Interactions by adolescent race/ethnicity were examined. Results: The majority of significant associations were observed among white female adolescents' who had a 22–40% higher prevalence of overweight/obesity if their friends were overweight compared to white females whose friends were not overweight. In contrast, there were few significant differences for other adolescent female and male racial/ethnic groups for girls and boys. Results for friend groups and best friends were generally similar to one another. Conclusions: The association between friend and adolescent overweight/obese status depended on adolescents' sex, race/ethnicity, and friendship type. Given the similarities among friends, obesity interventions targeting youth, especially white females, should consider involving friends. PMID:26655453

  14. IT Security Support for Spaceport Command and Control System

    Science.gov (United States)

    McLain, Jeffrey

    2013-01-01

    During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.

  15. Network migration of ethnic Germans.

    Science.gov (United States)

    Bauer, T; Zimmermann, K F

    1997-01-01

    "This study has argued that network migration is central to actual migratory movements, which suggests that its determinants should be carefully investigated. The analysis demonstrates that the network behavior of ethnic Germans can be explained, to a large degree, by observable characteristics. Two crucial variables were investigated, namely the connections to friends from the country of origin and the settlement close to relatives and friends. East Europeans, especially from Rumania, are significantly more connected to friends from the same country of origin than are East Germans. These connections strongly decline with duration of residence and presence in rural areas. Older people are more likely to settle close to friends or relatives at the time of immigration. Population density increases, education, length of stay in a reception camp, and per capita government expenditures decrease the likelihood of such a settlement." excerpt

  16. An Improved Algorithm for Mutual Friends Recommendation Application of SNS in Hadoop

    OpenAIRE

    Lei, Yuan

    2015-01-01

    In Social network system, existing “people you might know” or “Mutual friends” recommending applications are commonly utilized to list two-hop mediate relationships that one could have with another in order to tighten the bonds among groups. However, as the number of SNS users increase dramatically, the relationship data get so huge that the performance of Mutual Friends recommendation system becomes an urgent problem considering the developers’ requirements. Here we propose a sorting algorit...

  17. Distributed Command/Control Impacts on NAS Operations Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Command and Control (C2) activities abound in the NAS, and significantly influence daily operations and overall NAS efficiency. Since C2 effects are so prominent,...

  18. Command and Control Planning and Teamwork: Exploring the Future

    National Research Council Canada - National Science Library

    Sterling, Bruce S; Lickteig, Carl W

    2000-01-01

    .... This paper examines how participant ratings of command and control planning and observer assessments of teamwork were related in a series of futuristic missions conducted by the Mounted Maneuver...

  19. Detecting malware based on expired command-and-control traffic

    National Research Council Canada - National Science Library

    Zou, Futai; Zhang, Siyu; Li, Linsen; Pan, Li; Li, Jianhua

    2017-01-01

    In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains...

  20. Implementing UPDM to develop command and control systems

    CSIR Research Space (South Africa)

    Oosthuizen, R

    2016-09-01

    Full Text Available Systems engineering is an established approach to develop systems, including complex sociotechnical systems such as Command and Control (C2) Systems. These systems often occur through introduction of a new technology into an existing system...

  1. Architecting Joint Command and Control System of System Capability Certifications

    National Research Council Canada - National Science Library

    Acosta, Jacob; Hoesly, Scot; Huseth, Scott; Krider, Steven; Lamb, Jeremy; Martin, Calvin; Medina, Vince; Medina, Jorge; Nguyen, Michael; Patel, Jaykant

    2007-01-01

    Command, Control, Communications, Computers, and Intelligence (C4I) systems, each originally designed to address a single warfighting function, have been assembled into an interdependent C4I System of Systems (SoS...

  2. Africa Command: Building a Foundation of Operational Interagency Cooperation

    National Research Council Canada - National Science Library

    Piacenti, Chad E

    2007-01-01

    Interagency cooperation has been a recognized deficiency for many years. The National Security Act of 1947 and the Goldwater-Nichols Act of 1986 helped to streamline military operations and chains of command...

  3. Gesture Commanding of a Robot with EVA Gloves Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Gesture commanding can be applied and evaluated with NASA robot systems. Application of this input modality can improve the way crewmembers interact with robots...

  4. Position Command Shaping for Vibration Suppression Considering Target Position Correction

    Science.gov (United States)

    Yamamoto, Masafumi; Ito, Kazuaki; Iwasaki, Makoto; Matsui, Nobuyuki

    This paper presents a command shaping technique based on a minimum jerk control approach considering a target position correction during motion, for the fast and precise positioning in vibratory mechatronic systems. The positioning controller is designed by a 2-degrees-of-freedom control: a feedback compensator is synthesized by H∞ control design to ensure the robust stability, while a feedforward compensator suppresses the vibration in response based on a coprime factorization expression of the plant mechanism. The command shaping, on the other hand, eliminates the corresponding vibration components of the primary and secondary modes in the position command, where the continuity of jerk component in the command can be ensured against the target position correction. The effectiveness of the proposed shaping technique has been verified by experiments using a table drive system on machine stand.

  5. How Can I Help a Friend Who Cuts?

    Science.gov (United States)

    ... Abuse Love and Romance Understanding Other People How Can I Help a Friend Who Cuts? KidsHealth > For Teens > How Can I Help a Friend Who Cuts? Print A ... them? If so, what should you do? It can be hard to understand why a friend might ...

  6. Mission Command In A Communications Denied Environment

    Science.gov (United States)

    2017-02-16

    the subordinate is able to learn and able to apply the lessons learned from those mistakes, and they do not indicate a lack of capability, mistakes...best support and supervise his subordinates. This position might be his office with all the modern technology available and video feeds to every...the network vulnerable to enemy exploitation. The effects of cyber-attacks can be categorized into six different classes . a) Interruption: part

  7. Command History, 1971. Volume 1. Sanitized

    Science.gov (United States)

    1971-01-01

    of resupply, the trucks moving down the Laotian logistcs corridor, as well as the road and trail network over which they move, and the associate...However, the improvement in security following TET reversed this trend and since 1969 agricultural production has increased in almost all areas. In...refusal of the US Senate to approve foreign aid in October 1971 created great concern among the GKR. but the subsequent reversal of that vote in November

  8. Automatic-Control Challenges in Future Urban Vehicles: A Blend of Chassis, Energy and Networking Management Les défis de la commande automatique dans les futurs véhicules urbains : un mélange de gestion de châssis, d’énergie et du réseau

    Directory of Open Access Journals (Sweden)

    Savaresi S.M.

    2012-10-01

    Full Text Available The topic of this paper is the discussion of new challenges that the scientific field of automatic-control will face in the next decades, in the area of vehicles control. The focus is on urban vehicles for personal mobility, since this type of vehicles will be subject to the biggest changes in the next decades. The paper is articulated in three sections – in a top-down framework – briefly addressing and discussing the following items: the main drivers, which will force a change in urban personal mobility; the main types of vehicles, which are expected to address at best such drivers; the main automatic-control challenges on such type of vehicles. The scope of this paper is purposely non-technical. Its aim is mainly to discuss the emerging new challenges from the perspective of the automatic-control scientists and practitioners. The goal of the paper is to establish a discussion framework on the problems and opportunities, which will arise in this field, in the near future. Le sujet du présent article est une discussion sur les nouveaux défis auxquels le domaine scientifique de la commande automatique des véhicules va faire face dans les prochaines décennies. L’accent est mis sur les véhicules urbains destinés à une mobilité individuelle, puisque c’est ce type de véhicules qui va faire l’objet des plus grands changements dans les prochaines décennies. Le présent article s’articule, selon une démarche descendante, en trois sections abordant et discutant brièvement les éléments suivants : les principaux moteurs qui vont imposer un changement en matière de mobilité individuelle; les principaux types de véhicules qui sont attendus pour répondre au mieux à de tels moteurs et les principaux défis de la commande automatique sur un tel type de véhicules. À dessein, la portée du présent article est non technique. Son but est principalement de discuter les nouveaux défis émergeants, à partir de perspectives des

  9. What It Takes. Air Force Command of Joint Operations

    Science.gov (United States)

    2009-01-01

    Operations Center DNA Defense Nuclear Agency DoD Department of Defense DRAT Disaster Response Assessment Team ENGR engineer EPOC (United States...USEUCOM Training Transformation in Support of C2 Transformation,” briefing, September 2003, p. 6. Command Concepts 35 Center ( EPOC ).35 Contrary to...most expectations of how the SJFHQ (CE) will work, the EPOC plans to deploy only around 20 of its staff to JTF headquarters. U.S. Pacific Command

  10. Assessment of Army Contracting Command’s Contract Management Processes

    Science.gov (United States)

    2010-06-16

    D. M., Clouse, A., & Turner, R. (2001). CMMI , distilled. Boston: Addison- Wesley. Army Aviation and Missile Command (AMCOM)(2009). AMCOM Fact Sheet...organizational culture at naval air systems command (Master’s Thesis ). Monterey, CA: Naval Postgraduate School. Kraljic, P. (1983, September...J. (2008, January). Analysis of the contracting processes and ethical culture at Ogden Air Logistics Center, Hill AFB, UT (Master’s Thesis

  11. The Law of War and the Operational Commander

    Science.gov (United States)

    1994-02-08

    Every member of the military is bound by oath to discharge his or her duties in accordance with the law of war. This paper examines the influence of... the law of war on the operational commander and includes legal planning considerations for campaigns. It does not list all laws of armed conflict or...history clearly indicate that operational commanders who have adhered to the law of war emerged victorious in their respective campaigns. Analysis of these

  12. The Exercise of Control by Joint Force Commanders

    Science.gov (United States)

    2006-05-25

    consituted a decentralization of control – from one commander to several commanders and staffs – was the development of doctrine to enable them to...joint doctrine is fulfilling this purpose with regard to control. Prussian military reformers Scharnhorst and Moltke instituted common education...from a long-standing military alliance such as NATO, US- Japan or US-ROK, this will mean significant interoperability challenges which the CJTF and

  13. Overhead cost allocation at Military Sealift Command, Pacific

    OpenAIRE

    Hale, Katharine A.

    1994-01-01

    Approved for public release, distribution unlimited The purpose of this thesis is to examine overhead costs and allocation methods at the Military Sealift Command (MSC). The command's overhead expenses from Fiscal Year 1988 through 1994 are reviewed and followed by a description of MSC's current method of allocating overhead to specific shipping arrangements. Possible sources of information distortion involved in indirect overhead allocation are discussed, and an alternative method of allo...

