WorldWideScience

Sample records for networks friendly command

  1. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This paper summarizes the research results on the friendly network robotics in fiscal 1996. This research assumes an android robot as an ultimate robot and the future robot system utilizing computer network technology. The robot aiming at human daily work activities in factories or under extreme environments is required to work under usual human work environments. The human robot with similar size, shape and functions to human being is desirable. Such robot having a head with two eyes, two ears and mouth can hold a conversation with human being, can walk with two legs by autonomous adaptive control, and has a behavior intelligence. Remote operation of such robot is also possible through high-speed computer network. As a key technology to use this robot under coexistence with human being, establishment of human coexistent robotics was studied. As network based robotics, use of robots connected with computer networks was also studied. In addition, the R-cube (R{sup 3}) plan (realtime remote control robot technology) was proposed. 82 refs., 86 figs., 12 tabs.

  2. Network-Friendly Gossiping

    Science.gov (United States)

    Serbu, Sabina; Rivière, Étienne; Felber, Pascal

    The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on the underlying layers, notably the Internet routing infrastructure. To make an effective use of network resources, protocols should both limit the stress (amount of messages) on each infrastructure entity like routers and links, and balance as much as possible the load in the network. Most protocols use application-level metrics such as delays to improve efficiency of content dissemination or routing, but the extend to which such application-centric optimizations help reduce and balance the load imposed to the infrastructure is unclear. In this paper, we elaborate on the design of such network-friendly protocols and associated metrics. More specifically, we investigate random-based gossip dissemination. We propose and evaluate different ways of making this representative protocol network-friendly while keeping its desirable properties (robustness and low delays). Simulations of the proposed methods using synthetic and real network topologies convey and compare their abilities to reduce and balance the load while keeping good performance.

  3. Friend suggestion in social network based on user log

    Science.gov (United States)

    Kaviya, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    Simple friend recommendation algorithms such as similarity, popularity and social aspects is the basic requirement to be explored to methodically form high-performance social friend recommendation. Suggestion of friends is followed. No tags of character were followed. In the proposed system, we use an algorithm for network correlation-based social friend recommendation (NC-based SFR).It includes user activities like where one lives and works. A new friend recommendation method, based on network correlation, by considering the effect of different social roles. To model the correlation between different networks, we develop a method that aligns these networks through important feature selection. We consider by preserving the network structure for a more better recommendations so that it significantly improves the accuracy for better friend-recommendation.

  4. A Commander in Chief's Network-Centric Odyssey

    National Research Council Canada - National Science Library

    Copley, E

    2002-01-01

    .... Each Armed Service has begun training and equipping its force using the tenets of Network-Centric Operations, but those forces come together for the first time under the combatant Commander-in-Chief...

  5. Ethnic Differences among Friend Networks Later in Life

    Science.gov (United States)

    Kang, Hyunsook; Hebert, Corie

    2014-01-01

    This study seeks to broaden the understanding of friend relationships in older adults and the differences in those friend relationships among various ethnic groups. Secondary data from the National Social Life, Health and Aging Project (NSHAP) was analyzed to test the hypothesis that Caucasian older adults have stronger friend networks than older…

  6. Human Systems Integration Assessment of Network Centric Command and Control

    National Research Council Canada - National Science Library

    Quashnock, Dee; Kelly, Richard T; Dunaway, John; Smillie, Robert J

    2004-01-01

    .... FORCEnet is the operational construct and architectural framework for Naval Network Centric Warfare in the information age that integrates warriors, sensors, networks, command and control, platforms...

  7. Considerations on command and response language features for a network of heterogeneous autonomous computers

    Science.gov (United States)

    Engelberg, N.; Shaw, C., III

    1984-01-01

    The design of a uniform command language to be used in a local area network of heterogeneous, autonomous nodes is considered. After examining the major characteristics of such a network, and after considering the profile of a scientist using the computers on the net as an investigative aid, a set of reasonable requirements for the command language are derived. Taking into account the possible inefficiencies in implementing a guest-layered network operating system and command language on a heterogeneous net, the authors examine command language naming, process/procedure invocation, parameter acquisition, help and response facilities, and other features found in single-node command languages, and conclude that some features may extend simply to the network case, others extend after some restrictions are imposed, and still others require modifications. In addition, it is noted that some requirements considered reasonable (user accounting reports, for example) demand further study before they can be efficiently implemented on a network of the sort described.

  8. [Network Design of the Spaceport Command and Control System

    Science.gov (United States)

    Teijeiro, Antonio

    2017-01-01

    I helped the Launch Control System (LCS) hardware team sustain the network design of the Spaceport Command and Control System. I wrote the procedure that will be used to satisfy an official hardware test for the hardware carrying data from the Launch Vehicle. I installed hardware and updated design documents in support of the ongoing development of the Spaceport Command and Control System and applied firewall experience I gained during my spring 2017 semester to inspect and create firewall security policies as requested. Finally, I completed several online courses concerning networking fundamentals and Unix operating systems.

  9. To friend or not to friend? Social networking and faculty perceptions of online professionalism.

    Science.gov (United States)

    Chretien, Katherine C; Farnan, Jeanne M; Greysen, S Ryan; Kind, Terry

    2011-12-01

    To assess faculty perceptions of professional boundaries and trainee-posted content on social networking sites (SNS). In June 2010, the Clerkship Directors in Internal Medicine conducted its annual survey of U.S. and Canadian member institutions. The survey included sections on demographics and social networking. The authors used descriptive statistics and tests of association to analyze the Likert scale responses and qualitatively analyzed the free-text responses. Of 110 institutional members, 82 (75%) responded to the survey. Of the 40 respondents who reported current or past SNS use, 21 (53%) reported receiving a "friend request" from a current student and 25 (63%) from a current resident. Of these, 4 (19%) accepted the student request and 12 (48%) accepted the resident request. Sixty-three of 80 (79%) felt it was inappropriate to send a friend request to a current student, 61 (76%) to accept a current student's request, 42 (53%) to become friends with a current resident, and 61 (81%) to become friends with a current patient. Becoming friends with a former student, former resident, or colleague was perceived as more appropriate. Younger respondents were less likely to deem specific student behaviors inappropriate (odds ratio [OR] 0.18-0.79; adjusted OR 0.12-0.86, controlling for respondents' sex, rank, and SNS use), although none reached statistical significance. Some internal medicine educators are using SNSs and interacting with trainees online. Their perceptions on the appropriateness of social networking behaviors provide some consensus for professional boundaries between faculty and trainees in the digital world.

  10. Discrete event command and control for networked teams with multiple missions

    Science.gov (United States)

    Lewis, Frank L.; Hudas, Greg R.; Pang, Chee Khiang; Middleton, Matthew B.; McMurrough, Christopher

    2009-05-01

    During mission execution in military applications, the TRADOC Pamphlet 525-66 Battle Command and Battle Space Awareness capabilities prescribe expectations that networked teams will perform in a reliable manner under changing mission requirements, varying resource availability and reliability, and resource faults. In this paper, a Command and Control (C2) structure is presented that allows for computer-aided execution of the networked team decision-making process, control of force resources, shared resource dispatching, and adaptability to change based on battlefield conditions. A mathematically justified networked computing environment is provided called the Discrete Event Control (DEC) Framework. DEC has the ability to provide the logical connectivity among all team participants including mission planners, field commanders, war-fighters, and robotic platforms. The proposed data management tools are developed and demonstrated on a simulation study and an implementation on a distributed wireless sensor network. The results show that the tasks of multiple missions are correctly sequenced in real-time, and that shared resources are suitably assigned to competing tasks under dynamically changing conditions without conflicts and bottlenecks.

  11. Friends First? The Peer Network Origins of Adolescent Dating

    Science.gov (United States)

    Kreager, Derek A.; Molloy, Lauren E.; Moody, James; Feinberg, Mark E.

    2015-01-01

    The proximity of dating partners in peer friendship networks has important implications for the diffusion of health-risk behaviors and adolescent social development. We derive two competing hypotheses for the friendship-romance association. The first predicts that daters are proximally positioned in friendship networks prior to dating and that opposite-gender friends are likely to transition to dating. The second predicts that dating typically crosses group boundaries and opposite-gender friends are unlikely to later date. We test these hypotheses with longitudinal friendship data for 626 9th grade PROSPER heterosexual dating couples. Results primarily support the second hypothesis: romantic partners are unlikely to be friends in the previous year or share the same cohesive subgroup, and opposite-gender friends are unlikely to transition into dating. PMID:27134511

  12. Using LTE Networks for UAV Command and Control Link

    DEFF Research Database (Denmark)

    Nguyen, Huan Cong; Amorim, Rafhael Medeiros de; Wigard, Jeroen

    2017-01-01

    In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss on the hei......In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss...... on the height of the UAV, which is derived from actual measurements, and a real-world cellular network layout and configuration. The results indicate that interference is the dominant factor limiting the cellular coverage for UAVs in the downlink: outage level increases from 4.2% at 1.5 m height to 51.7% at 120...

  13. MyGeneFriends: A Social Network Linking Genes, Genetic Diseases, and Researchers.

    Science.gov (United States)

    Allot, Alexis; Chennen, Kirsley; Nevers, Yannis; Poidevin, Laetitia; Kress, Arnaud; Ripp, Raymond; Thompson, Julie Dawn; Poch, Olivier; Lecompte, Odile

    2017-06-16

    The constant and massive increase of biological data offers unprecedented opportunities to decipher the function and evolution of genes and their roles in human diseases. However, the multiplicity of sources and flow of data mean that efficient access to useful information and knowledge production has become a major challenge. This challenge can be addressed by taking inspiration from Web 2.0 and particularly social networks, which are at the forefront of big data exploration and human-data interaction. MyGeneFriends is a Web platform inspired by social networks, devoted to genetic disease analysis, and organized around three types of proactive agents: genes, humans, and genetic diseases. The aim of this study was to improve exploration and exploitation of biological, postgenomic era big data. MyGeneFriends leverages conventions popularized by top social networks (Facebook, LinkedIn, etc), such as networks of friends, profile pages, friendship recommendations, affinity scores, news feeds, content recommendation, and data visualization. MyGeneFriends provides simple and intuitive interactions with data through evaluation and visualization of connections (friendships) between genes, humans, and diseases. The platform suggests new friends and publications and allows agents to follow the activity of their friends. It dynamically personalizes information depending on the user's specific interests and provides an efficient way to share information with collaborators. Furthermore, the user's behavior itself generates new information that constitutes an added value integrated in the network, which can be used to discover new connections between biological agents. We have developed MyGeneFriends, a Web platform leveraging conventions from popular social networks to redefine the relationship between humans and biological big data and improve human processing of biomedical data. MyGeneFriends is available at lbgi.fr/mygenefriends. ©Alexis Allot, Kirsley Chennen, Yannis

  14. Friends of friends: are indirect connections in social networks important to animal behaviour?

    Science.gov (United States)

    Brent, Lauren J N

    2015-05-01

    Friend of a friend relationships, or the indirect connections between people, influence our health, well-being, financial success and reproductive output. As with humans, social behaviours in other animals often occur within a broad interconnected network of social ties. Yet studies of animal social behaviour tend to focus on associations between pairs of individuals. With the increase in popularity of social network analysis, researchers have started to look beyond the dyad to examine the role of indirect connections in animal societies. Here, I provide an overview of the new knowledge that has been uncovered by these studies. I focus on research that has addressed both the causes of social behaviours, i.e. the cognitive and genetic basis of indirect connections, as well as their consequences, i.e. the impact of indirect connections on social cohesion, information transfer, cultural practices and fitness. From these studies, it is apparent that indirect connections play an important role in animal behaviour, although future research is needed to clarify their contribution.

  15. Web-Based Interface for Command and Control of Network Sensors

    Science.gov (United States)

    Wallick, Michael N.; Doubleday, Joshua R.; Shams, Khawaja S.

    2010-01-01

    This software allows for the visualization and control of a network of sensors through a Web browser interface. It is currently being deployed for a network of sensors monitoring Mt. Saint Helen s volcano; however, this innovation is generic enough that it can be deployed for any type of sensor Web. From this interface, the user is able to fully control and monitor the sensor Web. This includes, but is not limited to, sending "test" commands to individual sensors in the network, monitoring for real-world events, and reacting to those events

  16. MySpace and Facebook: applying the uses and gratifications theory to exploring friend-networking sites.

    Science.gov (United States)

    Raacke, John; Bonds-Raacke, Jennifer

    2008-04-01

    The increased use of the Internet as a new tool in communication has changed the way people interact. This fact is even more evident in the recent development and use of friend-networking sites. However, no research has evaluated these sites and their impact on college students. Therefore, the present study was conducted to evaluate: (a) why people use these friend-networking sites, (b) what the characteristics are of the typical college user, and (c) what uses and gratifications are met by using these sites. Results indicated that the vast majority of college students are using these friend-networking sites for a significant portion of their day for reasons such as making new friends and locating old friends. Additionally, both men and women of traditional college age are equally engaging in this form of online communication with this result holding true for nearly all ethnic groups. Finally, results showed that many uses and gratifications are met by users (e.g., "keeping in touch with friends"). Results are discussed in light of the impact that friend-networking sites have on communication and social needs of college students.

  17. Friends of friends: are indirect connections in social networks important to animal behaviour?

    Science.gov (United States)

    Brent, Lauren J. N.

    2015-01-01

    Friend of a friend relationships, or the indirect connections between people, influence our health, well-being, financial success and reproductive output. As with humans, social behaviours in other animals often occur within a broad interconnected network of social ties. Yet studies of animal social behaviour tend to focus on associations between pairs of individuals. With the increase in popularity of social network analysis, researchers have started to look beyond the dyad to examine the role of indirect connections in animal societies. Here, I provide an overview of the new knowledge that has been uncovered by these studies. I focus on research that has addressed both the causes of social behaviours, i.e. the cognitive and genetic basis of indirect connections, as well as their consequences, i.e. the impact of indirect connections on social cohesion, information transfer, cultural practices and fitness. From these studies, it is apparent that indirect connections play an important role in animal behaviour, although future research is needed to clarify their contribution. PMID:25937639

  18. An Appraisal of Asia-Pacific Cities as Control and Command Centres Embedded in World City Network

    Directory of Open Access Journals (Sweden)

    Z. Li

    2017-08-01

    Full Text Available Since the globalization trend is proliferating at a staggering rate, world cities have emerged as the most dominant vanguard incorporated into global economy. Control and command function is one of the robust integral parts of world city formation, which is closely associated with the corporate headquarter status of some dominant multinational companies. Previous research works on this topic tend to concentrate on the Western Europe and North American arenas neglecting the Asia-Pacific region. Hence, the objective of this paper is to explore control and command functions of Asia-Pacific cities with reference to headquarters’ locations of multinational companies. The methodology will utilize the Forbes global 2000 dataset from the seminal study of GaWC research group, and apply the control and command center model and the interlocking city network model to discover the control and command index, as well as network connectivity of Asia-Pacific cities. Based upon the empirical study of this research, we could identify the hierarchical structure and spatial structure of Asia-Pacific world cities to emerge as some control and command centers embedded in world city network.

  19. Best Friends: Alliances, Friend Ranking, and the MySpace Social Network.

    Science.gov (United States)

    DeScioli, Peter; Kurzban, Robert; Koch, Elizabeth N; Liben-Nowell, David

    2011-01-01

    Like many topics of psychological research, the explanation for friendship is at once intuitive and difficult to address empirically. These difficulties worsen when one seeks, as we do, to go beyond "obvious" explanations ("humans are social creatures") to ask deeper questions, such as "What is the evolved function of human friendship?" In recent years, however, a new window into human behavior has opened as a growing fraction of people's social activity has moved online, leaving a wealth of digital traces behind. One example is a feature of the MySpace social network that allows millions of users to rank their "Top Friends." In this study, we collected over 10 million people's friendship decisions from MySpace to test predictions made by hypotheses about human friendship. We found particular support for the alliance hypothesis, which holds that human friendship is caused by cognitive systems that function to create alliances for potential disputes. Because an ally's support can be undermined by a stronger outside relationship, the alliance model predicts that people will prefer partners who rank them above other friends. Consistent with the alliance model, we found that an individual's choice of best friend in MySpace is strongly predicted by how partners rank that individual. © The Author(s) 2011.

  20. Command Filtered Adaptive Fuzzy Neural Network Backstepping Control for Marine Power System

    Directory of Open Access Journals (Sweden)

    Xin Zhang

    2014-01-01

    Full Text Available In order to retrain chaotic oscillation of marine power system which is excited by periodic electromagnetism perturbation, a novel command-filtered adaptive fuzzy neural network backstepping control method is designed. First, the mathematical model of marine power system is established based on the two parallel nonlinear model. Then, main results of command-filtered adaptive fuzzy neural network backstepping control law are given. And the Lyapunov stability theory is applied to prove that the system can remain closed-loop asymptotically stable with this controller. Finally, simulation results indicate that the designed controller can suppress chaotic oscillation with fast convergence speed that makes the system return to the equilibrium point quickly; meanwhile, the parameter which induces chaotic oscillation can also be discriminated.

  1. User-friendly matching protocol for online social networks

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in user can match her profile with that of an off-line stranger, while both profiles are maximally protected. Our solution

  2. A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack.

    Science.gov (United States)

    Li, Xuran; Wang, Qiu; Dai, Hong-Ning; Wang, Hao

    2018-06-14

    Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this paper, we propose a novel anti-eavesdropping scheme by introducing friendly jammers to an industrial crowdsensing network. In particular, we establish a theoretical framework considering both the probability of eavesdropping attacks and the probability of successful transmission to evaluate the effectiveness of our scheme. Our framework takes into account various channel conditions such as path loss, Rayleigh fading, and the antenna type of friendly jammers. Our results show that using jammers in industrial crowdsensing networks can effectively reduce the eavesdropping risk while having no significant influence on legitimate communications.

  3. A development of user-friendly graphical interface for a blanket simulator

    International Nuclear Information System (INIS)

    Lee, Young-Seok; Yoon, Seok-Heun; Han, Jung-Hoon

    2010-01-01

    A web-based user-friendly graphical interface (GUI) system, named GUMBIS (Graphical User-friendly Monte-Carlo-Application Blanket-Design Interface System), was developed to cut down the efforts of the researchers and practitioners who study tokamak blanket designs with the Monte Carlo MCNP/MCNPX codes. GUMBIS was also aimed at supporting them to use the codes for their study without having through understanding on the complex menus and commands of the codes. Developed on the web-based environment, GUMBIS provides task sharing capability on a network. GUMBIS, applicable for both blanket design and neutronics analysis, could facilitate not only advanced blanket R and D but also the education and training of the researchers in the R and D.

  4. Learning from Your Network of Friends: A Trajectory Representation Learning Model Based on Online Social Ties

    KAUST Repository

    Alharbi, Basma Mohammed; Zhang, Xiangliang

    2017-01-01

    Location-Based Social Networks (LBSNs) capture individuals whereabouts for a large portion of the population. To utilize this data for user (location)-similarity based tasks, one must map the raw data into a low-dimensional uniform feature space. However, due to the nature of LBSNs, many users have sparse and incomplete check-ins. In this work, we propose to overcome this issue by leveraging the network of friends, when learning the new feature space. We first analyze the impact of friends on individuals's mobility, and show that individuals trajectories are correlated with thoseof their friends and friends of friends (2-hop friends) in an online setting. Based on our observation, we propose a mixed-membership model that infers global mobility patterns from users' check-ins and their network of friends, without impairing the model's complexity. Our proposed model infers global patterns and learns new representations for both usersand locations simultaneously. We evaluate the inferred patterns and compare the quality of the new user representation against baseline methods on a social link prediction problem.

  5. Learning from Your Network of Friends: A Trajectory Representation Learning Model Based on Online Social Ties

    KAUST Repository

    Alharbi, Basma Mohammed

    2017-02-07

    Location-Based Social Networks (LBSNs) capture individuals whereabouts for a large portion of the population. To utilize this data for user (location)-similarity based tasks, one must map the raw data into a low-dimensional uniform feature space. However, due to the nature of LBSNs, many users have sparse and incomplete check-ins. In this work, we propose to overcome this issue by leveraging the network of friends, when learning the new feature space. We first analyze the impact of friends on individuals\\'s mobility, and show that individuals trajectories are correlated with thoseof their friends and friends of friends (2-hop friends) in an online setting. Based on our observation, we propose a mixed-membership model that infers global mobility patterns from users\\' check-ins and their network of friends, without impairing the model\\'s complexity. Our proposed model infers global patterns and learns new representations for both usersand locations simultaneously. We evaluate the inferred patterns and compare the quality of the new user representation against baseline methods on a social link prediction problem.

  6. Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2017-11-22

    ARL-TN-0859 ● NOV 2017 US Army Research Laboratory Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled...Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command by John K Hawley Human Research and Engineering...REPORT TYPE Technical Note 3. DATES COVERED (From - To) 1 May 2016–20 April 2017 4. TITLE AND SUBTITLE Applied Knowledge Management to Mitigate

  7. The Unspoken Consequence of Command, Control Communications Technology: Enhanced Micromanagement by Risk-Averse Commanders

    National Research Council Canada - National Science Library

    Carozza, John

    2004-01-01

    .... However, along with its benefits, this command, control and communications (C3) network includes the dangerous consequence of eroding the autonomy of tactical command through enhanced micromanagement by risk-averse operational commanders...

  8. Friend networking sites and their relationship to adolescents' well-being and social self-esteem.

    Science.gov (United States)

    Valkenburg, Patti M; Peter, Jochen; Schouten, Alexander P

    2006-10-01

    The aim of this study was to investigate the consequences of friend networking sites (e.g., Friendster, MySpace) for adolescents' self-esteem and well-being. We conducted a survey among 881 adolescents (10-19-year-olds) who had an online profile on a Dutch friend networking site. Using structural equation modeling, we found that the frequency with which adolescents used the site had an indirect effect on their social self-esteem and well-being. The use of the friend networking site stimulated the number of relationships formed on the site, the frequency with which adolescents received feedback on their profiles, and the tone (i.e., positive vs. negative) of this feedback. Positive feedback on the profiles enhanced adolescents' social self-esteem and well-being, whereas negative feedback decreased their self-esteem and well-being.

  9. Social Networking for the Older and Wiser Connect with Family, and Friends Old and New

    CERN Document Server

    McManus, Sean

    2010-01-01

    Social networks enable anyone with a computer and Internet connection to stay in touch with friends and family across the globe, and rediscover old acquaintances.  Social Networking for the Older and Wiser starts with the basics of social networks, before moving onto intermediate topics, all whilst highlighting ways to protect your privacy and keep your details secure. The book is packed with step-by-step instructions on how to use Facebook, Twitter, Friends Reunited, Saga Zone, and other social networks to:Create an account on your chosen social networkReconnect and stay-in-touch with old fr

  10. School, Friends, and Substance Use: Gender Differences on the Influence of Attitudes Toward School and Close Friend Networks on Cannabis Involvement.

    Science.gov (United States)

    Zaharakis, Nikola; Mason, Michael J; Mennis, Jeremy; Light, John; Rusby, Julie C; Westling, Erika; Crewe, Stephanie; Flay, Brian R; Way, Thomas

    2018-02-01

    The school environment is extremely salient in young adolescents' lives. Adolescents who have unfavorable attitudes toward school and teachers are at elevated risk for dropping out of school and engaging in behavioral health risks. Peer network health-a summation of the positive and negative behaviors in which one's close friend group engages-may be one way by which attitudes toward school exert influence on youth substance use. Utilizing a sample of 248 primarily African-American young urban adolescents, we tested a moderated mediation model to determine if the indirect effect of attitude to school on cannabis involvement through peer network health was conditioned on gender. Attitude toward school measured at baseline was the predictor (X), peer network health measured at 6 months was the mediator (M), cannabis involvement (including use, offers to use, and refusals to use) measured at 24 months was the outcome (Y), and gender was the moderator (W). Results indicated that negative attitudes toward school were indirectly associated with increased cannabis involvement through peer network health. This relationship was not moderated by gender. Adolescents in our sample with negative attitudes toward school were more likely to receive more offers to use cannabis and to use cannabis more frequently through the perceived health behaviors of their close friends. Implications from these results point to opportunities to leverage the dynamic associations among school experiences, friends, and cannabis involvement, such as offers and use.

  11. A distributed command governor strategy for the operational control of drinking water networks

    OpenAIRE

    Tedesco, Francesco; Ocampo-Martínez, Carlos; Casavola, Alessandro; Puig Cayuela, Vicenç

    2014-01-01

    This paper proposes the application of a distributed command governor (DCG) strategy for the operational control of drinking water networks (DWN). This approach is very suitable to this kind of management problems given the large-scale and complex nature of DWNs, the relevant effect of persistent disturbances (water demands) over the network evolutions and their marginal stability feature. The performance improvement offered by DCG is compared with the consideration of two non-centralized mod...

  12. Improved head direction command classification using an optimised Bayesian neural network.

    Science.gov (United States)

    Nguyen, Son T; Nguyen, Hung T; Taylor, Philip B; Middleton, James

    2006-01-01

    Assistive technologies have recently emerged to improve the quality of life of severely disabled people by enhancing their independence in daily activities. Since many of those individuals have limited or non-existing control from the neck downward, alternative hands-free input modalities have become very important for these people to access assistive devices. In hands-free control, head movement has been proved to be a very effective user interface as it can provide a comfortable, reliable and natural way to access the device. Recently, neural networks have been shown to be useful not only for real-time pattern recognition but also for creating user-adaptive models. Since multi-layer perceptron neural networks trained using standard back-propagation may cause poor generalisation, the Bayesian technique has been proposed to improve the generalisation and robustness of these networks. This paper describes the use of Bayesian neural networks in developing a hands-free wheelchair control system. The experimental results show that with the optimised architecture, classification Bayesian neural networks can detect head commands of wheelchair users accurately irrespective to their levels of injuries.

  13. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    Science.gov (United States)

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In

  14. OA20 The positioning of family, friends, community, and service providers in support networks for caring at end-of-life: a social network analysis.

    Science.gov (United States)

    Leonard, Rosemary; Horsfall, Debbie; Rosenberg, John; Noonan, Kerrie

    2015-04-01

    Although there is ample evidence of the risk to carers from the burden of caring, there is also evidence that a caring network can relieve the burden on the principal carer, strengthen community relationships, and increase 'Death Literacy' in the community. There is often an assumption that, in caring networks, family and service providers are central and friends and community are marginal. We examined whether this is the case in practice using SNA. To identify the relative positioning of family, friends, community, and service providers in caring networks. In interviews with carers (N = 23) and focus groups with caring networks (N = 13) participants were asked to list the people in the caring network and rate the strength of their relationships to them (0 no relationship to 3 strong relationship). SNA in UCInet was used to map the networks, examine density (number and strength of relationships) across time (when caring began to the present) and across relationship types (family, friends, community, and service providers) supplemented by qualitative data. The analysis revealed significant increases in the density of the networks over time. The density of relationships with friends was similar to that other family. Community and service providers had significantly lower density. Qualitative analysis revealed that often service providers were not seen as part of the networks. To avoid carer burnout, it is important not to make assumptions about where carers obtain support but work with each carer to mobilise any support that is available. © 2015, Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  15. An algorithm for identifying the best current friend in a social network

    Directory of Open Access Journals (Sweden)

    Francisco Javier Moreno

    2015-05-01

    Full Text Available A research field in the area of social networks (SNs is the identification of some types of users and groups. To facilitate this process, a SN is usually represented by a graph. The centrality measures, which identify the most important vertices in a graph according to some criterion, are usual tools to analyze a graph. One of these measures is the PageRank (a measure originally designed to classify web pages. Informally, in the context of a SN, the PageRank of a user i represents the probability that another user of the SN is seeing the page of i after a considerable time of navigation in the SN. In this paper, we define a new type of user in a SN: the best current friend. The idea is to identify, among the friends of a user i, who is the friend k that would generate the highest decrease in the PageRank of i if k stops being his/her friend. This may be useful to identify the users/customers whose friendship/relationship should be a priority to keep. We provide formal definitions, algorithms and some experiments for this subject. Our experiments showed that the best current friend of a user is not necessarily the one who has the highest PageRank in the SN nor the one who has more friends.

  16. Traffic Command Gesture Recognition for Virtual Urban Scenes Based on a Spatiotemporal Convolution Neural Network

    Directory of Open Access Journals (Sweden)

    Chunyong Ma

    2018-01-01

    Full Text Available Intelligent recognition of traffic police command gestures increases authenticity and interactivity in virtual urban scenes. To actualize real-time traffic gesture recognition, a novel spatiotemporal convolution neural network (ST-CNN model is presented. We utilized Kinect 2.0 to construct a traffic police command gesture skeleton (TPCGS dataset collected from 10 volunteers. Subsequently, convolution operations on the locational change of each skeletal point were performed to extract temporal features, analyze the relative positions of skeletal points, and extract spatial features. After temporal and spatial features based on the three-dimensional positional information of traffic police skeleton points were extracted, the ST-CNN model classified positional information into eight types of Chinese traffic police gestures. The test accuracy of the ST-CNN model was 96.67%. In addition, a virtual urban traffic scene in which real-time command tests were carried out was set up, and a real-time test accuracy rate of 93.0% was achieved. The proposed ST-CNN model ensured a high level of accuracy and robustness. The ST-CNN model recognized traffic command gestures, and such recognition was found to control vehicles in virtual traffic environments, which enriches the interactive mode of the virtual city scene. Traffic command gesture recognition contributes to smart city construction.

  17. Social Network Analysis Reveals the Negative Effects of Attention-Deficit/Hyperactivity Disorder (ADHD Symptoms on Friend-Based Student Networks.

    Directory of Open Access Journals (Sweden)

    Jun Won Kim

    Full Text Available Social network analysis has emerged as a promising tool in modern social psychology. This method can be used to examine friend-based social relationships in terms of network theory, with nodes representing individual students and ties representing relationships between students (e.g., friendships and kinships. Using social network analysis, we investigated whether greater severity of ADHD symptoms is correlated with weaker peer relationships among elementary school students.A total of 562 sixth-graders from two elementary schools (300 males provided the names of their best friends (maximum 10 names. Their teachers rated each student's ADHD symptoms using an ADHD rating scale.The results showed that 10.2% of the students were at high risk for ADHD. Significant group differences were observed between the high-risk students and other students in two of the three network parameters (degree, centrality and closeness used to assess friendship quality, with the high-risk group showing significantly lower values of degree and closeness compared to the other students. Moreover, negative correlations were found between the ADHD rating and two social network analysis parameters.Our findings suggest that the severity of ADHD symptoms is strongly correlated with the quality of social and interpersonal relationships in students with ADHD symptoms.

  18. Social Network Analysis Reveals the Negative Effects of Attention-Deficit/Hyperactivity Disorder (ADHD) Symptoms on Friend-Based Student Networks.

    Science.gov (United States)

    Kim, Jun Won; Kim, Bung-Nyun; Kim, Johanna Inhyang; Lee, Young Sik; Min, Kyung Joon; Kim, Hyun-Jin; Lee, Jaewon

    2015-01-01

    Social network analysis has emerged as a promising tool in modern social psychology. This method can be used to examine friend-based social relationships in terms of network theory, with nodes representing individual students and ties representing relationships between students (e.g., friendships and kinships). Using social network analysis, we investigated whether greater severity of ADHD symptoms is correlated with weaker peer relationships among elementary school students. A total of 562 sixth-graders from two elementary schools (300 males) provided the names of their best friends (maximum 10 names). Their teachers rated each student's ADHD symptoms using an ADHD rating scale. The results showed that 10.2% of the students were at high risk for ADHD. Significant group differences were observed between the high-risk students and other students in two of the three network parameters (degree, centrality and closeness) used to assess friendship quality, with the high-risk group showing significantly lower values of degree and closeness compared to the other students. Moreover, negative correlations were found between the ADHD rating and two social network analysis parameters. Our findings suggest that the severity of ADHD symptoms is strongly correlated with the quality of social and interpersonal relationships in students with ADHD symptoms.

  19. Commanders and Cyber Chat: Should More Guidance be Provided for Social Networking Sites

    Science.gov (United States)

    2011-04-01

    networks. On one hand, the perception is there should be rules of etiquette for friending someone related to social norms of endorsing that person...agreed.. Reasons given in free text by lieutenants were as follows: - “Plenty of briefings were given on basic protocol regarding what goes on

  20. When BOLD is thicker than water: processing social information about kin and friends at different levels of the social network.

    Science.gov (United States)

    Wlodarski, Rafael; Dunbar, Robin I M

    2016-12-01

    The aim of this study was to examine differences in the neural processing of social information about kin and friends at different levels of closeness and social network level. Twenty-five female participants engaged in a cognitive social task involving different individuals in their social network while undergoing functional magnetic resonance imaging scanning to detect BOLD (Blood Oxygen Level Dependent) signals changes. Greater levels of activation occurred in several regions of the brain previously associated with social cognition when thinking about friends than when thinking about kin, including the posterior cingulate cortex (PCC) and the ventral medial prefrontal cortex (vMPFC). Linear parametric analyses across network layers further showed that, when it came to thinking about friends, activation increased in the vMPFC, lingual gyrus, and sensorimotor cortex as individuals thought about friends at closer layers of the network. These findings suggest that maintaining friendships may be more cognitively exacting than maintaining kin relationships. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  1. The role of gender and friends' gender on peer socialization of adolescent drinking: a prospective multilevel social network analysis.

    Science.gov (United States)

    Deutsch, Arielle R; Steinley, Douglas; Slutske, Wendy S

    2014-09-01

    Although socializing effects of friends' drinking on adolescent drinking behavior have been firmly established in previous literature, study results on the importance of gender, as well as the specific role that gender may play in peer socialization, are very mixed. Given the increasing importance of gender in friendships (particularly opposite-sex friendships) during adolescence, it is necessary to better understand the nuanced roles that gender can play in peer socialization effects on alcohol use. In addition, previous studies focusing on the interplay between individual gender and friends' gender have been largely dyadic; less is known about potential gendered effects of broader social networks. The current study sought to further investigate potential effects of gender on friends' influence on adolescent drinking behavior with particular emphasis on the number of same-sex and opposite-sex friends within one's friendship network, as well as closeness to these friends. Using Waves I and II of the saturated sample of the National Longitudinal Study of Adolescent Health (Add Health), adolescent friendship networks were used to calculate the mean drinking behaviors of adolescent friends. Multi-level models estimated the effects of individual drinking behaviors, friend drinking behaviors, and school-level drinking behaviors on adolescent drinking 1 year later, as well as moderating effects of gender composition of friendship groups and male and female friend closeness on the relationship between friends' drinking behaviors and adolescent drinking behavior. Results documented that gender composition of friendship groups did not influence the effect of friends' drinking on individual drinking 1 year later. However, closeness to friends did influence this relationship. As closeness to male friends decreased, the influence of their drinking behavior increased, for both boys and girls. A similar effect was found for female friends, but only for boys. Female friend

  2. Privacy‐Preserving Friend Matching Protocol approach for Pre‐match in Social Networks

    DEFF Research Database (Denmark)

    Ople, Shubhangi S.; Deshmukh, Aaradhana A.; Mihovska, Albena Dimitrova

    2016-01-01

    Social services make the most use of the user profile matching to help the users to discover friends with similar social attributes (e.g. interests, location, age). However, there are many privacy concerns that prevent to enable this functionality. Privacy preserving encryption is not suitable...... for use in social networks due to its data sharing problems and information leakage. In this paper, we propose a novel framework for privacy–preserving profile matching. We implement both the client and server portion of the secure match and evaluate its performance network dataset. The results show...

  3. Parents, Friends, and Romantic Partners: Enmeshment in Deviant Networks and Adolescent Delinquency Involvement

    Science.gov (United States)

    Lonardo, Robert A.; Giordano, Peggy C.; Longmore, Monica A.; Manning, Wendy D.

    2009-01-01

    Adolescent networks include parents, friends, and romantic partners, but research on the social learning mechanisms related to delinquency has not typically examined the characteristics of all three domains simultaneously. Analyses draw on data from the Toledo Adolescent Relationships Study (n = 957), and our analytic sample contains 51% male and…

  4. Family and Friends: Which Types of Personal Relationships Go Together in a Network?

    Science.gov (United States)

    Rözer, Jesper; Mollenhorst, Gerald; Poortman, Anne-Rigt

    We examine the link between family and personal networks. Using arguments about meeting opportunities, competition and social influence, we hypothesise how the presence of specific types of family members (i.e., a partner, children, parents and siblings) and non-family members (i.e., friends, neighbours and colleagues) in the network mutually affect one another. In addition, we propose that-beyond their mere presence-the active role of family members in the network strongly affects the presence of non-family members in the network. Data from the third wave of the Survey on the Social Networks of the Dutch, collected in 2012 and 2013, show that active involvement is of key importance; more than merely having family members present in one's personal network, the active involvement of specific types of family members in the personal network is associated with having disproportionally more other family members and having somewhat fewer non-family members in the network.

  5. Intermediate peer contexts and educational outcomes: Do the friends of students' friends matter?

    Science.gov (United States)

    Carbonaro, William; Workman, Joseph

    2016-07-01

    Sociologists of education have long been interested in the effects of peer relations on educational outcomes. Recent theory and research on adolescence suggest that peers on the boundaries of students' friendship networks may play an important role in shaping behaviors and educational outcomes. In this study, we examine the importance of a key "intermediate peer context" for students' outcomes: the friends of a student's friends. Our findings indicate both friends' and friends' friends' characteristics independently predict students' college expectations and their risk of dropping out of high school (although only friends' characteristics predict GPA). Our models suggest the magnitude of students' friends-of-friends' characteristics are at least as large their friends' characteristics. Together, the association between the peer context and students outcomes is considerably larger when accounting for both the characteristics of students' friends and the friends of their friends. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. Do Parental Networks Pay Off? Linking Children's Labor-Market Outcomes to Their Parents' Friends

    NARCIS (Netherlands)

    Plug, E.; van der Klaauw, B.; Ziegler, L.

    In this paper, we examine whether children are better off if their parents have more elaborate social networks. Using data on high-school friendships of parents, we analyze whether the number and characteristics of friends affect the labor-market outcomes of children. While parental friendships

  7. Facebook friends with (health) benefits? Exploring social network site use and perceptions of social support, stress, and well-being.

    Science.gov (United States)

    Nabi, Robin L; Prestin, Abby; So, Jiyeon

    2013-10-01

    There is clear evidence that interpersonal social support impacts stress levels and, in turn, degree of physical illness and psychological well-being. This study examines whether mediated social networks serve the same palliative function. A survey of 401 undergraduate Facebook users revealed that, as predicted, number of Facebook friends associated with stronger perceptions of social support, which in turn associated with reduced stress, and in turn less physical illness and greater well-being. This effect was minimized when interpersonal network size was taken into consideration. However, for those who have experienced many objective life stressors, the number of Facebook friends emerged as the stronger predictor of perceived social support. The "more-friends-the-better" heuristic is proposed as the most likely explanation for these findings.

  8. Design of a hybrid command and control mobile botnet: Presentation

    CSIR Research Space (South Africa)

    Pieterse, H

    2013-03-01

    Full Text Available smartphones controlled by a botmaster through a command and control network to serve a malicious purpose. This study presents the design of a hybrid command and control mobile botnet. It describes the propagation vectors, command and control channels...

  9. Interactions with parents and friends among chronically ill children: examining social networks.

    Science.gov (United States)

    Herzer, Michele; Umfress, Kris; Aljadeff, Gabriel; Ghai, Kanika; Zakowski, Sandra G

    2009-12-01

    Children with medical conditions often experience a combination of positive and negative social interactions with parents and friends. Adult research examining cross-domain buffering effects has documented that supportive social ties can make up for shortcomings in other social relationships. This study examined whether negative effects of strained relationships with loved ones can be buffered when children feel supported by individuals in different support networks (i.e., cross-domain buffering effects). Children with Type I diabetes (n = 56), chronic asthma (n = 54), and cystic fibrosis (n = 17) completed questionnaires during an outpatient hospital visit that assessed perceptions of support and strain from parents and friends, quality of life, self-concept, and emotional/behavioral difficulties. Parental strain was conceptualized as parental overprotection and parental rejection. Hierarchical regression analyses showed that friend support buffered the adverse effects of parental strain on child quality of life, self-concept, and emotional/behavioral difficulties. Interestingly, parental support did not buffer the negative effects of experiencing strained relationships with friends; only main effects on outcome were found. These findings partially support our hypotheses of cross-domain buffering. In this study, friendships were a protective factor for children who experienced strained relationships with parents. In contrast, although parent support had a direct impact on child outcome, it did not make up for feeling rejected by friends. Because close relationships are often strained during medical stressors, findings underscore the importance of promoting social connectedness in chronically ill children to maximize opportunities for experiencing positive social relationships.

  10. Motives for online friending and following: The dark side of social network site connections

    NARCIS (Netherlands)

    Ouwerkerk, J.W.; Johnson, B.K.

    Motives for “friending,” following, or connecting with others on social network sites are often positive, but darker motives may also play an important role. A survey with a novel Following Motives Scale (FMS) demonstrates accordingly that positive, sociable motives (i.e., others providing a valued

  11. Neural network algorithm for image reconstruction using the grid friendly projections

    International Nuclear Information System (INIS)

    Cierniak, R.

    2011-01-01

    Full text: The presented paper describes a development of original approach to the reconstruction problem using a recurrent neural network. Particularly, the 'grid-friendly' angles of performed projections are selected according to the discrete Radon transform (DRT) concept to decrease the number of projections required. The methodology of our approach is consistent with analytical reconstruction algorithms. Reconstruction problem is reformulated in our approach to optimization problem. This problem is solved in present concept using method based on the maximum likelihood methodology. The reconstruction algorithm proposed in this work is consequently adapted for more practical discrete fan beam projections. Computer simulation results show that the neural network reconstruction algorithm designed to work in this way improves obtained results and outperforms conventional methods in reconstructed image quality. (author)

  12. The most common friend first immunization

    International Nuclear Information System (INIS)

    Nian Fu-Zhong; Hu Cha-Sheng

    2016-01-01

    In this paper, a standard susceptible-infected-recovered-susceptible(SIRS) epidemic model based on the Watts–Strogatz (WS) small-world network model and the Barabsi–Albert (BA) scale-free network model is established, and a new immunization scheme — “the most common friend first immunization” is proposed, in which the most common friend’s node is described as being the first immune on the second layer protection of complex networks. The propagation situations of three different immunization schemes — random immunization, high-risk immunization, and the most common friend first immunization are studied. At the same time, the dynamic behaviors are also studied on the WS small-world and the BA scale-free network. Moreover, the analytic and simulated results indicate that the immune effect of the most common friend first immunization is better than random immunization, but slightly worse than high-risk immunization. However, high-risk immunization still has some limitations. For example, it is difficult to accurately define who a direct neighbor in the life is. Compared with the traditional immunization strategies having some shortcomings, the most common friend first immunization is effective, and it is nicely consistent with the actual situation. (paper)

  13. Design of a hybrid command and control mobile botnet

    CSIR Research Space (South Africa)

    Pieterse, H

    2013-05-01

    Full Text Available and control mobile botnet. The hybrid design explores the efficiency of multiple command and control channels against the following objectives: no single point of failure within the topology, low cost for command dissemination, limited network activities...

  14. Tele command and network automation: strategy and results; Telecomando e automacao de redes: estrategia e resultados

    Energy Technology Data Exchange (ETDEWEB)

    Bargigia, Angelo; Cerreti, Alberto; Lembo, Giorgio di; Rogai, Sergio; Veglio, Gianfranco [Enel Distribuzione Spa, Rome (Italy)

    2004-02-01

    This article presents the adopted by the ENEL Distribuzione, Italy, for the tele command and automation in the distribution line. The article describes the medium term implementation program, based on the installation of remote terminal unities, with communication through cell phone GMS for transmission of collected data to the control centers of the network. A cost versus benefit analysis conducted and the obtained results are also evaluated.

  15. Design and Implementation of a MAC Protocol for Timely and Reliable Delivery of Command and Data in Dynamic Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Phan Van Vinh

    2013-09-01

    Full Text Available This paper proposes and implements a new TDMA-based MAC protocol for providing timely and reliable delivery of data and command for monitoring and control networks. In this kind of network, sensor nodes are required to sense data from the monitoring environment periodically and then send the data to a sink. The sink determines whether the environment is safe or not by analyzing the acquired data. Sometimes, a command or control message is sent from the sink to a particular node or a group of nodes to execute the services or request further interested data. The proposed MAC protocol enables bidirectional communication, controls active and sleep modes of a sensor node to conserve energy, and addresses the problem of load unbalancing between the nodes near a sink and the other nodes. It can improve reliability of communication significantly while extending network lifetime. These claims are supported by the experimental results.

  16. Robot Task Commander with Extensible Programming Environment

    Science.gov (United States)

    Hart, Stephen W (Inventor); Yamokoski, John D. (Inventor); Wightman, Brian J (Inventor); Dinh, Duy Paul (Inventor); Gooding, Dustin R (Inventor)

    2014-01-01

    A system for developing distributed robot application-level software includes a robot having an associated control module which controls motion of the robot in response to a commanded task, and a robot task commander (RTC) in networked communication with the control module over a network transport layer (NTL). The RTC includes a script engine(s) and a GUI, with a processor and a centralized library of library blocks constructed from an interpretive computer programming code and having input and output connections. The GUI provides access to a Visual Programming Language (VPL) environment and a text editor. In executing a method, the VPL is opened, a task for the robot is built from the code library blocks, and data is assigned to input and output connections identifying input and output data for each block. A task sequence(s) is sent to the control module(s) over the NTL to command execution of the task.

  17. Army Aviation and the Mission Command Warfighting Function

    Science.gov (United States)

    2017-06-09

    information systems , processes and procedures, optimize facilities and equipment, and build understanding of the networks that link the headquarters...however further publication or sale of copyrighted images is not permissible. ii REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188...Command System , Mission Command Information Systems , Training, Mission Training Complex 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  18. Does it matter what friends think, say, or do? The role of friends' smoking attitudes and behavior for Dutch adolescents' smoking behavior.

    Science.gov (United States)

    Huisman, Chip

    2014-05-01

    Using stochastic actor-based models for longitudinal network analysis, this study examines the role of friends' smoking attitudes and behavior for Dutch adolescents' smoking behavior in four secondary schools (N = 875). The data were collected in two waves in two small suburban towns under second graders in 2008 to 2009 by means of a standardized questionnaire. Stochastic actor-based models for longitudinal network analysis can control for friendship selection while examining the effect of friends' attitudes and smoking behavior on the smoking behavior of a student. The findings suggest that friends tend to select each other on similar smoking behavior. Influence of friends' smoking behavior seems to play no role. In one school, an effect of friends' attitudes towards smoking on the smoking behavior is found. The implications for future research are to consider attitudes when examining the influence of friendship network on smoking behavior. The main limitation of this study lies in the limited sample, which makes generalizations to the general population difficult.

  19. Beyond command and control: USSOUTHCOM's use of social networking to 'connect and collaborate' during Haiti relief operations

    Science.gov (United States)

    Arias, Ricardo

    2011-06-01

    On 12 January 2010, a magnitude 7.0 earthquake devastated Haiti killing over 230,000 unsuspecting victims, injuring tens of thousands more and displacing over 1.1 million people. The physical damage was so severe that over 50 percent of buildings in and near the affected areas were completely destroyed or damaged. After struggling for decades with adversity, and besieged by a myriad of social, economic and political challenges, Haiti, its government, and its people were by most accounts already in a state of crisis. The earthquake's devastation and its aftermath shocked the world and prompted a global response. Over 800 institutions and organizations representing the whole of society - governments and their militaries, international organizations, nongovernmental organizations, public institutions, academia, corporations, and private citizens - mobilized to provide aid and relief. However, coordinating and managing their activities seemed a daunting, if not impossible, task. How could a global response achieve "unity of effort" when "unity of command" was not feasible? To provide a solution, US Southern Command (USSOUTHCOM) looked beyond traditional Command and Control systems for collaboration with non-traditional partners and implemented the All Partners Access Network (APAN) in order to "Connect and Collaborate."

  20. Communication for command and control systems

    CERN Document Server

    Morris, D J

    1983-01-01

    Communication for Command and Control Systems provides a thorough exposition of the basic theoretical and practical features involved in the design of communication networks for command and control systems. This book focuses primarily on the practical side of computer-controlled communication. This text concentrates on the communication sides of the subject by surveying the means of transferring data between the various processing points and by appraising their potential advantages and possible defects in implementation. In this respect, this book should prove useful for the practicing enginee

  1. "Friending" Professors, Parents and Bosses: A Facebook Connection Conundrum

    Science.gov (United States)

    Karl, Katherine A.; Peluchette, Joy V.

    2011-01-01

    The ever-growing popularity of Facebook has led some educators to ponder what role social networking might have in education. The authors examined student reactions to friend requests from people outside their regular network of friends including professors, parents, and employers. We found students have the most positive reactions to friend…

  2. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  3. Towards Human-Friendly Efficient Control of Multi-Robot Teams

    Science.gov (United States)

    Stoica, Adrian; Theodoridis, Theodoros; Barrero, David F.; Hu, Huosheng; McDonald-Maiers, Klaus

    2013-01-01

    This paper explores means to increase efficiency in performing tasks with multi-robot teams, in the context of natural Human-Multi-Robot Interfaces (HMRI) for command and control. The motivating scenario is an emergency evacuation by a transport convoy of unmanned ground vehicles (UGVs) that have to traverse, in shortest time, an unknown terrain. In the experiments the operator commands, in minimal time, a group of rovers through a maze. The efficiency of performing such tasks depends on both, the levels of robots' autonomy, and the ability of the operator to command and control the team. The paper extends the classic framework of levels of autonomy (LOA), to levels/hierarchy of autonomy characteristic of Groups (G-LOA), and uses it to determine new strategies for control. An UGVoriented command language (UGVL) is defined, and a mapping is performed from the human-friendly gesture-based HMRI into the UGVL. The UGVL is used to control a team of 3 robots, exploring the efficiency of different G-LOA; specifically, by (a) controlling each robot individually through the maze, (b) controlling a leader and cloning its controls to followers, and (c) controlling the entire group. Not surprisingly, commands at increased G-LOA lead to a faster traverse, yet a number of aspects are worth discussing in this context.

  4. Motives for online friending and following: The dark side of social network site connections

    OpenAIRE

    Ouwerkerk, J.W.; Johnson, B.K.

    2016-01-01

    Motives for “friending,” following, or connecting with others on social network sites are often positive, but darker motives may also play an important role. A survey with a novel Following Motives Scale (FMS) demonstrates accordingly that positive, sociable motives (i.e., others providing a valued source for humor and information, others sharing a common background, as well as relationship maintenance) and inspirational motives (i.e., others providing a target for upward social comparison) c...

  5. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    A working group (WG) study was conducted aiming at realizing human type robots. The following six working groups in the basement field were organized to study in terms mostly of items of technical development and final technical targets: platform, and remote attendance control in the basement field, maintenance of plant, etc., home service, disaster/construction, and entertainment in the application field. In the platform WG, a robot of human like form is planning which walks with two legs and works with two arms, and the following were discussed: a length of 160cm, weight of 110kg, built-in LAN, actuator specifications, modulated structure, intelligent driver, etc. In the remote attendance control WG, remote control using working function, stabilized movement, stabilized control, and network is made possible. Studied were made on the decision on a remote control cockpit by open architecture added with function and reformable, problems on the development of the standard language, etc. 77 ref., 82 figs., 21 tabs.

  6. Publishing at "the request of friends": Alexander Ross and James Beattie’s Authorial Networks in Eighteenth-Century Aberdeen

    OpenAIRE

    Ruth Knezevich

    2016-01-01

    Authorship in eighteenth-century Aberdeen often functioned differently than in London and Edinburgh. The Aberdeen model of authorship relied heavily on an intricate network of booksellers, patrons, readers, and critics involved in preparing a text to be consumed by the reading public; yet the prevailing narrative of the author as rising to “inspired genius” disallows for this network. The authorial career of poet Alexander Ross and his friend/mentorship with philosopher James Beattie offers a...

  7. Ubuntu Linux Toolbox 1000 + Commands for Ubuntu and Debian Power Users

    CERN Document Server

    Negus, Christopher

    2008-01-01

    In this handy, compact guide, you'll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

  8. Friending, IMing, and hanging out face-to-face: overlap in adolescents' online and offline social networks.

    Science.gov (United States)

    Reich, Stephanie M; Subrahmanyam, Kaveri; Espinoza, Guadalupe

    2012-03-01

    Many new and important developmental issues are encountered during adolescence, which is also a time when Internet use becomes increasingly popular. Studies have shown that adolescents are using these online spaces to address developmental issues, especially needs for intimacy and connection to others. Online communication with its potential for interacting with unknown others, may put teens at increased risk. Two hundred and fifty-one high school students completed an in-person survey, and 126 of these completed an additional online questionnaire about how and why they use the Internet, their activities on social networking sites (e.g., Facebook, MySpace) and their reasons for participation, and how they perceive these online spaces to impact their friendships. To examine the extent of overlap between online and offline friends, participants were asked to list the names of their top interaction partners offline and online (Facebook and instant messaging). Results reveal that adolescents mainly use social networking sites to connect with others, in particular with people known from offline contexts. While adolescents report little monitoring by their parents, there was no evidence that teens are putting themselves at risk by interacting with unknown others. Instead, adolescents seem to use the Internet, especially social networking sites, to connect with known others. While the study found moderate overlap between teens' closest online and offline friends, the patterns suggest that adolescents use online contexts to strengthen offline relationships. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  9. Network-Centric Applications and Tactical Networks

    National Research Council Canada - National Science Library

    Krout, Timothy; Durbano, Steven; Shearer, Ruth

    2003-01-01

    .... Command and control applications will always require communications capabilities. There are numerous examples of command and control applications that have been developed without adequate attention to the realities of tactical networks...

  10. Trust: The Key to the Success of Mission Command in the Joint Force

    Science.gov (United States)

    2015-05-18

    Malaysia , Kuala Lumpur: International Conference on ISO9000. Schmidt, Todd A. “Design, Mission Command and the Network: Enabling Organization...trust.pdf. Steele , Dennis. “Setting the Azimuth for Joint Force 2020: Globally Integrated Operations and Mission Command.” Army Magazine, November

  11. Network device interface for digitally interfacing data channels to a controller via a network

    Science.gov (United States)

    Ellerbrock, Philip J. (Inventor); Grant, Robert L. (Inventor); Konz, Daniel W. (Inventor); Winkelmann, Joseph P. (Inventor)

    2009-01-01

    A communications system and method are provided for digitally connecting a plurality of data channels, such as sensors, actuators, and subsystems, to a controller using a network bus. The network device interface interprets commands and data received from the controller and polls the data channels in accordance with these commands. Specifically, the network device interface receives digital commands and data from the controller, and based on these commands and data, communicates with the data channels to either retrieve data in the case of a sensor or send data to activate an actuator. Data retrieved from the sensor is converted into digital signals and transmitted to the controller. Network device interfaces associated with different data channels can coordinate communications with the other interfaces based on either a transition in a command message sent by the bus controller or a synchronous clock signal.

  12. Command in Air War. Centralized Versus Decentralized Control of Combat Airpower

    Science.gov (United States)

    2007-06-01

    fears that Americans were the “Great Satan ” that its enemies claimed. Groups such as Ansar al-Islam incorporated these pictures into their recruit- ing...his steps. —Proverbs 16:9 —New American Standard Bible Air Force aircraft were not involved in the battle in Mogadishu, Somalia...Command and Control Research Pro- gram, Nov. 2002. http://www.dodccrp.org/publications/ pdf / Smith_EBO.PDF. Snook, Scott A. Friendly Fire: The Accidental

  13. Decomposing the components of friendship and friends' influence on adolescent drinking and smoking.

    Science.gov (United States)

    Fujimoto, Kayo; Valente, Thomas W

    2012-08-01

    Friendship networks are an important source of peer influence. However, existing network studies vary in terms of how they operationalize friendship and friend's influence on adolescent substance use. This study uses social network analysis to characterize three types of friendship relations: (1) mutual or reciprocated, (2) directional, and (3) intimate friends. We then examine the relative effects of each friendship type on adolescent drinking and smoking behavior. Using a saturated sample from the Add Health data, a nationally representative sample of high school adolescents (N = 2,533 nested in 12 schools), we computed the level of exposure to drinking and smoking of friends using a network exposure model, and their association with individual drinking and smoking using fixed effect models. Results indicated that the influence from mutual or reciprocated type of friendship relations is stronger on adolescent substance use than directional, especially for smoking. Regarding the directionality of directional type of friendship relations, adolescents are equally influenced by both nominating and nominated friends on their drinking and smoking behavior. Results for intimate friends friendship relations indicated that the influence from "best friends" was weaker than the one from non-"best friends," which indicates that the order of friend nomination may not matter as much as nomination reciprocation. This study demonstrates that considering different features of friendship relationships is important in evaluating friends' influence on adolescent substance use. Related policy implications are discussed. Copyright © 2012 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  14. US command improvements and command vulnerability

    International Nuclear Information System (INIS)

    Ball, D.; Bethe, H.A.; Blair, B.G.; Bracken, P.; Carter, A.B.; Dickinson, H.; Garwin, R.L.; Holloway, D.; Kendall, H.W.

    1988-01-01

    In essence, the United States still relies on the strategic command system erected during the 1960s and 1970s, but as we have seen, this system suffers from a number of serious weaknesses. Among these the authors emphasized the vulnerability of vital communications even before any warheads impact directly on U.S. targets, as well as the systems; heavy reliance on a relatively small number of limited-endurance aircraft as command posts and radio relays. This paper focuses on the committed improvement program, assess its impact on command vulnerability, and offer suggestions for further command improvements designed to enhance crisis stability and to facilitate ware termination should deterrence fail. The reader should note that this chapter is rather more technical than the remainder of this book

  15. Network, system, and status software enhancements for the autonomously managed electrical power system breadboard. Volume 3: Commands specification

    Science.gov (United States)

    Mckee, James W.

    1990-01-01

    This volume (3 of 4) contains the specification for the command language for the AMPS system. The volume contains a requirements specification for the operating system and commands and a design specification for the operating system and command. The operating system and commands sits on top of the protocol. The commands are an extension of the present set of AMPS commands in that the commands are more compact, allow multiple sub-commands to be bundled into one command, and have provisions for identifying the sender and the intended receiver. The commands make no change to the actual software that implement the commands.

  16. Cyber Friendly Fire

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2011-09-01

    Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public

  17. TROVE: A User-friendly Tool for Visualizing and Analyzing Cancer Hallmarks in Signaling Networks.

    Science.gov (United States)

    Chua, Huey Eng; Bhowmick, Sourav S; Zheng, Jie

    2017-09-22

    Cancer hallmarks, a concept that seeks to explain the complexity of cancer initiation and development, provide a new perspective of studying cancer signaling which could lead to a greater understanding of this complex disease. However, to the best of our knowledge, there is currently a lack of tools that support such hallmark-based study of the cancer signaling network, thereby impeding the gain of knowledge in this area. We present TROVE, a user-friendly software that facilitates hallmark annotation, visualization and analysis in cancer signaling networks. In particular, TROVE facilitates hallmark analysis specific to particular cancer types. Available under the Eclipse Public License from: https://sites.google.com/site/cosbyntu/softwares/trove and https://github.com/trove2017/Trove. hechua@ntu.edu.sg or assourav@ntu.edu.sg. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  18. Recommendations on Future Operational Environments Command Control and Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2015-01-01

    It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of army as command control. Some significant recommendations on command control (C2) and cyber security h...

  19. On the comparison of predictive control and command governor approaches for operational control of drinking water networks: A case study

    OpenAIRE

    Tedesco, Francesco; Ocampo-Martinez, Carlos; Cassavola, Alessandro; Puig, Vicenç

    2014-01-01

    This paper evaluates the application of command governor (CG) strategy for the operational control of drinking water networks (DWN) given their large-scale and complex nature, the permanent and relevant effect of the disturbances (water demands) and their marginal stability feature. Moreover, the performance improvement offered by CG is compared with the application of model predictive control for the same management purposes and in the same context. The paper also discusses the effectiveness...

  20. 32 CFR 724.406 - Commander, Naval Medical Command.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander, Naval Medical Command. 724.406 Section 724.406 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Principal Elements of the Navy Department Discharge Review System § 724.406 Commander...

  1. Commanders' Survey: School for Command Preparation Feedback

    National Research Council Canada - National Science Library

    Frame, Adela

    1997-01-01

    .... All command designees attend the PreCommand Course (PCC). PCC provides common understanding of current doctrine, and up-to-date information on Army-wide policy, programs and special items of interest...

  2. Digital intelligent booster for DCC miniature train networks

    Science.gov (United States)

    Ursu, M. P.; Condruz, D. A.

    2017-08-01

    Modern miniature trains are now driven by means of the DCC (Digital Command and Control) system, which allows the human operator or a personal computer to launch commands to each individual train or even to control different features of the same train. The digital command station encodes these commands and sends them to the trains by means of electrical pulses via the rails of the railway network. Due to the development of the miniature railway network, it may happen that the power requirement of the increasing number of digital locomotives, carriages and accessories exceeds the nominal output power of the digital command station. This digital intelligent booster relieves the digital command station from powering the entire railway network all by itself, and it automatically handles the multiple powered sections of the network. This electronic device is also able to detect and process short-circuits and overload conditions, without the intervention of the digital command station.

  3. Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers

    Directory of Open Access Journals (Sweden)

    Pieter Burghouwt

    2015-10-01

    Full Text Available Network-based detection of botnet Command and Control communication is a difficult task if the traffic has a relatively low volume and if popular protocols, such as HTTP, are used to resemble normal traffic. We present a new network-based detection approach that is capable of detecting this type of Command and Control traffic in an enterprise network by estimating the trustworthiness of the traffic destinations. If the destination identifier of a traffic flow origins directly from: human input, prior traffic from a trusted destination, or a defined set of legitimate applications, the destination is trusted and its associated traffic is classified as normal. Advantages of this approach are: the ability of zero day malicious traffic detection, low exposure to malware by passive host-external traffic monitoring, and the applicability for real-time filtering. Experimental evaluation demonstrates successful detection of diverse types of Command and Control Traffic.

  4. Finding Friends Online: Online Activities by Deaf Students and Their Well-Being

    NARCIS (Netherlands)

    Blom, H.C.; Marschark, M.; Vervloed, M.P.J.; Knoors, H.E.T.

    2014-01-01

    Generally, deaf and hard of hearing (D/HH) children have fewer friends than hearing peers and their friendships are of a lower quality. The research hypothesis was that using the computer to communicate with new online friends through social network sites or playing games with offline friends is

  5. SOA approach to battle command: simulation interoperability

    Science.gov (United States)

    Mayott, Gregory; Self, Mid; Miller, Gordon J.; McDonnell, Joseph S.

    2010-04-01

    NVESD is developing a Sensor Data and Management Services (SDMS) Service Oriented Architecture (SOA) that provides an innovative approach to achieve seamless application functionality across simulation and battle command systems. In 2010, CERDEC will conduct a SDMS Battle Command demonstration that will highlight the SDMS SOA capability to couple simulation applications to existing Battle Command systems. The demonstration will leverage RDECOM MATREX simulation tools and TRADOC Maneuver Support Battle Laboratory Virtual Base Defense Operations Center facilities. The battle command systems are those specific to the operation of a base defense operations center in support of force protection missions. The SDMS SOA consists of four components that will be discussed. An Asset Management Service (AMS) will automatically discover the existence, state, and interface definition required to interact with a named asset (sensor or a sensor platform, a process such as level-1 fusion, or an interface to a sensor or other network endpoint). A Streaming Video Service (SVS) will automatically discover the existence, state, and interfaces required to interact with a named video stream, and abstract the consumers of the video stream from the originating device. A Task Manager Service (TMS) will be used to automatically discover the existence of a named mission task, and will interpret, translate and transmit a mission command for the blue force unit(s) described in a mission order. JC3IEDM data objects, and software development kit (SDK), will be utilized as the basic data object definition for implemented web services.

  6. Comparing the happiness effects of real and on-line friends.

    Directory of Open Access Journals (Sweden)

    John F Helliwell

    Full Text Available A recent large Canadian survey permits us to compare face-to-face ('real-life' and on-line social networks as sources of subjective well-being. The sample of 5,000 is drawn randomly from an on-line pool of respondents, a group well placed to have and value on-line friendships. We find three key results. First, the number of real-life friends is positively correlated with subjective well-being (SWB even after controlling for income, demographic variables and personality differences. Doubling the number of friends in real life has an equivalent effect on well-being as a 50% increase in income. Second, the size of online networks is largely uncorrelated with subjective well-being. Third, we find that real-life friends are much more important for people who are single, divorced, separated or widowed than they are for people who are married or living with a partner. Findings from large international surveys (the European Social Surveys 2002-2008 are used to confirm the importance of real-life social networks to SWB; they also indicate a significantly smaller value of social networks to married or partnered couples.

  7. Apparatus and method for data communication in an energy distribution network

    Science.gov (United States)

    Hussain, Mohsin; LaPorte, Brock; Uebel, Udo; Zia, Aftab

    2014-07-08

    A system for communicating information on an energy distribution network is disclosed. In one embodiment, the system includes a local supervisor on a communication network, wherein the local supervisor can collect data from one or more energy generation/monitoring devices. The system also includes a command center on the communication network, wherein the command center can generate one or more commands for controlling the one or more energy generation devices. The local supervisor can periodically transmit a data signal indicative of the data to the command center via a first channel of the communication network at a first interval. The local supervisor can also periodically transmit a request for a command to the command center via a second channel of the communication network at a second interval shorter than the first interval. This channel configuration provides effective data communication without a significant increase in the use of network resources.

  8. Friends, Depressive Symptoms, and Life Satisfaction Among Older Korean Americans.

    Science.gov (United States)

    Roh, Soonhee; Lee, Yeon-Shim; Lee, Kyoung Hag; Shibusawa, Tazuko; Yoo, Grace J

    2015-08-01

    This study examined the interactive effects of social network support and depressive symptoms on life satisfaction among older Korean Americans (KAs). Using data from a sample of 200 elders in a large metropolitan area (M age = 72.50, SD = 5.15), hierarchical regression analysis was used to examine the interaction between social network support and depressive symptoms on life satisfaction among older KAs. After controlling for demographic variables, both social network support and depressive symptoms were identified as predictors for life satisfaction. Interaction effects indicated strong associations between higher social network support specifically from friends and lower depressive symptoms with higher levels of life satisfaction. Findings highlight the important role that friends play in terms of social network support for the mental health of older KAs, and the need for geriatric practitioners to monitor and assess the quality of social network support-including friendships-when working with older KAs.

  9. Receiver Operator Characteristic Tools Graphic User Interface Extension for R Commander

    Directory of Open Access Journals (Sweden)

    Daniel Corneliu LEUCUŢA

    2015-12-01

    Full Text Available Background: Receiver Operator Characteristic (ROC curve, is a graphical plot which presents the performance of a binary classifier when the discrimination cutoff is varied. The aim of this work was to create an extension for R Commander that offers a graphical user interface for Receiver Operator Characteristic tools provided by several existing command line accessible packages like pROC and ROCR. Material and Methods: The extension was built and tested with R version 3.2.0 and R Commander 2.1-7. Results: We built an extension called RcmdrPlugin.ROC that we uploaded on the CRAN servers. The extension adds a new menu called ROC, along with two submenus pROC and ROCR that broadly corresponds to commands available to access the functions of these packages. The pROC menu offers several commands: to plot a ROC curve for a dataset or for a logistic regression model, to compare paired and unpaired ROC curves, each providing the following tabs: General (to select the variables for the analysis, and options for switching cases with controls; Smoothing (allowing the user to select different types of smoothing – binominal, density, distributions like normal, lognormal, ...; AUC (to specify the partial area under the curve (AUC options, CI (to select the options of confidence intervals (CI – the level, computing method: DeLong, bootstrap, ...; Plot (for the plotting options. The ROCR dialogue window offers more options in choosing the performance measures for the plot. Conclusion: The RcmdrPlugin.ROC extension helps less advanced users of R accessing ROC tools in a friendly graphical user interface.

  10. Social Network Sites, Friends, and Celebrities: The Roles of Social Comparison and Celebrity Involvement in Adolescents’ Body Image Dissatisfaction

    Directory of Open Access Journals (Sweden)

    Shirley S. Ho

    2016-08-01

    Full Text Available This study applies the social comparison theory to examine the effects of adolescents’ engagement in comparison with friends and celebrities on social network sites (SNSs on (a their body image dissatisfaction (BID and (b their drive to be thin (DT or muscular (DM. The study also examines celebrity involvement as an antecedent of the outcome variables. Data were collected through a survey of 1,059 adolescents in Singapore. Regression analyses indicate that SNSs use was related to adolescents’ BID. Specifically, social comparison with friends on SNSs was significantly associated with adolescents’ BID, DT, and DM. Gender differences were also observed—social comparison with celebrities was significantly associated with BID and DT among female adolescents. Celebrity involvement was significantly associated with male BID. Theoretical and practical implications were discussed.

  11. Academic Achievement and Its Impact on Friend Dynamics.

    Science.gov (United States)

    Flashman, Jennifer

    2012-01-01

    Academic achievement in adolescence is a key determinant of future educational and occupational success. Friends play an important role in the educational process. They provide support and resources and can both encourage and discourage academic achievement. As a result, the friends adolescents make may help to maintain and exacerbate inequality if friends are sorted on the basis of academic achievement. These observations prompt the question: How does academic achievement affect the friendship ties made? Using data from the high schools in the Add Health saturated sample, the author models network change using a stochastic actor-based Markov model for the co-evolution of networks and behavior. This model is carried out at the school level for each of the high schools included in the saturated sample. Results show that in the most typical American schools, similarity in academic achievement is an important and consistent predictor of friendship ties in a dynamic context. High-achieving students are more likely to extend ties to other high-achieving students, net of other sociodemographic, network, and proximity characteristics, while low-achieving students are more likely to extend ties to other low-achieving students. Adolescents respond to changes in academic achievement by changing their friendship ties.

  12. Parental influences on memories of parents and friends.

    Science.gov (United States)

    Tani, Franca; Bonechi, Alice; Peterson, Carole; Smorti, Andrea

    2010-01-01

    The authors evaluated the role parent-child relationship quality has on two types of memories, those of parents and those of friends. Participants were 198 Italian university students who recalled memories during 4 separate timed memory-fluency tasks about their preschool, elementary school, middle school, high school and university years. Half were instructed to recall memories involving parents and the remainder memories involving friends. Moreover, parent-child relationships were assessed by the Network of Relationships Inventory (NRI; W. Furman & D. Buhrmester, 1985) and Adolescents' Report of Parental Monitoring (D. M. Capaldi & G. R. Patterson, 1989). Results showed that men with positive parent-son relationships had more memories of parents and more affectively positive memories of friends, supporting a consistency model positing similarity between parent-child relationships and memories of friends. Women with positive parental relationship quality had more affectively positive memories of parents but for friends, positive relationship quality only predicted positive memories when young. At older ages, especially middle school-aged children, negative parent-daughter relationships predicted more positive memories of friends, supporting a compensatory model. The gender of parent also mattered, with fathers having a more influential role on affect for memories of friends.

  13. Defending one's friends, not one's enemies: A social network analysis of children's defending, friendship, and dislike relationships using XPNet.

    Science.gov (United States)

    Oldenburg, Beau; Van Duijn, Marijtje; Veenstra, René

    2018-01-01

    Previous studies investigating to what extent students in elementary schools defend their victimized classmates typically treated defending as an individual characteristic. Defending should, however, be seen as a directed dyadic relationship between a victim and a defender, who are embedded multiple positive and negative relationships with each other and their classmates. Accordingly, in the present study defending was investigated using social network analysis. More specifically, it was investigated to what extent defending relationships co-occurred with friendship and dislike relationships involving not only the victim and the defender but also other classmates. Bivariate Exponential Random Graph Models (ERGMs) were used to analyze the defending-friendship and defending-dislike relationships in seven grade-three classrooms. As hypothesized, the results indicated that victimized students were likely to be defended by students who they perceive as friends or who perceive them as friends. Moreover, defending was likely to occur when the victim and (potential) defender had the same friends. Victimized students were unlikely to be defended by classmates whom they disliked or who had indicated to dislike them. Finally, defending was likely to occur between students who disliked the same classmates.

  14. Show me your friends and I will tell you what type of person you are: how own profile, number of friends, and type of friends influence impression formation on social network sites

    NARCIS (Netherlands)

    Utz, S.

    2010-01-01

    This experiment examines how far extraversion of the target (self-generated information), extraversion of the target's friends (friends-generated information), and number of friends (system-generated information) influence the perceived popularity, communal orientation, and social attractiveness of

  15. Zenith-100 Microcomputer Network for Air Command and Staff College.

    Science.gov (United States)

    1987-04-01

    34 AD-A182 495 ZENI T-ipo ml CROCOMFUT E NET WOR( FOR AIR COMAND AND h SAFF CoLLG (U) AIl COMMAND ANDCSTAFF COLL MAX(WELL AFS "CAL W L GALWAY El AL...processing of documents by eliminating the time required to physically move the documents from one office to the next. Reproduction Savings. Information

  16. Friends' Alcohol-Related Social Networking Site Activity Predicts Escalations in Adolescent Drinking: Mediation by Peer Norms.

    Science.gov (United States)

    Nesi, Jacqueline; Rothenberg, W Andrew; Hussong, Andrea M; Jackson, Kristina M

    2017-06-01

    Adolescents' increased use of social networking sites (SNS) coincides with a developmental period of heightened risk for alcohol use initiation. However, little is known regarding associations between adolescents' SNS use and drinking initiation nor the mechanisms of this association. This study examined longitudinal associations among adolescents' exposure to friends' alcohol-related SNS postings, alcohol-favorable peer injunctive norms, and initiation of drinking behaviors. Participants were 658 high-school students who reported on posting of alcohol-related SNS content by self and friends, alcohol-related injunctive norms, and other developmental risk factors for alcohol use at two time points, 1 year apart. Participants also reported on initiation of three drinking behaviors: consuming a full drink, becoming drunk, and heavy episodic drinking (three or more drinks per occasion). Probit regression analyses were used to predict initiation of drinking behaviors from exposure to alcohol-related SNS content. Path analyses examined mediation of this association by peer injunctive norms. Exposure to friends' alcohol-related SNS content predicted adolescents' initiation of drinking and heavy episodic drinking 1 year later, controlling for demographic and known developmental risk factors for alcohol use (i.e., parental monitoring and peer orientation). In addition, alcohol-favorable peer injunctive norms statistically mediated the relationship between alcohol-related SNS exposure and each drinking milestone. Results suggest that social media plays a unique role in contributing to peer influence processes surrounding alcohol use and highlight the need for future investigative and preventive efforts to account for adolescents' changing social environments. Copyright © 2017 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  17. Filtering and Trust as Tools for the Operational Commander in the Information Age

    National Research Council Canada - National Science Library

    Davis, Alan D

    2006-01-01

    ... has. An analysis of this environment points to the impact of network centric warfare, information superiority, shared situational awareness, adaptability, and transparency on the commander's decision-making process...

  18. Rumor Diffusion in an Interests-Based Dynamic Social Network

    Directory of Open Access Journals (Sweden)

    Mingsheng Tang

    2013-01-01

    Full Text Available To research rumor diffusion in social friend network, based on interests, a dynamic friend network is proposed, which has the characteristics of clustering and community, and a diffusion model is also proposed. With this friend network and rumor diffusion model, based on the zombie-city model, some simulation experiments to analyze the characteristics of rumor diffusion in social friend networks have been conducted. The results show some interesting observations: (1 positive information may evolve to become a rumor through the diffusion process that people may modify the information by word of mouth; (2 with the same average degree, a random social network has a smaller clustering coefficient and is more beneficial for rumor diffusion than the dynamic friend network; (3 a rumor is spread more widely in a social network with a smaller global clustering coefficient than in a social network with a larger global clustering coefficient; and (4 a network with a smaller clustering coefficient has a larger efficiency.

  19. Tools virtualization for command and control systems

    Science.gov (United States)

    Piszczek, Marek; Maciejewski, Marcin; Pomianek, Mateusz; Szustakowski, Mieczysław

    2017-10-01

    Information management is an inseparable part of the command process. The result is that the person making decisions at the command post interacts with data providing devices in various ways. Tools virtualization process can introduce a number of significant modifications in the design of solutions for management and command. The general idea involves replacing physical devices user interface with their digital representation (so-called Virtual instruments). A more advanced level of the systems "digitalization" is to use the mixed reality environments. In solutions using Augmented reality (AR) customized HMI is displayed to the operator when he approaches to each device. Identification of device is done by image recognition of photo codes. Visualization is achieved by (optical) see-through head mounted display (HMD). Control can be done for example by means of a handheld touch panel. Using the immersive virtual environment, the command center can be digitally reconstructed. Workstation requires only VR system (HMD) and access to information network. Operator can interact with devices in such a way as it would perform in real world (for example with the virtual hands). Because of their procedures (an analysis of central vision, eye tracking) MR systems offers another useful feature of reducing requirements for system data throughput. Due to the fact that at the moment we focus on the single device. Experiments carried out using Moverio BT-200 and SteamVR systems and the results of experimental application testing clearly indicate the ability to create a fully functional information system with the use of mixed reality technology.

  20. Friends with Faces: How Social Networks Can Enhance Face Recognition and Vice Versa

    Science.gov (United States)

    Mavridis, Nikolaos; Kazmi, Wajahat; Toulis, Panos

    The "friendship" relation, a social relation among individuals, is one of the primary relations modeled in some of the world's largest online social networking sites, such as "FaceBook." On the other hand, the "co-occurrence" relation, as a relation among faces appearing in pictures, is one that is easily detectable using modern face detection techniques. These two relations, though appearing in different realms (social vs. visual sensory), have a strong correlation: faces that co-occur in photos often belong to individuals who are friends. Using real-world data gathered from "Facebook," which were gathered as part of the "FaceBots" project, the world's first physical face-recognizing and conversing robot that can utilize and publish information on "Facebook" was established. We present here methods as well as results for utilizing this correlation in both directions. Both algorithms for utilizing knowledge of the social context for faster and better face recognition are given, as well as algorithms for estimating the friendship network of a number of individuals given photos containing their faces. The results are quite encouraging. In the primary example, doubling of the recognition accuracy as well as a sixfold improvement in speed is demonstrated. Various improvements, interesting statistics, as well as an empirical investigation leading to predictions of scalability to much bigger data sets are discussed.

  1. Me and my 400 friends: the anatomy of college students' Facebook networks, their communication patterns, and well-being.

    Science.gov (United States)

    Manago, Adriana M; Taylor, Tamara; Greenfield, Patricia M

    2012-03-01

    Is there a trade-off between having large networks of social connections on social networking sites such as Facebook and the development of intimacy and social support among today's generation of emerging adults? To understand the socialization context of Facebook during the transition to adulthood, an online survey was distributed to college students at a large urban university; participants answered questions about their relationships by systematically sampling their Facebook contacts while viewing their Facebook profiles online. Results confirmed that Facebook facilitates expansive social networks that grow disproportionately through distant kinds of relationship (acquaintances and activity connections), while also expanding the number of close relationships and stranger relationships, albeit at slower rates. Those with larger networks estimated that larger numbers of contacts in their networks were observing their status updates, a form of public communication to one's entire contact list. The major function of status updates was emotional disclosure, the key feature of intimacy. This finding indicates the transformation of the nature of intimacy in the environment of a social network site. In addition, larger networks and larger estimated audiences predicted higher levels of life satisfaction and perceived social support on Facebook. These findings emphasize the psychological importance of audience in the Facebook environment. Findings also suggest that social networking sites help youth to satisfy enduring human psychosocial needs for permanent relations in a geographically mobile world--college students with higher proportions of maintained contacts from the past (primarily high school friends) perceived Facebook as a more useful tool for procuring social support. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  2. Message network simulation

    OpenAIRE

    Shih, Kuo-Tung

    1990-01-01

    Approved for public release, distribution is unlimited This thesis presents a computer simulation of a multinode data communication network using a virtual network model to determine the effects of various system parameters on overall network performance. Lieutenant Commander, Republic of China (Taiwan) Navy

  3. Analisa Eco-friendly Attitudes Dan Eco-friendly Behavior Terhadap Eco-friendly Intention Green Hotel Di Indonesia

    OpenAIRE

    Silvia, Lanny; Rudijanto, Diana Gabriela; Kristanti, Monika

    2017-01-01

    Kesadaran masyarakat akan lingkungan yang semakin meningkat membuat masyarakat gencar mencari hotel yang ramah lingkungan dibandingkan dengan hotel konvensional. Penelitian ini bertujuan untuk mengetahui perbedaan eco-friendly attitude, eco- friendly behavior, dan eco-friendly intention konsumen generasi x dan generasi y terhadap green hotel di Indonesia dan apakah eco-friendly attitudes dan eco-friendly behavior berpengaruh signifikan terhadap eco-friendly intention. Total responden dalam pe...

  4. Interference Effects Redress over Power-Efficient Wireless-Friendly Mesh Networks for Ubiquitous Sensor Communications across Smart Cities.

    Science.gov (United States)

    Santana, Jose; Marrero, Domingo; Macías, Elsa; Mena, Vicente; Suárez, Álvaro

    2017-07-21

    Ubiquitous sensing allows smart cities to take control of many parameters (e.g., road traffic, air or noise pollution levels, etc.). An inexpensive Wireless Mesh Network can be used as an efficient way to transport sensed data. When that mesh is autonomously powered (e.g., solar powered), it constitutes an ideal portable network system which can be deployed when needed. Nevertheless, its power consumption must be restrained to extend its operational cycle and for preserving the environment. To this end, our strategy fosters wireless interface deactivation among nodes which do not participate in any route. As we show, this contributes to a significant power saving for the mesh. Furthermore, our strategy is wireless-friendly, meaning that it gives priority to deactivation of nodes receiving (and also causing) interferences from (to) the rest of the smart city. We also show that a routing protocol can adapt to this strategy in which certain nodes deactivate their own wireless interfaces.

  5. Feasibility of a Friendship Network-Based Pediatric Obesity Intervention.

    Science.gov (United States)

    Giannini, Courtney M; Irby, Megan B; Skelton, Joseph A; Gesell, Sabina B

    2017-02-01

    There is growing evidence supporting social network-based interventions for adolescents with obesity. This study's aim was to determine the feasibility of a social network-based intervention by assessing adolescents' friendship networks, willingness to involve friends in treatment, and how these factors influence enjoyment. Adolescents (N = 42) were recruited from a tertiary care obesity clinic. Participants gave a list of closest friends, friendship characteristics, and which of their friends they would involve in treatment. A subset (N = 14) participated in group treatment, were encouraged to bring friends, and invited to a second interview. Participants nominated a mean of 4.0 (standard deviation [SD] = 1.6) friends and were more likely to nominate closer friends (p = 0.003). Friends who attended group sessions were more likely to have multiple friendships in common with the participant's own network (p = 0.04). Involving friends in treatment is feasible and desired by adolescents and may be a novel approach for augmenting obesity treatment outcomes.

  6. Underage Use of Social Network Sites: It's About Friends.

    Science.gov (United States)

    Barbovschi, Monica; Macháčková, Hana; Ólafsson, Kjartan

    2015-06-01

    European self-regulation to ensure children's safety on social networking sites (SNS) stipulates that children should be old enough to use their services. However, a growing number of children are not. Drawing on data from the Net Children Go Mobile (NCGM) project (2012-2014), this study focuses on children aged 9-12 years, among whom 42% have a profile on Facebook, many with the explicit permission of their parents, despite the explicit policy allowing only children aged 13 years and older. Yet, such parental influence is not the only factor contributing to an underage child having a profile. Hierarchical logistic regressions were conducted in which the odds of having a profile on Facebook among children aged 9-12 years (N=1,723) were predicted. After controlling for demographic variables, Facebook use was connected to daily use of the Internet from home (bedroom and other places), looking for new friends online, and online disinhibition (e.g., being able to talk about different things on the Internet than when speaking to people face-to-face). In terms of parental mediation, restrictions lower the probabilities of an underage child having a SNS profile, while active parental mediation increases the odds. In addition to parental mediation, peer mediation increases the chances of underage Facebook use, indicating that children play a significant role in influencing each other in adoption of new technologies and applications. Finally, digital skills related to communication have a significant effect, suggesting an integrated adoption of communicative practices online. Daily use of mobile devices had no effect in the model.

  7. Support and Conflict in Ethnically Diverse Young Adults' Relationships with Parents and Friends

    Science.gov (United States)

    Moilanen, Kristin L.; Raffaelli, Marcela

    2010-01-01

    We examined support and conflict with parents and close friends in a sample of ethnically diverse young adults (European-, Asian-, Cuban-, Latin-, and Mexican Americans). College students (N = 495) completed six subscales from the Network of Relationships Inventory (NRI; Furman & Buhrmester, 1985). Friends were rated higher than parents on…

  8. GLINT: a user-friendly toolset for the analysis of high-throughput DNA-methylation array data.

    Science.gov (United States)

    Rahmani, Elior; Yedidim, Reut; Shenhav, Liat; Schweiger, Regev; Weissbrod, Omer; Zaitlen, Noah; Halperin, Eran

    2017-06-15

    GLINT is a user-friendly command-line toolset for fast analysis of genome-wide DNA methylation data generated using the Illumina human methylation arrays. GLINT, which does not require any programming proficiency, allows an easy execution of Epigenome-Wide Association Study analysis pipeline under different models while accounting for known confounders in methylation data. GLINT is a command-line software, freely available at https://github.com/cozygene/glint/releases . It requires Python 2.7 and several freely available Python packages. Further information and documentation as well as a quick start tutorial are available at http://glint-epigenetics.readthedocs.io . elior.rahmani@gmail.com or ehalperin@cs.ucla.edu. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  9. A local network integrated into a balloon-borne apparatus

    Science.gov (United States)

    Imori, Masatosi; Ueda, Ikuo; Shimamura, Kotaro; Maeno, Tadashi; Murata, Takahiro; Sasaki, Makoto; Matsunaga, Hiroyuki; Matsumoto, Hiroshi; Shikaze, Yoshiaki; Anraku, Kazuaki; Matsui, Nagataka; Yamagami, Takamasa

    A local network is incorporated into an apparatus for a balloon-borne experiment. A balloon-borne system implemented in the apparatus is composed of subsystems interconnected through a local network, which introduces modular architecture into the system. The network decomposes the balloon-borne system into subsystems, which are similarly structured from the point of view that the systems is kept under the control of a ground station. The subsystem is functionally self-contained and electrically independent. A computer is integrated into a subsystem, keeping the subsystem under the control. An independent group of batteries, being dedicated to a subsystem, supplies the whole electricity of the subsystem. The subsystem could be turned on and off independently of the other subsystems. So communication among the subsystems needs to be based on such a protocol that could guarantee the independence of the individual subsystems. An Omninet protocol is employed to network the subsystems. A ground station sends commands to the balloon-borne system. The command is received and executed at the system, then results of the execution are returned to the ground station. Various commands are available so that the system borne on a balloon could be controlled and monitored remotely from the ground station. A subsystem responds to a specific group of commands. A command is received by a transceiver subsystem and then transferred through the network to the subsystem to which the command is addressed. Then the subsystem executes the command and returns results to the transceiver subsystem, where the results are telemetered to the ground station. The network enhances independence of the individual subsystems, which enables programs of the individual subsystems to be coded independently. Independence facilitates development and debugging of programs, improving the quality of the system borne on a balloon.

  10. Command and Control of Space Assets Through Internet-Based Technologies Demonstrated

    Science.gov (United States)

    Foltz, David A.

    2002-01-01

    The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space

  11. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  12. Correlates of Objective Social Isolation from Family and Friends among Older Adults.

    Science.gov (United States)

    Chatters, Linda M; Taylor, Harry Owen; Nicklett, Emily J; Taylor, Robert Joseph

    2018-03-03

    This study examined the correlates of objective social isolation from extended family members and friends among older adults. The analysis is based on the older adult sub-sample of the National Survey of American Life ( n = 1321). Multinomial logistic regression analyses examined race/ethnicity, demographics, functional health and family and friend network factors as correlates of objective isolation from family and friends. Only 4.47% of respondents were objectively isolated from both their extended family and friends, 10.82% were isolated from their friends, and 7.43% were isolated from their family members. Men were more likely to be objectively isolated from both family and friends and older adults who live with others were significantly more likely to be objectively isolated from their friends. When controlling for subjective social isolation, the two measures of functional health were significantly associated with objective social isolation. In particular, higher levels of self-care impairment decreased the risk of being objectively isolated from friends only, whereas higher mobility impairment was associated with an increased likelihood of being objectively isolated from friends only. Subjective evaluations of social isolation from family and friends were consistently associated with being objectively isolated from family and friends. There were no significant differences between African-Americans, Black Caribbeans and non-Hispanic Whites in objective isolation. These and other findings are discussed in detail.

  13. Correlates of Objective Social Isolation from Family and Friends among Older Adults

    Science.gov (United States)

    Chatters, Linda M.; Taylor, Harry Owen; Taylor, Robert Joseph

    2018-01-01

    This study examined the correlates of objective social isolation from extended family members and friends among older adults. The analysis is based on the older adult sub-sample of the National Survey of American Life (n = 1321). Multinomial logistic regression analyses examined race/ethnicity, demographics, functional health and family and friend network factors as correlates of objective isolation from family and friends. Only 4.47% of respondents were objectively isolated from both their extended family and friends, 10.82% were isolated from their friends, and 7.43% were isolated from their family members. Men were more likely to be objectively isolated from both family and friends and older adults who live with others were significantly more likely to be objectively isolated from their friends. When controlling for subjective social isolation, the two measures of functional health were significantly associated with objective social isolation. In particular, higher levels of self-care impairment decreased the risk of being objectively isolated from friends only, whereas higher mobility impairment was associated with an increased likelihood of being objectively isolated from friends only. Subjective evaluations of social isolation from family and friends were consistently associated with being objectively isolated from family and friends. There were no significant differences between African-Americans, Black Caribbeans and non-Hispanic Whites in objective isolation. These and other findings are discussed in detail. PMID:29510504

  14. Opinion on the examination of the control-command general architecture of the Flamanville 3 EPR reactor and of its associated platforms

    International Nuclear Information System (INIS)

    2009-06-01

    This report first recalls the different technical and hardware elements and components discussed by the ISRN (Nuclear Radioprotection and Safety Institute) in front of the Expert Permanent Group for nuclear reactors. These elements and components are concerning the control-command architecture as a whole, and the technical ability of networks, computers, and robots. It outlines the main principles which the control-and-command must comply with: compliance of each component of the retained technological solution with the design requirements corresponding to the safety classification, robustness of the whole control-command architecture. Then, it comments and sometimes criticizes the status of the various components of the control-command platforms with respect to this compliance. Eight recommendations are given for the SPPA T2000 control-command platform and for the robustness of the control-command architecture

  15. The Positive Aspects of Network Centric Command. The Ties Between Behavioral Doctrine and Technology

    National Research Council Canada - National Science Library

    Baldree, Steven

    1999-01-01

    .... Centralizing execution at the operational level due to "informational" superiority will be a step back in terms of war-fighting effectiveness and will be detrimental to commanders participating...

  16. The ergonomics of command and control

    OpenAIRE

    Stanton, NA; Baber, C

    2006-01-01

    Since its inception, just after the Second World War, ergonomics research has paid special attention to the issues surrounding human control of systems. Command and Control environments continue to represent a challenging domain for Ergonomics research. We take a broad view of Command and Control research, to include C2 (Command and Control), C3 (Command, Control and Communication), and C4 (Command, Control, Communication and Computers) as well as human supervisory control paradigms. This spe...

  17. Command and Control of Joint Air Operations through Mission Command

    Science.gov (United States)

    2016-06-01

    and outlines the C2 architecture systems, processes, and philosophy of com- mand required to enable mission command effectively. Mission Command...General Dempsey highlights the fact that “trust is the moral sinew that binds the distributed Joint Force 2020 together” and observes that “unless...con- fident about how their subordinates will make decisions and adapt to the dynamic battlespace environment. Processes, Systems, and Philosophy of

  18. Social Network Types and Mental Health Among LGBT Older Adults

    Science.gov (United States)

    Kim, Hyun-Jun; Fredriksen-Goldsen, Karen I.; Bryan, Amanda E. B.; Muraco, Anna

    2017-01-01

    Purpose of the Study: This study was designed to identify social network types among lesbian, gay, bisexual, and transgender (LGBT) older adults and examine the relationship between social network type and mental health. Design and Methods: We analyzed the 2014 survey data of LGBT adults aged 50 and older (N = 2,450) from Aging with Pride: National Health, Aging, and Sexuality/Gender Study. Latent profile analyses were conducted to identify clusters of social network ties based on 11 indicators. Multiple regression analysis was performed to examine the association between social network types and mental health. Results: We found five social network types. Ordered from greatest to least access to family, friend, and other non-family network ties, they were diverse, diverse/no children, immediate family-focused, friend-centered/restricted, and fully restricted. The friend-centered/restricted (33%) and diverse/no children network types (31%) were the most prevalent. Among individuals with the friend-centered/restricted type, access to social networks was limited to friends, and across both types children were not present. The least prevalent type was the fully restricted network type (6%). Social network type was significantly associated with mental health, after controlling for background characteristics and total social network size; those with the fully restricted type showed the poorest mental health. Implications: Unique social network types (diverse/no children and friend-centered/restricted) emerge among LGBT older adults. Moreover, individuals with fully restricted social networks are at particular risk due to heightened health needs and limited social resources. This study highlights the importance of understanding heterogeneous social relations and developing tailored interventions to promote social connectedness and mental health in LGBT older adults. PMID:28087798

  19. AFRICOM: Combatant Command for the 21st Century

    National Research Council Canada - National Science Library

    Juergens, Jr., Richard A

    2008-01-01

    ...: European Command, Southern Command, Northern Command, Central Command, and Pacific Command, as the Department of Defense's unified command structure responsible for specific geographical regions of the world...

  20. Children's perceptions of relationships with siblings, friends, and mothers: compensatory processes and links with adjustment.

    Science.gov (United States)

    Stocker, C M

    1994-11-01

    Links between children's psychological adjustment and individual differences in their perceptions of relationships with siblings, mothers, and friends were studied in a sample of 85 second-graders. Results indicated that characteristics of these relationships were significantly correlated with children's loneliness, depressive mood, self-esteem, and behavioral conduct. There were some links among children's perceptions of their relationships with siblings, friends, and mothers. A compensatory model of associations among adjustment and warmth in children's relationships with friends and mothers was supported. Children who reported that their relationships with either mothers, friends, or mothers and friends were characterized by high levels of warmth had significantly better adjustment outcomes than children who reported low levels of warmth in relationships with both friends and mothers. The importance of the network of children's relationships for their mental health is discussed.