  14. Introduction to Command, Control, and Communications: A Primer

    Science.gov (United States)

    1995-06-01

    CSSE Combat Service Support Element CSSOC Combat Service Support Operations Center CTAPS Contingency TACS Air Planning System CTE Commander Task Element...maker. b. C2 Analogy To illustrate the C2 process, Coakley uses the analogy of a head coach of a football team and compares it to that of a commander...Program Activity (DMPA) Office of Economic Adjustment (OEA) Dept. of Defense Dependent Schools (DODDS) American Forces Information Service (AFIS) Defense

  15. Measuring Command Post Operations in a Decisive Action Training Environment

    Science.gov (United States)

    2017-05-01

    ATTP 5-0.1, Commander and Staff Officer Guide, and FM 6-0, Commander and Staff Organization. The CP Operations Checklist was developed by the WLC...the CP Operations Checklist may have resulted from not having a Standard Operating Procedure (SOP) for such tasks. There were significant...appreciation to U.S. Amy Research Institute’s former Senior Military Research Liaison Officer , SMA(R) Julius W. Gates. SMA(R) Gates provided

  16. Air Mobility Command Financial Reporting of Property, Plant, and Equipment.

    Science.gov (United States)

    1997-03-19

    This is the first in a series of reports from our audit of the Property, Plant, and Equipment Accounts in the FY 1996 Financial Statements of the...Transportation Command’s $4 billion in expected revenue. In the beginning balance for FY 1996 Defense Business Operations Fund financial statements, the Air...Mobility Command reported $ 1.1 billion of Property, Plant, and Equipment. The objective of this part of the audit was to determine whether the Air

  17. Afloat surface line commanding officer leadership : a comprehensive study

    OpenAIRE

    Provencher, Jerome R.

    1992-01-01

    CIVINS (Civilian Institutions) Thesis document This thesis explored the leadership styles of Navy commanding officers of afloat commands to determine if there were any differences in leadership styles and the effect, if any, of rank, age, commissioning source, education, ethnicity, location, and ship community type that influenced that leadership style. A review of the literature indicated that the Navy adopted the Situational Leadership Model in 1976. The Navy concurred with the philosoph...

  18. Best friends' interactions and substance use: The role of friend pressure and unsupervised co-deviancy.

    Science.gov (United States)

    Tsakpinoglou, Florence; Poulin, François

    2017-10-01

    Best friends exert a substantial influence on rising alcohol and marijuana use during adolescence. Two mechanisms occurring within friendship - friend pressure and unsupervised co-deviancy - may partially capture the way friends influence one another. The current study aims to: (1) examine the psychometric properties of a new instrument designed to assess pressure from a youth's best friend and unsupervised co-deviancy; (2) investigate the relative contribution of these processes to alcohol and marijuana use; and (3) determine whether gender moderates these associations. Data were collected through self-report questionnaires completed by 294 Canadian youths (62% female) across two time points (ages 15-16). Principal component analysis yielded a two-factor solution corresponding to friend pressure and unsupervised co-deviancy. Logistic regressions subsequently showed that unsupervised co-deviancy was predictive of an increase in marijuana use one year later. Neither process predicted an increase in alcohol use. Results did not differ as a function of gender. Copyright © 2017 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  19. Staying Safe on Social Network Sites

    Science.gov (United States)

    ... friend" sites, build upon the concept of traditional social networks where you are connected to new people through ... your account and pretend to be you. Check privacy policies - Some sites may share information such as ...

  20. Understanding Members’ Attachment to Social Networking Sites

    DEFF Research Database (Denmark)

    Lim, Eric T. K.; Cyr, Dianne; Tan, Chee-Wee

    2014-01-01

    Social Networking Sites (SNSs) are pervasive phenomena in today’s society. With greater connectivity and interactivity enabled through emerging technologies, SNSs provide communication platforms for individuals to bridge spatial and temporal differences when making friends, sharing experiences...

  1. Diffusion of Intervention Effects: The Impact of a Family-based Substance Use Prevention Program on Friends of Participants

    Science.gov (United States)

    Rulison, Kelly L.; Feinberg, Mark; Gest, Scott D.; Osgood, D. Wayne

    2015-01-01

    Purpose We tested whether effects of the Strengthening Families Program for Youth 10–14 (SFP10–14) diffused from intervention participants to their friends. We also tested which program effects on participants accounted for diffusion. Methods Data are from 5,449 students (51% female; mean initial age=12.3 years) in the PROSPER community intervention trial (2001–2006) who did not participate in SFP10–14 (i.e., non-participants). At each of 5 waves, students identified up to 7 friends and self-reported past month drunkenness and cigarette use, substance use attitudes, parenting practices, and unsupervised time spent with friends. We computed two measures of indirect exposure to SFP10–14: total number of SFP-attending friends at each wave and cumulative proportion of SFP-attending friends averaged across the current and all previous post-intervention waves. Results Three years post-intervention, the odds of getting drunk (OR=1.4) and using cigarettes (OR=2.7) were higher among non-participants with 0 SFP-attending friends compared to non-participants with 3 or more SFP-attending friends. Multilevel analyses also provided evidence of diffusion: non-participants with a higher cumulative proportion of SFP-attending friends at a given wave were less likely than their peers to use drugs at that wave. Effects from SFP10–14 primarily diffused through friendship networks by reducing the amount of unstructured socializing (unsupervised time that non-participants spent with friends), changing friends’ substance use attitudes, and then changing non-participants’ own substance use attitudes. Conclusions Program developers should consider and test how interventions may facilitate diffusion to extend program reach and promote program sustainability. PMID:26210856

  2. Control and Monitoring of a Stepper Motor through a Local Area Network

    Directory of Open Access Journals (Sweden)

    POPOVICI, D.

    2007-11-01

    Full Text Available In these days due to the information technology there are many ways to control a remote servomotor. In the paper it is shown a simple and reliable way to handle the control and monitoring of a remote stepper motor using a Local Area Network (LAN. The hardware uses a common PIC microcontroller and a stand-alone Ethernet controller. The main program located in the flash program memory solves the following tasks: read packs through SPI (Serial Peripheral Interface from the Ethernet controller's buffer and decode them, encapsulate data to be sent with the Ethernet controller, control the on-off state of the transistors from the static converter and receive feedback directly from the optical sensor to monitor the actual position of the shaft. The microcontroller supervises also the Ethernet controller. The Ethernet controller's job is to receive data from the main application remote program that runs on a computer, via UTP cable. Then it stores the data for a short time in a buffer from which the microcontroller can read it. The microcontroller stores data on this Ethernet controller too and can command it to send data to the main application program running remotely. The main remote program is written in Visual C++ and has a friendly interface allowing to the operator to send commands to the stepper motor drive and monitor in a dedicated window position, speed or the control sequences for the power transistor drivers of the stepper motor. The operator can send specific commands to the drive such as Start, Stop, Accelerate, Decelerate, Spin Clockwise/Counter clockwise and the number of steps. The microcontroller stepper motor drive system shows good performance and reliability.

  3. How Do My Friends Matter? Examining Latino Adolescents' Friendships, School Belonging, and Academic Achievement.

    Science.gov (United States)

    Delgado, Melissa Y; Ettekal, Andrea Vest; Simpkins, Sandra D; Schaefer, David R

    2016-06-01

    Are Latino adolescents' friendships an untapped resource for academic achievement or perhaps one of the reasons why these youth struggle academically? Using data from the National Longitudinal Study of Adolescent Health (N = 6782; 7th through 12th graders; 52.9 % female), we examined whether the process of Latino students' school belonging mediated the relationships between the context of friendships (i.e., friendship network indicators) and their academic outcomes (i.e., a context-process-outcomes model), and tested whether the process-context link varied by friends' characteristics (i.e., GPA and problem behavior; social capital). Moreover, we tested whether all relationships varied across the four largest Latino subgroups in the U.S. (i.e., Mexican, Central/South American, Puerto Rican, and Cuban). Our findings indicate that being nominated as a friend by peers and perceiving to have friends exerted both direct effects on school belonging in all but one of the Latino ethnic samples (i.e., Puerto Rican samples) and indirect effects on academic achievement in the full Latino, Mexican, and Central/South American samples. As such, school belonging was more likely to explain the links between academic achievement with nominations by peers as a friend and perceived friends than with having close-knit friendship groups. However, having a close-knit group of average or low-achieving friends predicted more school belonging for Mexican youth, but less school belonging for Cubans. Our findings suggest that friendships may be particularly beneficial for the school belonging process of highly marginalized groups in the U.S. (i.e., Mexican-origin).

  4. I and My Friends are Good People: The Perception of Incivility by Self, Friends and Strangers

    Directory of Open Access Journals (Sweden)

    Ursula Hess

    2016-02-01

    Full Text Available Three studies were conducted to assess self-serving biases in participants’ beliefs about incivility, its antecedents and consequences as well as restitution behaviors and forgiveness as a function of whether a behavior was performed by themselves, strangers or friends. Participants who imagined themselves in the active role not only described their own behavior as more excusable, congruent with an actor-observer bias, but more importantly, they showed strong self-serving biases with regard to all their reactions to the situation – even though this leads to logical contradictions. This self-serving expectation generalized to friends and contrasted sharply with expectations for strangers, whose behaviors were described as logically consistent. The difference between what is expected from self and friends and what is expected from others may account for much of the popular moral outrage at incivility in various social realms.

  5. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    Science.gov (United States)

    2008-10-31

    operating locations, such PSDs will comply with (MNC-I) recommendations to alter routes or abort missions.”19 Though the nature of the mission would...to serve as part of that Chain-of-Command ( CoC ) would require qualification. Using the current conflict in Iraq as an example, limiting C2...contractual CoC . These planning actions can identify which type of commanders require training as Contracting Officers and CORs and will also ensure that

  6. The Influence of Parents and Friends on the Quality and Stability of Romantic Relationships: A Three-Wave Longitudinal Investigation.

    Science.gov (United States)

    Sprecher, Susan; Felmlee, Diane

    1992-01-01

    Examined how support from parents and friends for romantic relationships of young adults affect relationship quality and likelihood that their relationships break up over time. Data from 101 dating couples over 2 years revealed support for positive effect of network support on quality of relationship. Hazard analyses showed that female partner's…

  7. Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player

    Directory of Open Access Journals (Sweden)

    Vivien Arief Wardhany

    2014-12-01

    Full Text Available The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male & 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word “Kanan” had the most recognize with percentage 83% while “pilih” is the lowest one. The word which had the most wrong clarification is “kembali” with percentagee 67%, while the word “kanan” is the lowest one. From the result of Recognition Rate by male there are several command such as “Kembali”, “Utama”, “Atas “ and “Bawah” has the low Recognition Rate. Especially for “kembali” cannot be recognized as the command in the female voices but in male voice that command has 4% of RR this is because the command doesn’t have similar word in english near to “kembali” so the system unrecognize the command. Also for the command “Pilih” using the female voice has 80% of RR but for the male voice has only 4% of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz than woman (165 to 255 Hz.The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system

  8. Media and breastfeeding: Friend or foe?

    Directory of Open Access Journals (Sweden)

    Peuchaud Sheila

    2008-08-01

    Full Text Available Abstract The mass media have the potential to be powerful friends or foes in promoting breastfeeding. The media could help by putting the issue of breastfeeding on policy agendas and by framing breastfeeding as healthy and normative for baby and mother. Currently, however, it looks as if the media are more often contributing to perceptions that breastfeeding is difficult for mothers and potentially dangerous for babies. This paper presents a brief overview of research on the media and breastfeeding, some insights into the market forces and human psychological factors that may play into media representations of breastfeeding, and strategies to help breastfeeding advocates work more effectively with the media.

  9. How to win friends and influence people

    CERN Document Server

    Carnegie, Dale

    2010-01-01

    For more than sixty years the rock-solid, time-tested advice in this book has carried thousands of now famous people up the ladder of success in their business and personal lives. With more than fifteen million copies sold, How to Win Friends and Influence People is one of the best known motivational books in history, with proven advice for achieving success in life. You’ll learn: three fundamental techniques in handling people; six ways to make people like you; twelve ways to win people to you way of thinking; nine ways to change people without arousing resentment; and much, much more!

  10. Can we be (and stay) friends? Remaining friends after dissolution of a romantic relationship.

    Science.gov (United States)

    Bullock, Melinda; Hackathorn, Jana; Clark, Eddie M; Mattingly, Brent A

    2011-01-01

    Although many individuals report being friends with their ex-romantic partners (Wilmot, Carbaugh, & Baxter, 1985), the literature regarding post-romantic friendships is very limited. We investigated whether satisfaction in the dissolved romantic relationship could predict post-romantic friendships and friendship maintenance. We found that the more satisfied individuals were during the dissolved romance, the more likely they were to remain friends and the more likely they were to engage in friendship maintenance behaviors. We also found that friendship maintenance fully mediated the association between past romantic satisfaction and current friendship satisfaction.

  11. Dermatology Depictions in Friends/ Descripciones dermatológicas en Friends

    Directory of Open Access Journals (Sweden)

    Skyler M White

    2017-03-01

    Full Text Available Health?related topics are frequently referenced on screen in movies and television. Friends was on?air for 10 seasonsand is one of the most watched television shows of all time. Dermatology was referenced more than any otherhealth?related topic throughout the series. Beliefs about attractiveness and the stigma of skin conditions are furtherpropagated in this program. Reviewing the depictions of dermatology in Friends will aid in understanding the public’sideas and stereotypes regarding skin and dermatologic diseases.

  12. The Role of Friends' Appearance and Behavior on Evaluations of Individuals on Facebook: Are We Known by the Company We Keep?

    Science.gov (United States)

    Walther, Joseph B.; Van Der Heide, Brandon; Kim, Sang-Yeon; Westerman, David; Tong, Stephanie Tom

    2008-01-01

    This research explores how cues deposited by social partners onto one's online networking profile affect observers' impressions of the profile owner. An experiment tested the relationships between both (a) what one's associates say about a person on a social network site via "wall postings," where friends leave public messages, and (b) the…

  13. 32 CFR 700.1026 - Authority of an officer who succeeds to command.

    Science.gov (United States)

    2010-07-01

    ... authority and responsibility as the officer whom he or she succeeds. (b) An officer who succeeds to command... 32 National Defense 5 2010-07-01 2010-07-01 false Authority of an officer who succeeds to command... Precedence, Authority and Command Authority § 700.1026 Authority of an officer who succeeds to command. (a...

  14. Creation of an Innovation-Friendly Environment

    Directory of Open Access Journals (Sweden)

    Augustinas Maceika

    2014-06-01

    Full Text Available The paper focuses on identifying the methods useful for improving the process of creating an innovation ­friendly environment. For this purpose, conditions for innovation activity in industry were investigated, and the expert evaluation of the selected knowledge and the assessment of the importance of skills for the successful development of innovations were car­ ried out. The work referred to the analysis of the sources of scientific information, a sociological inquiry of the personnel of industrial enterprises, correlation analysis and expert evaluation. The study has found that for building the innovation ­friendly environment, knowledge of the psychology of creativity, personnel management, formation and implementation of the innova­ tion strategy, risk management, business development and sales organization are of a particular importance. Expert assessment has showed that abilities to work in a team, be an entrepreneur, use marketing tools, generate ideas and create new products play a crucial role in innovation development. A situation in industry companies has shown the currently existing various groups of employees with a different point of view on the surveyed parameter. Managers, workers, engineers and other staff have different opinions and knowledge, and therefore a well thought­out policy is required for wider innovative activities. The directives of such a policy must be available for everyone.

  15. What is Popular Amongst Your Friends?

    CERN Document Server

    Barman, Kishor

    2010-01-01

    In this paper, we analyze a collaborative filter that answers the simple question: What is popular amongst your friends? While this basic principle seems to be prevalent in many practical implementations, there does not appear to be much theoretical analysis of its performance. In this paper, we partly fill this gap. While recent works on this topic, such as the low-rank matrix completion literature, consider the probability of error in recovering the entire rating matrix, we consider probability of an error in an individual recommendation (bit error rate (BER)). For a mathematical model introduced in [1],[2], we identify three regimes of operation for our algorithm (named Popularity Amongst Friends (PAF)) in the limit as the matrix size grows to infinity. In a regime characterized by large number of samples and small degrees of freedom (defined precisely for the model in the paper), the asymptotic BER is zero; in a regime characterized by large number of samples and large degrees of freedom, the asymptotic B...

  16. Design of a local area network and a wide area network to connect the US Navy's training organization

    OpenAIRE

    Hill, Kevin Carlos

    1994-01-01

    US Navy training commands use a local area and a wide area network known as the Versatile Training System II (VTS). VTS furnishes word processing, electronic mail, and data base functions, all of which can be transferred throughout the network. Enabling this rather old system is a mainframe at each training site with user terminals dispersed throughout the command. The system was installed and is maintained by civilian contractors. VTS does not have the capabilities to ...

  17. Organic Foods: Do Eco-Friendly Attitudes Predict Eco-Friendly Behaviors?

    Science.gov (United States)

    Dahm, Molly J.; Samonte, Aurelia V.; Shows, Amy R.

    2009-01-01

    Objective: The purpose of this study was to determine whether student awareness and attitudes about organic foods would predict their behaviors with regard to organic food consumption and other healthy lifestyle practices. A secondary purpose was to determine whether attitudes about similar eco-friendly practices would result in socially conscious…

  18. Airline network development in Europe and its implications for airport planning

    NARCIS (Netherlands)

    Burghouwt, G.

    2007-01-01

    Order by Fax Printer Friendly PDF Brochure Send to Friend Enquire before Buying Hard Copy Airline Network Development in Europe and its Implications for Airport Planning Ashgate Publishing, March 2007, Pages: 300 Description Table of Contents Enquire before Buying Send to a Friend The ongoing

  19. Friends interventions in psychosis: a narrative review and call to action.

    Science.gov (United States)

    Harrop, Chris; Ellett, Lyn; Brand, Rachel; Lobban, Fiona

    2015-08-01

    To highlight the importance of friendships to young people with psychosis, and the need for clinical interventions to help maintain peer relationships during illness. To structure a research agenda for developing evidence-based interventions with friends. An argument is developed through a narrative review of (i) the proven efficacy of family interventions, and (by comparison) a relative absence of friend-based interventions; (ii) the particular primacy of friendships and dating for young people, and typical effects of exclusion; and (iii) reduced friendship networks and dating experiences in psychosis, in pre-, during and post-psychosis phases, also links between exclusion and psychosis. We put forward a model of how poor friendships can potentially be a causal and/or maintenance factor for psychotic symptoms. Given this model, our thesis is that interventions aiming to maintain social networks can be hugely beneficial clinically for young people with psychosis. We give a case study to show how such an intervention can work. We call for 'friends interventions' for young people with psychosis to be developed, where professionals directly work with a young person's authentic social group to support key friendships and maintain social continuity. An agenda for future research is presented that will develop and test theoretically driven interventions. © 2014 Wiley Publishing Asia Pty Ltd.

  20. Triadic motifs in the dependence networks of virtual societies

    OpenAIRE

    Xie, Wen-Jie; Li, Ming-Xia; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2014-01-01

    In friendship networks, individuals have different numbers of friends, and the closeness or intimacy between an individual and her friends is heterogeneous. Using a statistical filtering method to identify relationships about who depends on whom, we construct dependence networks (which are directed) from weighted friendship networks of avatars in more than two hundred virtual societies of a massively multiplayer online role-playing game (MMORPG). We investigate the evolution of triadic motifs...

  1. Reliability Analysis and Standardization of Spacecraft Command Generation Processes

    Science.gov (United States)

    Meshkat, Leila; Grenander, Sven; Evensen, Ken

    2011-01-01

    center dot In order to reduce commanding errors that are caused by humans, we create an approach and corresponding artifacts for standardizing the command generation process and conducting risk management during the design and assurance of such processes. center dot The literature review conducted during the standardization process revealed that very few atomic level human activities are associated with even a broad set of missions. center dot Applicable human reliability metrics for performing these atomic level tasks are available. center dot The process for building a "Periodic Table" of Command and Control Functions as well as Probabilistic Risk Assessment (PRA) models is demonstrated. center dot The PRA models are executed using data from human reliability data banks. center dot The Periodic Table is related to the PRA models via Fault Links.