  1. Diverse Friendship Networks and Heterogeneous Peer Effects on Adolescent Misbehaviors

    Science.gov (United States)

    Xu, Yilan; Fan, Linlin

    2018-01-01

    This study estimates peer effects in diverse friendship networks by friend types. Evidence from friendship networks for 57,351 U.S. high school adolescents demonstrates that adolescents are more likely to make friends with someone of the same immigrant status or ethnicity ('similar friends') than those with different backgrounds ('dissimilar…

  2. Social Network Types and Mental Health Among LGBT Older Adults.

    Science.gov (United States)

    Kim, Hyun-Jun; Fredriksen-Goldsen, Karen I; Bryan, Amanda E B; Muraco, Anna

    2017-02-01

    This study was designed to identify social network types among lesbian, gay, bisexual, and transgender (LGBT) older adults and examine the relationship between social network type and mental health. We analyzed the 2014 survey data of LGBT adults aged 50 and older (N = 2,450) from Aging with Pride: National Health, Aging, and Sexuality/Gender Study. Latent profile analyses were conducted to identify clusters of social network ties based on 11 indicators. Multiple regression analysis was performed to examine the association between social network types and mental health. We found five social network types. Ordered from greatest to least access to family, friend, and other non-family network ties, they were diverse, diverse/no children, immediate family-focused, friend-centered/restricted, and fully restricted. The friend-centered/restricted (33%) and diverse/no children network types (31%) were the most prevalent. Among individuals with the friend-centered/restricted type, access to social networks was limited to friends, and across both types children were not present. The least prevalent type was the fully restricted network type (6%). Social network type was significantly associated with mental health, after controlling for background characteristics and total social network size; those with the fully restricted type showed the poorest mental health. Unique social network types (diverse/no children and friend-centered/restricted) emerge among LGBT older adults. Moreover, individuals with fully restricted social networks are at particular risk due to heightened health needs and limited social resources. This study highlights the importance of understanding heterogeneous social relations and developing tailored interventions to promote social connectedness and mental health in LGBT older adults. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  3. [Social networks in drinking behaviors among Japanese: support network, drinking network, and intervening network].

    Science.gov (United States)

    Yoshihara, Chika; Shimizu, Shinji

    2005-10-01

    The national representative sample was analyzed to examine the relationship between respondents' drinking practice and the social network which was constructed of three different types of network: support network, drinking network, and intervening network. Non-parametric statistical analysis was conducted with chi square method and ANOVA analysis, due to the risk of small samples in some basic tabulation cells. The main results are as follows: (1) In the support network of workplace associates, moderate drinkers enjoyed much more sociable support care than both nondrinkers and hard drinkers, which might suggest a similar effect as the French paradox. Meanwhile in the familial and kinship network, the more intervening care support was provided, the harder respondents' drinking practice. (2) The drinking network among Japanese people for both sexes is likely to be convergent upon certain types of network categories and not decentralized in various categories. This might reflect of the drinking culture of Japan, which permits people to drink everyday as a practice, especially male drinkers. Subsequently, solitary drinking is not optional for female drinkers. (3) Intervening network analysis showed that the harder the respondents' drinking practices, the more frequently their drinking behaviors were checked in almost all the categories of network. A rather complicated gender double-standard was found in the network of hard drinkers with their friends, particularly for female drinkers. Medical professionals played a similar intervening role for men as family and kinship networks but to a less degree than friends for females. The social network is considerably associated with respondents' drinking, providing both sociability for moderate drinkers and intervention for hard drinkers, depending on network categories. To minimize the risk of hard drinking and advance self-healthy drinking there should be more research development on drinking practice and the social network.

  4. Content-aware network storage system supporting metadata retrieval

    Science.gov (United States)

    Liu, Ke; Qin, Leihua; Zhou, Jingli; Nie, Xuejun

    2008-12-01

    Nowadays, content-based network storage has become the hot research spot of academy and corporation[1]. In order to solve the problem of hit rate decline causing by migration and achieve the content-based query, we exploit a new content-aware storage system which supports metadata retrieval to improve the query performance. Firstly, we extend the SCSI command descriptor block to enable system understand those self-defined query requests. Secondly, the extracted metadata is encoded by extensible markup language to improve the universality. Thirdly, according to the demand of information lifecycle management (ILM), we store those data in different storage level and use corresponding query strategy to retrieval them. Fourthly, as the file content identifier plays an important role in locating data and calculating block correlation, we use it to fetch files and sort query results through friendly user interface. Finally, the experiments indicate that the retrieval strategy and sort algorithm have enhanced the retrieval efficiency and precision.

  5. Linux Networking Cookbook

    CERN Document Server

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  6. Force Protection and Command Relationships: Who's Responsible

    National Research Council Canada - National Science Library

    Moller, James

    1998-01-01

    .... This monograph analyzes the joint force protection program by investigating the terms: command, chain of command, command relationship, and how these terms authorize and empower a commander to implement this program across the joint force...

  7. How Friendship Network Characteristics Influence Subjective Well-Being

    NARCIS (Netherlands)

    van der Horst, Mariska; Coffé, Hilde

    2012-01-01

    This article explores how friendship network characteristics influence subjective well-being (SWB). Using data from the 2003 General Social Survey of Canada, three components of the friendship network are differentiated: number of friends, frequency of contact, and heterogeneity of friends. We argue

  8. Using friends as sensors to detect global-scale contagious outbreaks.

    Directory of Open Access Journals (Sweden)

    Manuel Garcia-Herranz

    Full Text Available Recent research has focused on the monitoring of global-scale online data for improved detection of epidemics, mood patterns, movements in the stock market political revolutions, box-office revenues, consumer behaviour and many other important phenomena. However, privacy considerations and the sheer scale of data available online are quickly making global monitoring infeasible, and existing methods do not take full advantage of local network structure to identify key nodes for monitoring. Here, we develop a model of the contagious spread of information in a global-scale, publicly-articulated social network and show that a simple method can yield not just early detection, but advance warning of contagious outbreaks. In this method, we randomly choose a small fraction of nodes in the network and then we randomly choose a friend of each node to include in a group for local monitoring. Using six months of data from most of the full Twittersphere, we show that this friend group is more central in the network and it helps us to detect viral outbreaks of the use of novel hashtags about 7 days earlier than we could with an equal-sized randomly chosen group. Moreover, the method actually works better than expected due to network structure alone because highly central actors are both more active and exhibit increased diversity in the information they transmit to others. These results suggest that local monitoring is not just more efficient, but also more effective, and it may be applied to monitor contagious processes in global-scale networks.

  9. Romantic Partners, Friends, Friends with Benefits, and Casual Acquaintances As Sexual Partners

    Science.gov (United States)

    Furman, Wyndol; Shaffer, Laura

    2011-01-01

    The purpose of the present study was to provide a detailed examination of sexual behavior with different types of partners. A sample of 163 young adults reported on their light nongenital, heavy nongenital, and genital sexual activity with romantic partners, friends, and casual acquaintances. They described their sexual activity with “friends with benefits” as well as with friends in general. Young adults were most likely to engage in sexual behavior with romantic partners, but sexual behavior also often occurred with some type of nonromantic partner. More young adults engaged in some form of sexual behavior with casual acquaintances than with friends with benefits. The frequencies of sexual behavior, however, were greater with friends with benefits than with friends or casual acquaintances. Interview and questionnaire data revealed that friends with benefits were typically friends, but not necessarily. Nonsexual activities were also less common with friends with benefits than other friends. Taken together, the findings illustrate the value of differentiating among different types of nonromantic partners and different levels of sexual behavior. PMID:21128155

  10. Structured multi-stream command language

    International Nuclear Information System (INIS)

    Glad, A.S.

    1982-12-01

    A multi-stream command language was implemented to provide the sequential and decision-making operations necessary to run the neutral-beam ion sources connected to the Doublet III tokamak fusion device. A multi-stream command language was implemented in Pascal on a Classic 7870 running under MAX IV. The purpose of this paper is threefold. First, to provide a brief description of the programs comprising the command language including the operating system interaction. Second, to give a description of the language syntax and commands necessary to develop a procedure stream. Third, to provide a description of the normal operating procedures for executing either the sequential or interactive streams

  11. Motives for Online Friending and Following: The Dark Side of Social Network Site Connections

    Directory of Open Access Journals (Sweden)

    Jaap W. Ouwerkerk

    2016-08-01

    Full Text Available Motives for “friending,” following, or connecting with others on social network sites are often positive, but darker motives may also play an important role. A survey with a novel Following Motives Scale (FMS demonstrates accordingly that positive, sociable motives (i.e., others providing a valued source for humor and information, others sharing a common background, as well as relationship maintenance and inspirational motives (i.e., others providing a target for upward social comparison can be distinguished from darker motives related to insecurity (i.e., others providing reassurance, preference for online interaction, mediated voyeurism, as well as social obligation, and even darker antisocial motives related to self-enhancement (i.e., others providing a target for downward social comparison, competition, schadenfreude, gossip, as well as “hate-following”. Results show that lower self-esteem and higher levels of need for popularity, narcissism, and dispositional schadenfreude characterize users with stronger dark side motives, whereas users with more sociable motives report more satisfaction with life, thereby providing construct validity for the novel scale. Convergent validity is demonstrated by positive relations between following motives and both time spent and following counts on different social network sites. Moreover, an embedded experiment shows that antisocial motives predicted acceptance of a Facebook friendship request from a male or female high school acquaintance who suffered a setback in the domain of appearance or status (i.e., a convenient source for self-enhancement, thereby providing additional convergent validity for the Antisocial Motives subscale.

  12. Computer Network Attack Versus Operational Maneuver from the Sea

    National Research Council Canada - National Science Library

    Herdegen, Dale

    2000-01-01

    ...) vulnerable to computer network attack (CNA). Mission command and control can reduce the impact of the loss of command and control, but it can not overcome the vast and complex array of threats...

  13. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  14. Emerging late adolescent friendship networks and Big Five personality traits: a social network approach.

    Science.gov (United States)

    Selfhout, Maarten; Burk, William; Branje, Susan; Denissen, Jaap; van Aken, Marcel; Meeus, Wim

    2010-04-01

    The current study focuses on the emergence of friendship networks among just-acquainted individuals, investigating the effects of Big Five personality traits on friendship selection processes. Sociometric nominations and self-ratings on personality traits were gathered from 205 late adolescents (mean age=19 years) at 5 time points during the first year of university. SIENA, a novel multilevel statistical procedure for social network analysis, was used to examine effects of Big Five traits on friendship selection. Results indicated that friendship networks between just-acquainted individuals became increasingly more cohesive within the first 3 months and then stabilized. Whereas individuals high on Extraversion tended to select more friends than those low on this trait, individuals high on Agreeableness tended to be selected more as friends. In addition, individuals tended to select friends with similar levels of Agreeableness, Extraversion, and Openness.

  15. Function Activation on Intelligent Buildings Using Mobile Devices through Voice Commands

    Directory of Open Access Journals (Sweden)

    Moumtadi Fatima

    2014-04-01

    Full Text Available Development of information and communication technologies has allowed the incorporation into different areas of human activity of apps that control electrical and electronic devices through voice commands. With these apps, in telemedicine people affected by some temporary decrease in their physical capacities have improved their level of autonomy; utilities have been added to educational environments to facilitate the use of IT applications to users with physical disability; finally, home automated solutions have made possible to any person with permanent limited mobility to take control over home devices using voice commands. In this article a home automated solution, developed over a client-server principle is presented. As the client device a MIDP 2.0 cell phone with a Java MicroEdition application loaded was used; as server a web server PC was used serving also as gateway towards a Konnex network, added with a speech recognizer engine. Fully functional prototype developed allowed take control over 3 devices with 87% success of the speech recognizer reliability, this percentage improved after the use of a drop-down menu of commands displayed over the monitor.

  16. Networked sensors for the combat forces

    Science.gov (United States)

    Klager, Gene

    2004-11-01

    Real-time and detailed information is critical to the success of ground combat forces. Current manned reconnaissance, surveillance, and target acquisition (RSTA) capabilities are not sufficient to cover battlefield intelligence gaps, provide Beyond-Line-of-Sight (BLOS) targeting, and the ambush avoidance information necessary for combat forces operating in hostile situations, complex terrain, and conducting military operations in urban terrain. This paper describes a current US Army program developing advanced networked unmanned/unattended sensor systems to survey these gaps and provide the Commander with real-time, pertinent information. Networked Sensors for the Combat Forces plans to develop and demonstrate a new generation of low cost distributed unmanned sensor systems organic to the RSTA Element. Networked unmanned sensors will provide remote monitoring of gaps, will increase a unit"s area of coverage, and will provide the commander organic assets to complete his Battlefield Situational Awareness (BSA) picture for direct and indirect fire weapons, early warning, and threat avoidance. Current efforts include developing sensor packages for unmanned ground vehicles, small unmanned aerial vehicles, and unattended ground sensors using advanced sensor technologies. These sensors will be integrated with robust networked communications and Battle Command tools for mission planning, intelligence "reachback", and sensor data management. The network architecture design is based on a model that identifies a three-part modular design: 1) standardized sensor message protocols, 2) Sensor Data Management, and 3) Service Oriented Architecture. This simple model provides maximum flexibility for data exchange, information management and distribution. Products include: Sensor suites optimized for unmanned platforms, stationary and mobile versions of the Sensor Data Management Center, Battle Command planning tools, networked communications, and sensor management software. Details

  17. DolphinAtack: Inaudible Voice Commands

    OpenAIRE

    Zhang, Guoming; Yan, Chen; Ji, Xiaoyu; Zhang, Taimin; Zhang, Tianchen; Xu, Wenyuan

    2017-01-01

    Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems(VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though hidden, are nonetheless audible. In this work, we design a completely inaudible attack, DolphinAttack, that modulates voice commands on ultra...

  18. Origin of Peer Influence in Social Networks

    Science.gov (United States)

    Pinheiro, Flávio L.; Santos, Marta D.; Santos, Francisco C.; Pacheco, Jorge M.

    2014-03-01

    Social networks pervade our everyday lives: we interact, influence, and are influenced by our friends and acquaintances. With the advent of the World Wide Web, large amounts of data on social networks have become available, allowing the quantitative analysis of the distribution of information on them, including behavioral traits and fads. Recent studies of correlations among members of a social network, who exhibit the same trait, have shown that individuals influence not only their direct contacts but also friends' friends, up to a network distance extending beyond their closest peers. Here, we show how such patterns of correlations between peers emerge in networked populations. We use standard models (yet reflecting intrinsically different mechanisms) of information spreading to argue that empirically observed patterns of correlation among peers emerge naturally from a wide range of dynamics, being essentially independent of the type of information, on how it spreads, and even on the class of underlying network that interconnects individuals. Finally, we show that the sparser and clustered the network, the more far reaching the influence of each individual will be.

  19. Friends interventions in psychosis: a narrative review and call to action.

    Science.gov (United States)

    Harrop, Chris; Ellett, Lyn; Brand, Rachel; Lobban, Fiona

    2015-08-01

    To highlight the importance of friendships to young people with psychosis, and the need for clinical interventions to help maintain peer relationships during illness. To structure a research agenda for developing evidence-based interventions with friends. An argument is developed through a narrative review of (i) the proven efficacy of family interventions, and (by comparison) a relative absence of friend-based interventions; (ii) the particular primacy of friendships and dating for young people, and typical effects of exclusion; and (iii) reduced friendship networks and dating experiences in psychosis, in pre-, during and post-psychosis phases, also links between exclusion and psychosis. We put forward a model of how poor friendships can potentially be a causal and/or maintenance factor for psychotic symptoms. Given this model, our thesis is that interventions aiming to maintain social networks can be hugely beneficial clinically for young people with psychosis. We give a case study to show how such an intervention can work. We call for 'friends interventions' for young people with psychosis to be developed, where professionals directly work with a young person's authentic social group to support key friendships and maintain social continuity. An agenda for future research is presented that will develop and test theoretically driven interventions. © 2014 Wiley Publishing Asia Pty Ltd.

  20. Literature review on medical incident command.

    Science.gov (United States)

    Rimstad, Rune; Braut, Geir Sverre

    2015-04-01

    It is not known what constitutes the optimal emergency management system, nor is there a consensus on how effectiveness and efficiency in emergency response should be measured or evaluated. Literature on the role and tasks of commanders in the prehospital emergency services in the setting of mass-casualty incidents has not been summarized and published. This comprehensive literature review addresses some of the needs for future research in emergency management through three research questions: (1) What are the basic assumptions underlying incident command systems (ICSs)? (2) What are the tasks of ambulance and medical commanders in the field? And (3) How can field commanders' performances be measured and assessed? A systematic literature search in MEDLINE, PubMed, PsycINFO, Embase, Cochrane Central Register of Controlled Trials, Cochrane Library, ISI Web of Science, Scopus, International Security & Counter Terrorism Reference Center, Current Controlled Trials, and PROSPERO covering January 1, 1990 through March 1, 2014 was conducted. Reference lists of included literature were hand searched. Included papers were analyzed using Framework synthesis. The literature search identified 6,049 unique records, of which, 76 articles and books where included in qualitative synthesis. Most ICSs are described commonly as hierarchical, bureaucratic, and based on military principles. These assumptions are contested strongly, as is the applicability of such systems. Linking of the chains of command in cooperating agencies is a basic difficulty. Incident command systems are flexible in the sense that the organization may be expanded as needed. Commanders may command by direction, by planning, or by influence. Commanders' tasks may be summarized as: conducting scene assessment, developing an action plan, distributing resources, monitoring operations, and making decisions. There is considerable variation between authors in nomenclature and what tasks are included or highlighted

  1. Capturing a Commander's decision making style

    Science.gov (United States)

    Santos, Eugene; Nguyen, Hien; Russell, Jacob; Kim, Keumjoo; Veenhuis, Luke; Boparai, Ramnjit; Stautland, Thomas Kristoffer

    2017-05-01

    A Commander's decision making style represents how he weighs his choices and evaluates possible solutions with regards to his goals. Specifically, in the naval warfare domain, it relates the way he processes a large amount of information in dynamic, uncertain environments, allocates resources, and chooses appropriate actions to pursue. In this paper, we describe an approach to capture a Commander's decision style by creating a cognitive model that captures his decisionmaking process and evaluate this model using a set of scenarios using an online naval warfare simulation game. In this model, we use the Commander's past behaviors and generalize Commander's actions across multiple problems and multiple decision making sequences in order to recommend actions to a Commander in a manner that he may have taken. Our approach builds upon the Double Transition Model to represent the Commander's focus and beliefs to estimate his cognitive state. Each cognitive state reflects a stage in a Commander's decision making process, each action reflects the tasks that he has taken to move himself closer to a final decision, and the reward reflects how close he is to achieving his goal. We then use inverse reinforcement learning to compute a reward for each of the Commander's actions. These rewards and cognitive states are used to compare between different styles of decision making. We construct a set of scenarios in the game where rational, intuitive and spontaneous decision making styles will be evaluated.

  2. Network Centric Warfare and Its Effect on Unit of Employmentx (UEx) Use of Mission Command

    National Research Council Canada - National Science Library

    Hannon, Jeffery A

    2005-01-01

    The 2002 NSS call for "transformING to meet the challenges and opportunities of the twenty-first century", and the Army's leadership elected to concentrate the service's transformation efforts on battle command...

  3. Combatant Commanders Informational Series, USEUCOM

    National Research Council Canada - National Science Library

    Burton, Steven

    1996-01-01

    ...) and the diverse challenges it faces require it to maintain one of the highest operational and personnel tempos of the combatant command, are limited in the opportunity of personnel new to the command...

  4. Network performance of a wireless sensor network for temperature monitoring in vineyards

    DEFF Research Database (Denmark)

    Liscano, Ramiro; Jacoub, John Khalil; Dersingh, Anand

    2011-01-01

    Wireless sensor networks (WSNs) are an emerging technology which can be used for outdoor environmental monitoring. This paper presents challenges that arose from the development and deployment of a WSN for environmental monitoring as well as network performance analysis of this network. Different...... components in our sensor network architecture are presented like the physical nodes, the sensor node code, and two messaging protocols; one for collecting sensor and network values and the other for sensor node commands. An information model for sensor nodes to support plug-and-play capabilities in sensor...... networks is also presented....

  5. The spread of sleep loss influences drug use in adolescent social networks.

    Directory of Open Access Journals (Sweden)

    Sara C Mednick

    2010-03-01

    Full Text Available Troubled sleep is a commonly cited consequence of adolescent drug use, but it has rarely been studied as a cause. Nor have there been any studies of the extent to which sleep behavior can spread in social networks from person to person to person. Here we map the social networks of 8,349 adolescents in order to study how sleep behavior spreads, how drug use behavior spreads, and how a friend's sleep behavior influences one's own drug use. We find clusters of poor sleep behavior and drug use that extend up to four degrees of separation (to one's friends' friends' friends' friends in the social network. Prospective regression models show that being central in the network negatively influences future sleep outcomes, but not vice versa. Moreover, if a friend sleeps friend uses marijuana, it increases the likelihood of marijuana use by 110%. Finally, the likelihood that an individual uses drugs increases by 19% when a friend sleeps < or =7 hours, and a mediation analysis shows that 20% of this effect results from the spread of sleep behavior from one person to another. This is the first study to suggest that the spread of one behavior in social networks influences the spread of another. The results indicate that interventions should focus on healthy sleep to prevent drug use and targeting specific individuals may improve outcomes across the entire social network.

  6. STS-37 Commander Nagel in commanders seat on OV-104's flight deck

    Science.gov (United States)

    1991-01-01

    STS-37 Commander Steven R. Nagel, wearing launch and entry suit (LES), sits at commanders station on the forward flight deck of Atlantis, Orbiter Vehicle (OV) 104. Surrounding Nagel are the seat headrest, control panels, checklists, forward flight deck windows, and three drinking water containers with straws attached to forward panel F2.

  7. 32 CFR 700.1053 - Commander of a task force.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander of a task force. 700.1053 Section 700... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any other naval commander, may detail in command of a task force, or other task command, any eligible...

  8. Command World

    National Research Council Canada - National Science Library

    Wong, Leah Y; Lange, Douglas S; Sebastyn, Jerome T; Roof, William H

    2006-01-01

    .... The Command World scenario was expressly designed as a crisis action planning exercise in order to replicate the communications, collaboration, and information requirements inherent in a military...

  9. Phil Friend julgustab riske võtma / Phil Friend ; interv. Harda Roosna

    Index Scriptorium Estoniae

    Friend, Phil

    2003-01-01

    Suurbritannia koolitus- ja konsultatsioonifirma Churchill & Friend juhataja Phil Friend vastab küsimustele oma firma missiooni kohta Hiiumaal, puuetega inimeste elu erinevuste kohta Hiiumaal ja Suurbritannias. Vt. samas: Phil Friend julgustas tööandjaid puuetega inimesi tööle võtma

  10. Command Decision-Making: Experience Counts

    National Research Council Canada - National Science Library

    Wolgast, Kelly A

    2005-01-01

    Decision-making is the mainstay of military leadership and command. Due to the changed nature of the current military environment, military commanders can no longer rely solely on the traditional Military Decision-making Process (MDMP...

  11. Proactive recruitment of cancer patients’ social networks into a smoking cessation trial

    Science.gov (United States)

    Bastian, Lori A.; Fish, Laura J.; Peterson, Bercedis L.; Biddle, Andrea K.; Garst, Jennifer; Lyna, Pauline; Molner, Stephanie; Bepler, Gerold; Kelley, Mike; Keefe, Francis J.; McBride, Colleen M.

    2011-01-01

    Background This report describes the characteristics associated with successful enrollment of smokers in the social networks (i.e., family and close friends) of patients with lung cancer into a smoking cessation intervention. Methods Lung cancer patients from four clinical sites were asked to complete a survey enumerating their family members and close friends who smoke, and provide permission to contact these potential participants. Family members and close friends identified as smokers were interviewed and offered participation in a smoking cessation intervention. Repeated measures logistic regression model examined characteristics associated with enrollment. Results A total of 1,062 eligible lung cancer patients were identified and 516 patients consented and completed the survey. These patients identified 1,325 potentially eligible family and close friends. Of these, 496 consented and enrolled in the smoking cessation program. Network enrollment was highest among patients who were white and had late-stage disease. Social network members enrolled were most likely to be female, a birth family, immediate family, or close friend, and live in close geographic proximity to the patient. Conclusions Proactive recruitment of smokers in the social networks of lung cancer patients is challenging. In this study, the majority of family members and friends declined to participate. Enlisting immediate female family members and friends, who live close to the patient as agents to proactively recruit other network members into smoking cessation trials could be used to extend reach of cessation interventions to patients’ social networks. Moreover, further consideration should be given to the appropriate timing of approaching network smokers to consider cessation. PMID:21382509

  12. Urbanism, Neighborhood Context, and Social Networks.

    Science.gov (United States)

    Cornwell, Erin York; Behler, Rachel L

    2015-09-01

    Theories of urbanism suggest that the urban context erodes individuals' strong social ties with friends and family. Recent research has narrowed focus to the neighborhood context, emphasizing how localized structural disadvantage affects community-level cohesion and social capital. In this paper, we argue that neighborhood context also shapes social ties with friends and family- particularly for community-dwelling seniors. We hypothesize that neighborhood disadvantage, residential instability, and disorder restrict residents' abilities to cultivate close relationships with neighbors and non-neighbor friends and family. Using data from the National Social Life, Health, and Aging Project (NSHAP), we find that older adults who live in disadvantaged neighborhoods have smaller social networks. Neighborhood disadvantage is also associated with less close network ties and less frequent interaction - but only among men. Furthermore, residents of disordered neighborhoods have smaller networks and weaker ties. We urge scholars to pay greater attention to how neighborhood context contributes to disparities in network-based access to resources.

  13. Paramount Interest: Command Relationships in Amphibious Warfare

    National Research Council Canada - National Science Library

    Peabody, Hitch

    2004-01-01

    In 2001, U.S. amphibious forces abandoned sixty years of established command and control doctrine, replacing the traditional senior-subordinate relationship between Navy and Marine commanders with coequal command. Why did it change...

  14. PRUB: A Privacy Protection Friend Recommendation System Based on User Behavior

    Directory of Open Access Journals (Sweden)

    Wei Jiang

    2016-01-01

    Full Text Available The fast developing social network is a double-edged sword. It remains a serious problem to provide users with excellent mobile social network services as well as protecting privacy data. Most popular social applications utilize behavior of users to build connection with people having similar behavior, thus improving user experience. However, many users do not want to share their certain behavioral information to the recommendation system. In this paper, we aim to design a secure friend recommendation system based on the user behavior, called PRUB. The system proposed aims at achieving fine-grained recommendation to friends who share some same characteristics without exposing the actual user behavior. We utilized the anonymous data from a Chinese ISP, which records the user browsing behavior, for 3 months to test our system. The experiment result shows that our system can achieve a remarkable recommendation goal and, at the same time, protect the privacy of the user behavior information.

  15. Test Telemetry And Command System (TTACS)

    Science.gov (United States)

    Fogel, Alvin J.

    1994-01-01

    The Jet Propulsion Laboratory has developed a multimission Test Telemetry and Command System (TTACS) which provides a multimission telemetry and command data system in a spacecraft test environment. TTACS reuses, in the spacecraft test environment, components of the same data system used for flight operations; no new software is developed for the spacecraft test environment. Additionally, the TTACS is transportable to any spacecraft test site, including the launch site. The TTACS is currently operational in the Galileo spacecraft testbed; it is also being provided to support the Cassini and Mars Surveyor Program projects. Minimal personnel data system training is required in the transition from pre-launch spacecraft test to post-launch flight operations since test personnel are already familiar with the data system's operation. Additionally, data system components, e.g. data display, can be reused to support spacecraft software development; and the same data system components will again be reused during the spacecraft integration and system test phases. TTACS usage also results in early availability of spacecraft data to data system development and, as a result, early data system development feedback to spacecraft system developers. The TTACS consists of a multimission spacecraft support equipment interface and components of the multimission telemetry and command software adapted for a specific project. The TTACS interfaces to the spacecraft, e.g., Command Data System (CDS), support equipment. The TTACS telemetry interface to the CDS support equipment performs serial (RS-422)-to-ethernet conversion at rates between 1 bps and 1 mbps, telemetry data blocking and header generation, guaranteed data transmission to the telemetry data system, and graphical downlink routing summary and control. The TTACS command interface to the CDS support equipment is nominally a command file transferred in non-real-time via ethernet. The CDS support equipment is responsible for

  16. Cross-section and panel estimates of peer effects in early adolescent cannabis use: With a little help from my 'friends once removed'.

    Science.gov (United States)

    Moriarty, John; McVicar, Duncan; Higgins, Kathryn

    2016-08-01

    Peer effects in adolescent cannabis are difficult to estimate, due in part to the lack of appropriate data on behaviour and social ties. This paper exploits survey data that have many desirable properties and have not previously been used for this purpose. The data set, collected from teenagers in three annual waves from 2002 to 2004 contains longitudinal information about friendship networks within schools (N = 5020). We exploit these data on network structure to estimate peer effects on adolescents from their nominated friends within school using two alternative approaches to identification. First, we present a cross-sectional instrumental variable (IV) estimate of peer effects that exploits network structure at the second degree, i.e. using information on friends of friends who are not themselves ego's friends to instrument for the cannabis use of friends. Second, we present an individual fixed effects estimate of peer effects using the full longitudinal structure of the data. Both innovations allow a greater degree of control for correlated effects than is commonly the case in the substance-use peer effects literature, improving our chances of obtaining estimates of peer effects than can be plausibly interpreted as causal. Both estimates suggest positive peer effects of non-trivial magnitude, although the IV estimate is imprecise. Furthermore, when we specify identical models with behaviour and characteristics of randomly selected school peers in place of friends', we find effectively zero effect from these 'placebo' peers, lending credence to our main estimates. We conclude that cross-sectional data can be used to estimate plausible positive peer effects on cannabis use where network structure information is available and appropriately exploited. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Developing age-friendly cities: case studies from Brussels and Manchester and implications for policy and practice.

    Science.gov (United States)

    Buffel, Tine; McGarry, Paul; Phillipson, Chris; De Donder, Liesbeth; Dury, Sarah; De Witte, Nico; Smetcoren, An-Sofie; Verté, Dominique

    2014-01-01

    Developing environments responsive to the aspirations of older people has become a major concern for social and public policy. Policies and programs directed at achieving "age-friendly" communities are considered to require a wide range of interventions, including actions at the level of the social and physical environment. This article compares the age-friendly approaches of two European cities, Brussels and Manchester, with a particular focus on policies and initiatives that promote active aging in an urban context. The article examines, first, the demographic, social, and multicultural contexts of Brussels and Manchester; second, the way in which both cities became members of the World Health Organization Global Network of Age-Friendly Cities and Communities; third, similarities and differences in the age-friendly approaches and actions adopted by both cities; and fourth, opportunities and barriers to the implementation of age-friendly policies. The article concludes by discussing the key elements and resources needed to develop age-friendly cities.

  18. U.S. Pacific Command > About USPACOM > History

    Science.gov (United States)

    USPACOM U.S. Pacific Command Search USPACOM: Search Search Search USPACOM: Search Home Leadership People's Republic of China, the Democratic People's Republic of Korea, Mongolia, and the Republic of its surrounding waters under the leadership of one commander, providing a unity of command absent from

  19. Neural network application to aircraft control system design

    Science.gov (United States)

    Troudet, Terry; Garg, Sanjay; Merrill, Walter C.

    1991-01-01

    The feasibility of using artificial neural network as control systems for modern, complex aerospace vehicles is investigated via an example aircraft control design study. The problem considered is that of designing a controller for an integrated airframe/propulsion longitudinal dynamics model of a modern fighter aircraft to provide independent control of pitch rate and airspeed responses to pilot command inputs. An explicit model following controller using H infinity control design techniques is first designed to gain insight into the control problem as well as to provide a baseline for evaluation of the neurocontroller. Using the model of the desired dynamics as a command generator, a multilayer feedforward neural network is trained to control the vehicle model within the physical limitations of the actuator dynamics. This is achieved by minimizing an objective function which is a weighted sum of tracking errors and control input commands and rates. To gain insight in the neurocontrol, linearized representations of the nonlinear neurocontroller are analyzed along a commanded trajectory. Linear robustness analysis tools are then applied to the linearized neurocontroller models and to the baseline H infinity based controller. Future areas of research identified to enhance the practical applicability of neural networks to flight control design.

  20. Neural network application to aircraft control system design

    Science.gov (United States)

    Troudet, Terry; Garg, Sanjay; Merrill, Walter C.

    1991-01-01

    The feasibility of using artificial neural networks as control systems for modern, complex aerospace vehicles is investigated via an example aircraft control design study. The problem considered is that of designing a controller for an integrated airframe/propulsion longitudinal dynamics model of a modern fighter aircraft to provide independent control of pitch rate and airspeed responses to pilot command inputs. An explicit model following controller using H infinity control design techniques is first designed to gain insight into the control problem as well as to provide a baseline for evaluation of the neurocontroller. Using the model of the desired dynamics as a command generator, a multilayer feedforward neural network is trained to control the vehicle model within the physical limitations of the actuator dynamics. This is achieved by minimizing an objective function which is a weighted sum of tracking errors and control input commands and rates. To gain insight in the neurocontrol, linearized representations of the nonlinear neurocontroller are analyzed along a commanded trajectory. Linear robustness analysis tools are then applied to the linearized neurocontroller models and to the baseline H infinity based controller. Future areas of research are identified to enhance the practical applicability of neural networks to flight control design.

  1. Global Command and Control Management Structure

    National Research Council Canada - National Science Library

    1995-01-01

    This instruction establishes: responsibilities for the Joint Staff, Services, Defense agencies, combatant and functional unified commands, and other activities regarding management of Global Command and Control (GCC...

  2. A Novel wave-form command shaper for overhead cranes

    Directory of Open Access Journals (Sweden)

    KHALED ALHAZZA

    2013-12-01

    Full Text Available In this work, a novel command shaping control strategy for oscillation reduction of simple harmonic oscillators is proposed, and validated experimentally. A wave-form acceleration command shaper is derived analytically. The performance of the proposed shaper is simulated numerically, and validated experimentally on a scaled model of an overhead crane. Amplitude modulation is used to enhance the shaper performance, which results in a modulated wave-form command shaper. It is determined that the proposed wave-form and modulated wave-form command shaper profiles are capable of eliminating travel and residual oscillations. Furthermore, unlike traditional impulse and step command shapers, the proposed command shaper has piecewise smoother acceleration, velocity, and displacement profiles. Experimental results using continuous and discrete commands are presented. Experiments with discrete commands involved embedding a saturation model-based feedback in the algorithm of the command shaper.

  3. Enablers of Self-Synchronization for Network-Centric Operations: Design of a Complex Command and Control Experiment

    National Research Council Canada - National Science Library

    Hutchins, Susan G; Kleinman, David L; Hocevar, Susan P; Kemple, William G; Porter, Gary R

    2001-01-01

    ... that is shorter than an adversary"s. Self synchronization is viewed as an essential process within military organizations that can increase speed of command and thus accelerate execution of the mission...

  4. Cohort Differences in Received Social Support in Later Life: The Role of Network Type.

    Science.gov (United States)

    Suanet, Bianca; Antonucci, Toni C

    2017-07-01

    The objective is to assess cohort differences in received emotional and instrumental support in relation to network types. The main guiding hypothesis is that due to increased salience of non-kin with recent social change, those in friend-focused and diverse network types receive more support in later birth cohorts than earlier birth cohorts. Data from the Longitudinal Aging Study Amsterdam are employed. We investigate cohort differences in total received emotional and instrumental support in a series of linear regression models comparing birth cohorts aged 55-64, 65-74, 75-84, and 85-94 across three time periods (1992, 2002, and 2012). Four network types (friend, family, restricted, and diverse) are identified. Friend-focused networks are more common in later birth cohorts, restrictive networks less common. Those in friend-focused networks in later cohorts report receiving more emotional and instrumental support. No differences in received support are evident upon diverse networks. The increased salience of non-kin is reflected in an increase in received emotional and instrumental support in friend-focused networks in later birth cohorts. The preponderance of non-kin in networks should not be perceived as a deficit model for social relationships as restrictive networks are declining across birth cohorts. © The Author 2016. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. The importance of perceived care and connectedness with friends and parents for adolescent social anxiety.

    Science.gov (United States)

    Van Zalk, Nejra; Van Zalk, Maarten

    2015-06-01

    Nonclinical social anxiety in adolescence can be highly problematic, as it likely affects current and especially new social interactions. Relationships with significant others, such as close friends, mothers, and fathers, could aid socially anxious adolescents' participation in social situations, thereby helping reduce feelings of social anxiety. We examined whether making friends as well as high friendship quality help reduce social anxiety over time, and whether friends', mothers', and fathers' care interact in reducing social anxiety. Using longitudinal data from 2,194 participants in a social network (48% girls; Mage  = 13.58) followed for 3 years, we estimated friendship selection and influence processes via a continuous time-modeling approach using SIENA. We controlled for the effects of depressive symptoms, self-esteem, gender, age, and family structure. Our findings suggest that perceived care by friends mediated the effect of making friends on social anxiety. Perceptions of mother and father, as well as friend care and connectedness, respectively, did not interact in decreasing social anxiety. Nonetheless, care and connectedness with mothers, fathers, and friends jointly predicted decreases in social anxiety. Caring relationships with friends and parents each play a role in mutually protecting early adolescents against increasing in social anxiety over time. © 2014 Wiley Periodicals, Inc.

  6. Local area networking handbook

    OpenAIRE

    O'Hara, Patricia A.

    1990-01-01

    Approved for public release; distribution is unlimited. This thesis provides Navy shore based commands with sufficient information on local area networking to (1) decide if they need a LAN, (2) determine what their networking requirements are, and (3) select a LAN that satisfies their requirements. LAN topologies, transmission media, and medium access methods are described. In addition, the OSI reference model for computer networking and the IEEE 802 LAN standards are explained in detail. ...

  7. Online and Offline Social Networks: Use of Social Networking Sites by Emerging Adults

    Science.gov (United States)

    Subrahmanyam, Kaveri; Reich, Stephanie M.; Waechter, Natalia; Espinoza, Guadalupe

    2008-01-01

    Social networking sites (e.g., MySpace and Facebook) are popular online communication forms among adolescents and emerging adults. Yet little is known about young people's activities on these sites and how their networks of "friends" relate to their other online (e.g., instant messaging) and offline networks. In this study, college students…

  8. Command in a field hospital.

    Science.gov (United States)

    Bricknell, M C M

    2003-03-01

    This paper examines the challenges involved in commanding a field hospital. There are frequent, dynamic tensions between the military culture that is based on a task-focussed, hierarchical structure and the clinical culture that is based on flat, process-focussed, multidisciplinary teams. The paper outlines the cultural environment of the field hospital and then examines the deployment sequence whereby a functioning clinical facility may be created from a group of disparate individuals. There are a number of tools that may assist with this including the personality of the Commanding Officer, individual skills, the creation of an organizational identity and the choice of command structure.

  9. Smoking-based selection and influence in gender-segregated friendship networks: a social network analysis of adolescent smoking.

    Science.gov (United States)

    Mercken, Liesbeth; Snijders, Tom A B; Steglich, Christian; Vertiainen, Erkki; de Vries, Hein

    2010-07-01

    The main goal of this study was to examine differences between adolescent male and female friendship networks regarding smoking-based selection and influence processes using newly developed social network analysis methods that allow the current state of continuously changing friendship networks to act as a dynamic constraint for changes in smoking behaviour, while allowing current smoking behaviour to be simultaneously a dynamic constraint for changes in friendship networks. Longitudinal design with four measurements. Nine junior high schools in Finland. A total of 1163 adolescents (mean age = 13.6 years) who participated in the control group of the ESFA (European Smoking prevention Framework Approach) study, including 605 males and 558 females. Smoking behaviour of adolescents, parents, siblings and friendship ties. Smoking-based selection of friends was found in male as well as female networks. However, support for influence among friends was found only in female networks. Furthermore, females and males were both influenced by parental smoking behaviour. In Finnish adolescents, both male and female smokers tend to select other smokers as friends but it appears that only females are influenced to smoke by their peer group. This suggests that prevention campaigns targeting resisting peer pressure may be more effective in adolescent girls than boys.

  10. Staying Safe on Social Network Sites

    Science.gov (United States)

    ... Tips Security Tip (ST06-003) Staying Safe on Social Networking Sites Original release date: January 26, 2011 | Last revised: ... so you should take certain precautions. What are social networking sites? Social networking sites, sometimes referred to as "friend- ...

  11. Young friendship in HFASD and typical development: friend versus non-friend comparisons.

    Science.gov (United States)

    Bauminger-Zviely, Nirit; Agam-Ben-Artzi, Galit

    2014-07-01

    This study conducted comparative assessment of friendship in preschoolers with high-functioning autism spectrum disorder (HFASD, n = 29) versus preschoolers with typical development (n = 30), focusing on interactions with friends versus acquaintances. Groups were matched on SES, verbal/nonverbal MA, IQ, and CA. Multidimensional assessments included: mothers' and teachers' reports about friends' and friendship characteristics and observed individual and dyadic behaviors throughout interactions with friends versus non-friends during construction, drawing, and free-play situations. Findings revealed group differences in peer interaction favoring the typical development group, thus supporting the neuropsychological profile of HFASD. However, both groups' interactions with friends surpassed interactions with acquaintances on several key socio-communicative and intersubjective capabilities, thus suggesting that friendship may contribute to enhancement and practice of social interaction in HFASD.

  12. Gender, Friendship Networks, and Delinquency: A Dynamic Network Approach.

    Science.gov (United States)

    Haynie, Dana L; Doogan, Nathan J; Soller, Brian

    2014-11-01

    Researchers have examined selection and influence processes in shaping delinquency similarity among friends, but little is known about the role of gender in moderating these relationships. Our objective is to examine differences between adolescent boys and girls regarding delinquency-based selection and influence processes. Using longitudinal network data from adolescents attending two large schools in AddHealth ( N = 1,857) and stochastic actor-oriented models, we evaluate whether girls are influenced to a greater degree by friends' violence or delinquency than boys (influence hypothesis) and whether girls are more likely to select friends based on violent or delinquent behavior than boys (selection hypothesis). The results indicate that girls are more likely than boys to be influenced by their friends' involvement in violence. Although a similar pattern emerges for nonviolent delinquency, the gender differences are not significant. Some evidence shows that boys are influenced toward increasing their violence or delinquency when exposed to more delinquent or violent friends but are immune to reducing their violence or delinquency when associating with less violent or delinquent friends. In terms of selection dynamics, although both boys and girls have a tendency to select friends based on friends' behavior, girls have a stronger tendency to do so, suggesting that among girls, friends' involvement in violence or delinquency is an especially decisive factor for determining friendship ties.

  13. Gender, Friendship Networks, and Delinquency: A Dynamic Network Approach**

    Science.gov (United States)

    Haynie, Dana L.; Doogan, Nathan J.; Soller, Brian

    2014-01-01

    Researchers have examined selection and influence processes in shaping delinquency similarity among friends, but little is known about the role of gender in moderating these relationships. Our objective is to examine differences between adolescent boys and girls regarding delinquency-based selection and influence processes. Using longitudinal network data from adolescents attending two large schools in AddHealth (N = 1,857) and stochastic actor-oriented models, we evaluate whether girls are influenced to a greater degree by friends' violence or delinquency than boys (influence hypothesis) and whether girls are more likely to select friends based on violent or delinquent behavior than boys (selection hypothesis). The results indicate that girls are more likely than boys to be influenced by their friends' involvement in violence. Although a similar pattern emerges for nonviolent delinquency, the gender differences are not significant. Some evidence shows that boys are influenced toward increasing their violence or delinquency when exposed to more delinquent or violent friends but are immune to reducing their violence or delinquency when associating with less violent or delinquent friends. In terms of selection dynamics, although both boys and girls have a tendency to select friends based on friends' behavior, girls have a stronger tendency to do so, suggesting that among girls, friends' involvement in violence or delinquency is an especially decisive factor for determining friendship ties. PMID:26097241

  14. Supporting a friend, housemate or partner with mental health difficulties: The student experience.

    Science.gov (United States)

    Byrom, Nicola C

    2017-07-14

    When experiencing mental health difficulties, university students turn to their friends for support. This study assessed the consequences of caregiving among a university sample, identifying predictors of caregiving burden among students. A total of 79 students with experience of supporting a friend with mental health difficulties were recruited through a UK student mental health charity to complete an online survey. Alongside qualitative data, the online survey used the Experience of Caregiving Inventory and the Involvement Evaluation Questionnaire as measures of the consequences of caregiving. Students supporting friends, housemates or partners were found to experience significant consequences of caregiving. Frequency of face-to-face contact and duration of illness predicted more negative consequences of caregiving, but these relationships were not straightforward. The presence and intensity of professional support did not influence the experience of caregiving. The study suggests that the impact of supporting friends with mental health difficulties is not insubstantial for students. Broadening the network of informal social support may help improve the experience for students supporting a friend, but currently, contact with professional services appears to have a limited effect. © 2017 John Wiley & Sons Australia, Ltd.

  15. Soviet command and control in a historical context

    OpenAIRE

    Kern, Jeffrey A.

    1981-01-01

    Approved for public release; distribution is unlimited An examination is made of the historical antecedents of present day command and control doctrine in the Soviet Union. The continuity of principal characteristics is demonstrated. The ideological determinants shaping the command and control system are first developed. These include centralism, collective decision-making, unity of command, and redundancy. Practical consequences of these are explored. The functioning of Soviet command...

  16. The use of Graphic User Interface for development of a user-friendly CRS-Stack software

    Science.gov (United States)

    Sule, Rachmat; Prayudhatama, Dythia; Perkasa, Muhammad D.; Hendriyana, Andri; Fatkhan; Sardjito; Adriansyah

    2017-04-01

    The development of a user-friendly Common Reflection Surface (CRS) Stack software that has been built by implementing Graphical User Interface (GUI) is described in this paper. The original CRS-Stack software developed by WIT Consortium is compiled in the unix/linux environment, which is not a user-friendly software, so that a user must write the commands and parameters manually in a script file. Due to this limitation, the CRS-Stack become a non popular method, although applying this method is actually a promising way in order to obtain better seismic sections, which have better reflector continuity and S/N ratio. After obtaining successful results that have been tested by using several seismic data belong to oil companies in Indonesia, it comes to an idea to develop a user-friendly software in our own laboratory. Graphical User Interface (GUI) is a type of user interface that allows people to interact with computer programs in a better way. Rather than typing commands and module parameters, GUI allows the users to use computer programs in much simple and easy. Thus, GUI can transform the text-based interface into graphical icons and visual indicators. The use of complicated seismic unix shell script can be avoided. The Java Swing GUI library is used to develop this CRS-Stack GUI. Every shell script that represents each seismic process is invoked from Java environment. Besides developing interactive GUI to perform CRS-Stack processing, this CRS-Stack GUI is design to help geophysicists to manage a project with complex seismic processing procedures. The CRS-Stack GUI software is composed by input directory, operators, and output directory, which are defined as a seismic data processing workflow. The CRS-Stack processing workflow involves four steps; i.e. automatic CMP stack, initial CRS-Stack, optimized CRS-Stack, and CRS-Stack Supergather. Those operations are visualized in an informative flowchart with self explanatory system to guide the user inputting the

  17. The influence of personal networks on the use and abuse of alcohol and drugs.

    Science.gov (United States)

    Calafat, Amador; Cajal, Berta; Juan, Montse; Mendes, Fernando; Kokkevi, Anna; Blay, Nicole; Palmer, Alfonso; Duch, Maria Angels

    2010-01-01

    Party networks of young people are very important for socialization, but can also influence their involvement in risk behaviours or they can be protective. The influence of nightlife network of friends in using alcohol/ drugs is investigated through a survey. We explore the individual-centred networks (7.360 friends) of 1.363 recreational nightlife users in 9 European cities in 2006, through 22 friend characteristics. Statistical analysis utilised factorial analysis with varimax rotation and analysis of variance. The 69% of the sample had been drunk during the last month and more than half of them had used illicit drugs. Most of the respondents use to have a stable group of friends with whom to go out. Networks main characteristics were being more or less deviant and/or prosocial. Having not network or a less prosocial network is related to be low consumers. Having a non deviant, but prosocial network is related to being a person who gets drunk without using illegal drugs. Users of illegal drugs have a deviant and prosocial network. Finally ex users have less deviant networks, but at the same time a helper and prosocial network. Males drug use patterns appear to be less affected by the characteristics of their networks. Some preventive consequences coming from these results are already known as the importance of having less deviant friends. But some other issues are less known: to enhance certain prosocial skills may have counter preventive effects among recreational users and to influence the network for preventative purposes may be more effective among females.

  18. Sensor Network-Based and User-Friendly User Location Discovery for Future Smart Homes.

    Science.gov (United States)

    Ahvar, Ehsan; Lee, Gyu Myoung; Han, Son N; Crespi, Noel; Khan, Imran

    2016-06-27

    User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD) will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i) users' privacy; (ii) device-/tag-free; and (iii) fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.