  2. Mission operations and command assurance - Automating an operations TQM task

    Science.gov (United States)

    Welz, Linda; Kazz, Sheri; Potts, Sherrill; Witkowski, Mona; Bruno, Kristin

    1993-01-01

    A long-term program is in progress at JPL to reduce cost and risk of mission operations through defect prevention and error management. A major element of this program, Mission Operations and Command Assurance (MO&CA), provides a system level function on flight projects to instill quality in mission operations. MO&CA embodies the total quality management TQM principle of continuous process improvement (CPI) and uses CPI in applying automation to mission operations to reduce risk and costs. MO&CA has led efforts to apply and has implemented automation in areas that impact the daily flight project work environment including Incident Surprise Anomaly tracking and reporting; command data verification, tracking and reporting; and command support data usage. MO&CA's future work in automation will take into account that future mission operations systems must be designed to avoid increasing error through the introduction of automation, while adapting to the demands of smaller flight teams.

  3. Swing-Free Cranes via Input Shaping of Operator Commands

    Energy Technology Data Exchange (ETDEWEB)

    Groom, Kenneth N.; Parker, Gordon G.; Robinett, Rush D.; Leban, Frank

    1999-08-25

    This paper presents an open-loop control method for suppressing payload oscillation or swing caused by operator commanded maneuvers in rotary boom cranes and the method is experimentally verified on a one-sixteenth scale model of a Hagglunds shipboard crane. The crane configuration consists of a payload mass that swings like a spherical pendulum on the end of a lift-line which is attached to a boom capable of hub rotation (slewing) and elevation (luffing). Positioning of the payload is accomplished through the hub and boom angles and the load-line length. Since the configuration of the crane affects the excitation and response of the payload, the swing control scheme must account for the varying geometry of the system. Adaptive forward path command filters are employed to remove components of the command signal which induce payload swing.

  4. Research Papers from The Command and Control Systems Course, 1993

    Science.gov (United States)

    1993-04-08

    Muhlenberg USMC Friendly Fire: The Price of Capt C. H. Gats USMC 4-1 War Capt D. K. Lawley USMC CPT M. J. Perro USA Capt S. J. Wood USMC A Success in Joint...Quantico, Virginia 0 Captain C. H. Gats, USMC Captain D. K. Lawley, USMC Captain M. J. Perro , USA Captain S. J. Wood, USMC April 8, 1993 0 4-1 FRIENDLY FIRE

  5. Environmentally Friendly Techniques for Wool Dyeing Process

    Directory of Open Access Journals (Sweden)

    Antighin Simona

    2015-11-01

    Full Text Available The aim of this research was to evaluate the influence of dyeing process on the quality of surface waters contaminated with heavy metals and organic compounds, resulted after the wool dyeing process. In order to mark out this aspects an environment friendly method was proposed which involves dyeing wool fiber with new complex combinations derived from a new acid dyes which were complexed, using copper, iron, nickel and zinc salts at 2:1 combination ratio. In order to point out the environmental point of view of wastewaters an experimental protocol was tested by dyeing wool fiber at different pH. Evaluation of complexed combinations impact on the environment involve the following indicators: consumption degree of dyeing solution from the process bath, treatment degree related to the organic content expressed by COD indicator and treatment degree related to the heavy metal concentration respectively.

  6. Environmentally Friendly Supplier Selection Using Prospect Theory

    Directory of Open Access Journals (Sweden)

    Wei Song

    2017-03-01

    Full Text Available This paper proposes an optimal selection method to address the real-world problem of environmentally friendly supplier selection, based on prospect theory. This study adopted the manufacturer’s point of view, and considered the manufacturer’s psychological and behavioral factors in the process of choosing suppliers. The first step was to build supplier-selection indexes for manufacturers. Then, the study assessed the attribute of manufacturer expectations as a reference point. Next, index gains and losses were evaluated against the expectation reference point, yielding a payoff matrix and loss matrix. Finally, the study used prospect theory to calculate the comprehensive prospect value of each supplier; comprehensive prospect values were sorted in descending order to help manufacturers make the best choice.

  7. Forest harvesting systems friendly to the environment

    Energy Technology Data Exchange (ETDEWEB)

    Waesterlund, I. [Swedish Univ. of Agricultural Sciences, Garpenberg (Sweden); Hassan, A.E. [North Carolina State Univ. Col. of Forest Resources, Raleigh, NC (United States)

    1995-09-01

    The trend in forestry practices today in Europe and U.S.A. in general and Scandinavian countries in particular, is towards adapting systems based on landscape planning. Thus common harvesting equipment available on the market will have to be replaced to meet these tough demands. Environmentalists recommend that wood fiber should be harvested either by selection cutting or commercial thinning thus leaving the site undisturbed with no sign of machine traffic. This mandate will preserve ground water quality and assist in soil conservation. However, to meet the pulp and paper as well as saw mill industries demand for wood from this method of cutting (selection or commercial thinning), requires a thorough examination of our harvesting systems and techniques. This paper will discuss present and future machines that are friendly to the environment. Hypothetical designs and improvements of existing machine systems will be addressed and recommendations will be made for future research activities. 75 refs, 8 figs, 1 tab

  8. Comparison between a classical command law and a new advanced recovery command law in a MCB-ARS boost

    Science.gov (United States)

    Petit, Pierre; Saint-Eve, Frédéric; Sawicki, Jean-Paul; Aillerie, Michel

    2017-02-01

    This paper focuses on an original performed command on DC-DC boosts developed for applications in the LMOPS lab for the photovoltaic energy conversion and more specifically the Photovoltaic panels connected to HVDC smart grids. This boost, commonly named MCB-ARS (Magnetically Coupled Boost with Active Recovery Switch) presents great advantages concerning the simplicity of the command on the single constitutive switch, the global efficiency and the voltage conversion ratio. A fine analysis of the losses all over the entire converter shows that losses are not distributed uniformly in the constituting components. So a previous modification described in a previous paper consisting in the conducting assistance on the power flowing intermediate diode, performed advantageously the global efficiency. The present analysis takes into account the fact that the new configuration obtained after this important improvement looks like a classical half-bridge push-pull stage and may be controlled by a twice complementary command. In that way, a comparison has been done between a natural commutation recovery diode and an assisted switch commutation driven in a push-pull mode. As attempted, the switching command laws in charge to assume the energy transfer has been compared to the classical previous system described in anterior papers, and we demonstrate in this publication that a commutation based on a push-pull command mode within the two switches of the MCB-ARS converter is possible and increases the power transfer.

  9. A MANAGEMENT INFORMATION SYSTEM FOR MEDICAL SERVICES AT COMMAND HEADQUARTERS.

    Science.gov (United States)

    Gulati, H L; Sandhu, H S

    1995-01-01

    Management information system (MIS) is increasingly being used for information storage, handling, processing and retrieval of data for improving the services provided by any organisation. It allows quick decision making for overall functional improvement. Headquarters Central Command (Medical) Lucknow has developed software for data capturing in respect of six important functional areas. These include employability and availability of specialist officers, assessment of hospital services through functional update and monitoring team (FUMTs), patient satisfaction survey, user commanders opinion, state of critical items of hospital clothing and modernisation of hospitals. This automation has resulted in quick and scientific decision making for improving the medicare services to the clientele.

  10. Oracle Enterprise Manager 12c command-line interface

    CERN Document Server

    Pot'Vin, Kellyn; Smith, Ray

    2014-01-01

    Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager's powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock full of ready-made scripting examples contributed by the authors and leading members of the community. For example, you'll find scripts and examples of commands to: Remove an Enterprise Manager agent and its related targetsQuickly create administrator accounts that are ful

  11. Three dimensional visualization to support command and control

    Energy Technology Data Exchange (ETDEWEB)

    Van Slambrook, G.A.

    1997-04-01

    Virtual reality concepts are changing the way one thinks about and with computers. The concepts have already proven their potential usefulness in a broad range of applications. This research was concerned with exploring and demonstrating the utility of virtual reality in robotics and satellite command and control applications. The robotics work addressed the need to quickly build accurate graphical models of physical environments by allowing a user to interactively build a model of a remote environment by superimposing stereo graphics onto live stereo video. The satellite work addressed the fusion of multiple data sets or models into one synergistic display for more effective training, design, and command and control of satellite systems.

  12. Commander’s Critical Information Requirements (CCIR): Reality Versus Perception

    Science.gov (United States)

    1992-01-01

    early in his life. The sport of football enabled him to practice decision making under the stress of victory or defeat 70 in games filled with...Executive Officer of Combat Command A, 4th Armored Division, during WWII, Mail Interview, 14 October 1992, and BG 49 Albin F. Irzyk (Retired), Commander of...79. Ibid, 149. 80. Weigley, 173. 81. Ibid, 177-178. 82. Ibid, 178. 83. BG Albin F. Irzyk (Retired), "The "Name Enough" Division," Armor Magazine, Vol

  13. Understanding Associations among Family Support, Friend Support, and Psychological Distress

    OpenAIRE

    Horwitz, Briana N.; Reynolds, Chandra A.; Charles, Susan T.

    2014-01-01

    Emotional support from family and friends is associated with lower psychological distress. This study examined whether genetic and environmental influences explain associations among family support, friend support, and psychological distress. Data were drawn from the Midlife Development in the United States (MIDUS) study and included 947 pairs of MZ, same-sex DZ, and opposite-sex DZ twins. Results showed that a genetic factor explains the relationship between friend support and psychological ...

  14. Implementing Internet of Things in a military command and control environment

    Science.gov (United States)

    Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter

    2017-05-01

    While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.

  15. The more friends, the less political talk? Predictors of Facebook discussions among college students.

    Science.gov (United States)

    Jang, S Mo; Lee, Hoon; Park, Yong Jin

    2014-05-01

    Although previous research has indicated that Facebook users, especially young adults, can cultivate their civic values by talking about public matters with their Facebook friends, little research has examined the predictors of political discussion on Facebook. Using survey data from 442 college students in the United States, this study finds that individual characteristics and network size influence college students' expressive behavior on Facebook related to two controversial topics: gay rights issues and politics. In line with previous studies about offline political discussion, the results show that conflict avoidance and ambivalence about target issues are negatively associated with Facebook discussions. Perhaps the most interesting finding is that users who have a large number of Facebook friends are less likely to talk about politics and gay rights issues on Facebook despite having access to increasing human and information resources. Theoretical implications of these findings and future directions are addressed.

  16. Reusable Reentry Satellite (RRS): Telemetry, Tracking, and Command (TT/C) Coverage Tradeoff Study

    Science.gov (United States)

    1991-01-01

    The Reusable Reentry Satellite (RRS) Telemetry, Tracking & Command (TT&C) Coverage Tradeoff Study described herein was performed during Part 1 of the RRS Phase B contract. This report is one of several that describes the results of various trade studies performed to arrive at a recommended design for the RRS satellite system. The overall RRS Phase B Study objective is to design a relatively inexpensive satellite to access space for extended periods of time, with eventual recovery of experiments on Earth. The RRS will be capable of: (1) being launched by a variety of expendable launch vehicles; (2) operating in low earth orbit as a free flying unmanned laboratory; and (3) executing an independent atmospheric reentry and soft landing. The RRS will be designed to be refurbished and reused up to three times a year for a period of 10 years. The expected principal use for such a system is research on the effects of variable gravity (0 to 1.5 g) and radiation on small animals, plants, lower life forms, tissue samples, and materials processes. This Summary Report provides a description of the RRS Telemetry, Tracking & Command Analysis performed to study the ground station coverage available to meet RRS requirements. Concepts were considered that used off-the-shelf technology, had generous margins of capability, and high reliability, were easily maintained, cost effective, and were compatible with existing support networks. From this study, a recommended RRS TT&C configuration will be developed.

  17. Apostle Battery Table Bay Fire Command | Croock | Scientia Militaria ...

    African Journals Online (AJOL)

    Scientia Militaria: South African Journal of Military Studies. Journal Home · ABOUT · Advanced Search · Current Issue · Archives · Journal Home > Vol 20, No 3 (1990) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Apostle Battery Table Bay Fire Command.

  18. United States Joint Forces Command Joint Frequency Management Office

    Science.gov (United States)

    2011-03-01

    Ukraine 1 7 Latin American Nations at U.S. Fleet Forces Command - 7 Representatives Argentina 1 Brazil 1 Chile 1 Ecuador 1 Mexico 1 Peru 1 Colombia 1...Representative for the GEMSIS program. GEMSIS UNCLASSIFIED 14 USJFCOM J683 JFMO Major Issues/Concerns • Listen to the Operational Spectrum Managers  Too often

  19. 14 CFR 125.281 - Pilot-in-command qualifications.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Pilot-in-command qualifications. 125.281... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS CERTIFICATION... CAPACITY OF 6,000 POUNDS OR MORE; AND RULES GOVERNING PERSONS ON BOARD SUCH AIRCRAFT Flight Crewmember...

  20. 14 CFR 125.283 - Second-in-command qualifications.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Second-in-command qualifications. 125.283... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS CERTIFICATION... CAPACITY OF 6,000 POUNDS OR MORE; AND RULES GOVERNING PERSONS ON BOARD SUCH AIRCRAFT Flight Crewmember...

  1. 14 CFR 135.243 - Pilot in command qualifications.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Pilot in command qualifications. 135.243... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS OPERATING REQUIREMENTS: COMMUTER AND ON DEMAND OPERATIONS AND RULES GOVERNING PERSONS ON BOARD SUCH AIRCRAFT Flight...

  2. 14 CFR 135.245 - Second in command qualifications.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Second in command qualifications. 135.245... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS OPERATING REQUIREMENTS: COMMUTER AND ON DEMAND OPERATIONS AND RULES GOVERNING PERSONS ON BOARD SUCH AIRCRAFT Flight...

  3. Battlespace awareness and the Australian Army battlefield command support system

    Science.gov (United States)

    Gaertner, Paul S.; Slade, Mark; Bowden, Fred; Stagg, Bradley; Huf, Samuel

    2000-08-01

    Effective battlespace awareness is essential for any defence operation; this is especially true in the increasingly complex and dynamic land component of the military environment. Because of its relatively small force size dispersed piece-wise across a large and largely vacant landmass, the Defence of Australia presents a somewhat unique challenge for the development of systems that support command decision-making. The intent of this paper is to first examine the digitisation effort under way in Australia and describe the Army Battlefield Command Support System (BCSS) being developed for use in the tactical arena. BCSS is essentially a suite of commercial-off-the-shelf and government-off-the-shelf software components provided via a standard operating environment to aid decision-making. Then, we present the development of a Tactical Land C4I Assessment Capability (TLCAC) synthetic environment which is being used to undertake controlled performance evaluations of the various elements of the BCSS suite and provide impact assessments of new technological advances. The TLCAC provides a capacity to assess in near real-time Brigade and below level command post exercise activities. That is, when deployed it provides a mechanism to automatically collect command and control and manoeuvre data, which can aid in the after action review process.

  4. RAPID: Collaborative Commanding and Monitoring of Lunar Assets

    Science.gov (United States)

    Torres, Recaredo J.; Mittman, David S.; Powell, Mark W.; Norris, Jeffrey S.; Joswig, Joseph C.; Crockett, Thomas M.; Abramyan, Lucy; Shams, Khawaja S.; Wallick, Michael; Allan, Mark; hide

    2011-01-01

    RAPID (Robot Application Programming Interface Delegate) software utilizes highly robust technology to facilitate commanding and monitoring of lunar assets. RAPID provides the ability for intercenter communication, since these assets are developed in multiple NASA centers. RAPID is targeted at the task of lunar operations; specifically, operations that deal with robotic assets, cranes, and astronaut spacesuits, often developed at different NASA centers. RAPID allows for a uniform way to command and monitor these assets. Commands can be issued to take images, and monitoring is done via telemetry data from the asset. There are two unique features to RAPID: First, it allows any operator from any NASA center to control any NASA lunar asset, regardless of location. Second, by abstracting the native language for specific assets to a common set of messages, an operator may control and monitor any NASA lunar asset by being trained only on the use of RAPID, rather than the specific asset. RAPID is easier to use and more powerful than its predecessor, the Astronaut Interface Device (AID). Utilizing the new robust middleware, DDS (Data Distribution System), developing in RAPID has increased significantly over the old middleware. The API is built upon the Java Eclipse Platform, which combined with DDS, provides platform-independent software architecture, simplifying development of RAPID components. As RAPID continues to evolve and new messages are being designed and implemented, operators for future lunar missions will have a rich environment for commanding and monitoring assets.

  5. A Cyberspace Command and Control Model (Maxwell Paper, Number 47)

    Science.gov (United States)

    2009-08-01

    Business and Management (New York: Routledge, 2003). 28. Mark Skinner Watson. Chief of Staff: Prewar Plans and Preparations (Washington. DC: Center...from the Practice ojCommand and Control ( Mon - terey, CA: National Defense Research Institute, RAND Corporation, 1999). 53. Ibid., xiv. 54. Ibid

  6. The Squadron Commander’s Responsibility for Officer Professional Development

    Science.gov (United States)

    2014-02-13

    competency Tactical Expertise Personal Embodies Airman Culture - Ethical Leadership -Followership -Warrior Ethos -Develops Self Communicating ...AIR WAR COLLEGE AIR UNIVERSITY THE SQUADRON COMMANDER’S RESPONSIBILITY FOR OFFICER PROFESSIONAL DEVELOPMENT by Patrick/Sutherland...wing. 4 Abstract Squadron commanders (Sq/CCs), as Air Force leaders, have a duty to help create future leaders. While officer professional

  7. Cognitive Systems Modeling and Analysis of Command and Control Systems

    Science.gov (United States)

    Norlander, Arne

    2012-01-01

    Military operations, counter-terrorism operations and emergency response often oblige operators and commanders to operate within distributed organizations and systems for safe and effective mission accomplishment. Tactical commanders and operators frequently encounter violent threats and critical demands on cognitive capacity and reaction time. In the future they will make decisions in situations where operational and system characteristics are highly dynamic and non-linear, i.e. minor events, decisions or actions may have serious and irreversible consequences for the entire mission. Commanders and other decision makers must manage true real time properties at all levels; individual operators, stand-alone technical systems, higher-order integrated human-machine systems and joint operations forces alike. Coping with these conditions in performance assessment, system development and operational testing is a challenge for both practitioners and researchers. This paper reports on research from which the results led to a breakthrough: An integrated approach to information-centered systems analysis to support future command and control systems research development. This approach integrates several areas of research into a coherent framework, Action Control Theory (ACT). It comprises measurement techniques and methodological advances that facilitate a more accurate and deeper understanding of the operational environment, its agents, actors and effectors, generating new and updated models. This in turn generates theoretical advances. Some good examples of successful approaches are found in the research areas of cognitive systems engineering, systems theory, and psychophysiology, and in the fields of dynamic, distributed decision making and naturalistic decision making.

  8. The Role of the NCO Inside the BCT Command Post

    Science.gov (United States)

    2016-11-22

    execute complex tactical tasks, train junior enlisted Soldiers on military occupational skills and drills at the individual and team level. NCOs...formation. Doctrine 2015 introduced the importance of mission command doctrine into operations at all levels of leadership , and in the last five

  9. Warfighter Associate: Decision Aiding and Metrics for Mission Command

    Science.gov (United States)

    2012-01-23

    Distributions: highlights the Pareto Principle -- the top 20% of the mission-command staff is heavily involved in collaborations. • Our...1999999999 • status: unsalisfied • isActive: 1 FSO 12-03-2011 11:59:48 - ongoing Active Activity Based P ... • lnstanceld: lED Cross Border Transport

  10. US Africa Command (AFRICOM) and Nigeria's National Security ...

    African Journals Online (AJOL)

    The US decision to establish a unified combatant command (AFRICOM) in African has raised numerous questions, particularly in Africa, regarding its possible security implications for the continent. The article narrows itself to the concern for unraveling the national security implications of Nigeria's opposition to the location of

  11. EEG signal classification to detect left and right command using ...

    African Journals Online (AJOL)

    In this study, the right and left commands explored are based on the actual movement of lifting either left or right hand and the imaginary movement of lifting either left or right hand. For this initial study, EEG signals recorded based on the actual physical movements will be collected as the raw data, as well as the EEG signals ...