  19. Sensor Network-Based and User-Friendly User Location Discovery for Future Smart Homes

    Directory of Open Access Journals (Sweden)

    Ehsan Ahvar

    2016-06-01

    Full Text Available User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i users’ privacy; (ii device-/tag-free; and (iii fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.

  20. [The detector, the command neuron and plastic convergence].

    Science.gov (United States)

    Sokolov, E N

    1977-01-01

    The paper deals with the structure of detectors, the function of commanding neurones and the problem of relationship between detectors and commanding neurons. An example of hierarchial organization of detectors is provided by the colour analyser in which a layer of receptors, a layer of opponent neurones and a layer of colour-selective detectors are singled out. The colour detector is selectively sensitive to a certain combination of excitations at the input. If the detector is selectively activated by a certain combination of excitations at the input, the selective activation of the commanding neurone through a pool of motoneurones brings about a reaction at the output, specific in its organization. The reflexogenic zone of the reaction is determined by the detectors which converge on the commanding neurone controlling the given reaction. The plasticity of the reaction results from a plastic convergence of the detectors on the commanding neurone which controls the reaction. This comprises selective switching off the detectors from the commanding neurone (habituation) and connecting the detectors to the commanding neurone (facilitation).

  1. Graph Theoretical Analysis of Network Centric Operations Using Multi-Layer Models

    National Research Council Canada - National Science Library

    Wong-Jiru, Ann

    2006-01-01

    .... The research incorporates the importance of understanding network topology for evaluating an environment for net-centricity and using network characteristics to help commanders assess the effects...

  2. The Battle Command Sustainment Support System: Initial Analysis Report

    Science.gov (United States)

    2016-09-01

    products including jet fuels, distillate fuels, residual fuels, automotive gasoline , specified bulk lubricating oils, aircraft engine oils, fuel...contained within this report. 15. SUBJECT TERMS Mission command Software Tactical applications (TacApps) Command post ...computing environment (CPCE) Command post client Battle command sustainment support System (BCS3) Logistics

  3. Associations of a social network typology with physical and mental health risks among older adults in South Korea.

    Science.gov (United States)

    Park, N S; Jang, Y; Lee, B S; Chiriboga, D A; Chang, S; Kim, S Y

    2018-05-01

    The objectives of this study were to (1) develop an empirical typology of social networks in older Koreans; and (2) examine its effect on physical and mental health. A sample of 6900 community-dwelling older adults in South Korea was drawn from the 2014 Korean National Elderly Survey. Latent profile analysis (LPA) was conducted to derive social network types using eight common social network characteristics (marital status, living arrangement, the number and frequency of contact with close family/relatives, the number and frequency of contact with close friends, frequency of participation in social activities, and frequency of having visitors at home). The identified typologies were then regressed on self-rated health and depressive symptoms to explore the health risks posed by the group membership. The LPA identified a model with five types of social network as being most optimal (BIC = 153,848.34, entropy = .90). The groups were named diverse/family (enriched networks with more engagement with family), diverse/friend (enriched networks with more engagement with friends), friend-focused (high engagement with friends), distant (structurally disengaged), and restricted (structurally engaged but disengaged in family/friends networks). A series of regression analyses showed that membership in the restricted type was associated with more health and mental health risks than all types of social networks except the distant type. Findings demonstrate the importance of family and friends as a source of social network and call attention to not only structural but also non-structural aspects of social isolation. Findings and implications are discussed in cultural contexts.

  4. The power of (Mis)perception: Rethinking suicide contagion in youth friendship networks.

    Science.gov (United States)

    Zimmerman, Gregory M; Rees, Carter; Posick, Chad; Zimmerman, Lori A

    2016-05-01

    Suicide is a leading cause of death among youth. In the wake of peer suicide, youth are vulnerable to suicide contagion. But, questions remain about the mechanisms through which suicide spreads and the accuracy of youths' estimates of friends' suicidal behaviors. This study addresses these questions within school-aged youths' friendship networks. Social network data were drawn from two schools in the National Longitudinal Study of Adolescent to Adult Health, from which 2180 youth in grades 7-12 nominated up to ten friends. A measure of "perceived" friends' attempted suicide was constructed based on respondents' reports of their friends' attempted suicide. This measure was broader than a "true" measure of friends' attempted suicide, constructed from self-reports of nominated friends who attended respondents' schools. Sociograms graphically represented the accuracy with which suicide attempters estimated friends' suicide attempts. Results from cross-tabulation with Chi-square analysis indicated that approximately 4% of youth (88/2180) attempted suicide, and these youth disproportionately misperceived (predominantly overestimated) friends' suicidal behaviors, compared to non-suicide-attempters. Penalized logistic regression models indicated that friends' self-reported attempted suicide was unrelated to respondent attempted suicide. But, the odds of respondent attempted suicide were 2.54 times higher (95% CI, 1.06-6.10) among youth who accurately perceived friends' attempted suicide, and 5.40 times higher (95% CI, 3.34-8.77) among youth who overestimated friends' attempted suicide. The results suggest that at-risk youth overestimate their friends' suicidal behaviors, which exacerbates their own risk of suicidal behavior. Methodologically, this suggests that a continued collaboration among network scientists, suicide researchers, and medical providers is necessary to further examine the mechanisms surrounding this phenomenon. Practically, it is important to screen at

  5. Environmentally Friendly Machining

    CERN Document Server

    Dixit, U S; Davim, J Paulo

    2012-01-01

    Environment-Friendly Machining provides an in-depth overview of environmentally-friendly machining processes, covering numerous different types of machining in order to identify which practice is the most environmentally sustainable. The book discusses three systems at length: machining with minimal cutting fluid, air-cooled machining and dry machining. Also covered is a way to conserve energy during machining processes, along with useful data and detailed descriptions for developing and utilizing the most efficient modern machining tools. Researchers and engineers looking for sustainable machining solutions will find Environment-Friendly Machining to be a useful volume.

  6. Modeling and control of magnetorheological fluid dampers using neural networks

    Science.gov (United States)

    Wang, D. H.; Liao, W. H.

    2005-02-01

    Due to the inherent nonlinear nature of magnetorheological (MR) fluid dampers, one of the challenging aspects for utilizing these devices to achieve high system performance is the development of accurate models and control algorithms that can take advantage of their unique characteristics. In this paper, the direct identification and inverse dynamic modeling for MR fluid dampers using feedforward and recurrent neural networks are studied. The trained direct identification neural network model can be used to predict the damping force of the MR fluid damper on line, on the basis of the dynamic responses across the MR fluid damper and the command voltage, and the inverse dynamic neural network model can be used to generate the command voltage according to the desired damping force through supervised learning. The architectures and the learning methods of the dynamic neural network models and inverse neural network models for MR fluid dampers are presented, and some simulation results are discussed. Finally, the trained neural network models are applied to predict and control the damping force of the MR fluid damper. Moreover, validation methods for the neural network models developed are proposed and used to evaluate their performance. Validation results with different data sets indicate that the proposed direct identification dynamic model using the recurrent neural network can be used to predict the damping force accurately and the inverse identification dynamic model using the recurrent neural network can act as a damper controller to generate the command voltage when the MR fluid damper is used in a semi-active mode.

  7. Access And Monitoring WLAN Using Mobile Application

    Directory of Open Access Journals (Sweden)

    Vaibhav Jori

    2015-08-01

    Full Text Available Abstract Now a days successful functioning of computer networks is important. For that network management systems are very much important. This paper describes the method by using which a LAN network can be controlled by a user with the help of android application. For monitoring and controlling of the various activities of the network the user friendly interface must be created so user should be able to execute many commands to control the activities happening on the network. To connect the phone to the server. Wi-Fi can be used as internet connectivity tool.

  8. 32 CFR 700.1054 - Command of a naval base.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Command of a naval base. 700.1054 Section 700.1054 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... Command Detail to Duty § 700.1054 Command of a naval base. The officer detailed to command a naval base...

  9. Finding friends online: online activities by deaf students and their well-being.

    Directory of Open Access Journals (Sweden)

    Helen Blom

    Full Text Available Generally, deaf and hard of hearing (D/HH children have fewer friends than hearing peers and their friendships are of a lower quality. The research hypothesis was that using the computer to communicate with new online friends through social network sites or playing games with offline friends is associated with D/HH friendship qualities, because it removes certain communication barriers D/HH face in offline communication settings. With online questionnaires the relation between computer use and online, mixed (offline friend who you also speak in online settings, and offline friendship quality of D/HH and hearing students (18-25 years was compared in both the Netherlands (n = 100 and the United States (n = 122. In addition, the study examined whether the different friendship qualities were related to the participants' well-being. Results showed that, in general, D/HH students' friendship qualities and levels of well-being were similar to their hearing peers. The quality of the mixed friendships was positively related to well-being. Furthermore, the frequency of pc use with both online and offline friends was positively related to friendships qualities in both hearing and D/HH students. A combination of the online and offline friendship seems to be the most important friendship type for both hearing and D/HH students and it is worthwhile to encourage this friendship type.

  10. Finding friends online: online activities by deaf students and their well-being.

    Science.gov (United States)

    Blom, Helen; Marschark, Marc; Vervloed, Mathijs P J; Knoors, Harry

    2014-01-01

    Generally, deaf and hard of hearing (D/HH) children have fewer friends than hearing peers and their friendships are of a lower quality. The research hypothesis was that using the computer to communicate with new online friends through social network sites or playing games with offline friends is associated with D/HH friendship qualities, because it removes certain communication barriers D/HH face in offline communication settings. With online questionnaires the relation between computer use and online, mixed (offline friend who you also speak in online settings), and offline friendship quality of D/HH and hearing students (18-25 years) was compared in both the Netherlands (n = 100) and the United States (n = 122). In addition, the study examined whether the different friendship qualities were related to the participants' well-being. Results showed that, in general, D/HH students' friendship qualities and levels of well-being were similar to their hearing peers. The quality of the mixed friendships was positively related to well-being. Furthermore, the frequency of pc use with both online and offline friends was positively related to friendships qualities in both hearing and D/HH students. A combination of the online and offline friendship seems to be the most important friendship type for both hearing and D/HH students and it is worthwhile to encourage this friendship type.

  11. Designed to Win: An Agile Approach to Air Force Command and Control of Cyberspace

    Science.gov (United States)

    2010-06-01

    capabilities and limitations of technology with a level of control that synchronizes operations, yet allows independent action to take advantage of...was during the Roman Empire. With the exception of the semaphore telegraph and an improved road network, the same methods of communication used by...48 To provide information quickly to the ground commanders, the Aviation Section of the US Signal Corps installed primitive wireless radio sets in

  12. Associations between Aspects of Friendship Networks, Physical Activity, and Sedentary Behaviour among Adolescents

    Science.gov (United States)

    McCormack, Gavin R.; Nettel-Aguirre, Alberto; Blackstaffe, Anita; Perry, Rosemary; Hawe, Penelope

    2014-01-01

    Background. Adolescent friendships have been linked to physical activity levels; however, network characteristics have not been broadly examined. Method. In a cross-sectional analysis of 1061 adolescents (11–15 years), achieving 60 minutes/day of moderate-to-vigorous physical activity (MVPA) and participating in over 2 hours/day of sedentary behaviour were determined based on friendship network characteristics (density; proportion of active/sedentary friends; betweenness centrality; popularity; clique membership) and perceived social support. Results. Adolescents with no friendship nominations participated in less MVPA. For boys and girls, a ten percent point increase in active friends was positively associated with achievement of 60 minutes/day of MVPA (OR 1.11; 95% CI 1.02–1.21, OR 1.14; 95% CI 1.02–1.27, resp.). For boys, higher social support from friends was negatively associated with achieving 60 minutes/day of MVPA (OR 0.63; 95% CI 0.42–0.96). Compared with low density networks, boys in higher density networks were more likely to participate in over 2 hours/day of sedentary behaviour (OR 2.93; 95% CI 1.32–6.49). Social support from friends also modified associations between network characteristics and MVPA and sedentary behaviour. Conclusion. Different network characteristics appeared to have different consequences. The proportion of active close friends was associated with MVPA, while network density was associated with sedentary behaviour. This poses challenges for intervention design. PMID:25328690

  13. Associations between Aspects of Friendship Networks, Physical Activity, and Sedentary Behaviour among Adolescents

    Directory of Open Access Journals (Sweden)

    Keri Jo Sawka

    2014-01-01

    Full Text Available Background. Adolescent friendships have been linked to physical activity levels; however, network characteristics have not been broadly examined. Method. In a cross-sectional analysis of 1061 adolescents (11–15 years, achieving 60 minutes/day of moderate-to-vigorous physical activity (MVPA and participating in over 2 hours/day of sedentary behaviour were determined based on friendship network characteristics (density; proportion of active/sedentary friends; betweenness centrality; popularity; clique membership and perceived social support. Results. Adolescents with no friendship nominations participated in less MVPA. For boys and girls, a ten percent point increase in active friends was positively associated with achievement of 60 minutes/day of MVPA (OR 1.11; 95% CI 1.02–1.21, OR 1.14; 95% CI 1.02–1.27, resp.. For boys, higher social support from friends was negatively associated with achieving 60 minutes/day of MVPA (OR 0.63; 95% CI 0.42–0.96. Compared with low density networks, boys in higher density networks were more likely to participate in over 2 hours/day of sedentary behaviour (OR 2.93; 95% CI 1.32–6.49. Social support from friends also modified associations between network characteristics and MVPA and sedentary behaviour. Conclusion. Different network characteristics appeared to have different consequences. The proportion of active close friends was associated with MVPA, while network density was associated with sedentary behaviour. This poses challenges for intervention design.

  14. 32 CFR 215.7 - Command relationships.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Command relationships. 215.7 Section 215.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS EMPLOYMENT OF MILITARY RESOURCES IN THE EVENT OF CIVIL DISTURBANCES § 215.7 Command relationships...

  15. Friends Like Me: Associations in Overweight/Obese Status among Adolescent Friends by Race/Ethnicity, Sex, and Friendship Type.

    Science.gov (United States)

    Bruening, Meg; MacLehose, Richard; Eisenberg, Marla E; Kim, Sunkyung; Story, Mary; Neumark-Sztainer, Dianne

    2015-12-01

    Little is known about how interpersonal friend relationships are associated with obesity in young people, particularly with regard to how race/ethnicity, type of friendship, and sex affect the association between friends' and adolescents' weight status. This study examined associations in weight status among adolescents and their friends, exploring magnitudes of associations across friendship type, sex, and race/ethnicity. As part of EAT-2010 (Eating and Activity in Teens), friend nominations and anthropometrics were obtained from adolescents (n = 2099: 54% female; 80% nonwhite; mean age: 14.2 ± 1.9 years). Generalized estimating equation logistic regression models were used to test associations between adolescents' overweight/obese status and friends' (i.e., friend group, female friends, male friends, female best friends, and male best friends) overweight/obese status. Interactions by adolescent race/ethnicity were examined. The majority of significant associations were observed among white female adolescents' who had a 22-40% higher prevalence of overweight/obesity if their friends were overweight compared to white females whose friends were not overweight. In contrast, there were few significant differences for other adolescent female and male racial/ethnic groups for girls and boys. Results for friend groups and best friends were generally similar to one another. The association between friend and adolescent overweight/obese status depended on adolescents' sex, race/ethnicity, and friendship type. Given the similarities among friends, obesity interventions targeting youth, especially white females, should consider involving friends.

  16. Human-Systems Integration (HSI) and the Network Integration Evaluations (NIEs), Part 3: Mitigating Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2016-06-01

    require higher levels of mental ability as well as higher levels of education , training, and experience for effective use . In short, ICT insertions such...the people using the gizmos” (Wallace 2005, p. 20). Personnel, training, and organization are important aspects of overall mission command system...organizational learning is important with respect to how well a test unit will use new equipment suites during an exercise such as the NIEs (Alberts

  17. Schema for Spacecraft-Command Dictionary

    Science.gov (United States)

    Laubach, Sharon; Garcia, Celina; Maxwell, Scott; Wright, Jesse

    2008-01-01

    An Extensible Markup Language (XML) schema was developed as a means of defining and describing a structure for capturing spacecraft command- definition and tracking information in a single location in a form readable by both engineers and software used to generate software for flight and ground systems. A structure defined within this schema is then used as the basis for creating an XML file that contains command definitions.

  18. 32 CFR 552.65 - Command supervision.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Command supervision. 552.65 Section 552.65 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Solicitation on Military Reservations § 552.65 Command supervision. (a) All insurance...

  19. Characteristics of the TRISTAN control computer network

    International Nuclear Information System (INIS)

    Kurokawa, Shinichi; Akiyama, Atsuyoshi; Katoh, Tadahiko; Kikutani, Eiji; Koiso, Haruyo; Oide, Katsunobu; Shinomoto, Manabu; Kurihara, Michio; Abe, Kenichi

    1986-01-01

    Twenty-four minicomputers forming an N-to-N token-ring network control the TRISTAN accelerator complex. The computers are linked by optical fiber cables with 10 Mbps transmission speed. The software system is based on NODAL, a multicomputer interpretive language developed at the CERN SPS. The high-level services offered to the users of the network are remote execution by the EXEC, EXEC-P and IMEX commands of NODAL and uniform file access throughout the system. The network software was designed to achieve the fast response of the EXEC command. The performance of the network is also reported. Tasks that overload the minicomputers are processed on the KEK central computers. One minicomputer in the network serves as a gateway to KEKNET, which connects the minicomputer network and the central computers. The communication with the central computers is managed within the framework of the KEK NODAL system. NODAL programs communicate with the central computers calling NODAL functions; functions for exchanging data between a data set on the central computers and a NODAL variable, submitting a batch job to the central computers, checking the status of the submitted job, etc. are prepared. (orig.)

  20. The Combat Cloud: Enabling Multi-Domain Command and Control Across the Range of Military Operations

    Science.gov (United States)

    2017-03-01

    fire support coordination measures , its potential to enhance the close air support and personnel recovery missions, interagency coordination...connectivity, such as that of a Long Term Evolution ( LTE ) network. As the user transitions out of the area of LTE coverage, the connectivity then...improving the flexibility and use of fire support coordination measures (FSCM). Joint doctrine defines a FSCM as, “A measure employed by commanders to

  1. Enhancing network centric operations doctrine to support civil military cooperation in disaster management

    NARCIS (Netherlands)

    Wolbers, J.J.; Beeres, R.; Bakx, G.; de Waard, E.; Rietjens, S.

    2016-01-01

    Network Centric Operations is a promising command doctrine in both military operations and during civil disaster management. As both sectors started intensifying their joint operational capacity through civil-military collaboration, it becomes increasingly relevant to address the different command

  2. Friend Finder (Game)

    Science.gov (United States)

    ... for a spot on the Friend Finder All-Star List. Earn your spot by showing you're savvy when it comes to making friends online . Downloads Please download and share our ... Email Updates Blog Feed Facebook YouTube Twitter The Federal Trade Commission (FTC) is the ...

  3. Airline network development in Europe and its implications for airport planning

    NARCIS (Netherlands)

    Burghouwt, G.

    2007-01-01

    Order by Fax Printer Friendly PDF Brochure Send to Friend Enquire before Buying Hard Copy Airline Network Development in Europe and its Implications for Airport Planning Ashgate Publishing, March 2007, Pages: 300 Description Table of Contents Enquire before Buying Send to a Friend The ongoing

  4. The Marihuana Dilemma: Challenge to Commanders.

    Science.gov (United States)

    The marihuana dilemma poses a major challenge to commanders in the US Army today. The problem was analyzed as to the characteristics of the drug...available to commanders to meet the challenge. The essay concludes that marihuana should not be legalized; drug users or former drug users should not be

  5. Issues and Solutions for Command Post Simulations

    National Research Council Canada - National Science Library

    Stytz, Martin R; Banks, Sheila B

    2006-01-01

    .... Unfortunately, the modeling of joint command post teams is still very much in its infancy and this lack of foundational research hinders our ability to assess the performance of command post teams...

  6. 76 FR 19893 - Unified Command Plan 2011

    Science.gov (United States)

    2011-04-08

    ... Plan 2011 Memorandum for the Secretary of Defense Pursuant to my authority as Commander in Chief, I hereby approve and direct the implementation of the revised Unified Command Plan. Consistent with title...

  7. When Sharing Is a Bad Idea: The Effects of Online Social Network Engagement and Sharing Passwords with Friends on Cyberbullying Involvement.

    Science.gov (United States)

    Meter, Diana J; Bauman, Sheri

    2015-08-01

    Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior.

  8. Friend or Foe? Fake Profile Identification in Online Social Networks

    OpenAIRE

    Fire, Michael; Kagan, Dima; Elyashar, Aviad; Elovici, Yuval

    2013-01-01

    The amount of personal information unwillingly exposed by users on online social networks is staggering, as shown in recent research. Moreover, recent reports indicate that these networks are infested with tens of millions of fake users profiles, which may jeopardize the users' security and privacy. To identify fake users in such networks and to improve users' security and privacy, we developed the Social Privacy Protector software for Facebook. This software contains three protection layers,...

  9. Friendship Network Characteristics Are Associated with Physical Activity and Sedentary Behavior in Early Adolescence.

    Science.gov (United States)

    Marks, Jennifer; de la Haye, Kayla; Barnett, Lisa M; Allender, Steven

    2015-01-01

    There is limited understanding of the association between peer social networks and physical activity (PA), sedentary and screen-related behaviors. This study reports on associations between personal network characteristics and these important health behaviors for early adolescents. Participants were 310 students, aged 11-13 years, from fifteen randomly selected Victorian primary schools (43% response rate). PA and sedentary behaviors were collected via accelerometer and self-report questionnaire, and anthropometric measures via trained researchers. Participants nominated up to fifteen friends, and described the frequency of interaction and perceived activity intensity of these friends. Personal network predictors were examined using regression modelling for PA and sedentary/screen behavior. Perceived activity levels of friends, and friendships with very frequent interaction were associated with outside-of-school PA and/or sedentary/screen time. Differences according to sex were also observed in the association between network characteristics and PA and sedentary time. A higher number of friends and greater proportion of same sex friends were associated with boys engaging in more moderate-to-vigorous PA outside of school hours. PA intensity during school-day breaks was positively associated with having a greater proportion of friends who played sports for girls, and a greater proportion of male friends for boys. Friendship network characteristics are associated with PA and sedentary/screen time in late childhood/early adolescence, and these associations differ by sex. The positive influence of very active peers may be a promising avenue to strengthen traditional interventions for the promotion of PA and reduction in screen time.

  10. Command and motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher; Hvidtved, Johan; Andersen, Lotte Bøgh

    2014-01-01

    Motivated employees are crucial to organizations, but external interventions such as command systems and financial incentives may decrease motivation. If these external interventions are perceived to be controlling, they are expected to crowd out intrinsic motivation, and this may also apply...... to other types of autonomous motivation such as public service motivation. The perception of external interventions is thus expected to be vital. This article investigates how the perception of a specific command system (obligatory student plans) is associated with intrinsic motivation and public service...... motivation. Using a dataset with 3,230 school teachers in Denmark, a structural equation model shows that the perception of obligatory student plans as controlling is negatively associated with all of the investigated types of employee motivation, supporting that motivation crowding can occur....

  11. 32 CFR 700.1056 - Command of a ship.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Command of a ship. 700.1056 Section 700.1056 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS Precedence, Authority and Command Detail to Duty § 700.1056 Command of a...

  12. The Linux command line a complete introduction

    CERN Document Server

    Shotts, William E

    2012-01-01

    You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more.

  13. Social Network Sensors for Early Detection of Contagious Outbreaks

    Science.gov (United States)

    Christakis, Nicholas A.; Fowler, James H.

    2010-01-01

    Current methods for the detection of contagious outbreaks give contemporaneous information about the course of an epidemic at best. It is known that individuals near the center of a social network are likely to be infected sooner during the course of an outbreak, on average, than those at the periphery. Unfortunately, mapping a whole network to identify central individuals who might be monitored for infection is typically very difficult. We propose an alternative strategy that does not require ascertainment of global network structure, namely, simply monitoring the friends of randomly selected individuals. Such individuals are known to be more central. To evaluate whether such a friend group could indeed provide early detection, we studied a flu outbreak at Harvard College in late 2009. We followed 744 students who were either members of a group of randomly chosen individuals or a group of their friends. Based on clinical diagnoses, the progression of the epidemic in the friend group occurred 13.9 days (95% C.I. 9.9–16.6) in advance of the randomly chosen group (i.e., the population as a whole). The friend group also showed a significant lead time (pepidemic, a full 46 days before the peak in daily incidence in the population as a whole. This sensor method could provide significant additional time to react to epidemics in small or large populations under surveillance. The amount of lead time will depend on features of the outbreak and the network at hand. The method could in principle be generalized to other biological, psychological, informational, or behavioral contagions that spread in networks. PMID:20856792

  14. Mobile infostation network technology

    Science.gov (United States)

    Rajappan, Gowri; Acharya, Joydeep; Liu, Hongbo; Mandayam, Narayan; Seskar, Ivan; Yates, Roy

    2006-05-01

    Inefficient use of network resources on the battlefield is a serious liability: if an asset communicates with the network command for data-a terrain map, for instance-it ties up the end-to-end network resources. When many such assets contend for data simultaneously, traffic is limited by the slowest link along the path from the network command to the asset. A better approach is for a local server, known as an infostation, to download data on an anticipated-need basis when the network load is low. The infostation can then dump data when needed to the assets over a high-speed wireless connection. The infostation serves the local assets over an OFDM-based wireless data link that has MIMO enhancements for high data rate and robustness. We aim for data rate in excess of 100 Mbps, spectral efficiency in excess of 5 bits/sec/Hz, and robustness to poor channel conditions and jammers. We propose an adaptive physical layer that determines power levels, modulation schemes, and the MIMO enhancements to use based on the channel state and the level of interference in the system. We also incorporate the idea of superuser: a user who is allowed preferential use of the high data rate link. We propose a MAC that allows for this priority-based bandwidth allocation scheme. The proposed infostation MAC is integrated tightly with the physical layer through a cross-layer design. We call the proposed infostation PHY, MAC, and network technology, collectively, as the Mobile Infostation Network Technology (MINT).

  15. Three astronauts inside Command Module Simulator during Apollo Simulation

    Science.gov (United States)

    1968-01-01

    Three astronauts inside the Command Module Simulator in bldg 5 during an Apollo Simulation. Left to right are Astronauts Thomas P. Stafford, commander; John W. Young, command module pilot; and Eugene A. Cernan, lunar module pilot.

  16. Operational Maneuver from the Sea and Amphibious Command Relationships: Is It time for a Joint Force Amphibious Component Commander?

    National Research Council Canada - National Science Library

    Bennett, Michael

    2004-01-01

    .... In a joint community that is becoming increasingly dependant on the use of functional component commanders in the execution of major operations, the need for a Joint Force Amphibious Component Commander (JFAMCC...

  17. Unit Testing for Command and Control Systems

    Science.gov (United States)

    Alexander, Joshua

    2018-01-01

    Unit tests were created to evaluate the functionality of a Data Generation and Publication tool for a command and control system. These unit tests are developed to constantly evaluate the tool and ensure it functions properly as the command and control system grows in size and scope. Unit tests are a crucial part of testing any software project and are especially instrumental in the development of a command and control system. They save resources, time and costs associated with testing, and catch issues before they become increasingly difficult and costly. The unit tests produced for the Data Generation and Publication tool to be used in a command and control system assure the users and stakeholders of its functionality and offer assurances which are vital in the launching of spacecraft safely.

  18. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  19. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  20. Risk aversion and social networks

    NARCIS (Netherlands)

    Kovářík, J.; van der Leij, M.J.

    2014-01-01

    This paper first investigates empirically the relationship between risk aversion and social network structure in a large group of undergraduate students. We find that risk aversion is strongly correlated to local network clustering, that is, the probability that one has a social tie to friends of

  1. AN/VRC 118 Mid-Tier Networking Vehicular Radio (MNVR) and Joint Enterprise Network Manager (JENM) Early Fielding Report

    Science.gov (United States)

    2017-01-18

    requirements. The Army intends to conduct the MNVR Initial Operational Test and Evaluation ( IOT &E) with the new radio in FY21 to support a fielding decision...improve the commander’s ability to conduct mission command over the MNVR WNW mid-tier network. Network Usage During the 2016 MNVR Operational...its reliability requirement in a loaded network simulating full brigade usage . Based on the results of developmental test, the Army made

  2. Social networks and mental health in post-conflict Mitrovica, Kosova.

    Science.gov (United States)

    Nakayama, Risa; Koyanagi, Ai; Stickley, Andrew; Kondo, Tetsuo; Gilmour, Stuart; Arenliu, Aliriza; Shibuya, Kenji

    2014-11-17

    To investigate the relation between social networks and mental health in the post-conflict municipality of Mitrovica, Kosovo. Using a three-stage stratified sampling method, 1239 respondents aged 16 years or above were recruited in the Greater Mitrovica region. Social network depth was measured by the frequency of contacts with friends, relatives and strangers. Depression and anxiety were measured using the Hospital Anxiety and Depression Scale (HADS). Multivariate logistic regression was used to examine the association between social network depth and mental health. The analytical sample consisted of 993 respondents. The prevalence of depression (54.3%) and anxiety (64.4%) were extremely high. In multiple regression analysis, a lower depth of social network (contact with friends) was associated with higher levels of both depression and anxiety. This study has shown that only one variety of social network--contact with friends--was important in terms of mental health outcomes in a population living in an area heavily affected by conflict. This suggests that the relation between social networks and mental health may be complex in that the effects of different forms of social network on mental health are not uniform and may depend on the way social networks are operationalised and the particular context in which the relationship is examined.

  3. Network protocol 'EPAP'; Network protokoru 'EPAP'

    Energy Technology Data Exchange (ETDEWEB)

    Kobori, T.; Fujita, F.; Iwamoto, S. [Fuji Electric Co. Ltd., Toyo (Japan)

    2000-10-10

    The Ethernet, a standard of information networks, has begun to be applied to the control local area network (LAN). To apply the Ethernet to the field level, Fuji Electric has newly developed the communication protocol 'Ethernet precision access protocol (EPAP)' in which a command/response method is structured on the user datagram protocol (UDP) to realize real time and high reliability. Further, we have implemented the EPAP on the bus interface module of the open PIO. This paper outlines the EPAP and its implementation. (author)

  4. Friends as a Bridge to Parental Influence: Implications for Adolescent Alcohol Use

    Science.gov (United States)

    Ragan, Daniel T.; Osgood, D. Wayne; Feinberg, Mark E.

    2014-01-01

    The current study investigates the possibility that friendship networks connect adolescents to influence from a broader group of adults beyond their own families. In doing so, we combine two rich traditions of research on adult influence on children and adolescents. Family research has suggested a number of ways in which effective parenting can reduce deviant behavior among adolescents. In addition, research on neighborhoods has advanced the idea that adults outside of the immediate family can exert social control that may reduce deviance. We employ longitudinal social network analysis to examine data drawn from the PROSPER Peers Project, a longitudinal study of adolescents following over 12,000 students in 27 non-metropolitan communities as they moved from 6th through 9th grade. We find evidence that the behavior of friends’ parents is linked, both directly and indirectly, to adolescent alcohol use. Findings suggest that much of the influence from friends’ parents is mediated through peer behavior, but that parental knowledge reported by friends continues to be associated with alcohol use even when controlling for competing mechanisms. Furthermore, adolescents tend to choose friends who report similar levels of parenting as themselves. Our results provide support for the position that friendships in adolescence connect youth to a broader network of adults and illustrate how adults outside of the family contribute to the social control of adolescents. PMID:24812438

  5. Risk of Social Isolation among Older Patients: What Factors Affect the Availability of Family, Friends, and Neighbors upon Hospitalization?

    Science.gov (United States)

    Ha, Jung-Hwa; Hougham, Gavin W; Meltzer, David O

    2018-03-02

    To examine the prevalence of social isolation among older patients admitted to a hospital, and the effects of sociodemographic and health-related factors on the availability of their family, friends, and neighbor networks. Analyses are based on interviews with a sample of 2,449 older patients admitted to an urban academic medical center in the United States. A nine-item version of Lubben's Social Network Scale was developed and used to assess the availability of different social networks. About 47% of the sample was at risk of social isolation. The oldest old and non-White older adults showed greater risk. The availability of family networks was associated with age, sex, marital status, and prior hospitalization; friend networks with age, race, education, prior hospitalization, and functional limitations; neighbor networks with race, education, marital status, and functional limitations. The risk of social isolation and the availability of social support for hospitalized older adults varies by both patient and network characteristics. Health professionals should attend to this risk and the factors associated with such risk. By assessing the availability of various types and frequency of support among older patients, health professionals can better identify those who may need additional support after discharge. Such information should be used in discharge planning to help prevent unnecessary complications and potential readmission.

  6. Ready...Set... Command! Rethinking Training for Squadron Commanders

    Science.gov (United States)

    2016-02-16

    commander faces many difficult challenges. When discussing the Air Force’s troubling trend in suicide rates, Airmen “blame being overworked ...Air Forces total suicides despite making up only 16 percent of the service.3 Three years later the Air Force Times reveals continued challenges in...23 challenges. They must address complex issues facing the Air Force, such as troubling suicide rates, manning shortfalls, decreasing resources

  7. Reciprocal Family, Friendship and Church Support Networks of African Americans: Findings from the National Survey of American Life.

    Science.gov (United States)

    Taylor, Robert Joseph; Mouzon, Dawne M; Nguyen, Ann W; Chatters, Linda M

    2016-12-01

    This study examined reciprocal support networks involving extended family, friends and church members among African Americans. Our analysis examined specific patterns of reciprocal support (i.e., received only, gave only, both gave and received, neither gave or received), as well as network characteristics (i.e., contact and subjective closeness) as correlates of reciprocal support. The analysis is based on the African American sub-sample of the National Survey of American Life (NSAL). Overall, our findings indicate that African Americans are very involved in reciprocal support networks with their extended family, friends and church members. Respondents were most extensively involved in reciprocal supports with extended family members, followed closely by friends and church networks. Network characteristics (i.e., contact and subjective closeness) were significantly and consistently associated with involvement with reciprocal support exchanges for all three networks. These and other findings are discussed in detail. This study complements previous work on the complementary roles of family, friend and congregational support networks, as well as studies of racial differences in informal support networks.

  8. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Program. Volume 2

    National Research Council Canada - National Science Library

    1997-01-01

    ...) Systems, and 33-2, Information Protection. This instruction prescribes the requirements, responsibilities and procedures for the security program for the Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS...

  9. Engagement Skills Trainer: The Commander’s Perspective

    Science.gov (United States)

    2017-06-09

    CBRN Chemical Biological Radiological and Nuclear CGSOC Command and General Staff Officers Course DMG Digital Master Gunner EST Engagement Skills...commanders always emphasized SHARP ( Sexual Harassment and Response Program) training, the battery commander may vividly recall those events but not the range...soldiers in the EST generally do worse at weapons safety and orientation .26 Indicators from research show that EST results predict live fire results. The

  10. Personalized Social Network Activity Feeds for Increased Interaction and Content Contribution

    Directory of Open Access Journals (Sweden)

    Shlomo eBerkovsky

    2015-10-01

    Full Text Available Online social networks were originally conceived as means of sharing information and activities with friends, and their success has been one of the primary contributors of the tremendous growth of the Web. Social network activity feeds were devised as a means to aggregate recent actions of friends into a convenient list. But the volume of actions and content generated by social network users is overwhelming, such that keeping users up-to-date with friend activities is an ongoing challenge for social network providers. Personalization has been proposed as a solution to combat social network information overload and help users to identify the nuggets of relevant information in the incoming flood of network activities. In this paper, we propose and thoroughly evaluate a personalized model for predicting the relevance of the activity feed items, which informs the ranking of the feeds and facilitates personalization. Results of a live study show that the proposed feed personalization approach successfully identifies and promotes relevant feed items and boosts the uptake of the feeds. In addition, it increases the contribution of user-generated content to the social network and spurs interaction between users.

  11. Greening radio access networks using distributed base station architectures

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2010-01-01

    Several actions for developing environmentally friendly technologies have been taken in most industrial fields. Significant resources have also been devoted in mobile communications industry. Moving towards eco-friendly alternatives is primarily a social responsibility for network operators....... However besides this, increasing energy efficiency represents a key factor for reducing operating expenses and deploying cost effective mobile networks. This paper presents how distributed base station architectures can contribute in greening radio access networks. More specifically, the advantages...... energy saving. Different subsystems have to be coordinated real-time and intelligent network nodes supporting complicated functionalities are necessary. Distributed base station architectures are ideal for this purpose mainly because of their high degree of configurability and self...

  12. XTCE. XML Telemetry and Command Exchange Tutorial

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad; Simon, Jerry

    2010-01-01

    An XML Telemetry Command Exchange (XTCE) tutoral oriented towards packets or minor frames is shown. The contents include: 1) The Basics; 2) Describing Telemetry; 3) Describing the Telemetry Format; 4) Commanding; 5) Forgotten Elements; 6) Implementing XTCE; and 7) GovSat.

  13. Doublet III neutral beam multi-stream command language system

    International Nuclear Information System (INIS)

    Campbell, L.; Garcia, J.R.

    1983-01-01

    A multi-stream command language system was developed to provide control of the dual source neutral beam injectors on the Doublet III experiment at GA Technologies Inc. The Neutral Beam command language system consists of three parts: compiler, sequencer, and interactive task. The command language, which was derived from the Doublet III tokamak command language, POPS, is compiled, using a recursive descent compiler, into reverse polish notation instructions which then can be executed by the sequencer task. The interactive task accepts operator commands via a keyboard. The interactive task directs the operation of three input streams, creating commands which are then executed by the sequencer. The streams correspond to the two sources within a Doublet III neutral beam, plus an interactive stream. The sequencer multiplexes the execution of instructions from these three streams. The instructions include reads and writes to an operator terminal, arithmetic computations, intrinsic functions such as CAMAC input and output, and logical instructions. The neutral beam command language system was implemented using Modular Computer Systems (ModComp) Pascal and consists of two tasks running on a ModComp Classic IV computer. The two tasks, the interactive and the sequencer, run independently and communicate using shared memory regions. The compiler runs as an overlay to the interactive task when so directed by operator commands. The system is succesfully being used to operate the three neutral beams on Doublet III

  14. Managing resources through stakeholder networks

    NARCIS (Netherlands)

    Ogada, Job Ochieng; Krhoda, George Okoye; Veen, Van Der Anne; Marani, Martin; Oel, van Pieter Richards

    2017-01-01

    Stakeholder analysis and social network analysis were used to analyze stakeholders’ social and structural characteristics based on their interests, influence and interactions in Lake Naivasha basin, Kenya. Even though the Kenyan government and its agencies seem to command higher influence and

  15. Eco-friendly Development Of Industry

    International Nuclear Information System (INIS)

    An, Gi Cheol; Park, Hun; Lee, Dong Jin; Ryu, Sang Hui

    1998-02-01

    This book reports eco-friendly development of industry, which has summary on bring up the issue and research way and system of research. It deals with current state of affairs on eco-friendly development of industry and the case of developed countries such as necessity and meaning of eco-friendly development industry, prospect and change of the tendency, environmental issue by field in Korea like the steel industry, nonferrous metal industry, auto industry, and cement industry and general policy for eco-friendly development of industry.

  16. Friendship selection and friends' influence : Dynamics of networks and actor attributes in early adolescence

    NARCIS (Netherlands)

    Knecht, Andrea Beate

    2008-01-01

    Adolescent friends are often found to be similar. Similarity can be caused by selection and influence processes. This book examines selection and influence processes for delinquency, school attitudes, and alcohol use in early adolescence. For selection processes, we hypothesize that adolescents

  17. Doublet III neutral beam multi-stream command language system

    International Nuclear Information System (INIS)

    Campbell, L.; Garcia, J.R.

    1983-12-01

    A multi-stream command language system was developed to provide control of the dual source neutral beam injectors on the Doublet III experiment at GA Technologies Inc. The Neutral Beam command language system consists of three parts: compiler, sequencer, and interactive task. The command language, which was derived from the Doublet III tokamak command language, POPS, is compiled, using a recursive descent compiler, into reverse polish notation instructions which then can be executed by the sequencer task. The interactive task accepts operator commands via a keyboard. The interactive task directs the operation of three input streams, creating commands which are then executed by the sequencer. The streams correspond to the two sources within a Doublet III neutral beam, plus an interactive stream. The sequencer multiplexes the execution of instructions from these three streams. The instructions include reads and writes to an operator terminal, arithmetic computations, intrinsic functions such as CAMAC input and output, and logical instructions. The neutral beam command language system was implemented using Modular Computer Systems (ModComp) Pascal and consists of two tasks running on a ModComp Classic IV computer

  18. "Friends" of Anglican Cathedrals: Norms and Values. Befriending, Friending or Misnomer?

    Science.gov (United States)

    Muskett, Judith A.

    2013-01-01

    Loyal supporters of Anglican cathedrals first subscribed to "Friends" associations in the late 1920s. Yet, in 1937, a journalist in "The Times" portrayed cathedrals as a "queer thing to be a friend of." Drawing on theories of friendship from a range of disciplines, and surveys of what has been proclaimed in the public…

  19. A Typology to Explain Changing Social Networks Post Stroke.

    Science.gov (United States)

    Northcott, Sarah; Hirani, Shashivadan P; Hilari, Katerina

    2018-05-08

    Social network typologies have been used to classify the general population but have not previously been applied to the stroke population. This study investigated whether social network types remain stable following a stroke, and if not, why some people shift network type. We used a mixed methods design. Participants were recruited from two acute stroke units. They completed the Stroke Social Network Scale (SSNS) two weeks and six months post stroke and in-depth interviews 8-15 months following the stroke. Qualitative data was analysed using Framework Analysis; k-means cluster analysis was applied to the six-month data set. Eighty-seven participants were recruited, 71 were followed up at six months, and 29 completed in-depth interviews. It was possible to classify all 29 participants into one of the following network types both prestroke and post stroke: diverse; friends-based; family-based; restricted-supported; restricted-unsupported. The main shift that took place post stroke was participants moving out of a diverse network into a family-based one. The friends-based network type was relatively stable. Two network types became more populated post stroke: restricted-unsupported and family-based. Triangulatory evidence was provided by k-means cluster analysis, which produced a cluster solution (for n = 71) with comparable characteristics to the network types derived from qualitative analysis. Following a stroke, a person's social network is vulnerable to change. Explanatory factors for shifting network type included the physical and also psychological impact of having a stroke, as well as the tendency to lose contact with friends rather than family.

  20. Three Degrees of Inclusion: the Gossip-Effect in Human Networks

    Science.gov (United States)

    Szekfu˝, Balázs; Szvetelszky, Zsuzsanna

    2005-06-01

    Using the scientific definition of gossip, an ancient and ubiquitous phenomenon of the social networks, we present our preliminary study and its results on how to measure the networks based on dissemination of connections and information. We try to accurately calculate the gossip-effects in networks with our hypothesis of "three degrees of inclusion". Our preliminary study on the subject of "three degrees of inclusion" gives latency to a very important property of social networks. Observing the human communication of closely knit social groups we came to the conclusion that the human networks are based on not more than three degrees of links. Taking the strong human ties into account our research indicates that whoever is on the fourth degree rarely counts as an in-group member. Our close friend's close friend's close friend — that is about the farthest — three steps — our network can reach out when it comes to telling a story or asking for a favor. Up to now no investigations have been performed to see whether the effects of gossip lead to the phase transition of the content of network's self-organizing communication. Our conclusion is that the gossip-effect must be considered as the prefactor of the news and opinions diffusion and dynamics at the social level.

  1. Turn-based gaming for convoy commander training

    NARCIS (Netherlands)

    Boonekamp, R.C.; Muller, T.J.; Vrijer, J.C. de

    2015-01-01

    With the increasing complexity of current-day military operations, effective education and training of military commanders is of vital importance. Commanders need to perform within a broader range of conflicts; unpredictable threats and civil-military interaction place a great demand on their

  2. Associations between aspects of friendship networks and dietary behavior in youth: Findings from a systematized review.

    Science.gov (United States)

    Sawka, Keri Jo; McCormack, Gavin R; Nettel-Aguirre, Alberto; Swanson, Kenda

    2015-08-01

    To gather and synthesize current evidence on the associations between aspects of friendship networks (e.g., friends' dietary behavior, popularity) and an individual's dietary behavior among children and adolescents. A systematic search of six scientific online databases was conducted in August 2013. Eligible studies included child or adolescent participants (aged 6 to 18years), a measure of each participant's friendship network, and a measure of habitual dietary behavior for both the participant and the participant's nominated friend(s). Data on study design, participant characteristics, friendship networks, dietary behavior, and study outcomes were abstracted. From a total of 9041 articles retrieved, seven studies were included in this review. Overall, friends' unhealthy food consumption was associated with an individual's unhealthy food consumption, and this association appeared to be stronger for boys compared with girls. More popular adolescents also tended to consume more unhealthy foods. Best friends' total energy intake was correlated with an individual's total energy intake. Similarities among friends' healthy food consumption, as well as daily breakfast consumption, were inconclusive. Longitudinal evidence showed that an individual's unhealthy food consumption tended to become similar to friends' unhealthy food consumption over time. Social network analysis in the adolescent dietary behavior literature is beginning to emerge. Results highlight friends' particular influence on unhealthy food consumption among adolescents. Focus on modeling healthy dietary behaviors among adolescent friendship group may help reduce unhealthy dietary behaviors and promote healthy weight status among youth. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Friendship Network in the Classroom: Parents Bias and Peer Effects

    DEFF Research Database (Denmark)

    Landini, Fabio; Montinari, Natalia; Pin, Paolo

    We interview both parents and their children enrolled in six primary schools in the district of Treviso (Italy). We study the structural differences between the children network of friends reported by children and the one elicited asking their parents. We find that the parents’ network has a bias......: parents expect peer effects on school achievement to be stronger than what they really are. Thus, parents of low-performing students report their children to be friends of high-performing students. Our numerical simulations indicate that when this bias is combined with a bias on how some children target...... friends, then there is a multiplier effect on the expected school achievement...

  4. Online Social Network Users’ Attitudes toward Personality Traits Predict Behaviour of their Friends

    Directory of Open Access Journals (Sweden)

    Sergei A. Shchebetenko

    2016-12-01

    Full Text Available The research considers attitudes toward personality traits in online social network (OSN Vkontakte users’ behaviour. Users’ friends’ activity on a given user’s profile was supposed to be affected by attitudes toward traits of the latter. Within a broader context, the role of metacognitive type of characteristic adaptations as a key element of the five-factor theory of personality is studied. Accordingly, along with attitudes toward traits, other metacognitive characteristic adaptations are examined (e.g. dispositional efficiency, reflected trait, and reflected attitude toward a trait. 1030 undergraduates participated in the study. The research results confirm that extraversion is the most important predictor of OSN behavior among other personality traits. The information presented in this research is obtained using behavioural data instead of more convenient self-reports. Moreover, these behavioural data characterise other users’ (friends’ behaviour while addressing a certain user’s profile. Positive attitudes toward each Big Five traits (extraversion, agreeableness, conscientiousness, emotional stability, and openness to experience separately affected the number of “Likes” of the avatars representing users’ photographs. Furthermore, revealed correlations between traits and “Likes” were subsequently eliminated by the attitudes toward respective traits. Positive attitudes toward conscientiousness predicted the increase of friends’ number unlike trait conscientiousness. Positive attitude toward agreeableness predicted the increase of the number of posts written by friends on user’s wall unlike trait agreeableness. Attitudes toward traits are argued to affect social environment governed by an individual: one may select those social relationships and partners that fit better one’s attitudes toward traits. This, in turn, may affect actions of other people towards the given individual including those of online behaviour.