  12. Measures of Similarity for Command and Control Situation Analysis

    Science.gov (United States)

    2011-06-01

    CBR cycle (Figure 1), termed the four Rs in Aamodt and Plaza[2]: 1. Retrieve similar cases to the problem description, 2. Reuse a solution suggested by...Irandoust and A. Benaskeur. Political, Cultural and Command & Control Challenges in Coalitions. Canadian Defence Academy Press, In Press 2011. [2] A. Aamodt

  13. Airborne Intelligence, Surveillance, and Reconnaissance: Mission Command and Centralized Control

    Science.gov (United States)

    2014-12-10

    Ewell was the new commander of the Confederate Second Corps, having replaced the fallen Stonewall Jackson . Before the...mass of traffic moving south on the roads in the vicinity of Brehal, Gavray, and Percy . In places transport was moving bumper to bumper…the damage

  14. Satellite Telemetry and Command using Big LEO Mobile Telecommunications Systems

    Science.gov (United States)

    Huegel, Fred

    1998-01-01

    Various issues associated with satellite telemetry and command using Big LEO mobile telecommunications systems are presented in viewgraph form. Specific topics include: 1) Commercial Satellite system overviews: Globalstar, ICO, and Iridium; 2) System capabilities and cost reduction; 3) Satellite constellations and contact limitations; 4) Capabilities of Globalstar, ICO and Iridium with emphasis on Globalstar; and 5) Flight transceiver issues and security.

  15. 'The Danger of Divided Command': British civil and military disputes ...

    African Journals Online (AJOL)

    Westminster, as well as to that of the Commander-in-Chiefat the Horse Guards. When Lt-Gen Lord Chelmsford ... that they should assist by making diversionary raids across the border into Zululand.2°. Bulwer refused ..... armed intervention has now got beyond the power of colonial or civil forces to cope with'. He therefore ...

  16. United States Special Operations Command History, 15th Anniversary

    Science.gov (United States)

    2002-04-01

    entering the Canal from the Caribbean side and patrolled the shipping channel near Colon , preventing the PDF from commandeering boats and...boarded a German merchant ship, Asian Senator, in Cristobal . Once at the pier, the SEALs saw men in civilian clothes running down the Asian

  17. Technical Standards for Command and Control Information Systems (CCISs)

    Science.gov (United States)

    1992-01-01

    Naval Data Auo i Command USsC ACOC S1 system kItegratio Standards WutCDC., a g Ceniter Requiremnts H(.C (C412)0 D v PSI Plaratiii and Intaroperabity...PDTR 10167, ISO/IEC JTC1 SC21 (SC21 N 3252), February 1989. [Perez 1991] Personal communication with Sandra Perez, Concept Technology, Inc., (703) 425

  18. Command and Control during Security Incidents/Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Knipper, W. [NSTec

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  19. A Psychodynamic Systems Perspective on Command Relationship during Combat Operations

    Science.gov (United States)

    2017-06-09

    and Group Psychology and Wilfred Bion Experiences in Groups and Other Papers. The objective of this paragraph is to introduce the reader to tangible...not related. 52 Questionnaire from Leader 4, Copenhagen 2016, paragraph 12. 53 Jørgensen...54 Questionnaire from Leader 3, Copenhagen 2016, paragraph 8. 55 Commanders gathering, is a meeting

  20. 32 CFR Appendix A to Part 192 - Checklist for Commanders

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Checklist for Commanders A Appendix A to Part 192 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS EQUAL OPPORTUNITY IN OFF-BASE HOUSING Pt. 192, App. A Appendix A to Part 192—Checklist for...

  1. Commander in chief : FDR's battle with Churchill, 1943

    NARCIS (Netherlands)

    Hamilton, Charles Nigel

    2016-01-01

    Commander in Chief is een deelbiografie van president Franklin Delano Roosevelt waarin Roosevelts rol als opperbevelhebber van de gewapende strijdkrachten van de Verenigde Staten in de Tweede Wereldoorlog het hoofdthema is. Het boek concentreert zich op het jaar 1943: een jaar waaraan biografen van

  2. An easily extendable interpreter comprising MCA and CAMAC commands

    NARCIS (Netherlands)

    Bakkum, E. L.; Elsenaar, R.J.

    1984-01-01

    A BASIC interpreter is a useful tool for writing small programs in a quick and easy way. For the control of experiments, however, it lacks a number of essential features. A BASIC-like command interpreter BACO has therefore been developed. It runs on PDP-11 computers with the RSX-11M operating

  3. Forest Service patrol captain and patrol commanders report: nationwide study

    Science.gov (United States)

    Deborah J. Chavez; Joanne F. Tynon

    2007-01-01

    This is the third in a series of studies to evaluate perceptions of USDA Forest Service law enforcement personnel of the roles, responsibilities, and issues entailed in their jobs. An e-mail survey was administered to the 79 Forest Service patrol captains and patrol commanders (PCs) across the United States. Seventy completed and returned the questionnaire....

  4. Using friends as sensors to detect global-scale contagious outbreaks.

    Directory of Open Access Journals (Sweden)

    Manuel Garcia-Herranz

    Full Text Available Recent research has focused on the monitoring of global-scale online data for improved detection of epidemics, mood patterns, movements in the stock market political revolutions, box-office revenues, consumer behaviour and many other important phenomena. However, privacy considerations and the sheer scale of data available online are quickly making global monitoring infeasible, and existing methods do not take full advantage of local network structure to identify key nodes for monitoring. Here, we develop a model of the contagious spread of information in a global-scale, publicly-articulated social network and show that a simple method can yield not just early detection, but advance warning of contagious outbreaks. In this method, we randomly choose a small fraction of nodes in the network and then we randomly choose a friend of each node to include in a group for local monitoring. Using six months of data from most of the full Twittersphere, we show that this friend group is more central in the network and it helps us to detect viral outbreaks of the use of novel hashtags about 7 days earlier than we could with an equal-sized randomly chosen group. Moreover, the method actually works better than expected due to network structure alone because highly central actors are both more active and exhibit increased diversity in the information they transmit to others. These results suggest that local monitoring is not just more efficient, but also more effective, and it may be applied to monitor contagious processes in global-scale networks.

  5. Children's and Their Friends' Moral Reasoning: Relations with Aggressive Behavior

    Science.gov (United States)

    Gasser, Luciano; Malti, Tina

    2012-01-01

    Friends' moral characteristics such as their moral reasoning represent an important social contextual factor for children's behavioral socialization. Guided by this assumption, we compared the effects of children's and friends' moral reasoning on their aggressive behavior in a low-risk sample of elementary school children. Peer nominations and…

  6. Locus of Peer Influence: Social Crowd and Best Friend.

    Science.gov (United States)

    Urberg, Kathryn A.

    1992-01-01

    The relative influence of best friends and social crowds of 324 older adolescents (eleventh graders) on cigarette smoking was examined to determine influences as a function of sex, conformity, and friendship mutuality. Best friends, rather than social crowd, appeared to be the major influence in this group. (SLD)

  7. Support Between Siblings and Between Friends : Two Worlds Apart?

    NARCIS (Netherlands)

    Voorpostel, Marieke; Lippe, Tanja van der

    2007-01-01

    This research examines whether siblings and friends resemble each other in supportive behavior. Using a Dutch national sample of 6,289 individuals containing 12,578 relationships with siblings and friends, we investigated the relative importance of gender composition, geographical proximity,

  8. Creating a Responsive Website: PPLD Friends--A Case Study

    Science.gov (United States)

    Franklyn, Virginia

    2013-01-01

    The Friends of the Pikes Peak Library District (PPLD) had a legacy website that was remotely hosted and maintained by a volunteer. They wanted a more significant presence on PPLD.org and an easier interface with which to update information. The developers decided to create a new Friends site in Drupal, using RWD, CSS3, and HTML5. The plan was to…

  9. Patients as friends -awkward or advantageous? | Moosa | South ...

    African Journals Online (AJOL)

    Rural General Practitioners often find themselves in a small community having patients as friends. This can lead to difficulty in the relationship. This is a reflection on family friends where I missed the youngest child's diagnosis of myoclonic epilepsy in the social context and which led to a crisis in the relationship. This led me ...

  10. College Men's Involvement in Friends with Benefits Relationships

    Science.gov (United States)

    Olmstead, Spencer B.; Pasley, Kay; Fincham, Frank D.

    2016-01-01

    Friends with benefits relationships (FWBRs) occur when two friends who are not in a committed romantic relationship engage in ongoing sexual activity (i.e., oral sex and/or intercourse) over a period of time. The purpose of this study was to examine the demographic and psychosocial characteristics of college men involved in FWBRs (N = 407) using s…

  11. False Friends: Stolpersteine des deutsch-englischen Wortschatzes.

    Science.gov (United States)

    Breitkreuz, Hartmut

    The guide to "false friends," or false cognates, in German and English is designed such that it can be used as either an instructional tool or a reference guide. An introductory section defines false friends and discusses different types, and provides a set of symbols for distinguishing them. The first major section lists, alphabetically…

  12. More False Friends. Tuckische Fallen des deutsch-englishen Wortschatzes.

    Science.gov (United States)

    Breitkreuz, Hartmut

    The second guide to "false friends," or false cognates, in German and English lists and discusses more difficult terms than the first guide. An introductory section defines false friends and discusses different types, and provides a set of symbols for distinguishing them. The first major section lists, alphabetically in German, and…

  13. Preparation, characterization and antibacterial effects of eco-friendly ...

    African Journals Online (AJOL)

    Purpose: To synthesize and characterize eco-friendly gold nanorods (Au-NRs) and to assess their effects against two bacterial strains. Methods: Synthesis of eco-friendly gold nanorods was done from an aqueous solution of chloroauric acid and cetyltrimethylammonium bromide by mixing Olea europaea fruit and Acacia ...