  5. Too Many Friends: Social Integration, Network Cohesion and Adolescent Depressive Symptoms

    Science.gov (United States)

    Falci, Christina; McNeely, Clea

    2009-01-01

    Using a nationally representative sample of adolescents, we examine associations among social integration (network size), network cohesion (alter-density), perceptions of social relationships (e.g., social support) and adolescent depressive symptoms. We find that adolescents with either too large or too small a network have higher levels of…

  6. Qualities and Inequalities in Online Social Networks through the Lens of the Generalized Friendship Paradox

    OpenAIRE

    Momeni, Naghmeh; Rabbat, Michael

    2016-01-01

    The friendship paradox is the phenomenon that in social networks, people on average have fewer friends than their friends do. The generalized friendship paradox is an extension to attributes other than the number of friends. The friendship paradox and its generalized version have gathered recent attention due to the information they provide about network structure and local inequalities. In this paper, we propose several measures of nodal qualities which capture different aspects of their act...

  7. Apollo 16 astronauts in Apollo Command Module Mission Simulator

    Science.gov (United States)

    1972-01-01

    Astronaut Thomas K. Mattingly II, command module pilot of the Apollo 16 lunar landing mission, participates in extravehicular activity (EVA) training in bldg 5 at the Manned Spacecraft Center (MSC). In the right background is Astronaut Charles M. Duke Jr., lunar module pilot. They are inside the Apollo Command Module Mission Simulator (31046); Mattingly (right foreground) and Duke (right backgroung) in the Apollo Command Module Mission Simulator for EVA simulation and training. Astronaut John W. Young, commander, can be seen in the left background (31047).

  8. Social networks of patients with psychosis: a systematic review.

    Science.gov (United States)

    Palumbo, Claudia; Volpe, Umberto; Matanov, Aleksandra; Priebe, Stefan; Giacco, Domenico

    2015-10-12

    Social networks are important for mental health outcomes as they can mobilise resources and help individuals to cope with social stressors. Individuals with psychosis may have specific difficulties in establishing and maintaining social relationships which impacts on their well-being and quality of life. There has been a growing interest in developing social network interventions for patients with psychotic disorders. A systematic literature review was conducted to investigate the size of social networks of patients with psychotic disorders, as well as their friendship networks. A systematic electronic search was carried out in MEDLINE, EMBASE and PsychINFO databases using a combination of search terms relating to 'social network', 'friendship' and 'psychotic disorder'. The search identified 23 relevant papers. Out of them, 20 reported patient social network size. Four papers reported the mean number of friends in addition to whole network size, while three further papers focused exclusively on the number of friends. Findings varied substantially across the studies, with a weighted mean size of 11.7 individuals for whole social networks and 3.4 individuals for friendship networks. On average, 43.1 % of the whole social network was composed of family members, while friends accounted for 26.5 %. Studies assessing whole social network size and friendship networks of people with psychosis are difficult to compare as different concepts and methods of assessment were applied. The extent of the overlap between different social roles assessed in the networks was not always clear. Greater conceptual and methodological clarity is needed in order to help the development of effective strategies to increase social resources of patients with psychosis.

  9. Conversation practices and network structure in Twitter

    DEFF Research Database (Denmark)

    Rossi, Luca; Magnani, Matteo

    2012-01-01

    The public by default nature of Twitter messages, together with the adoption of the #hashtag convention led, in few years, to the creation of a digital space able to host worldwide conversation on almost every kind of topic. From major TV shows to Natural disasters there is no contemporary event...... that does not have its own #hashtag to gather together the ongoing Twitter conversation. These topical discussions take place outside of the Twitter network made of followers and friends. Nevertheless this topical network is where many of the most studied phenomena take place. Therefore Twitter based...... communication exists on two almost autonomous levels: the Twitter network made of followers and friends that shows a certain level of stability and the topical network, characterized by a high level of contingency, that appears and disappears following the rhythm of a worldwide conversation. Despite the fact...

  10. Linux Command Line and Shell Scripting Bible

    CERN Document Server

    Blum, Richard

    2011-01-01

    The authoritative guide to Linux command line and shell scripting?completely updated and revised [it's not a guide to Linux as a whole ? just to scripting] The Linux command line allows you to type specific Linux commands directly to the system so that you can easily manipulate files and query system resources, thereby permitting you to automate commonly used functions and even schedule those programs to run automatically. This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shel

  11. The network communication of BEPC control system

    International Nuclear Information System (INIS)

    Xu Jingwei

    1997-01-01

    The author introduces the application of network communication of BEPC control system. The authors use non-transparent communication to transfer the data and command information from node VAX750 to VAX4500

  12. Toward Unity of Command for Multinational Air Forces

    National Research Council Canada - National Science Library

    Asjes, David

    1998-01-01

    To assure unity of command in future multinational air operations, combatant commanders must embrace the necessity of multinational air forces, maximize the integration of allied officers within air...

  13. Defense or Diplomacy Geographic Combatant Commands

    Science.gov (United States)

    2011-06-01

    originally ruled by 1 Priest, Dana , The Mission: Waging War and Keeping Peace with America’s Military...events. US Central Command. Dana Priest describes General Zinni‟s experience as a GCC commander, wherein General Zinni found that in many ways...ignored altogether. Dr. James Forsyth and Lt Col Chance Saltzman make this argument in their Air and Space Power Journal article “Stay Out —Why

  14. Social network profiles as information sources for adolescents' offline relations

    OpenAIRE

    Courtois, Cédric; All, Anissa

    2012-01-01

    This paper presents the results of a study concerning the use of profile pages by adolescents to get to know more about offline friends and acquaintances. Previous research has indicated that social network sites are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online profiles are meaningful in gathering information on these 'offline' friends and acquai...

  15. Social network profiles as information sources for adolescents' offline relations

    OpenAIRE

    Courtois, Cédric; All, Anissa; Vanwynsberghe, Hadewijch

    2012-01-01

    This paper presents the results of a study concerning the use of online profile pages by adolescents to know more about “offline” friends and acquaintances. Previous research has indicated that social networking sites (SNSs) are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online connections are meaningful in gathering information on offline friends and...

  16. OPTIMAL CONFIGURATION OF A COMMAND AND CONTROL NETWORK: BALANCING PERFORMANCE AND RECONFIGURATION CONSTRAINTS

    Energy Technology Data Exchange (ETDEWEB)

    L. DOWELL

    1999-08-01

    The optimization of the configuration of communications and control networks is important for assuring the reliability and performance of the networks. This paper presents techniques for determining the optimal configuration for such a network in the presence of communication and connectivity constraints. reconfiguration to restore connectivity to a data-fusion network following the failure of a network component.

  17. How many or how much? Testing the relative influence of the number of social network risks versus the amount of time exposed to social network risks on post-treatment substance use.

    Science.gov (United States)

    Eddie, David; Kelly, John F

    2017-06-01

    Having high-risk, substance-using friends is associated with young adult substance use disorder (SUD) relapse. It is unclear, however, whether it is the total number of high-risk friends, or the amount of time spent with high-risk friends that leads to relapse. Unclear also, is to what extent low-risk friends buffer risk. This study examined the influence of number of high-risk and low-risk friends, and the amount time spent with these friends on post-treatment percent days abstinent (PDA). Young adult inpatients (N=302) were assessed at intake, and 3, 6, and 12 months on social network measures and PDA. Mixed models tested for effects of number of high- and low-risk friends, and time spent with these friends on PDA, and for net-risk friend effects to test whether low-risk friends offset risk. Within and across assessments, number of, and time spent with high-risk friends was negatively associated with PDA, while the inverse was true for low-risk friends. Early post-treatment, time spent with friends more strongly predicted PDA than number of friends. Participants were more deleteriously affected by time with high-risk friends the longer they were out of treatment, while contemporaneously protection conferred by low-risk friends increased. This interaction effect, however, was not observed with number of high- or low-risk friends, or number of friends net-risk. Young adult SUD patients struggling to break ties with high-risk friends should be encouraged to minimize time with them. Clinicians should also encourage patients to grow their social network of low-risk friends. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Unity of Command in Afghanistan: A Forsaken Principle of War

    National Research Council Canada - National Science Library

    Hope, Ian

    2008-01-01

    ... in the evolution of military command for Afghanistan. It examines how there was an unprecedented departure from the principle of unity of command in Afghanistan in 2006, when Combined Forces Command-Afghanistan (CFC...

  19. Spacecraft command and control using expert systems

    Science.gov (United States)

    Norcross, Scott; Grieser, William H.

    1994-01-01

    This paper describes a product called the Intelligent Mission Toolkit (IMT), which was created to meet the changing demands of the spacecraft command and control market. IMT is a command and control system built upon an expert system. Its primary functions are to send commands to the spacecraft and process telemetry data received from the spacecraft. It also controls the ground equipment used to support the system, such as encryption gear, and telemetry front-end equipment. Add-on modules allow IMT to control antennas and antenna interface equipment. The design philosophy for IMT is to utilize available commercial products wherever possible. IMT utilizes Gensym's G2 Real-time Expert System as the core of the system. G2 is responsible for overall system control, spacecraft commanding control, and spacecraft telemetry analysis and display. Other commercial products incorporated into IMT include the SYBASE relational database management system and Loral Test and Integration Systems' System 500 for telemetry front-end processing.

  20. Friendship networks and physical activity and sedentary behavior among youth: a systematized review.

    Science.gov (United States)

    Sawka, Keri Jo; McCormack, Gavin R; Nettel-Aguirre, Alberto; Hawe, Penelope; Doyle-Baker, Patricia K

    2013-12-01

    Low levels of physical activity and increased participation in sedentary leisure-time activities are two important obesity-risk behaviors that impact the health of today's youth. Friend's health behaviors have been shown to influence individual health behaviors; however, current evidence on the specific role of friendship networks in relation to levels of physical activity and sedentary behavior is limited. The purpose of this review was to summarize evidence on friendship networks and both physical activity and sedentary behavior among children and adolescents. After a search of seven scientific databases and reference scans, a total of thirteen articles were eligible for inclusion. All assessed the association between friendship networks and physical activity, while three also assessed sedentary behavior. Overall, higher levels of physical activity among friends are associated with higher levels of physical activity of the individual. Longitudinal studies reveal that an individual's level of physical activity changes to reflect his/her friends' higher level of physical activity. Boys tend to be influenced by their friendship network to a greater extent than girls. There is mixed evidence surrounding a friend's sedentary behavior and individual sedentary behavior. Friends' physical activity level appears to have a significant influence on individual's physical activity level. Evidence surrounding sedentary behavior is limited and mixed. Results from this review could inform effective public health interventions that harness the influence of friends to increase physical activity levels among children and adolescents.

  1. ASC Addresses Unit Commanders' Concerns through LBE and Reset Programs

    National Research Council Canada - National Science Library

    Young, Mark E

    2008-01-01

    .... Army Sustainment Command (ASC), part of the U.S. Army Materiel Command (AMC) team, is available to assist, identify, and resolve equipment and maintenance problems as well as materiel readiness issues for combatant commanders...

  2. Marketing animal-friendly products

    NARCIS (Netherlands)

    Riemsdijk, van Lenka; Ingenbleek, Paul T.M.; Trijp, van Hans C.M.; Veen, van der Gerrita

    2017-01-01

    This article presents a conceptual framework that aims to encourage consumer animal-friendly product choice by introducing positioning strategies for animal-friendly products. These strategies reinforce the animal welfare with different types of consumption values and can therefore reduce

  3. Identification of important nodes in directed biological networks: a network motif approach.

    Directory of Open Access Journals (Sweden)

    Pei Wang

    Full Text Available Identification of important nodes in complex networks has attracted an increasing attention over the last decade. Various measures have been proposed to characterize the importance of nodes in complex networks, such as the degree, betweenness and PageRank. Different measures consider different aspects of complex networks. Although there are numerous results reported on undirected complex networks, few results have been reported on directed biological networks. Based on network motifs and principal component analysis (PCA, this paper aims at introducing a new measure to characterize node importance in directed biological networks. Investigations on five real-world biological networks indicate that the proposed method can robustly identify actually important nodes in different networks, such as finding command interneurons, global regulators and non-hub but evolutionary conserved actually important nodes in biological networks. Receiver Operating Characteristic (ROC curves for the five networks indicate remarkable prediction accuracy of the proposed measure. The proposed index provides an alternative complex network metric. Potential implications of the related investigations include identifying network control and regulation targets, biological networks modeling and analysis, as well as networked medicine.

  4. Diversity Networking Reception

    Science.gov (United States)

    2014-03-01

    Join us at the APS Diversity Reception to relax, network with colleagues, and learn about programs and initiatives for women, underrepresented minorities, and LGBT physicists. You'll have a great time meeting friends in a supportive environment and making connections.

  5. Maritime Coalitions: When is Unity of Command Required

    National Research Council Canada - National Science Library

    Gahlinger, Gregory J

    2007-01-01

    .... The concepts of Unity of Command, Unity of Effort and Parallel, Lead Nation, or Integrated coalition command structures are viable across a broad spectrum of maritime coalition operations but do have...

  6. Unity of Command in Afghanistan: A Forsaken Principle of War

    National Research Council Canada - National Science Library

    Hope, Ian

    2008-01-01

    ... of military command for Afghanistan. It examines the unprecedented departure from the principle of unity of command in Afghanistan in 2006, when Combined Forces Command-Afghanistan passed control of the ground fight to the International...

  7. Gossip spread in social network Models

    Science.gov (United States)

    Johansson, Tobias

    2017-04-01

    Gossip almost inevitably arises in real social networks. In this article we investigate the relationship between the number of friends of a person and limits on how far gossip about that person can spread in the network. How far gossip travels in a network depends on two sets of factors: (a) factors determining gossip transmission from one person to the next and (b) factors determining network topology. For a simple model where gossip is spread among people who know the victim it is known that a standard scale-free network model produces a non-monotonic relationship between number of friends and expected relative spread of gossip, a pattern that is also observed in real networks (Lind et al., 2007). Here, we study gossip spread in two social network models (Toivonen et al., 2006; Vázquez, 2003) by exploring the parameter space of both models and fitting them to a real Facebook data set. Both models can produce the non-monotonic relationship of real networks more accurately than a standard scale-free model while also exhibiting more realistic variability in gossip spread. Of the two models, the one given in Vázquez (2003) best captures both the expected values and variability of gossip spread.

  8. An Advanced Commanding and Telemetry System

    Science.gov (United States)

    Hill, Maxwell G. G.

    The Loral Instrumentation System 500 configured as an Advanced Commanding and Telemetry System (ACTS) supports the acquisition of multiple telemetry downlink streams, and simultaneously supports multiple uplink command streams for today's satellite vehicles. By using industry and federal standards, the system is able to support, without relying on a host computer, a true distributed dataflow architecture that is complemented by state-of-the-art RISC-based workstations and file servers.

  9. Astronaut John Young in Command Module Simulator during Apollo Simulation

    Science.gov (United States)

    1968-01-01

    Astronaut John W. Young, command module pilot, inside the Command Module Simulator in bldg 5 during an Apollo Simulation. Astronauts Thomas P. Stafford, commander and Eugene A. Cernan, lunar module pilot are out of the view.

  10. Investigation on network utilization efficiency and image transmission time for the PACS network

    International Nuclear Information System (INIS)

    Tawara, K.; Nishihara, E.; Komatsu, K.I.

    1987-01-01

    The authors investigated the following features of a PACS network: (1) network utilization efficiency and (2) image transmission time. They changed the following parameters, which the two items shown above depend on: (1) transfer rate between imaging equipment and network (10 kB/econd-8 MB/second), (2) network transmission speed (100 kB/second-50 MB/second), (3) packet length (10 kB-4 MB), and (4) message length (image data) (64 kB-4 MB). As a result, a conventional-type network cannot meet a need for PACS. To solve this problem, the authors propose a multiplexed network that consists of the high-speed network for image transmission and the conventional speed of control network for commands and shorter messages. If the packet length of the image network is designed to be variable, they can choose an optimum packet length for image transmission

  11. Command Home Page

    Science.gov (United States)

    Inclusion And Diversity Navy Standard Integrated Personnel System (NSIPS) My Navy Portal Board of One Source USA.gov U.S. Office of Special Counsel Social Media Directory and Policy US Navy App Locker Navy Personnel Command (NPC) Navy SAPR Navy EEO Inclusion And Diversity Navy Standard Integrated

  12. From Family to Friends: Does Witnessing Interparental Violence Affect Young Adults’ Relationships with Friends?

    Science.gov (United States)

    Mandal, Mahua; Hindin, Michelle J.

    2013-01-01

    Purpose Childhood exposure to violence in one’s family of origin has been closely linked to subsequent perpetration and victimization of intimate partner violence. There is, however, little research on the relationship between witnessing violence and subsequent peer violence. This study investigates the effects of witnessing interparental violence among Filipino young adults on their use and experience of psychological aggression with friends. Methods The data source for this study was the Cebu Longitudinal Health and Nutrition Survey. Recent perpetration and victimization of friend psychological aggression among young adults ages 21–22 years was assessed through self-reports from the 2005 survey, and witnessing interparental violence during childhood was assessed through self-reports from the 2002 survey. Multinomial logistic regression was used to examine the effects of witnessing interparental violence on subsequent use and experience of friend psychological aggression. Analyses were stratified by gender. Results About 13% of females and 4% of males perpetrated psychological aggression towards close friends, and about 4% of females and males were victims. Fourteen percent of females and 3% of males experienced bidirectional psychological aggression. About 44% of females and 47% of males had, during childhood, witnessed their parents physically hurt one another. Witnessing maternal and reciprocal interparental violence during childhood significantly predicted bidirectional friend psychological aggression among males. Among females, witnessing interparental violence did not significantly predict involvement with friend psychological aggression. Conclusions Violence prevention programs should consider using family-centered interventions, and apply a gendered lens to their application. Further research on gender differences in friend aggression is recommended. PMID:23697789

  13. Conceptualizing of Social Networking Sites

    OpenAIRE

    J. S. Sodhi; Shilpi Sharma

    2012-01-01

    People often move to their friends, families and colleagues when they feel urge and having doubts or queries to solve. Participation in social networking site has dramatically increased in recent years. Many social networking sites boost with million of members using their network on regular basis to communicate, share , create and collaborate with others. In this paper we explore the phenomenon of using social networking site to trace a link of the search from the community of users for bett...

  14. Structural characteristics of the online social networks of maltreated youth and offline sexual risk behavior.

    Science.gov (United States)

    Negriff, Sonya; Valente, Thomas W

    2018-02-07

    Maltreated youth are at risk for exposure to online sexual content and high-risk sexual behavior, yet characteristics of their online social networks have not been examined as a potential source of vulnerability. The aims of the current study were: 1) to test indicators of size (number of friends) and fragmentation (number of connections between friends) of maltreated young adults' online networks as predictors of intentional and unintentional exposure to sexual content and offline high-risk sexual behavior and 2) to test maltreatment as a moderator of these associations. Participants were selected from a longitudinal study on the effects of child maltreatment (n = 152; Mean age 21.84 years). Data downloaded from Facebook were used to calculate network variables of size (number of friends), density (connections between friends), average degree (average number of connections for each friend), and percent isolates (those not connected to others in the network). Self-reports of intentional and unintentional exposure to online sexual content and offline high-risk sexual behavior were the outcome variables. Multiple-group path modeling showed that only for the maltreated group having a higher percent of isolates in the network predicted intentional exposure to online sexual content and offline high-risk sexual behavior. An implication of this finding is that the composition of the Facebook network may be used as a risk indicator for individuals with child-welfare documented maltreatment experiences. Copyright © 2018. Published by Elsevier Ltd.

  15. Comparison between a classical command law and a new advanced recovery command law in a MCB-ARS boost

    Science.gov (United States)

    Petit, Pierre; Saint-Eve, Frédéric; Sawicki, Jean-Paul; Aillerie, Michel

    2017-02-01

    This paper focuses on an original performed command on DC-DC boosts developed for applications in the LMOPS lab for the photovoltaic energy conversion and more specifically the Photovoltaic panels connected to HVDC smart grids. This boost, commonly named MCB-ARS (Magnetically Coupled Boost with Active Recovery Switch) presents great advantages concerning the simplicity of the command on the single constitutive switch, the global efficiency and the voltage conversion ratio. A fine analysis of the losses all over the entire converter shows that losses are not distributed uniformly in the constituting components. So a previous modification described in a previous paper consisting in the conducting assistance on the power flowing intermediate diode, performed advantageously the global efficiency. The present analysis takes into account the fact that the new configuration obtained after this important improvement looks like a classical half-bridge push-pull stage and may be controlled by a twice complementary command. In that way, a comparison has been done between a natural commutation recovery diode and an assisted switch commutation driven in a push-pull mode. As attempted, the switching command laws in charge to assume the energy transfer has been compared to the classical previous system described in anterior papers, and we demonstrate in this publication that a commutation based on a push-pull command mode within the two switches of the MCB-ARS converter is possible and increases the power transfer.

  16. Dermatology Depictions in Friends/ Descripciones dermatológicas en Friends

    Directory of Open Access Journals (Sweden)

    Skyler M White

    2017-03-01

    Full Text Available Health?related topics are frequently referenced on screen in movies and television. Friends was on?air for 10 seasonsand is one of the most watched television shows of all time. Dermatology was referenced more than any otherhealth?related topic throughout the series. Beliefs about attractiveness and the stigma of skin conditions are furtherpropagated in this program. Reviewing the depictions of dermatology in Friends will aid in understanding the public’sideas and stereotypes regarding skin and dermatologic diseases.

  17. Reticulospinal Systems for Tuning Motor Commands

    Directory of Open Access Journals (Sweden)

    Robert M. Brownstone

    2018-04-01

    Full Text Available The pontomedullary reticular formation (RF is a key site responsible for integrating descending instructions to execute particular movements. The indiscrete nature of this region has led not only to some inconsistencies in nomenclature, but also to difficulties in understanding its role in the control of movement. In this review article, we first discuss nomenclature of the RF, and then examine the reticulospinal motor command system through evolution. These command neurons have direct monosynaptic connections with spinal interneurons and motoneurons. We next review their roles in postural adjustments, walking and sleep atonia, discussing their roles in movement activation or inhibition. We propose that knowledge of the internal organization of the RF is necessary to understand how the nervous system tunes motor commands, and that this knowledge will underlie strategies for motor functional recovery following neurological injuries or diseases.

  18. Benford's Law Applies to Online Social Networks.

    Science.gov (United States)

    Golbeck, Jennifer

    2015-01-01

    Benford's Law states that, in naturally occurring systems, the frequency of numbers' first digits is not evenly distributed. Numbers beginning with a 1 occur roughly 30% of the time, and are six times more common than numbers beginning with a 9. We show that Benford's Law applies to social and behavioral features of users in online social networks. Using social data from five major social networks (Facebook, Twitter, Google Plus, Pinterest, and LiveJournal), we show that the distribution of first significant digits of friend and follower counts for users in these systems follow Benford's Law. The same is true for the number of posts users make. We extend this to egocentric networks, showing that friend counts among the people in an individual's social network also follows the expected distribution. We discuss how this can be used to detect suspicious or fraudulent activity online and to validate datasets.

  19. Benford's Law Applies to Online Social Networks.

    Directory of Open Access Journals (Sweden)

    Jennifer Golbeck

    Full Text Available Benford's Law states that, in naturally occurring systems, the frequency of numbers' first digits is not evenly distributed. Numbers beginning with a 1 occur roughly 30% of the time, and are six times more common than numbers beginning with a 9. We show that Benford's Law applies to social and behavioral features of users in online social networks. Using social data from five major social networks (Facebook, Twitter, Google Plus, Pinterest, and LiveJournal, we show that the distribution of first significant digits of friend and follower counts for users in these systems follow Benford's Law. The same is true for the number of posts users make. We extend this to egocentric networks, showing that friend counts among the people in an individual's social network also follows the expected distribution. We discuss how this can be used to detect suspicious or fraudulent activity online and to validate datasets.

  20. Social networks and social support for healthy eating among Latina breast cancer survivors: implications for social and behavioral interventions.

    Science.gov (United States)

    Crookes, Danielle M; Shelton, Rachel C; Tehranifar, Parisa; Aycinena, Corina; Gaffney, Ann Ogden; Koch, Pam; Contento, Isobel R; Greenlee, Heather

    2016-04-01

    Little is known about Latina breast cancer survivors' social networks or their perceived social support to achieve and maintain a healthy diet. This paper describes the social networks and perceived support for healthy eating in a sample of breast cancer survivors of predominantly Dominican descent living in New York City. Spanish-speaking Latina breast cancer survivors enrolled in a randomized controlled trial of a culturally tailored dietary intervention. Social networks were assessed using Cohen's Social Network Index and a modified General Social Survey Social Networks Module that included assessments of shared health promoting behaviors. Perceived social support from family and friends for healthy, food-related behaviors was assessed. Participants' networks consisted predominantly of family and friends. Family members were more likely than other individuals to be identified as close network members. Participants were more likely to share food-related activities than exercise activities with close network members. Perceived social support for healthy eating was high, although perceived support from spouses and children was higher than support from friends. Despite high levels of perceived support, family was also identified as a barrier to eating healthy foods by nearly half of women. Although friends are part of Latina breast cancer survivors' social networks, spouses and children may provide greater support for healthy eating than friends. Involving family members in dietary interventions for Latina breast cancer survivors may tap into positive sources of support for women, which could facilitate uptake and maintenance of healthy eating behaviors.

  1. High Bandwidth Communications Links Between Heterogeneous Autonomous Vehicles Using Sensor Network Modeling and Extremum Control Approaches

    Science.gov (United States)

    2008-12-01

    In future network-centric warfare environments, teams of autonomous vehicles will be deployed in a coorperative manner to conduct wide-area...of data back to the command station, autonomous vehicles configured with high bandwidth communication system are positioned between the command

  2. Effects of Social Support Network Size on Mortality Risk: Considerations by Diabetes Status.

    Science.gov (United States)

    Loprinzi, Paul D; Ford, M Allison

    2018-05-01

    Previous work demonstrates that social support is inversely associated with mortality risk. Less research, however, has examined the effects of the size of the social support network on mortality risk among those with and without diabetes, which was the purpose of this study. Data from the 1999-2008 National Health and Nutrition Examination Survey were used, with participants followed through 2011. This study included 1,412 older adults (≥60 years of age) with diabetes and 5,872 older adults without diabetes. The size of the social support network was assessed via self-report and reported as the number of participants' close friends. Among those without diabetes, various levels of social support network size were inversely associated with mortality risk. However, among those with diabetes, only those with a high social support network size (i.e., at least six close friends) had a reduced risk of all-cause mortality. That is, compared to those with zero close friends, those with diabetes who had six or more close friends had a 49% reduced risk of all-cause mortality (hazard ratio 0.51, 95% CI 0.27-0.94). To mitigate mortality risk, a greater social support network size may be needed for those with diabetes.

  3. Friendship Concept and Community Network Structure among Elementary School and University Students.

    Science.gov (United States)

    Hernández-Hernández, Ana María; Viga-de Alva, Dolores; Huerta-Quintanilla, Rodrigo; Canto-Lugo, Efrain; Laviada-Molina, Hugo; Molina-Segui, Fernanda

    2016-01-01

    We use complex network theory to study the differences between the friendship concepts in elementary school and university students. Four friendship networks were identified from surveys. Three of these networks are from elementary schools; two are located in the rural area of Yucatán and the other is in the urban area of Mérida, Yucatán. We analyzed the structure and the communities of these friendship networks and found significant differences among those at the elementary schools compared with those at the university. In elementary schools, the students make friends mainly in the same classroom, but there are also links among different classrooms because of the presence of siblings and relatives in the schools. These kinds of links (sibling-friend or relative-friend) are called, in this work, "mixed links". The classification of the communities is based on their similarity with the classroom composition. If the community is composed principally of students in different classrooms, the community is classified as heterogeneous. These kinds of communities appear in the elementary school friendship networks mainly because of the presence of relatives and siblings. Once the links between siblings and relatives are removed, the communities resembled the classroom composition. On the other hand, the university students are more selective in choosing friends and therefore, even when they have friends in the same classroom, those communities are quite different to the classroom composition. Also, in the university network, we found heterogeneous communities even when the presence of sibling and relatives is negligible. These differences made up a topological structure quite different at different academic levels. We also found differences in the network characteristics. Once these differences are understood, the topological structure of the friendship network and the communities shaped in an elementary school could be predicted if we know the total number of students

  4. How to Make Financial Aid "Freshman-Friendly"

    Science.gov (United States)

    Pugh, Susan L.; Johnson, David B.

    2011-01-01

    Ultimately, making financial aid "freshman friendly" also makes financial aid "sophomore friendly," "junior friendly," and "senior friendly." Indiana University has in place an Office of Enrollment Management (OEM) model that includes focused financial aid packaging strategies complemented by unique contact…

  5. How people make friends in social networking sites—A microscopic perspective

    Science.gov (United States)

    Hu, Haibo; Wang, Xiaofan

    2012-02-01

    We study the detailed growth of a social networking site with full temporal information by examining the creation process of each friendship relation that can collectively lead to the macroscopic properties of the network. We first study the reciprocal behavior of users, and find that link requests are quickly responded to and that the distribution of reciprocation intervals decays in an exponential form. The degrees of inviters/accepters are slightly negatively correlative with reciprocation time. In addition, the temporal feature of the online community shows that the distributions of intervals of user behaviors, such as sending or accepting link requests, follow a power law with a universal exponent, and peaks emerge for intervals of an integral day. We finally study the preferential selection and linking phenomena of the social networking site and find that, for the former, a linear preference holds for preferential sending and reception, and for the latter, a linear preference also holds for preferential acceptance, creation, and attachment. Based on the linearly preferential linking, we put forward an analyzable network model which can reproduce the degree distribution of the network. The research framework presented in the paper could provide a potential insight into how the micro-motives of users lead to the global structure of online social networks.

  6. Signed Networks in Social Media

    OpenAIRE

    Leskovec, Jure; Huttenlocher, Daniel; Kleinberg, Jon

    2010-01-01

    Relations between users on social media sites often reflect a mixture of positive (friendly) and negative (antagonistic) interactions. In contrast to the bulk of research on social networks that has focused almost exclusively on positive interpretations of links between people, we study how the interplay between positive and negative relationships affects the structure of on-line social networks. We connect our analyses to theories of signed networks from social psychology. We find that the c...

  7. Incorrect Responses to Locative Commands: A Case Study.

    Science.gov (United States)

    Duchan, Judith; Siegel, Leo

    1979-01-01

    A six-year-old with a language problem responded consistently to 100 locative commands by putting objects in containers and on flat surfaces regardless of the preposition or order of the nouns in the commands. (Author/CL)

  8. Intelligent Interaction for Human-Friendly Service Robot in Smart House Environment

    Directory of Open Access Journals (Sweden)

    Z. Zenn Bien

    2008-01-01

    Full Text Available The smart house under consideration is a service-integrated complex system to assist older persons and/or people with disabilities. The primary goal of the system is to achieve independent living by various robotic devices and systems. Such a system is treated as a human-in-the loop system in which human- robot interaction takes place intensely and frequently. Based on our experiences of having designed and implemented a smart house environment, called Intelligent Sweet Home (ISH, we present a framework of realizing human-friendly HRI (human-robot interaction module with various effective techniques of computational intelligence. More specifically, we partition the robotic tasks of HRI module into three groups in consideration of the level of specificity, fuzziness or uncertainty of the context of the system, and present effective interaction method for each case. We first show a task planning algorithm and its architecture to deal with well-structured tasks autonomously by a simplified set of commands of the user instead of inconvenient manual operations. To provide with capability of interacting in a human-friendly way in a fuzzy context, it is proposed that the robot should make use of human bio-signals as input of the HRI module as shown in a hand gesture recognition system, called a soft remote control system. Finally we discuss a probabilistic fuzzy rule-based life-long learning system, equipped with intention reading capability by learning human behavioral patterns, which is introduced as a solution in uncertain and time-varying situations.

  9. The command to love the neighbour in Paul and the Synoptics

    Directory of Open Access Journals (Sweden)

    Heinz A. Hiestermann

    2016-03-01

    Full Text Available When sayings of Jesus are compared between the Pauline letters and the Synoptic Gospels in an attempt to locate parallels, Galatians 5:14 and Romans 13:8�10 have frequently been put forward as possible parallels to the Synoptic renditions of the great commandment of Mark 12:28�34 (Mt 22:34�40; Lk 10:25�28. These Pauline and Synoptic texts all contain the command to love the neighbour, but the Synoptic texts have added the command to love God to the command to love the neighbour. Paul never quoted the great commandment. Consequently, a relationship between the verses is normally rejected. However, not all possibilities have been explored. In the search for parallels between Pauline and Synoptic Jesus traditions it has been overlooked that Paul and Matthew render the command to love the neighbour more than once. Matthew delivers the command to love the neighbour three times. Only once he has connected it to the command to love God. Matthew renders the single command to love the neighbour twice, resembling the Pauline use of the command. Using the criteria for validating parallels between Pauline and Synoptic Jesus traditions, including verbal agreement and the unique use of the command to love the neighbour by Paul and Matthew, it is argued that a connection between Romans 13:9 and Matthew 19:18�19 is likely.Intradisciplinary and/or interdisciplinary implications: The research explores the use of Leviticus 19:18b by the New Testament authors. It is argued that the command to love the neighbour was given high prominence in the early church, as it was used by the Synoptic authors and by Paul to summarise Jesus� ethical teachings.

  10. Is agritourism eco-friendly? A comparison between agritourisms and other farms in Italy using farm accountancy data network dataset.

    Science.gov (United States)

    Mastronardi, Luigi; Giaccio, Vincenzo; Giannelli, Agostino; Scardera, Alfonso

    2015-01-01

    This paper presents the results of research regarding the environmental performances of Italian farms with agritourism compared with farms without agritourism. In Italy, agritourism is considered an agricultural activity and can only be performed by a farmer. Moreover, Italian national legislation forces the farmer to dedicate himself mainly to traditional farming, rather than to tourism activities. For this reason, environmental performances have been highlighted by analyzing only features and production systems of the farms. By utilizing the most frequent indicators used in studies regarding sustainability, the authors show how Italian agritourisms tend to develop more environmentally friendly agricultural methods, which have a positive impact on biodiversity, landscape and natural resources. The empirical analysis is based on the Italian FADN (Farm Accountancy Data Network) dataset. The European FADN was created to represent farms' technical and economic operation in the European Union and on which it drafts the agricultural and rural policies. The dichotomous structure of the dependent variable (presence or absence of agritourism at the farm) has a propensity for an assessment method based on Binary Response Model Regression.

  11. COMMAND-AND-CONTROL AND MANAGEMENT DECISION MAKING,

    Science.gov (United States)

    Reports that the development of command-and-con trol systems in support of decision making and action taking has been accomplished by military...methods applicable to management systems. Concludes that the command-and-control type system for top management decision making is a man-machine system having as its core an on going, dynamic operation. (Author)

  12. THE PARTICULARITIES OF THE COST CALCULATION METHOD ON COMMANDS IN FURNITURE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Felicia Sabou

    2014-10-01

    Full Text Available The paper present the importance of the method on commands in cost calculation and the particularities of the cost calculation method on commands in the furniture industry. This paper presents a hypotetical study on the method on commands, considering the observations made during 2013-2014, on how it is organized and managed accounts management using method on commands.By presenting this hypothetical model about the accounting in management accounting using the method on commands, the paper contributes to the correct application of this method in practice, specifically in management accounting in companies from the furniture industry. In my opinion the method on commands is an appropriate method for achieving management accounting for companies that have as main activity the production of furniture. When applying the method on commands in cost calculation and in management accounting, the companies must to consider the particularities of the cost calculation, in the furniture industry, like: technical and economic factors from this sector, the technical details of each command, the codification of the commands, planning materials and labor costs for each command, monitoring and recording production costs, registration of the direct costs, distribution of the indirect costs on commands, registration of the indirect costs and registration in management accounting.

  13. Fermilab Friends for Science Education | Welcome

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Fermilab Friends for Science Education photo Fermilab Friends for Science Education supports innovative science education programs at Fermilab. Its mission is to: Enhance the quality of precollege science education in

  14. ITOUGH2 command reference. Version 3.1

    International Nuclear Information System (INIS)

    Finsterle, S.

    1997-04-01

    This report contains a detailed description of all ITOUGH2 commands. It complements the ITOUGH2 User's Guide and the collection of ITOUGH2 sample problems. ITOUGH2 is a program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis. It is based on the TOUGH2 simulator for non-isothermal multiphase flow in fractured and porous media. Extensive experience in using TOUGH2 is a prerequisite for using ITOUGH2. The preparation of an input file for TOUGH2 or its derivatives is described in separate manuals and is not part of this report. The ITOUGH2 user's guide summarizes the inverse modeling theory pertaining to ITOUGH2, and describes the program output. Furthermore, information about code architecture and installation are given. In Chapter 2 of this report, a brief summary of inverse modeling theory is given to restate the main concepts implemented in ITOUGH2 and to introduce certain definitions. Chapter 3 introduces the basic concepts of the ITHOUGH2 input language and the main structure of an ITOUGH2 input file. Chapter 4, the main part of this report, provides detailed descriptions of each ITOUGH2 command in alphabetical order. It is complemented by a command index in Appendix B in which the commands are given in logical order. The content of Chapter 4 is also available on-line using command it2help. Chapter 5 describes the usage of the UNIX script files for executing, checking, and terminating ITOUGH2 simulations

  15. Gender Norms and Institutional Culture: The Family-Friendly versus the Father-Friendly University

    Science.gov (United States)

    Sallee, Margaret W.

    2013-01-01

    This article investigates the role that gender norms and expectations about parenting play in establishing the family-friendly versus the father-friendly university. Using interviews with 51 male faculty at three research universities, the article considers how faculty and administrators' actions perpetuate cultures that promote or hinder…

  16. Somatic surveillance: corporeal control through information networks

    OpenAIRE

    Monahan, Torin; Wall, Tyler

    2007-01-01

    Somatic surveillance is the increasingly invasive technological monitoring of and intervention into body functions. Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices. In this paper, we investigate three developments in somatic surveillance: nanotechnology systems for soldiers on the battlefield, commercial body-monitoring systems for hea...

  17. Implementing Internet of Things in a military command and control environment

    Science.gov (United States)

    Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter

    2017-05-01

    While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.

  18. Intelligent Tutoring System for Teaching Battlefield Command Reasoning Skills

    National Research Council Canada - National Science Library

    Domeshek, Eric

    2002-01-01

    .... Achieving expert levels of proficiency in high-level command reasoning skills-whether for battlefield commanders or for executives in industry-requires extensive practice, coaching, and feedback...

  19. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  20. POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks

    NARCIS (Netherlands)

    Jeckmans, Arjan; Tang, Qiang; Hartel, Pieter H.

    2011-01-01

    Currently, none of the existing online social networks (OSNs) enables its users to make new friends without revealing their private information. This leaves the users in a vulnerable position when searching for new friends. We propose a solution which enables a user to compute her profile similarity

  1. The Mac'OS X command line Unix under the hood

    CERN Document Server

    McElhearn, Kirk

    2006-01-01

    The Mac command line offers a faster, easier way to accomplish many tasks. It''s also the medium for many commands that aren''t accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functionality provided by the command line. It''s also packed with information the experienced users need, including little-known shortcuts and several chapters devoted to advanced topics. This is a book to get you started, but also a book you won't soon outgrow.

  2. Command Structure for Theater Warfare: The Quest for Unity of Command

    Science.gov (United States)

    1984-09-01

    that trryfari tail forth thr htst from iti—Btturki Major General« Pern M Smith. USAF. and Hark) A Hughe«. USAF. contributed more to the rndertaking...an air. ground, and sea component. These arc generic commands which control all combat operations in the media of the air. ground, and sea. There

  3. Social network profiles as information sources for adolescents' offline relations.

    Science.gov (United States)

    Courtois, Cédric; All, Anissa; Vanwynsberghe, Hadewijch

    2012-06-01

    This article presents the results of a study concerning the use of online profile pages by adolescents to know more about "offline" friends and acquaintances. Previous research has indicated that social networking sites (SNSs) are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online connections are meaningful in gathering information on offline friends and acquaintances. First, the results indicate that a combination of passive uncertainty reduction (monitoring a target's profile) and interactive uncertainty reduction (communication through the target's profile) explains a considerable amount of variance in the level of uncertainty about both friends and acquaintances. More specifically, adolescents generally get to know much more about their acquaintances. Second, the results of online uncertainty reduction positively affect the degree of self-disclosure, which is imperative in building a solid friend relation. Further, we find that uncertainty reduction strategies positively mediate the effect of social anxiety on the level of certainty about friends. This implies that socially anxious teenagers benefit from SNSs by getting the conditions right to build a more solid relation with their friends. Hence, we conclude that SNSs play a substantial role in today's adolescents' everyday interpersonal communication.

  4. Feeling labeled, judged, lectured, and rejected by family and friends over depression: Cautionary results for primary care clinicians from a multi-centered, qualitative study

    Directory of Open Access Journals (Sweden)

    Y-Garcia Erik

    2012-06-01

    Full Text Available Abstract Background Family and friends may help patients seek out and engage in depression care. However, patients’ social networks can also undermine depression treatment and recovery. In an effort to improve depression care in primary care settings, we sought to identify, categorize, and alert primary care clinicians to depression-related messages that patients hear from friends and family that patients perceive as unhelpful or detrimental. Methods We conducted 15 focus groups in 3 cities. Participants (n = 116 with a personal history or knowledge of depression responded to open-ended questions about depression, including self-perceived barriers to care-seeking. Focus group conversations were audio-recorded and analyzed using iterative qualitative analysis. Results Four themes emerged related to negatively-received depression messages delivered by family and friends. Specifically, participants perceived these messages as making them feel labeled, judged, lectured to, and rejected by family and friends when discussing depression. Some participants also expressed their interpretation of their families’ motivations for delivering the messages and described how hearing these messages affected depression care. Conclusions The richness of our results reflects the complexity of communication within depression sufferers’ social networks around this stigmatized issue. To leverage patients’ social support networks effectively in depression care, primary care clinicians should be aware of both the potentially beneficial and detrimental aspects of social support. Specifically, clinicians should consider using open-ended queries into patients’ experiences with discussing depression with family and friends as an initial step in the process. An open-ended approach may avoid future emotional trauma or stigmatization and assist patients in overcoming self-imposed barriers to depression discussion, symptom disclosure, treatment adherence and

  5. Feeling labeled, judged, lectured, and rejected by family and friends over depression: cautionary results for primary care clinicians from a multi-centered, qualitative study.

    Science.gov (United States)

    Fernandez Y-Garcia, Erik; Duberstein, Paul; Paterniti, Debora A; Cipri, Camille S; Kravitz, Richard L; Epstein, Ronald M

    2012-06-29

    Family and friends may help patients seek out and engage in depression care. However, patients' social networks can also undermine depression treatment and recovery. In an effort to improve depression care in primary care settings, we sought to identify, categorize, and alert primary care clinicians to depression-related messages that patients hear from friends and family that patients perceive as unhelpful or detrimental. We conducted 15 focus groups in 3 cities. Participants (n = 116) with a personal history or knowledge of depression responded to open-ended questions about depression, including self-perceived barriers to care-seeking. Focus group conversations were audio-recorded and analyzed using iterative qualitative analysis. Four themes emerged related to negatively-received depression messages delivered by family and friends. Specifically, participants perceived these messages as making them feel labeled, judged, lectured to, and rejected by family and friends when discussing depression. Some participants also expressed their interpretation of their families' motivations for delivering the messages and described how hearing these messages affected depression care. The richness of our results reflects the complexity of communication within depression sufferers' social networks around this stigmatized issue. To leverage patients' social support networks effectively in depression care, primary care clinicians should be aware of both the potentially beneficial and detrimental aspects of social support. Specifically, clinicians should consider using open-ended queries into patients' experiences with discussing depression with family and friends as an initial step in the process. An open-ended approach may avoid future emotional trauma or stigmatization and assist patients in overcoming self-imposed barriers to depression discussion, symptom disclosure, treatment adherence and follow-up care.

  6. 32 CFR 809a.10 - Military commanders' responsibilities.

    Science.gov (United States)

    2010-07-01

    ... authorities as soon as possible. (c) Military forces will ordinarily exercise police powers previously... 32 National Defense 6 2010-07-01 2010-07-01 false Military commanders' responsibilities. 809a.10... Disturbance Intervention and Disaster Assistance § 809a.10 Military commanders' responsibilities. (a...

  7. Modeling cascading failures with the crisis of trust in social networks

    Science.gov (United States)

    Yi, Chengqi; Bao, Yuanyuan; Jiang, Jingchi; Xue, Yibo

    2015-10-01

    In social networks, some friends often post or disseminate malicious information, such as advertising messages, informal overseas purchasing messages, illegal messages, or rumors. Too much malicious information may cause a feeling of intense annoyance. When the feeling exceeds a certain threshold, it will lead social network users to distrust these friends, which we call the crisis of trust. The crisis of trust in social networks has already become a universal concern and an urgent unsolved problem. As a result of the crisis of trust, users will cut off their relationships with some of their untrustworthy friends. Once a few of these relationships are made unavailable, it is likely that other friends will decline trust, and a large portion of the social network will be influenced. The phenomenon in which the unavailability of a few relationships will trigger the failure of successive relationships is known as cascading failure dynamics. To our best knowledge, no one has formally proposed cascading failures dynamics with the crisis of trust in social networks. In this paper, we address this potential issue, quantify the trust between two users based on user similarity, and model the minimum tolerance with a nonlinear equation. Furthermore, we construct the processes of cascading failures dynamics by considering the unique features of social networks. Based on real social network datasets (Sina Weibo, Facebook and Twitter), we adopt two attack strategies (the highest trust attack (HT) and the lowest trust attack (LT)) to evaluate the proposed dynamics and to further analyze the changes of the topology, connectivity, cascading time and cascade effect under the above attacks. We numerically find that the sparse and inhomogeneous network structure in our cascading model can better improve the robustness of social networks than the dense and homogeneous structure. However, the network structure that seems like ripples is more vulnerable than the other two network

  8. OPTIMAL CONFIGURATION OF A COMMAND AND CONTROL NETWORK: BALANCING PERFORMANCE AND RECONFIGURATION CONSTRAINTS

    Energy Technology Data Exchange (ETDEWEB)

    L. DOWELL

    1999-07-01

    The optimization of the configuration of communications and control networks is important for assuring the reliability and performance of the networks. This paper presents techniques for determining the optimal configuration for such a network in the presence of communication and connectivity constraints.

  9. Review of Social Networking Sites' Security and Privacy

    OpenAIRE

    YANG, SHUN

    2015-01-01

    Nowadays social media networking has dramatically increased. Social networking sites like Facebook make users create huge amount of profiles and share personal information within networking of different users. Social networking exposes personal information far beyond the group of friends. And that information or data on social media networking could be potential threat to people's information security and privacy. In this review, we are going to view the privacy risks and security problem...

  10. 106-17 Telemetry Standards Recorder and Reproducer Command and Control Chapter 6

    Science.gov (United States)

    2017-07-01

    block identifiers (any ASCII text , one identifier per line) from the drive. A .BBLIST command is only valid following a declassify command. The type ... Processor Device Using IEEE 1394b ..... 6-49 6.5.6 Additional Mandatory Commands When Using Ethernet ........................... 6-54 6.5.7 Additional Non...state or magnetic disk). Not all commands (CLI or discrete) may be applicable to all types of R/R implementations. Commands are used to a) control the

  11. Multiplex congruity: friendship networks and perceived popularity as correlates of adolescent alcohol use.

    Science.gov (United States)

    Fujimoto, Kayo; Valente, Thomas W

    2015-01-01

    Adolescents interact with their peers in multiple social settings and form various types of peer relationships that affect drinking behavior. Friendship and popularity perceptions constitute critical relationships during adolescence. These two relations are commonly measured by asking students to name their friends, and this network is used to construct drinking exposure and peer status variables. This study takes a multiplex network approach by examining the congruity between friendships and popularity as correlates of adolescent drinking. Using data on friendship and popularity nominations among high school adolescents in Los Angeles, California (N = 1707; five schools), we examined the associations between an adolescent's drinking and drinking by (a) their friends only; (b) multiplexed friendships, friends also perceived as popular; and (c) congruent, multiplexed-friends, close friends perceived as popular. Logistic regression results indicated that friend-only drinking, but not multiplexed-friend drinking, was significantly associated with self-drinking (AOR = 3.51, p < 0.05). However, congruent, multiplexed-friend drinking also was associated with self-drinking (AOR = 3.10, p < 0.05). This study provides insight into how adolescent health behavior is predicated on the multiplexed nature of peer relationships. The results have implications for the design of health promotion interventions for adolescent drinking. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  12. Best friends' interactions and substance use: The role of friend pressure and unsupervised co-deviancy.

    Science.gov (United States)

    Tsakpinoglou, Florence; Poulin, François

    2017-10-01

    Best friends exert a substantial influence on rising alcohol and marijuana use during adolescence. Two mechanisms occurring within friendship - friend pressure and unsupervised co-deviancy - may partially capture the way friends influence one another. The current study aims to: (1) examine the psychometric properties of a new instrument designed to assess pressure from a youth's best friend and unsupervised co-deviancy; (2) investigate the relative contribution of these processes to alcohol and marijuana use; and (3) determine whether gender moderates these associations. Data were collected through self-report questionnaires completed by 294 Canadian youths (62% female) across two time points (ages 15-16). Principal component analysis yielded a two-factor solution corresponding to friend pressure and unsupervised co-deviancy. Logistic regressions subsequently showed that unsupervised co-deviancy was predictive of an increase in marijuana use one year later. Neither process predicted an increase in alcohol use. Results did not differ as a function of gender. Copyright © 2017 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  13. Development and Validation of Nigerian Army Commanding Officers ...

    African Journals Online (AJOL)

    The research adopted an ex-post-facto design based on a qualitative and quantitative analysis of data. Focus Group Discussions (FGDs) and In-Depth Interviews (IDIs) were conducted with commanding officers. The FGDs were conducted with officers purposively drawn from incumbent commanding officers in the Nigerian ...

  14. Scale-free Enterprise Command & Control

    National Research Council Canada - National Science Library

    Bayne, Jay; Paul, Raymond

    2005-01-01

    ...) services that provide allied teams of commanders, planners and operations personnel with collaborative, grid-based and realtime situation assessment, plan generation, and plan execution services...

  15. Friend or Foe?

    Science.gov (United States)

    ... Ribbon Commands Skip to main content Turn off Animations Turn on Animations Our Sponsors Log in | Register Menu Log in | ... best in him, rather than the worst. By reading up on the subject, discussing it with my ...

  16. With a little help from my friends : music consumption and networks

    Directory of Open Access Journals (Sweden)

    Paul Widdop

    2015-01-01

    Full Text Available It is widely accepted that a shift has occurred in the cultural consumption patterns of those higher in the social strata. Where tastes were based around rules of exclusion, they are now based on openness to a variety of cultures, both esoteric and popular. What is less understood is how an individual’s social networks affect their cultural tastes. Using social survey data on cultural participation, we find that musical consumption is mediated and construed through networks, and these networks play a much more significant role in cultural behaviour than current theoretical frameworks suggest.

  17. Bridging online and offline social networks: Multiplex analysis

    Science.gov (United States)

    Filiposka, Sonja; Gajduk, Andrej; Dimitrova, Tamara; Kocarev, Ljupco

    2017-04-01

    We show that three basic actor characteristics, namely normalized reciprocity, three cycles, and triplets, can be expressed using an unified framework that is based on computing the similarity index between two sets associated with the actor: the set of her/his friends and the set of those considering her/him as a friend. These metrics are extended to multiplex networks and then computed for two friendship networks generated by collecting data from two groups of undergraduate students. We found that in offline communication strong and weak ties are (almost) equally presented, while in online communication weak ties are dominant. Moreover, weak ties are much less reciprocal than strong ties. However, across different layers of the multiplex network reciprocities are preserved, while triads (measured with normalized three cycles and triplets) are not significant.

  18. User-friendly Establishment of Trust in Distributed Home Automation Networks

    DEFF Research Database (Denmark)

    Solberg Hjorth, Theis; Torbensen, Rune; Madsen, Per Printz

    2014-01-01

    Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup...... these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented...

  19. U.S. Africa Command: Shaping Africa for the Future

    National Research Council Canada - National Science Library

    Sholley, Hans

    2006-01-01

    .... It is argued the current Unified Command Plan is ill designed to address the complexities of the continent of Africa and that a proposed United States Africa Command would be better positioned...

  20. 14 CFR 417.303 - Command control system requirements.

    Science.gov (United States)

    2010-01-01

    ... system must transmit a command signal that has the radio frequency characteristics and power needed for.... (c) Reliability prediction. A command control system must have a predicted reliability of 0.999 at... for each launch. Any demonstration of the system's predicted reliability must satisfy § 417.309(b). (d...

  1. Diffusion of Intervention Effects: The Impact of a Family-based Substance Use Prevention Program on Friends of Participants

    Science.gov (United States)

    Rulison, Kelly L.; Feinberg, Mark; Gest, Scott D.; Osgood, D. Wayne

    2015-01-01

    Purpose We tested whether effects of the Strengthening Families Program for Youth 10–14 (SFP10–14) diffused from intervention participants to their friends. We also tested which program effects on participants accounted for diffusion. Methods Data are from 5,449 students (51% female; mean initial age=12.3 years) in the PROSPER community intervention trial (2001–2006) who did not participate in SFP10–14 (i.e., non-participants). At each of 5 waves, students identified up to 7 friends and self-reported past month drunkenness and cigarette use, substance use attitudes, parenting practices, and unsupervised time spent with friends. We computed two measures of indirect exposure to SFP10–14: total number of SFP-attending friends at each wave and cumulative proportion of SFP-attending friends averaged across the current and all previous post-intervention waves. Results Three years post-intervention, the odds of getting drunk (OR=1.4) and using cigarettes (OR=2.7) were higher among non-participants with 0 SFP-attending friends compared to non-participants with 3 or more SFP-attending friends. Multilevel analyses also provided evidence of diffusion: non-participants with a higher cumulative proportion of SFP-attending friends at a given wave were less likely than their peers to use drugs at that wave. Effects from SFP10–14 primarily diffused through friendship networks by reducing the amount of unstructured socializing (unsupervised time that non-participants spent with friends), changing friends’ substance use attitudes, and then changing non-participants’ own substance use attitudes. Conclusions Program developers should consider and test how interventions may facilitate diffusion to extend program reach and promote program sustainability. PMID:26210856

  2. Diffusion of Intervention Effects: The Impact of a Family-Based Substance Use Prevention Program on Friends of Participants.

    Science.gov (United States)

    Rulison, Kelly L; Feinberg, Mark; Gest, Scott D; Osgood, D Wayne

    2015-10-01

    We tested whether effects of the Strengthening Families Program for Youth 10-14 (SFP10-14) diffused from intervention participants to their friends. We also tested which program effects on participants accounted for diffusion. Data are from 5,449 students (51% female; mean initial age = 12.3 years) in the PROmoting School-community-university Partnerships to Enhance Resilience community intervention trial (2001-2006) who did not participate in SFP10-14 (i.e., nonparticipants). At each of five waves, students identified up to seven friends and self-reported past month drunkenness and cigarette use, substance use attitudes, parenting practices, and unsupervised time spent with friends. We computed two measures of indirect exposure to SFP10-14: total number of SFP-attending friends at each wave and cumulative proportion of SFP-attending friends averaged across the current and all previous post-intervention waves. Three years post-intervention, the odds of getting drunk (odds ratio = 1.4) and using cigarettes (odds ratio = 2.7) were higher among nonparticipants with zero SFP-attending friends compared with nonparticipants with three or more SFP-attending friends. Multilevel analyses also provided evidence of diffusion: nonparticipants with a higher cumulative proportion of SFP-attending friends at a given wave were less likely than their peers to use drugs at that wave. Effects from SFP10-14 primarily diffused through friendship networks by reducing the amount of unstructured socializing (unsupervised time that nonparticipants spent with friends), changing friends' substance use attitudes, and then changing nonparticipants' own substance use attitudes. Program developers should consider and test how interventions may facilitate diffusion to extend program reach and promote program sustainability. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  3. NETS - A NEURAL NETWORK DEVELOPMENT TOOL, VERSION 3.0 (MACINTOSH VERSION)

    Science.gov (United States)

    Phillips, T. A.

    1994-01-01

    NETS, A Tool for the Development and Evaluation of Neural Networks, provides a simulation of Neural Network algorithms plus an environment for developing such algorithms. Neural Networks are a class of systems modeled after the human brain. Artificial Neural Networks are formed from hundreds or thousands of simulated neurons, connected to each other in a manner similar to brain neurons. Problems which involve pattern matching readily fit the class of problems which NETS is designed to solve. NETS uses the back propagation learning method for all of the networks which it creates. The nodes of a network are usually grouped together into clumps called layers. Generally, a network will have an input layer through which the various environment stimuli are presented to the network, and an output layer for determining the network's response. The number of nodes in these two layers is usually tied to some features of the problem being solved. Other layers, which form intermediate stops between the input and output layers, are called hidden layers. NETS allows the user to customize the patterns of connections between layers of a network. NETS also provides features for saving the weight values of a network during the learning process, which allows for more precise control over the learning process. NETS is an interpreter. Its method of execution is the familiar "read-evaluate-print" loop found in interpreted languages such as BASIC and LISP. The user is presented with a prompt which is the simulator's way of asking for input. After a command is issued, NETS will attempt to evaluate the command, which may produce more prompts requesting specific information or an error if the command is not understood. The typical process involved when using NETS consists of translating the problem into a format which uses input/output pairs, designing a network configuration for the problem, and finally training the network with input/output pairs until an acceptable error is reached. NETS

  4. OS Friendly Microprocessor Architecture

    Science.gov (United States)

    2017-04-01

    NOTES Patrick La Fratta is now affiliated with Micron Technology, Inc., Boise, Idaho. 14. ABSTRACT We present an introduction to the patented ...Operating System Friendly Microprocessor Architecture (OSFA). The software framework to support the hardware-level security features is currently patent ...Army is assignee. OS Friendly Microprocessor Architecture. United States Patent 9122610. 2015 Sep. 2. Jungwirth P, inventor; US Army is assignee

  5. What's Love Got to Do with It? Exploring the Impact of Maintenance Rules, Love Attitudes, and Network Support on Friends with Benefits Relationships

    Science.gov (United States)

    Hughes, Mikayla; Morrison, Kelly; Asada, Kelli Jean K.

    2005-01-01

    Friends with benefits relationships (FWBRs) are defined as relationships between cross-sex friends in which the friends engage in sexual activity but do not define their relationship as romantic. Relationship scholars have only recently begun to examine these relationships, despite their mention in the popular media (e.g., HBO's 'Sex in the City,'…

  6. An Analysis of the Differences between Student Age and Social Networking Utilization within a School of Business

    Science.gov (United States)

    Zula, Ken; Yarrish, Karen K.; Pawelzik, Walter

    2011-01-01

    Social networking sites such as Facebook, LinkedIn, and Twitter are widely regarded as an exciting opportunity to communicate with friends, especially for college students. The overall response to social networking tends to be one of trust regarding a generation that, supposedly has many friends but little sense of privacy. Employers use social…

  7. Command vector memory systems: high performance at low cost

    OpenAIRE

    Corbal San Adrián, Jesús; Espasa Sans, Roger; Valero Cortés, Mateo

    1998-01-01

    The focus of this paper is on designing both a low cost and high performance, high bandwidth vector memory system that takes advantage of modern commodity SDRAM memory chips. To successfully extract the full bandwidth from SDRAM parts, we propose a new memory system organization based on sending commands to the memory system as opposed to sending individual addresses. A command specifies, in a few bytes, a request for multiple independent memory words. A command is similar to a burst found in...

  8. Exploring Mechanisms Underlying Impaired Brain Function in Gulf War Illness through Advanced Network Analysis

    Science.gov (United States)

    2017-10-01

    networks of the brain responsible for visual processing, mood regulation, motor coordination, sensory processing, and language command, but increased...4    For each subject, the rsFMRI voxel time-series were temporally shifted to account for differences in slice acquisition times...responsible for visual processing, mood regulation, motor coordination, sensory processing, and language command, but increased connectivity in

  9. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-06-01

    of trust. First, social trust refers to properties derived from social relationships . Examples of social networks are strong social ... relationships such as colleagues or relatives or loose social relationships such as school alumni or friends with common interests [44]. Social trust may...also use social relationships in evaluating the trust metric among group members by employing the concept of social networks. Yu et al. [44] define

  10. Building Child Friendly Cities in the MENA region

    Science.gov (United States)

    Nour, Osman El Hassan M.

    2013-09-01

    The notion of Child Friendly Cities (CFCs) was first developed during the Second United Nations Conference on Human Settlements (HABITAT II), held in Istanbul in 1996. The concept is based on four general principles of the United Nations Convention on the rights of the child: (1) fair treatment of every child, regardless of ethnicity, gender, religion, socioeconomic background etc.; (2) top priority of the best interests of the child; (3) the child's right to a better life and development; and (4) respect of children's views. In a CFC, children are encouraged to take part in the decision making processes that affect their lives. Instead of starting yet another programme for children, the development of a CFC mobilises and connects existing agencies and actors. Giving examples of some cities in the Middle East and North Africa (MENA) region, this paper demonstrates that building CFCs has induced the development of mechanisms and structures which have enabled cities to address children's issues in a systematic manner. These mechanisms and structures include: a municipal child-friendly legal framework, local development councils and NGO networks and local municipal development offices. The author argues that in building CFCs, the role of municipal authorities is indispensable in responding to the needs of children and young people within the municipalities' mandates.

  11. Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player

    Directory of Open Access Journals (Sweden)

    Vivien Arief Wardhany

    2014-12-01

    Full Text Available The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male & 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word “Kanan” had the most recognize with percentage 83% while “pilih” is the lowest one. The word which had the most wrong clarification is “kembali” with percentagee 67%, while the word “kanan” is the lowest one. From the result of Recognition Rate by male there are several command such as “Kembali”, “Utama”, “Atas “ and “Bawah” has the low Recognition Rate. Especially for “kembali” cannot be recognized as the command in the female voices but in male voice that command has 4% of RR this is because the command doesn’t have similar word in english near to “kembali” so the system unrecognize the command. Also for the command “Pilih” using the female voice has 80% of RR but for the male voice has only 4% of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz than woman (165 to 255 Hz.The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system

  12. Irrigation and crop management in Gandak Canal command of India

    International Nuclear Information System (INIS)

    Singh, S.S.; Khan, A.R.

    2002-05-01

    The Gandak Project is one of the biggest irrigation projects in India, covering a culturable command area (CCA) of 4.44 lakh ha in U.P., 9.6 lakh ha CCA in Bihar and 0.44 lakh ha in Nepal (Singh and Khan, 2002). The total culturable command areas are 14.44 lakh hectares. The command area is located in between latitude 25 deg 40' to 27 deg 25' and longitude between 83 deg 15' to 85 deg 15'. It is a diversion project through construction of a barrage on the river Gandak. This project area covers up to five districts in the Command of Tirhut Main Canal (TMC) and 3 districts in the Saran Main Canal (SMC) command. The length of main canal is usually long (990 and 650 R.D.'s in eastern and western side, respectively) and the channels are unlined and seepage loss is quite high. (author)

  13. Combatant Commanders Informational Series: USPACOM

    National Research Council Canada - National Science Library

    Comnick, Michael

    1996-01-01

    ...) introducing potential joint staff officers to their specific command. Inbound staff officers, prepared by reviewing this product, arrive on station ready to receive specialized training without needing background indoctrination...

  14. Hundred rubles or hundred friends? (The causes of network and market corruption

    Directory of Open Access Journals (Sweden)

    M V Kravtsova

    2014-12-01

    Full Text Available The author distinguishes two forms of corruption - market corruption and network corruption. The market corruption is the use of public office for personal gain, when every firm or individual who pays a bribe receives public services. The network corruption is the use of public office for personal gain, when only those firms or individuals who are in kinship, friendship or business relationships with public officials receive public services. The author believes that network and market corruption may have different causes and consequences, that is why they should be treated separately. Using Life in Transition Survey II from EBRD (2010 the aggregated level of the market corruption, network corruption and the mixed form of corruption was measured. The results showed that the market corruption and the mixed form are strongly positively correlated and are very sensitive to worsening of socio-economic conditions. The pure network corruption correlates negatively with two other forms and is more inert and stable. The pure network corruption is not associated with worsening of socio-economic conditions and is rather a reaction to the strict anticorruption measures in the poor institutional environment.

  15. Group colocation behavior in technological social networks.

    Directory of Open Access Journals (Sweden)

    Chloë Brown

    Full Text Available We analyze two large datasets from technological networks with location and social data: user location records from an online location-based social networking service, and anonymized telecommunications data from a European cellphone operator, in order to investigate the differences between individual and group behavior with respect to physical location. We discover agreements between the two datasets: firstly, that individuals are more likely to meet with one friend at a place they have not visited before, but tend to meet at familiar locations when with a larger group. We also find that groups of individuals are more likely to meet at places that their other friends have visited, and that the type of a place strongly affects the propensity for groups to meet there. These differences between group and solo mobility has potential technological applications, for example, in venue recommendation in location-based social networks.

  16. Effective Response to Attacks On Department of Defense Computer Networks

    National Research Council Canada - National Science Library

    Shaha, Patrick

    2001-01-01

    .... For the Commanders-in-Chief (CINCs), computer networking has proven especially useful in maintaining contact and sharing data with elements forward deployed as well as with host nation governments and agencies...

  17. Physical and social activities mediate the associations between social network types and ventilatory function in Chinese older adults.

    Science.gov (United States)

    Cheng, Sheung-Tak; Leung, Edward M F; Chan, Trista Wai Sze

    2014-06-01

    This study examined the associations between social network types and peak expiratory flow (PEF), and whether these associations were mediated by social and physical activities and mood. Nine hundred twenty-four community-dwelling Chinese older adults, who were classified into five network types (diverse, friend-focused, family-focused, distant family, and restricted), provided data on demographics, social and physical activities, mood, smoking, chronic diseases, and instrumental activities of daily living. PEF and biological covariates, including blood lipids and glucose, blood pressure, and height and weight, were assessed. Two measures of PEF were analyzed: the raw reading in L/min and the reading expressed as percentage of predicted normal value on the basis of age, sex, and height. Diverse, friend-focused, and distant family networks were hypothesized to have better PEF values compared with restricted networks, through higher physical and/or social activities. No relative advantage was predicted for family-focused networks because such networks tend to be associated with lower physical activity. Older adults with diverse, friend-focused, and distant family networks had significantly better PEF measures than those with restricted networks. The associations between diverse network and PEF measures were partially mediated by physical exercise and socializing activity. The associations between friend-focused network and PEF measures were partially mediated by socializing activity. No significant PEF differences between family-focused and restricted networks were found. Findings suggest that social network types are associated with PEF in older adults, and that network-type differences in physical and socializing activity is partly responsible for this relationship. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  18. Commander manipulator scoops prestigious mulit-million pound BNFL contract

    International Nuclear Information System (INIS)

    Bailey, Andrew.

    1997-01-01

    Twenty-one Commander robotic arms are on order from INBIS (formerly Ricardo Hitec) and BNFL Engineering Limited (''BEL'', the engineering arm of parent company BNFL). The multi-million pound contract was won amid fierce competition from other well-known names in robotic engineering. The specially designed Commander manipulators will be engaged in remotely handling Intermediate Level Waste (ILW) in a suite of four BNFL ILW plants, which are currently either under construction or planned at Sellafield. The first Commander will delivered to BNFL's Sellafield Silo Emptying Project in January 1998. (Author)

  19. Warfighter Associate: Decision Aiding and Metrics for Mission Command

    Science.gov (United States)

    2012-01-23

    Distributions: highlights the Pareto Principle -- the top 20% of the mission-command staff is heavily involved in collaborations. • Our...developing “Command Web”, a web service to support thin- client functionality (Intelligent Presentation Services enables this) Thank you

  20. User friendly packaging

    DEFF Research Database (Denmark)

    Geert Jensen, Birgitte

    2010-01-01

    Most consumers have experienced occasional problems with opening packaging. Tomato sauce from the tinned mackerel splattered all over the kitchen counter, the unrelenting pickle jar lid, and the package of sliced ham that cannot be opened without a knife or a pair of scissors. The research project...... “User-friendly Packaging” aims to create a platform for developing more user-friendly packaging. One intended outcome of the project is a guideline that industry can use in development efforts. The project also points the way for more extended collaboration between companies and design researchers. How...... can design research help industry in packaging innovation?...

  1. The Influence of Future Command, Control, Communications, and Computers (C4) on Doctrine and the Operational Commander's Decision-Making Process

    Science.gov (United States)

    Mayer, Michael G.

    1996-01-01

    Future C4 systems will alter the traditional balance between force and information, having a profound influence on doctrine and the operational commander's decision making process. The Joint Staff's future vision of C4 is conceptualized in 'C4I for the Warrior' which envisions a joint C4I architecture providing timely sensor to shoot information direct to the warfighter. C4 system must manage and filter an overwhelming amount of information; deal with interoperability issues; overcome technological limitations; meet emerging security requirements; and protect against 'Information Warfare.' Severe budget constraints necessitate unified control of C4 systems under singular leadership for the common good of all the services. In addition, acquisition policy and procedures must be revamped to allow new technologies to be fielded quickly; and the commercial marketplace will become the preferred starting point for modernization. Flatter command structures are recommended in this environment where information is available instantaneously. New responsibilities for decision making at lower levels are created. Commanders will have to strike a balance between exerting greater control and allowing subordinates enough flexibility to maintain initiative. Clearly, the commander's intent remains the most important tool in striking this balance.

  2. U.S. Pacific Command > Leadership

    Science.gov (United States)

    USPACOM U.S. Pacific Command Search USPACOM: Search Search Search USPACOM: Search Home Leadership Directory Media Inquiries Home : Leadership Admiral Harry B. Harris, Jr., U.S. Navy Read the full biography

  3. 75 FR 63851 - Draft Friends Organizations Policy

    Science.gov (United States)

    2010-10-18

    ...] Draft Friends Organizations Policy AGENCY: Fish and Wildlife Service, Department of the Interior. ACTION... Service's mission through partnerships with Friends organizations (volunteer/advocate). Today, Friends organizations play a vital role in helping to fulfill the Service's mission of ``working with others, to...

  4. XTCE: XML Telemetry and Command Exchange Tutorial, XTCE Version 1

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad

    2008-01-01

    These presentation slides are a tutorial on XML Telemetry and Command Exchange (XTCE). The goal of XTCE is to provide an industry standard mechanism for describing telemetry and command streams (particularly from satellites.) it wiill lower cost and increase validation over traditional formats, and support exchange or native format.XCTE is designed to describe bit streams, that are typical of telemetry and command in the historic space domain.

  5. NETS - A NEURAL NETWORK DEVELOPMENT TOOL, VERSION 3.0 (MACHINE INDEPENDENT VERSION)

    Science.gov (United States)

    Baffes, P. T.

    1994-01-01

    NETS, A Tool for the Development and Evaluation of Neural Networks, provides a simulation of Neural Network algorithms plus an environment for developing such algorithms. Neural Networks are a class of systems modeled after the human brain. Artificial Neural Networks are formed from hundreds or thousands of simulated neurons, connected to each other in a manner similar to brain neurons. Problems which involve pattern matching readily fit the class of problems which NETS is designed to solve. NETS uses the back propagation learning method for all of the networks which it creates. The nodes of a network are usually grouped together into clumps called layers. Generally, a network will have an input layer through which the various environment stimuli are presented to the network, and an output layer for determining the network's response. The number of nodes in these two layers is usually tied to some features of the problem being solved. Other layers, which form intermediate stops between the input and output layers, are called hidden layers. NETS allows the user to customize the patterns of connections between layers of a network. NETS also provides features for saving the weight values of a network during the learning process, which allows for more precise control over the learning process. NETS is an interpreter. Its method of execution is the familiar "read-evaluate-print" loop found in interpreted languages such as BASIC and LISP. The user is presented with a prompt which is the simulator's way of asking for input. After a command is issued, NETS will attempt to evaluate the command, which may produce more prompts requesting specific information or an error if the command is not understood. The typical process involved when using NETS consists of translating the problem into a format which uses input/output pairs, designing a network configuration for the problem, and finally training the network with input/output pairs until an acceptable error is reached. NETS

  6. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  7. The R Commander: A Basic-Statistics Graphical User Interface to R

    Directory of Open Access Journals (Sweden)

    John Fox

    2005-08-01

    Full Text Available Unlike S-PLUS, R does not incorporate a statistical graphical user interface (GUI, but it does include tools for building GUIs. Based on the tcltk package (which furnishes an interface to the Tcl/Tk GUI toolkit, the Rcmdr package provides a basic-statistics graphical user interface to R called the "R Commander." The design objectives of the R Commander were as follows: to support, through an easy-to-use, extensible, cross-platform GUI, the statistical functionality required for a basic-statistics course (though its current functionality has grown to include support for linear and generalized-linear models, and other more advanced features; to make it relatively difficult to do unreasonable things; and to render visible the relationship between choices made in the GUI and the R commands that they generate. The R Commander uses a simple and familiar menu/dialog-box interface. Top-level menus include File, Edit, Data, Statistics, Graphs, Models, Distributions, Tools, and Help, with the complete menu tree given in the paper. Each dialog box includes a Help button, which leads to a relevant help page. Menu and dialog-box selections generate R commands, which are recorded in a script window and are echoed, along with output, to an output window. The script window also provides the ability to edit, enter, and re-execute commands. Error messages, warnings, and some other information appear in a separate messages window. Data sets in the R Commander are simply R data frames, and can be read from attached packages or imported from files. Although several data frames may reside in memory, only one is "active" at any given time. There may also be an active statistical model (e.g., an R lm or glm ob ject. The purpose of this paper is to introduce and describe the use of the R Commander GUI; to describe the design and development of the R Commander; and to explain how the R Commander GUI can be extended. The second part of the paper (following a brief

  8. Control of automated system with voice commands

    OpenAIRE

    Švara, Denis

    2012-01-01

    In smart houses contemporary achievements in the fields of automation, communications, security and artificial intelligence, increase comfort and improve the quality of user's lifes. For the purpose of this thesis we developed a system for managing a smart house with voice commands via smart phone. We focused at voice commands most. We want move from communication with fingers - touches, to a more natural, human relationship - speech. We developed the entire chain of communication, by which t...

  9. Popularity and Adolescent Friendship Networks : Selection and Influence Dynamics

    NARCIS (Netherlands)

    Dijkstra, Jan Kornelis; Cillessen, Antonius H. N.; Borch, Casey

    This study examined the dynamics of popularity in adolescent friendship networks across 3 years in middle school. Longitudinal social network modeling was used to identify selection and influence in the similarity of popularity among friends. It was argued that lower status adolescents strive to

  10. Popularity and Adolescent Friendship Networks: Selection and Influence Dynamics

    NARCIS (Netherlands)

    Dijkstra, J.K.; Cillessen, A.H.N.; Borch, C.

    2013-01-01

    This study examined the dynamics of popularity in adolescent friendship networks across 3 years in middle school. Longitudinal social network modeling was used to identify selection and influence in the similarity of popularity among friends. It was argued that lower status adolescents strive to

  11. Command in the Objective Force

    National Research Council Canada - National Science Library

    Wilbeck, Christopher

    2003-01-01

    This paper seeks to answer what type of command will best serve the Army's Objective Force in gaining the initiative, building momentum, and exploiting success to achieve land dominance in the future...

  12. The interplay of friendship networks and social networking sites: longitudinal analysis of selection and influence effects on adolescent smoking and alcohol use.

    Science.gov (United States)

    Huang, Grace C; Soto, Daniel; Fujimoto, Kayo; Valente, Thomas W

    2014-08-01

    We examined the coevolution of adolescent friendships and peer influences with respect to their risk behaviors and social networking site use. Investigators of the Social Network Study collected longitudinal data during fall 2010 and spring 2011 from 10th-grade students in 5 Southern California high schools (n = 1434). We used meta-analyses of stochastic actor-based models to estimate changes in friendship ties and risk behaviors and the effects of Facebook and MySpace use. Significant shifts in adolescent smoking and drinking occurred despite little change in overall prevalence rates. Students with higher levels of alcohol use were more likely to send and receive friendship nominations and become friends with other drinkers. They were also more likely to increase alcohol use if their friends drank more. Adolescents selected friends with similar Facebook and MySpace use habits. Exposure to friends' risky online pictures increased smoking behaviors but had no significant effects on alcohol use. Our findings support a greater focus on friendship selection mechanisms in school-based alcohol use interventions. Social media platforms may help identify at-risk adolescent groups and foster positive norms about risk behaviors.

  13. Social networks and links to isolation and loneliness among elderly HCBS clients.

    Science.gov (United States)

    Medvene, Louis J; Nilsen, Kari M; Smith, Rachel; Ofei-Dodoo, Samuel; DiLollo, Anthony; Webster, Noah; Graham, Annette; Nance, Anita

    2016-01-01

    The purpose of this study was to explore the network types of HCBS clients based on the structural characteristics of their social networks. We also examined how the network types were associated with social isolation, relationship quality and loneliness. Forty personal interviews were carried out with HCBS clients to assess the structure of their social networks as indicated by frequency of contact with children, friends, family and participation in religious and community organizations. Hierarchical cluster analysis was conducted to identify network types. Four network types were found including: family (n = 16), diverse (n = 8), restricted (n = 8) and religious (n = 7). Family members comprised almost half of participants' social networks, and friends comprised less than one-third. Clients embedded in family, diverse and religious networks had significantly more positive relationships than clients embedded in restricted networks. Clients embedded in restricted networks had significantly higher social isolation scores and were lonelier than clients in diverse and family networks. The findings suggest that HCBS clients' isolation and loneliness are linked to the types of social networks in which they are embedded. The findings also suggest that clients embedded in restricted networks are at high risk for negative outcomes.

  14. Incident command linkup: the vital key for CBRN response

    International Nuclear Information System (INIS)

    Smith, D.

    2009-01-01

    The most vital element for responding emergency personnel to a CBRN attack is the incident command linkup and dissemination of information. Incident Command, the basic foundation of the National Incident Management System (NIMS), is the first thing that must be effectively established when a response is required in any emergency. When initial evaluation of the scene determines that the incident involves CBRN, specialized resources from a wide array of assets must be activated quickly to mitigate the hazards. In this paper, we examine the information that the Incident Commander must be prepared to convey to those specialized assets responding. We will also look at what questions those specialized resources may ask while en route and upon arrival. Another key element that will be discussed is the placement of those resources in the hierarchy of the National Incident Management System. The information that the Incident Commander (IC) must be prepared to convey to those specialized assets responding is crucial for an efficient response and effective deployment. What questions might those specialized CBRN resources ask while en route and upon arrival? At a bare minimum, the four basic questions of who is in charge of the incident, where is the incident located, what transpired to trigger a response, and when did the incident occur must be answered. These questions should be answered while en route to the scene so that the Commander of the responding CBRN unit can formulate a plan on the move and prepare his response accordingly. While in transit, the CBRN responders should maintain contact with a representative of the Incident Command at the scene so that the latest information is available. Discussions should include anticipated logistical requirements such as personal protective equipment (PPE), decon requirements, communications protocols, and medical care issues. The CBRN Commander will need to know if the site is secure, has it been cleared of explosive hazards

  15. The social networks of teens and young adults

    DEFF Research Database (Denmark)

    Ling, Richard

    2008-01-01

    This article examines the way in which social networks operate within small groups. The study examines the social networks of teens and young adults. Groups of friends were recruited for the study and thus the unit of analysis is the group as opposed to the individual. The members of each group...

  16. Normalized Index of Synergy for Evaluating the Coordination of Motor Commands

    Science.gov (United States)

    Togo, Shunta; Imamizu, Hiroshi

    2015-01-01

    Humans perform various motor tasks by coordinating the redundant motor elements in their bodies. The coordination of motor outputs is produced by motor commands, as well properties of the musculoskeletal system. The aim of this study was to dissociate the coordination of motor commands from motor outputs. First, we conducted simulation experiments where the total elbow torque was generated by a model of a simple human right and left elbow with redundant muscles. The results demonstrated that muscle tension with signal-dependent noise formed a coordinated structure of trial-to-trial variability of muscle tension. Therefore, the removal of signal-dependent noise effects was required to evaluate the coordination of motor commands. We proposed a method to evaluate the coordination of motor commands, which removed signal-dependent noise from the measured variability of muscle tension. We used uncontrolled manifold analysis to calculate a normalized index of synergy. Simulation experiments confirmed that the proposed method could appropriately represent the coordinated structure of the variability of motor commands. We also conducted experiments in which subjects performed the same task as in the simulation experiments. The normalized index of synergy revealed that the subjects coordinated their motor commands to achieve the task. Finally, the normalized index of synergy was applied to a motor learning task to determine the utility of the proposed method. We hypothesized that a large part of the change in the coordination of motor outputs through learning was because of changes in motor commands. In a motor learning task, subjects tracked a target trajectory of the total torque. The change in the coordination of muscle tension through learning was dominated by that of motor commands, which supported the hypothesis. We conclude that the normalized index of synergy can be used to evaluate the coordination of motor commands independently from the properties of the

  17. Searching LOGIN, the Local Government Information Network.

    Science.gov (United States)

    Jack, Robert F.

    1984-01-01

    Describes a computer-based information retrieval and electronic messaging system produced by Control Data Corporation now being used by government agencies and other organizations. Background of Local Government Information Network (LOGIN), database structure, types of LOGIN units, searching LOGIN (intersect, display, and list commands), and how…

  18. Command Leadership DEOCS 4.1 Construct Validity Summary

    Science.gov (United States)

    2017-08-01

    Command Leadership DEOCS 4.1 Construct Validity Summary DEFENSE EQUAL OPPORTUNITY MANAGEMENT INSTITUTE...Report #15-18 1 Command Leadership DEOCS 4.1 Construct Validity Summary Background In 2014, DEOMI released DEOCS 4.0 for Department of Defense...individual items on the DEOCS. The following paper details the work conducted to modify the factor of Leadership Cohesion so that it focuses more

  19. [Fostering LGBT-friendly healthcare services].

    Science.gov (United States)

    Wei, Han-Ting; Chen, Mu-Hong; Ku, Wen-Wei

    2015-02-01

    LGBT (lesbian, gay, bisexual, transgender) patients suffer from stigma and discrimination when seeking healthcare. A large LGBT healthcare survey revealed that 56% of gay patients and 70% of transgender patients suffered some type of discrimination while seeking healthcare in 2014. The fostering of LGBT-friendly healthcare services is not just an advanced step of gender mainstreaming but also a fulfillment of health equality and equity. Additionally, LGBT-friendly healthcare services are expected to provide new opportunities for healthcare workers. Therefore, proactive government policies, education, research, and clinical practice should all encourage the development of these healthcare services. We look forward to a well-developed LGBT-friendly healthcare system in Taiwan.

  20. The maintenance of regional dialects: a matter of gender? Boys, but not girls, use local varieties in relation to their friends' nativeness and local identity.

    Science.gov (United States)

    Barbu, Stéphanie; Martin, Nathael; Chevrot, Jean-Pierre

    2014-01-01

    The linguistic diversity enduring beyond institutional pressures and social prejudices against non-standard dialects questions the social forces influencing language maintenance across generations and how children contribute to this process. Children encounter multi-dialectal interactions in their early environment, and increasing evidence shows that the acquisition of sociolinguistic variation is not a side issue but an inherent part of the general acquisition process. Despite these recent advances in sociolinguistic acquisition, children's sociolinguistic uses remain under-studied in relation to peer social networks and the ability to use dialect for identity purposes. Our study focused on a grammatical sociolinguistic variable consisting of the alternation between a regional and a standard variant of the third person object pronoun in French. The regional variant is a remnant of the Francoprovençal language and its usage by adults is strongly associated with local identity in the French Alps. We described, using questionnaires, the social networks of 117 10-11 year-old girls and boys living in the same restricted rural area. Thirteen native target children (7 girls and 6 boys) were selected from the sample, as well as 39 same-sex friends chosen according to their place of birth (native vs. non-native) and the duration of their friendship with the targets (number of years they have known each other). The target children were recorded during spontaneous dyadic conversations during free play at school with each category of friends. Target boys, but not girls, used the regional variant significantly more frequently with their long-term native friends than with their non-native friends. This adjustment mirrored their partners' uses. Moreover, with long-term native friends, boys used the regional variant twice as frequently as girls. Boys appeared thus as key actors in the maintenance and the diffusion of regional cues in local social networks.

  1. The maintenance of regional dialects: a matter of gender? Boys, but not girls, use local varieties in relation to their friends' nativeness and local identity

    Science.gov (United States)

    Barbu, Stéphanie; Martin, Nathael; Chevrot, Jean-Pierre

    2014-01-01

    The linguistic diversity enduring beyond institutional pressures and social prejudices against non-standard dialects questions the social forces influencing language maintenance across generations and how children contribute to this process. Children encounter multi-dialectal interactions in their early environment, and increasing evidence shows that the acquisition of sociolinguistic variation is not a side issue but an inherent part of the general acquisition process. Despite these recent advances in sociolinguistic acquisition, children's sociolinguistic uses remain under-studied in relation to peer social networks and the ability to use dialect for identity purposes. Our study focused on a grammatical sociolinguistic variable consisting of the alternation between a regional and a standard variant of the third person object pronoun in French. The regional variant is a remnant of the Francoprovençal language and its usage by adults is strongly associated with local identity in the French Alps. We described, using questionnaires, the social networks of 117 10–11 year-old girls and boys living in the same restricted rural area. Thirteen native target children (7 girls and 6 boys) were selected from the sample, as well as 39 same-sex friends chosen according to their place of birth (native vs. non-native) and the duration of their friendship with the targets (number of years they have known each other). The target children were recorded during spontaneous dyadic conversations during free play at school with each category of friends. Target boys, but not girls, used the regional variant significantly more frequently with their long-term native friends than with their non-native friends. This adjustment mirrored their partners' uses. Moreover, with long-term native friends, boys used the regional variant twice as frequently as girls. Boys appeared thus as key actors in the maintenance and the diffusion of regional cues in local social networks. PMID:25400617

  2. Corporate Social Networking: Risks and Opportunities

    OpenAIRE

    Straumsheim, Jan Henrik Schou

    2011-01-01

    Social networks have seen an explosive growth over the last few years, with the most popular online services totaling over half a billion users. These networks have started permeating several aspects of our daily lives: for example by changing the ways we communicate with our friends and family, share media and organize events. Popular social networking websites like Facebook and Twitter now account for over half of the content shared on the web. Norwegian businesses are taking note, and are ...

  3. l-Glutamic acid assisted eco-friendly one-pot synthesis of sheet-assembled platinum-palladium alloy networks for methanol oxidation and oxygen reduction reactions.

    Science.gov (United States)

    Shi, Ya-Cheng; Mei, Li-Ping; Wang, Ai-Jun; Yuan, Tao; Chen, Sai-Sai; Feng, Jiu-Ju

    2017-10-15

    In this work, bimetallic platinum-palladium sheet-assembled alloy networks (PtPd SAANs) were facilely synthesized by an eco-friendly one-pot aqueous approach under the guidance of l-glutamic acid at room temperature, without any additive, seed, toxic or organic solvent involved. l-Glutamic acid was served as the green shape-director and weak-stabilizing agent. A series of characterization techniques were employed to examine the morphology, structure and formation mechanism of the product. The architectures exhibited improved electrocatalytic activity and durable ability toward methanol oxidation reaction (MOR) and oxygen reduction reaction (ORR) in contrast with commercial Pt black and Pd black catalysts. This is ascribed to the unique structures of the obtained PtPd SAANs and the synergistic effects of the bimetals. These results demonstrate the potential application of the prepared catalyst in fuel cells. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. A Multi-Vehicles, Wireless Testbed for Networked Control, Communications and Computing

    Science.gov (United States)

    Murray, Richard; Doyle, John; Effros, Michelle; Hickey, Jason; Low, Steven

    2002-03-01

    We have constructed a testbed consisting of 4 mobile vehicles (with 4 additional vehicles being completed), each with embedded computing and communications capability for use in testing new approaches for command and control across dynamic networks. The system is being used or is planned to be used for testing of a variety of communications-related technologies, including distributed command and control algorithms, dynamically reconfigurable network topologies, source coding for real-time transmission of data in lossy environments, and multi-network communications. A unique feature of the testbed is the use of vehicles that have second order dynamics. Requiring real-time feedback algorithms to stabilize the system while performing cooperative tasks. The testbed was constructed in the Caltech Vehicles Laboratory and consists of individual vehicles with PC-based computation and controls, and multiple communications devices (802.11 wireless Ethernet, Bluetooth, and infrared). The vehicles are freely moving, wheeled platforms propelled by high performance dotted fairs. The room contains an access points for an 802.11 network, overhead visual sensing (to allow emulation of CI'S signal processing), a centralized computer for emulating certain distributed computations, and network gateways to control and manipulate communications traffic.

  5. Rapid Response Command and Control (R2C2): a systems engineering analysis of scaleable communications for Regional Combatant Commanders

    OpenAIRE

    Sullivan, Lisa; Cannon, Lennard; Reyes, Ronel; Bae, Kitan; Colgary, James; Minerowicz, Nick; Leong, Chris; Lim, Harry; Lim, Hang Sheng; Ng, Chin Chin; Neo, Tiong Tien; Tan, Guan Chye; Ng, Yu Loon; Wong, Eric; Wong, Heng Yue

    2006-01-01

    Includes supplementary material. Disaster relief operations, such as the 2005 Tsunami and Hurricane Katrina, and wartime operations, such as Operation Enduring Freedom and Operation Iraqi Freedom, have identified the need for a standardized command and control system interoperable among Joint, Coalition, and Interagency entities. The Systems Engineering Analysis Cohort 9 (SEA-9) Rapid Response Command and Control (R2C2) integrated project team completed a systems engineering (SE) ...

  6. GPS and the Joint Force Commander: Critical Asset, Critical Vulnerability

    National Research Council Canada - National Science Library

    McPherson, Michael

    2001-01-01

    Joint Force Commanders (JFCs) have become over reliant on military and commercial satellite systems for intelligence gathering and dissemination, weather, command, control, communications, and navigation/guidance functions, to name a few...

  7. Hispanic Labor Friends Initiative: supporting vulnerable women.

    Science.gov (United States)

    Hazard, Cambria Jones; Callister, Lynn Clark; Birkhead, Ana; Nichols, Lisa

    2009-01-01

    To evaluate the qualitative aspects of the Hispanic Labor Friends Initiative. "Hispanic Labor Friends," bilingual Hispanic community women who were themselves mothers, were recruited by clinic and hospital personnel. Women who agreed were educated, received translation certification, and were oriented to the initiative. Pregnant Hispanic immigrant women seen in the health center who met criteria set by the multidisciplinary health care team were assigned a Hispanic Labor Friend by 32 weeks' gestation. Hispanic Labor Friends assisted women with communication with healthcare providers and provided social support. Qualitative evaluation of the program consisted of interviews with several groups: (1) Hispanic immigrant women who had a Hispanic Labor Friend, (2) Hispanic immigrant women who were not in the Hispanic Labor Friends program, (3) Hispanic Labor Friends, (4) healthcare providers for Hispanic women. Data saturation was reached, and data were analyzed by the research team using descriptive qualitative inquiry. The Hispanic immigrant women described positive outcomes from being involved in the Hispanic Labor Friends program, including feeling supported and comforted. "I felt as though my family were at my side." One woman who had standard care said, "It is hard for me to communicate. When I gave birth, the nurses asked me things, and I didn't understand anything. I stayed quiet." One of the nurses who was interviewed said: "I think they [the HLF patients] get better care. Sometimes we think we can communicate with them with their little bit of English and our little bit of Spanish. But you get an HLF and it's a totally different story. We can more adequately tell what's going on with them...They end up getting better care." One Hispanic Labor Friend said, "The women are very appreciative that I was there to help them through a critical time." Women who participated in the study identified the need to have a continuing association with Hispanic Labor Friends in

  8. Parallel processing data network of master and slave transputers controlled by a serial control network

    Science.gov (United States)

    Crosetto, Dario B.

    1996-01-01

    The present device provides for a dynamically configurable communication network having a multi-processor parallel processing system having a serial communication network and a high speed parallel communication network. The serial communication network is used to disseminate commands from a master processor (100) to a plurality of slave processors (200) to effect communication protocol, to control transmission of high density data among nodes and to monitor each slave processor's status. The high speed parallel processing network is used to effect the transmission of high density data among nodes in the parallel processing system. Each node comprises a transputer (104), a digital signal processor (114), a parallel transfer controller (106), and two three-port memory devices. A communication switch (108) within each node (100) connects it to a fast parallel hardware channel (70) through which all high density data arrives or leaves the node.

  9. Launch Control Network Engineer

    Science.gov (United States)

    Medeiros, Samantha

    2017-01-01

    The Spaceport Command and Control System (SCCS) is being built at the Kennedy Space Center in order to successfully launch NASA’s revolutionary vehicle that allows humans to explore further into space than ever before. During my internship, I worked with the Network, Firewall, and Hardware teams that are all contributing to the huge SCCS network project effort. I learned the SCCS network design and the several concepts that are running in the background. I also updated and designed documentation for physical networks that are part of SCCS. This includes being able to assist and build physical installations as well as configurations. I worked with the network design for vehicle telemetry interfaces to the Launch Control System (LCS); this allows the interface to interact with other systems at other NASA locations. This network design includes the Space Launch System (SLS), Interim Cryogenic Propulsion Stage (ICPS), and the Orion Multipurpose Crew Vehicle (MPCV). I worked on the network design and implementation in the Customer Avionics Interface Development and Analysis (CAIDA) lab.

  10. An Environment-Friendly Multipath Routing Protocol for Underwater Acoustic Sensor Network

    Directory of Open Access Journals (Sweden)

    Yun Li

    2017-01-01

    Full Text Available Underwater Acoustic Sensor Network (UASN is a promising technique by facilitating a wide range of aquatic applications. However, routing scheme in UASN is a challenging task because of the characteristics of the nodes mobility, interruption of link, and interference caused by other underwater acoustic systems such as marine mammals. In order to achieve reliable data delivery in UASN, in this work, we present a disjoint multipath disruption-tolerant routing protocol for UASN (ENMR, which incorporates the Hue, Saturation, and Value color space (HSV model to establish routing paths to greedily forward data packets to sink nodes. ENMR applies the mechanism to maintain the network topology. Simulation results show that, compared with the classic underwater routing protocols named PVBF, ENMR can improve packet delivery ratio and reduce network latency while avoiding introducing additional energy consumption.

  11. Social network of family caregivers of disabled and dependent patients

    Directory of Open Access Journals (Sweden)

    Cintia Hitomi Yamashita

    2014-08-01

    Full Text Available Cross-sectional study that used the Social Network Index and the genogram to assess the social network of 110 family caregivers of dependent patients attended by a Home Care Service in São Paulo, Brazil. Data were analyzed using the test U of Mann-Whitney, Kruskal-Wallis and Spearman correlation. Results were considered statistically significant when p<0,05. Few caregivers participated in activities outside the home and the average number of people they had a bond was 4,4 relatives and 3,6 friends. Caregivers who reported pain and those who had a partner had higher average number of relatives who to trust. The average number of friends was higher in the group that reported use of medication for depression. Total and per capita incomes correlated with the social network. It was found that family members are the primary caregiver’s social network.