  14. Pubertal timing, friend smoking, and substance use in adolescent girls.

    Science.gov (United States)

    Marklein, Elizabeth; Negriff, Sonya; Dorn, Lorah D

    2009-06-01

    The influence of friend substance use on the association between pubertal timing and substance use has received little consideration in the literature. With a sample of 264 female adolescents (11-17 years), this study examined (a) the relationship between pubertal timing and substance use, (b) the impact of number of friends that smoke cigarettes on adolescents' use of three substances (cigarettes, alcohol, and marijuana), and (c) the interactions between pubertal timing and friends' smoking in predicting individual substance use. Results showed a significant relationship between pubertal timing and alcohol use; later timing was related to more alcohol use. This association between late timing and alcohol use is contrary to previous literature and may be due to the broad age range of this sample. Pubertal timing may have less of an effect in late adolescence when drinking becomes more normative and less deviant; the rationale for this association is discussed. Second, this study found females who reported that more of their friends smoke regularly (at least once a week) used significantly more cigarettes, alcohol, and marijuana than those who reported no friends who smoke. Finally, the interaction between pubertal timing and number of friends who were regular smokers was not significantly related to adolescent substance use. However, friend smoking explained more of the variation in substance use than pubertal timing. This indicates that having friends who smoke is more influential in predicting substance use than pubertal timing. These findings are important when considering the development of interventions to target adolescent substance use.

  15. Working the Social: Twitter and FriendFeed

    Science.gov (United States)

    Carscaddon, Laura; Harris, Colleen S.

    2009-01-01

    Information overload is so five years ago, but the problem it describes is all too real. Fortunately, there's hope yet for the savvy librarian: Twitter and FriendFeed turn information dissemination on its head, using friends and subscribers as a filter for the best, most credible, and most engaging information out there. Like other social media…

  16. Women-friendly Support Services and Work Performance: The Role ...

    African Journals Online (AJOL)

    The study titled 'Women-friendly Support Services (WFFS) and Work Performance: The role of Marital Status', investigated the role of marital status in the work performance of female employees who are beneficiaries of Women friendly Support Services in work organizations. The study's participants consisted of a total of ...

  17. Friend-foe Discrimination, Caffeine, and Sentry Duty

    National Research Council Canada - National Science Library

    Johnson, Richard

    1999-01-01

    ...: (a) 200 mg caffeine, foe-only; (b) 200 mg caffeine, friend-foe; (c) placebo, foe-only; and (d) placebo. friend-foe. Participants monitored the target scene of the Weaponeer Rifle Marksmanship Simulator with instructions to fire at enemy targets...

  18. Friends and Family Interview : Measurement invariance across Belgium and Romania

    NARCIS (Netherlands)

    Stievenart, M.; Casonato, M.; Muntean, A.; Van de Schoot, R.|info:eu-repo/dai/nl/304833207

    2012-01-01

    The Friends and Family Interview (FFI; Steele & Steele, 2005 Steele, H. and Steele, M. 2005. The construct of coherence as an indicator of attachment security in middle childhood: The Friends and Family Interview, New York, NY: Guilford Press. ), a semi-structured interview assessing attachment

  19. Field Testing of Environmentally Friendly Drilling System

    Energy Technology Data Exchange (ETDEWEB)

    David Burnett

    2009-05-31

    The Environmentally Friendly Drilling (EFD) program addresses new low-impact technology that reduces the footprint of drilling activities, integrates light weight drilling rigs with reduced emission engine packages, addresses on-site waste management, optimizes the systems to fit the needs of a specific development sites and provides stewardship of the environment. In addition, the program includes industry, the public, environmental organizations, and elected officials in a collaboration that addresses concerns on development of unconventional natural gas resources in environmentally sensitive areas. The EFD program provides the fundamentals to result in greater access, reasonable regulatory controls, lower development cost and reduction of the environmental footprint associated with operations for unconventional natural gas. Industry Sponsors have supported the program with significant financial and technical support. This final report compendium is organized into segments corresponding directly with the DOE approved scope of work for the term 2005-2009 (10 Sections). Each specific project is defined by (a) its goals, (b) its deliverable, and (c) its future direction. A web site has been established that contains all of these detailed engineering reports produced with their efforts. The goals of the project are to (1) identify critical enabling technologies for a prototype low-impact drilling system, (2) test the prototype systems in field laboratories, and (3) demonstrate the advanced technology to show how these practices would benefit the environment.

  20. Noradrenaline and the kidney: friends or foes?

    Science.gov (United States)

    Bellomo, Rinaldo; Di Giantomasso, David

    2001-01-01

    Septic shock, systemic inflammation and pharmacological vasodilatation are often complicated by systemic hypotension, despite aggressive fluid resuscitation and an increased cardiac output. If the physician wishes to restore arterial pressure (>80–85 mmHg), with the aim of sustaining organ perfusion pressure, the administration of systemic vasopressor agents, such as noradrenaline, becomes necessary. Because noradrenaline induces vasoconstriction in many vascular beds (visibly in the skin), however, it may decrease renal and visceral blood flow, impairing visceral organ function. This unproven fear has stopped clinicians from using noradrenaline more widely. In vasodilated states, unlike in normal circulatory conditions, however, noradrenaline may actually improve visceral organ blood flow. Animal studies show that the increased organ perfusion pressures achieved with noradrenaline improve the glomerular filtration rate and renal blood flow. There are no controlled human data to define the effects of noradrenaline on the kidney, but many patient series show a positive effect on glomerular filtration rate and urine output. There is no reason to fear the use of noradrenaline. If it is used to support a vasodilated circulation with a normal or increased cardiac output, it is likely to be the kidney's friend not its foe. PMID:11737909

  1. Maria Sklodowska-Curie - scientist, friend, manager

    Science.gov (United States)

    Slavchev, A.

    2009-01-01

    Great names in science represent an inexhaustible source and richness of inspiration, satisfaction and consolation, a moving and victorious force. Throughout her exemplifying life, Maria Sklodowska remained modest but with a keen sense of humor, of an outstanding style, a mine of knowledge and experience, of innovative ideas and a rich inner life. Full of love, of passion to give and to share, of natural optimism, mixed with a light melancholy, so typical for sages. She vehemently defended the love of scientific research, of the spirit of adventure and entrepreneurship and fought for international culture, for the protection of personality and talent. Maria Sklodowska left her passion to science, her dedication to work including education and training of young people, her passionate adherence to her family, her belief in her friends, her pure and profound humanity and warmth! The paper should be a homage to her, an appreciation of her work over the years, but not less a correspondence, a conversation with her! On the other hand, the present solemn occasion resuscitates the personalities of Maria and Pierre Curie and their work, in particular of Maria Sklodowska in her own native land! In this manner, it truly contributes to her immortality!

  2. Making Rice Production More Environmentally-Friendly

    Directory of Open Access Journals (Sweden)

    Norman Uphoff

    2016-05-01

    Full Text Available Irrigated rice production is one of the most essential agricultural activities for sustaining our global population, and at the same time, one of the agricultural sectors considered most eco-unfriendly. This is because it consumes a larger share of available freshwater resources, competing with varied ecosystems as well as other economic sectors; its paddy fields are responsible for significant emission of greenhouse gases; and the reliance on chemical fertilizers and various agrochemicals contributes to pollution of soils and water systems. These stresses on soils, hydrology and atmosphere are actually not necessary for rice production, which can be increased by modifying agronomic practices though more agroecologically-sound management practices. These, combined under the rubric of the System of Rice Intensification (SRI, can reduce requirements of irrigation water, chemical fertilizer and agrochemicals while increasing paddy yields and farmer’s net incomes. Here we discuss how irrigated rice production can be made more eco-friendly for the benefit of farmers, consumers and the environment. This is achieved by introducing practices that improve the growth and functioning of rice plants’ root systems and enhance the abundance, diversity and activity of beneficial soil organisms that live around plant roots and within the plants themselves as symbiotic endophytes.

  3. Fever and sickness behavior: Friend or foe?

    Science.gov (United States)

    Harden, L M; Kent, S; Pittman, Q J; Roth, J

    2015-11-01

    Fever has been recognized as an important symptom of disease since ancient times. For many years, fever was treated as a putative life-threatening phenomenon. More recently, it has been recognized as an important part of the body's defense mechanisms; indeed at times it has even been used as a therapeutic agent. The knowledge of the functional role of the central nervous system in the genesis of fever has greatly improved over the last decade. It is clear that the febrile process, which develops in the sick individual, is just one of many brain-controlled sickness symptoms. Not only will the sick individual appear "feverish" but they may also display a range of behavioral changes, such as anorexia, fatigue, loss of interest in usual daily activities, social withdrawal, listlessness or malaise, hyperalgesia, sleep disturbances and cognitive dysfunction, collectively termed "sickness behavior". In this review we consider the issue of whether fever and sickness behaviors are friend or foe during: a critical illness, the common cold or influenza, in pregnancy and in the newborn. Deciding whether these sickness responses are beneficial or harmful will very much shape our approach to the use of antipyretics during illness. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. Cyber Security for the Spaceport Command and Control System: Vulnerability Management and Compliance Analysis

    Science.gov (United States)

    Gunawan, Ryan A.

    2016-01-01

    With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.

  5. The control and the command of the Vivitron, a system managed with an OODBMS

    Science.gov (United States)

    Bauman, R.; Diaz, T.; Jbil, A.; Kapps, E.; Knaebel, R.; Marsaudon, J. C.; Michel, L.; Persigpy, J.; Prevot, G.; Stamm, Y.

    1998-08-01

    The architecture of the control system of the Vivitron is distributed. Thirteen VME crates, equipped with MC68040 boards, working at a potential from 0 to 20 MV, concentrate the measurements and the commands. These concentrators and the control room are federated in a private optical Ethernet network. The intelligence of the system is shared between the concentrators. 4 workstations inside the control room are strictly dedicated to the animation of the graphical user interface, managed with SL-GMS. The mechanisms of communication are only based on industrial standards. The whole system is described in an object oriented database. Each element, hardware device or software module, is represented in the database by numerical values such as addresses, calibrations or thresholds and a specific C function describing its behavior. The database generates automatically the code exclusively from this description.

  6. Fearful saints: comforting friends in a hospital setting.

    Science.gov (United States)

    Goldsmith, T R

    1985-01-01

    The article examines the role of courage in breaking barriers which prevent friends unfamiliar with the health care industry from providing the needed support to sustain a friend during critical illness. "Fearful Saints" offers ways of understanding the complex issues which distance friends during illness. Close friends feel compelled to enter the world of suffering, but must first confront the terrifying images of illness. By examining Henri Nouwen's The Wounded Healer, and the story of Jesus asking his disciple Peter to wait with him in the garden, the concept of extending compassionate understanding during times of adversity becomes manageable. Although miracle potions may not be accessible, the reader learns to identify the role of comforter as one who will not permit an afflicted friend to travel through the experience alone.