  12. Pathways to age-friendly communities in diverse urban neighborhoods: Do social capital and social cohesion matter?

    Science.gov (United States)

    Parekh, Rupal; Maleku, Arati; Fields, Noelle; Adorno, Gail; Schuman, Donna; Felderhoff, Brandi

    2018-07-01

    Using a social capital and social cohesion lens, we reposition the concept of civic engagement among older adults to examine pathways for building age-friendly communities. We analyzed data drawn from a Community-Based Participatory Research study in the Southern U.S. that explored lived experiences of older adults, age 55 and above, who participated in individual interviews (n = 15) and six focus group discussions (n = 45) to examine their perceptions of social identity, social connectedness, and civic engagement geared toward an age-friendly city. Findings indicated that several older adults had access to social networks and socially invested resources, thereby having opportunities for civic engagement and building age-friendly neighborhoods. However, social, cultural, linguistic, and structural barriers were more evident among certain diverse ethnic populations. Marginalized low-income minorities and immigrants, such as Hispanic participants, felt the lack of social cohesion among the larger society limited their ability to give back, thus decreasing their civic engagement activities. In contrast, Caucasian and African-American older adults were able to contribute to the political process through more civic participation activities. We provide implications for examining the role of social capital and social engagement to bolster civic engagement among older adults in building age-friendly communities.

  13. Critical friends and collaborative partnership

    Directory of Open Access Journals (Sweden)

    Katarina Jandér

    2013-12-01

    Full Text Available Critical friends: a method for peer feedback The Critical Friend-method has been used in various educational settings to facilitate the process of continuous improvement in teaching. The aim of this study was to implement Critical Friends, and to find out if this method could be used for feedback on teaching as part of a librarians' professional development. The project was carried out within the Library Unit of the Faculty of Medicine at Lund University, Sweden, in collaboration with the faculty's Centre for Teaching and Learning. Seven librarians and an educational consultant from the Centre for Teaching and Learning participated; the educational consultant played an essential role in supervising and structuring the project and the evaluation process, preparing readings as well as being an active participant. The participants worked in pairs; the performance of one teacher and the associated classroom activities were observed by the critical friend, and then evaluated and discussed. Evaluation and results After two preparatory group meetings, a final meeting was held where all pairs reported what they had done and how they perceived the critical friend process. The experiences of the participating librarians were explored using a questionnaire. The questionnaire was analyzed using content analysis by one librarian and the educational consultant independently. The results suggested that use of the critical friend method could have a positive impact by achieving the following: strengthening shared values concerning teaching issues; promoting self-reflection on teaching; facilitating communication with colleagues; and reducing the sense of 'loneliness‘ in teaching. The difficulties in the implementation were lack of time and competing duties. It was perceived as an advantage to work in close partnership with the faculty's educational consultants, who were familiar with the organization.

  14. Leaders in space: Mission commanders and crew on the International Space Station

    Science.gov (United States)

    Brcic, Jelena

    Understanding the relationship between leaders and their subordinates is important for building better interpersonal connections, improving group cohesion and cooperation, and increasing task success. This relationship has been examined in many types of groups but not a great amount of analysis has been applied to spaceflight crews. We specifically investigated differences between mission commanders and flight commanders during missions to the International Space Station (ISS). Astronauts and cosmonauts on the ISS participate in long-duration missions (2 to 6 months in length) in which they live and work in close proximity with their 2 or 3 member crews. The leaders are physically distant from their command centres which may result in delay of instructions or important advice. Therefore, the leaders must be able to make quick, sound decisions with unwavering certainty. Potential complications include that the leaders may not be able to exercise their power fully, since material reward or punishment of any one member affects the whole group, and that the leader's actions (or lack thereof) in this isolated, confined environment could create stress in members. To be effective, the mission commander must be able to prevent or alleviate any group conflict and be able to relate to members on an emotional level. Mission commanders and crew are equal in the competencies of spaceflight; therefore, what are the unique characteristics that enable the commanders to fulfill their role? To highlight the differences between commander and crew, astronaut journals, diaries, pre- flight interviews, NASA oral histories, and letters written to family from space were scored and analyzed for values and coping styles. During pre-flight, mission commanders scored higher than other crew members on the values of Stimulation, Security, Universalism, Conformity, Spirituality, and Benevolence, and more often used Self-Control as a coping style. During the long-duration mission on ISS, mission

  15. Exploring the Usage of Social Networking Websites: Perceptions and Opinions of Romanian University Students

    Directory of Open Access Journals (Sweden)

    Dragos Daniel IORDACHE

    2013-01-01

    Full Text Available Social networking websites (SNWs have become a popular virtual meeting place allowing users to voluntarily post personal information, send and receive message, stay connected online with their offline friends and new online friends, or share photos, videos, bookmarks, blogs, private messages and join groups. People are spending ample amount of time on social networking websites such as You Tube, Facebook, Google+, LinkedIn, Facebook, Twitter, Hi5 etc., and this high usage has also brought changes in the way people behave. These social networking websites present a variety of features for their users to facilitate socialization. This paper presents the results of a study aiming to identify the Romanian student opinions regarding SNWs. The main findings of this study are: the most frequently visited and most popular social networks among Romanian student are You Tube and Facebook; the majority of the respondents use social networking websites a few times a day; only a small part of the respondents know how social networking websites use published and other type of information; the usage of SNWs is related with the usage of computers and internet. Also the most important functions of SNWs for Romanian student are: communication (including communication in interest groups, learning and exchanging information, exchanging photo, video, friend search and texting.

  16. Leverage Between the Buffering Effect and the Bystander Effect in Social Networking.

    Science.gov (United States)

    Chiu, Yu-Ping; Chang, Shu-Chen

    2015-08-01

    This study examined encouraged and inhibited social feedback behaviors based on the theories of the buffering effect and the bystander effect. A system program was used to collect personal data and social feedback from a Facebook data set to test the research model. The results revealed that the buffering effect induced a positive relationship between social network size and feedback gained from friends when people's social network size was under a certain cognitive constraint. For people with a social network size that exceeds this cognitive constraint, the bystander effect may occur, in which having more friends may inhibit social feedback. In this study, two social psychological theories were applied to explain social feedback behavior on Facebook, and it was determined that social network size and social feedback exhibited no consistent linear relationship.

  17. Fit for Command: Military Leadership Attributes for Small Wars

    Science.gov (United States)

    2013-04-18

    Corps Command and StaffCollege Marine Corps University 2076 outh Street Marine Corps Combat Development Command Quantico, Virgin ia?? 134-5068...by the local imam to join him in the celebration of a religious Shi’a holiday .79 Just before departure to the mosque his translator informed him

  18. Friend Effects and Racial Disparities in Academic Achievement

    Directory of Open Access Journals (Sweden)

    Jennifer Flashman

    2014-07-01

    Full Text Available Racial disparities in achievement are a persistent fact of the US educational system. An often cited but rarely directly studied explanation for these disparities is that adolescents from different racial and ethnic backgrounds are exposed to different peers and have different friends. In this article I identify the impact of friends on racial and ethnic achievement disparities. Using data from Add Health and an instrumental variable approach, I show that the achievement characteristics of youths’ friends drive friend effects; adolescents with friends with higher grades are more likely to increase their grades compared to those with lower-achieving friends. Although these effects do not differ across race/ethnicity, given differences in friendship patterns, if black and Latino adolescents had friends with the achievement characteristics of white students, the GPA gap would be 17 to 19 percent smaller. Although modest, this effect represents an important and often overlooked source of difference among black and Latino youth.

  19. Neural-Network Control Of Prosthetic And Robotic Hands

    Science.gov (United States)

    Buckley, Theresa M.

    1991-01-01

    Electronic neural networks proposed for use in controlling robotic and prosthetic hands and exoskeletal or glovelike electromechanical devices aiding intact but nonfunctional hands. Specific to patient, who activates grasping motion by voice command, by mechanical switch, or by myoelectric impulse. Patient retains higher-level control, while lower-level control provided by neural network analogous to that of miniature brain. During training, patient teaches miniature brain to perform specialized, anthropomorphic movements unique to himself or herself.

  20. The Warfighting Capacity of Air Combat Command's Numbered Air Forces

    National Research Council Canada - National Science Library

    Hanser, Lawrence

    2000-01-01

    ...) of the Air Combat Command (ACC), General Richard E. Hawley, the ACC Commander, asked if RAND could offer an analysis of the number of NAFs that were needed by ACC to meet warfighting requirements...

  1. Modular code supervisor. Automatic generation of command language

    International Nuclear Information System (INIS)

    Dumas, M.; Thomas, J.B.

    1988-01-01

    It is shown how, starting from a problem formulated by the user, to generate the adequate calculation procedure in the command code, and acquire the data necessary for the calculation while verifying their validity. Modular codes are used, because of their flexibility and wide utilisation. Modules are written in Fortran, and calculations are done in batches according to an algorithm written in the GIBIANE command language. The action plans are based on the STRIPS and WARPLAN families. Elementary representation of a module and special instructions are illustrated. Dynamic construction macro-actions, and acquisition of the specification (which allows users to express the goal of a program without indicating which algorithm is used to reach the goal) are illustrated. The final phase consists in translating the algorithm into the command language [fr

  2. Patch models and their applications to multivehicle command and control.

    Science.gov (United States)

    Rao, Venkatesh G; D'Andrea, Raffaello

    2007-06-01

    We introduce patch models, a computational modeling formalism for multivehicle combat domains, based on spatiotemporal abstraction methods developed in the computer science community. The framework yields models that are expressive enough to accommodate nontrivial controlled vehicle dynamics while being within the representational capabilities of common artificial intelligence techniques used in the construction of autonomous systems. The framework allows several key design requirements of next-generation network-centric command and control systems, such as maintenance of shared situation awareness, to be achieved. Major features include support for multiple situation models at each decision node and rapid mission plan adaptation. We describe the formal specification of patch models and our prototype implementation, i.e., Patchworks. The capabilities of patch models are validated through a combat mission simulation in Patchworks, which involves two defending teams protecting a camp from an enemy attacking team.

  3. Baby-Friendly Practices Minimize Newborn Infants Weight Loss.

    Science.gov (United States)

    Procaccini, Diane; Curley, Ann L Cupp; Goldman, Martha

    2018-04-01

    It is accepted that newborns lose weight in the first few days of life. Baby-Friendly practices that support breastfeeding may affect newborn weight loss. The objective of this study were: 1) To determine whether Baby-Friendly practices are associated with term newborn weight loss day 0-2 in three feeding categories (exclusively breastfed, mixed formula fed and breastfed, and formula fed). 2) To determine whether Baby-Friendly practices increase exclusive breast feeding rates in different ethnic populations. This was a retrospective case-control study. Term newborn birth weight, neonatal weights days 0-2, feeding type, type of birth, and demographic information were collected for 1,000 births for the year before Baby-Friendly designation (2010) and 1,000 in 2013 (after designation). Ultimately 683 in the first group and 518 in the second met the inclusion criteria. Mean weight loss decreased day 0-2 for infants in all feeding types after the initiation of Baby-Friendly practices. There was a statistically significant effect of Baby-Friendly designation on weight loss for day 0-2 in exclusively breastfed infants (p Baby-Friendly practices were put in place. There was a decrease in mean weight loss day 0-2 regardless of feeding type after Baby-Friendly designation. Exclusive breast feeding increased in the presence of Baby-Friendly practices.

  4. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    Human Resource Development was the first and remains an important pillar in Japanese foreign aid. I will argue that Japan has access to a global network of alumni who will co-define Japanese foreign aid in the future, because Japan has encouraged alumni societies and networking since 1965. A total...... of more than a million people in more than 100 countries have attended courses in Japan funded fully or partly by Japanese ODA since the inception of the technical assistance programs in 1954 through the Colombo Plan and since 1959 through the Association of Overseas Technical Scholarships (AOTS from 2009...... HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of Friends...

  5. More Colleges Are Adding Family-Friendly Benefits

    Science.gov (United States)

    Wilson, Robin

    2008-01-01

    Results of a new survey of family-friendly benefits by the Center for the Education of Women at the University of Michigan at Ann Arbor show that stopping the tenure clock has become the most common family-friendly benefit in higher education, following paid maternity leave. Other family-friendly policies that top the list in academe allow…

  6. Wifi-friendly building, enabling wifi signal indoor: an initial study

    Science.gov (United States)

    Suherman; Mubarakah, Naemah; Sagala, Romulo S.; Prayitno, Hendra

    2018-03-01

    The 802.11 network (wireless fidelity/WiFi) is the most common wireless infrastructure applied for internet access indoor. Widespread devices and installation simplicity make it better than similar technologies such as 802.16 and other 802.xx series. The access points are the most influential devices for indoor access. However, building indoor architectures contribute to the signal quality. Since WiFi installation in buildings becomes prevalent, the architecture should consider WiFi-friendliness into consideration. The more friendly the building to WiFi signal, the more efficient the 802.11 based wireless infrastructure. This paper present preliminary study how the building, specially the obstacle material, effects the WiFi signal propagation indoor. The study was performed by using ESP8266-based WiFi signal reader, to determine the impact indoor obstacles to WiFi signal propagation. The initial study shows that simple reflecting materials increase signal level about 1.14 dBm. WiFi-friendly building can be achieved by transforming building properties into signal interconnector. A simple photo frame with aluminium sheet insertion increase signal level on the second floor up to 6.56dBm.

  7. Command History for 1990

    Science.gov (United States)

    1991-05-01

    Marine Corps Tiaining Systems (CBESS) memorization training Inteligence Center, Dam Neck Threat memorization training Commander Tactical Wings, Atlantic...News Shipbuilding Technical training AEGIS Training Center, Dare Artificial Intelligence (Al) Tools Computerized firm-end analysis tools NETSCPAC...Technology Department and provides computational and electronic mail support for research in areas of artificial intelligence, computer-assisted instruction

  8. Environmentally-friendly practices in hotels

    Directory of Open Access Journals (Sweden)

    Miriam Mbasera

    2016-06-01

    Research purpose: To determine the environmentally-friendly practices in hotels in Zimbabwe and South Africa and establish the contribution that hotels are making towards mitigation of the negative environmental effects. Motivation for the study: Currently, the world is facing environmental issues, which include global climate change, ozone depletion, pollution, high consumption of resources and increasing amounts of solid waste. Hotels, as part of the tourism industry, exert a significant impact on the environment. While the extent and range of the impact that hotels exert on the environment suggest an urgent need to address this problem, the question that arises is whether hoteliers appreciate the need for environmentally-friendly initiatives in their establishments. Research design, approach and method: A qualitative research was carried out in eight hotels that employ the strategy of the case study in the aforementioned countries. Main findings: Currently, no policies for green management exist, although some hotels do engage in some environmentally-friendly practices. Some hotel managers do not implement green management initiatives to mitigate the environmental problems emanating from their hotel operations. Practical and/or managerial implications: This indicates that a gap exists between managers’ awareness of appropriate environmentally-friendly practices for hotels, implying a need for training and increased awareness of green management. Contribution and/or value-add: The results could guide managers in the implementation of environmentally-friendly practices in an effort to mitigate environmental problems facing the present generation.

  9. Use of social networking websites as a care instrument for hospitalized adolescents

    Directory of Open Access Journals (Sweden)

    Camila Amaral Borghi

    2017-12-01

    Full Text Available Abstract Objective: This study aimed to understand how social networking websites are used by adolescents and their importance during the hospitalization process. Method: A descriptive and qualitative study was supported by the virtual ethnographic method and resorted to the symbolic interactionism as theoretical framework. Eleven hospitalized adolescents were interviewed. Results: Three categories were identified based on the analysis of interviews and posts: Being able to use social networking websites during hospitalization; Using the Facebook® chat to keep connected to friends; Seeking support from friends through social networking websites. Final considerations: Facebook® was the social networking website that adolescents used the most, standing out as an important form of entertainment during hospitalization that facilitates communication and social support. Healthcare professionals should value the use of social networking websites by hospitalized adolescents and encourage access to these tools, providing hospital resources to expand and facilitate this access.

  10. Associations within school-based same-sex friendship networks of children's physical activity and sedentary behaviours: a cross-sectional social network analysis.

    Science.gov (United States)

    Salway, Ruth E; Sebire, Simon J; Solomon-Moore, Emma; Thompson, Janice L; Jago, Russell

    2018-02-21

    Physical activity in children is associated with better physical and mental health but many children do not meet physical activity guidelines. Friendship groups are potentially an important influence on children's physical activity and sedentary time. This paper examines the association between children of physical activity and sedentary time in school-based same-sex friendship networks, for both moderate-to-vigorous intensity physical activity (MVPA) and sedentary time. Moreover, considering the methodological challenges of conducting and interpreting these analyses, we provide examples of how to analyse these data and interpret results to encourage further work in the area. Accelerometer data for 1223 children, aged 8-9 years, were collected in 2015-2016 and analysed in 2017. Mean accelerometer minutes of MVPA and sedentary time were calculated. Children named up to four school friends and same-sex school-based friendship networks were constructed. Network models, which include correlation between friends, were fitted by sex. Both MVPA and sedentary time were found to be associated via the friendship networks, for both boys and girls. The network autocorrelation was 0.21 (95% CI: 0.15 to 0.26) for boys' MVPA, and 0.14 (95% CI: 0.07 to 0.21) for sedentary time. Network autocorrelation between girls was weaker, with 0.13 (95% CI: 0.06 to 0.19) for MVPA and 0.11 (95% CI: 0.05 to 0.17) for sedentary time. Physical activity and sedentary time of boys and girls are associated with the physical activity and sedentary time respectively of others within same-sex friendship networks, and these associations are comparable to other known factors. In this study, the correlation between friends was stronger for boys than girls, and stronger for MVPA than for sedentary time. These findings suggest that friendship networks play a part in understanding children's physical activity and sedentary time and could play a valuable role in developing effective interventions.

  11. Mission Command and JC41: Managing Chaos in a Dynamic World

    Science.gov (United States)

    2018-04-20

    doubly so, but perhaps not solely for the reasons expected. History has seen the progression of technology enable commanders and staffs to extend their...highlights the degree to which each Service embraces and codifies the mission command concept. Chapter 3 covers the history of the technologies ...Abstract Executing effective mission command has always been a challenge and in today’s technologically saturated joint operating environment is

  12. Commands for financial data management and portfolio optimization

    OpenAIRE

    C. Alberto Dorantes

    2013-01-01

    Several econometric software offer portfolio management tools for practitioners and researchers. For example, MatLab and R offer a great variety of tools for the simulation, optimization, and analysis of financial time series. Stata, together with Mata, offers powerful programming tools for the simulation, optimization, and analysis of financial data. However, related user commands are scarce. In this presentation, commands for online market data collection, data manipulation, and financial a...

  13. Linux command line and shell scripting bible

    CERN Document Server

    Blum, Richard

    2014-01-01

    Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application

  14. 'The Danger of Divided Command': British civil and military disputes ...

    African Journals Online (AJOL)

    Commander-in-Chief of the Indian Army, Lord Kitchener, which culminated in Curzon's ... and the officers commanding forces would have no doubt as to their .... but assuming financial responsibility for its own defence would have been ...

  15. Popularity and Adolescent Friendship Networks: Selection and Influence Dynamics

    Science.gov (United States)

    Dijkstra, Jan Kornelis; Cillessen, Antonius H. N.; Borch, Casey

    2013-01-01

    This study examined the dynamics of popularity in adolescent friendship networks across 3 years in middle school. Longitudinal social network modeling was used to identify selection and influence in the similarity of popularity among friends. It was argued that lower status adolescents strive to enhance their status through befriending higher…

  16. Speech Acts During Friends' and Non-friends' Spontaneous Conversations in Preschool Dyads with High-Functioning Autism Spectrum Disorder versus Typical Development.

    Science.gov (United States)

    Bauminger-Zviely, Nirit; Golan-Itshaky, Adi; Tubul-Lavy, Gila

    2017-05-01

    In this study, we videotaped two 10-min. free-play interactions and coded speech acts (SAs) in peer talk of 51 preschoolers (21 ASD, 30 typical), interacting with friend versus non-friend partners. Groups were matched for maternal education, IQ (verbal/nonverbal), and CA. We compared SAs by group (ASD/typical), by partner's friendship status (friend/non-friend), and by partner's disability status. Main results yielded a higher amount and diversity of SAs in the typical than the ASD group (mainly in assertive acts, organizational devices, object-dubbing, and pretend-play); yet, those categories, among others, showed better performance with friends versus non-friends. Overall, a more nuanced perception of the pragmatic deficit in ASD should be adopted, highlighting friendship as an important context for children's development of SAs.

  17. Nordic Analysis of Climate Friendly Buildings

    DEFF Research Database (Denmark)

    Andresen, Inger; Thomsen, Kirsten Engelund; Wahlstrøm, Åsa

    This report summarizes the findings of the work conducted within the project “Nordic Analysis of Climate Friendly Buildings”, financed by the Nordic Council of Ministers. The main goal of the project was to establish a knowledge and decision base for a Nordic innovation program that will promote...... the development and demonstration of low energy and climate friendly buildings. The innovation program should support a development that brings the Nordic countries to an international forefront with respect to business strongholds and market penetration of low energy and climate friendly buildings....

  18. User-friendly establishment of trust in distributed home automation networks

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Madsen, Per Printz; Torbensen, Rune

    2012-01-01

    Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup...... these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented...... of predefined pictograms. This method is designed to scale from smart-phones and tablets down to low-resource embedded systems. The presented approach is supported by an extensive literature study, and the ease of use and feasibility of the method has been indicated through a preliminary user study...

  19. A New Addiction for Teacher Candidates: Social Networks

    Science.gov (United States)

    Cam, Emre; Isbulan, Onur

    2012-01-01

    With the transition to being a knowledge-based society, the internet usage has become an irreplaceable part of life. As socials networks have come into our lives, the internet usage has taken a different dimension. People can affiliate to social networks in order to make friends, exchange information, find partners, and to play games. The process…

  20. STS-93 Commander Collins suits up for launch

    Science.gov (United States)

    1999-01-01

    During the third launch preparations in the Operations and Checkout Building, STS-93 Commander Eileen M. Collins waves while having her launch and entry suit checked. After Space Shuttle Columbia's July 20 and 22 launch attempts were scrubbed, the launch was again rescheduled for Friday, July 23, at 12:24 a.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  1. Education Requirements of Command Positions in the U.S. Border Patrol

    Science.gov (United States)

    2015-06-12

    commander. Degrees in Culinary Arts , Fashion Design, or Film Studies are thus considered as relevant and valuable for command as degrees in Border...Command and General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE Homeland Security...Z39.18 iii MASTER OF MILITARY ART AND SCIENCE THESIS APPROVAL PAGE Name of Candidate: Julio C. Peña Thesis Title: Education Requirements of

  2. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  3. Do social networks affect the use of residential aged care among older Australians?

    Directory of Open Access Journals (Sweden)

    Glonek Gary FV

    2007-10-01

    Full Text Available Abstract Background Older people's social networks with family and friends can affect residential aged care use. It remains unclear if there are differences in the effects of specific (with children, other relatives, friends and confidants and total social networks upon use of low-level residential care and nursing homes. Methods Data were drawn from the Australian Longitudinal Study of Ageing. Six waves of data from 1477 people aged ≥ 70 collected over nine years of follow-up were used. Multinomial logistic regressions of the effects of specific and total social networks on residential care use were carried out. Propensity scores were used in the analyses to adjust for differences in participant's health, demographic and lifestyle characteristics with respect to social networks. Results Higher scores for confidant networks were protective against nursing home use (odds ratio [OR] upper versus lower tertile of confidant networks = 0.50; 95%CI 0.33–0.75. Similarly, a significant effect of upper versus lower total network tertile on nursing home use was observed (OR = 0.62; 95%CI 0.43–0.90. Evidence of an effect of children networks on nursing home use was equivocal. Nursing home use was not predicted by other relatives or friends social networks. Use of lower-level residential care was unrelated to social networks of any type. Social networks of any type did not have a significant effect upon low-level residential care use. Discussion Better confidant and total social networks predict nursing home use in a large cohort of older Australians. Policy needs to reflect the importance of these particular relationships in considering where older people want to live in the later years of life.

  4. Achieving Child Friendly Justice through Child Friendly Methods: Let’s Start with the Right to Information

    Directory of Open Access Journals (Sweden)

    Helen Stalford

    2017-09-01

    Full Text Available Making the justice process ‘child friendly’ is a key priority for the children’s rights community. An abundance of commentary has been produced by the UN Committee on the Rights of the Child to highlight how justice proceedings can be made more accessible for children and, in 2010, the Council of Europe issued its comprehensive ‘Guidelines on Child Friendly Justice’. Despite these efforts, children remain ill-informed, not just about the nature of justice proceedings in which they may be implicated, but about the very existence and scope of their rights and how to enforce them. Despite unequivocal acknowledgement that the availability and accessibility of information is the crucial starting point in a children’s rights-based approach to dispensing justice, there has been surprisingly little attempt to scrutinise the availability, quality and accessibility of information about laws and policies affecting children. This article takes a closer look at what, exactly, ‘child friendly’ information means in practice. In doing so, we argue that attempts to develop child friendly information have yet to progress beyond adult-driven, largely tokenistic and superficial re-branding exercises. As such, efforts to develop child friendly resources are often of limited value in empowering young people to develop their legal literacy and realise their rights in practice. We reflect on our attempt to develop an explicitly children’s rights-based approach to the development of child friendly resources with a view to enhancing their purchase. This took place in the context of a pilot project, commissioned by the Council of Europe in June 2014, to create a child friendly version of their Child Friendly Justice Guidelines.

  5. IT Security Support for the Spaceport Command Control System Development

    Science.gov (United States)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  6. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Analysis of the Toronto SARS Outbreak, Vertical Integration, Vertical Integration in a Military Command Hierarchy, Information flows for a domestic incident, C2 for Homeland Security will benefit...

  7. Computing networks from cluster to cloud computing

    CERN Document Server

    Vicat-Blanc, Pascale; Guillier, Romaric; Soudan, Sebastien

    2013-01-01

    "Computing Networks" explores the core of the new distributed computing infrastructures we are using today:  the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better understand the technologies, specificities, constraints and benefits of these different infrastructures' communication systems. Cloud Computing will give the possibility for millions of users to process data anytime, anywhere, while being eco-friendly. In order to deliver this emerging traffic in a timely, cost-efficient, energy-efficient, and

  8. Command-And-Control or Taxation?

    DEFF Research Database (Denmark)

    Oh, Christina; Svendsen, Gert Tinggaard

    2015-01-01

    an ineffective command-and-control (CAC) tool, whereas Denmark has chosen the effective tool of taxation. One main explanation for this variation in policy choice is the variation in institutional setups, namely the corporatist route in Denmark versus the pluralistic route in California....

  9. Influence of friends on children's physical activity: a review.

    Science.gov (United States)

    Maturo, Claire C; Cunningham, Solveig A

    2013-07-01

    We examined evidence for friendship influences on children's physical activity (PA) through systematic searches of online databases in May 2012. We identified 106 studies (25 qualitative) published in English since 2000 that analyzed indicators of friendship influences (e.g., communication about PA, friends' PA, and PA with friends) among persons younger than 19 years. Children's PA was positively associated with encouragement from friends (43 of 55 studies indicating a positive relationship), friends' own PA (30/35), and engagement with friends in PA (9/10). These findings are consistent with friends influencing PA, but most studies did not isolate influence from other factors that could explain similarity. Understanding friendship influences in childhood can facilitate the promotion of lifelong healthy habits. PA with friends should be considered in health promotion programs.

  10. Use of social network sites and instant messaging does not lead to increased offline social network size, or to emotionally closer relationships with offline network members.

    Science.gov (United States)

    Pollet, Thomas V; Roberts, Sam G B; Dunbar, Robin I M

    2011-04-01

    The effect of Internet use on social relationships is still a matter of intense debate. This study examined the relationships between use of social media (instant messaging and social network sites), network size, and emotional closeness in a sample of 117 individuals aged 18 to 63 years old. Time spent using social media was associated with a larger number of online social network "friends." However, time spent using social media was not associated with larger offline networks, or feeling emotionally closer to offline network members. Further, those that used social media, as compared to non-users of social media, did not have larger offline networks, and were not emotionally closer to offline network members. These results highlight the importance of considering potential time and cognitive constraints on offline social networks when examining the impact of social media use on social relationships.

  11. Parental influence on substance use in adolescent social networks.

    Science.gov (United States)

    Shakya, Holly B; Christakis, Nicholas A; Fowler, James H

    2012-12-01

    To evaluate the relationship between the parenting style of an adolescent's peers' parents and an adolescent's substance use. Longitudinal survey. Adolescents across the United States were interviewed at school and at home. Nationally representative sample of adolescents in the United States. Authoritative vs neglectful parenting style of adolescent's parents and adolescent's friends' parents and adolescent substance use. Adolescent alcohol abuse, smoking, marijuana use, and binge drinking. If an adolescent had a friend whose mother was authoritative, that adolescent was 40% (95% CI, 12%-58%) less likely to drink to the point of drunkenness, 38% (95% CI, 5%-59%) less likely to binge drink, 39% (95% CI, 12%-58%) less likely to smoke cigarettes, and 43% (95% CI, 1%-67%) less likely to use marijuana than an adolescent whose friend's mother was neglectful, controlling for the parenting style of the adolescent's own mother, school-level fixed effects, and demographics. These results were only partially mediated by peer substance use. Social network influences may extend beyond the homogeneous dimensions of own peer or own parent to include extradyadic influences of the wider network. The value of parenting interventions should be reassessed to take into account these spillover effects in the greater network.

  12. Understanding the value of social networks in life satisfaction of elderly people: a comparative study of 16 European countries using SHARE data.

    Science.gov (United States)

    Tomini, Florian; Tomini, Sonila M; Groot, Wim

    2016-12-01

    Networks of family and friends are a source of support and are generally associated with higher life satisfaction values among older adults. On the other hand, older adults who are satisfied with their life may be more able to develop and maintain a wider social network. For this reason, the causal link between size and composition of the social networks and satisfaction with life is yet to be explored. This paper investigates the effect of the 'size', (number of family and friends, and network) and the 'composition' (the proportion of friends over total number of persons) of the social network on life satisfaction among older adults (50+). Moreover, we also investigate the patterns of this relation between different European countries. Data from the 4 th wave of Survey of Health, Ageing and Retirement in Europe and an instrumental variable approach are used to estimate the extent of the relation between life satisfaction and size and composition of social networks. Respondents in Western and Northern European (WNE) countries report larger networks than respondents in Eastern and Southern European (ESE) countries. However, the positive relationship between network size and life satisfaction is consistent across countries. On the other hand, the share of friends in the network appears to be generally negatively related to satisfaction with life, though results are not statistically significant for all countries. Apparently, a larger personal network is important for older adults (50+) to be more satisfied with life. Our results suggest that this relation is particularly positive if the network is comprised of family members.

  13. A precise clock distribution network for MRPC-based experiments

    International Nuclear Information System (INIS)

    Wang, S.; Cao, P.; Shang, L.; An, Q.

    2016-01-01

    In high energy physics experiments, the MRPC (Multi-Gap Resistive Plate Chamber) detectors are widely used recently which can provide higher-resolution measurement for particle identification. However, the application of MRPC detectors leads to a series of challenges in electronics design with large number of front-end electronic channels, especially for distributing clock precisely. To deal with these challenges, this paper presents a universal scheme of clock transmission network for MRPC-based experiments with advantages of both precise clock distribution and global command synchronization. For precise clock distributing, the clock network is designed into a tree architecture with two stages: the first one has a point-to-multipoint long range bidirectional distribution with optical channels and the second one has a fan-out structure with copper link inside readout crates. To guarantee the precision of clock frequency or phase, the r-PTP (reduced Precision Time Protocol) and the DDMTD (digital Dual Mixer Time Difference) methods are used for frequency synthesis, phase measurement and adjustment, which is implemented by FPGA (Field Programmable Gate Array) in real-time. In addition, to synchronize global command execution, based upon this clock distribution network, synchronous signals are coded with clock for transmission. With technique of encoding/decoding and clock data recovery, signals such as global triggers or system control commands, can be distributed to all front-end channels synchronously, which greatly simplifies the system design. The experimental results show that both the clock jitter (RMS) and the clock skew can be less than 100 ps.

  14. The more friends, the less political talk? Predictors of Facebook discussions among college students.

    Science.gov (United States)

    Jang, S Mo; Lee, Hoon; Park, Yong Jin

    2014-05-01

    Although previous research has indicated that Facebook users, especially young adults, can cultivate their civic values by talking about public matters with their Facebook friends, little research has examined the predictors of political discussion on Facebook. Using survey data from 442 college students in the United States, this study finds that individual characteristics and network size influence college students' expressive behavior on Facebook related to two controversial topics: gay rights issues and politics. In line with previous studies about offline political discussion, the results show that conflict avoidance and ambivalence about target issues are negatively associated with Facebook discussions. Perhaps the most interesting finding is that users who have a large number of Facebook friends are less likely to talk about politics and gay rights issues on Facebook despite having access to increasing human and information resources. Theoretical implications of these findings and future directions are addressed.

  15. Command History, 1993.

    Science.gov (United States)

    1994-04-01

    his space capsule. The ()CUILAR COtJNTI:,RROI,.L I)FVICI" was built by the Naval Air Rework Facility, NAS Pensacola. tfor NAMRI, in the early 1960s...Dunwoody, GA Kevin G. Singleton, ENS USNR Naval Aviation Schools Command Kyle W M. Taylor, ENS USNR U.S. Naval Academy Jason A. Temple, ENS USNR Auburn...Pensacola, 13-15 Oct 93. Pokorski, T.L., LICDR MSC USN, attended Aircrew Modified IEquipment for Ladies in Aviation (AMELIA) Fri -service Long-range Planning

  16. Increasing Classroom Compliance: Using a High-Probability Command Sequence with Noncompliant Students

    Science.gov (United States)

    Axelrod, Michael I.; Zank, Amber J.

    2012-01-01

    Noncompliance is one of the most problematic behaviors within the school setting. One strategy to increase compliance of noncompliant students is a high-probability command sequence (HPCS; i.e., a set of simple commands in which an individual is likely to comply immediately prior to the delivery of a command that has a lower probability of…

  17. Eco friendly expectations and limitations in daycare

    DEFF Research Database (Denmark)

    Husted, Mia

    This presentation elaborates on expectations and limitations of eco-friendly pedagogical responses to the sustainability crisis. The pedagogical perspectives on eco-friendly responses originates from an action research project involving pedagogues in day care centers and teachers at a University ...... College in Denmark. As part of the project they were asked to explore, elaborate and develop new pedagogical actions and perspectives related to future relationships between human beings and our common nature......This presentation elaborates on expectations and limitations of eco-friendly pedagogical responses to the sustainability crisis. The pedagogical perspectives on eco-friendly responses originates from an action research project involving pedagogues in day care centers and teachers at a University...

  18. ASTP crewmen in Apollo Command Module Trainer during training session at JSC

    Science.gov (United States)

    1975-01-01

    The three members of the American ASTP prime crew are photographed inside the Apollo Command Module (CM) trainer in a water tank in bldg 260 during water egress training at JSC. They are, left to right, Astronauts Thomas P. Stafford, commander; Vance D. Brand, command module pilot; and Donald K. Slayton, docking module pilot (23430); Slayton attaches his life preserver as he egresses an Apollo Command Module trainer in a water tank in bldg 260 during water egresss training at JSC. Astronauts Brand (on left) and Stafford have already egressed the trainer and are seated in a three-man life raft.

  19. Fermilab Friends for Science Education | Programs

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Programs Donors Board of Directors Board Tools Calendar Join Us Donate Now Get FermiGear! Education Office Search photo Fermilab Friends for Science Education, in partnership with Fermilab and area educators, designs

  20. Best friends' discussions of social dilemmas.

    Science.gov (United States)

    McDonald, Kristina L; Malti, Tina; Killen, Melanie; Rubin, Kenneth H

    2014-02-01

    Peer relationships, particularly friendships, have been theorized to contribute to how children and adolescents think about social and moral issues. The current study examined how young adolescent best friends (191 dyads; 53.4% female) reason together about multifaceted social dilemmas and how their reasoning is related to friendship quality. Mutually-recognized friendship dyads were videotaped discussing dilemmas entailing moral, social-conventional and prudential/pragmatic issues. Both dyad members completed a self-report measure of friendship quality. Dyadic data analyses guided by the Actor-Partner Interdependence Model indicated that adolescent and friend reports of friendship qualities were related to the forms of reasoning used during discussion. Friends who both reported that they could resolve conflicts in a constructive way were more likely to use moral reasoning than friends who reported that their conflict resolution was poor or disagreed on the quality of their conflict resolution. The findings provide evidence for the important role that friendship interaction may play in adolescents' social and moral development.

  1. Applications of social media and social network analysis

    CERN Document Server

    Kazienko, Przemyslaw

    2015-01-01

    This collection of contributed chapters demonstrates a wide range of applications within two overlapping research domains: social media analysis and social network analysis. Various methodologies were utilized in the twelve individual chapters including static, dynamic and real-time approaches to graph, textual and multimedia data analysis. The topics apply to reputation computation, emotion detection, topic evolution, rumor propagation, evaluation of textual opinions, friend ranking, analysis of public transportation networks, diffusion in dynamic networks, analysis of contributors to commun

  2. Research into command, control, and communications in space construction

    Science.gov (United States)

    Davis, Randal

    1990-01-01

    Coordinating and controlling large numbers of autonomous or semi-autonomous robot elements in a space construction activity will present problems that are very different from most command and control problems encountered in the space business. As part of our research into the feasibility of robot constructors in space, the CSC Operations Group is examining a variety of command, control, and communications (C3) issues. Two major questions being asked are: can we apply C3 techniques and technologies already developed for use in space; and are there suitable terrestrial solutions for extraterrestrial C3 problems? An overview of the control architectures, command strategies, and communications technologies that we are examining is provided and plans for simulations and demonstrations of our concepts are described.

  3. Triadic motifs in the dependence networks of virtual societies

    Science.gov (United States)

    Xie, Wen-Jie; Li, Ming-Xia; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2014-06-01

    In friendship networks, individuals have different numbers of friends, and the closeness or intimacy between an individual and her friends is heterogeneous. Using a statistical filtering method to identify relationships about who depends on whom, we construct dependence networks (which are directed) from weighted friendship networks of avatars in more than two hundred virtual societies of a massively multiplayer online role-playing game (MMORPG). We investigate the evolution of triadic motifs in dependence networks. Several metrics show that the virtual societies evolved through a transient stage in the first two to three weeks and reached a relatively stable stage. We find that the unidirectional loop motif (M9) is underrepresented and does not appear, open motifs are also underrepresented, while other close motifs are overrepresented. We also find that, for most motifs, the overall level difference of the three avatars in the same motif is significantly lower than average, whereas the sum of ranks is only slightly larger than average. Our findings show that avatars' social status plays an important role in the formation of triadic motifs.

  4. Triadic motifs in the dependence networks of virtual societies.

    Science.gov (United States)

    Xie, Wen-Jie; Li, Ming-Xia; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2014-06-10

    In friendship networks, individuals have different numbers of friends, and the closeness or intimacy between an individual and her friends is heterogeneous. Using a statistical filtering method to identify relationships about who depends on whom, we construct dependence networks (which are directed) from weighted friendship networks of avatars in more than two hundred virtual societies of a massively multiplayer online role-playing game (MMORPG). We investigate the evolution of triadic motifs in dependence networks. Several metrics show that the virtual societies evolved through a transient stage in the first two to three weeks and reached a relatively stable stage. We find that the unidirectional loop motif (M9) is underrepresented and does not appear, open motifs are also underrepresented, while other close motifs are overrepresented. We also find that, for most motifs, the overall level difference of the three avatars in the same motif is significantly lower than average, whereas the sum of ranks is only slightly larger than average. Our findings show that avatars' social status plays an important role in the formation of triadic motifs.

  5. Virtual Social Networks Online and Mobile Systems

    Directory of Open Access Journals (Sweden)

    Maytham Safar

    2009-01-01

    Full Text Available Location-based applications are one of the most anticipated new segments of the mobile industry. These new applications are enabled by GPS-equipped phones (e.g., emergency applications, buddy finders, games, location-based advertising, etc.. These services are designed to give consumers instant access to personalized, local content of their immediate location. Some applications couple LBS with notification services, automatically alerting users when they are close to a pre-selected destination. With the advances in the Internet and communications/mobile technology, it became vital to analyze the effect of such technologies on human communications. This work studies how humans can construct social networks as a method for group communications using the available technologies. We constructed and analyzed a friends network using different parameters. The parameters that were calculated to analyze the network are the distribution sequence, characteristic path length, clustering coefficient and centrality measures. In addition, we built a PDA application that implements the concept of LBS using two system modules. In the first module, we have developed an application for entertainment purpose; an application program which enables end users to send their birth year and get their horoscope in return. The second part of the project was, to build an application, which helps people to stay in touch with their friends and family members (Find Friend. It helps users to find which of their buddies are within the same area they are in.

  6. How Can I Help a Friend Who Cuts?

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español How Can I Help a Friend Who Cuts? KidsHealth / For Teens / How Can I Help a Friend Who Cuts? What's in ... them? If so, what should you do? It can be hard to understand why a friend might ...

  7. A Proposal for the Merger of the U.S. Army Recruiting Command (USAREC) and the U.S. Army Cadet Command: One Recruiting Organization - "More Than a Partnership"

    National Research Council Canada - National Science Library

    Kleppinger, Tim

    2001-01-01

    ...) and the United States Army Cadet Command into one accessions organization. For the past five years both USAREC and Cadet Command have found greater difficulty in achieving their annual missions...

  8. What value do users derive from social networking applications?

    OpenAIRE

    Neale, Larry; Russell-Bennett, Rebekah

    2009-01-01

    Why do users of social networking sites recommend some applications to their friends while rejecting others? What value do they obtain from applications? This exploratory study investigates the value users derive from ‘cool’ Facebook applications, and explores the features that either encourage or discourage users to recommend applications to their friends. Our qualitative data reveal consumers derive a combination of functional value along with either social or emotional value from the app...

  9. Is There a Need For a Joint Reserve Components Command?

    Science.gov (United States)

    2013-03-01

    Bravo Zulu ”. If these words were heard by a Soldier, it might be interpreted as poor performance. By having one organization as a single source for...Commander, Joint Reserve Components Command. Creation of the JRCC would, in time, strengthen partnerships between the reserve components of each

  10. Social networking in online support groups for health: how online social networking benefits patients.

    Science.gov (United States)

    Chung, Jae Eun

    2014-01-01

    An increasing number of online support groups (OSGs) have embraced the features of social networking. So far, little is known about how patients use and benefit from these features. By implementing the uses-and-gratifications framework, the author conducted an online survey with current users of OSGs to examine associations among motivation, use of specific features of OSG, and support outcomes. Findings suggest that OSG users make selective use of varied features depending on their needs, and that perceptions of receiving emotional and informational support are associated more with the use of some features than others. For example, those with strong motivation for social interaction use diverse features of OSG and make one-to-one connections with other users by friending. In contrast, those with strong motivation for information seeking limit their use primarily to discussion boards. Results also show that online social networking features, such as friending and sharing of personal stories on blogs, are helpful in satisfying the need for emotional support. The present study sheds light on online social networking features in the context of health-related OSGs and provides practical lessons on how to improve the capacity of OSGs to serve the needs of their users.

  11. Global Missile Defense: The Case for a New Operational Command Structure

    National Research Council Canada - National Science Library

    Galazin, Jared J

    2005-01-01

    ...), violates the principle of unity of command. Placing components of the BMDS under the control of different combatant commanders creates unnecessary friction in a process where speed of execution is measured in seconds...

  12. The Contagious Spread of Violence Among US Adolescents Through Social Networks.

    Science.gov (United States)

    Bond, Robert M; Bushman, Brad J

    2017-02-01

    To test the hypothesis that violence among US adolescents spreads like a contagious disease through social networks. Participants were a nationally representative sample of 90 118 US students aged 12 to 18 years who were involved in the National Longitudinal Study of Adolescent Health. Violence was assessed by having participants report the number of times in the preceding 12 months they had been involved in a serious physical fight, had hurt someone badly, and had pulled a weapon on someone. Participants were 48% more likely to have been involved in a serious fight, 183% more likely to have hurt someone badly, and 140% more likely to have pulled a weapon on someone if a friend had engaged in the same behavior. The influence spread up to 4 degrees of separation (i.e., friend of friend of friend of friend) for serious fights, 2 degrees for hurting someone badly, and 3 degrees for pulling a weapon on someone. Adolescents were more likely to engage in violent behavior if their friends did the same, and contagion of violence extended beyond immediate friends to friends of friends.

  13. Wireless Sensing Node Network Management for Monitoring Landslide Disaster

    International Nuclear Information System (INIS)

    Takayama, S; Akiyama, J; Fujiki, T; Mokhtar, N A B

    2013-01-01

    This paper shows the network management and operation to monitor landslide disaster at slop of mountain and hill. Natural disasters damage a measuring system easily. It is necessary for the measuring system to be flexible and robust. The measuring network proposed in this paper is the telemetry system consisted of host system (HS) and local sensing nodes network system (LSNNS). LSNNS operates autonomously and sometimes is controlled by commands from HS. HS collects data/information of landslide disaster from LSNNS, and controls LSNNS remotely. HS and LSNNS are communicated by using 'cloud' system. The dual communication is very effective and convenient to manage a network system operation

  14. Problem solving for wireless sensor networks

    CERN Document Server

    Garcia-Hernando, Ana-Belen; Lopez-Navarro, Juan-Manuel; Prayati, Aggeliki; Redondo-Lopez, Luis

    2008-01-01

    Wireless Sensor Networks (WSN) is an area of huge research interest, attracting substantial attention from industry and academia for its enormous potential and its inherent challenges. This reader-friendly text delivers a comprehensive review of the developments related to the important technological issues in WSN.

  15. Modeling and simulating command and control for organizations under extreme situations

    CERN Document Server

    Moon, Il-Chul; Kim, Tag Gon

    2013-01-01

    Commanding and controlling organizations in extreme situations is a challenging task in military, intelligence, and disaster management. Such command and control must be quick, effective, and considerate when dealing with the changing, complex, and risky conditions of the situation. To enable optimal command and control under extremes, robust structures and efficient operations are required of organizations. This work discusses how to design and conduct virtual experiments on resilient organizational structures and operational practices using modeling and simulation. The work illustrates key a

  16. Potential benefits and harms of a peer support social network service on the internet for people with depressive tendencies: qualitative content analysis and social network analysis.

    Science.gov (United States)

    Takahashi, Yoshimitsu; Uchida, Chiyoko; Miyaki, Koichi; Sakai, Michi; Shimbo, Takuro; Nakayama, Takeo

    2009-07-23

    Internet peer support groups for depression are becoming popular and could be affected by an increasing number of social network services (SNSs). However, little is known about participant characteristics, social relationships in SNSs, and the reasons for usage. In addition, the effects of SNS participation on people with depression are rather unknown. The aim was to explore the potential benefits and harms of an SNS for depression based on a concurrent triangulation design of mixed methods strategy, including qualitative content analysis and social network analysis. A cross-sectional Internet survey of participants, which involved the collection of SNS log files and a questionnaire, was conducted in an SNS for people with self-reported depressive tendencies in Japan in 2007. Quantitative data, which included user demographics, depressive state, and assessment of the SNS (positive vs not positive), were statistically analyzed. Descriptive contents of responses to open-ended questions concerning advantages and disadvantages of SNS participation were analyzed using the inductive approach of qualitative content analysis. Contents were organized into codes, concepts, categories, and a storyline based on the grounded theory approach. Social relationships, derived from data of "friends," were analyzed using social network analysis, in which network measures and the extent of interpersonal association were calculated based on the social network theory. Each analysis and integration of results were performed through a concurrent triangulation design of mixed methods strategy. There were 105 participants. Median age was 36 years, and 51% (36/71) were male. There were 37 valid respondents; their number of friends and frequency of accessing the SNS were significantly higher than for invalid/nonrespondents (P = .008 and P = .003). Among respondents, 90% (28/31) were mildly, moderately, or severely depressed. Assessment of the SNS was performed by determining the access

  17. Potential Benefits and Harms of a Peer Support Social Network Service on the Internet for People With Depressive Tendencies: Qualitative Content Analysis and Social Network Analysis

    Science.gov (United States)

    Takahashi, Yoshimitsu; Uchida, Chiyoko; Miyaki, Koichi; Sakai, Michi; Shimbo, Takuro

    2009-01-01

    Background Internet peer support groups for depression are becoming popular and could be affected by an increasing number of social network services (SNSs). However, little is known about participant characteristics, social relationships in SNSs, and the reasons for usage. In addition, the effects of SNS participation on people with depression are rather unknown. Objective The aim was to explore the potential benefits and harms of an SNS for depression based on a concurrent triangulation design of mixed methods strategy, including qualitative content analysis and social network analysis. Methods A cross-sectional Internet survey of participants, which involved the collection of SNS log files and a questionnaire, was conducted in an SNS for people with self-reported depressive tendencies in Japan in 2007. Quantitative data, which included user demographics, depressive state, and assessment of the SNS (positive vs not positive), were statistically analyzed. Descriptive contents of responses to open-ended questions concerning advantages and disadvantages of SNS participation were analyzed using the inductive approach of qualitative content analysis. Contents were organized into codes, concepts, categories, and a storyline based on the grounded theory approach. Social relationships, derived from data of “friends,” were analyzed using social network analysis, in which network measures and the extent of interpersonal association were calculated based on the social network theory. Each analysis and integration of results were performed through a concurrent triangulation design of mixed methods strategy. Results There were 105 participants. Median age was 36 years, and 51% (36/71) were male. There were 37 valid respondents; their number of friends and frequency of accessing the SNS were significantly higher than for invalid/nonrespondents (P = .008 and P = .003). Among respondents, 90% (28/31) were mildly, moderately, or severely depressed. Assessment of the SNS was

  18. Apollo 10 astronauts in space suits in front of Command Module

    Science.gov (United States)

    1968-01-01

    Three astronauts named as the prime crew of the Apollo 10 space mission. Left to right, are Eugene A. Cernan, lunar module pilot; John W. Young, command module pilot; and Thomas P. Stafford, commander.

  19. Man/terminal interaction evaluation of computer operating system command and control service concepts. [in Spacelab

    Science.gov (United States)

    Dodson, D. W.; Shields, N. L., Jr.

    1978-01-01

    The Experiment Computer Operating System (ECOS) of the Spacelab will allow the onboard Payload Specialist to command experiment devices and display information relative to the performance of experiments. Three candidate ECOS command and control service concepts were reviewed and laboratory data on operator performance was taken for each concept. The command and control service concepts evaluated included a dedicated operator's menu display from which all command inputs were issued, a dedicated command key concept with which command inputs could be issued from any display, and a multi-display concept in which command inputs were issued from several dedicated function displays. Advantages and disadvantages are discussed in terms of training, operational errors, task performance time, and subjective comments of system operators.

  20. The use of augmented reality in command and control situation ...

    African Journals Online (AJOL)

    This study identifies possible uses of augmented reality in command and control applications with specific attention to situation awareness in the South African context. Applications across the different command and control functions, as well as at the different levels of military operations are considered. The article concludes ...

  1. Maternal Affection Moderates Friend Influence on Schoolwork Engagement

    Science.gov (United States)

    Marion, Donna; Laursen, Brett; Kiuru, Noona; Nurmi, Jari-Erik; Salmela-Aro, Katariina

    2014-01-01

    This study investigated friend influence over adolescent schoolwork engagement in 160 same-sex friend dyads (94 female dyads and 66 male dyads). Participants were approximately 16 years of age at the outset. Each friend described his or her own schoolwork engagement, school burnout, and perceptions of maternal affection. The results revealed that…

  2. A link prediction method for heterogeneous networks based on BP neural network

    Science.gov (United States)

    Li, Ji-chao; Zhao, Dan-ling; Ge, Bing-Feng; Yang, Ke-Wei; Chen, Ying-Wu

    2018-04-01

    Most real-world systems, composed of different types of objects connected via many interconnections, can be abstracted as various complex heterogeneous networks. Link prediction for heterogeneous networks is of great significance for mining missing links and reconfiguring networks according to observed information, with considerable applications in, for example, friend and location recommendations and disease-gene candidate detection. In this paper, we put forward a novel integrated framework, called MPBP (Meta-Path feature-based BP neural network model), to predict multiple types of links for heterogeneous networks. More specifically, the concept of meta-path is introduced, followed by the extraction of meta-path features for heterogeneous networks. Next, based on the extracted meta-path features, a supervised link prediction model is built with a three-layer BP neural network. Then, the solution algorithm of the proposed link prediction model is put forward to obtain predicted results by iteratively training the network. Last, numerical experiments on the dataset of examples of a gene-disease network and a combat network are conducted to verify the effectiveness and feasibility of the proposed MPBP. It shows that the MPBP with very good performance is superior to the baseline methods.

  3. Comparative Research of Navy Voluntary Education at Operational Commands

    Science.gov (United States)

    2017-03-01

    into a national and international market. This is especially effects land-grant institutions who can educate the citizens within their state by...RESEARCH OF NAVY VOLUNTARY EDUCATION AT OPERATIONAL COMMANDS by Christopher B. Veenhuis March 2017 Thesis Co-Advisors: William Hatch Chad...COVERED Master’s thesis 4. TITLE AND SUBTITLE COMPARATIVE RESEARCH OF NAVY VOLUNTARY EDUCATION AT OPERATIONAL COMMANDS 5. FUNDING NUMBERS 6. AUTHOR(S

  4. United States Southern Command * Home

    Science.gov (United States)

    or concerns please email or call us at 305-437-2287. Testing The USAG- Miami Joint Education Testing the Air Force | The Air University | US Air Force Academy Army: Army Continued Education System | Army Marine Corps Institute | US Marine Corps Training and Education Command | US Marine Corps University Navy

  5. Predicting compliance with command hallucinations: anger, impulsivity and appraisals of voices' power and intent.

    Science.gov (United States)

    Bucci, Sandra; Birchwood, Max; Twist, Laura; Tarrier, Nicholas; Emsley, Richard; Haddock, Gillian

    2013-06-01

    Command hallucinations are experienced by 33-74% of people who experience voices, with varying levels of compliance reported. Compliance with command hallucinations can result in acts of aggression, violence, suicide and self-harm; the typical response however is non-compliance or appeasement. Two factors associated with such dangerous behaviours are anger and impulsivity, however few studies have examined their relationship with compliance to command hallucinations. The current study aimed to examine the roles of anger and impulsivity on compliance with command hallucinations in people diagnosed with a psychotic disorder. The study was a cross-sectional design and included individuals who reported auditory hallucinations in the past month. Subjects completed a variety of self-report questionnaire measures. Thirty-two people experiencing command hallucinations, from both in-patient and community settings, were included. The tendency to appraise the voice as powerful, to be impulsive, to experience anger and to regulate anger were significantly associated with compliance with command hallucinations to do harm. Two factors emerged as significant independent predictors of compliance with command hallucinations; omnipotence and impulsivity. An interaction between omnipotence and compliance with commands, via a link with impulsivity, is considered and important clinical factors in the assessment of risk when working with clients experiencing command hallucinations are recommended. The data is highly suggestive and warrants further investigation with a larger sample. Copyright © 2013 Elsevier B.V. All rights reserved.

  6. Homeless but Connected: The Role of Heterogeneous Social Network Ties and Social Networking Technology in the Mental Health Outcomes of Street-Living Youth

    OpenAIRE

    Rice, Eric; Ray, Diana; Kurzban, Seth

    2011-01-01

    Although social integration tends to have positive effects on the mental health of housed adolescents, the role of homeless adolescents’ social networks is more ambiguous. Social network data were collected from 136 homeless adolescents in Hollywood, California to examine how network ties are associated with symptoms of anxiety and depression. Face-to-face relationships with street-based peers were a risk factor for both anxiety and depression, while contacting home-based friends through soci...

  7. A Net of Friends: Investigating Friendship by Integrating Attachment Theory and Social Network Analysis.

    Science.gov (United States)

    Gillath, Omri; Karantzas, Gery C; Selcuk, Emre

    2017-11-01

    The current article focuses on attachment style-an individual difference widely studied in the field of close relationships-and its application to the study of social networks. Specifically, we investigated whether attachment style predicts perception and management of social networks. In Study 1, we examined the associations of attachment style with perceptions of network tie strength and multiplexity. In Studies 2a and 2b, we investigated the association between attachment style and network management skills (initiating, maintaining, and dissolving ties) and whether network management skills mediated the associations of attachment style with network tie strength and multiplexity. In Study 3, experimentally enhancing attachment security made people more likely to initiate and less likely to dissolve social ties (for the latter, especially among those high on avoidance or anxiety). As for maintenance, security priming also increased maintenance; however, mainly among people high on attachment anxiety or low on attachment avoidance.

  8. New Global Missions for Strategic Command

    National Research Council Canada - National Science Library

    Graham, David

    2002-01-01

    .... The focus of this White Paper is on the external decisions that will be needed to provide the Command with a clear mission, and the authority, resources and organizational support necessary to perform the mission...

  9. Adolescent friend similarity on alcohol abuse as a function of participation in romantic relationships: Sometimes a new love comes between old friends.

    Science.gov (United States)

    DeLay, Dawn; Laursen, Brett; Bukowski, William M; Kerr, Margaret; Stattin, Håkan

    2016-01-01

    This study tests the hypothesis that adolescents with romantic partners are less similar to their friends on rates of alcohol abuse than adolescents without romantic partners. Participants (662 girls, 574 boys) ranging in age from 12 to 19 years nominated friends and romantic partners, and completed a measure of alcohol abuse. In hierarchical linear models, friends with romantic partners were less similar on rates of alcohol abuse than friends without romantic partners, especially if they were older and less accepted. Follow-up longitudinal analyses were conducted on a subsample (266 boys, 374 girls) of adolescents who reported friendships that were stable across 2 consecutive years. Associations between friend reports of alcohol abuse declined after adolescents became involved in a romantic relationship, to the point at which they became more similar to their romantic partners than to their friends. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  10. Eco-friendly polymer nanocomposites processing and properties

    CERN Document Server

    Thakur, Vijay Kumar

    2015-01-01

    This book contains precisely referenced chapters, emphasizing environment-friendly polymer nanocomposites with basic fundamentals, practicality and alternatives to traditional nanocomposites through detailed reviews of different environmental friendly materials procured from different resources, their synthesis and applications using alternative green approaches. The book aims at explaining basics of eco-friendly polymer nanocomposites from different natural resources and their chemistry along with practical applications which present a future direction in the biomedical, pharmaceutical and automotive industry. The book attempts to present emerging economic and environmentally friendly polymer nanocomposites that are free from side effects studied in the traditional nanocomposites. This book is the outcome of contributions by many experts in the field from different disciplines, with various backgrounds and expertises. This book will appeal to researchers as well as students from different disciplines. The co...

  11. 10 commandments of smile esthetics

    Science.gov (United States)

    Machado, Andre Wilson

    2014-01-01

    The search for esthetic treatment has persisted in the routine of dental professionals. Following this trend, dental patients have sought treatment with the primary aim of improving smile esthetics. The aim of this article is to present a protocol to assess patient's smile: The 10 Commandments of smile esthetics. PMID:25279532

  12. Secure network for beamline control

    International Nuclear Information System (INIS)

    Ohata, T.; Fukui, T.; Ishii, M.; Furukawa, Y.; Nakatani, T.; Matsushita, T.; Takeuchi, M.; Tanaka, R.; Ishikawa, T.

    2001-01-01

    In SPring-8, beamline control system is constructed with a highly available distributed network system. The socket based communication protocol is used for the beamline control mainly. Beamline users can control the equipment by sending simple control commands to a server process, which is running on a beamline-managing computer (Ohata et al., SPring-8 beamline control system, ICALEPCS'99, Trieste, Italy, 1999). At the beginning the network was based on the shared topology at all beamlines. Consequently, it has a risk for misapplication of the user's program to access different machines on the network system cross over beamlines. It is serious problem for the SPring-8 beamline control system, because all beamlines controlled with unified software interfaces. We introduced the switching technology and the firewalls to support network access control. Also the virtual networking (VLAN: IEEE 802.1Q) and the gigabit Ethernet technology (IEEE 802.3ab) are introduced. Thus the network security and the reliability are guaranteed at the higher level in SPring-8 beamline

  13. Which energy networks for tomorrow?

    International Nuclear Information System (INIS)

    Lenoir, D.; Couturier, Ch.; Batot, Ph.; Jedliczka, M.; Belon, D.; Goy, E.; Bureau, L.

    2010-01-01

    A set of brief articles outlines the importance of energy networks of all kinds for the future of energy conservation. Thus, all networks (communication, data, production command and control) will have a role to play to make all energy networks (electricity, gas, heat, cold, water, sewage, telecommunications) communicate with each other, and a new consumption/production model will have to be developed for each territory by taking into account its capacities to improve energy efficiency and valorize renewable energies. The authors also propose a historical perspective of network development and of their trend to become interconnected and complementary, comment the governance issue in terms of concession, evoke the supply of public networks with biogas (legal framework under development), discuss the value of the project of development of smart grids, suggest that a better electricity demand management could be an efficient alternative to grid development, comment the context and implications of the European directive Linky, outline that heat networks will contribute to the reduction of the environmental impact of buildings, evoke the issue of cold water networks and their impact on air conditioning, present the original heat network which is about to be built in Saint-Brieuc, etc.

  14. Terrain Commander: Unattended Ground-Based Surveillance System

    National Research Council Canada - National Science Library

    Steadman, Bob

    2000-01-01

    .... Terrain Commander OASIS provides next generation target detection, classification, and tracking through smart sensor fusion of beamforming acoustic, seismic, passive infrared, and magnetic sensors...

  15. Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns

    OpenAIRE

    Siegel, David A.

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to con...

  16. A Dynamic Model of Adolescent Friendship Networks, Parental Influences, and Smoking

    Science.gov (United States)

    Wang, Cheng; Butts, Carter T.; Jose, Rupa; Timberlake, David S.; Hipp, John R.

    2015-01-01

    Peer and parental influences are critical socializing forces shaping adolescent development, including the co-evolving processes of friendship tie choice and adolescent smoking. This study examines aspects of adolescent friendship networks and dimensions of parental influences shaping friendship tie choice and smoking, including parental support, parental monitoring, and the parental home smoking environment using a Stochastic Actor-Based model. With data from three waves of the National Longitudinal Study of Adolescent Health of youth in grades 7 through 12, including the In-School Survey, the first wave of the In-Home survey occurring 6 months later, and the second wave of the In-Home survey, occurring one year later, this study utilizes two samples based on the social network data collected in the longitudinal saturated sample of sixteen schools. One consists of twelve small schools (n = 1,284, 50.93 % female), and the other of one large school (n = 976, 48.46 % female). The findings indicated that reciprocity, choosing a friend of a friend as a friend, and smoking similarity increased friendship tie choice behavior, as did parental support. Parental monitoring interacted with choosing friends who smoke in affecting friendship tie choice, as at higher levels of parental monitoring, youth chose fewer friends that smoked. A parental home smoking context conducive to smoking decreased the number of friends adolescents chose. Peer influence and a parental home smoking environment conducive to smoking increased smoking, while parental monitoring decreased it in the large school. Overall, peer and parental factors affected the coevolution of friendship tie choice and smoking, directly and multiplicatively. PMID:25239115

  17. From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks

    NARCIS (Netherlands)

    van der Wagen, Wytske; Pieters, Wolter

    2015-01-01

    Botnets, networks of infected computers controlled by a commander, increasingly play a role in a broad range of cybercrimes. Although often studied from technological perspectives, a criminological perspective could elucidate the organizational structure of botnets and how to counteract them.

  18. From Cybercrime to Cyborg Crime : Botnets as Hybrid Criminal Actor-Networks

    NARCIS (Netherlands)

    van der Wagen, Wytske; Pieters, Wolter

    2015-01-01

    Botnets, networks of infected computers controlled by a commander, increasingly play a role in a broad range of cybercrimes. Although often studied from technological perspectives, a criminological perspective could elucidate the organizational structure of botnets and how to counteract them.

  19. Friends, family and social belonging as we age

    Directory of Open Access Journals (Sweden)

    2015-09-01

    Aims: This study investigated if perceptions of social belonging in late adulthood are differentiated by the quality of family and friend relationships. Method:  The study consisted of two phases.  In Phase 1, 260 university staff and students, aged 18 to 75, completed an online survey investigating the quality of family and friend relationships and their association with social belonging.  In Phase 2, 88 older adults completed a refined print version of the survey.   Results:  Multiple regression was used to analyse the predictive ability of family and friend relationships on social belonging. In Phase 1, significant associations were found between both family and friend relationships and social belonging, with friendship yielding the strongest relationship.  Interestingly, in Phase 2 the association between quality of family and friend relationships and social belonging was mediated by age. Those aged 65 to 74 reported a significant relationship between friends and social belonging, which contrasted with those aged over 75.  A significant association between social belonging and family relationships was also found for the entire cohort aged over 65, while high quality friend relationships enhanced social belonging when family relationships were not strong. Conclusions: These results are tentative, but suggest that future research should consider the role that both friendships and family play in promoting social belonging in older adults.

  20. Gratitude for help among adult friends and siblings.

    Science.gov (United States)

    Rotkirch, Anna; Lyons, Minna; David-Barrett, Tamas; Jokela, Markus

    2014-07-06

    Although gratitude is a key prosocial emotion reinforcing reciprocal altruism, it has been largely ignored in the empirical literature. We examined feelings of gratitude and the importance of reciprocity in same-sex peer relations. Participants were 772 individuals (189 men; mean age = 28.80) who completed an online survey using a vignette design. We investigated (i) differences in reported gratitude and the importance of reciprocity among same-sex siblings and same-sex friends, and (ii) how relationship closeness moderates these associations. Based on the theory of kin altruism, we expect that people would feel more grateful towards friends than towards their siblings, and that lack of gratitude or failure to pay back a loan would bother more with friends than with siblings, irrespective of emotional closeness. Results showed that levels of gratitude and expectations of reciprocity were higher towards friends compared to siblings. This was the case also after controlling for emotional closeness. Being close generally made participants feel more grateful and expect lower displays of gratitude in the other. Closeness was also strongly associated with emotional gratitude among siblings compared to friends. We conclude that feelings and displays of gratitude have a special role in friendships. Although a close sibling may elicit as much gratitude as a friend does, even a very close friend is not exempt from the logic of reciprocity in the same way that a sibling is.

  1. An analysis of network traffic classification for botnet detection

    DEFF Research Database (Denmark)

    Stevanovic, Matija; Pedersen, Jens Myrup

    2015-01-01

    of detecting botnet network traffic using three methods that target protocols widely considered as the main carriers of botnet Command and Control (C&C) and attack traffic, i.e. TCP, UDP and DNS. We propose three traffic classification methods based on capable Random Forests classifier. The proposed methods...

  2. Blockmodeling techniques for complex networks

    Science.gov (United States)

    Ball, Brian Joseph

    The class of network models known as stochastic blockmodels has recently been gaining popularity. In this dissertation, we present new work that uses blockmodels to answer questions about networks. We create a blockmodel based on the idea of link communities, which naturally gives rise to overlapping vertex communities. We derive a fast and accurate algorithm to fit the model to networks. This model can be related to another blockmodel, which allows the method to efficiently find nonoverlapping communities as well. We then create a heuristic based on the link community model whose use is to find the correct number of communities in a network. The heuristic is based on intuitive corrections to likelihood ratio tests. It does a good job finding the correct number of communities in both real networks and synthetic networks generated from the link communities model. Two commonly studied types of networks are citation networks, where research papers cite other papers, and coauthorship networks, where authors are connected if they've written a paper together. We study a multi-modal network from a large dataset of Physics publications that is the combination of the two, allowing for directed links between papers as citations, and an undirected edge between a scientist and a paper if they helped to write it. This allows for new insights on the relation between social interaction and scientific production. We also have the publication dates of papers, which lets us track our measures over time. Finally, we create a stochastic model for ranking vertices in a semi-directed network. The probability of connection between two vertices depends on the difference of their ranks. When this model is fit to high school friendship networks, the ranks appear to correspond with a measure of social status. Students have reciprocated and some unreciprocated edges with other students of closely similar rank that correspond to true friendship, and claim an aspirational friendship with a much

  3. Qualities and Inequalities in Online Social Networks through the Lens of the Generalized Friendship Paradox.

    Science.gov (United States)

    Momeni, Naghmeh; Rabbat, Michael

    2016-01-01

    The friendship paradox is the phenomenon that in social networks, people on average have fewer friends than their friends do. The generalized friendship paradox is an extension to attributes other than the number of friends. The friendship paradox and its generalized version have gathered recent attention due to the information they provide about network structure and local inequalities. In this paper, we propose several measures of nodal qualities which capture different aspects of their activities and influence in online social networks. Using these measures we analyse the prevalence of the generalized friendship paradox over Twitter and we report high levels of prevalence (up to over 90% of nodes). We contend that this prevalence of the friendship paradox and its generalized version arise because of the hierarchical nature of the connections in the network. This hierarchy is nested as opposed to being star-like. We conclude that these paradoxes are collective phenomena not created merely by a minority of well-connected or high-attribute nodes. Moreover, our results show that a large fraction of individuals can experience the generalized friendship paradox even in the absence of a significant correlation between degrees and attributes.

  4. Qualities and Inequalities in Online Social Networks through the Lens of the Generalized Friendship Paradox.

    Directory of Open Access Journals (Sweden)

    Naghmeh Momeni

    Full Text Available The friendship paradox is the phenomenon that in social networks, people on average have fewer friends than their friends do. The generalized friendship paradox is an extension to attributes other than the number of friends. The friendship paradox and its generalized version have gathered recent attention due to the information they provide about network structure and local inequalities. In this paper, we propose several measures of nodal qualities which capture different aspects of their activities and influence in online social networks. Using these measures we analyse the prevalence of the generalized friendship paradox over Twitter and we report high levels of prevalence (up to over 90% of nodes. We contend that this prevalence of the friendship paradox and its generalized version arise because of the hierarchical nature of the connections in the network. This hierarchy is nested as opposed to being star-like. We conclude that these paradoxes are collective phenomena not created merely by a minority of well-connected or high-attribute nodes. Moreover, our results show that a large fraction of individuals can experience the generalized friendship paradox even in the absence of a significant correlation between degrees and attributes.

  5. Hybrid EEG-fNIRS-Based Eight-Command Decoding for BCI: Application to Quadcopter Control.

    Science.gov (United States)

    Khan, Muhammad Jawad; Hong, Keum-Shik

    2017-01-01

    In this paper, a hybrid electroencephalography-functional near-infrared spectroscopy (EEG-fNIRS) scheme to decode eight active brain commands from the frontal brain region for brain-computer interface is presented. A total of eight commands are decoded by fNIRS, as positioned on the prefrontal cortex, and by EEG, around the frontal, parietal, and visual cortices. Mental arithmetic, mental counting, mental rotation, and word formation tasks are decoded with fNIRS, in which the selected features for classification and command generation are the peak, minimum, and mean ΔHbO values within a 2-s moving window. In the case of EEG, two eyeblinks, three eyeblinks, and eye movement in the up/down and left/right directions are used for four-command generation. The features in this case are the number of peaks and the mean of the EEG signal during 1 s window. We tested the generated commands on a quadcopter in an open space. An average accuracy of 75.6% was achieved with fNIRS for four-command decoding and 86% with EEG for another four-command decoding. The testing results show the possibility of controlling a quadcopter online and in real-time using eight commands from the prefrontal and frontal cortices via the proposed hybrid EEG-fNIRS interface.

  6. CCL: console command language, RSX11M V4. 0, V7. OC tutorial

    Energy Technology Data Exchange (ETDEWEB)

    Downward, J. G.

    1981-01-01

    The normal user interface to an RSX11M operating system is via MCR (Monitor Console Routine). If terminal input is not specifically requested by a task, all data or commands typed in at a user's terminal, are sent by the terminal driver to MCR for decoding. The MCR task (and its child ...SYS) decode user commands (ACT, ABORT,RUN, DEV, ETC.). Tasks installed with special names of the form ...XYZ are treated as an external MCR command. Hence if a user types, XYZ COMMANDLINE, the commandline in its entirety (or at least up to 79 characters) is sent as input to the task ...XYZ. This is the conventional way of supplying most system commands and controlling the operation of the RSX11M utility program. The limitations of this method are: (1) each task must be installed to get MCR command lines; (2) each installed task uses valuable POOL space; (3) only privileged users can INSTALL and REMOVE tasks; and (4) non-privileged users are restricted to RUNning non-installed tasks. To solve this problem, a user tailorable Console Command Language (CCL) has been implemented which allows each user to have a private task control language to pass command lines to tasks that are not installed in th system as external MCR commands.

  7. Imagining is Not Doing but Involves Specific Motor Commands: A Review of Experimental Data Related to Motor Inhibition.

    Science.gov (United States)

    Guillot, Aymeric; Di Rienzo, Franck; Macintyre, Tadhg; Moran, Aidan; Collet, Christian

    2012-01-01

    There is now compelling evidence that motor imagery (MI) and actual movement share common neural substrate. However, the question of how MI inhibits the transmission of motor commands into the efferent pathways in order to prevent any movement is largely unresolved. Similarly, little is known about the nature of the electromyographic activity that is apparent during MI. In addressing these gaps in the literature, the present paper argues that MI includes motor execution commands for muscle contractions which are blocked at some level of the motor system by inhibitory mechanisms. We first assemble data from neuroimaging studies that demonstrate that the neural networks mediating MI and motor performance are not totally overlapping, thereby highlighting potential differences between MI and actual motor execution. We then review MI data indicating the presence of subliminal muscular activity reflecting the intrinsic characteristics of the motor command as well as increased corticomotor excitability. The third section not only considers the inhibitory mechanisms involved during MI but also examines how the brain resolves the problem of issuing the motor command for action while supervising motor inhibition when people engage in voluntary movement during MI. The last part of the paper draws on imagery research in clinical contexts to suggest that some patients move while imagining an action, although they are not aware of such movements. In particular, experimental data from amputees as well as from patients with Parkinson's disease are discussed. We also review recent studies based on comparing brain activity in tetraplegic patients with that from healthy matched controls that provide insights into inhibitory processes during MI. We conclude by arguing that based on available evidence, a multifactorial explanation of motor inhibition during MI is warranted.

  8. Imagining is not doing but involves specific motor commands: a review of experimental data related to motor inhibition

    Directory of Open Access Journals (Sweden)

    Aymeric eGuillot

    2012-09-01

    Full Text Available There is now compelling evidence that motor imagery (MI and actual movement share common neural substrate. However, the question of how MI inhibits the transmission of motor commands into the efferent pathways in order to prevent any movement is largely unresolved. Similarly, little is known about the nature of the electromyographic activity that is apparent during MI. In addressing these gaps in the literature, the present paper argues that MI includes motor execution commands for muscle contractions which are blocked at some level of the motor system by inhibitory mechanisms. We first assemble data from neuroimaging studies that demonstrate that the neural networks mediating MI and motor performance are not totally overlapping, thereby highlighting potential differences between MI and actual motor execution. We then review MI data indicating the presence of subliminal muscular activity reflecting the intrinsic characteristics of the motor command as well as increased corticomotor excitability. The third section not only considers the inhibitory mechanisms involved during MI but also examines how the brain resolves the problem of issuing the motor command for action while supervising motor inhibition when people engage in voluntary movement during MI. The last part of the paper draws on imagery research in clinical contexts to suggest that some patients move while imagining an action, although they are not aware of such movements. In particular, experimental data from amputees as well as from patients with Parkinson’s disease are discussed. We also review recent studies based on comparing brain activity in tetraplegic patients with that from healthy matched controls that provide insights into inhibitory processes during MI. We conclude by arguing that based on available evidence, a multifactorial explanation of motor inhibition during MI is warranted.

  9. Oracle Enterprise Manager 12c command-line interface

    CERN Document Server

    Pot'Vin, Kellyn; Smith, Ray

    2014-01-01

    Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager's powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock full of ready-made scripting examples contributed by the authors and leading members of the community. For example, you'll find scripts and examples of commands to: Remove an Enterprise Manager agent and its related targetsQuickly create administrator accounts that are ful

  10. 1 Commande multivariable du moteur asynchrone triphasé à cage ...

    African Journals Online (AJOL)

    AKA BOKO

    Correspondance, courriel : rabenarivo.michel@yahoo.fr. Résumé. La commande du moteur asynchrone triphasé à ... synthèse du système à l'aide du logiciel MATLAB. Mots-clés : commande, système multivariable, variation de ... of the system by MATLAB software. Keywords : control, MIMO system, frequency variation, ...

  11. Command and Control of the U.S. Tenth Army During the Battle of Okinawa

    Science.gov (United States)

    2009-06-12

    Army‘s XXIV Corps, commanded by Major General John R . Hodge, and the U.S. Marine Corps‘ III Amphibious Corps, commanded by Major General Roy S. Geiger...Watanabe, was activated in April 1944. Ushijima assumed command in August 1944, after Watanabe was bedridden and sent back to Japan due to chronic...great success and combat experience during the war in the Pacific. Army Major General John R . Hodge commanded the XXIV Corps. Hodge was commissioned

  12. STS-93 Commander Eileen Collins suits up for launch

    Science.gov (United States)

    1999-01-01

    For the third time, in the Operations and Checkout Building, STS- 93 Commander Eileen M. Collins tries on her helmet with her launch and entry suit. After Space Shuttle Columbia's July 20 and 22 launch attempts were scrubbed, the launch was again rescheduled for Friday, July 23, at 12:24 a.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  13. Will you accept the government's friend request? Social networks and privacy concerns.

    Science.gov (United States)

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  14. Focused Logistics: Time for Functional Command

    National Research Council Canada - National Science Library

    Mintzlaff, Jeffrey G

    2005-01-01

    .... Military's distribution system -- the parts of the Department of Defense (DoD) that manage and execute the storage and movement of supplies to military customers -- consists of multiple entities and agencies made up of separate Services and commands...

  15. An analysis of Navy Recruiting Command's officer goaling models

    OpenAIRE

    Senter, Robert R.

    1990-01-01

    Approved for public release; distribution unlimited. This study examines the goaling models used by the Navy Recruiting Command for the Nurse Corps and Nuclear Propulsion Officer Candidate (NUPOC) programs. These two programs serve as representative samples for the numerous officer recruitment programs administered by the Navy Recruiting Command. The intent of the study is to analyze and validate the accuracy of the current goaling models, to ascertain factors which could improve the accur...

  16. ARAC: A unique command and control resource

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S. [and others

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource.

  17. ARAC: A unique command and control resource

    International Nuclear Information System (INIS)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S.

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource

  18. Mining human mobility in location-based social networks

    CERN Document Server

    Gao, Huiji

    2015-01-01

    In recent years, there has been a rapid growth of location-based social networking services, such as Foursquare and Facebook Places, which have attracted an increasing number of users and greatly enriched their urban experience. Typical location-based social networking sites allow a user to ""check in"" at a real-world POI (point of interest, e.g., a hotel, restaurant, theater, etc.), leave tips toward the POI, and share the check-in with their online friends. The check-in action bridges the gap between real world and online social networks, resulting in a new type of social networks, namely l

  19. User-centric networking future perspectives

    CERN Document Server

    Aldini, Alessandro

    2014-01-01

    This work represents a milestone for the? 'ULOOP User-centric Wireless Local Loop' project funded by the EU IST Seventh Framework Programme.ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures.Throughout the last 3

  20. Mature data transport and command management services for the Space Station

    Science.gov (United States)

    Carper, R. D.

    1986-01-01

    The duplex space/ground/space data services for the Space Station are described. The need to separate the uplink data service functions from the command functions is discussed. Command management is a process shared by an operation control center and a command management system and consists of four functions: (1) uplink data communications, (2) management of the on-board computer, (3) flight resource allocation and management, and (4) real command management. The new data service capabilities provided by microprocessors, ground and flight nodes, and closed loop and open loop capabilities are studied. The need for and functions of a flight resource allocation management service are examined. The system is designed so only users can access the system; the problems encountered with open loop uplink access are analyzed. The procedures for delivery of operational, verification, computer, and surveillance and monitoring data directly to users are reviewed.

  1. With a Little Help from My Friends? Asymmetrical Social Influence on Adolescent Smoking Initiation and Cessation.

    Science.gov (United States)

    Haas, Steven A; Schaefer, David R

    2014-06-01

    This study investigates whether peer influence on smoking among adolescents is asymmetrical. We hypothesize that several features of smoking lead peers to have a stronger effect on smoking initiation than cessation. Using data from the National Longitudinal Study of Adolescent Health we estimate a dynamic network model that includes separate effects for increases versus decreases in smoking, while also controlling for endogenous network change. We find that the impact of peer influence is stronger for the initiation of smoking than smoking cessation. Adolescents rarely initiate smoking without peer influence but will cease smoking while their friends continue smoking. We discuss the implications of these results for theories of peer influence and health policy. © American Sociological Association 2014.

  2. Exploring the Notion of the Family Friendly City

    Science.gov (United States)

    Provi Drianda, Riela

    2018-05-01

    There is a common perception that downtown areas will never attract families and big cities are not the best place to raise children. Particularly the downtown areas of cities been depicted as the place where criminals, prostitutes, drug-sellers, and other dangerous strangers live. People with children are more likely to look for the suburbs to find bigger housing with more affordable prices, cleaner air, richer nature, a slower lifestyle, and safer environment. However, living in the modern suburb is not always easy and cheap, especially for those who need to commute to the central city. Dealing with the long commutes can be stressful and it affects the health, happiness, and well-being of family members. As the number of modern families with both parents in the workforce is rising, the demand to live closer to the workplace is getting stronger and growing. In some parts of the world, more families increasingly want to live in the cities. This trend can be seen in the United States, Japan, Korea, and Canada. Being family-friendly has become increasingly important for modern cities as more millennial generation show the tendency to raise their families in the urban area. Moreover, it is predicted that two-thirds of world’s population will live in cities by 2030. To accommodate the growing population, in particular, those with children, modern cities should be developed to suit urban families. But what criteria and qualities make one city more family-friendly than another? What would a family-friendly city look like? To date, the number studies exploring the notion of the family-friendly city has been very limited. Most studies have been focusing on the notion of family-friendly dwellings, family-friendly workplaces, or child-friendly cities. This paper brings together and examines the dominant and recurring ideas about the family-friendly city represented in the relevant literature and current urban practices. This paper also questions whether the concept of the

  3. Blossom Point Satellite Tracking and Command Station

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The Blossom Point Satellite Command and Tracking Facility (BP) provides engineering and operational support to several complex space systems for the Navy...

  4. Joint Mission Command Implementation

    Science.gov (United States)

    2016-01-22

    choose. The paper finds that trust is strongly influenced by the subconscious brain and treating it like a tool ignores biology and results in... bias for action and empowerment.14 Since then, the services have evaluated their own concepts of command assessing them against Dempsey’s vision. Lt...understanding, intent, and trust, only trust is strongly influenced by the subconscious brain. Treating trust like it can be taught, or a behavior that

  5. STS-93 Commander Collins suits up before launch

    Science.gov (United States)

    1999-01-01

    In the Operations and Checkout Building, STS-93 Commander Eileen M. Collins gets help donning her launch and entry suit. After Space Shuttle Columbia's July 20 launch attempt was scrubbed at the T-7 second mark in the countdown, the launch was rescheduled for Thursday, July 22, at 12:28 a.m. EDT. The target landing date is July 26, 1999, at 11:24 p.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X- ray telescope and is expected unlock the secrets of supernovae, quasars and black holes. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  6. Gratitude for Help among Adult Friends and Siblings

    Directory of Open Access Journals (Sweden)

    Anna Rotkirch

    2014-10-01

    Full Text Available Although gratitude is a key prosocial emotion reinforcing reciprocal altruism, it has been largely ignored in the empirical literature. We examined feelings of gratitude and the importance of reciprocity in same-sex peer relations. Participants were 772 individuals (189 men; mean age = 28.80 who completed an online survey using a vignette design. We investigated (i differences in reported gratitude and the importance of reciprocity among same-sex siblings and same-sex friends, and (ii how relationship closeness moderates these associations. Based on the theory of kin altruism, we expect that people would feel more grateful towards friends than towards their siblings, and that lack of gratitude or failure to pay back a loan would bother more with friends than with siblings, irrespective of emotional closeness. Results showed that levels of gratitude and expectations of reciprocity were higher towards friends compared to siblings. This was the case also after controlling for emotional closeness. Being close generally made participants feel more grateful and expect lower displays of gratitude in the other. Closeness was also strongly associated with emotional gratitude among siblings compared to friends. We conclude that feelings and displays of gratitude have a special role in friendships. Although a close sibling may elicit as much gratitude as a friend does, even a very close friend is not exempt from the logic of reciprocity in the same way that a sibling is.

  7. The enhancing impact of friendship networks on sales managers' performance

    OpenAIRE

    Claro, Danny Pimentel; Laban Neto, Silvio Abrahão; Claro, Priscila Borin de Oliveira

    2013-01-01

    This paper examines how relationships with friends moderate the impact of professional networks on sales performance. Based on a sample of 204 sales managers in a professional service company, this study presents evidence that friendship networks amplify the effect of sales forces’ professional networks on new product sales as well as on prospecting and converting new deals. Our results offer important insights into the socio-cognitive perspective of sales management literature and suggest th...

  8. Will you accept the government's friend request? Social networks and privacy concerns.

    Directory of Open Access Journals (Sweden)

    David A Siegel

    Full Text Available Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  9. What they bring: baseline psychological distress differentially predicts neural response in social exclusion by children's friends and strangers in best friend dyads.

    Science.gov (United States)

    Baddam, Suman; Laws, Holly; Crawford, Jessica L; Wu, Jia; Bolling, Danielle Z; Mayes, Linda C; Crowley, Michael J

    2016-11-01

    Friendships play a major role in cognitive, emotional and social development in middle childhood. We employed the online Cyberball social exclusion paradigm to understand the neural correlates of dyadic social exclusion among best friends assessed simultaneously. Each child played with their friend and an unfamiliar player. Event-related potentials (ERPs) were assessed via electroencephalogram during exclusion by friend and unfamiliar peer. Data were analyzed with hierarchical linear modeling to account for nesting of children within friendship dyads. Results showed that stranger rejection was associated with larger P2 and positive slow wave ERP responses compared to exclusion by a friend. Psychological distress differentially moderated the effects of friend and stranger exclusion such that children with greater psychological distress were observed to have larger neural responses (larger P2 and slow wave) to exclusion by a stranger compared to exclusion by a friend. Conversely, children with lower levels of psychological distress had larger neural responses for exclusion by a friend than by a stranger. Psychological distress within the dyad differentially predicted the P2 and slow wave response. Findings highlight the prominent, but differential role of individual and dyadic psychological distress levels in moderating responses to social exclusion in middle childhood. © The Author (2016). Published by Oxford University Press.

  10. Suitability of Agent Technology for Military Command and Control in the Future Combat System Environment

    Energy Technology Data Exchange (ETDEWEB)

    Potok, TE

    2003-02-13

    The U.S. Army is faced with the challenge of dramatically improving its war fighting capability through advanced technologies. Any new technology must provide significant improvement over existing technologies, yet be reliable enough to provide a fielded system. The focus of this paper is to assess the novelty and maturity of agent technology for use in the Future Combat System (FCS). The FCS concept represents the U.S. Army's ''mounted'' form of the Objective Force. This concept of vehicles, communications, and weaponry is viewed as a ''system of systems'' which includes net-centric command and control (C{sup 2}) capabilities. This networked C{sup 2} is an important transformation from the historically centralized, or platform-based, C{sup 2} function since a centralized command architecture may become a decision-making and execution bottleneck, particularly as the pace of war accelerates. A mechanism to ensure an effective network-centric C{sup 2} capacity (combining intelligence gathering and analysis available at lower levels in the military hierarchy) is needed. Achieving a networked C{sup 2} capability will require breakthroughs in current software technology. Many have proposed the use of agent technology as a potential solution. Agents are an emerging technology, and it is not yet clear whether it is suitable for addressing the networked C{sup 2} challenge, particularly in satisfying battlespace scalability, mobility, and security expectations. We have developed a set of software requirements for FCS based on military requirements for this system. We have then evaluated these software requirements against current computer science technology. This analysis provides a set of limitations in the current technology when applied to the FCS challenge. Agent technology is compared against this set of limitations to provide a means of assessing the novelty of agent technology in an FCS environment. From this analysis we

  11. Hybrid EEG–fNIRS-Based Eight-Command Decoding for BCI: Application to Quadcopter Control

    Science.gov (United States)

    Khan, Muhammad Jawad; Hong, Keum-Shik

    2017-01-01

    In this paper, a hybrid electroencephalography–functional near-infrared spectroscopy (EEG–fNIRS) scheme to decode eight active brain commands from the frontal brain region for brain–computer interface is presented. A total of eight commands are decoded by fNIRS, as positioned on the prefrontal cortex, and by EEG, around the frontal, parietal, and visual cortices. Mental arithmetic, mental counting, mental rotation, and word formation tasks are decoded with fNIRS, in which the selected features for classification and command generation are the peak, minimum, and mean ΔHbO values within a 2-s moving window. In the case of EEG, two eyeblinks, three eyeblinks, and eye movement in the up/down and left/right directions are used for four-command generation. The features in this case are the number of peaks and the mean of the EEG signal during 1 s window. We tested the generated commands on a quadcopter in an open space. An average accuracy of 75.6% was achieved with fNIRS for four-command decoding and 86% with EEG for another four-command decoding. The testing results show the possibility of controlling a quadcopter online and in real-time using eight commands from the prefrontal and frontal cortices via the proposed hybrid EEG–fNIRS interface. PMID:28261084

  12. Organic Foods: Do Eco-Friendly Attitudes Predict Eco-Friendly Behaviors?

    Science.gov (United States)

    Dahm, Molly J.; Samonte, Aurelia V.; Shows, Amy R.

    2009-01-01

    Objective: The purpose of this study was to determine whether student awareness and attitudes about organic foods would predict their behaviors with regard to organic food consumption and other healthy lifestyle practices. A secondary purpose was to determine whether attitudes about similar eco-friendly practices would result in socially conscious…

  13. U.S. Pacific Command > Organization > Organization Chart

    Science.gov (United States)

    Responsibility USPACOM Previous Commanders Organization Organization Chart Media News Flickr Photos Video Directory Media Inquiries Home : Organization : Organization Chart About DoD DoD Careers Join the Military

  14. Mission Command: Elasticity, Equilibrium, Culture, and Intent

    National Research Council Canada - National Science Library

    Stewart, Keith G

    2006-01-01

    .... It is enabled by decentralization of authority and responsibility that allows subordinate commanders the latitude to plan and conduct operations based upon their understanding of the local situation...

  15. Bully Victimization: Selection and Influence Within Adolescent Friendship Networks and Cliques.

    Science.gov (United States)

    Lodder, Gerine M A; Scholte, Ron H J; Cillessen, Antonius H N; Giletta, Matteo

    2016-01-01

    Adolescents tend to form friendships with similar peers and, in turn, their friends further influence adolescents' behaviors and attitudes. Emerging work has shown that these selection and influence processes also might extend to bully victimization. However, no prior work has examined selection and influence effects involved in bully victimization within cliques, despite theoretical account emphasizing the importance of cliques in this regard. This study examined selection and influence processes in adolescence regarding bully victimization both at the level of the entire friendship network and the level of cliques. We used a two-wave design (5-month interval). Participants were 543 adolescents (50.1% male, Mage = 15.8) in secondary education. Stochastic actor-based models indicated that at the level of the larger friendship network, adolescents tended to select friends with similar levels of bully victimization as they themselves. In addition, adolescent friends influenced each other in terms of bully victimization over time. Actor Parter Interdependence models showed that similarities in bully victimization between clique members were not due to selection of clique members. For boys, average clique bully victimization predicted individual bully victimization over time (influence), but not vice versa. No influence was found for girls, indicating that different mechanisms may underlie friend influence on bully victimization for girls and boys. The differences in results at the level of the larger friendship network versus the clique emphasize the importance of taking the type of friendship ties into account in research on selection and influence processes involved in bully victimization.

  16. Preventing Network Centric Overload (End State Education for the Operational Commander/Staff)

    National Research Council Canada - National Science Library

    Beck, John

    2001-01-01

    .... An end state education system must be devised that prepares our senior leaders to operate a newly formed network centric task force with equipment, organizations and theory of use that most likely...

  17. When Do Friends Prevent Friends from Hooking Up Intoxicated? An Examination of Sex Differences and Hypothetical Intoxication in Peer Interventions.

    Science.gov (United States)

    Savage, Matthew W; Menegatos, Lisa; Roberto, Anthony J

    2017-08-01

    Despite the risks involved when mixing alcohol with casual sexual activity, the majority of college students engage in hookups, and the majority of those hookups involve alcohol. This study focused on the protective role college students' peers can play and the situational factors that might influence their willingness to intervene when a close friend is about to hook up intoxicated. Drawing on the theory of planned behavior (TPB), this study investigated differences in students' (N = 1270) attitudes, norms, perceived behavioral control, and intentions to persuade a close friend not to engage in a hypothetical drunken hookup using a 2 (friend sex) × 2 (participant sex) × 2 (sober/intoxicated) factorial design. Results indicated significant differences in the TPB variables. Participants intended to intervene with female friends, but not male friends, and women were more likely to intervene than men. Participants in the sober condition had stronger intentions to intervene than those in the intoxicated condition, but this effect was driven by increases in men's intentions when sober. Implications for theory and prevention programming are discussed.

  18. The SubCons webserver: A user friendly web interface for state-of-the-art subcellular localization prediction.

    Science.gov (United States)

    Salvatore, M; Shu, N; Elofsson, A

    2018-01-01

    SubCons is a recently developed method that predicts the subcellular localization of a protein. It combines predictions from four predictors using a Random Forest classifier. Here, we present the user-friendly web-interface implementation of SubCons. Starting from a protein sequence, the server rapidly predicts the subcellular localizations of an individual protein. In addition, the server accepts the submission of sets of proteins either by uploading the files or programmatically by using command line WSDL API scripts. This makes SubCons ideal for proteome wide analyses allowing the user to scan a whole proteome in few days. From the web page, it is also possible to download precalculated predictions for several eukaryotic organisms. To evaluate the performance of SubCons we present a benchmark of LocTree3 and SubCons using two recent mass-spectrometry based datasets of mouse and drosophila proteins. The server is available at http://subcons.bioinfo.se/. © 2017 The Protein Society.

  19. Apollo 11 Command Service Module

    Science.gov (United States)

    1969-01-01

    A close-up view of the Apollo 11 command service module ready to be mated with the spacecraft LEM adapter of the third stage. The towering 363-foot Saturn V was a multi-stage, multi-engine launch vehicle standing taller than the Statue of Liberty. Altogether, the Saturn V engines produced as much power as 85 Hoover Dams.

  20. Navigation Architecture for a Space Mobile Network

    Science.gov (United States)

    Valdez, Jennifer E.; Ashman, Benjamin; Gramling, Cheryl; Heckler, Gregory W.; Carpenter, Russell

    2016-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Augmentation Service for Satellites (TASS) is a proposed beacon service to provide a global, space based GPS augmentation service based on the NASA Global Differential GPS (GDGPS) System. The TASS signal will be tied to the GPS time system and usable as an additional ranging and Doppler radiometric source. Additionally, it will provide data vital to autonomous navigation in the near Earth regime, including space weather information, TDRS ephemerides, Earth Orientation Parameters (EOP), and forward commanding capability. TASS benefits include enhancing situational awareness, enabling increased autonomy, and providing near real-time command access for user platforms. As NASA Headquarters' Space Communication and Navigation Office (SCaN) begins to move away from a centralized network architecture and towards a Space Mobile Network (SMN) that allows for user initiated services, autonomous navigation will be a key part of such a system. This paper explores how a TASS beacon service enables the Space Mobile Networking paradigm, what a typical user platform would require, and provides an in-depth analysis of several navigation scenarios and operations concepts. This paper provides an overview of the TASS beacon and its role within the SMN and user community. Supporting navigation analysis is presented for two user mission scenarios: an Earth observing spacecraft in low earth orbit (LEO), and a highly elliptical spacecraft in a lunar resonance orbit. These diverse flight scenarios indicate the breadth of applicability of the TASS beacon for upcoming users within the current network architecture and in the SMN.