  7. Modular Structures, Robustness and Protection of Complex Networks : Theory, Complexity and Algorithms

    NARCIS (Netherlands)

    Trajanovski, S.

    2014-01-01

    Community structure is observed in many real-world networks, such as (online) social networks, where groups of friends of a certain person are often also friends of each other. Newman's modularity has been explored as an important quantitative metric for communities and clusters detection in

  8. Lunar Reconnaissance Orbiter (LRO) Command and Data Handling Flight Electronics Subsystem

    Science.gov (United States)

    Nguyen, Quang; Yuknis, William; Haghani, Noosha; Pursley, Scott; Haddad, Omar

    2012-01-01

    A document describes a high-performance, modular, and state-of-the-art Command and Data Handling (C&DH) system developed for use on the Lunar Reconnaissance Orbiter (LRO) mission. This system implements a complete hardware C&DH subsystem in a single chassis enclosure that includes a processor card, 48 Gbytes of solid-state recorder memory, data buses including MIL-STD-1553B, custom RS-422, SpaceWire, analog collection, switched power services, and interfaces to the Ka-Band and S-Band RF communications systems. The C&DH team capitalized on extensive experience with hardware and software with PCI bus design, SpaceWire networking, Actel FPGA design, digital flight design techniques, and the use of VxWorks for the real-time operating system. The resulting hardware architecture was implemented to meet the LRO mission requirements. The C&DH comprises an enclosure, a backplane, a low-voltage power converter, a single-board computer, a communications interface board, four data storage boards, a housekeeping and digital input/output board, and an analog data acquisition board. The interfaces between the C&DH and the instruments and avionics are connected through a SpaceWire network, a MIL-STD-1553 bus, and a combination of synchronous and asynchronous serial data transfers over RS-422 and LVDS (low-voltage differential-signaling) electrical interfaces. The C&DH acts as the spacecraft data system with an instrument data manager providing all software and internal bus scheduling, ingestion of science data, distribution of commands, and performing science operations in real time.

  9. Urbanism, Neighborhood Context, and Social Networks.

    Science.gov (United States)

    Cornwell, Erin York; Behler, Rachel L

    2015-09-01

    Theories of urbanism suggest that the urban context erodes individuals' strong social ties with friends and family. Recent research has narrowed focus to the neighborhood context, emphasizing how localized structural disadvantage affects community-level cohesion and social capital. In this paper, we argue that neighborhood context also shapes social ties with friends and family- particularly for community-dwelling seniors. We hypothesize that neighborhood disadvantage, residential instability, and disorder restrict residents' abilities to cultivate close relationships with neighbors and non-neighbor friends and family. Using data from the National Social Life, Health, and Aging Project (NSHAP), we find that older adults who live in disadvantaged neighborhoods have smaller social networks. Neighborhood disadvantage is also associated with less close network ties and less frequent interaction - but only among men. Furthermore, residents of disordered neighborhoods have smaller networks and weaker ties. We urge scholars to pay greater attention to how neighborhood context contributes to disparities in network-based access to resources.

  10. Research of ad hoc network based on SINCGARS network

    Science.gov (United States)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong; Chen, Jian; Weng, Pengfei

    2016-03-01

    In today's world, science and technology make a spurt of progress, so society has entered the era of information technology, network. Only the comprehensive use of electronic warfare and network warfare means can we maximize their access to information and maintain the information superiority. Combined with the specific combat mission and operational requirements, the research design and construction in accordance with the actual military which are Suitable for the future of information technology needs of the tactical Adhoc network, tactical internet, will greatly improve the operational efficiency of the command of the army. Through the study of the network of the U.S. military SINCGARS network, it can explore the routing protocol and mobile model, to provide a reference for the research of our army network.

  11. Feasibility of a Friendship Network-Based Pediatric Obesity Intervention.

    Science.gov (United States)

    Giannini, Courtney M; Irby, Megan B; Skelton, Joseph A; Gesell, Sabina B

    2017-02-01

    There is growing evidence supporting social network-based interventions for adolescents with obesity. This study's aim was to determine the feasibility of a social network-based intervention by assessing adolescents' friendship networks, willingness to involve friends in treatment, and how these factors influence enjoyment. Adolescents (N = 42) were recruited from a tertiary care obesity clinic. Participants gave a list of closest friends, friendship characteristics, and which of their friends they would involve in treatment. A subset (N = 14) participated in group treatment, were encouraged to bring friends, and invited to a second interview. Participants nominated a mean of 4.0 (standard deviation [SD] = 1.6) friends and were more likely to nominate closer friends (p = 0.003). Friends who attended group sessions were more likely to have multiple friendships in common with the participant's own network (p = 0.04). Involving friends in treatment is feasible and desired by adolescents and may be a novel approach for augmenting obesity treatment outcomes.

  12. The Deep Space Network: A Radio Communications Instrument for Deep Space Exploration

    Science.gov (United States)

    Renzetti, N. A.; Stelzried, C. T.; Noreen, G. K.; Slobin, S. D.; Petty, S. M.; Trowbridge, D. L.; Donnelly, H.; Kinman, P. W.; Armstrong, J. W.; Burow, N. A.

    1983-01-01

    The primary purpose of the Deep Space Network (DSN) is to serve as a communications instrument for deep space exploration, providing communications between the spacecraft and the ground facilities. The uplink communications channel provides instructions or commands to the spacecraft. The downlink communications channel provides command verification and spacecraft engineering and science instrument payload data.

  13. Marine Tactical Command and Control System (MTACCS), Field Development System-1 (FDS-1) assessment: Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    Avery, L W; Hunt, S T; Savage, S F [Pacific Northwest Lab., Richland, WA (United States); McLaughlin, P D; Shepard, A P; Worl, J C [Battelle Seattle Research Center, Seattle, WA (United States)

    1992-04-01

    The following appendices contain the detailed analysis data for the questionnaires and various FDS-1 after action reports submitted to the Marine Corps Systems Command (MARCORSYSCOM) Marine Tactical Command and Control System (MTACCS) Systems' Engineer.

  14. Confronting the Mortal Enemy of Military Justice: New Developments in Unlawful Command Influence

    National Research Council Canada - National Science Library

    Mark L Johnson

    2007-01-01

    ...) to the area of unlawful command influence.1 They serve as a reminder that unlawful command influence is still the mortal enemy of military justice,2 and that all military justice practitioners must be vigilant to prevent even the appearance...

  15. Should the Department of Defense Establish a Unified U.S. Logistics Command?

    National Research Council Canada - National Science Library

    Wenzel, Frank

    2008-01-01

    This monograph asserts that DoD should establish a Unified Combatant Command (COCOM)-level U.S. Logistics Command (USLOGCOM). DoD should begin a deliberate 10-20 year process to establish a USLOGCOM...

  16. The Knowledge Structure of the Commander in Asymmetric Battlefield: The Six Sights and Sensemaking Process

    National Research Council Canada - National Science Library

    Ntuen, Celestine A

    2006-01-01

    .... While there are availability of information technology to help the commander in data processing and analysis, it is not surprising that in real time operations, the commander falls back on what has...

  17. PEACEKEEPING OPERATIONS MANAGEMENT. AN ANALYSIS OF CHALLENGES, CHANGES IN COMMAND ACTION AND TRAINING NEEDS

    National Research Council Canada - National Science Library

    Ünsal SIĞRI; Ufuk BAŞAR

    2015-01-01

    The aim of this paper is to uncover emerging challenges of peacekeeping operations, determine the changes in command actions and its effects on the professional preparation of commanders by analyzing...

  18. Analysis of Recruit Attrition from the Navy's Delayed Entry Program and Recruit Training Command

    National Research Council Canada - National Science Library

    Neuhalfen, Jon K

    2007-01-01

    .... The analysis uses the PRIDE database, provided by Commander, Navy Recruiting Command. Trend analyses are used to identify significant changes in enlistment and attrition behavior for recruits who joined from fiscal years 1998 through 2005...

  19. Lessons learned from a Canadian province-wide age-friendly initiative: the Age-Friendly Manitoba Initiative.

    Science.gov (United States)

    Menec, Verena H; Novek, Sheila; Veselyuk, Dawn; McArthur, Jennifer

    2014-01-01

    The Age-Friendly Manitoba Initiative was launched in 2008. A formative evaluation we conducted in 2011 with 44 participating rural and urban communities demonstrates considerable progress, with virtually all communities having formed an Age-Friendly Committee and conducting a community assessment to identify priorities for action. The majority of communities implemented one or more age-friendly projects. Major barriers to becoming age-friendly identified by participants included lack of funding; lack of capacity, particularly in small communities; and lack of leadership or direction. The study highlights the importance of strong leadership at all levels of government (municipal, provincial, federal); the need to support communities, particularly rural ones, as they try to become more age-friendly; and the importance of ongoing promotion of age-friendliness locally and more broadly (e.g., provincially).

  20. Hypothetical conflict situations with friends and peers

    Directory of Open Access Journals (Sweden)

    Petrović Danijela S.

    2012-01-01

    Full Text Available This paper deals with age and sex differences in preferred strategies of conflict resolution in friendship and peer relationships. The study was conducted on the sample of 286 adolescents. Conflict resolution strategies have been investigated by the method of hypothetical conflict situations. For the purposes of this research, we have created an instrument consisting of 20 hypothetical situations, with the following subjects of conflict: breaking the agreement, non-compliance with opinion differences, provocations, dishonesty and stubbornness. Conflict resolution strategies we examined were giving in, withdrawal, competition and problem solving. The results have shown that problem solving is the dominant strategy of adolescents in conflict with friends, while in peer conflicts they more often opt for competition. Age differences are reflected in the fact that older adolescents are more likely to choose problem solving than younger, whereas younger adolescents are more likely to choose a retreat (withdrawal strategy than older. Girls are more prone to choosing problem solving than boys, who, on the other hand, tend to withdraw more than girls. Also, gender of the other person in the conflict is proved to be important - in conflict with male peers, adolescents choose competition to a greater extent and withdraw to a minor extent, compared to when they are in conflict with female peers. The results have practical implications as well. In programs for teaching constructive conflict resolution that are designed for younger adolescents there should be more emphasis on empowerment and training for assertive behaviour. In addition, when teaching about constructive conflict resolution strategies, it is important to consider the gender of adolescents as well as the gender of the person with whom they are in conflict.